Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

network profile

Posted on 2011-09-16
7
Medium Priority
?
308 Views
Last Modified: 2012-08-13
Does anyone know of a tool or sample report that would profile a small network prior to an independant audit review.. Not just from a s ecurity angle but operations, applications, infrastructure,

If I asked you to profile my small network what would your report include, can you provide a sample?

Or what is the correct terminology for a network "profile" /overview?
Thanks
0
Comment
Question by:pma111
  • 4
  • 3
7 Comments
 
LVL 3

Accepted Solution

by:
clinker83 earned 2000 total points
ID: 36548989
Is there a third party looking for information about your network?

Network Topology or Network Infrastructure could be terms used to describe an overview of your network.

If I wanted to find out about your network structure I would ask the following questions:
-How many Servers have you got?
-How many client computers are there?
-Are clients on a domain or workgroup?
-How many domain controllers have you got?
-What's acting as DHCP server?
-What's acting as DNS server?
-Have you got Firewall implemented and is it software or hardware solution?
-Is there access to the internet and how is this controlled?
-Is there a wireless network?
-Do you have network printers or print servers?
-Do you have your own email server?
-Do you have your own web server?
-Do you use switches or hubs?
-Are switches managable?
-Do you utilize switch port security?

I hope the above helps. These questions would provide a sort of general setup of your network. Perhaps you could provide further details about the type of report you're looking for and who is looking for it. Also be sensible about who you provide information about your network to as it could provide clues to hackers about getting into your network.

There's free software called 'The Dude' and despite the name it is really a very useful little program.
http://www.mikrotik.com/thedude.php
You can use it to scan the network and give you a sort of map or layout of the computers.
I would recommend uninstalling it after use as it can cause some traffic on the network and could remain running in the background.
0
 
LVL 3

Author Comment

by:pma111
ID: 36549003
Thanks

>>Is there a third party looking for information about your network?

Yeah, a 3rd party for auditing of network infrastructure/operations/security.

Trying to build a picture of what they'll need to know.
0
 
LVL 3

Author Comment

by:pma111
ID: 36549016
No concern its going to hackers its a trusted 3rd party.
0
Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 3

Author Comment

by:pma111
ID: 36549022
I guess another question could be what remote access facilities are available to staff for access from home / offsite.
0
 
LVL 3

Expert Comment

by:clinker83
ID: 36549087
The fact is different people will need different details about your network depending on what it is they are doing for you. Providing remote access may be relevant to them if they are interested in security, and they may wish to know what type of remote access you use and whether it is secure/ encrypted.
If the third party are looking for general information then I would attempt to answer the questions I have outlined above. Not all questions may be relevant if your network is small.
Also you could ask the third party what exactly they wish to know.

0
 
LVL 3

Author Comment

by:pma111
ID: 36549108
Cheers for the input...
0
 
LVL 3

Expert Comment

by:clinker83
ID: 36549464
>>Yeah, a 3rd party for auditing of network infrastructure/operations/security

Sorry hadn't seen this. What I've described already would be more the network infrastructure.

I guess operations would describe things like who are your IT administrators etc.

Security would cover a broad range of things like firewalls and antivirus, control of internet resources. Active Directory schema (control of network resources for different user groups). Group Policy (how is functionality restricted for different Organisational Units). If you are dealing with sensitive data you may be required to encrypt hard drives (especially laptops). Does your country have a data protection commissioner? If so look up details about their standards.
0

Featured Post

Learn Veeam advantages over legacy backup

Every day, more and more legacy backup customers switch to Veeam. Technologies designed for the client-server era cannot restore any IT service running in the hybrid cloud within seconds. Learn top Veeam advantages over legacy backup and get Veeam for the price of your renewal

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

WARNING:   If you follow the instructions here, you will wipe out your VTP and VLAN configurations.  Make sure you have backed up your switch!!! I recently had some issues with a few low-end Cisco routers (RV325) and I opened a case with Cisco TA…
How to fix a SonicWall Gateway Anti-Virus firewall blocking automatic updates to apps like Windows, Adobe, Symantec, etc.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
Suggested Courses

916 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question