Complete System Audit
Do you know what is installed on your servers? Are your system administrators utilizing the installed applications to their fullest? Are you paying for patches/updates that you don't need? Would your computing infrastructure pass a security audit? If you answered "I don't know" to any of these questions, PARSEC Group can help you identify any potential problem areas and "red flags" that need immediate attention. PARSEC Group will make appropriate performance and security recommendations for improvement in a formal evaluation report. Solving problems before they become a visible drain on performance saves time, money and headaches down the road.
A simplistic overview of a performance assessment audit:
- Startup and Shutdown Procedures
- Storage Configuration
- Backup Procedures
- Review of Shadowing, Clustering and Network
- System Dump Files
A simplistic overview of a software assessment audit:
- Identification of Software Assets
- Verifying the Software Assets including licenses, usage, and rights
- Identifying gaps that may exist between what exists on the installations, and the licenses possessed, and the rights of usage
- Document any gaps and provide recommendations
A simplistic overview of a security audit:
- Performing security vulnerability scans
- Reviewing application and operating system access controls
- Analyzing physical access to the systems
- Analyze system generated audit reports or use a software to monitor and report changes to files and settings on a system
- Systems can include personal computers, servers, mainframes, network routers and switches
System Audits and Assessments can be tailored to meet your specific needs, and are available as a stand-alone offering or as part of the Remote System Monitoringsm service. .
Select an Operating System for Specific Tasks
If you don't see what you are looking for, ask us! PARSEC Group is partnered with industry leading infrastructure and database companies and can provide you a single point of contact for all your IT Enterprise needs. Select from one of the operating systems below to get an idea of some of the other services we can provide you.
AIX System Audit
System Configuration
- What Hardware is currently being utilized
- Storage, Storage Controllers and Storage Configuration and Redundancy
- Logical Volume Manager (LVM) - is space available and what features are being used?
- Network
Startup and Shutdown Procedures
- Review documented Start-up Procedures
- Review documented Shutdown Procedures
Operating System Details
- Version
- Patch Levels
- Swap Files
Storage and Backup Procedures
- Review documented Backup Procedures
- Review Rotation of Tapes Procedures
- Recovery documented Recovery Procedures
- Review Off-site Storage Procedures
Security
- Accounting
- Review passwd file
- Review File Permissions
- Review Network Security Practices
- System Parameters
- ACLs - Review Granular Security Access definitions for files
Additional Billable Consulting Services
- Monitoring Utilities
- Skills Review and Training Recomendations
- Maintenance of Common System Files
- And More Customizable Solutions for all your Infrastructure Needs
HP-UX System Audit
System Configuration
- What Hardware is currently being utilized
- Storage, Storage Controllers and Storage Configuration and Redundancy
- Logical Volume Manager (LVM) - is space available and what features are being used?
- Network
Startup and Shutdown Procedures
- Review documented Start-up Procedures
- Review documented Shutdown Procedures
Operating System Details
- Version
- Patch Levels
- Swap Files
Storage and Backup Procedures
- Review documented Backup Procedures
- Review Rotation of Tapes Procedures
- Recovery documented Recovery Procedures
- Review Off-site Storage Procedures
Security
- Accounting
- Review passwd file
- Review File Permissions
- Review Enhanced Security
- Review Network Security Practices
- System Parameters
- ACLs - Review Granular Security Access definitions for files
Additional Billable Consulting Services
- Monitoring Utilities
- Skills Review and Training Recomendations
- Maintenance of Common System Files
- And More Customizable Solutions for all your Infrastructure Needs
IRIX System Audit
System Hardware Configuration
- What hardware is currently being utilized
- Storage, storage controllers and storage configuration and redundancy
- Logical Volumes (XLV) - is space available and what features are being used?
- Networking setup
Startup and Shutdown Procedures
- Review documented start-up procedures
- Review documented shutdown procedures
Operating System Details
- Version
- Patch levels
- Swap files
Storage and Backup Procedures
- Review documented backup procedures
- Review rotation of tapes/media procedures
- Recovery documented recovery procedures
- Review off-site storage procedures
Security
- Accounting
- Review passwd file
- Review file permissions
- Review network security practices
- System parameters
- ACLs - Review granular security access definitions for files
Additional Billable Consulting Services
- Monitoring utilities
- Skills review and training recommendations
- Maintenance of common system files
- And more customizable solutions for all your infrastructure needs
Linux System Audit
System Hardware Configuration
- Chassis: Does the system have or need RPS (Redundant Power Supplies)?
- Storage: Fault-tolerant storage? (ie: RAID)
- Storage: Fully redundant storage? (ie: network mirror)
- LVM (Logical Volume Manager): Is LVM used? Is space available? What features are being used?
- Network: Link-speed; sufficient links for jobs.
- Utilization: disk, memory, swap, CPU
Services and Packages
- What are the role(s) of the system?
- Which packages are installed?
- Which services are enabled?
- Is anything installed without packaging?
- What is the default run-level of the system and why?
Linux Operating System Details
- Which distribution?
- Which version and point version?
- Are there outstanding updates?
- Are updates applied automatically, on a scheduled basis, or ala carte?
Continuity of Business
- How is the system backed up? How often? To what?
- If tape, are tapes refreshed?
- How does off site storage of backups happen? How often?
- Are Recovery procedure documents accessible?
- When was the last rehearsal?
- Crontab
- Log Rotation
- Is a dump device configured?
Security
- Does the host have a local firewall, appropriately configured?
- Is this an internal-only host, or are services reachable from the Internet?
- Have Internet-accessible services been hardened as much as possible?
- Are any un-needed packages installed or services enabled or accounts enabled?
- Scan for trivial passwords
- Scan for malware and new or modified SUID executables
- Review process list
Additional Billable Consulting Services
- Monitoring services
- Other as requested
Microsoft System Audit
System Hardware Configuration
- Chassis: Does the system have or need Redundant Power Supplies (RPS)?
- Storage: Is it Fault-tolerant (i.e. RAID) or Fully-redundant (i.e. network mirror) storage?
- Network: What is the current link-speed and is it sufficient links for jobs?
- Utilization Baseline: Log disk, memory, swap, CPU for 24 hours
Services and Applications
- What are the role(s) of the system?
- What software is installed?
- Which services are enabled?
Microsoft Windows Operating System Details
- Which version (i.e. 2000, 2003) and variant (Standard, Enterprise, Web or Data Center) of Windows is installed?
- Which service pack is installed?
- Are updates applied automatically, on a scheduled basis or ala carte?
- Are there any outstanding updates that need to be installed?
Continuity of Business
- How is this system backed-up; How often and to what?
- If backed-up to tape, are the tapes refreshed?
- Are the tapes stored off-site? If yes, how often does this occur?
- Are Disaster Recovery procedure documents accessible?
- When was the last Disaster Recovery rehearsal?
Security
- Does the host have a local firewall and is it appropriately configured?
- Does the system have anti-virus software (if appropriate)?
- Is Internet Explorer set to run protected?
- Is this an internal-only host or are services reachable from the Internet?
- Have Internet-accessible services been hardened as much as possible?
- Is any un-needed software installed?
- Are there any enabled and un-needed user or machines accounts?
- Scan for trivial passwords
- Review running processes
- Check common locations of temporary files
Additional Billable Consulting Services
- Monitoring services
- Other as requested
OpenVMS System Audit
System Configuration
- What Hardware is currently being utilized
- Shadowing
- Clustering
- Network
Startup and Shutdown Procedures
- Review documented Start-up Procedures
- Review SYSMAN Start-up Database
- Review documented Shutdown Procedures
Operating System Details
- Version
- Patch Levels
- Page and Swap Files
- System Dump Files
Storage and Backup Procedures
- Review documented Backup Procedures
- Review Rotation of Tapes Procedures
- Recovery documented Recovery Procedures
- Review Off-site Storage Procedures
Security
- Authorization Files
- Security Auditing Policies
- Accounting
- Network Security Practices
- System Parameters
- Policy Audit with System and Security Managers
Additional Billable Consulting Services
- Monitoring Utilities
- Skills Review and Training Recomendations
- Maintenance of Common System Files
- And More Customizable Solutions for all your Infrastructure Needs
Oracle Solaris System Audit
System Configuration
- What Hardware is currently being utilized
- Storage, Storage Controllers and Storage Configuration and Redundancy
- Is Oracle Solaris Volume Manager or Solstice Disk Suite used?
- Is ZFS being used?
- Is space available?
- What features are being used?
- Network
Startup and Shutdown Procedures
- Review documented Start-up Procedures
- Review documented Shutdown Procedures
Operating System Details
- Version
- Patch Levels
- Swap Files
Storage and Backup Procedures
- Review documented Backup Procedures
- Review Rotation of Tapes Procedures
- Recovery documented Recovery Procedures
- Review Off-site Storage Procedures
Security
- Accounting
- Review passwd file
- Review File Permissions
- Review Network Security Practices
- System Parameters
- ACLs - Review Granular Security Access definitions for files
Additional Billable Consulting Services
- Monitoring Utilities
- Skills Review and Training Recomendations
- Maintenance of Common System Files
- And More Customizable Solutions for all your Infrastructure Needs
Tru64 UNIX System Audit
System Configuration
- What Hardware is currently being utilized
- Storage, Storage Controllers and Storage Configuration and Redundancy
- Advanced File System (AdvFS)
- Logical Volume Manager (LVM) - is space available and what features are being used?
- Network
- TruCluster
Startup and Shutdown Procedures
- Review documented Start-up Procedures
- Review documented Shutdown Procedures
Operating System Details
- Version
- Patch Levels
- Swap Files
Storage and Backup Procedures
- Review documented Backup Procedures
- Review Rotation of Tapes Procedures
- Recovery documented Recovery Procedures
- Review Off-site Storage Procedures
Security
- Accounting
- Review passwd file
- Review File Permissions
- Review Enhanced Security
- Review Network Security Practices
- System Parameters
- ACLs - Review File and Directory Access Control Lists
Additional Billable Consulting Services
- Monitoring Utilities
- Skills Review and Training Recomendations
- Maintenance of Common System Files
- And More Customizable Solutions for all your Infrastructure Needs
Request System Audit Information
Contact Submitted
Your information has been sent to PARSEC Group. You should receive a response back within one business day.