Vulnerability Analysis Prerequesite Information
 Share
The version of the browser you are using is no longer supported. Please upgrade to a supported browser.Dismiss

View only
 
 
ABCDEFGHIJKLMNOPQRSTUVWXYZ
1
Instruction/commentInformation NeededAnswerAdditional answers, as needed should be in their own cells on the same row.
2
End customer infoCompany name*
3
Address*
4
Industry/Sector*
5
Company Size (# of users)*
6
Timezone*
7
8
Must be someone with liability in the case of a business catastrophe. Middle manager or Director of IT is not an acceptable answer here.Business Contact Name*
9
Business Contact Title*
10
Business Contact Phone
11
Business Contact Email*
12
13
Who can facilitate access and answer technical settings questions (can be end-customer contact, or the technical rep at the partner / reseller / MSP.)Technical Contact Name*
14
Technical Contact Title*
15
Technical Contact Phone*
16
Technical Contact Email*
17
18
MSP point of contact for Infosec Consulting to communicate project status/needs (if different from Technical Contact above).Assessment Coordinator Name
19
Assessment Coordinator Title
20
Assessment Coordinator Phone
21
Assessment Coordinator Email
22
23
All domains will be checked for common problemsPrimary Domain (website)*
24
Other owned domains (ALL)
25
26
Public IP Address(es)
27
28
Internal subnets (one per column)*
29
Internal domain name
30
For machine-to-IP mappingsInternal DNS server IP*
31
Current Firewall*
32
List any systems that cannot or should not be scanned. Typically this is only legacy or SCADA hardware.Exclusions from scanning (IP with description)
33
List all in use for maximum information-gatheringSNMP String(s)
34
35
eg: O365, G Suite, Exchange, etcEmail platform
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
Loading...