You are on page 1of 2

Network Auditing 1

Auditing Network
The first step to effective network management is auditing
(documenting), starting with an inventory and outline of the
networks layout and efficiency.
Why auditing?
Documentation is particularly necessary for the disaster
recovery.
First, if we know what the network looks like when its working,
then its easier to identify whats wrong when its not working.
Second, knowing the physical layout of our network can e
crucial to understanding prolems, or to finding the errant
piece of e!uipment.
Types of LAN audits:
Two main types of "#$ audits%
&hysical ('nventory and facility) audits.
()hat youve got and where*
'ntangile (+perational, efficiency, and security)
audits.
()hat kind of traffic levels does the "#$ e,periences*
('s the "#$ run as efficiently as possile or should
resources e redistriuted to etter supply used needs.
()hat kind of security does the "#$ re!uire and are
those re!uirements met*
Network Auditing 2
Physical aspects of the network:
The easiest part of a network audit is the physical inventory.
()hat youve got where it is*. -ostly, its matter of taulating your
hardware and software and noting the patterns in which each is installed.
Conducting an Inentory audit:
Find out what youve got.
(hardware
(software
Conducting a !acility audit:
.et a copy of your offices lueprints and note, cale paths
and lengths, type of cale, etc. The results of the facility
audit are the asis of your network map.

Intangi"le aspects of the network:
During this stage of audit well evaluate our network in terms of its
efficiency use and distriution of network resources, identify how secure it
is, and note its normal patterns so that we can identify any deviations from
there patterns.
#ecording $perational efficiency:
#n operational audit takes into account whats happening on
the network without making any value /udgments.
%aluating network %fficiency:
The efficiency audit is for taking information (from
operation audit) and finding out whether it represents the
most efficient way doing usiness.
%aluating &ecurity settings:
Finally, theres the security audit that will make sure that
the people can reach the resources they need and whether
its necessary to rela, security to provide more access.

You might also like