Publisher Description

Window 10 CompatibleCodenica Audit combines two functions; thus it can be considered both as a remote audit software for network computers, simultaneously providing the automatic software status audits of the computers in the company, and as a software for tracking computers and employees in the network. The application enables remote scanning of IT resources without the use of agents installed (DCOM), using the installed Agents and through scanning computers using the D-Scanner (desktop scanner - computer scan run from the USB drive with the scan results saved to files). The Codenica Audit application can be used both as a standalone product for auditing and employee tracking and, when combined with the Codenica Inventory system, as a comprehensive system for managing company IT resources.

Download and use it now: Codenica Audit

Related Programs

SSL Audit

SSL Audit scans servers for SSL/TLS support; it implements its own rudimentary SSL/TLS Parser and is as such not limited to ciphers supported by SSL engines such as OpenSSL or NSS and can detect all known and RFC defined cipher...


Cobynsofts AD Audit

Cobynsofts AD Audit is a Windows utility for auditing your Active Directory to find security gaps. Cobynsofts AD Audit is built around a unique information-centric design that allows you to quickly select and run pre-defined reports. Use the filtering and...


Omega Core Audit

Omega Core Audit is an out-of-box, software-only security and compliance solution for Oracle databases. It is a full back-end solution that is installed in minutes and easily managed by its application interface. The solution enhances the Oracle native security features...


Cobynsofts AD Bitlocker Password Audit

Cobynsofts AD Bitlocker Password Audit is a Windows utility for querying your Active Directory for all or selected computer objects and returning their recovery password in a grid-view format giving you a quick overview of the status of your current...


Codenica Inventory

Codenica Inventory is a solution for all Users who need software for stable inventory management of a company's IT resources. Inventoried objects are entered and edited manually by the User, who retains full control of the process, and removed using...


Screenshot


Details

Keywords