On December 10, a critical vulnerability was discovered in the Log4j component from the Apache Software Foundation, rated at a maximum of 10 on the CVSS scale.
The Log4j component (also known as Log4Shell and LogJam) is a Java-based logging package used by developers to log errors. At the moment, it is already known that the CVE-2021-44228 vulnerability affected a large number of software, including some services of the largest tech companies such as Amazon, Apple, Cisco, Google, Microsoft, Steam and IBM. The Dutch Cybersecurity Center has created a regularly updated doc on GitHub listing the affected applications.
With …
Come, on October 5, 2021, Microsoft is releasing their new operating system, which may not be suitable for for all of your computers.
Workstations must meet these requirements:
In this TNI update, we have prepared a special report named “Windows 11 Ready”, which will quickly get you …
On July 6 and 7, patches were released by Microsoft for all current versions of Windows after a critical vulnerability has been discovered with its Print Spooler service. Microsoft has also released the patch for Windows 7 which ended full support last year but remains in extended support. The vulnerability, dubbed PrintNightmare, allows attackers to remotely execute commands with system-level privileges.
Total Network Inventory will help you quickly discover which computers on your network are already patched. For example, hereās the situation for KB5004945 and KB5004954:
To be able to collect this information, the Windows updates scan must …
IT administrators play an indispensable role in managing the technology basis and digital infrastructure enabling modern enterprises to function smoothly. To succeed in the multifaceted responsibilities of securing complex corporate networks and supporting multiple users, staff must be equipped with specialized software tools.
A suite of specialized programs is essential for IT operators to perform their duties effectively. This software for network administrators includes inventory, monitoring and event tracking systems, as well as remote management and application deployment tools, each serving a specific purpose in resource maintenance and optimization.
Not everyone knows and uses such a killer feature of Total Network Inventory as table conditions, so today we would like to remind you about it and provide some usage examples, so you can see how it can make your work much easier.
First one is simple: imagine that you need a list of computers with less than 10GB free space left on the C drive before installing some huge OS update or a new software product. This can be achieved rather quickly:
Open the Table reports tab, copy the existing Logical disks template or create a similar one. …
And we are continuing our series of tutorials. As we promised, today weāre going to describe the most popular filters and advise how to apply them best.
All filters are located right under the āSoftwareā and āLicensesā tabs and have the following form:
While filters are not enabled, the main list will display all of the software from all scanned workstations.
Use āAsset filterā to display a list of software on specific workstations. Select a device, several devices (make sure that the āMultiple selectionā box is checked) or a group in the network tree to …