Remote Desktop Audit
- File Version: Remote Desktop Audit 2.3 build 157
- File Name: rdaudit_setup_18.104.22.168.exe
- File Size: 3.72 MB
- Author: LizardSystems
- License: Demo
- Updated: September, 23rd 2019
- Requirements: Windows 10 / Windows 8.1 / Windows 8 / Windows 7 / Windows Vista / Windows XP / Windows 7 64 / Windows 8 64 / Windows 10 64
Remote Desktop Audit allows you to monitor the activity of remote users accessing your servers. Remote Desktop Audit will collect all information from remote desktop sessions across your servers. This allows for detailed data analysis and provides valuable insights. Data filtering and aggregation can make data reports more powerful and you can view them both in tabular and graphic formats.
Remote Desktop Audit will help you detect suspicious events and failed logins, which are often indicators of hacker attacks. Remote Desktop Audit can also be used to quickly analyze and investigate network incidents.
Provides you with details about remote desktop sessions
After a smooth setup (which, it must also be noted, doesn’t require installing any agents), you will be prompted with an organized user interface that allows you to group remote PCs into folders that allow you to easily analyze their activity.
You can add a computer to your network by simply typing its name or IP address, or browsing for it online. The credentials that you associate with each computer can be inherited, can be assigned to an existing user, or you can indicate a user.
Filters are included to make inquiries more relevant
Once the monitoring has been started, the main window will provide you with detailed information about the computers you are watching. You can view details about the time and date of each user’s log-on or log-off, as well as their IP address, server, and any other event information. You can automate the monitoring process by using the “Event Log” menu. It can automatically update data. You can also export the audit summary, sessions, and events from this menu.
Helps you prevent malicious connection attempts
This means you can create multiple filters to filter remote desktop sessions. You have the option of inspecting them in tabular or graphic representations.
The application is useful in real-life situations. It can detect failed logins and events that could be related to malicious attempts at taking control of your computer.
The key features
- Gather information from remote desktop sessions (Terminal Server Session), one or more hosts in one place
- Remote hosts don’t require software agents – all that is required is to inspect the servers in the list.
- To make data analysis easier, use powerful filters to remote desktop session logs
- Aggregate logs for the server, user and IP address.
- Additional parameters can be calculated in user sessions using logs. These include session duration or group sessions by server, user name and IP address.
- You can view event logs and user sessions both in tabular and graphic representations.