preload preload preload preload

Enterprise Security & Privacy

Configuration & Hardening Reviews

Configuration & Hardening Reviews

Intellectual property and sensitive customer information are transacted daily within enterprise IT systems. The technology infrastructure deployed throughout the organization must adequately protect the confidentiality, integrity, and availability of mission critical data and systems. Allegheny Digital's Configuration and Hardening Review Services are designed to ensure that your information assets comply with implemented or goal state configurations to improve system uptime, security, and network performance.


A|D's Configuration and Hardening Review (CHR) Services evaluate the security of your company’s critical information technology infrastructure. Our CHR approach can be tailored to your specific needs to analyze operating systems, network routers and switches, endpoint devices, and application-level security issues that may exist within your current environment. A thorough review of the administrative, physical and technical controls governing each networked resource is performed and all findings validated and recorded. Each CHR is driven by a combination of automated and manual assessment techniques to identify configuration weaknesses that may not be detected through traditional assessment activities.

A|D's CHR Services are regularly conducted against Microsoft® Windows® 2000/2003/2008/XP/Vista, Linux, UNIX, and virtualized environments, as well as important applications such as IIS, SQL Server, and Apache. Our security professionals can also perform CHR's against deployed wireless infrastructure, routers, switches, firewalls and other core network infrastructure. The specific tests that are conducted during a CHR vary based on the type of system and scope of the assessment. Examples of typical tests that are performed during a review may include:

User Account Management Group policy management Patch Management Network Management Auditing and Loggin Malware Management Site Security Management


At the conclusion of the engagement, A|D will deliver a detailed and comprehensive report that can be fully customized to meet the specific needs of executives, management, and business personnel alike. Our reports typically include an executive summary, immediate needs report, detailed technical findings, risk management recommendations, and detailed illustrations, as needed.

If you would like to learn more about having A|D conduct Configuration and Hardening Reviews against your network, please .

Return to top »