Full Detail Report

Full Detail Report

by Wayne Roye

by Wayne Roye

Outsourced IT Solutions Expert, Computer Engineer | Book a meeting | Get in touch

The Full Detail Report shows everything that we found during the network assessment process.

As the technician, we will use this as a reference to address specific areas or aspects of the environment whenever needed.

The report is indexed and ranges from tens to a few hundreds of pages long depending on the size of the network assessed.

It’s not meant to be read from cover to cover but meant to serve as a reference when the need arises.

Network Scan Details

Below is a sample of what appears in a Full Detail report. Accounts with red font may be considered as red flags because of questionable behaviors in relation to their login behavior or password status.

Username Display Name Enabled Password Last Set Password Expires Last Login
Active Users
Caetlin Caetlin Kipling enabled 01/12/2022 11:39:27 PM 09/14/2022 09:25:04 AM 02/12/2022 11:39:27 PM
BBriley Balla Briley enabled 04/13/2021 10:52:37 AM 10/23/2022 06:08:21 AM 12/13/2021 10:52:37 AM
MReinald Myrtie Reinald enabled 06/17/2021 08:05:38 PM never 08/17/2021 08:05:38 PM
Inactive Users
Immanuel Immanuel Hartley disabled never never never
EOscar Erika Oscar enabled 04/22/2012 08:47:17 AM 08/09/2022 04:05:45 PM 11/22/2014 08:47:17 AM
LexieK Lexie Kandi disabled 07/28/2013 04:38:03 PM never 02/28/2022 04:38:03 PM

The full report also contains:

  • Service accounts
  • Group name and members
  • Inventory of all computers, their inventory, and relevant security information, DNS entries, inactive ones
  • Server Aging
  • Workstation Aging
  • Routers, switches, My DNS issues
  • Open ports
  • All applications you’re using in all computers
  • Disk space usage
  • Anti-virus and anti-spyware status

Data Points

Discovery Tasks

We may perform the following tasks to get full detail of your system security status:

  • User Analysis – lists the users and their status, lost login/use, and the last password changed, which helps identify potential security risks.
  • Detect Local Mail Servers – detects mail servers in the network
  • Detect Domain Controllers – identifies domain controllers and domain status.
  • FSMO Role Analysis – Enumerates FSMO roles at the site
  • Enumerate Organization Units and Security Groups
  • Detect Time Servers – identify servers in the network
  • Network Servers – detect network shares by server
  • Detect Major Applications – detect all major apps/versions and counts the number of installations
  • Detailed Domain Controller Event Log Analysis – lists the event log entries for the past 24 hours for the directory service, DNS server, and file replication service logs.
  • SQL Server Analysis – Lists the SQL Servers and associated databases
  • Internet Domain Analysis – Queries company domain via a WHOIS lookup
  • Password Strength Analysis – Uses MBSA to identify computers with weak passwords that may pose a security risk
  • Missing Security Updates – uses MBSA to identify computers with missing security updates
  • System by System Event Log Analysis – discovers the five system and app event log errors for servers
  • External Security Vulnerabilities – Lists the security holes and warnings from External Vulnerability Scan

Assessment Summary

  • Domain – the number of domain controllers and organizational units
  • Users – the number of enabled and disabled ones. For those enabled, those that has last logged-in within 30 days and those beyond 30 days.
  • Security Group
  • Computers in Domain
  • Active Computers by OS
  • Miscellaneous – includes MX Records, Printers, Exchange Servers, Network Shares, Potential or Severe Security Risks, Potential Unsecure Listening Ports, High-Risk and Medium-Risk External Network Security.

Other Data Points

  • Domain Status – which includes users, service accounts, computers in domain, server aging, workstation aging, domain DNS.
    • Domain Controllers
    • FSMO Roles
    • Organization Units
    • Group Policy Objects
    • Users – Active and Inactive
  • Servers – MySQL, Web, Time Servers, Exchange Servers, DHCP, HyperV Servers.

Source: https://dashboard.technologymarketingtoolkit.com/content/317741/?RURI=%2Fsearch%2F%3Fa%3Ds%26ns%3D22894%26at%3D%26k%3Dnetwork%2Bsupport%26sb%3Dud

At Troinet, we offer responsive, on-site or remote outsourced IT support for small businesses in Greater NYC and New Jersey without breaking the bank. Our certified and experienced engineers can help you get back up to speed quickly and ensure that your system is always working flawlessly, no matter what IT-related problem you have.

Our Technology Partners

The strength of quality relationships
Share on reddit
Reddit
Share on twitter
Twitter
Share on linkedin
LinkedIn
Share on facebook
Facebook
Share on email
Email
Talk to an IT Expert

Get Exclusive Discounts

Get 5% discount coupon codes exclusive to email subscribers.