I believe someone on my network in a remote site is a "amateur hacker (her words to other employees). I have since had a few changes that seem suspicious. Anyone know of a good program to search for hidden utilities / programs / key loggers?
We have (2) 2003 servers (DC and TS). Her account was always logged on after hours to the TS (no one gets to DC) so I have since created idle rules in case any "tools" have been left running. I would like to cover all bases.
Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.