The Full Detail Report shows everything that we found during the network assessment process.
As the technician, we will use this as a reference to address specific areas or aspects of the environment whenever needed.
The report is indexed and ranges from tens to a few hundreds of pages long depending on the size of the network assessed.
It’s not meant to be read from cover to cover but meant to serve as a reference when the need arises.
Below is a sample of what appears in a Full Detail report. Accounts with red font may be considered as red flags because of questionable behaviors in relation to their login behavior or password status.
Username | Display Name | Enabled | Password Last Set | Password Expires | Last Login |
---|---|---|---|---|---|
Active Users | |||||
Caetlin | Caetlin Kipling | enabled | 01/12/2022 11:39:27 PM | 09/14/2022 09:25:04 AM | 02/12/2022 11:39:27 PM |
BBriley | Balla Briley | enabled | 04/13/2021 10:52:37 AM | 10/23/2022 06:08:21 AM | 12/13/2021 10:52:37 AM |
MReinald | Myrtie Reinald | enabled | 06/17/2021 08:05:38 PM | never | 08/17/2021 08:05:38 PM |
Inactive Users | |||||
Immanuel | Immanuel Hartley | disabled | never | never | never |
EOscar | Erika Oscar | enabled | 04/22/2012 08:47:17 AM | 08/09/2022 04:05:45 PM | 11/22/2014 08:47:17 AM |
LexieK | Lexie Kandi | disabled | 07/28/2013 04:38:03 PM | never | 02/28/2022 04:38:03 PM |
The full report also contains:
- Service accounts
- Group name and members
- Inventory of all computers, their inventory, and relevant security information, DNS entries, inactive ones
- Server Aging
- Workstation Aging
- Routers, switches, My DNS issues
- Open ports
- All applications you’re using in all computers
- Disk space usage
- Anti-virus and anti-spyware status
Data Points
Discovery Tasks
We may perform the following tasks to get full detail of your system security status:
- User Analysis – lists the users and their status, lost login/use, and the last password changed, which helps identify potential security risks.
- Detect Local Mail Servers – detects mail servers in the network
- Detect Domain Controllers – identifies domain controllers and domain status.
- FSMO Role Analysis – Enumerates FSMO roles at the site
- Enumerate Organization Units and Security Groups
- Detect Time Servers – identify servers in the network
- Network Servers – detect network shares by server
- Detect Major Applications – detect all major apps/versions and counts the number of installations
- Detailed Domain Controller Event Log Analysis – lists the event log entries for the past 24 hours for the directory service, DNS server, and file replication service logs.
- SQL Server Analysis – Lists the SQL Servers and associated databases
- Internet Domain Analysis – Queries company domain via a WHOIS lookup
- Password Strength Analysis – Uses MBSA to identify computers with weak passwords that may pose a security risk
- Missing Security Updates – uses MBSA to identify computers with missing security updates
- System by System Event Log Analysis – discovers the five system and app event log errors for servers
- External Security Vulnerabilities – Lists the security holes and warnings from External Vulnerability Scan
Assessment Summary
- Domain – the number of domain controllers and organizational units
- Users – the number of enabled and disabled ones. For those enabled, those that has last logged-in within 30 days and those beyond 30 days.
- Security Group
- Computers in Domain
- Active Computers by OS
- Miscellaneous – includes MX Records, Printers, Exchange Servers, Network Shares, Potential or Severe Security Risks, Potential Unsecure Listening Ports, High-Risk and Medium-Risk External Network Security.
Other Data Points
- Domain Status – which includes users, service accounts, computers in domain, server aging, workstation aging, domain DNS.
- Domain Controllers
- FSMO Roles
- Organization Units
- Group Policy Objects
- Users – Active and Inactive
- Servers – MySQL, Web, Time Servers, Exchange Servers, DHCP, HyperV Servers.
Source: https://dashboard.technologymarketingtoolkit.com/content/317741/?RURI=%2Fsearch%2F%3Fa%3Ds%26ns%3D22894%26at%3D%26k%3Dnetwork%2Bsupport%26sb%3Dud