Security Management
Several services that are either deployed and monitored by Atera/Webroot or configured by a Level 3 technician on the customer’s Windows environment or firewall.

What’s included:

Anti-virus, anti-spyware, and anti-malware
Bundling of all three of the above services into one application, Webroot.
Deployment of Webroot via Atera onto each machine on the customer network

Group policy configuration
Correction of any GPO holes that found during SA’s initial scan.
Configuration of group policy for ad password best practices:
Maximum password age
Enforcement of password length and complexity
Disabling of anonymous SID enumeration.
Enablement of user access control.
Event logs.
Disabling of LM hash storage.
Disabling of the Guest

Network share configuration/adjust
Configuration of network shares to ensure no security weaknesses are present.
Review and implementation of any requested adjustments to network shares with security best practices in mind.
Recommendations to customer on how to improve network share security.

Network login scripts
Implementation of network login scripts to automate administrative processes such as:
Drive mapping
Printer mapping
Workstation standardization
Creation of logs of user activity
Creation of desktop shortcut standards
Implementation of login scripts to limit workstation processes or programs.

Security group creation
Establishment of security groups in order to better track employee account access.

White or black list web sites
Addition of websites to a blacklist based on customer request and/or security best practices report.
Whitelisting of websites that are deemed necessary by the customer.
Addressing of any issues caused by the website white/black list.

White or black list web geographic areas
Blacklisting of IP addresses from certain geographic areas based on customer request and/or security best practices report.
Whitelisting IP addresses from certain geographic areas based on customer request.
Addressing of any issues caused by IP address white/blacklist.

Reporting
Generation of quarterly security reports for customers, if desired, using the Network Detective reporting tool.
Review and assistance with any questions or concerns a customer has regarding quarterly reports.
Correction of any issues that are outlined in quarterly reports.

Firewall configuration
Configuration of any existing firewall to conform with security best practices.
Assisting customer with any requested changes to the firewall.
Suggestions to customer for any security issues we SA believes need to be remediated.