Network Assessment Client Risk Report Demo



Similar documents
Security Assessment Report

Network Assessment. Prepared For: Prospect Or Customer Prepared By: Your Company Name

3. Are employees set as Administrator level on their workstations? a. Yes, if it is necessary for their work. b. Yes. c. No.

Course 6432A: Managing and Maintaining Windows Server 2008 Active Directory Servers

Web App Security Audit Services

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

GFI White Paper PCI-DSS compliance and GFI Software products

Audit Tools That Won t Break the Bank

Directory and File Transfer Services. Chapter 7

The data which you put into our systems is yours, and we believe it should stay that way. We think that means three key things.

AN OVERVIEW OF VULNERABILITY SCANNERS

Detecting rogue systems

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement Exit Conference...

Policy Title: HIPAA Security Awareness and Training

A Practical Guide to Dutch Building Contracts

Symantec Hosted Mail Security Getting Started Guide

Preliminary Course Syllabus

locuz.com Professional Services Security Audit Services

Managing and Maintaining Windows Server 2008 Active Directory Servers

Configuring Security for SMTP Traffic

Understand Troubleshooting Methodology

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation

10 Hidden IT Risks That Might Threaten Your Business

Instructies Tester Update DEHNrecord DRC LC M3

CMSC 421, Operating Systems. Fall Security. URL: Dr. Kalpakis

GiftWrap 4.0 Security FAQ

Network Detective. HIPAA Compliance Module RapidFire Tools, Inc. All rights reserved V

Network and Host-based Vulnerability Assessment

Data Stored on a Windows Computer Connected to a Network

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

TEXAS AGRILIFE SERVER MANAGEMENT PROGRAM

1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained

2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report

Network Detective. Network Detective Inspector RapidFire Tools, Inc. All rights reserved Ver 3D

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

Web security. Live hacking demo. Rick van Tol Arthur Donkers Paul van Maaren Eilko Bos.

Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?

SMART Solutions for Active Directory Migrations

Centralized logging with alerts for Windows

10 Hidden IT Risks That Threaten Your Practice

WordPress Security Scan Configuration

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

An Introduction to Network Vulnerability Testing

10 Hidden IT Risks That Might Threaten Your Law Firm

Data Stored on a Windows Server Connected to a Network

Introduction to Laboratory Assignment 3 Vulnerability scanning with OpenVAS

Nipper Studio Beginner s Guide

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Using Internet or Windows Explorer to Upload Your Site

Windows Operating Systems. Basic Security

FormFire Application and IT Security. White Paper

External Penetration Assessment and Database Access Review

GMP-Z Annex 15: Kwalificatie en validatie

CDM Hardware Asset Management (HWAM) Capability

Privacy + Security + Integrity

Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure

The safer, easier way to help you pass any IT exams. Exam : Designing and Implementing a Server Infrastructure.

Security Maintenance Practices. IT 4823 Information Security Administration. Patches, Fixes, and Revisions. Hardening Operating Systems

COMPREHENSIVE SECURITY AUDIT COMMERCIAL TAXES DEPARTMENT, KARNATAKA. Ashish Kirtikar

Intro to Firewalls. Summary

Microsoft Baseline Security Analyzer

4. Getting started: Performing an audit

Making, Moving and Shaking a Community of Young Global Citizens Resultaten Nulmeting GET IT DONE

Vulnerability Audit: Why a Vulnerability Scan Isn t Enough. White Paper

WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning

Protecting the Infrastructure: Symantec Web Gateway

Release Notes for Websense Security v7.2

Norman Protection

Installation and Configuration Guide

Best Practices for PCI DSS V3.0 Network Security Compliance

Keeping Tabs on the Top 5 Critical Changes in Active Directory with Netwrix Auditor

Network & Information Security Policy

Banking Security using Honeypot

System Management. What are my options for deploying System Management on remote computers?

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Best Practices For Department Server and Enterprise System Checklist

Statement of Policy. Reason for Policy

EXAM Designing and Implementing a Server Infrastructure. Buy Full Product.

Transcription:

Network Assessment Client Risk Report Demo Prepared by: Henry Knoop Opmerking: Alle informatie in dit rapport is uitsluitend bestemd voor gebruik bij bovenvermelde client. Het kan vertrouwelijke en persoonlijke informatie bevatten en dienst als dusdanig behandeld te worden. Niets uit deze rapportage mag op enigerlij wijze openbaar, gekopieerd of verspreid worden, anders dan door bovenvermelde client. Andere personen is he niet toegestaan deze rapportages te lezen.

Discovery Tasks The following discovery tasks were performed: TASK DESCRIPTION Detect Domain Controllers Identifies Domain Controllers and Online status. FSMO Role Analysis Enumerates FSMO roles at the site. Enumerate Organization Units and Security Groups Lists the Organizational units and Security Groups with members. User Analysis List of users in AD, status, and last login/use. Helps identify potential security risks. Detect Local Mail Servers Mail server(s) found on the network. Detect Time Servers Time server(s) found on the network. Discover Network Shares Comprehensive list of Network Shares by Server. Detect Major Applications Major apps / versions and count of installations. Web Server Discovery and Identification List of web servers and type. System by System Event Log Analysis Last 5 System and App Event Log errors for servers. Detailed Domain Controller Event Log Analysis List of event log entries from the past 24 hours for the Directory Service, DNS Server and File Replication Service event logs. Network Discovery for Non-A/D Devices List of non AD devices responding to network requests. SQL Server Analysis List of SQL Servers and associated database(s). Internet Domain Analysis Whois check for company domain(s). Password Strength Analysis Uses MBSA to identify computers with weak passwords that may pose a security risk. Missing Security Updates Uses MBSA to identify computers missing security updates. Internet Access and Speed Test Test of internet access and performance. External Security Vulnerabilities List of Security Holes and Warnings from External Vulnerability Scan. Risk Score The Risk Score is a value from 1 to 10, where 10 represents significant risk and potential issues. Several critical issues were detected and should be investigated and corrected immediately. Review the summary issues on the following page and the full report for details. Persoonlijk en vertrouwelijk PAGE 2 of 7

Issues Summary This section contains summary of issues detected during the Network Assessment. It is based on general best practices and may indicate existing issues or points of interest. Inactive Users We discovered 10 active users that have not logged in within the past 30 days. These accounts most likely need to be disabled or removed if the users are no longer active. Active accounts that are not in use may pose a security risk and should be addressed with a User Audit. Inactive Computers We discovered a total of 16 computers of which only 5 have registered with the domain controller in the past 30 days. There are 11 computers entries that may no longer be relevant. While not inherently harmful, the defunct systems should be removed from Active Directory routinely. Organizational Units We discovered 5 populated Organizational Units. You should review the details of the Organization Units to ensure they align with your business and operational needs. Proper alignment is crucial to ensuring security and access policies are adhered to properly. Domain Controllers With only 1 online Domain Controller, there is a high risk of significant outage due to a lack of redundancy. Password Strength Risks Passwords on 0 computers were found to be Potential Risks. 2 computers were found to have Severe Risks. These are systems where passwords are extremely weak or not set and should be rectified to prevent unauthorized access or the potential spread of viruses and worms. Insecure Listening Ports 16 computers were detected as using potentially insecure protocols. There may be a legitimate need to use these protocols, but risks should be assessed to prevent unauthorized access. External Security Vulnerabilities A scan of external vulnerabilities found 0 security holes and 2 security warnings. Security holes pose a major threat to business continuity and should be addressed immediately. Security warnings should be evaluated by a security professional to determine the actual risk and if remediation is necessary. Persoonlijk en vertrouwelijk PAGE 3 of 7

Internet Speed Test Results Download Speed: 5,83 Mb/s Upload Speed: 2,69 Mb/s Asset Summary Persoonlijk en vertrouwelijk PAGE 4 of 7

Persoonlijk en vertrouwelijk PAGE 5 of 7

Persoonlijk en vertrouwelijk PAGE 6 of 7

Persoonlijk en vertrouwelijk PAGE 7 of 7