Network Assessment Questionnaire Assessment Questionnaire The intent of this form is to gather initial information about your network environment and how best to approach your assessment. Our services will evaluate the security of your resources and patch management against known CVEs. Network and AD scans will also reveal possible opportunities for bad actors to traverse your network(s) and exfiltrate data.Based on our findings, we can recommend best practices, software, and security to bolster and prevent such attacks from occurring. All information provided in this form is strictly confidential. Primary Point of Contact (Full Name):* Email address:* Approximate Assessment Start Date:* Desired End Date:* External IP addresses of internet exposed resources (e.g. firewalls, servers, VPN gateways, user portals, etc.): Internal subnets/VLANs in use (e.g. 10.0.0.1/24, 192.168.1.1-192.168.1.254): List the security or network monitoring products used on your internal network(s): Website(s) we will be scanning for vulnerabilities (If Applicable): Is a WiFi assessment needed for your company?*YesNo If yes, how many (estimated) wireless networks will be tested? Describe how your company uses WiFi: Brand/model of access points? Brief description of WiFi network setup: List all SSIDs: If Employee wifi for personal devices exists; Does associated subnet(s) have access to main production environment?YesNo If Employee and/or Guest subnets are segregated from production environment, list how segregation is created (VLAN separateion, air gapped, etc): Can all wireless networks be reached from a single location?YesNo If not, how many locations need testing? How many (estimated) devices are on your network, such as computers, servers, phones, access points, printers, etc? # of Windows devices # of Linux devices # of MacOS devices # of IOT devices* List all legacy servers or networked devices that would be ideal to exclude from scans: Do you use an RMM or remote access tool that can allow for back end script deployment as sysadmin? If so, please list tools below: Do you have an Active Directory environment?YesNo Hostname(s) of Domain Controller(s) We will require a temporary AD account in order to scan your network thoroughly. Please provide your company's domain (e.g. maximumengineering.local): List all AV or monitoring software in use on endpoints: List any additional notes, concerns, or requirements that need to be considered: Acknowledgement: By signing and submitting this form, you acknowledge that you are aware that by subjecting your site to penetration tests, the site and its backend systems will be subject to tests which may possibly affect the way legitimate users experience their work with your site. Possible side effects may include slow response times, and / or possible down-time. In any event, such side effects will be kept to a minimum. You also acknowledge that the testers may be exposed to sensitive information stored on your systems. This information may include IP, client information, financial information as well as any other sensitive information stored on your systems. In addition, the tests may include changes to some data stored on your system. Therefore, it is advised that you perform a backup of the entire system, so that any change made as a result of the tests may be rolled back. *I agreeSubmitReset