Answer the question
In order to leave comments, you need to log in
Thin spots in the network
Tomorrow it is necessary to inspect one network, it will be necessary to identify thin spots.
The network is simple, without a domain. The main condition - it will be necessary to ensure the smooth operation of the office.
I think that, first of all, you need to look at the presence of antiviruses on workstations, the availability of a backup machine. Also, I think it would be useful to have a spare dsl modem.
What other points do you need to pay attention to?
Answer the question
In order to leave comments, you need to log in
IMHO, you need to look at:
1. Workstations: startup, services, the relevance of updates, the presence of antivirus and updates to its databases.
2. Servers: shared folders, shared printers. Since there is no domain, then the settings of workgroups on users' computers.
3. Network infrastructure: switches, topology, router, firewall settings, dmz if necessary, Internet channels, routing rules.
4. Accounting :-) you need to check: bank-clients, 1C (often shared into several accounts), all sorts of reporting systems and their keys and certificates.
5. Documentation. Network topology map, functional diagram.
It seems to be everything that came to mind ...
Equipment quality, uninterruptible power supply, temperature conditions in the server room.
+ spare switches, network cards, keyboards, mice, video cards, patch cords, monitors. A couple of pieces of each is enough, you can have one monik.
If you need continuity, then you need a pair of power supplies, a pair of screws. And also, for a quick recovery, it is desirable to have a backup working and configured machine, on which, in the event of a crash of the main system, it will be possible to quickly deploy a backup.
Check how the cables are crimped. Sometimes they crimped as they wanted, and the equipment after such crimping also works as it wants.
Network folders with full access are also a good bun for viruses.
Autostart and in general the presence of various drives does not interfere with checking.
Also check the switching equipment, and point out the vulnerability of cheap unmanaged switches and routers. As well as the accessibility of unauthorized persons to this equipment.
in order to know the weaknesses, you need to know the normal state of the entire
monitoring system ( zabbix ) install / check with email notifications:
- equipment,
- servers,
- temperature,
- network,
- mail / spam,
- oops, etc.
accumulate data for a couple of days, draw a topology, suggest
PROFIT optimizations!
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question