A computer-implemented method includes establishing a logon connection
between a host system and one or more client systems through a network;
assessing computer security at the host system by scanning each client
system after logon; parsing data obtained by scanning each client system;
and generating output files containing parsed data.Implementations may
include scanning for one or more of: Ethernet adapters, operating system,
computer name, antivirus installation, security information, mounted
drives, local user information, services, audit policies, shared drives,
trusted domains, Internet uniform locators, installed applications,
images and movies.