This Site Requires JavaScript Enabled.
Action Required!
Please select your Toolkit from the left sidebar.
Action Required!
Please select your Toolkit.

STEP 1

Know What You Have

Start here. Use the tools below to take an inventory of your devices and accounts so you know what items need to be secured.

Security Awareness Overview

First things first: Knowing what you have is the first step to better security. Identify all of your devices (including desktops, laptops, smartphones and printers) and applications (e.g., email, software, web browsers, websites) so you can take the steps to secure them.

This inventory will serve as a guide and checklist as you make your way through the rest of the toolboxes. Keep this list updated as you add or remove devices and applications.

1.1 Identify Your Applications

Narrow your search by selecting your OS
Nmap logo
Type
3
Level
0h 15min
Time

Zenmap

Use this tool as a more visual display of network scanning data found in Nmap.

Type
1
Level
4h 0min
Time

CIS Hardware and Software Asset Tracker

Use this spreadsheet to track your hardware, software, and sensitive information.

Nmap logo
Type
3
Level
1h 0min
Time

NMAP

Use this tool to identify devices on your network.

Type
3
Level
2h 0min
Time

Open-Audit

Use this tool to maintain an inventory of your devices and applications running on them.

Additional Training & Resources

Explore training courses, videos, sharable content and other resources about this toolbox topic. Browse additional training resources below.

Data Classification Policy

This sample policy offered by the New York State Department of Financial Services aims to establish a framework for classifying...

Read More

Asset Inventory Policy

This sample policy offered by the New York State Department of Financial Services defines the responsibility of everyone...

Read More