Logo Logo Logo Logo Logo
  • PRODUCTS
    • Network Detective
      • Overview
      • Microsoft Cloud Assessment
      • Network Assessment
      • Security Assessment
      • Exchange Assessment
      • SQL Server Assessments
      • HIPAA Compliance
      • PCI Compliance
      • Inspector Appliance
      • Reporter Appliance
    • Compliance Manager
    • Cyber Hawk
  • SERVICES
    • Product Onboarding
    • Powered Services Pro
    • Semel Systems
  • SOLUTIONS
    • I want to…
    • Do More With My Resources
    • Offer More Services
    • Keep More Customers
    • Close More Business
  • RESOURCES
  • COMPANY
    • Contact Us
    • About Us
    • Customer Reviews
    • Blog
    • In the News
    • Press Releases
    • Subscription Info
    • Careers
    • Awards
  • REQUEST A DEMO
  • CUSTOMER LOGIN
  • Upcoming Events
  • BUY NOW
  • PRODUCTS
    • Network Detective
      • Overview
      • Microsoft Cloud Assessment
      • Network Assessment
      • Security Assessment
      • Exchange Assessment
      • SQL Server Assessments
      • HIPAA Compliance
      • PCI Compliance
      • Inspector Appliance
      • Reporter Appliance
    • Compliance Manager
    • Cyber Hawk
  • SERVICES
    • Product Onboarding
    • Powered Services Pro
    • Semel Systems
  • SOLUTIONS
    • I want to…
    • Do More With My Resources
    • Offer More Services
    • Keep More Customers
    • Close More Business
  • RESOURCES
  • COMPANY
    • Contact Us
    • About Us
    • Customer Reviews
    • Blog
    • In the News
    • Press Releases
    • Subscription Info
    • Careers
    • Awards
  • REQUEST A DEMO
  • CUSTOMER LOGIN
  • Upcoming Events
  • BUY NOW

Network Detective

IT ASSESSMENTS & REPORTING

CLOUD ASSESSMENTS
Microsoft Cloud
IT ASSESSMENTS
Network Security Exchange SQL Server
COMPLIANCE ASSESSMENTS
HIPAA PCI
ADD-ONS
Inspector Reporter
OVERVIEW

Cyber Hawk

INTERNAL THREAT DETECTION

Detect anomalous activity, suspicious network changes and threats caused by vulnerabilities and misconfigurations.

OVERVIEW

Compliance Manager

COMPLIANCE PROCESS AUTOMATION

Compliance-as-a-Service your customers can trust.

COMPLIANCE STANDARDS
NIST CSF CMMC HIPAA GDPR Cyber Insurance
OVERVIEW
VIEW ADDITIONAL RESOURCES

Looking for more information? Visit the Resources page for videos, eBooks, whitepapers and more!

Network Detective
Exchange Assessments
  • Summary
  • Reports
  • Use Cases
  • Request A Demo
Network Detective
Exchange Assessments
  • Summary
  • Reports
  • Use Cases
  • Request A Demo

EXCHANGE ASSESSMENTS

REPORTS

Exchange Risk Report

This customer-facing report provides a polished overview of any issues identified in the more detailed reports.

Download

Traffic and Use Report

Extremely useful when planning a migration or for growth planning to ensure that systems will continue to run without interruption.

Download

Mobile Device Report

Provides a detailed listing of every mobile device used by employees to access their organization’s mailbox.

Download

Mailbox Detail Report

Compiles a mailbox-by-mailbox catalog of information, including mailbox display name, quotas, and a listing of folders/sizes for each mailbox.

Download

Distribution Lists

Identifies and lists all distribution groups as well as which end-users or other groups are to receive any emails.

Download

Mailbox Permissions Report

Identifies which groups or which individuals have access to the mailbox and at what level, on a mailbox-by-mailbox basis.

Download

Exchange Management Plan

This report will help prioritize issues based on the issue’s risk score. A listing of all affected computers, users, or sub-systems are provided along with recommended actions.

Download

Exchange Assessment Powerpoint

Use our generated PowerPoint presentation as a basis for conducting a meeting presenting your findings from the Network Detective. General summary information along with the risk and issue score are presented along with specific issue recommendations and next steps.

Download

Exchange Excel Export

We also give you the ability to output all of the Exchange data configurations uncovered by our scan, and export it into an Excel file format. Once in Excel, you’ll be able to take the data and import it into your favorite Service Desk or PSA system, or simply create your own custom sorts, analyses, reports and graphs inside of Excel.

Download

Mailbox Permissions by User Report

Inverts the information to show you on a user-by-user basis which users have access to which mailboxes.

Download

LET US SHOW YOU HOW IT WORKS!

Ready to buy now? Click on the Buy Now button. Need to know more? Request a demo and we’ll show you how it works.

BUY NOWREQUEST DEMO
RapidFire Tools - A Kaseya Company

follow us

BUY NOW
Company Information

RapidFire Tools, Inc.
1117 Perimeter Center West
Suite E-101
Atlanta, GA 30338
678.323.1300

Network Detective
  • Overview
  • Products
  • How It Works
IT Assessment Modules
  • Network
  • Security
  • SQL Server
  • Exchange
CLOUD ASSESSMENT MODULES
  • Microsoft Cloud
Compliance Modules
  • HIPAA
  • PCI
NETWORK DETECTIVE ADD-ONS
  • Inspector
  • Reporter
SECURITY & COMPLIANCE
  • Compliance Manager
  • Cyber Hawk
Company Links
  • About Us
  • In the News
  • Blog
  • Customer Reviews
  • Press Releases
  • Copyright © 2021 RapidFire Tools, Inc. All rights reserved.
  • |
  • Home
  • |
  • Legal
  • |
  • Privacy
  • |
  • Data Usage