Full Detail Network Assessment Report

The Full Detail Report shows everything that we found during the network assessment process.

As the technician, we will use this as a reference to address specific areas or aspects of the environment whenever needed.

The report is indexed and ranges from tens to a few hundreds of pages long depending on the size of the network assessed.

It’s not meant to be read from cover to cover but meant to serve as a reference when the need arises.

Network Scan Details

Below is a sample of what appears in a Full Detail report. Accounts with red font may be considered as red flags because of questionable behaviors in relation to their login behavior or password status.

Username Display Name Enabled Password Last Set Password Expires Last Login
Active Users
Caetlin Caetlin Kipling enabled 01/12/2022 11:39:27 PM 09/14/2022 09:25:04 AM 02/12/2022 11:39:27 PM
BBriley Balla Briley enabled 04/13/2021 10:52:37 AM 10/23/2022 06:08:21 AM 12/13/2021 10:52:37 AM
MReinald Myrtie Reinald enabled 06/17/2021 08:05:38 PM never 08/17/2021 08:05:38 PM
Inactive Users
Immanuel Immanuel Hartley disabled never never never
EOscar Erika Oscar enabled 04/22/2012 08:47:17 AM 08/09/2022 04:05:45 PM 11/22/2014 08:47:17 AM
LexieK Lexie Kandi disabled 07/28/2013 04:38:03 PM never 02/28/2022 04:38:03 PM

The full report also contains:

  • Service accounts
  • Group name and members
  • Inventory of all computers, their inventory, and relevant security information, DNS entries, inactive ones
  • Server Aging
  • Workstation Aging
  • Routers, switches, My DNS issues
  • Open ports
  • All applications you’re using in all computers
  • Disk space usage
  • Anti-virus and anti-spyware status

Data Points

Discovery Tasks

We may perform the following tasks to get full detail of your system security status:

  • User Analysis – lists the users and their status, lost login/use, and the last password changed, which helps identify potential security risks.
  • Detect Local Mail Servers – detects mail servers in the network
  • Detect Domain Controllers – identifies domain controllers and domain status.
  • FSMO Role Analysis – Enumerates FSMO roles at the site
  • Enumerate Organization Units and Security Groups
  • Detect Time Servers – identify servers in the network
  • Network Servers – detect network shares by server
  • Detect Major Applications – detect all major apps/versions and counts the number of installations
  • Detailed Domain Controller Event Log Analysis – lists the event log entries for the past 24 hours for the directory service, DNS server, and file replication service logs.
  • SQL Server Analysis – Lists the SQL Servers and associated databases
  • Internet Domain Analysis – Queries company domain via a WHOIS lookup
  • Password Strength Analysis – Uses MBSA to identify computers with weak passwords that may pose a security risk
  • Missing Security Updates – uses MBSA to identify computers with missing security updates
  • System by System Event Log Analysis – discovers the five system and app event log errors for servers
  • External Security Vulnerabilities – Lists the security holes and warnings from External Vulnerability Scan

Assessment Summary

  • Domain – the number of domain controllers and organizational units
  • Users – the number of enabled and disabled ones. For those enabled, those that has last logged-in within 30 days and those beyond 30 days.
  • Security Group
  • Computers in Domain
  • Active Computers by OS
  • Miscellaneous – includes MX Records, Printers, Exchange Servers, Network Shares, Potential or Severe Security Risks, Potential Unsecure Listening Ports, High-Risk and Medium-Risk External Network Security.

Other Data Points

  • Domain Status – which includes users, service accounts, computers in domain, server aging, workstation aging, domain DNS.
    • Domain Controllers
    • FSMO Roles
    • Organization Units
    • Group Policy Objects
    • Users – Active and Inactive
  • Servers – MySQL, Web, Time Servers, Exchange Servers, DHCP, HyperV Servers.

Source: https://dashboard.technologymarketingtoolkit.com/content/317741/?RURI=%2Fsearch%2F%3Fa%3Ds%26ns%3D22894%26at%3D%26k%3Dnetwork%2Bsupport%26sb%3Dud

Picture of by Wayne Roye

by Wayne Roye

Microsoft Strategic Consultant

Book an Appointment