Network Detective

REPORTS

Overview     |     Modules     |     How it works     |     Reports

Network Assessment Reports

Download all Network Assessment reports

Client Risk Report
The report presents your client with a summary of their overall risk score based on your scan, along with simple charts to show the problem areas. Each problem area represents an opportunity for you to present a proposed solution and pitch your services.

Network Management Plan
This report will help prioritise issues based on the issues risk score. A listing of all affected computers, users, or sub-systems are provided along with recommended actions.

Full Detail Report
Includes every detail, presented in line-item fashion in an editable report document. The report is organised by section with a table of contents to help you locate the specific findings of interest, and problem areas are conveniently highlighted in red, making it easy to spot individual problems to be rectified.

Network Assessment PowerPoint
Utilise the PowerPoint presentation as a basis for conducting a meeting presenting your findings from the Network Detective. General summary information along with the risk and issue score are presented along with specific issue recommendations and next steps.

Site Diagram
A site diagram breaks down and categorises all of the assets available on the network. The schematic shows the basic network structure, with convenient drill downs into each group of like workstations. Each device is annotated with important identifying configuration information and is colour-coded based on its status.

Asset Detail Report
This report provides detailed information on each of the individual assets discovered by Network Detective for each network scan. The report is ideal for cataloging and documenting the complete settings and configurations for individual workstations and servers.

Full Detail Report
Includes every detail, presented in line-item fashion in an editable report document. The report is organised by section with a table of contents to help you locate the specific findings of interest, and problem areas are conveniently highlighted in red, making it easy to spot individual problems to be rectified.

Network Assessment PowerPoint
Utilise the PowerPoint presentation as a basis for conducting a meeting presenting your findings from the Network Detective. General summary information along with the risk and issue score are presented along with specific issue recommendations and next steps.

Site Diagram
A site diagram breaks down and categorises all of the assets available on the network. The schematic shows the basic network structure, with convenient drill downs into each group of like workstations. Each device is annotated with important identifying configuration information and is colour-coded based on its status.

Asset Detail Report
This report provides detailed information on each of the individual assets discovered by Network Detective for each network scan. The report is ideal for cataloging and documenting the complete settings and configurations for individual workstations and servers.

Full Detail Change Report
Every time you run an assessment on a given network, the software generates a unique encrypted data file containing all the findings. Network Detective allows you to generate a report that compares the results of any two network scans, and highlights everything that has changed.

Excel Analysis Export/Report
Output all of the assets and configurations uncovered by the scan and export it into an Excel file format. Once in Excel, you’ll be able to take the data and import it into your favourite Service Desk or PSA system, or simply create your own custom sorts, analyses, reports and graphs inside of Excel.

Quarterly Business Review Report
This report compares one time period to a previous one forming the basis for a Quarterly Business Review meeting. It highlights changes rather than detailed data and shows overall trending. Use this report to encourage “face-to-face” meetings and improve stickiness with your customers.

IT SWOT Analysis
Embellish your IT assessments with site photos, policies, and additional information you collect from client interviews & on-site inspections. Use the Network Detective In-Form tool to create IT checklists, questionnaires, and IT SWOT Analysis.

BDR Needs Analysis Report
This report presents an analysis of the Backup/Disaster Recovery needs for an environment and includes discovered information regarding the storage needs of an environment and analysis of both onsite and offsite backup requirements.

Security Assessment Reports

Download all Security Assessment reports

Security Risk Report
A proprietary Risk Score and chart show the relative health of the network security, along with a summary of the number of computers with issues. This powerful lead generation and sales development tool also reports outbound protocols, system control protocols, user access controls, external vulnerabilities summary, and dark web password and credential breaches.

Security Management Plan
Helps prioritise remediation based on the issue risk score. A listing of all security related risks are provided along with recommended actions.

Computer Security Report Card
The Computer Security Report Card assesses individual computers based on security criteria. Devices discovered on the network are assigned an overall score, as well as a specific score for each of the assessment categories detailed in the report card.

Security PowerPoint
Use this PowerPoint presentation as a basis for presenting your findings from the Network Detective. General summary information along with the risk and issue score are presented along with specific issue recommendations and next steps.

Anomalous Login Report
Expand your security knowledge and easily identify anomalous user logins with a value-add report that methodically analyses login history from the security event logs. The report uses mathematical modelling and proprietary pattern recognition to highlight potential unauthorised users who log into machines they normally do not access and at times they normally do not log in.

External Vulnerabilities Scan Detail Report
A comprehensive output including security holes and warnings, informational items that can help make better network security decisions, plus a full NMap Scan which checks all 65,535 ports and reports which are open. This is an essential item for many standard security compliance reports.

External Vulnerability Scan Detail by Issue Report
A compact version of the External Vulnerability Scan Detail report that is organised by issues. Devices that are affected are listed within an issue. This report is useful for technicians that are looking to resolve issues, rather than performing remediation on a particular system.

External Network Vulnerabilities Summary Report
This report provides a prioritised listing of issues by CVSS so your technicians can work more efficiently. Its compact view lets a tech quickly survey the various issues that were detected in an environment.

Outbound Security Report
Highlights deviation from industry standards compared to outbound port and protocol accessibility, lists available wireless networks as part of a wireless security survey, and provides information on Internet content accessibility.

Security Policy Assessment Report
A detailed overview of the security policies which are in place on both a domain wide and local machine basis.

Share Permission Report by Computer
Comprehensive lists of all network “shares” by computer, detailing which users and groups have access to which devices and files, and what level of access they have.

Share Permission Report by User
Organises permissions by user, showing all shared computers and files to which they have access.

User Behaviour Analysis Report
Shows all logins, successful and failure, by user. Report allows you to find service accounts which are not properly configured (and thus failing to login) as well as users who may be attempting (and possibly succeeding) in accessing resources (computers) which they should not be.

Login History by Computer Report
Same data as User Behaviour but inverted to show you by computer. It is helpful for looking at commonly accessed machines (file server, domain controller, etc.) – or a particularly sensitive machine for failed login attempts.

Login Failures by Computer Report
Report identifies users who have succeeded in logging in to another machine. Great for auditing/logging purposes to know of all attempts.

Data Breach Liability Report
Identifies specific and detailed instances of personal identifiable information (PII) and cardholder data throughout a computer network that could be the target of hackers and malicious insiders. It also calculates the potential monetary liability and exposure based upon industry published research.

RSOP Computer & User Settings Report

This report analyses the various Resulting Sets of Policy (RSOP) based on computer & user policy settings on computers in the environment and can be used to assess how many variants of settings exist in a network.