How it works...

A configuration audit of an operating system allows a user to understand the gaps present in the configuration of the operating system. A simple USB open access can lead to a network takeover these days, given the sophisticated viruses, malware, and adware available on the market. The WannaCry malware in Windows was one such example where an obsolete SMB version allowed the attackers to target millions of machines all over the world. Hence, it is always necessary, as a matter of routine, to include the configuration of the operating system in the audit in order to be fully secure and compliant.