The Full Detail Report shows everything that we found during the network assessment process.
As the technician, we will use this as a reference to address specific areas or aspects of the environment whenever needed.
The report is indexed and ranges from tens to a few hundreds of pages long depending on the size of the network assessed.
It’s not meant to be read from cover to cover but meant to serve as a reference when the need arises.
Below is a sample of what appears in a Full Detail report. Accounts with red font may be considered as red flags because of questionable behaviors in relation to their login behavior or password status.
|Username||Display Name||Enabled||Password Last Set||Password Expires||Last Login|
|Caetlin||Caetlin Kipling||enabled||01/12/2022 11:39:27 PM||09/14/2022 09:25:04 AM||02/12/2022 11:39:27 PM|
|BBriley||Balla Briley||enabled||04/13/2021 10:52:37 AM||10/23/2022 06:08:21 AM||12/13/2021 10:52:37 AM|
|MReinald||Myrtie Reinald||enabled||06/17/2021 08:05:38 PM||never||08/17/2021 08:05:38 PM|
|EOscar||Erika Oscar||enabled||04/22/2012 08:47:17 AM||08/09/2022 04:05:45 PM||11/22/2014 08:47:17 AM|
|LexieK||Lexie Kandi||disabled||07/28/2013 04:38:03 PM||never||02/28/2022 04:38:03 PM|
The full report also contains:
- Service accounts
- Group name and members
- Inventory of all computers, their inventory, and relevant security information, DNS entries, inactive ones
- Server Aging
- Workstation Aging
- Routers, switches, My DNS issues
- Open ports
- All applications you’re using in all computers
- Disk space usage
- Anti-virus and anti-spyware status
We may perform the following tasks to get full detail of your system security status:
- User Analysis – lists the users and their status, lost login/use, and the last password changed, which helps identify potential security risks.
- Detect Local Mail Servers – detects mail servers in the network
- Detect Domain Controllers – identifies domain controllers and domain status.
- FSMO Role Analysis – Enumerates FSMO roles at the site
- Enumerate Organization Units and Security Groups
- Detect Time Servers – identify servers in the network
- Network Servers – detect network shares by server
- Detect Major Applications – detect all major apps/versions and counts the number of installations
- Detailed Domain Controller Event Log Analysis – lists the event log entries for the past 24 hours for the directory service, DNS server, and file replication service logs.
- SQL Server Analysis – Lists the SQL Servers and associated databases
- Internet Domain Analysis – Queries company domain via a WHOIS lookup
- Password Strength Analysis – Uses MBSA to identify computers with weak passwords that may pose a security risk
- Missing Security Updates – uses MBSA to identify computers with missing security updates
- System by System Event Log Analysis – discovers the five system and app event log errors for servers
- External Security Vulnerabilities – Lists the security holes and warnings from External Vulnerability Scan
- Domain – the number of domain controllers and organizational units
- Users – the number of enabled and disabled ones. For those enabled, those that has last logged-in within 30 days and those beyond 30 days.
- Security Group
- Computers in Domain
- Active Computers by OS
- Miscellaneous – includes MX Records, Printers, Exchange Servers, Network Shares, Potential or Severe Security Risks, Potential Unsecure Listening Ports, High-Risk and Medium-Risk External Network Security.
Other Data Points
- Domain Status – which includes users, service accounts, computers in domain, server aging, workstation aging, domain DNS.
- Domain Controllers
- FSMO Roles
- Organization Units
- Group Policy Objects
- Users – Active and Inactive
- Servers – MySQL, Web, Time Servers, Exchange Servers, DHCP, HyperV Servers.