Software Downloads for "Proactive Audit Logging"
- jPlug J2EE Framework
- License: Freeware

jPlug is a opensource J2EE framework for developing enterprise multi-tiered applications. It comprises of multiple pluggable API and tools to provide common solutions for different application solutions like batch job, persistence, audit, logging etc.
jPlug J2EE Framework License - GNU General Public License (GPL).
- Platform: WinOther
- Publisher: Jplug
- Date:
- Policy Patrol Archiver for Exchange
- License: Shareware

Policy Patrol Archiver stores Exchange emails into a central database, allowing you to apply email retention policies and reduce the load on your Exchange Server. Users can search and restore their own messages through an easy-to-use web interface. Policy Patrol Archiver boosts Exchange Server performance by optionally stubbing messages, and removing messages from the Exchange Information Store. Policy Patrol Archiver allows you to set email retention policies, specifying emails of a certain age to be automatically removed from the email archive database.
- Platform: Windows
- Publisher: Red Earth Software, Inc
- Date:
- Size: 4782 KB
- AsdeqDocs
- License: Freeware

AsdeqDocs - Secure Mobile Document Management. AsdeqDocs enables BYOD productivity with Enterprise control allowing the secure and automatic synchronization of corporate documents to and from employee’s Tablets & Smart Phones. The AsdeqDocs solution is installed on premise, behind the corporate firewall and directly connects a mobile employee with more than 18 leading document management solutions including SharePoint, Trim, Documentum, Exchange, File Shares, OpenText, WebCenter and IBM Connections.
- Platform: Android 4.x
- Publisher: Asdeq Labs Pty Ltd
- Date: 28-11-2014
- Size: 21504 KB
- Proactive Password Auditor
- License: Shareware

Proactive Password Auditor is a password security test tool that's designed to allow Windows NT, Windows 2000, Windows XP and and Windows Server 2003-based systems administrators to identify and close security holes in their networks. Proactive Password Auditor helps secure networks by executing an audit of account passwords, and exposing insecure account passwords. If it is possible to recover the password within a reasonable time, the password is considered insecure. The software supports a few different methods of obtaining password hashes for further attack/audit: from dump files (generated by 3rd party tools like pwdump/pwdump2/pwdump3), Registry of local computer, binary Registry files (SAM and SYSTEM), memory of local computer, and memory of remote computers (Domain Controllers), including ones running Active Directory.
- Platform: Windows
- Publisher: ElcomSoft Co. Ltd.
- Date: 02-02-2006
- Size: 1608 KB
- Cibet
- License: Freeware

Cibet is a handy framework designed to offer developers interfaces and classes to introduce audit - proof archiving and logging and dual control mechanisms like four-eyes principle and six-eyes principle into their applications.
The Cibet framework helps to control the execution of important business processes. To control an application in the sense of Cibet is not meant on a security level but on the reliance and trustfulness level.
.
- Platform: WinOther
- Publisher: Wolfgang Winter
- Date:
- GVH Logging and Debug Library
- License: Demo

Super 32-bit logging and debugging tool for C/C++ developers. Decreases development time significantly: no more slowly stepping through your program. Use macros to write information to a logfile. EXTREMELY POWERFUL: optionally duplicate the debug info REAL-TIME to a scrollable window. Suspend/resume, detect memory leaks, log function-call stack, disable/enable all logging or specific types from any point in your app, hex-dumps, more than one log file, system-generated error messages, exact #CPU-cycles between a function's entry and exit, printf-like logging, 64-bit integer values, current and maximum mem-usage at any time, array logging.
- Platform: Windows
- Publisher: GVH Maatwerk Software
- Date: 01-03-2002
- Size: 77 KB
- PDFapps Security and Privacy Audit
- License: Shareware

pdfapps PDF Security and Privacy Audit 2.0 Do you leave private, confidential or sensitive information in PDFs? Do your published PDFs conform to your information security policy? Auditing your PDF documents before release is a crucial business step in information management. PDF Security and Privacy Audit helps perform this step by instantly showing and reporting on the metadata and security permissions in your PDF documents. Features and Benefits: Instantly batch report on private metadata information that may have been left in PDFs.
- Platform: Windows
- Publisher: PDFapps.com
- Date: 08-05-2005
- Size: 1639 KB
- Proactive Security Auditor FE
- License: Freeware

Proactive Security Auditor FE (Freeware Edition) is a free, small, fast and easy to use program to assist Windows(R) system administrators and ordinary users to keep their computers secure by identifying what security updates are installed on local and remote machines, and allowing to download and install missing patches from Microsoft web site.
The features and advantages of Proactive Security Auditor FE are:
Very small and extremely fast
Intuitive user interface
Agentless - no software to install on client machines
Credentials management
Does not use MSXML and MDAC - no additional software/libraries needed
Scanning remote machines selected by NetBios names or IPs
Compare scans made at different times - see what patches have been added and...
- Platform: Windows
- Publisher: ElcomSoft Co. Ltd.
- Date: 13-02-2006
- Size: 896 KB
- File Audit Free Edition
- License: Freeware

Monitors folders and sub folders for the following changes:- -File/Folder Attributes -File/Folder Last Write Time -File name -Folder name -File/Folder Security Attributes -Detailed Logging -Real time file monitoring -FREE for private use.
- Platform: Windows
- Publisher: Adaptive Technology
- Date: 01-11-2006
- Size: 468 KB
- DEKSI Network Audit
- License: Shareware

DEKSI Network Audit provides a complete software and hardware inventory of all your network p.c.'s. DEKSI Network Audit is an extremely powerful, feature rich, advanced, but easy to use software system designed to provide network administrators with comprehensive and detailed reporting on all the software and hardware inventory installed on your networked computers. You can view the Information remotely, generate a variety of different reports, as well as track the changes that occurred since your last inventory was run.
- Platform: Windows
- Publisher: DEK Software International
- Date: 20-06-2008
- Size: 3173 KB
- Express PC Audit Tool
- License: Freeware

Get a complete audit of your PC's hardware and software. Easy and fast. Great for personal and business use. Why people love it: * Automated - No more tedious manual PC audits. (Hint: forward it to employees!) * Accurate - Uses Windows Management Instrumentation (WMI) to collect PC inventory data. * Secure - No download required; runs right in your browser; no data sent back over the network. * Easy - Reports can be easily printed and exported to Microsoft Outlook or Excel with a single click.
- Platform: Windows
- Publisher: Express Metrix
- Date: 01-08-2008
- Size: 176 KB
- Email Audit
- License: Shareware

Email Audit is a powerful add-in utility for Microsoft Outlook 2000/XP/2003.As the new mail arrives,it filters and clusters Spam mails, Junk mails, Bounce mails into their respective folders. The email audit utility comes with a host of built in spam control filters and flexible user defined filters. You can now create Whitelist of email IDs belonging to your friends, colleagues, relatives so that mails originating from your Whitelist contacts are secured. Features of Email Audit: Works on Microsoft Outlook 2000/XP/2003.
- Platform: Windows
- Publisher: KMsoft Technologies Ltd
- Date: 14-08-2009
- Size: 7393 KB
- Professional Audit Expander
- License: Shareware

PAE is the best tool designed to Analyse and Audit your MS Windows Network PAE is the best tool designed to Analyse and Audit your entire Microsoft Windows Networks, Domains and Computers.1) Permission analysis and scanning (NTFS, audit and ownership) through the folders, files, LDAP objects and registries. Visualization of the permission inconsistencies, inheritance, differences and changes through time between folders and subfolders2) Visualization of the files and folders size and disk occupation, dynamic and recursive navigation through the files, folders, nested users and groups.
- Platform: Windows
- Publisher: winsysbee.com
- Date: 21-9-2009
- Size: 3051 KB
- The Lock
- License: Shareware

The Lock provides user audit and monitoring, access control, Internet and system security for any computer running Windows XP, Server 2003, Server 2008, Windows Vista, Windows 7. The Lock now supports 64 bit versions of Windows 7. Running on Windows 9x/ME may work, but is no longer supported. The Lock is PL-1 compliant to Chapter 8, NISPOM. It also meets Sarbanes-Oxley Access Control, Intrusion Detection, and PC Auditing requirements, as well as meets HIPPA, Access, Authorization, and Security control requirements.
- Platform: Windows
- Publisher: CrashCourse Software
- Date: 16-01-2011
- Size: 41338 KB
- Codenica Audit
- License: Shareware

In Codenica Audit, the auditing process is divided into two stages: scanning and recognition. The first stage is responsible for collecting source data (WMI, Windows registry, scanned files) from hosts (scanned computers) to be audited. The second stage is a process of transforming source objects into inventoried objects (computers, hardware, and software). Each stage can be fully configured by the user. The Codenica Audit software for PC auditing can perform one-time or periodic audits (computer audits, software licensing audits, etc.
- Platform: Windows
- Publisher: Codenica
- Date: 15-04-2011
- Size: 3056 KB
- Network Audit Software
- License: Shareware

Complete network audit can be handled accurately and totally automated in a multi-OS network environments. Network Audit Advisor ensures each and every node is scanned and all the needed information is retrieved. You can audit your network agentlessly or using an exported agent utility, which can be run using a domain Logon script or right from a USB Flash drive Computer Audit Our enterprise-level computer audit software lets any business audit the whole network in just a matter of minutes. Plan hardware and software upgrades, optimize and save on licensing, improve security configuration thanks to deep and detailed computer audit of every node in your network.
- Platform: WinOther
- Publisher: Network Computer Audit Software corp
- Date: 11-09-2012
- Size: 12257 KB
- WebSpy Sentinel - Network Data Logging
- License: Shareware

WebSpy Sentinel is an advanced data logging device that captures the activity of multiple protocols on your network, including web, secure web, email, telnet, FTP and POP3. Sentinel can also be configured to capture the full content of these protocols. Sentinel will not only store URLs but has the ability to capture full web content and full email messages - so now you can analyze Sentinel log files and see dynamic content web pages and even attachments accessed by your network users. Sentinel can also be configured to log only low-level data without content, such as only the names of web pages visited without content, or the subject lines of emails without the body of emails.
- Platform: WinOther
- Publisher: WebSpy
- Date: 05-11-2012
- Size: 2632 KB
- Audit Impression
- License: Shareware

Audit Impression.
- Platform: WinOther
- Publisher: CZ Solution
- Date: 18-11-2012
- Size: 51763 KB
- HSLAB Logger
- License: Shareware

The complete solution for the background control and logging the users activity. This software allows to record actions of the user (users) of a computer on start the applications, opening documents, access to the Internet and using removable media. Using this software to become possible to receive the anformation about user's actions and to take measures for prevention of non-authorized use of applications and computer system as a whole. Also you can restrict access to some programs (using file tame or keyword) or to CD/DVD/Zip and other removable media.
- Platform: WinOther
- Publisher: Handy Software Lab
- Date: 21-07-2012
- Size: 4157 KB
- PC Remote Permissions Audit
- License: Shareware

PC Remote Permissions Audit is a network permissions audit tool that lets you gather detailed user permission data from servers on the network. This includes Direct Access Token, Direct and Group Access Token, Direct and Everyone Access Token and Access via Any Token. The data is stored in an XML database on your local computer. The data can be exported to many popular formats. Data can also be reported and be sent directly to default installed printer..
- Platform: WinOther
- Publisher: Remote PC Tools, Ltd.
- Date: 22-10-2012
- Size: 8499 KB













