Network Detective Network Assessment Module Quick Start Guide

39
QUICK START GUIDE Network Assessment Module Instructions to Perform a Network Assessment 2/25/2022 4:54 PM

Transcript of Network Detective Network Assessment Module Quick Start Guide

Page 1: Network Detective Network Assessment Module Quick Start Guide

QUICKSTARTGUIDENetworkAssessmentModuleInstructions to Perform aNetwork Assessment

2/25/2022 4:54 PM

Page 2: Network Detective Network Assessment Module Quick Start Guide

2

Contents

Performing a Network Assessment 3

Network Assessment Overview 3What YouWill Need 3

Network Prerequisites for Network Detective Scans 4

Step 1—Download and Install the Network Detective 5

Step 2—Create a New Site 5

Step 3— Start a Network Assessment 7

Step 4— Perform Network Scan Data Collection 8Scanning an Active Directory Domain-based Network 9

Scanning a Workgroup Network 17

Step 5—Use the Push Deploy Tool to Collect Remaining Data 25

Step 6— Import Scans into Network Detective App 30

Step 7—Generate Network Assessment Reports 33

Network Assessment Reports 34

Standard Reports 34

Infographics 38

Change Reports 38

Network Detective Network Assessment Module —Quick Start Guide

Page 3: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

3

Performing a Network Assessment

Network Assessment OverviewThe Network Assessment Module gives you the broadest insights of any IT assessmentmodule. The Network Assessment Module has many every day uses for your MSP,including:

l Conducting full, 'deep-dive' network assessmentsl Documenting your customers' networks as part of regular "Technology Reviews"l Generating change management reports for clientsl Conducting IT SWOT Analyses to help your clients make better and more informedbusiness decisions

What YouWill NeedNetworkAssessmentComponent

Description

NetworkDetective

The Network Detective Application and Reporting Tool guides you through theassessment process from beginning to end. You use it to create sites andassessment projects, configure and use appliances, import scan data, andgenerate reports. The Network Detective Application is installed on yourworkstations/laptops; it is not intended to be installed on your client or prospectsites.

NetworkDetective DataCollector

The Network Detective Network Assessment Data Collector (NADC) is a windowsapplication that performs the data collections for the Network AssessmentModule.

Push DeployTool

The Network Detective Push-Deploy Tool pushes the local data collector tomachines in a specified range and saves the scan files to a specified directory(which can also be a network share). The benefit of the tool is that a local scan canbe run simultaneously on each computer from a centralized location.

Network Assessment Module —Quick Start Guide Network Detective

Page 4: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

4

Network Prerequisites for Network Detective ScansFor a successful network scan:

1. ENSURE ALL NETWORK ENDPOINTS ARE TURNED ON THROUGHOUT THE DURATION OFTHE SCAN. This includes PCs and servers. The scan can last several hours.

2. CONFIGURE THE TARGET NETWORK TO ALLOW FOR SUCCESSFUL SCANS ON ALLNETWORK ENDPOINTS. See Pre-Scan Network Configuration Checklist forconfiguration guidance for both Windows Active Directory andWorkgroupenvironments.

3. GATHER THE INFORMATION BELOW TO CONFIGURE YOUR SCANS FOR THE CLIENTSITE.Work with the project Technician and/or your IT admin on site to collect thefollowing:

l Admin network credentials that have rights to use WMI, ADMIN$, and Fileand Printer Sharing on the target network.

l Internal IP range information to be used when performing internal scans.

Note: Network Detective will automatically suggest an IP range to scanon the network. However, you may wish to override this or excludecertain IP addresses.

l External IP addresses for the organisation to be used when setting upExternal Vulnerability Scans.

l Network Detective User Credentialsl For Windows Active Directory environments, you will need admin credentialsto connect to the Domain Controller, as well as the name/IP address of thedomain controller.

l For WindowsWorkgroup network environments, a list of the Computers tobe included in the Assessment and the Local Admin Credentials for eachcomputer.

Network Detective Network Assessment Module —Quick Start Guide

Page 5: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

5

Follow these steps to perform a Network Assessment.

Step 1—Download and Install the Network DetectiveGo to www.rapidfiretools.com/nd to download and install the Network Detectiveapplication on a PC on the MSP network. Then run Network Detective and log in with yourcredentials.

Step 2—Create a New SiteTo create a new site:

1. Open the Network Detective Application and log in with your credentials.2. Click New Site to create a new Site for your assessment project.

Network Assessment Module —Quick Start Guide Network Detective

Page 6: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

6

3. Enter a Site Name and clickOK.

Network Detective Network Assessment Module —Quick Start Guide

Page 7: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

7

Step 3— Start a Network Assessment1. From within the Site Window, select the Start button that is located on the far right

side of the window to start the Assessment.

Next, select the Network Assessment option presented.

Then follow the prompts presented in the Network Detective Wizard to start thenew Assessment.

2. Once the new Network Assessment is started, a “Checklist” is displayed in theAssessment Window presenting the “Required” and “Optional” steps that are tobe performed during the assessment process. Below is the Checklist for aNetwork Assessment.

Network Assessment Module —Quick Start Guide Network Detective

Page 8: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

8

3. Complete the required Checklist Items and use the Refresh Checklist feature toguide you through the assessment process at each step until completion.

You may also print a copy of the Checklist for reference purposes by using thePrinted Checklist feature.

Step 4— Perform Network Scan Data CollectionDownload and run the Network Detective Data Collector on a PC on the target network.Use the Data Collector to scan the target network.

1. Visit the RapidFire Tools software download website athttps://www.rapidfiretools.com/nd and download the Network Detective DataCollector.

2. Run the Network Detective Data Collector executable program as anAdministrator (right click>Run as administrator).

Important: For the most comprehensive scan, you MUST run the datacollector as an ADMINISTRATOR.

3. Unzip the files into a temporary location. The Network Detective Data Collector’sself-extracting ZIP file does not install itself on the client computer. 

4. The Network Detective Data Collector Scan Type window will appear.

Configure the network scan using the wizard.

l Look here if you are "Scanning an Active Directory Domain-based Network" on thenext page

Network Detective Network Assessment Module —Quick Start Guide

Page 9: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

9

l Look here if you are "Scanning a Workgroup Network" on page 17

Scanning an Active Directory Domain-based NetworkOnce you run the Data Collector, the Scan Type screen will appear.

1. Select the Network Data Collector option. Click Next.

Note: You can optionally choose to run the Local Computer Data Collector,too, to collect data from the local machine that you are using to run the networkscan.

2. The Active Directory window will appear. Select the type of network you arescanning: Active Directory domain.

Network Assessment Module —Quick Start Guide Network Detective

Page 10: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

10

3. Next enter the network's Fully Qualified Domain Name along with a usernameand password with administrative rights to connect to the local Domain Controllerand Active Directory.

Note: For example: corp.yourprospect.com\username.

4. Enter the name or IP address of the domain controller.5. Click Next to test a connection to the local Domain Controller and Active Directory

to verify your credentials.6. The Local Domains window will appear. Select the Domains to scan. Choose

whether to scan all domains or only specific domains and OUs. Click Next.

Network Detective Network Assessment Module —Quick Start Guide

Page 11: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

11

Confirm your selections if you opt to scan only specific Domains and OUs. ClickOK.

7. The Additional Credentials screen will appear. Enter any additional credentials tobe used during the scan using the fully qualified domain name. For example:corp.yourprospect.com\username. Click Next.

8. The External Domains screen will appear. Enter the name(s) of the organization’sExternal Domains. Click Next.

Network Assessment Module —Quick Start Guide Network Detective

Page 12: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

12

AWhois query and MX (mail) record detection will be performed on the externaldomains.

9. The IP Ranges screen will then appear. The Network Detective Data Collector willautomatically suggest an IP Range for the scan. If you do not wish to scan thedefault IP Range, select it and click Clear All Entries. Use this screen to enteradditional IP Addresses or IP Ranges and click Add.

Network Detective Network Assessment Module —Quick Start Guide

Page 13: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

13

From this screen you can also:

l Click Reset to Default to reset to the automatically suggested IP Range.l Click Import from Text File to import a predefined list or range ofIP addresses.

Important: Scans may affect network performance. Select Perform minimalimpact scan if this is an issue. 

When you have entered all IP Ranges to scan, click Next.

Important: If you are scanning a large number of IP addresses, confirm that youwish to continue.

10. The SNMP Information window will appear. Enter any additional SNMP communitystrings used on the network. Click Next.

Network Assessment Module —Quick Start Guide Network Detective

Page 14: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

14

11. The optional VMware credentials window will appear. Enter the hostnames or IPAddresses of any VMware hosts that you wish to include in the scan. Likewise entercredentials needed to access the VMware hosts. Click Next.

12. The Verify and Run window will appear. Select the folder that you want to store thescan data file in after the scan is completed. You may also change the scan’sOutput Assessment File Folder location and Basename for the scan data.

Network Detective Network Assessment Module —Quick Start Guide

Page 15: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

15

Tip: If you are using a USB flash drive, select a folder on that drive.

The file will be output as a .NDF file.

Tip: Use the Pre-scan Analyzer to identify and correct any configuration issuesprior to running the Network Scan. The Push Deploy tab will indicate whichassets are fully accessible for scanning to ensure a more thorough scan. Pre-scan results and recommendations are provided at the completion of the pre-scan.

Enter any Comments and then click Start.

13. The Collection Progress window will appear. The Network Scan’s status isdetailed in the Collection Progress window. The Collection Progress window

Network Assessment Module —Quick Start Guide Network Detective

Page 16: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

16

presents the progress status of a number of scanning processes that areundertaken.

At any time you can Cancel Data Collection which will not save any data. ByselectingWrap It Up you can terminate the scan and generate reports using theincomplete data collected.

Upon the completion of the scan, the Finish window will appear. The Finishwindow indicates that the scan is complete and enables you to review the scanoutput file’s location and the scan’s Results Summary.

Network Detective Network Assessment Module —Quick Start Guide

Page 17: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

17

Click Done to close the Network Detective Data Collector window. Note thelocation where the scan’s output file is stored.

Scanning a Workgroup NetworkOnce you run the Data Collector, the Scan Type screen will appear.

1. Select the Network Data Collector option. Click Next.

Note: You can optionally choose to run the Local Computer Data Collector,too, to collect data from the local machine that you are using to run the networkscan.

Network Assessment Module —Quick Start Guide Network Detective

Page 18: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

18

2. The Active Directory window will appear. Select the type of network you arescanning:Workgroup).

3. The Scan Credentials screen will appear. Enter additional credentials which canaccess the individual workstations as a local administrator.

Network Detective Network Assessment Module —Quick Start Guide

Page 19: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

19

Important: If each workgroup PC has its own unique Admin username andpassword credentials, you will need to enter each set of credentials here in orderto scan these PCs.

Then click Next.

4. The External Domains screen will appear. Enter the name(s) of the organization’sExternal Domains. Click Next.

Network Assessment Module —Quick Start Guide Network Detective

Page 20: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

20

AWhois query and MX (mail) record detection will be performed on the externaldomains.

5. The IP Ranges screen will then appear. The Network Detective Data Collector willautomatically suggest an IP Range for the scan. If you do not wish to scan thedefault IP Range, select it and click Clear All Entries. Use this screen to enteradditional IP Addresses or IP Ranges and click Add.

Network Detective Network Assessment Module —Quick Start Guide

Page 21: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

21

From this screen you can also:

l Click Reset to Default to reset to the automatically suggested IP Range.l Click Import from Text File to import a predefined list or range ofIP addresses.

Important: Scans may affect network performance. Select Perform minimalimpact scan if this is an issue. 

When you have entered all IP Ranges to scan, click Next.

Important: If you are scanning a large number of IP addresses, confirm that youwish to continue.

6. The SNMP Information window will appear. Enter any additional SNMP communitystrings used on the network. Click Next.

Network Assessment Module —Quick Start Guide Network Detective

Page 22: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

22

Important: As of 9/28/2018, the Microsoft Base Security Analyzer (MBSA) hasbeen removed from the Data Collector. MBSA is in the process of beingdeprecated by Microsoft. Microsoft no longer supports MBSA in newer versionsof Windows (i.e. v10 andWindows Server 2016). MSBA is only useful for earlierversions of Windows (Windows 7, Windows 8, 8.1, and Windows Server 2008,Windows Server 2008 R2, Windows 2012, and Windows 2012 R2). Follow thesteps in this guide and use the Push Deploy Tool as instructed. This willcollect information such as Patch Analysis for all Windows operating systems.

7. The optional VMware credentials window will appear. Enter the hostnames or IPAddresses of any VMware hosts that you wish to include in the scan. Likewise entercredentials needed to access the VMware hosts. Click Next.

Network Detective Network Assessment Module —Quick Start Guide

Page 23: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

23

8. The Verify and Run window will appear. Select the folder that you want to store thescan data file in after the scan is completed. You may also change the scan’sOutput Assessment File Folder location and Basename for the scan data. Thefile will be output as a .NDF file.

Tip: Use the Pre-scan Analyzer to identify and correct any configuration issuesprior to running the Network Scan. The Push Deploy tab will indicate which

Network Assessment Module —Quick Start Guide Network Detective

Page 24: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

24

assets are fully accessible for scanning to ensure a more thorough scan. Pre-scan results and recommendations are provided at the completion of the pre-scan.

Enter any Comments and then click Start.

9. The Collection Progress window will appear. The Network Scan’s status isdetailed in the Collection Progress window. The Collection Progress windowpresents the progress status of a number of scanning processes that areundertaken.

At any time you can Cancel Data Collection which will not save any data. ByselectingWrap It Up you can terminate the scan and generate reports using theincomplete data collected.

Network Detective Network Assessment Module —Quick Start Guide

Page 25: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

25

Upon the completion of the scan, the Finish window will appear. The Finishwindow indicates that the scan is complete and enables you to review the scanoutput file’s location and the scan’s Results Summary.

Click Done to close the Network Detective Data Collector window. Note thelocation where the scan’s output file is stored.

Step 5—Use the Push Deploy Tool to Collect RemainingData

Tip: The Push Deploy Tool performs a localized scan on each workstation on thetarget network. Perform this required step to gather maximum data for the mostdetailed reports.

Download and run the Push Deploy Tool on a PC on the target network. Use it to performlocal data scans on all computers.

1. Visit the RapidFire Tools software download website athttps://www.rapidfiretools.com/nd and download the Push Deploy Tool.

2. Unzip the files onto a USB drive or directly onto any machine on the target network.

Network Assessment Module —Quick Start Guide Network Detective

Page 26: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

26

3. From within the unzipped folder, run the NetworkDetectivePushDeployTool.exeexecutable program as an Administrator (right click>Run as administrator).

Important: For the most comprehensive scan, you MUST run the PushDeploy Tool as an ADMINISTRATOR.

The Push Deploy Tool Settings and Configuration window will appear.

4. Set the Storage Folder location and select the Computer Scan option. 

Tip: For your convenience, create a shared network folder to centralize andstore all scan results data files created by the Push Deploy Tool. Thenreference this folder in the Storage Folder field to enable the local computerscan data files to be stored in this central location.

If additional credentials are required, type in the administrator level Username andPassword necessary to access the local computers on the network to be scanned.Then click Add.

Network Detective Network Assessment Module —Quick Start Guide

Page 27: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

27

Important: For the Push Deploy Tool to push local scans to computersthroughout the network, ensure that the following prerequisites are met:

• Ensure that the Windows Management Instrumentation (WMI) service isrunning and able to be managed remotely on the computers that you wish toscan. Sometimes Windows Firewall blocks Remote Management of WMI, sothis service may need to be allowed to operate through the Firewall.

• Admin$ must be present on the computers you wish to scan, and beaccessible with the login credentials you provide for the scan. Push/Deployrelies on using the Admin$ share to copy and run the data collector locally.

• File and printer sharing must be enabled on the computers you wish toscan.

• For Workgroup based networks, the Administrator credentials for allworkstations and servers that are to be scanned are recommended to bethe same. In cases where a Workgroup-based network does not have a one setof Administrator credentials for all machines to be scanned, use the Add optionto add all of the Administrator credentials for the Workgroup. Multiple sets ofAdministrator credentials will be listed in the Credentials box.

5. Click Next after you have configured the Push Deploy Tool.6. The Computers and Status window will appear. From here you can:

l Add a Single Computer to be scannedl Add (computers) from File that are to be scannedl Add (computers) from IP Range that are to be scannedl Or Save Computers to File in order to export a list of computers to be

Network Assessment Module —Quick Start Guide Network Detective

Page 28: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

28

scanned again in future assessments

7. When you have input the IP address range into the IP Range window, select theOKbutton.

After one or more of the above-mentioned methods have been used to define thecomputer IP addresses to be scanned, the computer names and IP addresses willbe listed in the Computers and Status window.

8. Start the scan either by selecting the “unpause” button in the Computer andStatus window, or, by selecting the Next button in the Computer and Statuswindow and the scan will be initiated.  The status of each computer’s scan activitywill be highlighted within the Computers and Status window as presented below.

Network Detective Network Assessment Module —Quick Start Guide

Page 29: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

29

Upon the completion of all of the scheduled scans, the scan data collected is storedwithin the Storage Location folder presented in the Collected Data Files windowof the Push Deploy Tool. 

9. To verify the inclusion of the scan data produced by the Push Deploy Tool withinyour assessment, select the Next button within the Push Deploy Tool. TheCollected Data Files window will be displayed.

10. To review or access the files produced by the Push Deploy Tool’s scans, selecttheOn Finish: Open Storage Folder option in the Collected Data Files window.Then click Finish.

MORE INFO:The Push Deploy Tool pushes the local data collector to machines in aspecified range and saves the scan files to a specified directory (which canalso be a network share). The benefit of the tool is that a local scan can be runsimultaneously on each computer from a centralized location.

The output files (.ZIP, files) from the local scans can be stored on a USB driveand taken off site to be imported into the active assessment within NetworkDetective.

After all of the Computer Scans are complete, the next phase in the process is toimport the scan data files produced by the Computer Scan into the currentassessment.

Network Assessment Module —Quick Start Guide Network Detective

Page 30: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

30

Step 6— Import Scans into Network Detective AppTip: The Push Deploy Tool performs a localized scan on each workstation on thetarget network. Perform this required step to gather maximum data for the mostdetailed reports.

Make sure you can access all of the scan data files from the PC on the MSP networkwhere you have Network Detective installed. Then, import the data collected by the DataCollector into the assessment.

1. Click Import Scan File on the Scans bar in the Network Detective Assessmentwindow.

The Select the Scan Results window will be displayed.

Network Detective Network Assessment Module —Quick Start Guide

Page 31: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

31

2. Click Browse in the Scan Results window and select all data file(s) that you wish toimport.

3. ClickOpen button to import the scan data. Then click Next.4. An archived copy of the scan will be created in the Network data directory. You can

access this at%APPDATA%\NetworkDetective\ on your PC. Click Finish.

i. If prompted, use the Network Detective Merger to merge the data file(s) intothe assessment. Select the Domain into which the file will be merged. ClickMerge Now.

The Scans bar will be updated with the imported scan files.

Once all of the scan data is imported into the Assessment, the assessment’s Checklistwill indicate that the Reports are ready to be generated.

Network Assessment Module —Quick Start Guide Network Detective

Page 32: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

32

Network Detective Network Assessment Module —Quick Start Guide

Page 33: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

33

Step 7—Generate Network Assessment Reports

Note: This step is NOT performed at the client site or network. Network Detectiveshould be installed on your workstations or laptop. Install Network Detective fromwww.rapidfiretools.com/download if you have not already done so. To generate thereports for your Network Assessment, follow the steps below:

1. Run Network Detective and log in with your credentials.2. Then select the Site, go to the Active Assessment, and then select the Reports

link to the center of the Assessment Window in order select the reports you wantto generate.

3. Select the Create Reports button and follow the prompts to generate the reportsyou selected.

4. At the end of the report generation process, the generated reports will be madeavailable for you to open and review.

Network Assessment Module —Quick Start Guide Network Detective

Page 34: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

34

Network Assessment ReportsThe Network Assessmentmodule can generate the following reports:

Standard ReportsReport Name Description

Asset Detail Report For each network scan, this report provides detailed informationon each of the individual assets discovered by NetworkDetective. The report is ideal for cataloging and documenting thecomplete settings and configurations for individual workstationsand servers.

BDR Needs Analysis An analysis of the backup needs for servers, workstations, andcloud applications on the network.

BDR PowerPoint PowerPoint presentation showing a summary of the backupneeds for servers, workstations, and cloud applications on thenetwork.

Client Health Report The Client Health Report details the overall risk to theassessment environment. The Health Score represents thenumber of issues detected. An ideal environment would have aHealth Score of 0 (indicating no risks found). The higher thescore, the more likely a security, availability, or performancerelated incident will occur. Unresolved issues are detailed item byitem and are organized by risk score.

Client Risk Report This is the "money" report for you. The report presents your clientwith a summary of their overall risk score based on your scan,along with simple charts to show the problem areas. Eachproblem area represents an opportunity for you to present aproposed solution and pitch your services. The purpose of thisreport is for you to use as a "discussion document" to aid you inhaving a conversation with your customer about the specific riskareas you found, what they mean, and how you can help. Keepthe Full Network Assessment in your hip pocket, and pull it outwhen your prospective new client asks how you came up withyour findings!

Computer SecurityReport Card

The Computer Security Report Card assesses individual

Network Detective Network Assessment Module —Quick Start Guide

Page 35: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

35

Report Name Description

computers at a high level based on various security criteria. Thereport card should be viewed as a relative measure as to howwell a computer complies with security best practices. There maybe specific reasons or compensating controls that may make itunnecessary to achieve an "A" in all categories to be consideredsecure. Devices discovered on the network are assigned anoverall score, as well as a specific score for each of theassessment categories detailed below. The scores arerepresented as color-coded letter grades ('A' through 'F').

ConsolidatedManagement Plan

The Management Plan ranks individual issues based upon theirpotential risk to the network while providing guidance on whichissues to address by priority. Fixing issues with lower RiskScores will not lower the Overall Risk Score, but will reduce theglobal Issue Score. To mitigate global risk and improve the healthof the network, address issues with higher Risk Scores first.

Consolidated RiskExcel

We also give you the output of the Consolidated Risk Report andexport it into an Excel file format.

Consolidated RiskReport

The Consolidated Risk Report aggregates risk analysis frommultiple assessments performed on the network, providing youwith both a Consolidated Risk Score and a high-level overview ofthe health and security of the network. The report details the scantasks undertaken to discover security issues. In addition to theoverall Consolidated Risk Score, the report also presentsseparate risk scores for all IT assessments (Network, Security,Exchange, SQL Server) and compliance assessments (HIPAAand PCI) performed on the network environment. This includes asummary of individual issues, as well as their severity andweighting within the risk analysis. At the end of the report, youcan find a summary of the assets discovered on the network, inaddition to other useful information organized by assessmenttype.

Datto BDR NeedsAnalysis

An analysis of the backup needs for servers, workstations, andcloud applications on the network.

Datto BDR Powerpoint PowerPoint presentation showing a summary of the backupneeds for servers, workstations, and cloud applications on thenetwork.

Network Assessment Module —Quick Start Guide Network Detective

Page 36: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

36

Report Name Description

Excel Export We also give you the ability to output all of the assets andconfigurations uncovered by our scan, and export it into an Excelfile format. Once in Excel, you'll be able to take the data andimport it into your favorite Service Desk or PSA system, or simplycreate your own custom sorts, analyses, reports and graphsinside of Excel. Add columns of new data such as location info,emergency phone numbers, and customer instructions to makethis report even more valuable.

Full Detail Report This report provides comprehensive documentation of thecurrent configuration and use of the network. The report showsassets in high-level views, allowing you to easily get an overallassessment of the entire network. Discovered issues arehighlighted, making it easy to spot individual problems.

IT SWOT Analysis Embellish your IT assessments with site photos, policies, andadditional information you collect from client interviews & on-siteinspections. The Network Detective In-Form tool is included withall Module subscriptions. Use it to create IT check-lists,questionnaires, and IT SWOT Analyses.

Layer 2-3 Detail ExcelExport

This Excel report show systems that were able to be accessedvia SNMP and those that were not able to be accessed. Not allcomputers need to be accessible via SNMP, but all primarynetwork devices should be to get the best complete picture. Thereport requires detection of at least one Layer 2/3 device (i.e., arouter or a switch).

Layer 2-3 Detail Report This Report report show systems that were able to be accessedvia SNMP and those that were not able to be accessed. Not allcomputers need to be accessible via SNMP, but all primarynetwork devices should be to get the best complete picture. Thereport requires detection of at least one Layer 2/3 device (i.e., arouter or a switch).

Layer 2-3 Diagram (.tif) This .tif image helps you visualize all assets discovered on thenetwork that were accessible through Layer 2/3 discovery.

Layer 2-3 DiagramExport to MicrosoftVisio

This Visio file helps you visualize all assets discovered on thenetwork that were accessible through Layer 2/3 discovery.Specifically, you can export the Layer 2-3 Diagram to Visio,Microsoft's diagramming software. This allows you to access thediagram in the Visio app.

Network Detective Network Assessment Module —Quick Start Guide

Page 37: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

37

Report Name Description

Layer 2-3 DiagramReport

This Word doc helps you visualize all assets discovered on thenetwork that were accessible through Layer 2/3 discovery.Specifically, it breaks down the graphic into several "zones" orsub-graphics that make larger networks easier to visualize pieceby piece.

Network AssessmentChange Report

Everyone knows that a computer network is a dynamicenvironment and as such is constantly changing. And a NetworkAssessment is only a snapshot of the network status at the timethe assessment is run. That's why we include a valuable NetworkAssessment Comparison Report. Every time you run anassessment on a given network, the software generates a uniqueencrypted data file containing all the findings. Network Detectiveallows you to generate a report that compares the results of anytwo network scans, and highlights everything that has changed.

Network AssessmentPowerPoint

PowerPoint presentation showing details of the environmentscanned, risk and issue score, issue overview, and next steps.

Network ManagementPlan

This report will help prioritize issues based on the issue's riskscore. A listing of all affected computers, users, or sub-systemsis provided along with recommended actions.

Response Report Response Reports can be generated from any InForm form.These reports allow you to present data entered into InForm fromthe pre-built forms or from your own forms.

Site Diagram Once you sign up for Network Detective and run a scan, you'llhave the option to generate a site diagram which breaks downand categorizes all of the assets available on the network. Theschematic shows the basic network structure, with convenientdrill downs into each group of like workstations. Each device isannotated with important identifying configuration informationand is color-coded based on its status.

Site Diagrams Exportto Microsoft Visio

You have the option to export the Site Diagram to Visio,Microsoft's diagramming software. This allows you to access thesite network diagram in the Visio app.

Windows PatchAssurance ChangeReport

TheWindows Patch Assurance Change Report uses scan datafrom both the previous assessment and the current assessmentto help verify the effectiveness of the client’s patch managementprogram over time. The Summary section provides a high-level

Network Assessment Module —Quick Start Guide Network Detective

Page 38: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

38

Report Name Description

overview of missing security updates and service packs acrossthe entire network. After the Summary, you can find moredetailed missing patch information for each individualworkstation. Use this information to apply critical patches toreduce the overall security risk to the network.

Windows PatchAssurance Report

TheWindows Patch Assurance Report helps verify theeffectiveness of the client's patch management program. Thereport uses scan data to detail which patches are missing on thenetwork. The Summary section provides a high-level overview ofmissing security updates and service packs across the entirenetwork. After the Summary, you can find more detailed missingpatch information for each individual workstation. Use thisinformation to apply critical patches to reduce the overall securityrisk to the network.

Windows ServiceAccount Report

This report details the Windows Service Accounts discovered inthe target environment.

Infographics

Server AgingInfographic Report

The age of hardware in your environment can directly affect youravailability and performance. As hardware gets older, the risk offailure increases. During our assessment of your environment,we analyzed the age of servers in the environment.

Change Reports

Baseline Client HealthReport

The report shows how the Health Score has changed betweenthe updated and previous assessment. Likewise, the reportcontains a list of Resolved Issues between the current andprevious assessment organized by risk severity.

Baseline Client RiskReport

This report details the Risk Score for both the current andprevious assessment. At the same time, the report breaks downeach issue and conveys whether the issue is increasing ordecreasing in risk level. For example, are your computersmissing more or fewer security patches since the previousassessment? This report will tell you.

Network Detective Network Assessment Module —Quick Start Guide

Page 39: Network Detective Network Assessment Module Quick Start Guide

© 2022 RapidFire Tools, Inc. All rights reserved.

39

Baseline NetworkManagement Plan

The Baseline Network Management Plan compares the results ofa previous assessment with the latest assessment. Items thathave been fixed or remediated are crossed out.

Full Detail ChangeReport

A computer network is a dynamic environment and as such isconstantly changing. While the Network Assessment Full Detailreport is a snapshot of the network status at the time theassessment is run, the Network Assessment Change reportfocuses on only the add, removes, and changes in the network.

Quarterly BusinessReview Report

This report compares one time period to a previous one formingthe basis for a Quarterly Business Review centered on changesand overall trending rather than detailed documentation andasset discovery.

Network Assessment Module —Quick Start Guide Network Detective