A Configuration Review is a comprehensive, authenticated assessment of a client’s systems, platforms, or devices to evaluate their current security posture, focusing on how well they are hardened against real-world threats. Conducted from the perspective of a legitimate, authenticated user, this review identifies insecure settings, unnecessary services, misconfigurations, outdated software, and deviations from security best practices or compliance requirements.
This service typically covers a range of infrastructure and endpoint components, such as:
- Operating system configurations (Windows, Linux, macOS)
- Active Directory and group policy settings
- Endpoint protection and monitoring controls
- Network device configurations (e.g., firewalls, routers, switches)
- Application and database settings
- Cloud service configurations (if applicable)
In addition to baseline configuration checks, the review includes locked-down user environment breakout testing. This involves attempting to escalate privileges or bypass restrictions from within a limited user account. The goal is to simulate insider threats or compromised user accounts and determine whether technical controls effectively isolate users, prevent lateral movement, and enforce least privilege principles.
By combining technical misconfiguration analysis with user environment escape testing, this assessment provides deep insight into the security robustness of your systems against both external attackers and internal misuse.
Deliverables include detailed findings with practical, prioritised remediation guidance to help your organisation reduce attack surface and align with industry security standards.