A Very Flexible Process
SekChek provides many options to create a security report, depending on who possesses the Scan file.
For example, one person could perform the entire process, from running the security scan to creating the Report database. This ensures the Scan file and Report database do not leave the organisation. However, the processing fee could be charged to a different organisation, such as a Service Provider or your auditing firm.
As a second example, an auditor could ask her client to run the Scan and then send the encrypted Scan file to her, so that she can complete the process of obtaining an Access Token and creating a Report database.
As a third example, an auditor could ask her client to run the Scan and then send the saved Token Request (not the Scan file) to her, so that she can request the Access Token. She would then provide the Access Token to her client who would use it to create the Report database.
Once the Report database has been created, you can copy the MS-Access file and forward it to anyone you wish. Recipients do not require the Scan file or Access Token to open their copy of the Report database.
1. Run the Scan
Logon to the host using an account with administrative privileges, then ‘Run As Administrator’.
From the SekChek Local software on your PC, select the Active Directory domain or server you want to analyse.
The process will create an encrypted Scan file in the chosen directory.
Show me... Scan Server
2. Request An Access Token
From the SekChek Local software, request an Access Token to unlock your Scan file.
You will require access to the Scan file.
Show me... Get Token
3. Create Your Report Database
From the SekChek Local software, import the Scan file to create your Report database in MS-Access format.
You will require access to the Scan file and the matching Access Token.
Show me... Import File