0% found this document useful (0 votes)
47 views17 pages

Client Risk Report Sample Report

The network assessment identified several critical issues that present security risks, including user accounts with passwords set to never expire, computers lacking anti-virus and anti-spyware software, and operating systems in extended support. The overall risk score was high at 100 due to these issues. Recommendations include investigating accounts with passwords set to never expire, ensuring anti-virus and anti-spyware software is installed on all endpoints, and upgrading operating systems in extended support. An internet speed test also provided the download and upload speeds.

Uploaded by

Francky Marolop
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views17 pages

Client Risk Report Sample Report

The network assessment identified several critical issues that present security risks, including user accounts with passwords set to never expire, computers lacking anti-virus and anti-spyware software, and operating systems in extended support. The overall risk score was high at 100 due to these issues. Recommendations include investigating accounts with passwords set to never expire, ensuring anti-virus and anti-spyware software is installed on all endpoints, and upgrading operating systems in extended support. An internet speed test also provided the download and upload speeds.

Uploaded by

Francky Marolop
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 17

Network Assessment

Risk Report

Prepared for: ##########


Prepared by: One2Call
2/22/2018

CONFIDENTIALITY NOTE: The information contained in this report document is for the exclusive use of the client
specified above and may contain confidential, privileged and non-disclosable information. If the recipient of this
report is not the client or addressee, such recipient is strictly prohibited from reading, photocopying, distributing or
otherwise using this report or its contents in any way.

Scan Date: 2/20/2018


Risk Report
NETWORK ASSESSMENT

Table of Contents
1 - Discovery Tasks
2 - Risk Score
3 - Issues Summary
4 - Internet Speed Test
5 - Assessment Summary
6 - Server Aging
7 - Workstation Aging

PROPRIETARY & CONFIDENTIAL Page 2 of 17


Risk Report
NETWORK ASSESSMENT

Discovery Tasks
The following discovery tasks were performed:

Task Description
✓ Detect Domain Controllers Identifies domain controllers and online status.

✓ FSMO Role Analysis Enumerates FSMO roles at the site.

Enumerate Organization Units and


✓ Security Groups
Lists the organizational units and security groups (with members).

Lists the users in AD, status, and last login/use, which helps identify
✓ User Analysis
potential security risks.

✓ Detect Local Mail Servers Detects mail server(s) on the network.

✓ Detect Time Servers Detects server(s) on the network.

✓ Discover Network Shares Discovers the network shares by server.

Detects all major apps / versions and counts the number of


✓ Detect Major Applications
installations.
Detailed Domain Controller Event Log Lists the event log entries from the past 24 hours for the directory
✓ Analysis service, DNS server and file replication service event logs.

✓ Web Server Discovery and Identification Lists the web servers and type.

Lists the non-Active Directory devices responding to network


✓ Network Discovery for Non-A/D Devices
requests.

✓ Internet Access and Speed Test Tests the Internet access and performance.

✓ SQL Server Analysis Lists the SQL Servers and associated database(s).

 Internet Domain Analysis Queries company domain(s) via a WHOIS lookup.

Uses MBSA to identify computers with weak passwords that may


 Password Strength Analysis
pose a security risk.

 Missing Security Updates Uses MBSA to identify computers missing security updates.

✓ System by System Event Log Analysis Discovers the five system and app event log errors for servers.
Lists the security holes and warnings from External Vulnerability
 External Security Vulnerabilities
Scan.

PROPRIETARY & CONFIDENTIAL Page 3 of 17


Risk Report
NETWORK ASSESSMENT

Risk Score
The Risk Score is a value from 1 to 100, where 100 represents significant risk and potential issues. The
score is risk associated with the highest risk issue.

Several critical issues were identified. Identified issues should be investigated and addressed according
to the Management Plan.

PROPRIETARY & CONFIDENTIAL Page 4 of 17


Risk Report
NETWORK ASSESSMENT

Issues Summary
This section contains a summary of issues detected during the Network Assessment process, and is
based on industry-wide best practices for network health, performance, and security. The Overall Issue
Score grades the level of issues in the environment. An Overall Issue score of zero (0) means no issues
were detected in the environment. It may not always be possible to achieve a zero score in all
environments due to specific circumstances.

Overall Issue Score: Risk Score x Number of Incidents = Total points: Total percent (%)

User password set to never expire (80 pts each)


2560 Current Score: 80 pts x 32 = 2560: 53.94%
Issue: User accounts with passwords set to never expire present a risk of use by
unauthorized users. They are more easily compromised than passwords that are routinely
changed.
Recommendation: Investigate all accounts with passwords set to never expire and
configure them to expire regularly.

Anti-spyware not installed (94 pts each)


564 Current Score: 94 pts x 6 = 564: 11.88%
Issue: Anti-spyware software was not detected on some computers. Without adequate anti-
virus and anti-spyware protection on all workstations and servers, the risk of acquiring
malicious software is significant.
Recommendation: Assure that anti-spyware is deployed to all possible endpoints in
order to prevent both security and productivity issues.

Anti-virus not installed (94 pts each)


564 Current Score: 94 pts x 6 = 564: 11.88%
Issue: Anti-virus software was not detected on some computers. Without adequate anti-virus
and anti-spyware protection on all workstations and servers, the risk of acquiring malicious
software is significant.
Recommendation: To prevent both security and productivity issues, we strongly
recommend ensuring that anti-virus is deployed to all possible endpoints.

User has not logged on to domain 30 days (13 pts each)


234 Current Score: 13 pts x 18 = 234: 4.93%
Issue: Users that have not logged in in 30 days could be from A user that has not logged in
for an extended period of time could be a former employee or vendor.

PROPRIETARY & CONFIDENTIAL Page 5 of 17


Risk Report
NETWORK ASSESSMENT

Recommendation: Disable or remove user accounts for users that have not logged on
to active directory in 30 days.

Operating system in Extended Support (20 pts each)


220 Current Score: 20 pts x 11 = 220: 4.64%
Issue: Computers are using an operating system that is in Extended Supported. Extended
Support is a warning period before an operating system is no longer supported by the
manufacturer and will no longer receive support or patches.
Recommendation: Upgrade computers that have operating systems in Extended
Support before end of life.

Inactive computers (15 pts each)


210 Current Score: 15 pts x 14 = 210: 4.42%
Issue: Computers have not checked in during the past 30 days
Recommendation: Investigate the list of inactive computers and determine if they
should be removed from Active Directory, rejoined to the network, or powered on.

Potential disk space issue (68 pts each)


204 Current Score: 68 pts x 3 = 204: 4.3%
Issue: 3 computers were found with significantly low free disk space.
Recommendation: Free or add additional disk space for the specified drives.

Insecure listening ports (10 pts each)


160 Current Score: 10 pts x 16 = 160: 3.37%
Issue: Computers are to be using potentially insecure protocols.
Recommendation: There may be a legitimate business need, but these risks should be
assessed individually. Certain protocols are inherently insecure since they often lack
encryption. Inside the network, their use should be minimized as much as possible to
prevent the spread of malicious software. Of course, there can be reasons these
services are needed and other means to protect systems which listen on those ports.
We recommend reviewing the programs listening on the network to ensure their
necessity and security.

Un-populated organization units (10 pts each)


30 Current Score: 10 pts x 3 = 30: 0.63%
Issue: Empty organizational units (OU) were found in Active Directory. They may not be
needed and can lead to misconfiguration.
Recommendation: Remove or populate empty organizational units.

PROPRIETARY & CONFIDENTIAL Page 6 of 17


Risk Report
NETWORK ASSESSMENT

Internet Speed Test Results


Download Speed: 52.75 Mb/s Upload Speed: 159.18 Mb/s

Asset Summary: Total Discovered Assets

PROPRIETARY & CONFIDENTIAL Page 7 of 17


Risk Report
NETWORK ASSESSMENT

Asset Summary: Active Computers


Active Computers are defined as computers that were either actively responding at the time of the scan or
have checked in with Active Directory within the past 30 days.

Operating System Total Percent


Top Five
Windows 10 Pro 12 35.3%
Windows 7 Professional 8 23.5%
Windows Server 2012 R2 Standard 7 20.6%
Unidentified OS 1 2.9%
Windows 8.1 Pro 1 2.9%
Total - Top Five 29 85.3%
Other
Windows Server 2008 R2 Enterprise 1 2.9%
Windows Server 2008 R2 Standard 1 2.9%
Windows Server 2008 Standard 1 2.9%
Windows Server 2012 R2 Essentials 1 2.9%
Windows Server 2016 Standard 1 2.9%
Total - Other 5 14.7%
Overall Total 34 100%

PROPRIETARY & CONFIDENTIAL Page 8 of 17


Risk Report
NETWORK ASSESSMENT

PROPRIETARY & CONFIDENTIAL Page 9 of 17


Risk Report
NETWORK ASSESSMENT

Asset Summary: All Computers


The list of all computers includes computers that may no longer be active but have entries in Active
Directory (in a domain environment).

Operating System Total Percent


Top Five
Windows 7 Professional 17 35.4%
Windows 10 Pro 13 27.1%
Windows Server 2012 R2 Standard 9 18.8%
Unidentified OS 2 4.2%
Windows 8.1 Pro 1 2.1%
Total - Top Five 42 87.5%
Other
Windows Server 2008 R2 Enterprise 1 2.1%
Windows Server 2008 R2 Standard 1 2.1%
Windows Server 2008 Standard 1 2.1%
Windows Server 2012 R2 Essentials 1 2.1%
Windows Server 2016 Standard 1 2.1%
Windows XP Professional 1 2.1%
Total - Other 6 12.5%
Overall Total 48 100%

PROPRIETARY & CONFIDENTIAL Page 10 of 17


Risk Report
NETWORK ASSESSMENT

Asset Summary: Inactive Computers


Inactive computers are computers that could not be scanned or have not checked into Active Directory in
the past 30 days.

Operating System Total Percent


Top Five
Windows 7 Professional 9 64.3%
Windows Server 2012 R2 Standard 2 14.3%
Unidentified OS 1 7.1%
Windows 10 Pro 1 7.1%
Windows XP Professional 1 7.1%
Total - Top Five 14 100%
Other
Total - Other 0 0%
Overall Total 14 100%

PROPRIETARY & CONFIDENTIAL Page 11 of 17


Risk Report
NETWORK ASSESSMENT

Asset Summary: Users

PROPRIETARY & CONFIDENTIAL Page 12 of 17


Risk Report
NETWORK ASSESSMENT

PROPRIETARY & CONFIDENTIAL Page 13 of 17


Risk Report
NETWORK ASSESSMENT

Server Aging

PROPRIETARY & CONFIDENTIAL Page 14 of 17


Risk Report
NETWORK ASSESSMENT

Workstation Aging

PROPRIETARY & CONFIDENTIAL Page 15 of 17


Risk Report
NETWORK ASSESSMENT

Asset Summary: Storage

PROPRIETARY & CONFIDENTIAL Page 16 of 17


Risk Report
NETWORK ASSESSMENT

PROPRIETARY & CONFIDENTIAL Page 17 of 17

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy