UK’s trusted IT infrastructure partner since 2003
sales@servnetuk.com
0800 987 4111
Servnet
ConfiguratorGet in Touch
HomeCyber SecuritySecurity Risk Assessment
🔍 Cyber Security · Free Tool

Know your risk
before attackers do.

Our next-generation AI-powered Security Risk Assessment tool performs a comprehensive, read-only audit of your Windows environment across 17 security categories — scoring your posture from A to F and delivering a prioritised remediation roadmap in minutes.

No agents. No changes to your system. No guesswork. The tool is available free — contact our team to get started and we'll work with you to build a security improvement plan that actually gets implemented.

Risk Assessment ReportScan complete
B
Overall Risk Score
78 / 100
Good — 3 critical findings
Firewall92%
Encryption85%
OS Hardening71%
Patch Mgmt58%
Active Directory64%
Email Security49%
🤖 AI enrichment active — 14 findings have priority-ranked remediation steps
17
Security categories
A – F
Risk band scoring
AI
Next-gen enrichment
100%
Read-only & non-invasive
🤖 AI-Powered

Not just a checklist.
Next-generation intelligence.

Traditional security audits tell you what's wrong. Our AI goes further — it tells you why it matters, what to fix first, and how to fix it, all in language your team can act on.

After every scan, our AI enrichment layer analyses each finding in context, assigning impact scores, remediation effort estimates and step-by-step instructions — then compiles everything into an executive summary you can present directly to your board.

Talk to our team →
🤖
Contextualised Impact Scoring
AI analyses each failed or warned check in context — not just what failed, but what it means for your specific environment and threat model.
📊
Priority & Effort Ranking
Every finding is ranked by fix priority and estimated remediation effort so your team knows exactly where to spend time first.
📝
Plain-English Remediation
No jargon. AI generates step-by-step remediation instructions that your IT team can act on immediately — no security analyst required.
📈
Executive Summary
A board-ready executive summary is generated automatically, translating technical risk into business language for non-technical stakeholders.
Cyber risk assessment matrix — likelihood by impact heat map with treatment strategies per quadrant (NIST CSF and ISO 27005 aligned)
Full Coverage

17 security categories. Zero blind spots.

Every check maps to real-world attack paths. From endpoint protection and Active Directory exposure to email authentication and encryption — we leave nothing unchecked.

🛡️Antivirus & Endpoint

Windows Defender real-time protection, ASR rules, signature currency and exclusion hygiene.

🔥Firewall

All three Windows Firewall profiles, default-deny posture and rule audit.

🔒Encryption

BitLocker full-disk encryption status, TLS configuration and cipher suite hardening.

⚙️OS Hardening

UAC, SMBv1, RDP exposure, Credential Guard and LSA protection.

📦Patch Management

Windows Update status, pending critical patches and auto-update policy compliance.

🌐Network Security

Open listening ports, file sharing exposure, Wi-Fi security and DNS configuration.

🔑Password & Auth

Password complexity policy, account lockout, LAPS deployment and local admin hygiene.

💾Software Vulnerabilities

Installed application inventory, known-vulnerable versions and startup item review.

📧Email Security

SPF, DMARC and DKIM DNS records, plus Office macro policy enforcement.

🖥️System & Hardware

OS version currency, TPM 2.0, Secure Boot, VBS and HVCI status.

🌍Browser Security

SmartScreen enforcement, Safe Browsing and managed browser policy verification.

💽Data Protection

Backup schedule, system restore points and Volume Shadow Copy availability.

PowerShell Security

Execution policy, script block logging, AMSI and constrained language mode.

📋Audit & Logging

Windows audit policy completeness, event log sizing and Sysmon deployment.

🔐Active Directory

Kerberoasting exposure, AS-REP roasting, delegation risks, privileged group membership and LDAP signing.

📱Intune & MDM

Azure AD join state, MDM enrolment, Autopilot and Windows Hello for Business.

🕵️Privacy & Telemetry

Diagnostic data levels, telemetry endpoints and location service policy.

Process

From scan to security roadmap — in four steps.

We don't just hand you a report. We work with you to turn findings into a practical, costed security improvement plan.

01
01

Run the tool

Launch the Servnet Cyber Audit application on your Windows device. Select your device profile (Personal, Corporate, or Server/DC) and choose which of the 17 categories to include. The tool is completely read-only — it makes no changes to your system.

02
02

AI-powered analysis

The tool runs structured checks across every selected category using native Windows APIs and PowerShell — safely sandboxed. Our next-generation AI layer then enriches every finding with contextualised impact scoring, remediation priority and estimated effort, going far beyond a traditional compliance checklist.

03
03

Receive your risk report

Get a full PDF or HTML report within minutes: overall risk grade (A–F), per-category scores, every finding ranked by severity, and AI-generated remediation steps written in plain English. The report becomes the foundation of your security improvement roadmap.

04
04

Build your security roadmap

Our team reviews the results with you and your stakeholders. We translate findings into a prioritised action plan — vendor recommendations, configuration fixes, architectural improvements — and track progress over successive scans.

Scoring

Where does your business sit?

Every assessment produces a single A–F grade — straightforward to communicate, meaningful to act on.

A
Excellent90–100

Strong security posture. Minor improvements may apply.

B
Good75–89

Solid baseline with a small number of gaps to close.

C
Fair60–74

Moderate risk. Several findings need prioritised attention.

D
Poor45–59

Significant exposure. Immediate remediation recommended.

E
Critical25–44

High-risk environment. Urgent action across multiple categories.

F
Critical0–24

Severely compromised posture. Comprehensive intervention needed immediately.

Device Profiles

Tailored to every environment.

Three built-in device profiles intelligently select the relevant categories and weight them appropriately for your environment.

💻
Personal
Home & personal devices
15 categories

Covers all endpoint categories. Active Directory and MDM checks are excluded — ideal for individual Windows PCs.

🏢
Corporate
Business endpoints
17 categories

Full 17-category scan including Active Directory and Intune/MDM. The recommended profile for any managed corporate device.

🖧
Server / DC
Servers & domain controllers
17 categories

All 17 categories with a hardening-first selection — browser and telemetry checks deprioritised, AD and OS hardening weighted highest.

🛠️ Tool Available

We have a dedicated assessment tool ready to deploy.

The Servnet Cyber Risk Assessment tool is a free Windows application available to our clients and their end users. It requires no installation of agents, makes no changes to your system, and can be run across single devices or distributed to an entire fleet. Our team will guide you through the process, interpret the results, and build a prioritised security roadmap — whether you're securing your own business or looking to deliver better security outcomes for the organisations you support.

Security Roadmap

From findings to a plan that gets implemented.

A risk score is only useful if it drives action. Once the assessment is complete, our cyber security specialists sit down with you to build a practical, prioritised roadmap — vendor-agnostic, costed, and aligned to your business objectives.

For Managed Service Providers and IT consultancies, we can run the tool across your client base, giving you a clear picture of every client's posture and enabling you to deliver structured security improvement programmes at scale.

Start the conversation →
1
Assess
Run the free tool — single device or across your fleet — and generate your risk report in minutes.
2
Prioritise
AI enrichment ranks every finding by impact and remediation effort. Our team reviews and validates the output with you.
3
Plan
We produce a costed, prioritised security improvement roadmap — mapped to Cyber Essentials, ISO 27001 or your specific compliance requirements.
4
Implement
We support deployment of the recommended controls across your vendor stack — from firewall hardening to endpoint protection to identity security.
5
Verify
Re-run the assessment periodically to track improvement, demonstrate progress to stakeholders, and catch new risks as they emerge.
🔍

Ready to find out your risk score?

Get in touch and we'll arrange a free Security Risk Assessment for your business — and help you build a roadmap to fix what we find.

Request Free Assessment →All Cyber Security