Configuration and Asset Management is important not only with regard to licensing audit, but also when documenting and checking compliance with a defined business standard. ATOM brings an environmental review package to the current configuration of your monitored devices and to the software that your device has, even with respect to changes over the last 14 days. However, data can be searched for history, so you can search for changes made in an environment up to 720 days back.
With hardware inventory, you get an overview of the settings of your monitored devices, taking into account the installed operating system, the memory set up and the assigned processors. However, the system will provide you with much more information, such as the BIOS version, whether it's a virtual or physical device, etc ... Everything is available when you click on that device.
The Software Inventory provides a complete overview of installed software with respect to Microsoft and non-Microsoft software and specifies the number of devices the software is installed in. You just have to assess whether the software on the device is legitimate or not.
Because the server may be installing with a role or feature that could cause a malicious site in your environment, ATOM will also let you know what roles and features you have installed on the monitored devices. Here is the biggest use with regard to the issue of using the SMBv1 protocol under the Wannacry ransomware. ATOM gives you an instant and current 24-hour overview of your environment. Service Supervisors will then let you know whether your environment is vulnerable and whether you need to have this role or feature installed on the server. We then decide whether to ensure uninstallation or self-help, but to uninstall from you, consultants need to establish access.