Contact Us

Error: Contact form not found.

Client Login

Select a platform below to log in

TraceCSO
TraceInsight

Configuration Reviews

Identify weaknesses in your security configurations

Optimize Included
Security Features

Most security products are not configured to be the most secure by default – make sure you’re getting the most out of your resources.

Leverage CIS
Benchmarks

The Center for Information Security provides configuration best practices to follow for a wide variety of systems.

System Hardening
Guidelines

Manufacturers and open-sourced resources provide guidance for improving security configurations based on known vulnerabilities.

Vendor Specific
Recommendations

Configuration reviews are tailored to the specific products you use and their applicable updates, not one-size-fits-all services.

Configuration Review Offerings

TraceSecurity offers a wide variety of configuration reviews to assess all the pieces of your tech stack.

Microsoft 365 Configuration Review

A Microsoft 365 Configuration Review involves analysis of your existing M365 infrastructure and system hardening recommendations in authentication, application permissions, data management, email security, auditing, storage, device management, and more. The review is based on the CIS Microsoft 365 Foundations Benchmark, which includes security best practices for Admin Center, Defender, Purview, Entra, Exchange, SharePoint, Teams, and Fabric.

The convenience of so many services under the M365 umbrella allows organizations to manage these features in one cohesive platform, but also provides a centralized target for attackers looking to compromise your data. Microsoft offers a lot of built-in security features, but most are not enabled by default. With a formal review, you can be sure you’re getting the most out of your investment, and even improve security with the click of a button.

  • Mitigate Account
    Takeover Attacks
  • Enable Unused
    Security Features
  • Properly Configure
    Logging & Alerting

Firewall Configuration Review

A Firewall Configuration Review includes analysis of your existing firewall(s) to ensure proper setup and system hardening. The review is based on the applicable CIS Foundations Benchmarks and any available manufacturer system hardening guidelines, which include security best practices for authentication, encryption, firmware updates, access control, ingress/egress rules, network segmentation, and more.

Each firewall manufacturer releases regular security updates and hardening guidelines to help users and businesses maintain secure network traffic. Beyond the standard best practices, these product-specific improvements should be implemented and reviewed on a regular basis.

  • Check Hardware
    Specific Controls
  • Validate Ingress &
    Egress Rules
  • Review Logging
    Configurations

Azure Configuration Review

An Azure Configuration Review involves analysis of your Microsoft Azure instance to determine implementation of built-in security features and adherence to system hardening best practices. The review is based on the CIS Azure Foundations Benchmark, which includes security best practices for Identity & Access Management, Security Center, Storage Accounts, Database Services, Logging and Monitoring, Networking, Virtual Machines, and AppService.

Azure is Microsoft’s cloud computing platform, designed to help organizations manage a variety of applications across multiple environments. It can be used to develop applications, handle large amounts of data, and improve operational efficiency. With the amount of information and services that Azure connects to, it’s crucial that this piece of your M365 environment remains secure.

  • Improve User Security
  • Secure API Connections
  • Make Updates with
    Confidence

VPN Configuration Review

A VPN Configuration Review checks the security and functionality of your Virtual Private Networks, focusing on authentication, encryption, firmware updates, access control, segmentation, and more. The review is based on applicable CIS Foundations Benchmarks and any available manufacturer system hardening guidelines.

With so many companies having remote workforces, VPNs are an essential part of business operations. Any external connection can provide a weak point for attackers to target, making it crucial to maintain robust security configurations for VPNs.

  • User Encryption
  • SQL Injection
  • HTTP Header Checks

Server Configuration Review

A Server Configuration Review is an analysis of your existing server setup, focusing on software running the server, user authentication, access control, firmware updates, and more. The review is based on applicable CIS Foundations Benchmarks and any available manufacturer system hardening guidelines.

Servers are responsible for a variety of services to make your business run – things like domain controllers, active directories, and databases. They have a variety of functions and connections to the other hardware and software that your company uses. Servers and their connections need to maintain strong security to ensure safe data transfer while still allowing for smooth business operations.

  • Confirm Encryption Implementation
  • Enforce Admin
    Account Security
  • Parameterize
    Queries

Elevate your cybersecurity posture today

Our team will respond before your next cup of coffee

Contact Us

Learn More About Configuration Reviews