Solved

network profile

Posted on 2011-09-16
7
279 Views
Last Modified: 2012-08-13
Does anyone know of a tool or sample report that would profile a small network prior to an independant audit review.. Not just from a s ecurity angle but operations, applications, infrastructure,

If I asked you to profile my small network what would your report include, can you provide a sample?

Or what is the correct terminology for a network "profile" /overview?
Thanks
0
Comment
Question by:pma111
  • 4
  • 3
7 Comments
 
LVL 3

Accepted Solution

by:
clinker83 earned 500 total points
ID: 36548989
Is there a third party looking for information about your network?

Network Topology or Network Infrastructure could be terms used to describe an overview of your network.

If I wanted to find out about your network structure I would ask the following questions:
-How many Servers have you got?
-How many client computers are there?
-Are clients on a domain or workgroup?
-How many domain controllers have you got?
-What's acting as DHCP server?
-What's acting as DNS server?
-Have you got Firewall implemented and is it software or hardware solution?
-Is there access to the internet and how is this controlled?
-Is there a wireless network?
-Do you have network printers or print servers?
-Do you have your own email server?
-Do you have your own web server?
-Do you use switches or hubs?
-Are switches managable?
-Do you utilize switch port security?

I hope the above helps. These questions would provide a sort of general setup of your network. Perhaps you could provide further details about the type of report you're looking for and who is looking for it. Also be sensible about who you provide information about your network to as it could provide clues to hackers about getting into your network.

There's free software called 'The Dude' and despite the name it is really a very useful little program.
http://www.mikrotik.com/thedude.php
You can use it to scan the network and give you a sort of map or layout of the computers.
I would recommend uninstalling it after use as it can cause some traffic on the network and could remain running in the background.
0
 
LVL 3

Author Comment

by:pma111
ID: 36549003
Thanks

>>Is there a third party looking for information about your network?

Yeah, a 3rd party for auditing of network infrastructure/operations/security.

Trying to build a picture of what they'll need to know.
0
 
LVL 3

Author Comment

by:pma111
ID: 36549016
No concern its going to hackers its a trusted 3rd party.
0
Connect further...control easier

With the ATEN CE624, you can now enjoy a high-quality visual experience powered by HDBaseT technology and the convenience of a single Cat6 cable to transmit uncompressed video with zero latency and multi-streaming for dual-view applications where remote access is required.

 
LVL 3

Author Comment

by:pma111
ID: 36549022
I guess another question could be what remote access facilities are available to staff for access from home / offsite.
0
 
LVL 3

Expert Comment

by:clinker83
ID: 36549087
The fact is different people will need different details about your network depending on what it is they are doing for you. Providing remote access may be relevant to them if they are interested in security, and they may wish to know what type of remote access you use and whether it is secure/ encrypted.
If the third party are looking for general information then I would attempt to answer the questions I have outlined above. Not all questions may be relevant if your network is small.
Also you could ask the third party what exactly they wish to know.

0
 
LVL 3

Author Comment

by:pma111
ID: 36549108
Cheers for the input...
0
 
LVL 3

Expert Comment

by:clinker83
ID: 36549464
>>Yeah, a 3rd party for auditing of network infrastructure/operations/security

Sorry hadn't seen this. What I've described already would be more the network infrastructure.

I guess operations would describe things like who are your IT administrators etc.

Security would cover a broad range of things like firewalls and antivirus, control of internet resources. Active Directory schema (control of network resources for different user groups). Group Policy (how is functionality restricted for different Organisational Units). If you are dealing with sensitive data you may be required to encrypt hard drives (especially laptops). Does your country have a data protection commissioner? If so look up details about their standards.
0

Featured Post

Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Internet Business Fax to Email Made Easy - With  eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, f…

839 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question