Accounts, Authentication & Password Audits

Admin Discovery Report

by Josef Weiss
April 29, 2014

This report displays details on Administrator accounts that have been found in your environment via LCE and active Nessus scanning.

Provided are details on:

  • Administrative accounts that have been identified within the environment.
  • Accounts that are listed as being 'admin', 'administrator', or 'root' are displayed, along with any other accounts provisioned on the system.

This can be easily configured to your own environment if required by altering the filter for vulnerability text.

Account Weakness Report

by David Schwalenberg
April 2, 2014

Account Weakness Report Screenshot
This report presents vulnerabilities related to accounts and credentials. These vulnerabilities include default accounts, blank passwords, bypassing of authentication, insecure and non-compliant account settings, and more.

Group Management Report

by Cody Dumont
March 27, 2014

Group Management Report
This report provides a detailed analysis of the group membership across many platforms. The supported platforms are Windows, OS X, and LDAP. The report is structured to provide a summary list of systems, and then enumerate the group membership. The report provides details on group membership though SMB enumeration, LDAP search queries, ADSI, and parsing of system configuration files.

Council on CyberSecurity - Critical Security Controls Report

by Cody Dumont
March 18, 2014

Council on CyberSecurity Critical Security Controls Report
This report covers many controls found in the Council on CyberSecurity 20 Critical Security Controls. As published by Council on CyberSecurity, the goal of the 20 Critical Security Controls is to protect assets, infrastructure, and information by strengthening your organization’s defensive posture through continuous automated protection and monitoring.

Insider Threat Report v2

by Josef Weiss
March 6, 2014

This report was completely re-worked and streamlined, and now includes New_User_Source events in two different formats. A new section resides under Chapter 2, titled 'New User Source Summary', and contains a New User Source User Summary and a New User Source Event List, as shown below.

IT-Grundschutz BSI-100-2 Report Template

by Josef Weiss
June 19, 2013

Required - IT-Grundschutz BSI-100-2 audit file, Nessus, and SecurityCenter 4.6 or higher

The IT-Grundschutz Standards and Catalogues are a set of recommendations designed to assist an organization in achieving an appropriate security level for information throughout an organization. The Federal Office for Information Security (BSI) in Germany develops and maintains the BSI Standards, of which IT-Grundschutz is a part, with the providing methods, processes, procedures, and approaches to information security management, risk analysis, and business continuity management.

Disabled Windows Accounts

by Dave Breslin
February 19, 2013

This report template lists those local Windows accounts that have been disabled. To help with analysis the report also provides a list of all local accounts, enabled or disabled, for those hosts with disabled accounts.