Host checker best practices



  • I am attempting to compile a best practice installation guide for the host checker.

    The intended user community is as follows:-

    Home users on home PCs
    Corperate laptop users
    Others including third party support users

    Obviously host checkers use can vary depending on what you are trying to get out of it. For example you can check that a user is connecting on a corperate laptop before user is granted application X.

    However, a big selling point of the box is that it is able to check for remote monitoring/key logging applications before allowing a connection.

    Do any of the users here have any suggestions for host checking of these key logging applications?



  • Dear Andy

    we are using Whole security’s confidence online.


 

31
Online

38.4k
Users

12.7k
Topics

44.5k
Posts