Your browser does not allow storing cookies. We recommend enabling them.
On Windows, the SSH Tectia Server installation creates the following registry keys:
HKCU\SOFTWARE\SSH Communications Security\SSH Tectia\KeyPaths
HKLM\SOFTWARE\SSH Communications Security\SSH Tectia Server
HKLM\SOFTWARE\Wow6432Node\SSH Communications Security\SSH Tectia (on x64 architecture, only)
HKLM\SOFTWARE\Wow6432Node\SSH Communications Security\SSH Tectia Server (on x64 architecture, only)
HKLM\SYSTEM\CurrentControlSet\Services\EventLog\Application\SSH Tectia SFT Server
HKLM\SYSTEM\CurrentControlSet\Services\EventLog\Application\SSH Tectia Server
Reduce Secure Shell risk. Get to know the NIST 7966.
The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
ISACA Practitioner Guide for SSH
With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.