Agile, Secure & Responsive IT Environments

Flagship Networks Cybersecurity Audit

The first step to mitigate the risks of a cyberattack is to conduct cybersecurity audit. Flagship conducts audits for our clients by reviewing their entire IT environment, including user accounts, workstations and servers, system patch history, business applications, and back-up data storage. In addition, we review key process runbooks, such as their Incidence Response and Business Continuity Plans.

We assess each system to detect issues based on industry-wide best practices for network health, performance, and security. The audit provides an inventory of discovered assets, including inactive systems, and their operating systems. Each item receives a risk score that reflects both the number and severity of detected issues (0 represents no issues).

Overall Issue Score

We deliver an overall risk score of zero (0) to 100 for the total IT environment, with zero meaning no issues were detected.

The score reflects issues with the highest-level risks, not simply an average of the individual system scores. An overall issue score of zero is unlikely given that specific circumstances will offer some risks.

Audit Recommendations

Our audit provides recommendations for each of the assessed systems and overall environment, including:

  • Technologies to update or acquire (e.g., missing security patches, acquire dark web monitoring software, end-point detection systems)
  • Process changes (e.g., passwords should have expiration dates, need to test disaster recovery runbook, etc.) 
  • Physical adjustments (e.g., inactive computers still have network access, staff have passwords on post-it notes, server rooms are not secured, etc.).

The Benefit: Peace of Mind

Our comprehensive security audit enables clients to understand their risk exposure and provides a guidebook for how to improve their defenses. It also enables you to quickly respond if attacked and have the tools to get back to work ASAP with minimal disruption.

The following table lists the discovery tasks conducted during a security audit.

Audit Discovery TaskDescription
Detect Domain ControllersIdentifies domain controllers and online status.
FSMO Role AnalysisEnumerates FSMO roles at the site.
Enumerate Organization Units and Security GroupsLists the organizational units and security groups (with members).
User AnalysisLists the users in AD, status, and last login/use, which helps identify potential security risks.
Detect Local AccountsDetects local accounts on computer endpoints.
Detect Added or Removed ComputersLists computers added or removed from the Network since the last assessment.
Detect Local Mail ServersDetects mail server(s) on the network.
Detect Time ServersDetects server(s) on the network.
Discover Network SharesDiscovers the network shares by server.
Detect Major ApplicationsDetects all major apps / versions and counts the number of installations.
Detailed Domain Controller Event Log AnalysisLists the event log entries from the past 24 hours for the directory service, DNS server, and file replication service event logs.
Web Server Discovery and IdentificationLists the web servers and type.
Network Discovery for Non-A/D DevicesLists the non-Active Directory devices responding to network requests.
Internet Access and Speed TestTests Internet access and performance.
SQL Server AnalysisLists the SQL Servers and associated database(s).
Internet Domain AnalysisQueries company domain(s) via a WHOIS lookup.
Missing Security UpdatesIdentifies computers missing security updates.
System by System Event Log AnalysisDiscovers the five system and app event log errors for servers.
External Security VulnerabilitiesLists the security holes and warnings from External Vulnerability Scan.

For more information on Flagship Networks' security audits, please complete the form below.

© 2020 Flagship Networks, Inc. All rights reserved.