Network Assessment Sample-1
Network Assessment Sample-1
Assessment
Report
CONFIDENTIALITY
NOTE:
The
information
contained
in
this
report
document
is
for
the
Prepared
for:
exclusive
use
of
the
client
specified
above
and
may
contain
confidential,
privileged
and
non-‐disclosable
information.
If
the
recipient
of
this
report
is
not
the
client
or
Our
New
Customer
addressee,
such
recipient
is
strictly
prohibited
from
reading,
photocopying,
distributing
or
otherwise
using
this
report
or
its
contents
in
any
way.
Prepared
by:
Scan
Date:
9/21/2015
MTG,
Inc.
9/21/2015
Risk
Report
NETWORK
ASSESSMENT
Discovery
Tasks
The
following
discovery
tasks
were
performed:
ü
Detect
Domain
Controllers
Identifies
Domain
Controllers
and
Online
status
ü
FSMO
Role
Analysis
Enumerates
FSMO
roles
at
the
site
ü
Enumerate
Organization
Units
and
Lists
the
Organizational
units
and
Security
Groups
with
members
Security
Groups
ü
User
Analysis
List
of
users
in
AD,
status,
and
last
login/use,
which
helps
identify
potential
security
risks
ü
Detect
Local
Mail
Servers
Mail
server(s)
found
on
the
network
ü
Detect
Time
Servers
Time
server(s)
found
on
the
network
ü
Discover
Network
Shares
Comprehensive
list
of
Network
Shares
by
Server
ü
Detect
Major
Applications
Major
apps
/
versions
and
count
of
installations
ü
Detailed
Domain
Controller
Event
Log
List
of
event
log
entries
from
the
past
24
hours
for
the
Directory
Analysis
Service,
DNS
Server
and
File
Replication
Service
event
logs
ü
Web
Server
Discovery
and
List
of
web
servers
and
type
Identification
ü
Network
Discovery
for
Non-‐A/D
List
of
Non-‐Active
Directory
devices
responding
to
network
requests
Devices
ü
Internet
Access
and
Speed
Test
Test
of
internet
access
and
performance
ü
SQL
Server
Analysis
List
of
SQL
Servers
and
associated
database(s)
ü
Internet
Domain
Analysis
“WHOIS”
check
for
company
domain(s)
ü
Password
Strength
Analysis
Uses
MBSA
to
identify
computers
with
weak
passwords
that
may
pose
a
security
risk
ü
Missing
Security
Updates
Uses
MBSA
to
identify
computers
missing
security
updates
ü
System
by
System
Event
Log
Analysis
Last
5
System
and
App
Event
Log
errors
for
servers
ü
External
Security
Vulnerabilities
List
of
Security
Holes
and
Warnings
from
External
Vulnerability
Scan
Risk
Score
The
Risk
Score
is
a
value
from
1
to
100,
where
100
represents
significant
risk
and
potential
issues.
Several
critical
issues
were
identified.
Identified
issues
should
be
investigated
and
addressed
according
to
the
Management
Plan.
Potential
Password
Strength
Risks
(100
pts)
Issue:
Local
account
passwords
on
2
were
found
to
be
potentially
weak.
Inadequate
or
weak
passwords
on
local
accounts
can
allow
a
hacker
to
compromise
the
system.
It
can
also
lead
to
the
spread
of
malicious
software
that
can
cause
business
and
productivity
affecting
issues.
Recommendation:
We
recommend
placing
adequate
password
strength
requirements
in
place
and
remediate
the
immediate
password
issues
on
the
identified
systems.
Unsupported
Operating
Systems
(97
pts)
Issue:
30
computers
were
found
using
an
operating
system
that
is
no
longer
supported.
Unsupported
operating
systems
no
longer
receive
vital
security
patches
and
present
an
inherent
risk.
Recommendation:
Upgrade
or
replace
computers
with
operating
systems
that
are
no
longer
supported.
Anti-‐spyware
not
installed
(94
pts)
Issue:
Anti-‐virus
software
was
not
detected
on
some
computers.
Without
adequate
anti-‐virus
and
anti-‐spyware
protection
on
all
workstations
and
servers,
the
risk
of
acquiring
malicious
software
is
significant.
Recommendation:
To
prevent
both
security
and
productivity
issues,
we
strongly
recommend
assuring
anti-‐spyware
is
deployed
to
all
possible
endpoints.
Asset
Summary:
Discovered
Assets
Workstation
Aging