Host Compliance & Malware Audit
A host compliance audit evaluates a device (workstation, server, etc.) for security best-practices. Our engineers will evaluate the security of the device through measures such as attempting to boot alternate media, evaluating endpoint security solutions against malware, reviewing firewall configurations, reviewing patch management, and more.
A host compliance audit evaluates a device (workstation, server, etc.) for security best-practices. Our engineers will evaluate the security of the device through measures such as attempting to boot alternate media, evaluating endpoint security solutions against malware, reviewing firewall configurations, reviewing patch management, and more.
Our Methodology
All testing performed is based on the NIST SP 800-115 Technical Guide to Information Security Testing and Assessment, OWASP Testing Guide (v4), and customized testing frameworks.
Planning
Discovery
Attack
Reporting
Thorough Testing
Activities performed during malware assessments include, but are not limited to:
- Full disk encryption testing
- Process monitoring / control testing
- USB restriction testing
- Web traffic proxy testing
- Intrusion detection / prevention testing
- Application whitelist testing
- Anti-virus (host) testing
- Email filter testing
- Other testing depending on specific customer content and footprint
Thorough Testing
Activities performed during malware assessments include, but are not limited to:
- Full disk encryption testing
- Process monitoring / control testing
- USB restriction testing
- Web traffic proxy testing
- Intrusion detection / prevention testing
- Application whitelist testing
- Anti-virus (host) testing
- Email filter testing
- Other testing depending on specific customer content and footprint
Thorough Testing
Activities performed during malware assessments include, but are not limited to:
- Full disk encryption testing
- Process monitoring / control testing
- USB restriction testing
- Web traffic proxy testing
- Intrusion detection / prevention testing
- Application whitelist testing
- Anti-virus (host) testing
- Email filter testing
- Other testing depending on specific customer content and footprint
Proudly Trusted By:
Sample Pentest Report
See The Results We Can Deliver To You. No Email Required.
Penetration Testing - PCI Compliance - Auditing
See How We Can Secure Your Assets
Let’s talk about how TCM Security can solve your cybersecurity needs. Give us a call, send us an e-mail, or fill out the contact form below to get started.