Simple Easy2audit Tool | Save time by automating IT-audits
Let Easy2audit take care of the tedious and time consuming work. We collect data, then organise and present it as useful information in our easily understandable reports.
Ready? Set. Go! We know that thorough IT-audits can be time consuming. We collect data and create reports within minutes, so you have more time to use the results and help your clients.
Our automated scripts run the same every time, on every machine. No matter who double-clicks them. It doesn’t get more reliable than this.
Using Easy2audit is a piece of cake.
We’re constantly improving your experience and that of the clients you work with.
Ready? Set. Go! We know that thorough IT-audits can be time consuming. We collect data and create reports within minutes, so you have more time to use the results and help your clients.
Our automated scripts run the same every time, on every machine. No matter who double-clicks them. It doesn’t get more reliable than this.
Using Easy2audit is a piece of cake.
We’re constantly improving your experience and that of the clients you work with.
It is very easy to audit from our website with 3 simple Steps.
The IT-Audit summary shows the most important security information of an audited system neatly summarised: Account Policies, hardening scores, updates and vulnerabilities. This is one of our most used reports for annual reports.
Certain user groups, like administrators, have special and often extensive rights in systems and applications.
These accounts pose a significantly increased risk when criminals gain access to them. Includes fine grained policies and is available for Azure AD too.
Default configurations of operating systems are designed with a focus on usability. This compromises information security and leaves doors wide open to cyber criminals. Making adjustments to these default configurations to increase security is therefore one of the most important basic cyber security measures.
Databases contain an abundance of useful and critical information. It is therefore imperative that an analysis is performed on its users, their privileges and their behaviour, so that misuse of specific accounts can be excluded from consideration.
“The extensive system hardening reports and Active Directory reports are extremely useful, and hard to find anywhere else. The application is incredibly easy to use and saves me loads of time.”
Mark Langenakker (AKL Support)
“Getting all the right data from our clients used to take a lot of time for all parties involved. With Easy2audit, the process is so quick and easy that our clients are now happy to cooperate. The full transparency of the scripts and output and the fact that there’s no need for installations are great features too.”
Robert Johan RE CISSP (Soll-IT)
Which security configurations are choosen?
- Includes Password Policies
- Includes Lockout Policies
Which security patches have been installed?
Which security patches are missing?
Which vulnerabilities exists?
How critical are these vulnerabilities?
Which users have which rights?
Includes various other characteristics, e.g.:
Users who have not logged in for 90 days
Users whose passwords do not expire.
Is antivirus running?
Which antivirus software is it?
When has it last been updated?
We are constantly working with IT-auditors from small and big firms to improve the user experience.
Any questions or requests for features?
Get in touch and let us know.
Sign up to Receive 2 free Credits and hear about events & Offers!
Sign up now to Receive 2 free Credits and hear about events & Offers!