How Risk Levels Are Estimated
As mentioned, dashboard and built-in reports give you a bird's eye view of the following high-risk areas:
- User and computer accounts
- Permissions
- Data
- Infrastructure
Within each area, Netwrix Auditor industry experts identified risk categories and suggested guidelines for them. For example, if the number of administrative accounts in your organization is less than 2%, the risk should be considered insufficient. If the value is between 2% and 3%, the risk is moderate, while any value that exceeds 3% should be considered a high risk. These guidelines are based on security best practices and analytical data.
The product compares your environment configuration against these metrics and assigns a risk level to each category. The risk levels in each category determine the overall risk level for the area you review. The following risk levels are used:
Risk level | Color | Comments |
---|---|---|
Low | Green | Keep monitoring your environment on a regular basic. |
Medium | Yellow | Proactively mitigate risks and adjust your workflows before a breach occurs. |
High | Red | Respond to the threat as soon as possible. |
Calculation formulas for each metric are provided in the table below.
The following signs are used to define risk level intervals and threshold values:
-
—More than, exclusive
- ≥ —This value or more, inclusive
- = —Equals
- < —Less than, exclusive
- ≤ —This value or less, inclusive
- —Inclusive interval
- ( ) —Exclusive interval
- [ ) or ( ] —Half-closed interval, where 1 value is inclusive and the other is exclusive or vice versa.
Risk | Assessment formula | Default risk level thresholds |
---|---|---|
Users and computers | ||
User accounts with "Password never expires" | Number of enabled user accounts with Password never expires property set | - 0 — Low - [1 – 5] — Medium - > 5 — High |
User accounts with "Password not required" | Number of enabled user accounts with Password not required property set Interdomain trust accounts are excluded from total count. | - 0 — Low - [1 – 2] — Medium - > 2 — High |
Disabled computer accounts | Number of disabled computer accounts / Overall number of computer accounts (%) | - ≤ 1% — Low - (1% – 3%) — Medium - ≥ 3% — High |
Inactive user accounts | Number of inactive but enabled users / Overall number of enabled user accounts (%) | - 0% — Low - (0% – 1%) — Medium - ≥ 1% — High |
Inactive computer accounts | Number of inactive but enabled computer accounts / Overall number of enabled computer accounts (%) | - 0% — Low - (0% – 3%) — Medium - ≥ 3% — High |
Servers with Guest account enabled* | Number of servers with enabled Guest account / Overall number of servers (%) | - 0%— Low - (0% - 1%] — Medium - >1% — High |
Servers that have local user accounts with Password never expires* | Servers that have local user accounts with Password never expires / Overall number of servers (%) | - 0% — Low - >0% — High |
Permissions | ||
User accounts with administrative permissions | Number of administrative accounts / Overall number of accounts (%) | - ≤ 2%— Low - (2% – 3%) — Medium - ≥ 3% — High |
Administrative groups | Number of administrative groups / Overall number of groups (%) | - ≤ 2% — Low - (2% – 3%) — Medium - ≥ 3% — High |
Administrative group membership sprawl* | Number of Windows servers whose Local Administrators Group members differ from those specified in the whitelist / Overall number of servers (%) | - 0% — Low - >0% — High |
Empty security groups | Number of security groups without members / Overall number of security groups (%) | - ≤ 1% — Low - (1% – 2%) — Medium - ≥ 2% — High |
Site collections with the Get a link feature enabled | Number of site collections with the Get a link feature enabled / Total number of site collections (%) | - ≤30% — Low - (30% - 60%) — Medium - ≥60% — High |
Sites with the Anonymous access feature enabled | Number of sites with the Anonymous access feature enabled / Total number of sites (%) | - ≤30% — Low - (30% - 60%) — Medium - ≥60% — High |
Site collections with broken inheritance | Number of site collections with broken inheritance / Total number of site collections (%) | - ≤30% — Low - (30% - 60%) — Medium - ≥60% — High |
Sites with broken inheritance | Number of sites with broken inheritance / Total number of sites (%). | - ≤30% — Low - (30% - 60%) — Medium - ≥60% — High |
Data | ||
Files and folders accessible by Everyone | Files and folders shared with Everyone security group /Overall number of shared folders (%) | - ≤ 1% — Low - (1% – 5%) — Medium - ≥ 5% — High |
Sensitive data shared with Everyone | Number of sensitive files shared with the security groups "Everyone" and "Authenticated" / Total number of sensitive files (%). | - 0% — Low - (1% – 2%) — Medium - ≥ 2% — High |
Sensitive files shared with external users | Number of sensitive files shared with external users / Total number of sensitive files (%). Sharing sensitive data with external users (authenticated users who are not members of your Office 365 organization) may lead to data leaks. To reduce the risk of data leaks and non-compliance, control data sharing to external users. | - ≤ 5% — Low - (5% – 10%) — Medium - ≥ 10% — High |
Sensitive files shared with anonymous users | Number of sensitive files shared with anonymous users / Total number of sensitive files (%). Files may be shared with any users outside the Office 365 organization, so that any user with the link can access the file. This may lead to your sensitive content being highly exposed. To reduce the risk of data leaks, control data sharing to anonymous users. | - 0% — Low - (0% – 2%) — Medium - ≥ 2% — High |
Sensitive documents accessible by Everyone | Number of sensitive documents accessible by Everyone or similar groups / Total number of sensitive documents (%). Only designated personnel should have access to your sensitive data. Thus, only public data should be accessible by the following predefined Office 365 groups: - Everyone - Everyone Except External Users - All Authenticated Users - All Forms Users - All Users | - 0% — Low - (0% – 5%) — Medium - ≥ 5% — High |
File and folder names containing sensitive data | Number of files and folders with names that suggest they contain sensitive data | - 0 — Low - 1 — Medium - > 1 — High |
Potentially harmful files on file shares | Number of detected harmful files | - 0 — Low - 1 — Medium - > 1 — High |
Direct permissions on files and folders | Number of shared objects with at least one direct permission / Overall number of shared objects (%) | - 0% — Low - (0% – 5%) — Medium - ≥ 5% — High |
Direct permissions to sensitive files | Number of sensitive files shared with users through direct permissions / Total number of shared files (%). | - 0% — Low - (0% - 3%) — Medium - ≥ 3% — High |
Documents and list items accessible by Everyone and Authenticated Users | Number of documents and list items shared with the Everyone and Authenticated Users groups / Total number of documents and list items (%) | - ≤25% — Low - (25% - 50%) — Medium - ≥50% — High |
Files shared with external users | Number of files that have been shared with external users / Total number of files (%). | - ≤ 10% — Low - (10% –25%) — Medium - ≥ 25% — High |
Files shared with anonymous users | Number of files that have been shared with anonymous users / Total number of files (%). | - ≤ 5% — Low - (5% – 10%) — Medium - ≥ 10% — High |
Documents and list items accessible by Everyone | Number of documents and list items accessible by Everyone or similar groups / Total number of documents and list items (%). | - ≤25% — Low - (25% - 50%) — Medium - ≥50% — High |
Files that can be modified by external users or anonymous users | Number of files for which external users or anonymous users have "Edit" permissions / Total number of files (%). | - ≤ 5% — Low - (5% – 10%) — Medium - ≥ 10% — High |
Infrastructure | ||
Servers with inappropriate operating systems* | Number of Windows servers with OS not included in the whitelist / Overall number of servers (%) | - 0% — Low - >0% — High |
Servers with under-governed Windows Update configurations* | Number of servers with Windows Update configuration source set to Local Settings AND/OR with auto-update set to Not configured or Disabled / Overall number of servers (%) | - 0% — Low - >0% — Medium |
Servers with unauthorized antivirus software* | Number of Windows servers with antivirus tools not included in the whitelist / Overall number of servers (%) | - 0% — Low - >0% — High |
* -here the Overall number of servers means the number of Windows servers for which data collection was a success. That said, this count may vary across the risks. In such a case, it is recommended to examine Netwrix Auditor health log and omit lists.