Vulnerability Manager Plus lists all the remote desktop sharing, end-of-life, and peer-to-peer software present in your systems under Threats> High risk software in the web console. It is important for a security admin to understand the risks associated with these software and inspect the necessity of these software and uninstall them if they are not required.
Patching may eliminate software vulnerabilities in applications and Operating Systems. But, how can you protect legacy applications and OSes that are no longer supported by the vendor? These End-of-Life software don't receive security updates and will be left with security gaps. Therefore, admins must inspect the dependency of business critical resources and applications on EOL software and their importance to decide whether they're required or not.
To audit EOL software in your network,
Employees might use remote desktop sharing software to connect to the work computer or a remote desktop server remotely from their home or public network. Unsecure connections might lead to exposure of firewall port to the public, which increases the chances of getting infected with malware, ransomware, or data theft. This arises security concerns such as whether the user is using a secure connection or not while remotely connecting to the system in the enterprise network. Therefore, it is advisable to eliminate Remote Desktop Sharing software from your network systems.
End users might use peer to peer software to share and receive files to and from other computers on the internet. These software could pose a threat to network security as it opens certain ports to facilitate file sharing and it is difficult to verify whether the source of the file is free from malware and viruses. Also, the directories that are shared can be accessed by anyone on the internet. This might also increase the chances of leakage of corporate data and personal information.
To eliminate peer-to-peer software through the web console,