Vulnerability Manager Plus lists all the remote desktop sharing, end-of-life, and peer-to-peer software present in your systems under Threats> High risk software in the web console. It is important for a security admin to understand the risks associated with these software and inspect the necessity of these software and uninstall them if they are not required.

Audit End-of-Life software (EOL):

Patching may eliminate software vulnerabilities in applications and Operating Systems. But, how can you protect legacy applications and OSes that are no longer supported by the vendor? These End-of-Life software don't receive security updates and will be left with security gaps. Therefore, admins must inspect the dependency of business critical resources and applications on EOL software and their importance to decide whether they're required or not.
To audit EOL software in your network,

  1. Navigate to Threats> High Risk Software> End Of Life.
  2. Here you can find all the expired software as well as the expiry date and the number of days left for a legacy software to expire. Based on this information, you can decide whether to retain the software or remove them from your network.

Audit and eliminate Remote Desktop Sharing:

Employees might use remote desktop sharing software to connect to the work computer or a remote desktop server remotely from their home or public network. Unsecure connections might lead to exposure of firewall port to the public, which increases the chances of getting infected with malware, ransomware, or data theft. This arises security concerns such as whether the user is using a secure connection or not while remotely connecting to the system in the enterprise network. Therefore, it is advisable to eliminate Remote Desktop Sharing software from your network systems.

  1. Navigate to Threats> High Risk Software> Remote Desktop Sharing.
  2. Click uninstall under action if you wish to eliminate the software from all the affected systems.

Audit and eliminate Peer-to-peer software:

End users might use peer to peer software to share and receive files to and from other computers on the internet. These software could pose a threat to network security as it opens certain ports to facilitate file sharing and it is difficult to verify whether the source of the file is free from malware and viruses. Also, the directories that are shared can be accessed by anyone on the internet. This might also increase the chances of leakage of corporate data and personal information.
To eliminate peer-to-peer software through the web console,

  1. Navigate to Threats> High Risk Software>Peer to Peer.
  2. Click uninstall under action if you wish to eliminate the software from all the affected systems.