- The identification of rogue services and open TCP and UDP ports.
- Detects known CGI, DNS, FTP, Mail, RPC and other vulnerabilities.
- Detects Open shares and lists who has access to these shares together with their permissions.
- Enumeration of users, services, etc.
A complete list of features can be found in the product manual. My intention with this review is to see just how easily one can begin using this product – without reading the manual. This is the point-and-click world, and frankly, if you can't just pick up a product and start using it, then the interface probably needs some improvement.
The link for this article located at netsecurity.org is no longer available.