Some of the checks performed by the tool include analysis of changed or newly added files, registry keys, services, ActiveX Controls, listening ports, access control lists, and other parameters that affect a computer's attack surface, blogged David Ladd, principal security program manager for secure development at Microsoft.