WHAT IS A WORKSTATION BUILD REVIEW?
A Workstation Build Review is a security assessment designed to test the devices your staff use to carry out their workload on a day-to-day basis.
The assessment is designed to identify any weaknesses in the specific configuration of a device, or vulnerabilities which may be present and exploitable by unauthenticated or authenticated users.
WHY CONDUCT A WORKSTATION BUILD REVIEW?
Workstations can be devices that leave your company’s premises on a regular basis, which means they can be at a greater risk of attack or even theft, and it is important to ensure that any information and data which it contains is protected.
Phishing attacks also target Workstations in an attempt to gain remote access to the device and so ensuring a secure workstation can be essential in managing your company’s overall security profile.
During a Workstation Build Review the configuration and operating system are evaluated to determine if a secure setup has been performed and to ensure there are no weaknesses.
The assessment is designed to pinpoint and rectify any holes within the build and covers patching levels, accessible services, weak credentials, service permissions, logging and auditing, firewall and antivirus configuration as well as registry settings.
As part of our approach, our Penetration Testers use a combination of the most effective automated tools and manual exploitation techniques to identify vulnerabilities across your devices. Our extensive reports provide a thorough assessment of each vulnerability and provide business context alongside each finding.
This is supplemented by technical and non-technical descriptions including evidence of exploitation to assist in prompt remediation activities and provide a thorough understanding of each issue.
A Build & Configuration Review report will allow your business to:
- Receive assurance around the secure configuration of your organisations Workstations.
- Make ongoing improvements to a system via specialist support, advice and consultancy.
- Adhere to regulatory bodies who require Build Reviews to be performed.
- Gain access to a dedicated team of specialist CREST Registered penetration testers who use the latest tools and techniques to accurately assess and identify emerging threats