Host checker best practices
andytsmith last edited by
I am attempting to compile a best practice installation guide for the host checker.
The intended user community is as follows:-
Home users on home PCs
Corperate laptop users
Others including third party support users
Obviously host checkers use can vary depending on what you are trying to get out of it. For example you can check that a user is connecting on a corperate laptop before user is granted application X.
However, a big selling point of the box is that it is able to check for remote monitoring/key logging applications before allowing a connection.
Do any of the users here have any suggestions for host checking of these key logging applications?
prashant_1012 last edited by
we are using Whole security’s confidence online.