1 / 10

IT Asset Discovery Tool

. . . . . . . . . . AGENT-LESSNo client loadedon machine. Searches in all environments and operating systems. DevicesHardwareSoftwarePrinters. Asset DiscoverySoftware Host. . . Unobtrusively searchesnetwork for attacheddevices and software. . . . . . . . . . . . . . . ADT = Asset Discovery Tool.

seda
Télécharger la présentation

IT Asset Discovery Tool

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


    1. IT Asset Discovery Tool

    2. What Is ADT?

    3. ADT Project Scope

    4. Implementation All ADT servers in APC Dedicated VPN to each installation for ADT scanning No ports used on perimeter firewall Belvoir IDS can monitor tunnel traffic CTNOSC will monitor IDS at ADT Core making alerts available to DOIM Local PIX 515E used for local network monitoring/packet scanning

    5. ADT Scan Process

    6. Non-Compliance Reporting Process

    7. Schedule & Milestones Original Timeline is still valid. Changes are that the level of detail analyses possible in Q-3 will be less than desired. Additionally, there is more schedule risk associated with implementing required GPO at C-TNOSC, DIACAP requirements and local/forest owner push-back. Original Timeline is still valid. Changes are that the level of detail analyses possible in Q-3 will be less than desired. Additionally, there is more schedule risk associated with implementing required GPO at C-TNOSC, DIACAP requirements and local/forest owner push-back.

    8. Example Discovery Data FileMaker Pro 5.x and 6.x Unsupported versions; Exploitable IA Vulnerabilities iTunes (54 at Belvoir) IA and Legal SW License Compliance Issue Google Earth (103 at Belvoir) Potential SW License Legal Issue Google Talk Unauthorized VoIP Messaging

    9. Example Discovery Data FileMaker Pro (Versions 5.x and 6.x) Unsupported versions; Exploitable IA Vulnerabilities iTunes (190 at HQDA) IA and License Compliance Issue Google Earth (61 at HQDA) Potential SW License Issue Peachtree Accounting Potential DITPR and NDAA Compliance Issue

    10. Example Discovery Data

    11. Army IT Day

More Related