ClearSDN Remote Security Audit | Services
Intro to Remote Security Audit
Remote Security Audit tracks the critical files and directories, user accounts and potential vulnerabilities of your ClearOS installation. Remote Security Audit generates a written report of its review and identifies vulnerabilities and items that deserve review. Because of the variety of local network configurations, the Remote Security Audit is best assessed by someone intimately familiar with the local network requirements and potential risks.
Benefits of Remote Security Audit
The Remote Security Audit tracks the critical files and elements of your system down to the time stamp. It reveals any changes to your ClearOS installation, allowing you the opportunity to review the Remote security of your system and any changes made. With Remote Security Audit you can rest assured that no critical files can be altered or added without your knowledge. Your data is safe!
How Remote Security Audit Works
Remote Security Audit retains a hash calculation of the critical files, directories and user accounts of your ClearOS installation. As such, any change to any bit, including simple file time stamps, are detected and reported in the Remote Remote Security Audit report. The Remote Security Audit software is on the local server and verifies files each day. Hash calculations are verified against a retained version on the ClearSDN server according to the subscription schedule. By maintaining a check hash calculation on the remote ClearSDN server, hackers can't keep their tracks hidden by altering a local hash.