IT Assessment

Sections on this page

Features

IT Assessment Deliverables

Benefits

IT Assessment
Network Assessment Example Deliverables
Security Assessment Example Deliverables
Office365 ​Exchange Example Deliverables
SQL Server Assessment Example Deliverables
Professional Services – Assessments And Planning
Eisenhower School Case Study
Ebook 6 Ways To Protect Your Organization From Ransomware
Ebook Combating Cybercrime On An SMB Budget

Qualification Questions

Is Server Desktop Network Assessment Required? If So, How Many Assessments?
Is Infrastructure Cabling Site Survey Required? If So, How Many Units?
Is Wireless Assessment And Heat Map Required? If So, How Many Block Hours?
Review Of The Existing Internet Service Provider (ISP) Services, Including WAN Contract If Needed, Customer Can Engage Provider For Vendor Management And Selection Of New ISP Service(s)
Is Telecom And Communications Assessment Required? If So, How Many Circuits?
Is Application Assessment Required? If So, How Many Applications?
Is Cloud Assessment Required? If So, How Many Cloud Platforms?
Is Cjis Compliance Assessment Required?
Is External Vulnerability Assessment Required? If So, How Many Assessments?

Scope Of Work

Implementation
  • Session 1
    • Connect To Customer Server Via Downloaded Tool
    • Copy The Pre Scan And Auditing Toolset To Customer Server
    • Run The Pre Scan Tool This Makes Sure That The Environment Is Able To Run An Audit Most Of The Time, The Pre Scan Tool Gives The OK To Run The Scan
    • If The Pre Scan Results Show The Scan Can Be Run, Then Step Two Session #2 Will Begin At That Time
  • Session 2
    • Run The Auditing Toolset On Customer’s Primary Domain Controller This Will Gather Items Like Machine Inventory, Machine Health, Network Health, Machine Vulnerabilities, Fileshares, Permissions, Group Policy Details, And User Behavior IT Will Not Access Any Data Directly On Any Machine Or Network Location (Timing Is Solely Based On What The Tool Finds, Number Of Devices, Speed Of Those Devices, Users Logged In, And Internet Speed )
    • Run The Auditing Toolset On Customer’s Email System This Will Gather Items Like Mailbox Count-and-size, Distribution Groups, Shared Mailbox Count-and-size-and-permissions, Traffic Report, And Public Folder Details
    • Run The Auditing Toolset On Customer’s Email System This Will Gather Items Like Mailbox Count-and-size, Distribution Groups, Shared Mailbox Count-and-size-and-permissions, Traffic Report, And Public Folder Details
  • Session 3
    • Copy The Auditing Toolset Export From Customer Servers For Processing
  • External Scan And Reports Generation
    • Run The External Vulnerabilities Scan This Is Where Customer’s External IP Addresses Come In To Play This Is Used To Verify There Is No Unexpected Open Ports Or Known Threats-and-vulnerabilities
    • Any Firewall Settings Associated With Disabling Port Scan Are Turned Off For An 8 Hr Window
    • This Will Be Done Via A Toolset That Resides Outside Your Location This Is To Determine If There Are Any Vulnerabilities That Can Be Exploited In A Malicious Attack
Validation
  • Report Generation And Audit Analysis
    • Asset And Findings Reports Are Generated A Review Of The Audit Finding Details And External Vulnerabilities Scan Results To Determine The Overall Health Of Your Environment And Create A Management Plan For Remediation Of Issues Found
Discovery
  • Environment Discovery
    • Identify If Group Policy Updates Are Required
    • Identify If Restarting Of Workstations And Laptops Will Be Required To Perform The Scan
    • Confirm Firewall Settings Associated With Disabling Port Scan Are Turned Off
  • Kickoff Call
    • Review SOW
    • Client Approved Staff
    • Client Environment Details
    • AIS Process And Contacts
    • Scheduling And Logistics
  • Gather Required Environment Details
    • Access To The Devices Being Audited (Using Centralized Management If Available)
    • Related Device Admin Credentials A Dedicated Username For The Scan Will Allow Us To Separate Interaction From Our Toolset Vs Other Users
    • All Subnets Used Across All Locations (assistance Can Be Provided To Gather These Details If You Don’t Have Them)
Closing
  • Project Deliverables
    • Server-and-Network-and-Databases-and-Security Scan Reporting
    • Each Scan Will Include A Score To Show What Meets Best Practices Versus Needs Attention
    • After Reviewing The Data, We Provide Electronic Files For Each Type Of Scan With Details Of Findings

Last modified April 12, 2021