Doing a sitewide audit

Essential Eight audits shouldn’t be complicated and lengthy. This tutorial demonstrates the straightforward steps to performing an organisational audit accross all devices.

Business process flow

Obtain the software
Purchase the “Sitewide 365 day license” from the license shop. This will allow you to perform an audit on all machines to validate your security posture of your network.
Start
Purchase
Deploy the SecurE8Auditor.ps1 script to all devices
Using a deployment technology like Configuration Manager (SCCM) or Intune, deploy the script to all devices.
Here are instructions on how to do that.
Deploy
Wait for the Magic
Within a few minutes of deploying, most devices will be completly audited and the results will be saved to the nominated network share.
Gather
Execute the Flight Deck.
Running the FlightDeck will perform the following operation.
  1. Ingest all the ML1 files in to its local database.
  2. Present the overall results of the audit on a signle pane of glass showing the count of machines which are effective accross all mitagating stratagies.

Execute
Uplift advice
Flip over each tile to reveal remediation advice on each control of the essential 8 maturity model. SecurE8, offers a valuable feature that supplies clear documentation and practical guidance on performing security uplifts, detailing what specific elements are being checked. This feature enables auditors to quickly identify the necessary steps for remediation and efficiently navigate the uplift process, streamlining the identification and implementation of solutions. By providing structured insights into security gaps and actionable recommendations, SecurE8 empowers auditors to approach remediation tasks with confidence and precision, significantly reducing the time and resources typically required for comprehensive security improvements.

Empower
Granular level ISM reporting
SecurE8 goes beyond providing a holistic view of compliance; it recognises that the true strength lies in the details. With SecurE8, you gain a comprehensive view across your entire organisation, pinpointing exactly which devices are not effectively meeting specific Information Security Manual (ISM) controls. This granular level of insight allows you to see precisely where compliance gaps exist and understand how they impact the broader security landscape. The software’s filtering and sorting capabilities further enhance this process, making it easy to identify problem areas and prioritise critical devices or controls that require immediate attention. This detailed, actionable perspective supports proactive security management, enabling more targeted and efficient remediation.

Detailed
Automatically send scheduled reports
With SecurE8, you can configure automated, scheduled reports to be sent at regular intervals, ensuring that stakeholders are consistently informed about compliance and security metrics. Each report includes an attached document containing detailed artifacts, which serve as concrete evidence of compliance activities and audit trails. These embedded artifacts streamline the verification process by providing auditors and security teams with direct access to supporting documentation, eliminating the need for time-consuming manual retrieval of records. This feature  builds trust by delivering transparent, verifiable insights into the organisation’s security posture.

Report
Share the report with stakeholders
You are all done at this point. auditing your security posture accross your entire organisation.
Complete
Celebrate