monthly service report - dell.com · monthly service report promanage - managed services 1....
TRANSCRIPT
Monthly Service Report
ProManage - Managed Services
MONTHLY SERVICE REPORT
Page: 1
COMPANY NAME
Reporting Period: August 25, 2009 - September 25, 2009
Monthly Service Report
ProManage - Managed Services
1. OVERVIEW
Thank you for allowing us to provide you with a Monthly Service Report. This document outlines a summary of
COMPANY NAME environment in the past month and provides recommendations, if needed, associated with
optimizing the performance of your infrastructure.
We have taken a considerable amount of time to analyze and provide you with the information necessary to
improve and increase efficiency of the infrastructure, allowing COMPANY NAME to focus on the business and
drive revenue. There are four sections of the audit. Each section focuses on a specific area necessary for
understanding and maintaining a healthy infrastructure. The sections are as follow:
EXECUTIVE
SUMMARY
This section provides a high level overview of your environment during the current
reporting period and analyzes three key categories - Performance, Patching and
Vulnerabilities
RECOMMENDATIONSThis section recommends corrective actions to improve and increase the efficiency of
your infrastructure
MANAGEMENTThis section provides an overview of Dell's management of your environment, and is
broken down into two parts. Incidents created against your environment, and changes
implemented in your environment.
DETAILED REPORTThis section provides an in-depth analysis of the health of your environment. Graphs
are provided to understand the top-10 devices/applications in terms of performance,
missing patches and vulnerabilities.
DISCOVERY REPORTThis section lists all the devices in your environment that were discovered and
monitored during the reporting period.
SECURITY REPORTThis section provides a detailed view of your environment’s security with a key focus
on the missing patches and vulnerabilities.
Page: 2Reporting Period: August 25, 2009 - September 25, 2009
Monthly Service Report
ProManage - Managed Services
2. EXECUTIVE SUMMARY
Below you will find an executive overview of your environment. There are 3 subsections in this report namely
- performance, patches and vulnerabilities. The performance subsection is further categorized into 4 more
subsections namely server performance, workstation performance, network performance, and application
performance.
To graphically showcase the health of an asset, we have used the health icons.
Indicates that the asset's performance is acceptable in that performance category.
Indicates that the asset has exceeded the acceptable operational threshold in that performance
category and needs to be addressed immediately. Each of the critical health areas are backed up by a
recommendation in the recommendations section.
Indicates that the asset, though not yet in the critical area, is likely to exceed the threshold if left
unattended.
SERVER
AVAILABILITY
The 2 servers have been reachable for more than 80% of requests. This indicates that the
servers are performing optimally and no tuning is required in this area.
SERVER CPU UTILIZATION
CPU utilization of the 2 servers are well balanced and under threshold limits. No further tuning is
required in this area.
SERVER DISK UTILIZATION
Page: 3Reporting Period: August 25, 2009 - September 25, 2009
The disk utilization of 2 servers have exceeded/close to exceeding the threshold of 90%. A lack
of free disk space could result in a failure to install and launch applications, diminished system
performance, and eventual system failure. The underlying cause need to be addressed
immediately. Please refer to the “Recommendations” section for a detailed analysis.
SERVER MEMORY UTILIZATION
Virtual memory utilization of 1 server is nearing the critical level of 95%. Though at the
current moment no tuning is required in this area, these devices should be monitored more
closely to ensure that the trend does not go into the critical area.
Monthly Service Report
ProManage - Managed Services
WORKSTATION
CPU UTILIZATION
CPU utilization of the 26 workstations is well balanced and under threshold limits. No further
tuning is required in this area.
MEMORY UTILIZATION
Virtual memory utilization of the 26 workstations are well balanced and under threshold limits .
No further tuning is required in this area.
DISK UTILIZATION
NETWORK AVAILABILITY
Router
1 Router has been available for 95% to 100% of the time. Under this scenario, this device will be
monitored more closely to ensure that the trend does not go into the critical area. However, no
tuning is necessary at this point in time.
Switch
1 Switch has been available for 95% to 100% of the time. Under this scenario, this device will be
monitored more closely to ensure that the trend does not go into the critical area. However, no
tuning is necessary at this point in time.
SAN
The SAN has been available for 100% of the time. This indicates that the SAN is performing
optimally and no tuning is required in this area.
ACTIVE DIRECTORY - LDAP BIND TIME
LDAP bind time is indicative of Active Directory's performance. A low LDAP bind time shows that
the domain controller was quick to authenticate the LDAP client. The average LDAP bind time for
the AD domain controller is within threshold limits. No further tuning is required in this area.
EXCHANGE SERVER -SMTP LOCAL QUEUE
Local queue length is indicative of the exchange server's success rate in delivering emails locally
to the same server. The local queue length in the SMTP queue is less within threshold limits. No
further tuning is required in this area.
Page: 4Reporting Period: August 25, 2009 - September 25, 2009
The disk utilization of 2 workstations have exceeded/close to exceeding the threshold of 80%. A
lack of free disk space could result in a failure to install and launch applications, diminished
system performance, and eventual system failure. The underlying cause need to be addressed
immediately. Please refer to the “Recommendations” section for a detailed analysis.
Monthly Service Report
ProManage - Managed Services
EXCHANGE SERVER -SMTP REMOTE QUEUE
Remote queue length is indicative of the Exchange server's success rate in sending mail to other
servers. The remote queue length in the SMTP queue is less within threshold limits. No further
tuning is required in this area.
SQL SERVER - SQL COMPILATIONS
SQL compilations are indicative of SQL Server's response and query turnaround time. The
number of SQL compilations/sec is within the acceptable limits. No further tuning is required in
this area.
Page: 5Reporting Period: August 25, 2009 - September 25, 2009
Monthly Service Report
ProManage - Managed Services
PATCH SUMMARY
This report documents all missing patches in your environment. The four graphs below should give a
wholesome view of the missing patches by severity, patch type, devices and products. This information will
help you stay up to date on the latest patches and secure your environment better.
There are 23 vulnerable devices missing 171 patches overall in your environment.
66.3%25.0%
8.8%
Workstation
63.6%18.2%
18.2%
Server
Critical Important Moderate
Missing Patches by Severity
The pie chart below shows a breakup of the missing patches by severity. Typically patches fall under these
four levels of severity - Critical, Important, Moderate and Informational - From most disruptive to the least
disruptive in that order.
Page: 6Reporting Period: August 25, 2009 - September 25, 2009
Monthly Service Report
ProManage - Managed Services
0 4 8 12 16 20 24
host01 17
17
14
12
10
7
8
6
7
6
6
6
8
6
5
4
1
2
1
Missing Patches Missing Service Packs
The bar graph below shows a Pareto of missing patches by hosts. Overall, in your environment, 23 devices
were missing 171 patches. The graph below shows only the top-10 defaulting devices. A detailed list can be
found in the security section of this report.
Top 10 Hosts with Missing Patches
90.91%
9.09%
Server
75.63%
24.38%
Workstation
M. Patches M. SPs
Missing Patches by Patch Type
Typically patches are released under two categories - Individual patches and Service packs. While
individual patches fix typically fix one problem, a Service pack is a collection of updates, fixes and /or
enhancements to a software program delivered in the form of a single installable package. Companies
typically release a service pack when the number of individual patches to a given program reaches a
certain limit.
The pie-chart below shows a breakup of the missing patches and service packs. It should be understood
that a single service pack could contain the fix for several missing patches.
Page: 7Reporting Period: August 25, 2009 - September 25, 2009
host02
host03
host04
host05
host06
host07
host08
host09
host10
Monthly Service Report
ProManage - Managed Services
0 10 20 30 40 50 60 70
Windows XP Professional
Word 2007
Excel 2007
Sun Java Runtime Environment 6.0
SQL Server 2005 Express Edition
Powerpoint 2007
Outlook 2003
.NET Framework 2.0
Outlook 2007
Publisher 2007
69
5
5
9
1
3
4
1
6
4
7
4
1
4
4
4
Missing Patches Missing Service Packs
Top 10 products with Missing Patches
The bar graph below shows a Pareto of missing patches by products. While this graph shows only the
top-10 defaulting products, a detailed list can be found in the security section of this report.
Page: 8Reporting Period: August 25, 2009 - September 25, 2009
Monthly Service Report
ProManage - Managed Services
VULNERABILITY SUMMARY
This report documents all missing vulnerabilities in your environment. The three graphs below should give a
wholesome view of the missing vulnerabilities by risk, devices and categories.
Overall, there are 36 devices with 261 vulnerabilities in your environment.
3.83% 13.03%
36.40%46.74%
High 10Medium 34Low 95Info 122
Total: 261
Vulnerabilities by Risk Level
The pie chart below shows a breakup of the vulnerabilities by level of risk to your environment. Typically
vulnerabilities can be categorized on these four levels of risk- High, Medium, Low and Informational - From
most disruptive to the least disruptive in that order.
0 20 40 60 80 100 120
device01 117
7
6
5
5
5
5
5
5
5
Vulnerability issues
Top Vulnerable Devices
The bar graph below shows a Pareto of top devices with vulnerabilities. Overall, in your environment, 36
devices have 261 vulnerabilities. The graph below shows only the top-10 defaulting devices. A detailed list
can be found in the security section of this report.
Page: 9Reporting Period: August 25, 2009 - September 25, 2009
device02
device03
device04
device05
device06
device07
device08
device09
device10
Monthly Service Report
ProManage - Managed Services
0
20
40
60
80
100
Windows Registry RemoteAccess
Accounts IP Services WebServers
Miscellaneous ServiceControl
SNMPServers
Anti-Virus
86
38 3727 24 20
107 5 2
Top 10 Vulnerability Category
The bar graph below shows a Pareto of vulnerabilities by the category they fall into. While this graph shows
only the top-10 categories, a detailed list can be found in the security section of this report.
Page: 10Reporting Period: August 25, 2009 - September 25, 2009
Monthly Service Report
ProManage - Managed Services
3. RECOMMENDATIONS
Page: 11Reporting Period: August 25, 2009 - September 25, 2009
Server Disk Utilization
The overall disk utilization for servers SERVER02 and SERVER03 is well within the optimal performance area. But there is a concern with their C drives which increased their utilization at 82% and 75% respectively since last month SERVER02 is running the core Small Business Server services so a continuous disk utilization growth is expected. If the C drive is where the system partition is located then it is important to lower the drive utilization below 70% at all times—if above 80% it could lead to performance degradation. We will continuously monitor this device to avoid this drive reach the critical area.
Network Availability – Router
The network availability for the router with IP address 192.192.192.192 is less than 100% during this reporting period. On September, 1 the primary router interface presented a diminished availability recorded by the monitoring system but there were not reported alerts found. There may have been a little hiccup with the router port or a glitch occurred on the network backbone. There is no cause for concern because the production interface shows 100% availability since then.
Network Availability – Switch
The switch SW01 has presented less than 100% availability (99.9%) during the initial scanning period. This could be high network traffic that overloads the switches, faulty network wiring or electricity or a glitch occurred on the network VLANs. If this switch is part of the organization backbone, please ensure that all connections are firmly seated and that the proper electrical input is in place to power the switch and provide the PoE (Power over Ethernet) function.
Server Memory UtilizationThe server Memory Utilization for the server SERVER01 neared its recommended threshold of 95%. The IP address 10.10.10.10 showed on the graph belongs to the server SERVER01 as well. The server SERVER01
is functioning as an Active Directory Server, Exchange Server and SQL Server as well. The Server has 4GB of physical memory and around 6.6GB of virtual memory. It is recommended that the page file be increased to at least 1-1/2 times the size of physical memory and up to 3 times the size of physical memory as well, there is still a chance to increase the virtual memory in order to work in the optimal performance threshold. There are some recommendedpractices to follow the industry standards regarding configuration and tuning when working with Exchange or SQL servers. It may be a good idea to perform an analysis of the server to identify potential configuration changes to improve the server’s performance (such as Microsoft Exchange Best Practices Analyzer) this tool will get a detailed report, listing the recommendations that can be made in the environment.
Workstation Disk UtilizationThe workstations WORSTATION01 and NOTEBOOK44 exceeded the recommended threshold of 80% during
the reporting period. There is a concern with both workstations; the C drive utilization was above the 86 percentiles range. The C Drive Disk it’s the only local disk installed on both workstations. It is recommended to clear all temporary internet and systems files, cookies, and internet history periodically to ensure that the disk utilization is at an acceptable range. Furthermore, move infrequently used data to an alternate device.
Monthly Service Report
ProManage - Managed Services
4. MANAGEMENT
100.00%
Critical
100.00%
Major
100.00%
Minor
100.00%
Informational
Closed
Incidents Summary
Incidents by Severity and Status
This report documents all the incidents in your environment during the past month, and has been presented to
you in terms of the severity and the category of the incident.
This information will help you better manage and secure your IT environment.
27 1 16 32
0
76
0
76
In Progress
Hold
Closed
Total
Critical Major Minor Info Total
0
0
27 16
0
0
32
0
0
1
0
0
31.58% 2.63%
3.95%
2.63%53.95%
5.26%
Client SystemsDatabaseExchangeNetworkingServer SystemsStorage
Incidents by Category
In Progress Hold Closed
Client Systems 0 0 24
Database 0 0 2
Exchange 0 0 3
Networking 0 0 2
Server Systems 0 0 41
Storage 0 0 4
Total 0 0 76
Page: 12Reporting Period: August 25, 2009 - September 25, 2009
Monthly Service Report
ProManage - Managed Services
Incidents by Category and Severity
0
5
10
15
20
25
30
35
40
45
Server Systems Client Systems Storage Exchange Database
InformationalMinorMajorCritical
Critical Major Minor Informational
Client Systems 14 0 9 1
Database 0 2 0 0
Exchange 0 0 3 0
Networking 1 1 0 0
Server Systems 12 11 18 0
Storage 0 2 2 0
Total 27 16 32 1
Critical and Major Incidents
Incident-Description Dated-OccurredAssignee-GroupAffected-ItemStatusSeverityIncident
R2:000070038509 NOC-Client
Systems
EM ApplicationsClosed Sep 25, 2009 6:02Critical device01
R2:000070038501 NOC-CJ-Client
Systems
EM ApplicationsClosed Sep 25, 2009 5:02Critical TRANSFER
R2:000070038396 NOC-CJ-Client
Systems
EM ApplicationsClosed Sep 25, 2009 4:02Critical TRANSFER
R2:000070038391 NOC-CJ-Client
Systems
EM ApplicationsClosed Sep 25, 2009 3:03Critical TRANSFER
R2:000070034867 NOC-CJ-Server
Systems
Thresh SilverStreak Proxy Status Is Down
for 5 minutes.
Last value was
Closed Sep 19, 2009 0:39Critical
R2:000070032203 NOC-Client
Systems
EM ApplicationsClosed Sep 15, 2009 9:01Critical
R2:000070031837 NOC-Client
Systems
EM ApplicationsClosed Sep 14, 2009 13:02Critical
R2:000070031709 NOC-Client
Systems
EM ApplicationsClosed Sep 14, 2009 12:01Critical
R2:000070031530 SD-Service Desk
L1
Thresh SilverStreak Proxy Status Is Down
for 5 minutes.
Last value was
Closed Sep 14, 2009 9:56Critical Server
R2:000070028698 NOC-CJ-Server
Systems
Thresh SilverStreak Proxy Status Is Down
for 5 minutes.
Last value was
Closed Sep 10, 2009 0:49Critical TRANSFER
Page: 13Reporting Period: August 25, 2009 - September 25, 2009
device02
device03
device04
device05
Monthly Service Report
ProManage - Managed Services
Changes Summary
100.00%
High
100.00%
Low
Closed
This report documents system changes made during the past month, including software patches deployed, user
account changes, and policy changes. This information will help you better manage and secure your IT
environment.
Dell initiated Changes with Status and Risk
LowMediumHigh Total
In Progress
Closed
Backed Out
Total 5 1 0 6
0 0 0
5
0
0
0
1
0
0
6
0
Page: 14Reporting Period: August 25, 2009 - September 25, 2009
Monthly Service Report
ProManage - Managed Services
Changes Summary
R2:000000091031Change-ID
Assignee-Group SD-Service Desk L1 Risk-Level High Status Closed
Start-Date-and-Time Sep 14, 2009 21:30 End-Date-and-Time Sep 15, 2009 19:30
Short-Description Power outage
R2:000000091026Change-ID
Assignee-Group NOC-CJ-Server Systems Risk-Level High Status Closed
Start-Date-and-Time Sep 18, 2009 23:00 End-Date-and-Time Sep 19, 2009 5:00
Short-Description Standard Change Patch Deployment
R2:000000089818Change-ID
Assignee-Group SD-Service Desk L1 Risk-Level High Status Closed
Start-Date-and-Time Sep 5, 2009 14:55 End-Date-and-Time Sep 6, 2009 2:55
Short-Description Need to reboot the server
R2:000000089311Change-ID
Assignee-Group NOC-Network Support Risk-Level High Status Closed
Start-Date-and-Time Sep 1, 2009 12:32 End-Date-and-Time Sep 1, 2009 15:32
Short-Description Thresh SNMP Status Is Inactive on DEV01 for 5 m
R2:000000087919Change-ID
Assignee-Group SD-Service Desk L1 Risk-Level High Status Closed
Start-Date-and-Time Aug 24, 2009 22:45 End-Date-and-Time Aug 25, 2009 1:45
Short-Description
R2:000000088812Change-ID
Assignee-Group NOC-CJ-Network Support Risk-Level Low Status Closed
Start-Date-and-Time Sep 4, 2009 23:00 End-Date-and-Time Sep 5, 2009 4:00
Short-Description Configure Syslog , SNMP features on DEVICE 01
Page: 15Reporting Period: August 25, 2009 - September 25, 2009
Thresh SNMP Status Is Inactive on DEV02for 5 m
Monthly Service Report
ProManage - Managed Services
5. DETAILED REPORT
0
10
20
30
40
50
60
70
80
90
100
SERVER01
99.95 100.00
% A
va
ila
bil
ity
Server Availability
The graph above displays the total up-time of all the servers in your network during the selected reporting
period.
0
10
20
30
40
50
60
70
80
90
100
Avg % CPU Utilization Max % CPU Utilization
Server CPU Utilization - - - Threshold Utilization
The graph above shows a breakout of the system CPU utilization for all the servers in your environment .
The threshold utilization line represents the percentage that the CPU should operate under for optimal
performance.
Page: 16Reporting Period: August 25, 2009 - September 25, 2009
SERVER02
SERVER01 SERVER02
Monthly Service Report
ProManage - Managed Services
The graph above shows a breakout of the system CPU utilization for all the servers in your environment .
The threshold utilization line represents the percentage that the CPU should operate under for optimal
performance.
0
10
20
30
40
50
60
70
80
90
100
Avg % Disk Utilization Max % Disk Utilization
Server Disk Utilization - - - Threshold Utilization
The graph above shows a breakout of the system Disk utilization for all the servers in your environment. The
threshold utilization line indicates the percentage that the Disk should operate under for optimal
performance.
Page: 17Reporting Period: August 25, 2009 - September 25, 2009
0102030405060708090
100
SERVER
01
SERVER
02
Avg % Memory Util. Max % Memory Util.
Server Memory Utilization - - - Threshold Utilization
SERVER
03
SERVER
04
SERVER01 SERVER02
Monthly Service Report
ProManage - Managed Services
0102030405060708090
100
WORKSTATIO
N01
Avg % CPU Utilization Max % CPU Utilization
Workstation CPU Utilization - - - Threshold Utilization
The graph above shows a breakout of the system CPU utilization for all the workstations in your
environment. The threshold utilization line represents the percentage that the CPU should operate under for
optimal performance.
0102030405060708090
100
Avg % Memory Util. Max % Memory Util.
Workstation Memory Utilization - - - Threshold Utilization
The graph above shows a breakout of the system Virtual Memory utilization for all the workstations in your
environment. The threshold utilization line indicates the percentage that the memory should be maintained
under for optimal system performance.
Page: 18Reporting Period: August 25, 2009 - September 25, 2009
WORKSTATIO
N02
WORKSTATIO
N03
WORKSTATIO
N04
WORKSTATIO
N05
WORKSTATIO
N06
WORKSTATIO
N07
WORKSTATIO
N08
WORKSTATIO
N09
WORKSTATIO
N10
WORKSTATIO
N01
WORKSTATIO
N02
WORKSTATIO
N03
WORKSTATIO
N04
WORKSTATIO
N05
WORKSTATIO
N06
WORKSTATIO
N07
WORKSTATIO
N08
WORKSTATIO
N09
WORKSTATIO
N10
REM
AININ
G
REM
AININ
G
Monthly Service Report
ProManage - Managed Services
0102030405060708090
100
Avg % Disk Utilization Max % Disk Utilization
Workstation Disk Utilization - - - Threshold Utilization
The graph above shows a breakout of the system Disk utilization for all the workstations in your
environment. The threshold utilization line indicates the percentage that the Disk should operate under for
optimal performance.
0
10
20
30
40
50
60
70
80
90
100
ROUTER01
99.97
% A
va
ila
bil
ity
Network Availability
For Router
The graph above displays the total up-time of all the Routers in your network during the selected reporting
period.
Page: 19Reporting Period: August 25, 2009 - September 25, 2009
WORKSTATIO
N01
WORKSTATIO
N02
WORKSTATIO
N03
WORKSTATIO
N04
WORKSTATIO
N05
WORKSTATIO
N06
WORKSTATIO
N07
WORKSTATIO
N08
WORKSTATIO
N09
WORKSTATIO
N10
REM
AININ
G
Monthly Service Report
ProManage - Managed Services
0
10
20
30
40
50
60
70
80
90
100
SW01 SW02
100.00 99.97
% A
va
ila
bil
ity
Network Availability
For Switch
The graph above displays the total up-time of all the Switches in your network during the selected reporting
period.
0
10
20
30
40
50
60
70
80
90
100
SAN01
100.00
% A
va
ila
bil
ity
Network Availability
For SAN
The graph above displays the total up-time of all the SANs in your network during the selected reporting
period.
Page: 20Reporting Period: August 25, 2009 - September 25, 2009
Monthly Service Report
ProManage - Managed Services
0
4
8
12
16
20
24
28
32
SERVER01
Avg Bind Time Max Bind Time
Active Directory - LDAP Bind Time
The graph above displays the average successful bind time for an LDAP (Lightweight Directory Access
Protocol) client. The value should be as low as possible to indicate that the domain controller was quick to
authenticate the LDAP client. The threhold utilization line represents the optimal bind time for best
performance.
- - - Threshold Utilization
0
10
20
30
40
50
Avg Queue Length Max Queue Length
Me
ss
ag
es
Exchange Server - SMTP Local Queue
All messaging within an Exchange 2000/2003 infrastructure is completed via SMTP. The graph above shows
how efficiently the SMTP server within Exchange is performing its tasks by tracking the queue of messages
awaiting delivery to the Microsoft Exchange Information Store service. The local queue length is indicative of
the success rate in delivering emails locally to the same server.
- - - Threshold Utilization
Page: 21Reporting Period: August 25, 2009 - September 25, 2009
SERVER01
Monthly Service Report
ProManage - Managed Services
0
100
200
300
400
500
Avg Queue Length Max Queue Length
Me
ss
ag
es
Exchange Server - SMTP Remote Queue
All messaging within an Exchange 2000/2003 infrastructure is completed via SMTP. The graph above tracks
remote queues, which send messages to other servers. The remote queue length is indicative of the
success rate in sending mail to other servers.
- - - Threshold Utilization
0
20
40
60
80
100
Avg SQL Compilations Max SQL Compilations
Co
mp
ila
tio
ns
/Se
c
SQL Server - SQL Compilations
The graph above shows the Number of SQL compilations per second and is an indication of SQL Server ’s
performance. SQL compilations are a significant part of a query's turnaround time. In order to save the
compilation cost, the Database Engine saves the compiled query plan in a query cache. The objective of
the cache is to reduce compilation by storing compiled queries for later reuse, therefore ending the
requirement to recompile queries when later executed.
- - - Threshold Utilization
Page: 22Reporting Period: August 25, 2009 - September 25, 2009
SERVER01
SERVER01
Monthly Service Report
ProManage - Managed Services
6. DISCOVERY REPORT
SERVERS
There were 2 Servers monitored this period. The following table indicates the server name, operating system
and discovery date:
Name Discovered DateOperating System
SERVER01 Oct 7, 2008 17:39Windows 2003 Standard Edition Service
Pack 2
Oct 7, 2008 17:39Windows 2003 Standard Edition DC
Service Pack 2
WORKSTATIONS
There were 26 Workstations monitored this period. The following table indicates the workstation name,
operating system and discovery date:
Name Discovered DateOperating System
Oct 16, 2008 10:55Microsoft Windows XP Service Pack 3
Oct 16, 2008 10:55Microsoft Windows XP Service Pack 3
Oct 16, 2008 10:55Microsoft Windows XP Service Pack 3
Oct 16, 2008 10:55Microsoft Windows XP Service Pack 3
Oct 16, 2008 10:55Microsoft Windows XP Service Pack 3
Oct 18, 2008 12:37Microsoft Windows XP Service Pack 3
Nov 19, 2008 9:27Microsoft Windows XP Service Pack 3
Nov 19, 2008 9:30Microsoft Windows XP Service Pack 3
Nov 19, 2008 16:57Microsoft Windows XP Service Pack 3
Nov 19, 2008 16:58Microsoft Windows XP Service Pack 3
Nov 19, 2008 17:00Microsoft Windows XP Service Pack 3
Nov 19, 2008 17:02Microsoft Windows XP Service Pack 3
Nov 19, 2008 17:04Microsoft Windows XP Service Pack 3
Nov 19, 2008 17:06Microsoft Windows XP Service Pack 3
Nov 19, 2008 17:08Microsoft Windows XP Service Pack 3
Nov 19, 2008 17:10Microsoft Windows XP Service Pack 3
Nov 19, 2008 17:12Microsoft Windows XP Service Pack 3
Nov 19, 2008 17:14Microsoft Windows XP Service Pack 3
Page: 23Reporting Period: August 25, 2009 - September 25, 2009
SERVER02
WORKSTATION01
WORKSTATION02
WORKSTATION03
WORKSTATION04
WORKSTATION05
WORKSTATION06
WORKSTATION07
WORKSTATION08
WORKSTATION09
WORKSTATION10
WORKSTATION10
WORKSTATION11
WORKSTATION12
WORKSTATION13
WORKSTATION14
WORKSTATION15
WORKSTATION16
WORKSTATION17
Monthly Service Report
ProManage - Managed Services
NETWORK
There were 4 Network devices monitored this period. The following table indicates the device name,
operating system and discovery date:
Discovered DateOperating SystemName
Routers
ROUTER01 Other Nov 19, 2008 17:00
Switches
SW01 PowerConnect 5424 Oct 21, 2008 21:41
SW02 PowerConnect 5448 Oct 22, 2008 11:55
SANs
SAN01 None Oct 12, 2008 21:44
APPLICATIONS
Type Device Name Discovered Date
Active Directory SERVER01 Oct 12, 2008 22:13
Exchange 2003 Oct 12, 2008 22:13
SQL Server Oct 12, 2008 22:14
SQL Server Oct 12, 2008 22:13
Page: 24Reporting Period: August 25, 2009 - September 25, 2009
SERVER01
SERVER01
SERVER02
Monthly Service Report
ProManage - Managed Services
7. SECURITY REPORT
Missing Patches
Missing Patches for WORKSTATION01
Critical Cumulative Security Update for Internet Explorer (969897)Internet Explorer 6
Critical Sun Microsystems JavaSun Java Runtime
Environment 6.0
Critical Vulnerabilities in Windows HTTP Services Could Allow Remote Code Execution (960803)Windows XP Professional
Important Vulnerabilities in WordPad and Office Text Converters Could Allow Remote Code
Execution (960477)Windows XP Professional
Important Vulnerabilities in Windows Could Allow Elevation of Privilege (959454)Windows XP Professional
Important Vulnerability in RPC Could Allow Elevation of Privilege (970238)Windows XP Professional
Moderate Blended Threat Vulnerability in SearchPath Could Allow Elevation of Privilege (959426)Windows XP Professional
Missing Service Packs for WORKSTATION02
Critical The latest service pack for this product is not installed. The currently installed service pack
is SP2. The latest service pack is SP3.Outlook 2003
Missing Patches for WORKSTATION03
Critical Security Updates available for Adobe Reader and AcrobatAcrobat Reader 9.1.0
Critical Cumulative Security Update for Internet Explorer (969897)Internet Explorer 6
Critical Sun Microsystems JavaSun Java Runtime
Environment 6.0
Critical Vulnerabilities in Windows HTTP Services Could Allow Remote Code Execution (960803)Windows XP Professional
Important Vulnerabilities in WordPad and Office Text Converters Could Allow Remote Code
Execution (960477)Windows XP Professional
Important Vulnerabilities in Windows Could Allow Elevation of Privilege (959454)Windows XP Professional
Important Vulnerability in RPC Could Allow Elevation of Privilege (970238)Windows XP Professional
Moderate Blended Threat Vulnerability in SearchPath Could Allow Elevation of Privilege (959426)Windows XP Professional
Missing Service Packs for WORKSTATION04
Critical The latest service pack for this product is not installed. The currently installed service pack
is Gold. The latest service pack is SP2..NET Framework 2.0
Critical The latest service pack for this product is not installed. The currently installed service pack
is Gold. The latest service pack is SP1..NET Framework 3.0
Critical The latest service pack for this product is not installed. The currently installed service pack
is Gold. The latest service pack is SP2.Excel 2007
Critical The latest service pack for this product is not installed. The currently installed service pack
is Gold. The latest service pack is SP2.Outlook 2007
Critical The latest service pack for this product is not installed. The currently installed service pack
is Gold. The latest service pack is SP2.Powerpoint 2007
Critical The latest service pack for this product is not installed. The currently installed service pack
is Gold. The latest service pack is SP2.Publisher 2007
Critical The latest service pack for this product is not installed. The currently installed service pack
is SP1. The latest service pack is SP3.SQL Server 2005 Express
Edition
Critical The latest service pack for this product is not installed. The currently installed service pack
is Gold. The latest service pack is SP2.Word 2007
Missing Patches for WORKSTATION05
Critical Security Updates available for Adobe Reader and AcrobatAdobe Acrobat 9.1.1
Standard
Critical Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution
(955218)MSXML 6.0
Critical Sun Microsystems JavaSun Java Runtime
Environment 6.0
Critical Vulnerabilities in Microsoft XML Core Services Could Allow Remote Code Execution
(955218)Windows XP Professional
Critical Vulnerability in Microsoft DirectShow Could Allow Remote Code Execution (961373)Windows XP Professional
Critical Vulnerabilities in Windows HTTP Services Could Allow Remote Code Execution (960803)Windows XP Professional
Important Vulnerabilities in Microsoft Office Excel Could Cause Remote Code Execution (968557)Excel 2007
Important Vulnerabilities in WordPad and Office Text Converters Could Allow Remote Code
Execution (960477)Windows XP Professional
Important Vulnerabilities in Windows Could Allow Elevation of Privilege (959454)Windows XP Professional
Page: 25Reporting Period: August 25, 2009 - September 25, 2009
Missing Patches for WORKSTATION01
Monthly Service Report
ProManage - Managed Services
Critical The latest service pack for this product is not installed. The currently installed service pack
is SP2. The latest service pack is SP3.SQL Server 2005 Express
Edition
Missing Patches for WORKSTATION06
Critical Security Updates available for Adobe Reader and AcrobatAcrobat Reader 9.1.0
Critical Vulnerabilities in Microsoft Active Template Library (ATL) Could Allow Remote Code
Execution (973908)Windows XP Professional
Vulnerabilities
Vulnerabilities for DEVICE01
Risk Category Title
SNMP Servers public - SNMP Default Community NameHigh
Remote Access TCP:9000 - telnet serviceMedium
IP Services ICMP Timestamp RequestLow
Web Servers TCP:80 - HTTP 1.1 Protocol DetectedInfo
Web Servers TCP:8000 - HTTP 1.0 Protocol DetectedInfo
Risk Category Title
SNMP Servers public - SNMP Default Community NameHigh
Remote Access TCP:9000 - telnet serviceMedium
IP Services ICMP Timestamp RequestLow
Web Servers TCP:8000 - HTTP 1.0 Protocol DetectedInfo
Risk Category Title
SNMP Servers public - SNMP Default Community NameHigh
Remote Access TCP:9000 - telnet serviceMedium
IP Services ICMP Timestamp RequestLow
FTP Servers TCP:21 - FTP ServiceInfo
Web Servers TCP:80 - HTTP 1.1 Protocol DetectedInfo
Web Servers TCP:8000 - HTTP 1.0 Protocol DetectedInfo
Risk Category Title
Miscellaneous System Not Responding on Forced ScanInfo
Risk Category Title
IP Services ICMP Timestamp RequestLow
Web Servers TCP:80 - HTTP 1.1 Protocol DetectedInfo
Web Servers TCP:5431 - HTTP 1.1 Protocol DetectedInfo
Risk Category Title
IP Services ICMP Timestamp RequestLow
Remote Access TCP:3389 - Terminal Services enabledLow
Registry No Remote Registry Access Available - Remote Registry Connection Access DeniedInfo
Windows Verify Microsoft Windows Anonymous SID/Name TranslationInfo
Windows Verify Microsoft Windows Password ComplexityInfo
Page: 26Reporting Period: August 25, 2009 - September 25, 2009
Vulnerabilities for DEVICE02
Vulnerabilities for DEVICE03
Vulnerabilities for DEVICE04
Vulnerabilities for DEVICE05
Vulnerabilities for DEVICE06