Skip to content
Status Page
Support
1300 220 888
Managed IT
Managed Infrastructure
Disaster Recovery
Backup as a Service
Managed Infrastructure Services
Managed Network
Managed Voice over IP
Patch Configuration and management
Database Administration Services
End-to-End Solutions
Microsoft Support
Mobile Device Management
OneDrive
Microsoft SharePoint
Microsoft Intune
Azure Services
Teams Calling for Office 365
Managed Security
Essential 8
Managed SIEM (Security Information and Event Management)
Managed Security Operations Centre (SOC)
Essential Eight – Cyber Security assessment
Website Maintenance Services
Website Maintenance Services
Service Desk & On-Site
Projects & Consulting
Project Management Services
Essential 8
Security Culture Assessments
Cyber Assessments
Essential 8 Assessment
Network Assessments
Architectural Design and Review
IT Service Desk
Service Desk
Staffing Services
Staff Augmentation
IT Contractors
On-site & Field Support
Field Support
On-Site Services
Warehouse & Depot Services
Depot Services
Inventory Warehousing and Deployment
Cloud
Managed Cloud Services
Hybrid Cloud
Private Cloud
Managed Network
Backup as a Service
Disaster Recovery
Network Services
Virtual Desktop
Desktop as a Service (DaaS)
Migrations & Consulting
Cloud Computing Consulting Services
Cloud Audits and Assessment Services
Cloud Migration Services
Azure Active Directory Domain Services
Cyber Security
Managed Security Operations
Managed SIEM
Managed SOC
Incident response services
Architectural Design and Review
Continuous Global Asset Scanning
Network Behaviour Analysis
Essential 8
Web and Email Protection
DMARC+ Email security
Security Awareness Training
Patch Configuration and Management
Threat Intelligence
Vulnerability Management
Zero-Trust Security
Managed Firewall Services
Audits and Consulting
Agile Penetration Testing
Cyber Assessments
Security Culture Assessments
Essential 8 Assessment
Resources
On-Demand Resources
Blog
Video Tutorials
About Us
Our Company
Our Clients
Testimonials
Contact
Managed IT
Disaster Recovery
Backup as a Service
Managed Infrastructure Services
Managed Network
Managed Voice over IP
Database Administration Services
Patch Configuration and management
End-to-End Solutions
Essential 8
Teams Calling for Office 365
OneDrive
Mobile Device Management
Microsoft SharePoint
Microsoft Intune
Azure Services
Managed SIEM (Security Information and Event Management)
Managed Security Operations Centre (SOC)
Essential Eight – Cyber Security assessment
Website Maintenance Services
Service Desk & On-Site
Essential 8
Project Management Services
Security Culture Assessments
Cyber Assessments
Essential 8 Assessment
Network Assessments
Architectural Design and Review
Service Desk
Staff Augmentation
IT Contractors
Field Support
On-Site Services
Depot Services
Inventory Warehousing and Deployment
Cloud
Hybrid Cloud
Private Cloud
Managed Network
Backup as a Service
Disaster Recovery
Desktop as a Service (DaaS)
Network Services
Cloud Migration Services
Cloud Computing Consulting Services
Cloud Audits and Assessment Services
Azure Active Directory Domain Services
Cyber Security
Managed SIEM
Managed SOC
Incident response services
Architectural Design and Review
Continuous Global Asset Scanning
Network Behaviour Analysis
Web and Email Protection
DMARC+ Email security
Essential 8
Security Awareness Training
Patch Configuration and Management
Vulnerability Management
Zero-Trust Security
Agile Penetration Testing
Cyber Assessments
Security Culture Assessments
Essential 8 Assessment
Managed Firewall Services
Resources
Blog
Our Company
Video Tutorials
Our Clients
Testimonials
Contact
testinf forms
Maria Hanshaw
2024-02-22T11:14:30+10:00
Essential Eight Level 1 Basic Assessment
Name
Email
Phone/Mobile
1) Application control
Is the execution of various files prevented on workstations from standard user profiles and temporary folders?
Yes
No
2) Patch applications
Is a vulnerability scanner used daily to identify missing patches in internet-facing services and bi-weekly to uncover missing patches in office suites, browsers, email clients, PDF software, and security products?
Yes
No
Are internet-facing service vulnerability patches applied within two weeks or 48 hours with an exploit?
Yes
No
3) Configure Microsoft Office macro settings
Are Microsoft Office macros disabled for users without a specific business need and blocked for macros from internet-originated files?
Yes
No
Is antivirus scanning enabled for Microsoft Office macros and can users change macro security settings?
Yes
No
4) User application hardening
Do web browsers process Java and web advertisements from the internet?
Yes
No
Does Internet Explorer 11 process content from the internet and allow users to change web browser security settings?
Yes
No
5) Restrict administrative privileges
Do privileged users use separate operating environments for privilege and non-privilege tasks, and are non-privileged accounts prevented from accessing privileged operating environments?
Yes
No
Are initial requests for privileged access validated and are privileged accounts (excluding privileged service accounts) blocked from internet, email, and web services?
Yes
No
6) Patch operating systems
Are patches for internet-facing service OS applied within two weeks or 48 hours for exploits, and are patches for workstation, server, and network device OS applied within a month?
Yes
No
Is a daily vulnerability scan used for missing patches in internet-facing service OS, and is a bi-weekly vulnerability scan used for missing patches in workstation, server, and network device OS?
Yes
No
7) Multi-factor authentication
Do users use multi-factor authentication for their organisation's internet-facing services?
Yes
No
Do users use multi-factor authentication for both third-party services handling sensitive data and non-sensitive data (if available)?
Yes
No
8) Regular backups
Are backups of important data, software, and settings securely stored, maintained, and tested for restoration to a common point in time during disaster recovery exercises?
Yes
No
Can unprivileged accounts access or modify backups belonging to other accounts?
Yes
No
Submit Form
Page load link
Go to Top