Network Security Audit Template

Posted on 2005-04-20
Last Modified: 2013-11-16
I need to find a network security Audit Template. Something that would include a checklist and that can be used as a template for any enterprise.

I'd prefer if it is free.

I need something like this:

Question by:8mathieu8
    LVL 11

    Accepted Solution

    LVL 5

    Assisted Solution


    you need to modify the templates to suit your needs. treat them as starting points. The people that write this templates do not know your specifics or your requirements.

    as per the above, i suggest you start with 17799 which is industry standard. Frome there if you want to go into specifics, look up checklists for your specific technologies, they are all publicy available, eg Microsot, Sun, Cisco, oracle etc etc.

    LVL 2

    Expert Comment

    by:bboy77  all you'll need.

    Featured Post

    How to run any project with ease

    Manage projects of all sizes how you want. Great for personal to-do lists, project milestones, team priorities and launch plans.
    - Combine task lists, docs, spreadsheets, and chat in one
    - View and edit from mobile/offline
    - Cut down on emails

    Join & Write a Comment

    I thought I'd write this up for anyone who has a request to create an anonymous whistle-blower-type submission form created using SharePoint 2010 (this would probably work the same for 2013). It's not 100% fool-proof but it's as close as you can get…
    This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
    Sending a Secure fax is easy with eFax Corporate ( First, Just open a new email message.  In the To field, type your recipient's fax number You can even send a secure international fax — just include t…
    In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…

    733 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    18 Experts available now in Live!

    Get 1:1 Help Now