Complete System Audit


Do you know what is installed on your servers? Are your system administrators utilizing the installed applications to their fullest? Are you paying for patches/updates that you don't need? Would your computing infrastructure pass a security audit? If you answered "I don't know" to any of these questions, PARSEC Group can help you identify any potential problem areas and "red flags" that need immediate attention. PARSEC Group will make appropriate performance and security recommendations for improvement in a formal evaluation report. Solving problems before they become a visible drain on performance saves time, money and headaches down the road.

A simplistic overview of a performance assessment audit:

  • Startup and Shutdown Procedures
  • Storage Configuration
  • Backup Procedures
  • Review of Shadowing, Clustering and Network
  • System Dump Files

A simplistic overview of a software assessment audit:

  • Identification of Software Assets
  • Verifying the Software Assets including licenses, usage, and rights
  • Identifying gaps that may exist between what exists on the installations, and the licenses possessed, and the rights of usage
  • Document any gaps and provide recommendations

A simplistic overview of a security audit:

  • Performing security vulnerability scans
  • Reviewing application and operating system access controls
  • Analyzing physical access to the systems
  • Analyze system generated audit reports or use a software to monitor and report changes to files and settings on a system
  • Systems can include personal computers, servers, mainframes, network routers and switches

System Audits and Assessments can be tailored to meet your specific needs, and are available as a stand-alone offering or as part of the Remote System Monitoringsm service. .

Select an Operating System for Specific Tasks

If you don't see what you are looking for, ask us! PARSEC Group is partnered with industry leading infrastructure and database companies and can provide you a single point of contact for all your IT Enterprise needs. Select from one of the operating systems below to get an idea of some of the other services we can provide you.

AIX System Audit

System Configuration

  • What Hardware is currently being utilized
  • Storage, Storage Controllers and Storage Configuration and Redundancy
  • Logical Volume Manager (LVM) - is space available and what features are being used?
  • Network

Startup and Shutdown Procedures

  • Review documented Start-up Procedures
  • Review documented Shutdown Procedures

Operating System Details

  • Version
  • Patch Levels
  • Swap Files

Storage and Backup Procedures

  • Review documented Backup Procedures
  • Review Rotation of Tapes Procedures
  • Recovery documented Recovery Procedures
  • Review Off-site Storage Procedures

Security

  • Accounting
  • Review passwd file
  • Review File Permissions
  • Review Network Security Practices
  • System Parameters
  • ACLs - Review Granular Security Access definitions for files

Additional Billable Consulting Services

  • Monitoring Utilities
  • Skills Review and Training Recomendations
  • Maintenance of Common System Files
  • And More Customizable Solutions for all your Infrastructure Needs

HP-UX System Audit

System Configuration

  • What Hardware is currently being utilized
  • Storage, Storage Controllers and Storage Configuration and Redundancy
  • Logical Volume Manager (LVM) - is space available and what features are being used?
  • Network

Startup and Shutdown Procedures

  • Review documented Start-up Procedures
  • Review documented Shutdown Procedures

Operating System Details

  • Version
  • Patch Levels
  • Swap Files

Storage and Backup Procedures

  • Review documented Backup Procedures
  • Review Rotation of Tapes Procedures
  • Recovery documented Recovery Procedures
  • Review Off-site Storage Procedures

Security

  • Accounting
  • Review passwd file
  • Review File Permissions
  • Review Enhanced Security
  • Review Network Security Practices
  • System Parameters
  • ACLs - Review Granular Security Access definitions for files

Additional Billable Consulting Services

  • Monitoring Utilities
  • Skills Review and Training Recomendations
  • Maintenance of Common System Files
  • And More Customizable Solutions for all your Infrastructure Needs

IRIX System Audit

System Hardware Configuration

  • What hardware is currently being utilized
  • Storage, storage controllers and storage configuration and redundancy
  • Logical Volumes (XLV) - is space available and what features are being used?
  • Networking setup

Startup and Shutdown Procedures

  • Review documented start-up procedures
  • Review documented shutdown procedures

Operating System Details

  • Version
  • Patch levels
  • Swap files

Storage and Backup Procedures

  • Review documented backup procedures
  • Review rotation of tapes/media procedures
  • Recovery documented recovery procedures
  • Review off-site storage procedures

Security

  • Accounting
  • Review passwd file
  • Review file permissions
  • Review network security practices
  • System parameters
  • ACLs - Review granular security access definitions for files

Additional Billable Consulting Services

  • Monitoring utilities
  • Skills review and training recommendations
  • Maintenance of common system files
  • And more customizable solutions for all your infrastructure needs

Linux System Audit

System Hardware Configuration

  • Chassis: Does the system have or need RPS (Redundant Power Supplies)?
  • Storage: Fault-tolerant storage? (ie: RAID)
  • Storage: Fully redundant storage? (ie: network mirror)
  • LVM (Logical Volume Manager): Is LVM used? Is space available? What features are being used?
  • Network: Link-speed; sufficient links for jobs.
  • Utilization: disk, memory, swap, CPU

Services and Packages

  • What are the role(s) of the system?
  • Which packages are installed?
  • Which services are enabled?
  • Is anything installed without packaging?
  • What is the default run-level of the system and why?

Linux Operating System Details

  • Which distribution?
  • Which version and point version?
  • Are there outstanding updates?
  • Are updates applied automatically, on a scheduled basis, or ala carte?

Continuity of Business

  • How is the system backed up? How often? To what?
  • If tape, are tapes refreshed?
  • How does off site storage of backups happen? How often?
  • Are Recovery procedure documents accessible?
  • When was the last rehearsal?
  • Crontab
  • Log Rotation
  • Is a dump device configured?

Security

  • Does the host have a local firewall, appropriately configured?
  • Is this an internal-only host, or are services reachable from the Internet?
  • Have Internet-accessible services been hardened as much as possible?
  • Are any un-needed packages installed or services enabled or accounts enabled?
  • Scan for trivial passwords
  • Scan for malware and new or modified SUID executables
  • Review process list

Additional Billable Consulting Services

  • Monitoring services
  • Other as requested

Microsoft System Audit

System Hardware Configuration

  • Chassis: Does the system have or need Redundant Power Supplies (RPS)?
  • Storage: Is it Fault-tolerant (i.e. RAID) or Fully-redundant (i.e. network mirror) storage?
  • Network: What is the current link-speed and is it sufficient links for jobs?
  • Utilization Baseline: Log disk, memory, swap, CPU for 24 hours

Services and Applications

  • What are the role(s) of the system?
  • What software is installed?
  • Which services are enabled?

Microsoft Windows Operating System Details

  • Which version (i.e. 2000, 2003) and variant (Standard, Enterprise, Web or Data Center) of Windows is installed?
  • Which service pack is installed?
  • Are updates applied automatically, on a scheduled basis or ala carte?
  • Are there any outstanding updates that need to be installed?

Continuity of Business

  • How is this system backed-up; How often and to what?
  • If backed-up to tape, are the tapes refreshed?
  • Are the tapes stored off-site? If yes, how often does this occur?
  • Are Disaster Recovery procedure documents accessible?
  • When was the last Disaster Recovery rehearsal?

Security

  • Does the host have a local firewall and is it appropriately configured?
  • Does the system have anti-virus software (if appropriate)?
  • Is Internet Explorer set to run protected?
  • Is this an internal-only host or are services reachable from the Internet?
  • Have Internet-accessible services been hardened as much as possible?
  • Is any un-needed software installed?
  • Are there any enabled and un-needed user or machines accounts?
  • Scan for trivial passwords
  • Review running processes
  • Check common locations of temporary files

Additional Billable Consulting Services

  • Monitoring services
  • Other as requested

OpenVMS System Audit

System Configuration

  • What Hardware is currently being utilized
  • Shadowing
  • Clustering
  • Network

Startup and Shutdown Procedures

  • Review documented Start-up Procedures
  • Review SYSMAN Start-up Database
  • Review documented Shutdown Procedures

Operating System Details

  • Version
  • Patch Levels
  • Page and Swap Files
  • System Dump Files

Storage and Backup Procedures

  • Review documented Backup Procedures
  • Review Rotation of Tapes Procedures
  • Recovery documented Recovery Procedures
  • Review Off-site Storage Procedures

Security

  • Authorization Files
  • Security Auditing Policies
  • Accounting
  • Network Security Practices
  • System Parameters
  • Policy Audit with System and Security Managers

Additional Billable Consulting Services

  • Monitoring Utilities
  • Skills Review and Training Recomendations
  • Maintenance of Common System Files
  • And More Customizable Solutions for all your Infrastructure Needs

Oracle Solaris System Audit

System Configuration

  • What Hardware is currently being utilized
  • Storage, Storage Controllers and Storage Configuration and Redundancy
  • Is Oracle Solaris Volume Manager or Solstice Disk Suite used?
  • Is ZFS being used?
  • Is space available?
  • What features are being used?
  • Network

Startup and Shutdown Procedures

  • Review documented Start-up Procedures
  • Review documented Shutdown Procedures

Operating System Details

  • Version
  • Patch Levels
  • Swap Files

Storage and Backup Procedures

  • Review documented Backup Procedures
  • Review Rotation of Tapes Procedures
  • Recovery documented Recovery Procedures
  • Review Off-site Storage Procedures

Security

  • Accounting
  • Review passwd file
  • Review File Permissions
  • Review Network Security Practices
  • System Parameters
  • ACLs - Review Granular Security Access definitions for files

Additional Billable Consulting Services

  • Monitoring Utilities
  • Skills Review and Training Recomendations
  • Maintenance of Common System Files
  • And More Customizable Solutions for all your Infrastructure Needs

Tru64 UNIX System Audit

System Configuration

  • What Hardware is currently being utilized
  • Storage, Storage Controllers and Storage Configuration and Redundancy
  • Advanced File System (AdvFS)
  • Logical Volume Manager (LVM) - is space available and what features are being used?
  • Network
  • TruCluster

Startup and Shutdown Procedures

  • Review documented Start-up Procedures
  • Review documented Shutdown Procedures

Operating System Details

  • Version
  • Patch Levels
  • Swap Files

Storage and Backup Procedures

  • Review documented Backup Procedures
  • Review Rotation of Tapes Procedures
  • Recovery documented Recovery Procedures
  • Review Off-site Storage Procedures

Security

  • Accounting
  • Review passwd file
  • Review File Permissions
  • Review Enhanced Security
  • Review Network Security Practices
  • System Parameters
  • ACLs - Review File and Directory Access Control Lists

Additional Billable Consulting Services

  • Monitoring Utilities
  • Skills Review and Training Recomendations
  • Maintenance of Common System Files
  • And More Customizable Solutions for all your Infrastructure Needs

Request System Audit Information


Contact Submitted


Your information has been sent to PARSEC Group. You should receive a response back within one business day.

Cookie Manager

We use cookies to enhance the features of our web site. We don't set optional cookies unless you enable them. Using this tool sets a cookie on your device to remember your preferences. For more detailed information about the cookies we use, see our Cookies page.


Necessary Cookies

Necessary cookies enable core functionality such as security, network management, and accessibility. You may disable these by changing your browser settings, but this may affect how the website functions.


Preference Cookies

Preference cookies enable this site to remember information that changes the way the website behaves or looks.


Statistics Cookies

Statistic cookies help us to understand how visitors interact with the site by collecting and reporting information anonymously.


Marketing Cookies

Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.


Cookies