Chapter 6

Testing and Auditing Your Systems

Introduction

Sooner or later you will need to identify all the systems on your network. Despite the most stringent of usage policies, sometimes undocumented systems may be added to the network. Sometimes these systems are “test” systems that were never decommissioned. At other times you may find “rogue” systems whose mere presence on the network violates policy. There may be instances where the system is managed by a third party as part of a vendor’s service offering. The value of a full network discovery is even more apparent if you are dealing with an environment that ...

Get Secure Your Network for Free now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.