Solved

network profile

Posted on 2011-09-16
7
283 Views
Last Modified: 2012-08-13
Does anyone know of a tool or sample report that would profile a small network prior to an independant audit review.. Not just from a s ecurity angle but operations, applications, infrastructure,

If I asked you to profile my small network what would your report include, can you provide a sample?

Or what is the correct terminology for a network "profile" /overview?
Thanks
0
Comment
Question by:pma111
  • 4
  • 3
7 Comments
 
LVL 3

Accepted Solution

by:
clinker83 earned 500 total points
ID: 36548989
Is there a third party looking for information about your network?

Network Topology or Network Infrastructure could be terms used to describe an overview of your network.

If I wanted to find out about your network structure I would ask the following questions:
-How many Servers have you got?
-How many client computers are there?
-Are clients on a domain or workgroup?
-How many domain controllers have you got?
-What's acting as DHCP server?
-What's acting as DNS server?
-Have you got Firewall implemented and is it software or hardware solution?
-Is there access to the internet and how is this controlled?
-Is there a wireless network?
-Do you have network printers or print servers?
-Do you have your own email server?
-Do you have your own web server?
-Do you use switches or hubs?
-Are switches managable?
-Do you utilize switch port security?

I hope the above helps. These questions would provide a sort of general setup of your network. Perhaps you could provide further details about the type of report you're looking for and who is looking for it. Also be sensible about who you provide information about your network to as it could provide clues to hackers about getting into your network.

There's free software called 'The Dude' and despite the name it is really a very useful little program.
http://www.mikrotik.com/thedude.php
You can use it to scan the network and give you a sort of map or layout of the computers.
I would recommend uninstalling it after use as it can cause some traffic on the network and could remain running in the background.
0
 
LVL 3

Author Comment

by:pma111
ID: 36549003
Thanks

>>Is there a third party looking for information about your network?

Yeah, a 3rd party for auditing of network infrastructure/operations/security.

Trying to build a picture of what they'll need to know.
0
 
LVL 3

Author Comment

by:pma111
ID: 36549016
No concern its going to hackers its a trusted 3rd party.
0
Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 3

Author Comment

by:pma111
ID: 36549022
I guess another question could be what remote access facilities are available to staff for access from home / offsite.
0
 
LVL 3

Expert Comment

by:clinker83
ID: 36549087
The fact is different people will need different details about your network depending on what it is they are doing for you. Providing remote access may be relevant to them if they are interested in security, and they may wish to know what type of remote access you use and whether it is secure/ encrypted.
If the third party are looking for general information then I would attempt to answer the questions I have outlined above. Not all questions may be relevant if your network is small.
Also you could ask the third party what exactly they wish to know.

0
 
LVL 3

Author Comment

by:pma111
ID: 36549108
Cheers for the input...
0
 
LVL 3

Expert Comment

by:clinker83
ID: 36549464
>>Yeah, a 3rd party for auditing of network infrastructure/operations/security

Sorry hadn't seen this. What I've described already would be more the network infrastructure.

I guess operations would describe things like who are your IT administrators etc.

Security would cover a broad range of things like firewalls and antivirus, control of internet resources. Active Directory schema (control of network resources for different user groups). Group Policy (how is functionality restricted for different Organisational Units). If you are dealing with sensitive data you may be required to encrypt hard drives (especially laptops). Does your country have a data protection commissioner? If so look up details about their standards.
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Ping and real time 48 79
Find computer name from username 9 104
Provide internet access from one windows PC to another 16 96
BGP Local Preference 5 44
Join Greg Farro and Ethan Banks from Packet Pushers (http://packetpushers.net/podcast/podcasts/pq-show-93-smart-network-monitoring-paessler-sponsored/) and Greg Ross from Paessler (https://www.paessler.com/prtg) for a discussion about smart network …
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

679 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question