..but, perhaps more important, by performing assessments on a regular basis, you enable yourself to have a more secure and reliable infrastructure,
and help you avoid hefty compliance fines. These regular IT audits provide you and EC to be pro-active in managing and maintaining the infrastructure and strategic IT assets.
Unfortunately, most businesses don’t perform assessments frequently enough. The typical reasons are:
The good news is that EC Computers have invested in enabling technologies that make regular and ongoing IT assessments feasible from a resource and cost perspective.
While the benefits of IT assessments are plentiful, not all businesses will require the same level of review and scrutiny. Here at EC Computers we will discuss the best option for your business and infrastucture, and select from our three tiers of service that should allow us to match the level required. The Assesmants are recommended as below:
Establish a baseline assessment. Refresh the baseline on annual basis.
Provides network documentation. Enhanced security from identifying internal network vulnerabilities.
Scans and Reports provided
Update Show progress in issue remediation with Baseline reports. Show new issues and re-prioritize with change reports. Identify significant network changes that may affect monitoring and management Baseline Management Plan Risk Reports (Change) Management Plans (Change) Full Detail Change Report External Vulnerability Summary
Interactive review of significant changes in a digestible fashion.
Detect Domain Controllers - Identifies domain controllers and online status.
FSMO Role Analysis - Enumerates FSMO roles at the site.
Enumerate Organisation Units and Security Groups - Lists the organisational units and security groups (with members).
User Analysis - Lists the users in AD, status, and last login/use, which helps identify potential security risks.
Detect Local Mail Servers - Detects mail server(s) on the network.
Detect Time Servers - Detects server(s) on the network.
Discover Network Shares - Discovers the network shares by server.
Detect Major Applications - Detects all major apps / versions and counts the number of installations.
Detailed Domain Controller Event Log Analysis - Lists the event log entries from the past 24 hours for the directory service, DNS server and file replication service event logs.
SQL Server Analysis - Lists the SQL Servers and associated database(s).
Internet Domain Analysis - Queries company domain(s) via a WHOIS lookup.Password Strength Analysis - Uses MBSA to identify computers with weak passwords that may pose a security risk.
Missing Security Updates - Uses MBSA to identify computers missing security updates.
System by System Event Log Analysis - Discovers the five system and app event log errors for servers.
External Security Vulnerabilities - Lists the security holes and warnings from External Vulnerability Scan