Analysis includes:
- Detect Domain Controllers
- FSMO Role Analysis
- Enumerate Organisation Units and Security Groups
- User Analysis
- Detect Local Mail Servers
- Detect Time Servers
- Discover Network Shares
- Detect Major Applications
- Detailed Domain Controller
- SQL Server Analysis
- Internet Domain Analysis
- Password Strength
- Missing Security Updates
- System by System Event Log
- External Security Vulnerabilities
- Detect System Protocol Leakage
- Detect Unrestricted Protocols
- Detect User Controls
- Detect Wireless Access
- External Security Vulnerabilities
- Network Share Permissions
- Domain Security Policy
- Plus top 5 domains listed on dark web

How many of the Essential 8 have you completed?
How the ‘Essential Detection Package’ covers each element of the ASD Essential 8
ASD 8 Control | Discovery Phase |
---|---|
#1 Application control | |
#2. Patch applications | |
#3. Configure Microsoft Office macro settings | N/A |
#4. User application hardening | |
#5. Restrict administrative privileges | |
#6. Patch operating systems | |
#7. Multi-factor authentication | N/A |
#8. Daily backups |
ASD 8 Control | Discovery Phase |
---|---|
#1 Application control | |
#2. Patch applications | |
#3. Configure Microsoft Office macro settings | N/A |
#4. User application hardening | |
#5. Restrict administrative privileges | |
#6. Patch operating systems | |
#7. Multi-factor authentication | N/A |
#8. Daily backups |
Discovery Phase | |
---|---|
N/A | |
N/A | |
How long does the scan take to run?
Allow for about 3-6 hours for the scans to be run. Some scans may vary due to the number of subnets or devices being scanned.
What is the ASD Essential 8?
The Essential Eight is a series of baseline mitigation strategies taken from the Strategies to Mitigate Cyber Security Incidents recommended for organisations. Implementing these strategies as a minimum makes it much harder for adversaries to compromise systems.
What does ASD stand for?
ASD is an acronym for Australian Signals Directorate and is the parent organisation for the Australian Cyber Security Centre (ACSC).
Security Scan – Scope Limits:
- Maximum of 5 external domains to be scanned
- Maximum of 8 external IP addresses to be scanned
- Report provides first 5 usernames (per domain) detected on Dark Web
- Excludes data scan for personally identifiable information (PII)
Network Scan – Scope Limits:
- A maximum of 3x /24 subnets
- A maximum of 3x AD Domains