The machine upgrade is a complicated job when the old data have to be backed up from the old machines and recovered to new ones. There will be more problematic issues once the new machines are in place due to user habits, and this is just a small part of IT administrator jobs, let alone other major tasks in hands.
The ever increasing routine jobs pose heavier workload on IT administrators who often spend work overtime solving the problems, the issue of getting off work in time becomes a distant goal. Let me explain the correlation of this phenomenon to the real topic.
It is believed that every IT administrator keeps his own set of tools to facilitate daily works, and DragonSoft Vulnerability Management is one of the tools. The vulnerability detection is a proactive way to outside threats before it happens, of course, there are numerous useful hints to its users.
Whenever new machines are introduced to replace old ones, most users adopt “Complete” policy audit to identify potential vulnerability from the network service system and communication ports in the system. The question remains whether or not to apply identical practice on currently in use PCs and to-be-discarded PCs if the IT administrator is responsible for hundreds of machines, vulnerability assessment become a hefty job.
Taking 2009 procurement as an example, one can select “New Policy” function to sub-divide all machines into 3 policies: “2009 Procured”, “PC in use” and “Old machine”.