##### Network auditing works through a precise procedure where a PC network is analyzed for:
• Security
• Usage of control
• Accessibility
• The executives
• Execution

The data is assembled, vulnerabilities and dangers are recognized, and a conventional review report is sent to network managers.It is commonly done by a data framework reviewer, network expert/evaluator or some other individual with a network the board or potentially security foundation. It utilizes both manual and robotized systems to accumulate data and the survey network act. It surveys:

• Every hub of a network
• Network control and security forms
• Network checking forms
• Other data

Although a network review may concentrate more on network control and security, it likewise surveys procedures and measures that guarantee network accessibility, execution, and nature of administration.