Network Assessment

Let vTECH io help you review your organization’s existing IT infrastructure, security, and performance to identity opportunities for improvement and get a comprehensive view of your IT environment with our assessment tools.
Network switches
Here are areas that we will cover in a Network Assessment.
Detect System Protocol Leakage
Detects outbound protocols that should not be allowed.
Detect Unrestricted Protocols
Detects system controls for protocols that should be allowed but restricted.
Detect User Controls
Determines if controls are in place for user web browsing.
Detect Wireless Access
Detects and determines if wireless networks are available and secured.
External Security Vulnerabilities
Performs detailed External Vulnerability Scan. List and categorize external security threats.
Network Share Permissions
Documents access to file system shares.
Domain Security Policy
Documents domain computer and domain controller security policies.
Local Security Policy
Documents and assesses consistency of local security policies.
Detect Domain Controllers
Identifies domain controllers and online status.
FS140 Role Analysis
Enumerates FSMO roles at the site.
Enumerate Organization Units and Security Groups
Lists the organizational units and security groups (with members).
User Analysis
Lists the users in AD, status, and last login/use, which helps identify potential security risks.
Detect local Mail Servers
Detects mail server(s) on the network.
Detect Time Servers
Detects server(s) on the network.
Discover Network Shares Detect
Discovers the network shares by server.
Major Applications Detailed Domain
Detects all major apes / versions and counts the number of installations.
Controller Event Log Analysis
Lists the event log entries from the past 24 hours for the directory service, DNS server and file replication service event logs.
SOL Server Analysis
Lists the SOL Servers and associated database(s).
Internet Domain Analysis
Queries company domain(s) via a WHOIS lookup.
Password Strength Analysis
Uses MESA to identify computers with weak passwords that may pose a security risk.
Missing Security Updates
Uses MESA to identify computers missing security updates.
System by System Event Log Analysis
Discovers the five system and app event log errors for servers.
External Security Vulnerabilities
Lists the security holes and warnings horn External Vulnerability Scan.
Site Diagram
The schematic shows the basic network structure, with convenient drill downs into each group of like workstations. Each device is annotated with important identifying centimes tion information and is color-coded based en its status.
Asset Detail Report
For each network scan, this report provides detailed information on each of the individual assets discovered. The report is ideal for cataloging and documenting the complete settings and configurations for individual workstations and servers.

Contact form