Firewall Configuration Review

PRIMARY CONTACT: Carl N. Kriebel CISSP

Schneider Downs firewall configuration review evaluates the rules from your firewalls to determine whether security risks exist in the configuration, whether the firewall software is up-to-date and if high risk services containing known vulnerabilities are allowed through the firewall. This review can be utilized for compliance verification and validation of perimeter security posture. We use a rating system and mitigation advice to prioritize and address your issues. We produce a detailed report showing how the device has been configured. We also report on any device vulnerabilities that are in the public domain that a hacker could target.

  • Interview FW administrators; review FW policies and desired protection
  • Scan and test FW settings, rules, procedures, and network net flow
  • Review firewall findings and refine configuration as necessary
  • Validate and report firewall configuration and net flow

View our additional IT Risk Advisory services and capabilities

Breached?

Every moment counts. For urgent requests, contact the Schneider Downs digital forensics and incident response team at 1-800-993-8937. For all other requests, please complete the form below.

"*" indicates required fields

This field is for validation purposes and should be left unchanged.