Maintaining network security requires constant vigilance. Many of our customers have reported that they find new file transfer-enabled servers in their network every week.
To ensure consistent ongoing network security, Sentry Auditor™ can be set up to run at regular intervals and email the scan results to you. New servers enabled for file transfers will be brought to your attention with no effort on your part. This allows you to evaluate them in seconds and decide whether to disable or secure them appropriately, depending upon the needs of the business.
Sentry Discovery™ scans your corporate network and identifies every server that supports File Transfer protocols.
Additionally, Sentry Discovery™ assesses each server to see if it allows anonymous login. With a double-click you can display the content of the server’s default folder.
Sentry Discovery™ scans also locate known servers, authorized for File Transfer usage. These servers can be moved to the Excluded tab so you can focus on the new and questionable servers that need to be investigated further.
You can set Sentry Discovery™ up to run at regular intervals and email the scan results to you, so new servers found running File Transfer software will be brought to your attention with no effort on your part.
The screen shot shows the results of a File Transfer Audit.
213 servers supporting File Transfer protocols were located, a number of which allow anonymous login.
When Sentry Discovery identifies File Transfer Servers that support the FTP protocol, it enables you to see the ‘Welcome Message the server sends out. This gives you information about the type of server etc. Pause the mouse over a serverto see the Welcome Message.””
Default welcome messages usually identify the type of server and the operating system it is running on.
This information can be used by hackers to search for known vulnerabilities and exploits for that particular server.
It is good practice to customize these messages to remove any such information that could aid malicious users.