Network security audit report

With the number of network threats growing at a steady pace, network vulnerabilities and loopholes often find a way into your network infrastructure, causing irreversible damage in certain cases. To prevent seeing your organization in a similar position, it is vital to analyze your network thoroughly and ensure it is free from security breaches.

Network Configuration Manager's Security Audit report provides you with details on common security issues in your network and the impact of each issue. In the security audit report, each security issue includes a finding, its impact, how easy it would be for an attacker to exploit and a suitable remediation to mitigate the issue.

The five sections in security audit report

Network Configuration Manager helps to analyze potential security issues by breaking them down into five sections. The following table consists of the five different aspects of any security issue and a description for each.

Network security audit report section Description
Issue Finding The issue finding describes under which configuration setting, Network Configuration Manager identified a potential threat.
Issue Impact The impact section describes what an attacker could gain from exploiting the security issue. This section also identifies the configuration settings that can mitigate an issue.
Eg: A weak password
Issue Ease This section describes the knowledge, skill and physical access that would be required of an attacker in order to exploit a loophole.
Issue Recommendation This section includes the remediation steps, Network Configuration Manager recommends in order to mitigate the issue.
Issue Overall Rating Issue Overall Rating

Now let us see the common security issues that can affect your network and how Network Configuration Manager can help in analyzing the grey areas in your network.

Network security audit report : When a password is not configured

When users forget to configure passwords, an attacker or a malicious user could gain access to by authenticating without providing a password and extract information about the device and networks configuration. With this information, he can attack other devices. With network security audit reports, you can set strong authentication passwords and immediately configure them using configlets.

Network security audit report : When ACL is not configured

Access Control Lists (ACLs) must be configured in order to restrict network access to specific network hosts. Failing to configure ACL can invite unauthorized traffic which can prove to be a threat to your network performance. The security audit report provides the guidelines to be followed while configuring ACL policies, in order to restrict attackers and unwanted entry.

Network security audit report : When no syslog logging is configured

Logging is an essential component of a secure network configuration to prevent intrusion attempts and Denial-of-Service (DOS) attacks. If Syslog message logging is not configured, administrators may never be alerted to potential issues with the device, or a possible intrusion attempt. The network security audit report addresses this and recommends syslog logging be configured in all critical devices.

Network security audit report : When configuration auto-loading is not disabled

Network devices are capable of loading their configuration from a configuration file stored on another network device, rather than using a local configuration file, if auto-loading is not disabled. This can probe an attacker to copy that device configuration and decrypt passwords. The network security audit report provides the suitable command to disable auto-loading.

Therefore, with detailed reports, you can deal with security issues and make your network immune to attacks.

Not just security reports, Network Configuration Manager, also provides EOL/EOS reports, start-up/running configuration reports etc., to ensure you gain greater visibility into your device configurations.