The report presents a summary of your environment with an overall risk score along with simple charts to show the problem areas. Each problem area is broken down by issue category with auto populated recommended solution.
The Full Network Assessment Report includes every detail, presented in line-item fashion in an editable report document. The report is organized by section with a table of contents to help you locate the specific findings of interest, and problem areas are conveniently highlighted in red, making it easy to spot individual problems to be rectified.
Use the PowerPoint presentation in executive and management meetings to present your findings. Summary information along with the risk and issue score are presented along with specific issue recommendations and next steps.
A site diagram breaks down and categorizes all of the assets available on the network. The diagram shows the basic network structure, with convenient drill downs into each group of like workstations. Each device is annotated with important identifying configuration information and is color-coded based on its status.
This report provides detailed information on each of the individual assets discovered by Network Detective for each network scan. The report is ideal for cataloging and documenting the complete settings and configurations for individual workstations and servers.
Every time you run an assessment on a given network, the software generates a unique encrypted data file containing all the findings. Network Detective allows you to generate a report that compares the results of any two network scans, and highlights everything that has changed.
Export all assets and configurations uncovered by the scan into an Excel file format. Once in Excel, you’ll be able to take the data and import it into your Service Desk, add meta data, or simply create your own custom sorts, analyses, reports and graphs inside of Excel.
This report presents an analysis of the Backup/Disaster Recovery needs for an environment and includes discovered information regarding the storage needs of an environment and analysis of both onsite and offsite backup requirements.