http://www.secpod.com/saner-endpoint-security-personal.html This has been around for a while but I have never seen it posted here. It creates an autostart service and a scheduled task to run on startup which can both be re-configured to manual start (service) and disabled (task) Suggest setting for manual interaction for MS patches. So once a scan completes you get the results showing Vulnerability (unpatched software) and Compliance (Settings issues) Vulerability: click "i" button for info. Click arrow to expand for more info and links. click Fix to remediate individually afer researching. Suggest: Do not click "Remediate All" as all fixes might not be needed. Posted in case anyone wants to test.
Better not. It has an outdated certificate (from 2016) and that does not go along with the word security. EDIT: It is tool from 2015, so it makes sense, but then it does not matter anyway.
Look the program works so maybe it doesn't need a program update. The definitions are up to date. Example:
What certificate? The one for the website? It redirects to secure login page - no problem. As for root certificates I can't find any problem: As for not running correctly in Sandboxie - well it wouldn't work in sandboxie as it needs admin rights to run plus it needs to scan system for installed software, patches and configuratios. I'm not pushing this software but if testing you'd need a test machine where you can restore a system image backup after testing or else you need to use a VM.
When I installed this yesterday, it would not run scans. I would click on the Scan button and the scan would seemingly finish instantly, without finding any fixes. However, scans are running today. It ran a scheduled scan today, which was using over 70% CPU time at times and took a while to complete. I changed the Scan Mode from Full Throttle to Low, as I did not want my computer to run slower, when a scan was being done. This did not affect the current scan, but, CPU was only around 25% on subsequent manual scans. It found and fixed a number of vulnerabilities. I did not look at the proposed fixes in the Compliance tab, before clicking on Remediate All. This proved to be a mistake, as it changed some system settings, I did not want changed, e.g. setting UAC to maximum and changing some other UAC related settings. However, I was able to manually change the settings back to how they were, with GPEdit and User Account Control Settings. Also, when I rebooted after it patched my system, WiFi was not working. I don't know if Saner was the cause of this, but I'm not sure what else it would be. I got my internet working again by running the networking troubleshooter in Windows 10, which re-enabled the wireless networking service, which had been disabled.
On my machine subsequent scans are faster than the initial scan. Thanks for testing. From original post:
@Callender I should have read your post more carefully. I didn't notice where you said that some fixes might not be needed.
Has to be that way. If you check here you can see exactly what it does: C:\Program Files\SecPod Saner\updates\vulnerability\vulnerability1.xml C:\Program Files\SecPod Saner\updates\vulnerability\vulnerability1-results.xml