Check Operating System for Security Vulnerabilities  
  Check Operating System for Validity (optional, but recommended)  
  Check Servers & Workstations for Viruses, Trojans, Spyware, Adware, & other Malicious Software  
  Check DSL or Cable modem for proper settings and security best practices  
  Check Router or Firewall for proper settings and security best practices  
  Check Wireless Access Point for security best practices  
  Provide a written report identifying vulnerabilities found and prioritizing any needed repairs  
  Post-Assessment Discussion of General Business & Computer Security Risks  
Home About Me Contact Support BLive To Me! Monthly Specials
 
  Provide a Written Report Identifying the Vulnerabilities Found and Prioritizing the Needed Repairs


You'll receive two printed reports documenting the current condition of your network, PCs and/or Servers:

1. An Initial Report after the network has been scanned which identifies basic network information and vulnerabilities that require immediate attention.

2. A Comprehensive Report after proactively monitoring your Network for 14 days with the HyBlue tools.  This report summarizes problems, identifies trends, and makes specific recommendations.  Ongoing proactive monitoring allows needed repairs to be performed before they develop into failures that will impact your business.


The reports include the following types of information:

Diagram of key network devices: routers/firewalls, hubs/switches, wireless access points, network printers, computers, servers.

For each device, we will report the Operating System revision level, version numbers of major applications, installed and missing security hotfixes, validation of your Microsoft Operating System license (if applicable), and to the extent possible, the license information for installed software.

For each computer workstation or server, we will report on the system hardware, including processor type & speed, memory size & speed, usable hard drive capacity & free space, and to the extent possible, information about the main logic board.

For each computer workstation or server, we will report on the status of installed anti-virus and anti-spyware software, plus a listing of all "malware" detected & removed.

DSL/Cable Modem security settings and any variance from best practices.

Hardware/Software Router/Firewall security settings and any variance from best practices.

Wireless Access Points security settings and any variance from best practices.

We will provide a prioritized listing of the security vulnerabilities detected and our recommendations to eliminate or reduce those risks.


 
 
  Copyright 2005 Duke InfoSecurity & InfoTechnology Services. All rights reserved
PRIVACY POLICY                    Terms of Services & Legal Notices