Security Operations
Centre (SOC)
The Security Operations Centre delivers comprehensive, 24/7 network protection. It includes services such as vulnerability management, penetration testing, compliance monitoring, and remote connectivity redundancy to secure your infrastructure, manage risk, and ensure continuous monitoring and defense.
Network Operations Centre (As a Service)
Provides 24/7 monitoring and rapid incident response for your network infrastructure. The NOC ensures continuous uptime, security, and performance by proactively managing and resolving network issues before they impact operations.
-
24/7 Network Monitoring
Rest assured with round-the-clock detection and response from AI-aided security experts.
-
User Network Access Management
Online Platform for automated Request > Approval > Action process for User Network Access requests.
-
Advanced Tier 2 & 3 Support
This is a Paragraph. Click on "Edit Text" or double click on the text box to edit the content and make sure to add any relevant information that you want to share with your visitors.
-
AI and ML Enhanced Monitoring & Alerting
This is a Paragraph. Click on "Edit Text" or double click on the text box to edit the content and make sure to add any relevant information that you want to share with your visitors.
-
Real-Time Rapid Response
Realize best-in-class resolution times with instant responses to network issues
-
Network Related User Support
Tier 1 Online, Email and Telephone Support
-
Follow the Sun Coverage
This is a Paragraph. Click on "Edit Text" or double click on the text box to edit the content and make sure to add any relevant information that you want to share with your visitors.
Firewall Management & Response
This service ensures the proper configuration, monitoring, and management of your firewall to defend against external threats. It provides real-time monitoring, regular updates, and immediate response to potential breaches or security risks.
-
Setup & Configuration
Tailored managed firewall service to protect your business from its specific threats. Creation and management of security policies and rules to ensure the firewall infrastructure meets the specific needs of your business, the latest security practices, and regulatory compliance requirements.
-
Updates & Maintenance
Using SSG's Horizon scanning initiative, we continuously incorporate the latest next-generation firewall technologies to ensure that your firewall is always up-to-date with the latest security patches and features.
-
Regulatory Compliance
Many compliance standards and regulations require businesses to implement and maintain certain security controls, such as your firewall. SSG ensures your business stays in compliance with these regulations.
-
24/7
Monitoring
Continuous monitoring and alerting. Generation of critical alerts to your NOC. Suspicious activity is detected, responded to and reported immediately, keeping you informed and limiting the potential damage and mitigation.
-
Proactive Threat Detection
SSG's firewall management services monitor incoming and outgoing network traffic for signs of malicious activity and block any suspicious traffic before it can harm your business.
-
MFA Enabled VPN
Multi-Factor Authentication (MFA) is essential for securing Virtual Private Networks (VPNs). It protects against credential theft by requiring additional verification beyond passwords, reduces phishing risks, and ensures consistent security across on-premises and cloud applications. MFA also aids in regulatory compliance and provides valuable insights into device access, enhancing overall security management.
Watchguard Firewall Total Security Licensing
Provides comprehensive security coverage through WatchGuard’s suite of tools, including advanced threat detection, firewall protection, DNS filtering, and antivirus. This service ensures complete network protection with centralized management and regular updates for optimal security.
-
SD-WAN
SD-WAN optimises the routing of network traffic across multiple internet connections, ensuring the best possible performance for all users while maintaining security.
-
Reputation Enabled Defence Service
A powerful, Cloud-based web reputation service that aggregates data from multiple feeds to provide real-time protection from malicious sites and botnets, while dramatically improving web processing overhead.
-
WebBlocker URL Filtering
In addition to automatically blocking known malicious sites, WatchGuard WebBlocker delivers granular content and URL filtering tools to block inappropriate content, conserve network bandwidth, and increase employee productivity.
-
Application Control
Application Control is a subscription service that enables us to monitor and control the use of applications on your network. Application Control uses signatures that can identify and block over 1800 applications.
-
Cloud Sandboxing
Relies on an award-winning next-gen sandbox to detect and stop the most sophisticated attacks including ransomware and zero day threats. Detect and stop the most sophisticated attacks including ransomware, zero day threats, and other advanced malware designed to evade traditional network security defenses, with APT Blocker.
-
DNS Filtering
Prevent phishing and reduce malware infections by detecting and blocking malicious DNS requests, redirecting users to a safe page with information to reinforce security best practices.
-
Network and Endpoint Threat Correlation
Unify network security and endpoint security capabilities to detect more threats and prevent potentially infected machines from introducing malware to the broader network with ThreatSync, WatchGuard’s XDR Solution.
-
Report Data Retention
30 Days of report data retention.
-
Intrusion Peventation Service (IPS)
A powerful, Cloud-based web reputation service that aggregates data from multiple feeds to provide real-time protection from malicious sites and botnets, while dramatically improving web processing overhead.
-
Network
Discovery
A subscription-based service for Firebox appliances that generates a visual map of all nodes on your network, making it easy to see where you may be at risk. It helps ensure only authorised devices are connected while detecting all open ports and protocols.
-
spamBlocker
Real-time, continuous, and highly reliable protection from spam and phishing attempts. WatchGuard spamBlocker is so fast and effective, it can review up to 4 billion messages per day, while providing effective protection regardless of the language, format, or content of the message.
-
Gateway Antivirus (GAV)
Gateway AntiVirus operates with the SMTP, IMAP, POP3, HTTP, FTP, Explicit, and TCP-UDP proxies. When a new attack is identified, the features that make the virus unique are recorded. These recorded features are known as the signature. Gateway AntiVirus uses signatures to find viruses when content is scanned by the proxy.
-
AI-Powered Anti-Malware
Automate malware discovery, and classify current and future threats in mere seconds with AI-powered IntelligentAV.
-
eXtended Detection & Response
The eXtended Detection and Response concept, or XDR, is a SaaS tool that extends an enterprise's threat detection and response capabilities while providing a simpler view of threats in a single interface.
-
Log Data Retention
365 Days of retention for access and traffic logs.
Remote Monitoring & Management (RMM)
Provides proactive, real-time monitoring of IT infrastructure, identifying and resolving issues remotely before they affect operations. RMM ensures system health, performance optimization, and maintenance through continuous oversight and automated remediation.
-
Automated Monitoring
The Automated Monitoring feature ensures that IT administrators have complete visibility into the health and performance of the network and endpoint devices. By setting custom thresholds for various metrics (such as CPU usage, network traffic, or security risks), this feature detects potential issues early, triggering alerts for immediate action. Continuous monitoring enables a proactive approach to managing both security and system performance, reducing the risk of downtime and security incidents. This feature supports the ongoing maintenance and stability of business-critical infrastructure.
-
Secure Remote Access
The Secure Remote Access feature allows IT administrators to remotely connect to and troubleshoot endpoint devices from any location. This feature is designed with security at its core, using encryption protocols to protect the integrity and confidentiality of remote sessions. Secure Remote Access allows for real-time troubleshooting and support while maintaining compliance with security standards. It helps reduce the time to resolve issues, increases operational efficiency, and ensures that no unauthorised users can access remote systems.
-
Reporting & Analytics
The Reporting & Analytics feature enables administrators to generate custom reports on various aspects of system health, security incidents, and performance. These reports help track key metrics, assess compliance with regulatory standards, and identify potential risks or inefficiencies within the IT infrastructure. With real-time data and historical insights, this feature allows organisations to take a data-driven approach to improving their overall security posture and operational performance. Reports can be scheduled or generated on-demand, ensuring visibility into all critical areas of the organisation’s IT ecosystem.
-
Antivirus Management
The Antivirus Management feature ensures that all endpoint devices have up-to-date antivirus protection, with IT administrators able to deploy, monitor, and manage antivirus software remotely. This feature allows centralised monitoring of threats detected across the network, ensuring swift action can be taken to mitigate any risks. Automatic updates and scanning help maintain constant protection, reducing the risk of malware infections and keeping systems compliant with security standards.
-
Backup
Monitoring
Backup Monitoring allows IT administrators to monitor the status of backups in real-time, ensuring that critical data is regularly and securely backed up. This feature helps identify and resolve issues that could lead to failed backups, ensuring that businesses can recover data in the event of a hardware failure, cyberattack, or human error. With detailed reports and alerts, administrators are notified of any backup failures, reducing the risk of data loss and ensuring business continuity.
-
Patch
Management
Patch Management ensures that all devices and systems within an organisation receive the latest security updates and software patches. By automating the patching process, this feature minimises the risk of cyberattacks that exploit known vulnerabilities. Administrators can schedule patch deployments to reduce disruption, ensuring that systems remain compliant and secure without impacting productivity. Patch Management also includes detailed reporting to provide visibility into which devices have been updated and any issues encountered during the process.
-
Endpoint Task Automation
Endpoint Task Automation enables administrators to automate regular tasks such as system cleanups, software installations, reboots, and security scans. By scheduling these tasks, IT teams can ensure that systems are always up to date and functioning efficiently without needing constant manual intervention. Automation reduces human error, increases operational efficiency, and ensures that endpoints are maintained according to the organisation’s security policies.
-
Device & Software Management
Device & Software Management provides centralised control over the software and configurations installed on endpoint devices. Administrators can push software updates, uninstall outdated applications, and enforce configuration policies remotely, ensuring all systems are consistently up to date and secure. This feature helps prevent security vulnerabilities caused by outdated software or inconsistent configurations across the network. By automating and controlling the management of devices and software remotely, IT teams can maintain compliance and improve operational efficiency.
-
Auto-Remediation
Fully automate the detection and resolution of endpoint issues such as stopped services, missed reboots, and missing applications with condition-based script deployments.
-
Network
Monitoring
Network Monitoring provides IT teams with real-time visibility into the health and performance of network infrastructure. It tracks traffic patterns, bandwidth usage, and potential security threats, alerting administrators to any unusual activity. This feature helps maintain optimal network performance by quickly identifying and resolving issues before they affect operations. Network Monitoring also assists in preventing security breaches by detecting unauthorised access attempts, malware, and distributed denial-of-service (DDoS) attacks.
Remote Connectivity Redundancy
Ensures uninterrupted access to critical systems by providing a backup solution for remote connectivity. This service mitigates the risk of connectivity failures, ensuring continuous remote access and preventing downtime during outages or disruptions.
-
Universal Compatibility
No device left behind. Seamless support across any Windows, Mac, Linux, or mobile device.
-
Shared
Toolbox
Access and share essential scripts and executables easily during sessions for efficient, collective problem-solving.
-
Advanced Encryption
Solve issues discreetly with a full-featured command center. Execute scripts and command remotely without user interruption.
-
Instant Support Sessions
Create connections with users on devices that are not connected to RMM for instant support.
-
Advanced Machine Management
Master your machines: Manage, maintain, optimize - remotely and seamlessly.
-
Session Recording & Reporting
Gain valuable insights with comprehensive session recordings. Generate detailed reports for improved training, analysis and accountability.
-
Backstage
Advanced encryption and security protocols for total protection.
Vulnerability Management
Regularly identifies, assesses, and mitigates vulnerabilities across your network and systems. This service helps to minimize security risks by conducting continuous scans and providing actionable reports to address potential weaknesses before exploitation.
-
Internal Network Scanning
Full network vulnerability scans to run on schedule to ensure all network assets are regularly scanned and managed to reduce risk. Scanning is acheived from on-site network scanners, remote internal scanners that you host, as well as individual lightweight discovery agents for Windows machines.
-
Actionable Remediation
Accurate risk scoring based on severity provides expert issue remediation guidance and known solutions available to further speed up issue fixes.
-
Automatic Service Ticket Creation
Save time and ensure remediation can be assigned properly and tracked in PSA systems. VulScan can automatically create tickets for discovered issues and vulnerabilities in Autotask, BMS, ConnectWise and other PSAs. Create tickets for all issues or just those selected during the review process. Further filter results by severity to get the right resources working on the right issues.
-
Alerts & Report
Alerts and report output from your vulnerability scans quickly and easily. Custom filters to focus on the assets you want to include, while screening out issue types, users and CVSS ranges that should be ignored.
-
Multi-Tenant Vulnerability
At Six Star Global, we utilize VulScan's multi-site feature to oversee the entire portfolio of client properties, allowing us to monitor individual threats across all networks. This comprehensive scope provides us with enhanced visibility, enabling us to track potential coordinated or large-scale network attacks and proactively respond to emerging security threats.
-
Vulnerability Noise Management
Reduce alert noise from repeating vulnerabilities by marking them as addressed, false positives or addressed to remove them from dashboards, reports and from future notifications. Multiple criteria can be set, including start and end dates, for greater flexibility when suppressing issues and ensuring that only the important and desired vulnerabilities are presented.
-
Additional Power Features
Customize vulnerability scan tasks to target specific IP ranges and TCP and UDP ports during different scans. Run authenticated scans on accounts with credential-secured network endpoints, including computer systems or network devices via SNMP. Attach multiple scanners to the same network to divide the workload and reduce scan time. Scan by IP address, domain name or hostname.
Penetration Testing (Annual)
Simulates real-world attacks on your network to identify and exploit vulnerabilities. This service provides a comprehensive assessment of your security posture, delivering actionable insights to improve defenses and mitigate risks.
-
On-Demand Risk Management
Traditional assessments only allow us to demonstrate a point-in-time snapshot of the environment on-demand for audits, post-threat detection, or for compliance verification. Our solution enables on-demand risk management by allowing organizations to perform a full-scale network penetration tests with a few clicks. The platform measures the effectiveness of compensating controls through its exploitation techniques while minimizing risk through the implementation of compensating controls.
-
Real-Time Penetration Test Progress Reporting
Our progress tracker ensure that your IT team knows exactly what the progress is of the engagement, when it’s expected to be completed, as well as any preliminary findings that we’ve identified. Your team will always know when and what activities are taking place.
-
Egress Filtering Testing
Automatically perform egress filtering to ensure that your organization is effectively restricting unnecessary outbound traffic. Unrestricted outbound access can allow a malicious actor to exfiltrate data from your organization’s environment using traditional methods and unmonitored ports.
-
Privilege Escalation & Lateral Movement
Using a valid set of credentials, vPenTest will attempt to identify valuable areas within your organization. This is conducted through a variety of methods, including the use of Vonahi’s Leprechaun tool which assists in identifying where sensitive targets are.
-
Simulated Malware
With elevated access, the system will attempt to upload malicious code onto remote systems in an attempt to test the organization’s end-point anti-malware controls.
-
Additional On-Demand Testing
For an additional fee, with Penetration Testing (Annual), we can provide on-demand testing after attempted breaches or when required by auditors, owners, or Insurance providers etc.
-
Compliance Readiness
With this solution, meet compliance requirements with more scheduling flexibility and real-time alerts. We provide more flexibility in schedule, alerting, real-time activity tracking, as well as segmentation testing to confirm isolation of sensitive networks. In addition to ensuring compliance readiness, vPenTest also tests for security deficiencies that deviate from security best practices.
-
Activity Log
To maximise the value of our penetration tests, we include an activity log that monitors all activities performed during the penetration test. Network teams can correlate our activities with their SIEM and incident response procedures. Every engagement is essentially a purple team assessment.
-
Authentication Hacks
Upon the discovery of user account credentials, vPenTest will automatically attempt to validate those credentials and determine where they are most useful. This is a common process executed by both malicious attackers and penetration testers and is performed during privilege escalation.
-
Data Exfiltration
Critical data leaving your organization is an extremely serious concern. If access to confidential and/or sensitive data can be attained, vPenTest will simulate and log this activity to help your organization tighten areas that should restrict data exfiltration.
-
Timely Reporting
The system generates an executive summary, technical and vulnerability report within 48 hours after the penetration test is complete. Our detailed deliverables will allow your network staff to cross reference our activities with monitoring and alerting controls.
Network Risk Assessment
A full set of Reports that evaluate the overall security and performance of your network, identifying potential risks and weaknesses. This service provides in-depth analysis and recommendations to strengthen your network infrastructure and reduce security vulnerabilities.
Executive
Infographics
Cloud
Network
Vulnerabilities
Exchange
SQL Server
-
Consolidated Risk Report
This report presents a combined view of risk across the IT infrastructure based upon a number of unique scans performed including, Network, Security, Cloud, Microsoft Exchange, and Microsoft SQL Server scans. It also incorporates charts and graphs from the separate focused Risk Reports. This report is great for initial presentation of overall risks, especially to non-technical stakeholders.
Best Uses : Overall presentation of all identified risks; Executive level deliverable
-
Consolidated Security Report Card
This report presents an intuitive computer-by-computer view including a grade for overall security health as well as individual grades, including assessment of antivirus, local firewalls, critical patches, and OS support. Use it to get a quick “read” on problem machines.
Best Uses : Report card on computer security; graphical depiction of security posture.
-
Cyberattack Risk Assessment
The Cyber Attack Risk Assessment process involves running a security analyzer on a sample number of computers. It then simulates the behavior of malware to assess the security posture of individual computers. This report presents the results of the scan in an executive level presentation used to quickly communicate the security posture of an environment. The process is quick and easy to implement since it runs in a self-serve mode that only requires the sample users to click a link to begin the assessment. It is the most efficient process for assessing and discovering issues in an unknown environment.
Best Uses : Rapid assessment of security posture; assessment of an unknown environment
-
Executive Summary
One pager summarizing criticality of issues in various categories, including network, hardware, software, security, passwords, SQL Server, Microsoft Cloud, Microsoft Teams, and Microsoft Exchange. Also includes the overall Issue Score and potential data breach liability (from personal data scan).
Best Uses : Stakeholder presentation of overall infrastructure risk.
-
Dark Web ID Scan Summary
This one pager combines data from Dark Web ID with password change information showing compromised credentials along with remediated risks where passwords have been changed since detected compromises.
Best Uses : Stakeholder presentation of past compromised credentials and analysis of which compromised credentials may still be at risk.
-
Outdated Malware Definitions
One page presentation of computers with out-of-date malware definitions. Contains references to actual systems in the environment.
Best Uses : Stakeholder presentation of risk of out-of-date malware definitions.
-
Password Policies Summary
One page infographic showing violation of common best practices for password policies from a sample set of computers in the environment.
Best Uses : Stakeholder presentation of password policies risks; Password policy hardening project justification.
-
Microsoft Cloud Risk Report
This Risk Report is similar to other Risk Reports such as network, and security except it covers Azure AD and the key Microsoft 365 (formerly Office 365) services. It includes an overall Risk Score, an overall Issues Score, as well as a summary list of issues discovered. The issues come from both the Microsoft controls and other best practices. This Risk Report identifies specific risks that are due to misconfigurations, as well as risks created from turning on or off specific running components.
Best Uses : High level presentation of risks in the Microsoft Cloud and Azure environments for Stakeholders.
-
Azure AD Assessment
The Azure AD Assessment goes through the entire Azure Active Directory environment and documents all organizations, domains, and configuration. This report provides details on the users, devices, cloud applications, contacts, distribution list, proxy addresses, Microsoft service plans and SKUs being used, groups, users, permissions, devices, and more. The report is organized by section with a table of contents to help you locate the specific findings of interest, and problem areas are conveniently highlighted in red, making it easy to spot individual problems to be rectified.
Best Uses : Cloud Assessment, Technical Documentation, Azure AD/Microsoft Entra ID cleanup.
-
Outlook Mail Activity Report
The Outlook Mail Activity Report provides high-level trending on Outlook usage. Trends are broken down by emails sent and received as well as by identifying power users (most active senders and receivers).
Best Uses : Ongoing review of Outlook usage; Power user identification; Identification of defunct/unused mailboxes.
-
Microsoft Teams Assessment
The Microsoft Teams Assessment provides both a summary view listing all Teams, as well as detailed information on individual Teams, including owners, members, channels, tabs, and settings.
Best Uses : Ongoing review of Team use and proliferation; Microsoft Teams cleanup; Insecure and misconfiguration detection.
-
Amazon Assessment Change Report
The Amazon Assessment Change Report mirrors the Amazon Web Services Assessment but focuses on changes. Adds, changes, and deletes are noted by AWS service and configuration.
Best Uses : Ongoing review of AWS services and configuration changes; Change management and documentation.
-
Network Management Plan
This report presents risks identified in the network in a single Management Plan. Identified issues are sorted from highest to lowest, providing a prioritized list of issues to remediate. Details on affected devices and users are included allowing remediation. When compared to prior scans, remediated issues are shown with strikethroughs, allowing communication of remediation efforts.
Best Uses : Remediation planning; provided to technicians for remediation; demonstration of remediation efforts.
-
Network Assessment PowerPoint
Use our quick and simple one-button Power Point generation to create a presentation of important network results and findings. Slides also include the Risk and Issue score, specific recommendations, and next steps. Apply any Office theme to the presentation.
Best Uses : Presentation to stakeholders.
-
Asset Detail Report
This report provides detailed information on each of the individual assets discovered by Network Detective Pro. Details include settings and configurations for individual workstations and servers, including details on Windows, Mac, and Linux devices, as well as printers and network devices.
Best Uses : Technical documentation, Asset review.
-
Quarterly Business Review
This report compares the findings and trends from one assessment to another. While the suggested period is quarterly, other time-frames are also available for comparison (weekly, semi-annually, annually). The report includes key metrics, documentation of changes in assets, addressed issues, current issues, as well as the IT SWOT analysis. A “notes” section is left as a placeholder for proposing an action plan.
Best Uses : Quarterly review with stakeholders, trend and remediation reporting
-
Windows Service Accounts
This report identifies the Windows Services and the computers they are running on attached to both Domain and non-Domain accounts. A common misconfiguration is employing user accounts to run critical Windows Services. When these accounts are disabled or removed, the attached services cease to function. This report identifies account dependencies by Windows Services.
Best Uses : Documentation, risk mitigation, dependency identification.
-
Layer 2/3 Diagram Image
10-megapixel PNG image of the complete Layer 2/3 diagram. The image can be used for documentation, displayed, or incorporated into other documents.
Best Uses : Documentation
-
Datto BCDR/Unitrends BDR Needs Analysis
This report shows the results of a BDR needs analysis, an automated evaluation that quickly scopes out the on-premises back-up requirements for any existing or prospective environment. In addition to the standard needs analysis, this report also includes the recommended Datto or Unitrends appliance based on the recommended and minimum storage needs
Best Uses : Backup solution requirements identification, presentation to stakeholders, proposals
-
Security Risk Report
This Security Risk Report is similar to other Risk Reports such as the Network Risk Report except that it focuses on security related issues. It includes an overall Risk Score, an overall Issues Score, as well as a summary list of issues discovered. This Risk Report identifies specific risks that are due to misconfigurations and violations of best practices.
Best Uses : High level presentation of security risks in local networks for Stakeholders.
-
Security PowerPoint
Use our quick and simple one-button Power Point generation to create a presentation containing the results of the Security Assessment. Slides provide general information, the Risk and Issue score, along with specific issue recommendations and next steps. Apply any Office theme to the presentation.
Best Uses : Presentation to stakeholders
-
Outbound Security Report
An often-missed area of network security relates to protection against egress (data leaving the internal network). This report looks for violations of best practices related to blocking system protocols, insecure protocols, and content filtering related to outbound connections.
Best Uses : Identification of outbound risk allowing for remediation and presentation to stakeholders of outbound risks.
-
Share Permission by Computer Report
This report is organized by computer and shows all network shares on the computer and shows network and file permissions by user groups. The report is beneficial during security reviews to ensure minimal access rights and to identify misconfigured share permissions.
Best Uses : Identification of misconfigured shares, forensic investigation, documentation.
-
Anomalous Login Report
This report uses the latest in data science to identify suspicious logins using various dimensions. Whether it is identification of users logging into computers they normally don’t log into, or suspicious logins based on normal user behaviour patterns, this report helps prioritise investigations of suspicious logins and can be incorporated as part of a security review process.
-
Login Failures by Computer Report
This report shows all failed logins by computer within the past 1, 7, and 30 days. It can be used to identify malicious and suspicious behaviour or automated processes where credentials are no longer valid.
Best Uses : Security review, system administration.​
-
Login History by Computer Report
This report is organized by computer and shows all users who access resources on the computer. Logins are organized by interactive (at the keyboard), remote interactive (through remote desktop, remote assistance, or terminal service protocols), and network (through access network shared system resources, such as a shared folder). This report is especially useful in identifying users who rely on a particular system and is used for risk identification, migrations, and other system life cycle activities.
Best Uses : Identification of users for critical resources, association of user to computer resources.
-
External Network Vulnerabilities Summary Report
This report provides a priority ordered listing of issues by CVSS that allows technicians to prioritize the issues they are working on. It provides an extremely compact view of detected external networking vulnerabilities. The report is used with the limited external vulnerability scan in Network Detective or used to output results from VulScan’s external vulnerability scans.
Best Uses : Vulnerability Management, remediation planning, presentation to stakeholders.
-
External Vulnerability Scan Detail by Issue Report
A more compact version of the External Vulnerability Scan Detail report organized by issues. Devices affected are listed within an issue. For remediation, this report is used when remediating issues on an issue-by-issue basis. This report is useful for technicians that are looking to resolve issues, rather than performing remediation on a particular system.
Best Uses : Vulnerability Management, remediation planning.
-
Exchange Management Plan
This report presents Microsoft Exchange server risks identified in the local on-premise Exchange server or in the Microsoft 365 cloud in a single Management Plan. Identified issues are sorted from highest to lowest, providing a prioritized list of issues to remediate. Details on affected devices and users are included allowing remediation. When compared to prior scans, remediated issues are shown with strikethroughs, allowing communication of remediation efforts.
Best Uses : Remediation planning; provided to technicians for remediation; demonstration of remediation efforts.
-
Exchange Assessment PowerPoint
Use our quick and simple one-button Power Point generation to create a presentation containing the results of the Exchange Assessment. Slides provide general information, the Risk and Issue score, along with specific issue recommendations and next steps. Apply any Office theme to the presentation.
Best Uses : Presentation to stakeholders.
-
Mobile Device Report
This report is organized by user and identifies the mobile devices that have connected to the Exchange Server, whether on-premise or in the cloud. It lists the mobile devices along with the last time they synced to the Exchange Server and what mobile policy is applied. The report is used in MDM deployment projects as well as provide a convenient means for review of mobile device usage and policy review.
Best Uses : Mobile policy review and assurance, MDM deployment projects, documentation.
-
Shared Mailbox Permission
This report shows which users have access to the shared mailboxes. It details all users and groups that can access shared mailboxes along with their access rights and permission inheritance rules. The report is used for access rights review and to assure users and groups that are not meant to have access to shared mailboxes are properly restricted.
Best Uses : Share mailbox access rights review.
-
SQL Server Detail Report
This report details the settings and health of the SQL Server as a whole. It looks at settings, configuration, performance, and backup. Detailes by individual databases can be found in the Database Detail report.
Best Uses : Recurring SQL Server health review, Documentation
-
Database Detail Report
This report details the settings and health of individual databases that reside on the scanned SQL Server. It lists the database properties, potentially missing indexes, locks, statistics, fragmentation, and existing indexes. This report helps identify opportunities to improve performance and anticipate issues based on trends.
Best Uses : Recurring SQL Server health review, Documentation.
-
Maintenance Plan Report
This report details all maintenance plans and their sub-plans. Maintenance plans perform routine tasks on your SQL Server. Not all maintenance plans are active and in-use, and you can use the report to document what is in place, when it was last run, and if it was run successfully. This report is useful for reviewing established plans, detecting errors, and evaluating the need for additional automation.
Best Uses : Recurring SQL Server health review, Documentation.
-
Consolidated Management Plan
This report presents a combined view of issues impacting the IT infrastructure based upon scans performed including Network, Security, Cloud, Microsoft Exchange, and Microsoft SQL Server scans. Identified issues are scored and then sorted from highest to lowest to prioritize remediation depending on severity and potential impact to the network. Detailed information on affected devices and users is also included to help with remediation. When compared to prior scans, remediated issues are shown with strikethroughs to show that they are no longer a threat. This also provides confirmation and communication of resolution to other IT stakeholders.
Best Uses : Triage and remediation planning; provided to technicians for remediation; demonstration of remediation efforts.
-
Client Progress Report
This highly graphical report shows changes and trends over time with a strong focus on security posture and issue remediation, enabling clear communication of remediation efforts and trends to stakeholders.
Best Uses : Monthly/quarterly reporting; trend reporting
-
Microsoft Cloud Security Assessment
This report presents the Microsoft Secure Score and Control Score issues in a consolidated high-level view, including score trends over time with comparison to scores from similar environments. It also includes the most recent security alerts detected in the Microsoft Cloud.
Best Uses : Presentation to stakeholders, trend reporting.
-
Compliance Baseline Assessment Summary
Utilizing data from Compliance Manager GRC, this one pager graphically depicts compliance with selected compliance regulations and security frameworks.
Best Uses : Stakeholder presentation of current compliance posture.
-
Data Breach Liability Summary
One pager presentation of the results from personal data and PII scans.
Best Uses : Stakeholder presentation of risks of a data breach.
-
Outdated Operating Systems
Single page infographic on risks of out-of-date operating system. Contains references to actual systems in the environment.
Best Uses : Stakeholder presentation of risks of out-of-date operating system; Operating system refresh project justification.
-
Server and Workstations Aging Report
Graphical representation of server and workstation aging depicting potential high-risk computers based on age.
Best Uses : Stakeholder presentation of server and workstation aging risks; Server/workstation refresh project justification.
-
Vulnerability Scan Assessment Summary
Presents results from VulScan vulnerability scans in a single page infographic.
Best Uses : Stakeholder presentation of vulnerabilities based on CVSS score and other findings.
-
Microsoft Cloud Management Plan
The Management Plan takes issues identified in the Risk Report, organizes them by severity, and includes specific recommendations on how to remediate them. The report includes risks related to Microsoft Secure and Control Score as well as from multiple Microsoft 365 services, including SharePoint, OneDrive, Teams, and Azure AD.
Best Uses : Remediation planning; provided to technicians for remediation; demonstration of remediation efforts.
-
Configuration Change Report
The Configuration Change Report shows recent configuration changes in Microsoft Cloud and cloud applications. This report gives you the ability to look at a group of changes together, as well as see how all the properties have changed for a specific time period. This is useful for change management and for capturing and documenting changes in the event you need to roll back those changes in the user interface.
Best Uses : Ongoing review of configuration changes; Change documentation
-
OneDrive Usage Report
The OneDrive Usage Report provides high-level trending on OneDrive usage. Trends are broken down by total files, active file, and storage use.
Best Uses : Ongoing review of One Drive usage; One Drive storage needs projection; Usage spike identification.
-
SharePoint Assessment
The SharePoint Assessment documents the SharePoint collections, sites and usage in the Microsoft Cloud environment.
Best Uses : Ongoing review of SharePoint site proliferation; SharePoint cleanup
-
Amazon Web Services Assessment
The Amazon Web Services Assessment documents enabled services and detailed configuration information from various AWS services, including IAM, VPC, EC2, RDS and S3.
Best Uses : Technical Documentation; AWS configuration and service use review.
-
Network Risk Report
"This Risk Report is similar to other Risk Reports such as network and security, except it covers on-premise Active Directory and results from the local area network scan. It includes an overall Risk Score, an overall Issues Score, as well as a summary list of issues discovered. This Risk Report identifies specific risks that are due to misconfigurations and violations of best practices.
Best Uses : High level presentation of risks in local networks and Active Directory for Stakeholders"
-
Full Detail Report
The Full Detail Report provides a complete assessment and documentation of Active Directory and Workgroup environments. Every aspect of the network from servers, workstations, users, groups, printers, network shares, applications, patching, to Internet access and speed test are documented in this detailed report.
Best Use For MSP : Selling Network Assessment; Offer “free” network assessment as part of an outbound marketing program.
Best Uses : Network assessment, Technical documentation.
-
Full Detail Change Report
The Full Detail Change Report mirrors the Full Detail Report but instead focuses on changes to the environment. Adds, changes, and deletes are noted per item.
Best Uses : Ongoing review of network and configuration changes; Change management and documentation
-
IT SWOT Analysis
Present your findings in an IT SWOT (Strength, Weakness, Opportunity, Threat) Analysis. By using the SWOT feature of our InForm questionnaire, findings can be categorized as strengths, weaknesses, opportunities, or threats. Key findings can also be noted. This report provides an intuitive visual way to present various findings of an assessment.
Best Uses : Stakeholder presentation of overall findings
-
Windows Patch Assurance Report
This report shows missing patches on computers in the network. The report assures the effectiveness of a patch management program or can be used operationally to identify systems that need to be patched.
Best Uses : Patch assurance, patch management.
-
Layer 2/3 Diagram Report
Layer 2/3 is collected during the network scan and documents network devices connections uses SNMP and other protocols. It collects both connection at Layer 3 (Network) and Layer 2 (Data Link) and allow creation of a diagram showing the interconnections between devices.
-
BDR Needs Analysis
This report shows the results of a BDR needs analysis, an automated evaluation that quickly scopes out the on-premises back-up requirements for any existing or prospective environment. The report includes a recovery time calculator, and summary information on servers and workstations.
Best Uses : Backup solution requirements identification, presentation to stakeholders, proposals.
-
Datto BCDR/Unitrends BDR Needs Assessment PowerPoint
PowerPoint presentation : Use our quick and simple one-button Power Point generation to create a presentation containing the results of the Datto BDCDR or Unitrends BDR Needs Assessment, including appliance recommendations. Apply any Office theme to the presentation.
Best Uses : Presentation to stakeholders, proposals.
-
Security Management Plan
This report presents security risks identified in the network in a single Management Plan. Identified issues are sorted from highest to lowest, providing a prioritized list of issues to remediate. Details on affected devices and users are included allowing remediation. When compared to prior scans, remediated issues are shown with strikethroughs, allowing communication of remediation efforts.
Best Uses : Remediation planning; provided to technicians for remediation; demonstration of remediation efforts.
-
Data Breach Liability Report
This report presents the results of deep file scans, which scan user and server files looking for instances of personal identifiable information (PII) and cardholder data throughout a computer network. This PII is often the target of hackers and malicious insiders. The report also calculates the potential monetary liability and exposure based upon industry published research.
Best Uses : Presentation to stakeholder of quantifiable risk, identification of sources of PII and cardholder data to allow remediation.
-
Share Permission by User Report
This report, organized by user, shows all network shares the user has access to, including the computer on which the share is hosted and access level (i.e., full versus read-only). The report is beneficial during security reviews to ensure minimal access rights and to identify misconfigured share permissions.
Best Uses : Identification of misconfigured shares, forensic investigation, documentation.
-
Security Policy Assessment Report
This report compares the local security policy settings of the sampled systems during a security assessment. It helps safeguard that policies are properly configured and consistent. The report provides details on variations of policies in the network and is grouped into large policy categories, including account, password, audit, user rights, and security options.
Best Uses : Local security policy review, documentation.
-
User Behaviour Analysis
This report is organized by user and identifies which computers the user has logged into in the past 24 hours, 7 days, and 30 days. Logins are organized by interactive (at the keyboard), remote interactive (through remote desktop, remote assistance, or terminal service protocols), and network (through access network shared system resources, such as a shared folder).
Best Uses : Security review, forensics.
-
RSOP Computer Settings Report
This report analyzes the various Resultant Sets of Policy (RSOP) based on user settings on computers in the environment and helps point out commonalities in the sets and which users / computer combinations have the configurations applied. The report is useful for identifying potential misconfigurations and configuration deviations.
Best Uses : Identification of local security policy deviations from GPO settings, documentation
-
External Vulnerabilities Scan Detail Report
This report provides detailed vulnerability descriptions, including CVSS scores and remediations, by external IP address. The report is used with the limited external vulnerability scan in Network Detective or used to output results from VulScan’s external vulnerability scans. This report provides a priority ordered listing of issues by CVSS that allows technicians to prioritize the issues they are working on. It also provides an extremely compact view of detected external networking vulnerabilities. For remediation purposes, this report is used when fixing issues on a computer-by-computer basis. The report is used with the limited external vulnerability scan in Network Detective or used to output results from VulScan’s external vulnerability scans.
Best Uses : Vulnerability Management, remediation planning.
-
Exchange Assessment –
Risk Report
This Risk Report is similar to other Risk Reports in Network Detective, except it covers Microsoft Exchange and hosted Microsoft 365 Exchange oriented risks. It includes an overall Risk Score, an overall Issues Score, as well as a summary list of issues discovered. This Risk Report identifies specific risks that are due to misconfigurations and violations of best practices.
Best Uses : High level presentation of risks in local networks and Active Directory for Stakeholders
-
Mailbox
Detail
Report
This report presents details on each identified mailbox during the Microsoft Exchange scan against on-premise Exchange Servers and Microsoft 365 cloud environments. It includes detailed documentation of mailbox properties, user properties, mailbox statistics, Client Access Server settings, as well as listing mailbox folders and utilization. This report is used prior and after migration to ensure configurations are consistent. It can also be used in the event of a disaster to document and ensure mailbox settings are properly configured
Best Uses : Migration, disaster recovery, documentation.
-
Distribution
Lists
Most organizations routinely create email distribution groups - both for internal communications and for routing incoming emails to multiple individuals at the same time. This report identifies and lists all distribution groups as well as which end-users or other groups are to receive any emails. The report provides a convenient way to review distribution lists on a regular basis, ensuring proper membership. It is also used during migrations to ensure lists are documented pre-migration and compared post migration.
Best Uses : Distribution list maintenance, migration, disaster recovery, documentation.
-
Traffic and Use Report
This report shows usage of mailbox storage versus quota by user, highlighting the top 25 power users. It also contains mailbox retention policy configuration and Outlook Web Access (OWA) usage. The report is useful for identifying users or unmonitored mailboxes that may be approaching capacity, which would prevent successful mail delivery
Best Uses : Mailbox use review, Retention policy review.
-
Shared Mailbox Permission by User
This report is similar to the Shared Mailbox Permission report but is organized by users and groups. It details which shared mailboxes the user or group has access to along with their access rights and permission inheritance rules. This report is used for auditing if a group or user should have access to the listed mailboxes.
Best Uses : Share mailbox access rights review.
-
SQL Server Health Report
This report assesses the health of the SQL Server using three major categories. These include settings, file, and resources. Setting health looks for configuration issues that may go against prescribed best practices. File health looks at how the database interacts with the file system, looking for adequate space and compares the current configuration versus best practices. Resource health looks to ensure adequate resources are available to operate the SQL Server optimally and looks for indicators pointing to performance issues. Resource health comprises of three sub-categories – wait health, task health, and memory health. Wait health deals with issues with database processing waits and delays. Task health validates that scheduled tasks and jobs are working optimally. Memory health looks to ensure adequate memory is available to run the SQL Server properly.
Best Uses : Recurring SQL Server health review, Presentation to stakeholders.
-
SQL Server Agent Jobs Report
This report details SQL Server Agent Jobs used for automation and maintenance. As a part of periodic SQL Server health reviews, the agent job history should be reviewed. Errors are highlighted in RED allowing for quick review and identification of issues. The report also documents the steps and schedules in each agent job.
Best Uses : Recurring SQL Server health review, Documentation.
Automated Compliance Monitoring
Ensures continuous adherence to relevant regulatory and industry standards such as GDPR, PCI DSS, and ISO 27001. This service provides automated monitoring, reporting, and real-time alerts to maintain compliance and mitigate risks.
-
Built-in Management Templates for Common Standards & Frameworks
Provides regulations and controls to assess common standards including HIPAA, NIST CSF, CMMC, NY DFS, Cyber Liability Insurance, GDPR, Cyber Essentials, Essential 8, with more being added on a regular basis.​
-
Track Common Controls Across Multiple Standards
Control sets from multiple standards can be tracked and managed together. Saves time and allows multiple controls to be assessed and documented at the same time.
-
Policies & Procedures Selection and Generation
Dynamically builds a customised policies and procedures manual for each standard managed. ​
-
Self-Serve Portal
​Any Person with an assessment question to answer, or task to do, can access a personal “My Work” portal to access the task.
-
Built-in End-User Training, Tracking & Reporting​​
Ensures and documents that all employees have completed the training as part of the compliance requirements.​
-
Customizable Libraries of Controls, Requirements, and Standards
New feature allows IT professionals – whether they are MSPs or work in IT Departments – to quickly assess their level of compliance with whatever set of IT requirements they specify.
-
Automated Data Collection​
There are automated data collectors for the LAN, Cloud and individual computers that gather detailed information to be used in the technical assessment.​​
-
Automated Report Generation
Automatically generates a dynamic set of evidence of compliance and reports for every standard, regulation and security program you manage.
-
3rd Party Vendor Assessments & Compliance
Includes a “self-service” vendor risk management portal that makes it easy for third parties to complete assessments against any standards you pick​​
DarkWeb ID Monitoring
Monitors the dark web for compromised credentials and other sensitive data related to your organization. This service provides early detection of potential data breaches, enabling proactive steps to mitigate risks and prevent unauthorized access.
-
Comprehensive, Validated Data
Get valuable intelligence you need to close security gaps with accurate data about your company’s Dark Web credential compromise threats. Get additional protection from unpleasant surprises with credential monitoring for your supply chain and for the personal email addresses of your executive and administrative users, reducing the risk from cybercriminals gaining access to a privileged account.
Dark Web ID delves into every corner of the Dark Web, including:
-
Hidden chat rooms
-
Unindexed sites
-
Private websites
-
P2P (peer-to-peer ) networks
-
IRC (internet relay chat) channels
-
Social media platforms
-
Black market sites
-
640,000+ botnets
-
Alerting
Seamless integration with Six Star Manage ensures alerts are picked up by the Security Operations Team in realtime.
-
Reporting
Reporting is flexible and can be integrated with the security operations center (SOC)
Configuration Management Database
Maintains a centralised repository of all your IT assets and configurations. This service helps in tracking, managing, and controlling hardware, software, and network resources, ensuring accurate documentation and efficient resource management.
-
Comprehensive Configuration Syncing with Automated Updates
Realtime status monitoring of your device encryption ensures there are no 'weak spots' within your portfolio.
-
Centralised Repository
All configuration details are stored securely in ITGlue, categorized in an organized, searchable format. This makes it easy for our team to find and manage the information quickly, ensuring efficient issue resolution.
-
Accessible and Reliable Documentation
The CMDB is structured with your needs in mind, ensuring that critical details such as IP addresses, warranty information, and vendor contracts are always up to date.
-
Third-Party Integrations
ITGlue integrates seamlessly with our tools, including your monitoring, ticketing, and RMM systems. This means all critical information is synced and accessible in one place, without manual data entry.
-
Version Control and Auditing
We track all changes made to configuration data and maintain version histories. This ensures that every modification is fully documented, providing transparency and accountability.
-
Disaster Recovery Ready
All your essential IT assets and configuration data are documented and stored, so in case of a system failure or emergency, we can restore your environment quickly and accurately.