If you can run it from a unix/linux based machine you could write a fairly simple perl or shell script to run nmap or a command line nessues client from a cronjob, have it test the machines, on the network, dump it to a txt file and compare it to other scans of the same kind when you know there wasn't any other un-authorized machines on the network.
Not sure if that's what you're looking for or not. Florian -----Original Message----- From: Malin, Scott M [mailto:[EMAIL PROTECTED]] Sent: Tuesday, February 04, 2003 12:22 PM To: [EMAIL PROTECTED] Subject: System information gathering Does anyone have suggestions of software that can do a detailed probe of a workstation or server. From time to time it's possible a system is placed on the network that isn't supposed to be there, I'd love to be able to target it and externally probe it for whatever info can be gathered. We currently have a few vulnunerability scanners but they don't return as much info as I'd like This e-mail may contain confidential or privileged information. If you think you have received this e-mail in error, please advise the sender by reply e-mail and then delete this e-mail immediately. Thank you. Aetna
