Solved

network profile

Posted on 2011-09-16
7
264 Views
Last Modified: 2012-08-13
Does anyone know of a tool or sample report that would profile a small network prior to an independant audit review.. Not just from a s ecurity angle but operations, applications, infrastructure,

If I asked you to profile my small network what would your report include, can you provide a sample?

Or what is the correct terminology for a network "profile" /overview?
Thanks
0
Comment
Question by:pma111
  • 4
  • 3
7 Comments
 
LVL 3

Accepted Solution

by:
clinker83 earned 500 total points
Comment Utility
Is there a third party looking for information about your network?

Network Topology or Network Infrastructure could be terms used to describe an overview of your network.

If I wanted to find out about your network structure I would ask the following questions:
-How many Servers have you got?
-How many client computers are there?
-Are clients on a domain or workgroup?
-How many domain controllers have you got?
-What's acting as DHCP server?
-What's acting as DNS server?
-Have you got Firewall implemented and is it software or hardware solution?
-Is there access to the internet and how is this controlled?
-Is there a wireless network?
-Do you have network printers or print servers?
-Do you have your own email server?
-Do you have your own web server?
-Do you use switches or hubs?
-Are switches managable?
-Do you utilize switch port security?

I hope the above helps. These questions would provide a sort of general setup of your network. Perhaps you could provide further details about the type of report you're looking for and who is looking for it. Also be sensible about who you provide information about your network to as it could provide clues to hackers about getting into your network.

There's free software called 'The Dude' and despite the name it is really a very useful little program.
http://www.mikrotik.com/thedude.php
You can use it to scan the network and give you a sort of map or layout of the computers.
I would recommend uninstalling it after use as it can cause some traffic on the network and could remain running in the background.
0
 
LVL 3

Author Comment

by:pma111
Comment Utility
Thanks

>>Is there a third party looking for information about your network?

Yeah, a 3rd party for auditing of network infrastructure/operations/security.

Trying to build a picture of what they'll need to know.
0
 
LVL 3

Author Comment

by:pma111
Comment Utility
No concern its going to hackers its a trusted 3rd party.
0
Zoho SalesIQ

Hassle-free live chat software re-imagined for business growth. 2 users, always free.

 
LVL 3

Author Comment

by:pma111
Comment Utility
I guess another question could be what remote access facilities are available to staff for access from home / offsite.
0
 
LVL 3

Expert Comment

by:clinker83
Comment Utility
The fact is different people will need different details about your network depending on what it is they are doing for you. Providing remote access may be relevant to them if they are interested in security, and they may wish to know what type of remote access you use and whether it is secure/ encrypted.
If the third party are looking for general information then I would attempt to answer the questions I have outlined above. Not all questions may be relevant if your network is small.
Also you could ask the third party what exactly they wish to know.

0
 
LVL 3

Author Comment

by:pma111
Comment Utility
Cheers for the input...
0
 
LVL 3

Expert Comment

by:clinker83
Comment Utility
>>Yeah, a 3rd party for auditing of network infrastructure/operations/security

Sorry hadn't seen this. What I've described already would be more the network infrastructure.

I guess operations would describe things like who are your IT administrators etc.

Security would cover a broad range of things like firewalls and antivirus, control of internet resources. Active Directory schema (control of network resources for different user groups). Group Policy (how is functionality restricted for different Organisational Units). If you are dealing with sensitive data you may be required to encrypt hard drives (especially laptops). Does your country have a data protection commissioner? If so look up details about their standards.
0

Featured Post

Free Trending Threat Insights Every Day

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Let’s list some of the technologies that enable smooth teleworking. 
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

728 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now