Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

FeedBack: SUS vs HfNetChk

Posted on 2007-04-06
2
Medium Priority
?
237 Views
Last Modified: 2013-12-04
FeedBack: SUS vs HfNetChk
I would like to get some feedback regarding from people using either SUS or HfnetChk. What benifits/disadvantages have you seen from either product. Also I believe HfnetChk is available via command line in MS security baseline analyzer is anyone using this and if so what are the major drawbacks vs the GUI.

Thanks
0
Comment
Question by:pcazel
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
2 Comments
 
LVL 27

Accepted Solution

by:
Tolomir earned 750 total points
ID: 18863697
Take a look at:

http://shavlik.typepad.com/mark_shavliks_blog/2006/02/shavlik_and_mic.html

...At some point Microsoft may stop supporting HFNetChk and MBSA 1.2.1. I am not sure when this will occur because even the old version of HFNetChk they have in MBSA 1.2.1 supports a number of product that WSUS does not support. WSUS is also not a scanner as it requires an running agent on every computer to work.  My assumption is they cannot elimate HFNetChk until WSUS supports all the things MBSA 1.2.1 does....

Tolomir
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 18863722
Something more:

http://msmvps.com/blogs/bradley/archive/2006/04/05/89541.aspx

WSUS versus Shavlik?

So Matthew says he's in charge of a 60 user CPA firm, on a non SBS, but fully 2003 sp1 network (okay knock one point off Matt for not running SBS.. but let's keep reading)... and he's evaluating WSUS and looking at Shavlik.  He says he's got Windows XP sp2 (mostly), some Windows 2000 (um.... Matt.. another penalty deduction there), and Office 2003 Pro (okay add one point back) and Adobe Acrobat 6.0....
0

Featured Post

WEBINAR - Latest Cyber Tips for Defense

Join the WatchGuard Threat Research Team on October 26th for an informative webinar featuring expert tips and tricks for defending your organization from today's latest cyber threats. Don't leave yourself vulnerable to attack. Register for the webinar today!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
In a recent article here at Experts Exchange (http://www.experts-exchange.com/articles/18880/PaperPort-14-in-Windows-10-A-First-Look.html), I discussed my nine-month sandbox testing of the Windows 10 Technical Preview, specifically with respect to r…
Have you created a query with information for a calendar? ... and then, abra-cadabra, the calendar is done?! I am going to show you how to make that happen. Visualize your data!  ... really see it To use the code to create a calendar from a q…
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
Suggested Courses

610 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question