100 likes | 333 Views
. . . . . . . . . . AGENT-LESSNo client loadedon machine. Searches in all environments and operating systems. DevicesHardwareSoftwarePrinters. Asset DiscoverySoftware Host. . . Unobtrusively searchesnetwork for attacheddevices and software. . . . . . . . . . . . . . . ADT = Asset Discovery Tool.
E N D
1. IT Asset Discovery Tool
2. What Is ADT?
3. ADT Project Scope
4. Implementation All ADT servers in APC
Dedicated VPN to each installation for ADT scanning
No ports used on perimeter firewall
Belvoir IDS can monitor tunnel traffic
CTNOSC will monitor IDS at ADT Core making alerts available to DOIM
Local PIX 515E used for local network monitoring/packet scanning
5. ADT Scan Process
6. Non-Compliance Reporting Process
7. Schedule & Milestones Original Timeline is still valid. Changes are that the level of detail analyses possible in Q-3 will be less than desired. Additionally, there is more schedule risk associated with implementing required GPO at C-TNOSC, DIACAP requirements and local/forest owner push-back.
Original Timeline is still valid. Changes are that the level of detail analyses possible in Q-3 will be less than desired. Additionally, there is more schedule risk associated with implementing required GPO at C-TNOSC, DIACAP requirements and local/forest owner push-back.
8. Example Discovery Data FileMaker Pro 5.x and 6.x
Unsupported versions; Exploitable IA Vulnerabilities
iTunes (54 at Belvoir)
IA and Legal SW License Compliance Issue
Google Earth (103 at Belvoir)
Potential SW License Legal Issue
Google Talk
Unauthorized VoIP Messaging
9. Example Discovery Data FileMaker Pro (Versions 5.x and 6.x)
Unsupported versions; Exploitable IA Vulnerabilities
iTunes (190 at HQDA)
IA and License Compliance Issue
Google Earth (61 at HQDA)
Potential SW License Issue
Peachtree Accounting
Potential DITPR and NDAA Compliance Issue
10. Example Discovery Data
11. Army IT Day