Workstation and Server Security Assessment

Secure your workstation and servers with our recommendations


Service

Most attackers gain a foothold in organizations through endpoints such as a Workstations and move laterally in the network to other workstations or servers using security vulnerabilities or misconfigurations. Some of these attack paths can be thwarted by increasing the security locally on workstations and servers, and thereby making it harder for an attacker to compromise your infrastructure. An added benefit of having security hardened systems is it gives you more time to detect attacks and stop them before they spread.

In a Workstation and Server security assessment, we review and test the security configurations implemented on an image or representative device, to ensure they follow best-practice and are sufficient for protecting your business based on your risk profile.


Value

With our recommendations you will be able to:

  • Improve the security of workstation and servers

  • Decrease the likelihood attackers obtain a foothold within your environment

  • Make it harder for attackers to move laterally within your network

  • Provide your organization with more time to detect and respond to an attacker

Deliverables

The assessments output is a report with executive summary and a technician oriented detailed observation section, with recommendations for improving the security of the system.

If desired, we can also assist with hands-on hardening of the systems or help set up and create security hardened images for future use.


 

Methodology

We use standardized penetration testing frameworks, and benchmarks such as those from CIS, enhanced with our knowledge of hacking to assess the security of a windows workstation or server.

We assess areas such as:

  • Possibility of credential theft

  • Exposed network services and ports

  • Privilege escalation methods

  • Anti-malware bypass techniques

  • Bypassing of application whitelisting

  • Patch management

  • Boot process

  • Assigned permissions

  • Group policies

 

 

Involvement

Minimal involvement is required from your team.

 


 

See our other services