Entysis360 Assessment

Entysis360

Step 1 of 6

Clients

Important data on PCs is backed up
Application whitelisting is utilized and tested.
Operating systems are up-to-date.
Operating system updates are consistently applied.
Applications are standardized and approved.
Application software is up-to-date.
Application software updates are consistently applied.
Users do not have administrative privileges on workstations.
Users cannot easily obtain administrative privileges on workstations.
Microsoft Office suite macros are disabled.
Adobe Flash browser plugins are disabled.
Adobe Reader browser plugins are disabled.
Java browser plugins are disabled.
Silverlight browser plugins are disabled.
Outdated plugins and add-ons are disabled or removed from all browsers.
Ad blocker software (or mechanisms) are employed to address the threat of malicious ads.
Removable media use is prohibited (administratively).
Removable media use is prohibited (technologically).
Firewalls have been installed and configured to permit acceptable traffic only.
File integrity monitoring is employed for critical system files.
A host-based intrusion prevention solution is employed on all workstations.
The Show "File name extensions" option is turned on for all workstations.
The Volume Shadow Copy Service is disabled on all workstations.
Auto-play features are disabled.
Software Restriction Policies are used to keep executable files from running when they are in specific locations in the system (ProgramData, AppData, Temp, Windows\SysWow, etc.).