Networked computers are vulnerable to unauthorized access and denial-of-service attacks in several key areas. Modules contain the checks that evaluate and report on the security of these vulnerable areas. The checks assess the settings of the security controls in a systematic way. Each check assesses one area of potential risk.