{"id":611233,"date":"2025-12-11T00:21:54","date_gmt":"2025-12-11T00:21:54","guid":{"rendered":"https:\/\/www.ninjaone.com\/?post_type=pseudo_docs&#038;p=611233"},"modified":"2025-12-11T00:21:54","modified_gmt":"2025-12-11T00:21:54","slug":"auditoria-software-alto-riesgo","status":"publish","type":"pseudo_docs","link":"https:\/\/www.ninjaone.com\/es\/docs\/gestion-de-vulnerabilidades-ninjaone\/auditoria-software-alto-riesgo\/","title":{"rendered":"Auditor\u00eda de software de alto riesgo"},"content":{"rendered":"<div class=\"elementor-element elementor-element-a59a11b elementor-widget__width-inherit elementor-widget-tablet__width-inherit elementor-widget elementor-widget-text-editor\" data-id=\"a59a11b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container optml-bg-lazyloaded\">\n<p><span data-contrast=\"none\">La auditor\u00eda de software de alto riesgo es un t\u00e9rmino amplio que engloba diversas aplicaciones de software que plantean amenazas potenciales significativas para los sistemas, los datos o los usuarios.\u00a0 Analicemos las caracter\u00edsticas del software de alto riesgo:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Vulnerabilidad<\/span><\/b><span data-contrast=\"none\">: el software obsoleto, el que se acerca al final de su vida \u00fatil (EOL) o el que presenta vulnerabilidades de seguridad conocidas son objetivos para los atacantes.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Poco fiable o sin mantenimiento<\/span><\/b><span data-contrast=\"none\">: software con un historial de errores, fallos o falta de actualizaciones, lo que aumenta el riesgo de inestabilidad del sistema y posibles vulnerabilidades de seguridad.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Malas pr\u00e1cticas de codificaci\u00f3n<\/span><\/b><span data-contrast=\"none\">: software desarrollado con malas pr\u00e1cticas de codificaci\u00f3n, lo que lo hace m\u00e1s susceptible de explotaci\u00f3n y fallos de seguridad.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Permisos excesivos<\/span><\/b><span data-contrast=\"none\">: software que exige permisos de acceso excesivos en un sistema, lo que puede conceder un acceso sin restricciones a datos o funcionalidades sensibles.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Fuente no autorizada o desconocida<\/span><\/b><span data-contrast=\"none\">: software descargado de fuentes no fiables o de origen desconocido, que a menudo alberga malware u otros c\u00f3digos maliciosos.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"8\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"6\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Software al final de su vida \u00fatil (EOL)<\/span><\/b><span data-contrast=\"none\">: software que ya no recibe actualizaciones de seguridad ni soporte del proveedor, lo que lo deja vulnerable a amenazas conocidas y emergentes.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-5703dc3 elementor-widget elementor-widget-heading\" data-id=\"5703dc3\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n<div class=\"elementor-widget-container optml-bg-lazyloaded\">\n<h2 class=\"elementor-heading-title elementor-size-default\">\u00bfC\u00f3mo realizar una auditor\u00eda de software de alto riesgo?<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-66c1e67 elementor-widget elementor-widget-text-editor\" data-id=\"66c1e67\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container optml-bg-lazyloaded\">\n<p><span data-contrast=\"none\">La realizaci\u00f3n de una auditor\u00eda de software de alto riesgo implica un enfoque sistem\u00e1tico para identificar y mitigar los riesgos potenciales. Estos son los pasos clave:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h3>1. Preparaci\u00f3n:<\/h3>\n<p><span data-contrast=\"none\">a) Definir el \u00e1mbito de aplicaci\u00f3n: determina qu\u00e9 sistemas y software se incluir\u00e1n en la auditor\u00eda.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:697,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559991&quot;:357}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">b) Recopilar informaci\u00f3n: recopila informaci\u00f3n sobre el software instalado, las licencias y los acuerdos de asistencia de los proveedores.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:697,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559991&quot;:357}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">c) Elaborar una lista de control: crea una lista de control para evaluar diversos factores de riesgo, como la versi\u00f3n del software, el estado del soporte del proveedor y los controles de acceso.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:697,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559991&quot;:357}\">\u00a0<\/span><\/p>\n<h3>2. Ejecuci\u00f3n:<\/h3>\n<p><span data-contrast=\"none\">a) Descubrimiento e inventario: utiliza herramientas para descubrir y listar todo el software instalado en tu red.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:697,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559991&quot;:357}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">b) An\u00e1lisis de vulnerabilidades: ejecuta an\u00e1lisis de vulnerabilidades para identificar debilidades de seguridad conocidas en el software descubierto.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:697,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559991&quot;:357}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">c) Verificaci\u00f3n de licencias: verifica la validez y el cumplimiento de las licencias de software en toda tu organizaci\u00f3n.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:697,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559991&quot;:357}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">d) Revisi\u00f3n de accesos y controles: eval\u00faa los controles de acceso de los usuarios y los privilegios asociados al software de alto riesgo.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:697,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559991&quot;:357}\">\u00a0<\/span><\/p>\n<h3>3. Informes y soluciones:<\/h3>\n<p><span data-contrast=\"none\">a) Conclusiones de los documentos: elabora un informe exhaustivo en el que se describan los software de alto riesgo identificados y los riesgos asociados.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">b) Priorizar la remediaci\u00f3n: en funci\u00f3n de la gravedad del riesgo, prioriza acciones como la actualizaci\u00f3n, sustituci\u00f3n o eliminaci\u00f3n del software de alto riesgo.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">c) Aplicar medidas correctoras: aplica medidas correctoras basadas en la lista de prioridades.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-b25b293 elementor-widget elementor-widget-heading\" data-id=\"b25b293\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n<div class=\"elementor-widget-container optml-bg-lazyloaded\">\n<h2 class=\"elementor-heading-title elementor-size-default\">\u00bfC\u00f3mo puedo saber si tengo instalado alg\u00fan software de alto riesgo?<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-eebca24 elementor-widget elementor-widget-text-editor\" data-id=\"eebca24\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container optml-bg-lazyloaded\">\n<p><span data-contrast=\"none\">He aqu\u00ed un m\u00e9todo paso a paso para identificar el software de alto riesgo en tus dispositivos:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">1. Define los criterios de riesgo: vulnerable, sin parches, no autorizado, no conforme, EOL, etc.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:340,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">2. Elabora una lista de todo el software instalado en cada endpoint, incluido el sistema operativo.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:340,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559991&quot;:357}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">3. Compara cada pieza de software con los criterios de riesgo.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:340,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559991&quot;:357}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">4. Marca como de alto riesgo cada software encontrado que coincida con los criterios de riesgo.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:340,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559991&quot;:357}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Estas tareas pueden realizarse manualmente cuando el n\u00famero de endpoints es bajo; sin embargo, a medida que se ampl\u00eda, el trabajo se vuelve muy dif\u00edcil.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-1ecce15 elementor-widget elementor-widget-heading\" data-id=\"1ecce15\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n<div class=\"elementor-widget-container optml-bg-lazyloaded\">\n<h2 class=\"elementor-heading-title elementor-size-default\">\u00bfC\u00f3mo puede NinjaOne ayudar en el proceso de auditor\u00eda de software de alto riesgo?<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-a29f837 elementor-widget elementor-widget-text-editor\" data-id=\"a29f837\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container optml-bg-lazyloaded\">\n<p><span class=\"TextRun SCXW206419567 BCX0\" lang=\"es\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW206419567 BCX0\" data-ccp-charstyle=\"eop\" data-ccp-charstyle-defn=\"{&quot;ObjectId&quot;:&quot;e997b59c-5ae7-4a8f-a7b8-c7cacebacd81|224&quot;,&quot;ClassId&quot;:1073872969,&quot;Properties&quot;:[469775450,&quot;eop&quot;,201340122,&quot;1&quot;,134233614,&quot;true&quot;,469778129,&quot;eop&quot;,335572020,&quot;1&quot;,469778324,&quot;Default Paragraph Font&quot;]}\">NinjaOne puede ayudar significativamente en la realizaci\u00f3n de auditor\u00edas de software de alto riesgo a trav\u00e9s de varias funcionalidades:<\/span><\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"32\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Inventario de software<\/span><\/b><span data-contrast=\"none\">: identificar y listar manualmente todo el software instalado en numerosos dispositivos puede ser un proceso tedioso y propenso a errores. NinjaOne automatiza esta tarea, proporcionando un inventario completo y preciso de todo el software en los endpoints gestionados, ahorrando tiempo y esfuerzo significativos.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:357,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559991&quot;:357}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"32\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Gesti\u00f3n de parches<\/span><\/b><span data-contrast=\"none\">: NinjaOne simplifica el despliegue de parches, garantizando actualizaciones puntuales para el software identificado como de alto riesgo durante la auditor\u00eda. Este enfoque proactivo ayuda a las organizaciones a abordar r\u00e1pidamente las vulnerabilidades y minimizar la ventana de exposici\u00f3n al riesgo.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:357,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559991&quot;:357}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"32\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Reforzar los endpoints<\/span><\/b><span data-contrast=\"none\">: NinjaOne se integra con el software de seguridad, lo que elimina la necesidad de cambiar entre diferentes herramientas, agilizando el proceso de endurecimiento y protecci\u00f3n de los endpoints.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:357,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559991&quot;:357}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"32\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Informes y an\u00e1lisis<\/span><\/b><span data-contrast=\"none\">:\u00a0 NinjaOne genera informes personalizables que siguen el progreso de la auditor\u00eda e identifican tendencias en el uso del software y los riesgos asociados. Estos informes proporcionan informaci\u00f3n valiosa que puede utilizarse para tomar futuras decisiones en materia de seguridad y asignaci\u00f3n de recursos.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:357,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240,&quot;335559991&quot;:357}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><span data-contrast=\"none\">En esencia, NinjaOne act\u00faa como un eje central, automatizando tareas tediosas, consolidando datos de diversas fuentes y agilizando el proceso general de auditor\u00eda de software de alto riesgo, haci\u00e9ndolo eficiente y eficaz para las organizaciones.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-6e72673 elementor-widget elementor-widget-heading\" data-id=\"6e72673\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n<div class=\"elementor-widget-container optml-bg-lazyloaded\">\n<h2 class=\"elementor-heading-title elementor-size-default\">\u00bfC\u00f3mo puede NinjaOne ayudar a identificar software de alto riesgo?<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-928c58a elementor-widget elementor-widget-text-editor\" data-id=\"928c58a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container optml-bg-lazyloaded\">\n<p><span data-contrast=\"none\">NinjaOne es una herramienta excelente que puede ayudar a identificar el software de alto riesgo.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Puedes personalizar tu lista de dispositivos mostrando el sistema operativo por nombre, n\u00famero de compilaci\u00f3n del sistema operativo e ID de versi\u00f3n del sistema operativo, y luego puedes ordenar la lista por estos campos, de esta manera puedes identificar f\u00e1cilmente los sistemas operativos y elegir los que son objetivos de alto riesgo.\u00a0 Tambi\u00e9n puedes filtrar la lista para que solo aparezcan los sistemas operativos que buscas. <\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Con NinjaOne puedes crear informes personalizados. Es f\u00e1cil crear un informe de inventario de software con todas las aplicaciones en todos los endpoints de una organizaci\u00f3n.\u00a0 Este informe puede exportarse a una hoja de c\u00e1lculo para encontrar m\u00e1s f\u00e1cilmente las aplicaciones de alto riesgo.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Si tienes una lista de nombres de software de alto riesgo identificados, puedes crear un filtro y dejar que NinjaOne busque los endpoints que tengan este software instalado.<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-40f9f09 elementor-widget elementor-widget-heading\" data-id=\"40f9f09\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n<div class=\"elementor-widget-container optml-bg-lazyloaded\">\n<h2 class=\"elementor-heading-title elementor-size-default\">\u00bfCu\u00e1les son las ventajas de utilizar NinjaOne para el proceso de auditor\u00eda de alto riesgo?<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-9b8c81a elementor-widget elementor-widget-text-editor\" data-id=\"9b8c81a\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container optml-bg-lazyloaded\">\n<p><span data-contrast=\"none\">Estas son algunas de las m\u00faltiples ventajas de utilizar NinjaOne para la gesti\u00f3n de software de alto riesgo.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"36\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Inventario centralizado<\/span><\/b><span data-contrast=\"none\">:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:340,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\"><br \/>\n<\/span> Obt\u00e9n una visi\u00f3n completa de todo el software instalado en los endpoints gestionados. Identifica f\u00e1cilmente las aplicaciones de alto riesgo dentro de tu red.<span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:340,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"36\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><b><span data-contrast=\"none\">An\u00e1lisis autom\u00e1tico<\/span><\/b><span data-contrast=\"none\">:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:340,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\"><br \/>\n<\/span>Utiliza criterios predefinidos para detectar autom\u00e1ticamente el software de alto riesgo. Reduce el esfuerzo manual y mejora la precisi\u00f3n de la detecci\u00f3n. Detecta y alerta sobre nuevas instalaciones de software.<span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:340,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"36\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Supervisi\u00f3n en tiempo real:<\/span><\/b>\u00a0Supervisa continuamente las nuevas instalaciones de software y las posibles infracciones. Responde con rapidez para evitar el uso de software de alto riesgo.<span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:340,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"36\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"4\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Minimiza los flujos de trabajo manuales<\/span><\/b><span data-contrast=\"none\">:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:340,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\"><br \/>\n<\/span>Automatiza las tareas rutinarias relacionadas con la gesti\u00f3n de software de alto riesgo. Deja que tu personal de TI se centre en iniciativas m\u00e1s estrat\u00e9gicas.<span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:340,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li data-leveltext=\"\uf0b7\" data-font=\"Symbol\" data-listid=\"36\" data-list-defn-props=\"{&quot;335552541&quot;:1,&quot;335559684&quot;:-2,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\uf0b7&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"5\" data-aria-level=\"1\"><b><span data-contrast=\"none\">Informes automatizados<\/span><\/b><span data-contrast=\"none\">:<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:340,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\"><br \/>\n<\/span>Genera informes para realizar un seguimiento de las tendencias de uso de software de alto riesgo. Identifica los problemas recurrentes y mide la eficacia de tus estrategias de gesti\u00f3n.<span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559685&quot;:340,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"none\">En conclusi\u00f3n, realizar auditor\u00edas de software de alto riesgo es crucial para identificar vulnerabilidades, evaluar el cumplimiento y mitigar riesgos potenciales.<\/span><\/p>\n<p><span data-contrast=\"none\">NinjaOne proporciona un potente conjunto de herramientas para la aplicaci\u00f3n automatizada de parches, la supervisi\u00f3n continua, los informes de inventario y las integraciones con software de seguridad.<\/span><\/p>\n<p><span data-contrast=\"none\">Con NinjaOne, las organizaciones pueden mejorar la eficacia y la eficiencia de sus procesos de auditor\u00eda de software de alto riesgo, mejorando en \u00faltima instancia la seguridad de sus sistemas de software.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559737&quot;:-30,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-f64f878 elementor-widget elementor-widget-heading\" data-id=\"f64f878\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n<div class=\"elementor-widget-container optml-bg-lazyloaded\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Estrategia de descubrimiento del sistema operativo<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-0aa6547 elementor-widget elementor-widget-text-editor\" data-id=\"0aa6547\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container optml-bg-lazyloaded\">\n<p><span data-contrast=\"none\">Los siguientes ejemplos muestran c\u00f3mo listar los diferentes sistemas operativos en tus endpoints.<\/span><\/p>\n<ol>\n<li><span data-contrast=\"none\">Ve al panel Dispositivos; como ver\u00e1s, los sistemas operativos no est\u00e1n incluidos en la lista.<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"43\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">Haz clic en el icono Configuraci\u00f3n de la tabla<\/span><span data-contrast=\"none\">, en Columnas (A\u00f1adir columna a la tabla), y a\u00f1ade los campos Nombre del SO, N\u00famero de compilaci\u00f3n del SO e ID de versi\u00f3n del SO.<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"43\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"none\">En el campo Ordenar por, selecciona Nombre del sistema operativo y, a continuaci\u00f3n, haz clic en Guardar.<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"none\">La lista mostrar\u00e1 los detalles del sistema operativo y podr\u00e1s ver f\u00e1cilmente si hay alguno que es EOL<\/span><\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"size-full wp-image-305018\" src=\"https:\/\/www.ninjaone.com\/wp-content\/uploads\/2024\/07\/A-screenshot-showing-the-device-list.avif\" alt=\"Captura de pantalla de la lista de dispositivos\" width=\"1600\" height=\"783\" srcset=\"https:\/\/www.ninjaone.com\/wp-content\/uploads\/2024\/07\/A-screenshot-showing-the-device-list.avif 1600w, https:\/\/www.ninjaone.com\/wp-content\/uploads\/2024\/07\/A-screenshot-showing-the-device-list-300x147.avif 300w, https:\/\/www.ninjaone.com\/wp-content\/uploads\/2024\/07\/A-screenshot-showing-the-device-list-1024x501.avif 1024w, https:\/\/www.ninjaone.com\/wp-content\/uploads\/2024\/07\/A-screenshot-showing-the-device-list-768x376.avif 768w, https:\/\/www.ninjaone.com\/wp-content\/uploads\/2024\/07\/A-screenshot-showing-the-device-list-1536x752.avif 1536w\" sizes=\"(max-width: 1600px) 100vw, 1600px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><span data-contrast=\"none\">Otra forma de encontrar un sistema operativo EOL es aplicando filtros.\u00a0 Vamos a utilizar este m\u00e9todo para encontrar los endpoints con los SO Windows Server 2012 y Windows 2016 instalados.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"46\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Ve al panel Dispositivos y haz clic en Filtros adicionales. Elige el sistema operativo (con ediciones).<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"46\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Se abre un cuadro de di\u00e1logo; desde ah\u00ed, elige el SO que buscas, en este caso, Windows Server 2012 R2 Datacenter.\u00a0 A continuaci\u00f3n, desde el mismo desplegable, selecciona Windows Server 2016 Datacenter Edition (puedes seguir a\u00f1adiendo seg\u00fan tus preferencias).<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"46\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Haz clic en cualquier lugar fuera del cuadro de di\u00e1logo para cerrarlo. Ahora, la lista solo mostrar\u00e1 los dispositivos que cumplan los SO seleccionados.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><img decoding=\"async\" class=\"aligncenter size-full wp-image-305030\" src=\"https:\/\/www.ninjaone.com\/wp-content\/uploads\/2024\/07\/A-screenshot-showing-devices-that-meet-the-selected-OSs.avif\" alt=\"Una captura de pantalla que muestra los dispositivos que cumplen los SO seleccionados.\" width=\"1115\" height=\"301\" srcset=\"https:\/\/www.ninjaone.com\/wp-content\/uploads\/2024\/07\/A-screenshot-showing-devices-that-meet-the-selected-OSs.avif 1115w, https:\/\/www.ninjaone.com\/wp-content\/uploads\/2024\/07\/A-screenshot-showing-devices-that-meet-the-selected-OSs-300x81.avif 300w, https:\/\/www.ninjaone.com\/wp-content\/uploads\/2024\/07\/A-screenshot-showing-devices-that-meet-the-selected-OSs-1024x276.avif 1024w, https:\/\/www.ninjaone.com\/wp-content\/uploads\/2024\/07\/A-screenshot-showing-devices-that-meet-the-selected-OSs-768x207.avif 768w\" sizes=\"(max-width: 1115px) 100vw, 1115px\" \/><\/p>\n<div class=\"elementor-element elementor-element-ba7a274 elementor-widget elementor-widget-text-editor\" data-id=\"ba7a274\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container optml-bg-lazyloaded\">\n<p><span class=\"TextRun SCXW11908577 BCX0\" lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW11908577 BCX0\" data-ccp-charstyle=\"normaltextrun\" data-ccp-charstyle-defn=\"{&quot;ObjectId&quot;:&quot;76b21c93-0942-49ed-80b6-4a872d660c44|223&quot;,&quot;ClassId&quot;:1073872969,&quot;Properties&quot;:[469775450,&quot;normaltextrun&quot;,201340122,&quot;1&quot;,134233614,&quot;true&quot;,469778129,&quot;normaltextrun&quot;,335572020,&quot;1&quot;,469778324,&quot;Default Paragraph Font&quot;]}\">Nota: Los men\u00fas desplegables se rellenan autom\u00e1ticamente con los nombres de los sistemas operativos y las ediciones presentes en tu tenant.<\/span><\/span><span class=\"EOP SCXW11908577 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559737&quot;:-30,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-3deb4da elementor-widget elementor-widget-heading\" data-id=\"3deb4da\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n<div class=\"elementor-widget-container optml-bg-lazyloaded\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Encontrar una estrategia de software objetivo<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-36226e6 elementor-widget elementor-widget-text-editor\" data-id=\"36226e6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container optml-bg-lazyloaded\">\n<p><span data-contrast=\"none\">A veces, sabes uno o varios nombres de programas y quiere saber d\u00f3nde est\u00e1n instalados.\u00a0 Sigue los siguientes pasos para encontrar los endpoints que tienen un nombre de software instalado.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559737&quot;:-30,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<ol>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"49\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">Ve al panel de dispositivos y haz clic en Filtros adicionales.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559737&quot;:-30,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"49\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">En el men\u00fa desplegable, selecciona Inventario de software y aparecer\u00e1 un cuadro de di\u00e1logo.\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559737&quot;:-30,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"%1.\" data-font=\"Calibri\" data-listid=\"49\" data-list-defn-props=\"{&quot;335552541&quot;:0,&quot;335559684&quot;:-1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"none\">A continuaci\u00f3n, selecciona Todo el tiempo, Contiene, y Cualquiera de los programas.\u00a0 Haz clic en A\u00f1adir y a\u00f1ade el nombre del software. Puedes a\u00f1adir m\u00e1s de uno. Solo se pueden a\u00f1adir los nombres que se encuentran en la lista, pero no te preocupes; la lista es enorme e incluye cualquier software instalado actualmente en los sistemas del entorno.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559737&quot;:-30,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/li>\n<\/ol>\n<p><span data-contrast=\"none\">Despu\u00e9s de a\u00f1adir todos los nombres, haz clic en Cerrar.\u00a0 Aparecer\u00e1 la lista de dispositivos que tengan alguno de los programas a\u00f1adidos.<\/span><\/p>\n<p><span data-contrast=\"none\">Adem\u00e1s, una vez aplicado el filtro anterior, esta lista filtrada se puede guardar como un grupo de dispositivos. Este grupo es din\u00e1mico y siempre que alg\u00fan dispositivo entre (o deje de entrar) dentro de los par\u00e1metros de la condici\u00f3n, la lista se actualizar\u00e1.\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Puedes consultar este grupo en cualquier momento o crear un informe.\u00a0 Este informe puede ejecutarse a petici\u00f3n o a una hora programada.<\/span><span data-contrast=\"auto\">\u00a0<\/span><span data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559737&quot;:-28,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-efa43f6 elementor-widget elementor-widget-heading\" data-id=\"efa43f6\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n<div class=\"elementor-widget-container optml-bg-lazyloaded\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Generar una estrategia de informe de inventario de software<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-172c257 elementor-widget elementor-widget-text-editor\" data-id=\"172c257\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n<div class=\"elementor-widget-container optml-bg-lazyloaded\">\n<p><span class=\"TextRun SCXW129443629 BCX0\" lang=\"es\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW129443629 BCX0\" data-ccp-charstyle=\"normaltextrun\" data-ccp-charstyle-defn=\"{&quot;ObjectId&quot;:&quot;76b21c93-0942-49ed-80b6-4a872d660c44|223&quot;,&quot;ClassId&quot;:1073872969,&quot;Properties&quot;:[469775450,&quot;normaltextrun&quot;,201340122,&quot;1&quot;,134233614,&quot;true&quot;,469778129,&quot;normaltextrun&quot;,335572020,&quot;1&quot;,469778324,&quot;Default Paragraph Font&quot;]}\">Es posible utilizar la herramienta de informes de NinjaOne para generar un informe de software para todos los endpoints.\u00a0 Este informe puede abarcar a todo el grupo, a toda la organizaci\u00f3n o a todo el tenant.\u00a0<\/span><\/span><\/p>\n<p><span class=\"TextRun SCXW129443629 BCX0\" lang=\"es\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW129443629 BCX0\" data-ccp-charstyle=\"normaltextrun\" data-ccp-charstyle-defn=\"{&quot;ObjectId&quot;:&quot;76b21c93-0942-49ed-80b6-4a872d660c44|223&quot;,&quot;ClassId&quot;:1073872969,&quot;Properties&quot;:[469775450,&quot;normaltextrun&quot;,201340122,&quot;1&quot;,134233614,&quot;true&quot;,469778129,&quot;normaltextrun&quot;,335572020,&quot;1&quot;,469778324,&quot;Default Paragraph Font&quot;]}\">Hay un enlace al final de este documento: \u00abM\u00e1s informaci\u00f3n sobre los informes de inventario de software\u00bb.\u00a0 Esta p\u00e1gina\u00a0<\/span><span class=\"NormalTextRun CommentStart SCXW129443629 BCX0\" data-ccp-charstyle=\"normaltextrun\">tiene\u00a0<\/span><span class=\"NormalTextRun SCXW129443629 BCX0\" data-ccp-charstyle=\"normaltextrun\">una\u00a0<\/span><span class=\"NormalTextRun SCXW129443629 BCX0\" data-ccp-charstyle=\"normaltextrun\">explicaci\u00f3n<\/span><span class=\"NormalTextRun SCXW129443629 BCX0\" data-ccp-charstyle=\"normaltextrun\"> sobre c\u00f3mo generar este tipo de informe.<\/span><\/span><span class=\"EOP SCXW129443629 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;201341983&quot;:0,&quot;335559737&quot;:-30,&quot;335559738&quot;:0,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"author":158,"featured_media":0,"parent":607354,"menu_order":4,"template":"","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","_lmt_disableupdate":"no","_lmt_disable":""},"class_list":["post-611233","pseudo_docs","type-pseudo_docs","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.ninjaone.com\/es\/wp-json\/wp\/v2\/pseudo_docs\/611233","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ninjaone.com\/es\/wp-json\/wp\/v2\/pseudo_docs"}],"about":[{"href":"https:\/\/www.ninjaone.com\/es\/wp-json\/wp\/v2\/types\/pseudo_docs"}],"author":[{"embeddable":true,"href":"https:\/\/www.ninjaone.com\/es\/wp-json\/wp\/v2\/users\/158"}],"up":[{"embeddable":true,"href":"https:\/\/www.ninjaone.com\/es\/wp-json\/wp\/v2\/pseudo_docs\/607354"}],"wp:attachment":[{"href":"https:\/\/www.ninjaone.com\/es\/wp-json\/wp\/v2\/media?parent=611233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}