IT Assessment

Comprehensive IT Assessment Overview Gather input from department managers Review all IT systems for inventory, security, backup, and reliability purposes Review IT policies and procedures, disaster recovery plan and make recommendations Evaluate overall efficiency of IT system design and workflow Identify and prioritize critical areas of concern and recommended improvements Provide budgetary estimates and solution planning for execution of recommendations Prepare a comprehensive report of findings and meet with key school staff to document and plan strategy

Benefits

Detailed Information On Every Discovered Asset, Including Those Not Physically Connected To The Network, Is A Timely Process For Any IT Professional Additionally, Being Able To Identify All Risks From Misconfigurations, Network Vulnerabilities And User Threats Is Often Unobtainable By Most Is Extremely Valuable Information To Have Finding A Way To Gather This Information Across All Environments, From On Premises, To Remote, To Cloud, To Work From Home Requires A Great Deal Of Knowledge And Experience This Is Why Having A Team Of Engineers With The Training And Toolset To Accomplish This The Only Way To Get That Information

Qualification Questions

Is Server Desktop Network Assessment Required? If So, How Many Assessments?
Is Infrastructure Cabling Site Survey Required? If So, How Many Units?
Is Wireless Assessment And Heat Map Required? If So, How Many Block Hours?
Review Of The Existing Internet Service Provider (ISP) Services, Including WAN Contract If Needed, Customer Can Engage Provider For Vendor Management And Selection Of New ISP Service(s)
Is Telecom And Communications Assessment Required? If So, How Many Circuits?
Is Application Assessment Required? If So, How Many Applications?
Is Cloud Assessment Required? If So, How Many Cloud Platforms?
Is Cjis Compliance Assessment Required?
Is External Vulnerability Assessment Required? If So, How Many Assessments?
Is Setup For Internal Vulnerability Assessment Required? If So, How Many External Connection To Sites?
Do You Only Need An External Vulnerability Scan
Is Recurring Quarterly Scan With Automated Reporting Yearly Service Required? If So, How Many 4 Quarterly Scans?
Is Internal Vulnerability Assessment Only Required? If So, How Many Connected Sites?

Example Project Plan

Implementation
  • Session 1
    • Connect To Customer Server Via Downloaded Tool
    • Copy The Pre Scan And Auditing Toolset To Customer Server
    • Run The Pre Scan Tool This Makes Sure That The Environment Is Able To Run An Audit Most Of The Time, The Pre Scan Tool Gives The OK To Run The Scan
    • If The Pre Scan Results Show The Scan Can Be Run, Then Step Two Session #2 Will Begin At That Time
  • Session 2
    • Run The Auditing Toolset On Customer’s Primary Domain Controller This Will Gather Items Like Machine Inventory, Machine Health, Network Health, Machine Vulnerabilities, Fileshares, Permissions, Group Policy Details, And User Behavior IT Will Not Access Any Data Directly On Any Machine Or Network Location (Timing Is Solely Based On What The Tool Finds, Number Of Devices, Speed Of Those Devices, Users Logged In, And Internet Speed )
    • Run The Auditing Toolset On Customer’s Email System This Will Gather Items Like Mailbox Count/size, Distribution Groups, Shared Mailbox Count/size/permissions, Traffic Report, And Public Folder Details
    • Run The Auditing Toolset On Customer’s Email System This Will Gather Items Like Mailbox Count/size, Distribution Groups, Shared Mailbox Count/size/permissions, Traffic Report, And Public Folder Details
  • Session 3
    • Copy The Auditing Toolset Export From Customer Servers For Processing
  • External Scan And Reports Generation
    • Run The External Vulnerabilities Scan This Is Where Customer’s External IP Addresses Come In To Play This Is Used To Verify There Is No Unexpected Open Ports Or Known Threats/vulnerabilities
    • Any Firewall Settings Associated With Disabling Port Scan Are Turned Off For An 8 Hr Window
    • This Will Be Done Via A Toolset That Resides Outside Your Location This Is To Determine If There Are Any Vulnerabilities That Can Be Exploited In A Malicious Attack
Validation
  • Report Generation And Audit Analysis
    • Asset And Findings Reports Are Generated A Review Of The Audit Finding Details And External Vulnerabilities Scan Results To Determine The Overall Health Of Your Environment And Create A Management Plan For Remediation Of Issues Found
Discovery
  • Environment Discovery
    • Identify If Group Policy Updates Are Required
    • Identify If Restarting Of Workstations And Laptops Will Be Required To Perform The Scan
    • Confirm Firewall Settings Associated With Disabling Port Scan Are Turned Off
  • Gather Required Environment Details
    • Access To The Devices Being Audited (Using Centralized Management If Available)
    • Related Device Admin Credentials A Dedicated Username For The Scan Will Allow Us To Separate Interaction From Our Toolset Vs Other Users
    • All Subnets Used Across All Locations (assistance Can Be Provided To Gather These Details If You Don’t Have Them)
Closing
  • Project Deliverables
    • Server/Network/Databases/Security Scan Reporting
    • Each Scan Will Include A Score To Show What Meets Best Practices Versus Needs Attention
    • After Reviewing The Data, We Provide Electronic Files For Each Type Of Scan With Details Of Findings

Last modified August 16, 2021