retake task 1 format for me
Part 1 - Fault finding investigation report
Just say who I am what I am going to be doing in the document
1. User A - (Their role who its for )
Symptoms
Here I bullet point the issues
Root cause analysis
Here I write the issues and what could have possibly caused them. I can see the example in the other blog.
Security and performance risks
What are the risks associated with the current systems in place.
Recommendations:
Here what I am going to do is recommend solutions for the issues they are currently facing at the company all of them i can see an example of this in more detail
DO THIS FOR ALL USERS THE SAME USER A B AND C
Then after doing that do this
General Network and security issues
Bellow that do a table
4. General Network and Security Issues
Like this
Issue | Impact | Recommendation |
Domestic router used for 220 users | Performance bottleneck, unmonitored traffic | Replace with enterprise-grade managed router/firewall |
No Wi-Fi password | Open access to external threats | Implement WPA3-secured guest network with VLAN segregation |
Outdated servers (2008, 2019 mix) | Compatibility & patch risks | Standardise all servers to Windows Server 2022 |
No formal staff training | Human vulnerabilities | Introduce induction & ongoing cyber training |
DHCP scope too narrow | IP conflicts | Expand range or implement subnetting |
Summary of findings
Here i write about my findings and what are the issues that have caused this situation to happen at their company bullet point.
Overall Recomendation
Test ID | User | Date | Device/Spec | Test Description | Expected Outcome | Actual Outcome | Actions Taken / Changes Made | User Acceptance |
T1 | User A (Financial Analyst) |
| Desktop PC – Win 7, Office 2010 | Ping test to file server (192.168.1.2) | Successful, <20ms response | Timeout/intermittent | Reconfigure DHCP scope; replace router; retest | Accepted |
T2 | User A |
| Upgraded to Win 11 | Access financial DB after upgrade | Stable connection | Stable after upgrade | Verified DNS resolution fixed | Accepted |
T3 | User B (Compliance Manager) |
| Laptop (Win 10) | Connect to VPN using individual account | Connection established securely | Failed – “Max concurrent connections” | Disabled shared Admin account; increased license limit | Accepted |
T4 | User B |
| Laptop | Verify encryption enabled (AES-256) | “Yes” encryption required | Working correctly | Applied encryption policy | Accepted |
T5 | User C (IT Security Officer) |
| Admin workstation | Review user permissions in AD | Only approved admins visible | Unauthorised admin detected | Deleted rogue accounts; implemented RBAC | Accepted |
T6 | All users |
| N/A | Test Wi-Fi guest network | Access restricted to Internet only | Accessing company network | VLAN separation configured | Accepted |
T7 | IT Admin |
| Server | Simulate login attempts (audit test) | Log all events visible | No audit trail before | Implemented SIEM log retention | Accepted |
T8 | HR PC |
| Win 10 | Access printer after network redesign | Print jobs succeed | Successful | Confirmed after router replacement | Accepted |
Comments
Post a Comment