Network Detective. Network Assessment Module Using the New Network Detective User Interface Quick Start Guide



Similar documents
Network Detective. Security Assessment Module Using the New Network Detective User Interface Quick Start Guide

Network Detective. Using the New Network Detective User Interface Quick Start Guide RapidFire Tools, Inc. All rights reserved.

Network Detective. PCI Compliance Module Using the PCI Module Without Inspector RapidFire Tools, Inc. All rights reserved.

Paranet Solutions Network Discovery Client. Paranet Professional Services

Network Detective. HIPAA Compliance Module RapidFire Tools, Inc. All rights reserved V

Network Detective. User Guide. Copyright 2015 RapidFire Tools, inc. All Rights Reserved

Pearl Echo Installation Checklist

Server Manager Performance Monitor. Server Manager Diagnostics Page. . Information. . Audit Success. . Audit Failure

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

Freshservice Discovery Probe User Guide

Advanced Event Viewer Manual

support HP MFP Scan Setup Wizard 1.1

Installing S500 Power Monitor Software and LabVIEW Run-time Engine

Enterprise Manager. Version 6.2. Installation Guide

Table of Contents. Introduction...9. Installation Program Tour The Program Components...10 Main Program Features...11

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

Upgrading Client Security and Policy Manager in 4 easy steps

EIOBoard Intranet Installer Guide

RMM/MDM. Quick Reference Guide

Paragon Protect & Restore

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and October 2013

Wharf T&T Cloud Backup Service User & Installation Guide

AdminToys Suite. Installation & Setup Guide

NETWRIX WINDOWS SERVER CHANGE REPORTER

Click to Continue 9/3/2013

Option 1 Using the Undelete PushInstall Wizard.

Deploying BitDefender Client Security and BitDefender Windows Server Solutions

SMART Vantage. Installation guide

Installing Windows XP Professional

Web based training for field technicians can be arranged by calling These Documents are required for a successful install:

MAPILab Reports for Hardware and Software Inventory Installation Guide. Document version 1.0

Universal Management Service 2015

InventoryControl for use with QuoteWerks Quick Start Guide

Team Foundation Server 2012 Installation Guide

How To Install An Aneka Cloud On A Windows 7 Computer (For Free)

Installing The SysAidTM Server Locally

GUARD1 PLUS SE Administrator's Manual

Pcounter Web Report 3.x Installation Guide - v Pcounter Web Report Installation Guide Version 3.4

Creating client-server setup with multiple clients

Analyzer 2.0. Installation Guide. Contents

PrintFleet Local Beacon

Global VPN Client Getting Started Guide

NSi Mobile Installation Guide. Version 6.2

Core Protection for Virtual Machines 1

A+ Guide to Software: Managing, Maintaining, and Troubleshooting, 5e. Chapter 3 Installing Windows

Networking Best Practices Guide. Version 6.5

Comodo Endpoint Security Manager SME Software Version 2.1

Storage Sync for Hyper-V. Installation Guide for Microsoft Hyper-V

Installation and Deployment

Customer Tips. Xerox Network Scanning TWAIN Configuration for the WorkCentre 7328/7335/7345. for the user. Purpose. Background

User Guide. Version 3.2. Copyright Snow Software AB. All rights reserved.

Employee Active Directory Self-Service Quick Setup Guide

Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.

MS Lync/OCS CallRex Installation Guide

How to add your Weebly website to a TotalCloud hosted Server

Idera SQL Diagnostic Manager Management Pack Guide for System Center Operations Manager. Install Guide. Idera Inc., Published: April 2013

NetIQ. How to guides: AppManager v7.04 Initial Setup for a trial. Haf Saba Attachmate NetIQ. Prepared by. Haf Saba. Senior Technical Consultant

VERITAS Backup Exec TM 10.0 for Windows Servers

BUILDER 3.0 Installation Guide with Microsoft SQL Server 2005 Express Edition January 2008

Quick Start Guide for VMware and Windows 7

webkpi SaaS ETL Connector Installation & Configuration Guide

Table of Contents WELCOME TO ADAUDIT PLUS Release Notes... 4 Contact ZOHO Corp... 5 ADAUDIT PLUS TERMINOLOGIES... 7 GETTING STARTED...

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

PLEASE NOTE: The client data used in these manuals is purely fictional.

Interworks. Interworks Cloud Platform Installation Guide

Orientation Course - Lab Manual

Metalogix Replicator. Quick Start Guide. Publication Date: May 14, 2015

Guide to Installing BBL Crystal MIND on Windows 7

NovaBACKUP xsp Version 15.0 Upgrade Guide

DataCove. Installation Instructions for Search Plug-in for Microsoft Outlook 2007 & 2010 (All Users)

ILTA HANDS ON Securing Windows 7

Installing VinNOW Client Computers

Users Guide. SelenioFlex File. Version

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

VeriCentre 3.0 Upgrade Pre-Installation and Post Installation Guidelines

Important. Please read this User s Manual carefully to familiarize yourself with safe and effective usage.

Get Success in Passing Your Certification Exam at first attempt!

AT&T Global Network Client Client Features Guide. Version 9.6

Nagios XI Monitoring Windows Using WMI

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

Imaging Computing Server User Guide

Migrating MSDE to Microsoft SQL 2008 R2 Express

OneStop Reporting 3.7 Installation Guide. Updated:

QUANTIFY INSTALLATION GUIDE

Time Machine How-To Guide

Legal Notes. Regarding Trademarks KYOCERA Document Solutions Inc.

Global Image Management System For epad-vision. User Manual Version 1.10

XConsole GUI setup communication manual September 2010.

FileMaker Pro and Microsoft Office Integration

enicq 5 System Administrator s Guide

Sage Peachtree Installation Instructions

Virtual CD v10. Network Management Server Manual. H+H Software GmbH

Barracuda Message Archiver Vx Deployment. Whitepaper

Setup and Configuration Guide for Pathways Mobile Estimating

Short Manual Intellect v SP2 module Unipos Contents:

SyncLockStatus Evaluator s Guide

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V

NETWRIX EVENT LOG MANAGER

How to install/upgrade the LANDesk virtual Cloud service appliance (CSA)

Server Installation, Administration and Integration Guide

Transcription:

Network Detective Network Assessment Module Using the New Network Detective User Interface Quick Start Guide 2015 RapidFire Tools, Inc. All rights reserved. V20151228 Ver 3N

Overview The Network Detective Network Assessment Module is composed of the Network Detective Application, the Network Detective Data Collector which used to perform network scans as well as local computer scans, the Push Deploy Tool which is used to set-up and execute local computer scans from a centralized location on the network, and the Computer Data Collector which is run on individual computers (workstations or servers) to collect information for each system. Network Detective is quick and easy to use; there are just four basic steps: 1. Run the Network Detective Desktop Software to Create Site Files to Manage Your Assessments - Site files can be created to manage assessments for specific customer accounts, remote office locations, data centers, departments, organizational units, or any structure that is applicable the environment on which you are performing a network assessment. 2. Start a New Network Assessment Once the Site is created, you start a New Assessment and perform the network assessment s data collection process as detailed in the assessment process Checklist that you can view in the Assessment Window. After each scan type is complete, run the Network Detective Desktop Software tool go to your Active Assessment, and import the scan files generated in step 3 into the assessment. 3. Perform Data Collection - Run scans as required for the selected Assessment process. If possible, run Network Scans from the Primary Domain Controller on the network. The output of the scan will be a.zip file containing module specific scan files (.ndf,.cdf,.sdf). Be sure that you document the name of the folder used to store scan data results files for later importing into your assessment. 4. Run Network Assessment Reports - Customize the report by setting up your company s branding of the report to be generated with your logos and client information, and run the reports. The Network Detective Report Wizard will step you through this process. 1

Step 1 - Network Assessment Project Initial Set-up A. Go to www.rapidfiretools.com/nd to download and install the Network Detective application. Then run Network Detective and login with your credentials. B. Create a Site in Network Detective. Step 2 Start an Active Network Assessment A. From within the Site Window, select the Start button that is located on the far right side of the window to start the Assessment. Next, select one of the Network Assessment options presented. Select either the Network Assessment Domain or Workgroup option depending on the type of network you are assessing. Then follow the prompts presented in the Network Detective Wizard to start the new Assessment. 2

B. Once the new Network Assessment is started, a Checklist is displayed in the Assessment Window presenting the Required and Optional steps that are to be performed during the assessment process. Below is the Checklist for a Network Assessment. C. Complete the required Checklist Items and use the Refresh Checklist feature to guide you through the assessment process at each step until completion. You may also print a copy of the Checklist for reference purposes by using the Printed Checklist feature. Step 3 Data Collection A. On the target network, login to the Domain Controller with Administrator privileges. B. Download the latest Network Detective Data Collector program from www.rapidfiretools.com/ndand save to either your client s Domain Controller or a USB drive This download is a self-extracting zip file and does not require installation when run on client systems. Note: You may extract the Data Collector files to a folder on either the Domain Controller or the USB drive. Then you can run "RunNetworkDetective.exe" to launch the GUI. Before using a USB drive in the data collection process, please refer to Appendix I Using a USB Drive found on page 9. 3

C. Right-click on the downloaded file and run-as administrator to ensure you are running with elevated credentials. (This is a self-extracting zip file and is completely non-invasive it is not installed on the domain controller or any other machine on the client s network.) Best Practices: The Data Collector makes use of multiple technologies/approaches for collecting information on the client network, including Remote Registry and Remote WMI to gather system information (CPU, Memory, Disk space, etc.) and installed applications. Enable Windows Firewall: Allow remote administration exception in Group Policy. Add/Define Windows Firewall: Define Port Exceptions enabled:remote Registry for IP range in Group Policy. (While enabling remote protocols is optional and not always possible, this will provide network access to each of the machines so that the data collector can gather data from the individual systems. Even without this, Network Detective can provide useful information on the systems from Active Directory and the port scans.) D. Next, after starting the Data Collector select the Network Data Collector option and follow the wizard-driven prompts. E. After the Network Data Collector Network Scan is complete, either save the scan results file to a USB drive for later importing of the results into the assessment or email the file for later access. Make sure the USB has sufficient free space to extract and save the Data Collector files and to store the scan results data files. F. Importing the Network Scan file into your Assessment From within the Scans section of the Assessment Window, select the Import Scan File button G. Next, browse the folder storing the Network Scan results data file generated by the Network Data Collector either stored on a USB drive or in another location on your computer. Select the file, and then Open the file to import the scan results into your assessment. Upon completing the Import of the Network Scan data, review the Checklist in the Assessment Window and then proceed to the next step below. H. Next, to perform the Local Computer Scans of computers on the network, download and install the Push Deploy Tool on your USB drive from www.rapidfiretools.com/nd. 4

I. Then initiate the Local Computer Scan with the Push Deploy Tool by selecting the Computer Data.CDF scan option selected and then run the scan. J. Next Import the scan results produced by the Push Deploy Tool into your assessment. Note: For the Push Deploy Tool to push the local scans to computers throughout the network to perform local computer scans, you need to ensure that the Windows Management Instrumentation (WMI) service is running and able to be managed remotely on the computers that you wish to scan. Sometimes Windows Firewall blocks Remote Management of WMI, so this service may need to be allowed to operate through the Firewall. Push/Deploy also relies on using the Admin$ share to copy and run the data collector locally. Admin$ must be present on the computers you wish to scan, and be accessible with the login credentials you provide for the scan. For Workgroup based networks, the Administrator credentials for all workstations and servers that are to be scanned are recommended to be the same. If the Workgroup based network does not have a consistent set of Administrator credentials for all machines to be scanned, then proceed to the next step of using the Computer Data Collector to perform local computer scans on each computer, one at a time. Or, you can also run the Push Deploy Tool on the Workgroup network multiple times using each set of Administrator credentials. Tip!: Create a shared network folder to centralize and store all Local Computer scan results data files created by the scans performed by the Push Deploy Tool. Then reference this folder in the Storage Folder field to enable the local computer scan data files to be stored in this central location. K. For computers that were unreachable during the Local Scans run using the Push Deploy Tool, you will need to download and run the Computer Data Collector from the www.rapidfiretools.com/nd website to a folder on a local computer or a USB drive. The Computer Data Collector is a self-extracting.zip file named NetworkDetectiveComputerDataCollector.exe. Once this file is downloaded into a folder, right click on the file and run the file as an Administrator. 5

The Computer Data Collector is a windows application that is run on individual computers (workstations or servers) to collect information for each system. Use this if/when WMI and other network protocols are blocked from working over the network from the Network Data Collector scan, or when scanning non-domain networks. When you run the Computer Data Collector you will see the above window present on the computer you are scanning. Once a Computer Data Collector scan is performed, the scan results files will be.cdf file stored in the folder where the Computer Data Collector was executed from. Copy and save the scan results file to a USB drive for later importing of the results of each computer scan performed into your network assessment (OPTIONAL). L. Once all of the scan data is imported into the Assessment, the assessment s Checklist will indicate that the Reports are ready to be generated. Step 4 Generating Reports NOTE: This step is NOT performed at the client site or network. Network Detective should be installed on your workstations or laptop. Install Network Detective from www.rapidfiretools.com/download if you have not already done so. A. Run Network Detective and login with your credentials. B. Then select the Site, go to the Active Assessment, and then select the Reports link to the center of the Assessment Window in order select the reports you want to generate. 6

C. Then select which of the Network Assessment reports that you want to generate. D. Select the Create Reports button and follow the prompts to generate the reports you selected. At the end of the report generation process, the generated reports will be made available for you to open and review. The Network Assessment module can generate the following reports: Client Risk Report - This is the "money" report for you. The report presents your client with a summary of their overall risk score based on your scan, along with simple charts to show the problem areas. Each problem area represents an opportunity for you to present a proposed solution and pitch your services. The purpose of this report is for you to use as a "discussion document" to aid you in having a conversation with your customer about the specific risk areas you found, what they mean, and how you can help. Keep the Full Network Assessment in your hip pocket, and pull it out when your prospective new client asks how you came up with your findings! Network Management Plan - This report will help prioritize issues based on the issue's risk score. A listing of all affected computers, users, or sub-systems are provided along with recommended actions. Site Diagram - Once you sign up for Network Detective and run a scan, you'll have the option to generate a site diagram which breaks down and categorizes all of the assets available on the network. The schematic shows the basic network structure, with convenient drill downs into each group of like workstations. Each device is annotated with important identifying configuration information and is color-coded based on its status. Sales line, doesn t need to be in guide Asset Detail Report - For each network scan, this report provides detailed information on each of the individual assets discovered by Network Detective. The report is ideal for cataloging and documenting the complete settings and configurations for individual workstations and servers. Network Assessment Change Report - Everyone knows that a computer network is a dynamic environment and as such is constantly changing. And a Network Assessment is only a snapshot of the network status at the time the assessment is run. That's why we include a valuable Network Assessment Comparison Report. Every time you run an assessment on a given network, the software generates a unique encrypted data file containing all the findings. Network Detective allows you to generate a report that compares the results of any two network scans, and highlights everything that has changed. Excel Analysis Export/Report - We also give you the ability to output all of the assets and configurations uncovered by our scan, and export it into an Excel file format. Once in Excel, you'll be able to take the data and import it into your favorite Service Desk or PSA system, or simply create your own custom sorts, analyses, reports and graphs inside of Excel. Add columns of new data such as location info, emergency phone numbers, and customer instructions to make this report even more valuable. 7

Quarterly Business Review Report - This report compares one time period to a previous one forming the basis for a Quarterly Business Review meeting. It centers on changes rather than detailed data and shows overall trending. Use this report to encourage "face-to-face" meetings and improve stickiness with your customers. Response Report - Response Reports can be generated from any InForm form. These reports allow you to present data entered into InForm from the pre-built forms or from your own forms. IT SWOT Analysis - Embellish your IT assessments with site photos, policies, and additional information you collect from client interviews & on-site inspections. The Network Detective In-Form tool is included with all Module subscriptions. Use it to create IT check-lists, questionnaires, and IT SWOT Analyses. XP Migration Readiness Report - This special report is designed to identify computers at client and prospect sites that are still running Microsoft XP, and help you determine whether the computers can be upgraded to Windows 8.1 as is, require upgrades, or must be replaced. A Readiness Summary shows a count of the number of computers discovered, how many are running XP, and which ones are very good or excellent candidates for upgrade. The report includes key upgrade details such as CPU Processor speed, amount of RAM, OS Drive space availability, Video Adapter and more. The report also lists the non-windows applications and drivers that should be investigated for Windows 8.1 compatibility. 8

Appendix I Using a USB drive It is often handy to use a USB drive so that you are not downloading anything onto the client or prospect machine. And it is extremely useful when using the Local Data Collector. To setup the USB drive, simply download and run NetworkDetectiveDataCollector.exe, and unzip it directly to the USB drive (uncheck When done unzipping ). To run a scan from the USB, run any of: RunNetworkDetective.exe runs the interactive Data Collector. This is the same as downloading and unzipping/running the Data Collector from the download site. runlocal.bat runs the Data Collector to perform a Local Data Collection, and will pop up a dialog with the folder containing the CDF file once complete. Note that the CDF file output is stored on the root of USB and in the CDF folder that will be created. This way all CDFs from multiple machines are in one folder. runlocalsilent.bat runs the Data Collector to perform a Local Data Collection, but does not pop open a dialog box. Note that the CDF file output is stored on the root of USB and in the CDF folder that will be created. This way all CDFs from multiple machines are in one folder. 9