Not just a checklist.
Next-generation intelligence.
Traditional security audits tell you what's wrong. Our AI goes further — it tells you why it matters, what to fix first, and how to fix it, all in language your team can act on.
After every scan, our AI enrichment layer analyses each finding in context, assigning impact scores, remediation effort estimates and step-by-step instructions — then compiles everything into an executive summary you can present directly to your board.
Talk to our team →17 security categories. Zero blind spots.
Every check maps to real-world attack paths. From endpoint protection and Active Directory exposure to email authentication and encryption — we leave nothing unchecked.
Windows Defender real-time protection, ASR rules, signature currency and exclusion hygiene.
All three Windows Firewall profiles, default-deny posture and rule audit.
BitLocker full-disk encryption status, TLS configuration and cipher suite hardening.
UAC, SMBv1, RDP exposure, Credential Guard and LSA protection.
Windows Update status, pending critical patches and auto-update policy compliance.
Open listening ports, file sharing exposure, Wi-Fi security and DNS configuration.
Password complexity policy, account lockout, LAPS deployment and local admin hygiene.
Installed application inventory, known-vulnerable versions and startup item review.
SPF, DMARC and DKIM DNS records, plus Office macro policy enforcement.
OS version currency, TPM 2.0, Secure Boot, VBS and HVCI status.
SmartScreen enforcement, Safe Browsing and managed browser policy verification.
Backup schedule, system restore points and Volume Shadow Copy availability.
Execution policy, script block logging, AMSI and constrained language mode.
Windows audit policy completeness, event log sizing and Sysmon deployment.
Kerberoasting exposure, AS-REP roasting, delegation risks, privileged group membership and LDAP signing.
Azure AD join state, MDM enrolment, Autopilot and Windows Hello for Business.
Diagnostic data levels, telemetry endpoints and location service policy.
From scan to security roadmap — in four steps.
We don't just hand you a report. We work with you to turn findings into a practical, costed security improvement plan.
Where does your business sit?
Every assessment produces a single A–F grade — straightforward to communicate, meaningful to act on.
Strong security posture. Minor improvements may apply.
Solid baseline with a small number of gaps to close.
Moderate risk. Several findings need prioritised attention.
Significant exposure. Immediate remediation recommended.
High-risk environment. Urgent action across multiple categories.
Severely compromised posture. Comprehensive intervention needed immediately.
Tailored to every environment.
Three built-in device profiles intelligently select the relevant categories and weight them appropriately for your environment.
Covers all endpoint categories. Active Directory and MDM checks are excluded — ideal for individual Windows PCs.
Full 17-category scan including Active Directory and Intune/MDM. The recommended profile for any managed corporate device.
All 17 categories with a hardening-first selection — browser and telemetry checks deprioritised, AD and OS hardening weighted highest.
We have a dedicated assessment tool ready to deploy.
The Servnet Cyber Risk Assessment tool is a free Windows application available to our clients and their end users. It requires no installation of agents, makes no changes to your system, and can be run across single devices or distributed to an entire fleet. Our team will guide you through the process, interpret the results, and build a prioritised security roadmap — whether you're securing your own business or looking to deliver better security outcomes for the organisations you support.
From findings to a plan that gets implemented.
A risk score is only useful if it drives action. Once the assessment is complete, our cyber security specialists sit down with you to build a practical, prioritised roadmap — vendor-agnostic, costed, and aligned to your business objectives.
For Managed Service Providers and IT consultancies, we can run the tool across your client base, giving you a clear picture of every client's posture and enabling you to deliver structured security improvement programmes at scale.
Start the conversation →Ready to find out your risk score?
Get in touch and we'll arrange a free Security Risk Assessment for your business — and help you build a roadmap to fix what we find.
