Skip to content
Search for:
Home
About
Managed Services
Smart Antivirus Migration
Process
Antivirus
Contact
Search for:
Home
About
Managed Services
Smart Antivirus Migration
Process
Antivirus
Contact
Home
About
Managed Services
Smart Antivirus Migration
Process
Antivirus
Contact
New Client Assessment
New Client Assessment
Gary Federico
2021-04-14T14:42:17+00:00
Please enable JavaScript in your browser to complete this form.
Legal Name
Corporate Street Address
Corporate Suite #
City
State
Zip Code
Lead IT Contact Name
*
First
Last
Lead IT Contact Email
*
Overall IT Orginzational Chart/Structure
Total Number of Endpoints to protect
Data Center location - are servers on premise, off premise or hybrid?
On Premise
Off Premise
Hybrid
Are any system management tools deployed? If so what tools?
Identify locations of local or network folders which should be excluded from scans and reason for exclusion
Are there any Microsoft Office Scripts or macros in use such as Excel, Word or Access? If so please identify the location of scripts and their respective files.
Please list all anti-virus and anti-malware currently deployed with verion(s).
Is current anti-virus / anti-malware centrally managed?
Yes
No
Please describe operating system patch process. Are automated tools in use? What is the patch schedule?
Please describe software update / patching procedure and policies.
Is Microsoft Active Directory in use or a third-party authentication tool/service?
Yes
No
Are all endpoints joined to Active Directory or a third-party authentication service?
Yes
No
Is multi-factor authentication in use for endpoint / user authentication?
Yes
No
Are there mobile endpoints which never, or seldomly connect directly to the corporate network?
Yes
No
Do all endpoints have outbound connectivity to the internet on ports 80 and 443?
Yes
No
Are there any “kiosk” type endpoints?
Yes
No
What cloud services, infrastructure as a service or application as a service exist in the environment?
How often are backups completed? What is your backup solution?
Any known or past security breaches (malware, worms, ransomware, hacks, etc.)
Submit
Go to Top