Tech Support Forum banner

Belarc Advisor?

3714 Views 5 Replies 3 Participants Last post by  Deejay100six
Just done a wipe and reinstall of my nephews laptop and was thinking i had done a pretty good job but after checking it with Belarc Advisor, the benchmark looks quite dismal.

I was going to ask if someone could take a look but can't figure how to post the report or even if thats possible. The first bit is ok till you get to the security, audit and account policies etc.

Went through Glasweigans very good security, what do i need post but the machine has the same problem as mine, not enough memory, so can't cope with all the protection as advised without draining too many resources.

Should i assume that because Belarc only comes up with a score of 3.13 out of 10, the machine still needs a lot of work?

Just tried to post screenshot and for some reason its telling me that its already been posted in another one of my threads????? :4-dontkno
Status
Not open for further replies.
1 - 6 of 6 Posts
go into the user cp at the top left corner of the page and you can get the link from your uploads and post it
Thanks Dai, that laptop has gone back now but just had a look and my pc shows similar. I have another laptop to work on now so will try to figure how to post details of this one when i have finished.

If anyone else has any comments about Belarc results please, feel free. :grin:
put it in the laptop section when your ready
Dave, I would take the Belarc results only so far. I've seen some reports about v7 where similar scores of 3.13 turned out to be for an enterprise environment. In other words, multiple users and not a single user. Common sense is one of your best defences.
@Dai, Yeah willl do mate though i thought this was a more general security question.

Thanks Iain, i suspected as much. I clicked on one of the failures and it came up with this;
File and Registry Auditing

A valuable tool that is available to NTFS volumes, in addition to NTFS Permissions, is the ability to audit what exactly happens to files on a file system. You can audit - user by user, when a file is accessed, modified, or created. The benefit of security auditing after a system has been compromised can be incredible - if auditing was actually turned on before the compromise, you can get a play-by-play description of exactly what happened, and what files were viewed or modified by each user. If auditing is not enabled before the compromise, there is no information to audit.

This feature of NTFS file systems is not normally used because there is a level of performance overhead involved, and because the security audit log will tend to be flooded with events. We've already dealt with the event log by significantly increasing its size. The performance overhead is something that users are likely to notice; especially during computer start-up and shut-down.
Maybe its a bit deeper than we need to go.
1 - 6 of 6 Posts
Status
Not open for further replies.
Top