Intact Software Upgrades
For the latest information, make sure to visit our
web site and
sign up for out newsletter filled with
Intact news and tips.
Intact Intelligence
- Includes all features of the Open Use version.
- Self-identification
- Intact will monitor the behavior of your system over a period of time.
- After this identification period, Intact will create a configuration file which
monitors only those items which do not change.
- Configurable for various degrees of sensitivity.
- Granular detection of NT users and groups
- Settings such as RAS, home directory, profile directory.
- Group membership
- Wildcard support for files (useful for DLL's and EXE's).
- Create Event Log entries for critical changes and
prioritize for automated processing using the Event ID.
- Send events to syslog servers.
- Configuration Browser
- Easy-to use browser for edititing configurations.
- Output viewer
- View large output files in a tabular form.
- Search, sort and extract information.
- Update database by clicking on items.
- Map configuration files to auditing acls and automatically apply them.
Intact Enterprise
- Includes everything in the Intelligence version.
- Utilizes ODBC to centrally store output, events and detection records.
- Supports Oracle, DB2, Microsoft SQL Server and others.
- Centralized Administration
- Administer many workstations from one or more locations using the Enterprise Administration GUI.
- Use the Enterprise Administration GUI to remotely execute Intact on managed computers and to schedule execution.
- View output and events for all computers at a single location.
- Red/green/yellow indicators show if a something critical has changed.
- Change configurations from one location.
- Centralized database information
- All databases and configuration stored in one location.
- Provide centralized access control.
- Centralized backups of critical data.
- Repository of detected changes and output.
- No proprietary authentication or encryption protocols are used.
Summary
Feature |
Open Use |
Intelligence |
Enterprise |
Files and directories |
yes |
yes |
yes |
Auditing settings |
yes |
yes |
yes |
Users and Groups |
limited* |
yes |
yes |
Object dates, times |
yes |
yes |
yes |
Hardware |
yes |
yes |
yes |
Network configuration |
yes |
yes |
yes |
E-mail notification |
yes |
yes |
yes |
Event log and syslog notification |
|
yes |
yes |
Detailed user/group info |
|
yes |
yes |
Wildcards in files and directories |
|
yes |
yes |
Self-identification and auto-configuration |
|
yes |
yes |
Update detection database without rebuilding |
|
yes |
yes |
Event log and prioritization using Event ID |
|
yes |
yes |
Convert configuration file into auditing settings |
|
yes |
yes |
GUI output browser |
|
yes |
yes |
GUI configuration editor |
|
yes |
yes |
GUI central administration console |
|
|
yes |
Remote administration |
|
|
yes |
Remote browsing and drill-down |
|
|
yes |
Central repository |
|
|
yes |
* In Intact Open Use, only the SAM
registry keys and values are checked which will show you
when something about a user or group has changed, but
will not tell you what attribute.
For , support and availability, visit our
Intact web pages,
ordering section or
send email to orders@pedestalsoftware.com.