Skip to main content

SG_SecurityAssessment Job

The SG_SecurityAssessment job performs checks against Windows security best practices in order to proactively identify critical security configurations that leave the environment vulnerable to attack. The result is a report which provides a listing of findings by severity and category with corresponding details that can be used to prioritize and remediate security issues.

SG_SecurityAssessment Job in the Jobs Tree

Dependencies

One or more of the following jobs must be run to generate data for the report:

  • Authentication

    • SG_LSASettings
    • SG_SecuritySupportProviders
    • SG_WDigestSettings
  • Open Access > SG_OpenFolders

  • Privileged Accounts

    • Local Administrators

      • SG_LocalAdmins
      • SG_MicrosoftLAPS
    • Logon Rights

      • SG_AccountPrivileges
      • SG_LocalPolicies
    • Service Accounts > SG_ServiceAccounts

  • Security Utilities > SG_PowerShellCommands

Targeted Hosts

None

Schedule Frequency

This job can be scheduled to run as desired.

Workflow

Step 1 – Run one or more of the jobs needed to generate data for this report.

Step 2 – Schedule the SG_SecurityAssessment job to run as desired.

Step 3 – Review the report generated by the job.

Analysis Tasks for the SG_SecurityAssessment Job

Navigate to the Windows > SG_SecurityAssessment > Configure node and select Analysis to view the analysis tasks.

CAUTION: Do not modify or deselect the selected analysis task. The analysis task is preconfigured for this job.

Analysis Tasks for the SG_SecurityAssessment Job

The default analysis task is:

  • Summarize Audit Findings – Creates the SG_SecurityAssessment_Results table accessible under the job’s Results node

In addition to the tables and views created by the analysis tasks, the SG_SecurityAssessment job produces the following pre-configured report.

ReportDescriptionDefault TagsReport Elements
Systems Security AssessmentThis report summarizes security related results from the Windows solution set.GDPR, SOX, PCI, HIPAAThis report is comprised of four elements: - Pie Chart – Displays a findings by severity - Table – Provides scope of audit details - Table – Displays details on security assessment results - Table – Provides details on findings by category