Client Risk Summary Report
Full Network Assessment Report
Asset Detail Report
Excel Asset Export Report
XP Migration Readiness Report
Your Security Assessment will consist of the following reports:
Security Risk Report
This executive-level report includes a proprietary Security Risk Score along with summary charts, graphs and an explanation of the risks found in the security scans.
Security Policy Assessment Report.
A detailed review of the security policies that are in place on both a domain wide and local machine basis.
Shared Permission Report.
Comprehensive lists of all network “shares” by computer, detailing which users and groups have access to which devices and files, and what level of access they have.
User Permissions Report.
Organizes permissions by user, showing all shared computers and files to which they have access.
Internal Vulnerabilities Report.
Highlights deviation from industry standards compared to outbound port and protocol accessibility, lists available wireless networks as part of a wireless security survey, and provides information on Internet content accessibility.
External Vulnerabilities Full Detail Report.
A comprehensive output including security holes, warnings, and informational items that can help you make better network security decisions, plus a full NMap Scan which checks all 65,535 ports and reports which are open. This is an essential item for many standard security compliance reports.
The Microsoft Exchange Assessment will consist of the following reports:
Exchange Risk Report
This report provides a polished overview of any issues identified in the more detailed reports. Corresponding charts and graphs clearly communicate issues and serve as a graphical aide to help suggest remedial steps.
Traffic and Use Report
Shows you the status of all mailboxes – their size limits, percentage used, and percentage free. This report is extremely useful when planning a migration or for growth planning to ensure that systems will continue to run without interruption.
Mobile Device Report
Provides a detailed listing of every mobile device used by employees to access their organization’s mailbox. The report indicates the names and specific types of mobile devices that are accessing the Exchange server, as well as the operating systems and even the number of folders that are being updated.
Mailbox Detail Report
Gives you a mailbox-by-mailbox catalog of information, including everything from mailbox display name to quotas to a listing of folders/sizes for each mailbox (and more).
Distribution Lists and Public Folders Report
Identifies and lists all distribution groups as well as which end-users or other groups are to receive any emails.
Mailbox Permissions Report
Will identify on a mailbox-by-mailbox basis which groups or which individuals have access to the mailbox and at what level.
Mailbox Permissions by User Report
Inverts the information to show you on a user-by-user basis which users have access to which mailboxes. This report is a great way to document individual access rights.
SQL Server Assessment
Our SQL Server Assessment will provide you the following reports:
Routine Health Report
Shows the health of the SQL Server at a high level. Looks at best practices and compares them to the current state of the database
SQL Server Detail Report
Documents key settings of the SQL server, including cluster information, DB recovery model, location of critical files, I/O, physical memory, wait types, logins and more
Database Detail Report
Deeper dive into each individual database in the SQL server, including properties, missing indices, fragmentation levels and other stats
Maintenance Plan Report
A very telling report that reveals which defined maintenance plans have been run, the last run times and results. The report includes the sub-steps taken in the plans
SQL Server Agent Jobs Report
This report includes a comprehensive list of all SQL Server agent jobs and their schedules. The Job History highlights which jobs were not successful, and why they are producing errors.
The Job History highlights which jobs were not successful, and why they are producing errors