{"id":18617,"date":"2021-08-31T09:51:44","date_gmt":"2021-08-31T07:51:44","guid":{"rendered":"https:\/\/www.usd.de\/?page_id=18617"},"modified":"2025-12-11T13:36:37","modified_gmt":"2025-12-11T12:36:37","slug":"pentest-workstation","status":"publish","type":"page","link":"https:\/\/www.usd.de\/en\/pentest\/pentest-workstation\/","title":{"rendered":"Pentest Workstation"},"content":{"rendered":"<p>[et_pb_section fb_built=\"1\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"0px||0px||true|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_row disabled_on=\"on|off|off\" _builder_version=\"4.27.2\" _module_preset=\"default\" width=\"100%\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.2\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.2\" _module_preset=\"default\" text_text_color=\"#FFFFFF\" text_font_size=\"30px\" text_line_height=\"1.2em\" header_font=\"Roboto||||||||\" header_text_color=\"#F07F1D\" header_font_size=\"50px\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-pentest-firmen-notebook.jpg\" custom_margin=\"-25px||0px||false|false\" custom_padding=\"95px||60px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h1 style=\"text-align: center;line-height: 120%;font-weight: 400\">Workstation Pentest<\/h1>\n<p style=\"text-align: center;line-height: 130%\">Prevent attacks on your company network via your employees' workstations<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row disabled_on=\"off|on|on\" _builder_version=\"4.27.2\" _module_preset=\"default\" width=\"100%\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.2\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.2\" _module_preset=\"default\" text_text_color=\"#FFFFFF\" text_font_size=\"30px\" text_line_height=\"1.2em\" header_font=\"Roboto||||||||\" header_text_color=\"#F07F1D\" header_font_size=\"50px\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-pentest-firmen-notebook.jpg\" custom_margin=\"0px||0px||false|false\" custom_padding=\"15%|5%|12%|5%|false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h1 style=\"text-align: center;line-height: 120%;font-weight: 400;font-size: 120%\">Workstation Pentest<\/h1>\n<p style=\"text-align: center;line-height: 120%;font-size: 60%\">Prevent attacks on your company network via your employees' workstations<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.2\" _module_preset=\"default\" custom_margin=\"2%||||false|false\" custom_padding=\"0px||17px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.2\" _module_preset=\"default\" background_color=\"RGBA(0,0,0,0)\" custom_margin=\"0px|0px|0px|0px|true|true\" custom_padding=\"0px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]Many attacks on company networks begin with the compromise of a single end device, e.g. a company notebook. An employee inadvertently clicks on a phishing email that installs malware on their device. The attacker can then try to gain administrator rights on the device or use the device as a starting point for further attacks on the internal network, bypassing the network perimeter defenses.[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.2\" _module_preset=\"default\" custom_padding=\"0px||0px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.2\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.2\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>Defending against such complex, multi-stage attacks requires a holistic defense that ranges from a backup strategy and employee training to the secure configuration of systems and applications. Securing company notebooks is an important part of this.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"2_5,3_5\" _builder_version=\"4.27.2\" _module_preset=\"default\" custom_margin=\"|auto|14px|auto||\" custom_padding=\"25px||30px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"2_5\" _builder_version=\"4.27.2\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-pentest-kachel-mitarbeitende.jpg\" title_text=\"usd-herolab-pentest-kachel-mitarbeitende\" _builder_version=\"4.27.2\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_5\" _builder_version=\"4.27.2\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.2\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p>The likelihood of employees clicking on a phishing email can be reduced with training, but not reduced to zero. However, a well-secured company notebook makes it much more difficult for attackers to increase their own rights on the company notebook or to use the device as a starting point for further attacks.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" custom_padding_last_edited=\"on|desktop\" _builder_version=\"4.27.2\" _module_preset=\"default\" custom_margin=\"0px|auto||auto|false|false\" custom_margin_tablet=\"1%|auto||auto|false|false\" custom_margin_phone=\"0%|auto||auto|false|false\" custom_margin_last_edited=\"on|phone\" custom_padding=\"4%||2%||false|false\" custom_padding_tablet=\"4%||2%||false|false\" custom_padding_phone=\"4%||2%||false|false\" border_width_all=\"2px\" border_color_all=\"#00a2b6\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.27.2\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/security-analysis-pentest-grafik-schwachstelle.svg\" title_text=\"security-analysis-pentest-grafik-schwachstelle\" align=\"center\" _builder_version=\"4.27.2\" _module_preset=\"default\" width=\"75%\" width_tablet=\"75%\" width_phone=\"40%\" width_last_edited=\"on|phone\" custom_margin=\"5%|||20%|false|false\" custom_margin_tablet=\"5%|||20%|false|false\" custom_margin_phone=\"4%|||20%|false|false\" custom_margin_last_edited=\"on|phone\" custom_padding=\"0px||||false|false\" module_alignment_tablet=\"\" module_alignment_phone=\"center\" module_alignment_last_edited=\"on|phone\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.27.2\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.2\" _module_preset=\"default\" custom_margin_tablet=\"\" custom_margin_phone=\"0px|8%|0px|8%|false|false\" custom_margin_last_edited=\"on|phone\" custom_padding=\"1%||3%||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3><span style=\"color: #f07f1d\">Common Vulnerabilities Include:<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.2\" _module_preset=\"default\" custom_margin_tablet=\"\" custom_margin_phone=\"|4%|0px|4%|false|false\" custom_margin_last_edited=\"on|phone\" custom_padding=\"||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<ul>\n<li>Vulnerabilities in third-party software<\/li>\n<li>Insecure configuration of the operating system<\/li>\n<li>Weak access rights in the file system<\/li>\n<li>Access data readable for every user<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.2\" _module_preset=\"default\" custom_margin=\"3%|auto||auto|false|false\" custom_padding=\"16px||0px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.2\" _module_preset=\"default\" custom_margin=\"0px||||false|false\" custom_margin_tablet=\"0px||||false|false\" custom_margin_phone=\"5%||5%||false|false\" custom_margin_last_edited=\"on|phone\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>How Does usd AG Proceed with the Penetration Test of Your Company Notebook?<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.2\" _module_preset=\"default\" custom_margin=\"0px||||false|false\" custom_padding=\"0px||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]We carry out pentests using a standardized methodology, which is expanded to include specific elements for pentests of company notebooks:<\/p>\n<p>Our security analysts start the test with a regular employee account and try to extend their authorizations on the device from there. To do this, they apply system-specific procedures for Microsoft Windows and Linux. In addition, regardless of the operating system used, a comprehensive picture of the installed third-party software and the current version of the components is recorded.[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"3_5,2_5\" _builder_version=\"4.16\" _module_preset=\"default\" custom_padding=\"23px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"3_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.2\" _module_preset=\"default\" custom_margin_tablet=\"\" custom_margin_phone=\"||3%||false|false\" custom_margin_last_edited=\"on|phone\" custom_padding=\"||13px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]This software is examined for known vulnerabilities, misconfigurations and insecure interactions with the operating system. Finally, the hardening measures available on the workstation are examined and compared with current best practices.[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/pentest\/pentest-approach\/\" url_new_window=\"on\" button_text=\"More about our methodology\" button_alignment=\"left\" _builder_version=\"4.27.2\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_text_color=\"#f49525\" button_bg_color=\"RGBA(255,255,255,0)\" button_border_width=\"1px\" button_border_color=\"#f49525\" custom_margin=\"||1%||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"2_5\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-pentest-kachel-methodik.jpg\" title_text=\"usd-herolab-pentest-kachel-methodik\" _builder_version=\"4.27.2\" _module_preset=\"default\" custom_margin_tablet=\"\" custom_margin_phone=\"15%||||false|false\" custom_margin_last_edited=\"on|phone\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.0\" _module_preset=\"default\" locked=\"off\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.0\" _module_preset=\"default\" border_color_all=\"#F07F1D\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_testimonial author=\"Luca Rupp\" job_title=\"Senior Consultant IT Security\" portrait_url=\"https:\/\/www.usd.de\/wp-content\/uploads\/Luca-Rupp_PPT-Kontakt.jpg\" quote_icon_color=\"#F07F1D\" quote_icon_background_color=\"#FFFFFF\" font_icon=\"&#xe06a;||divi||400\" portrait_width=\"200px\" portrait_height=\"200px\" use_icon_font_size=\"on\" icon_font_size=\"35px\" _builder_version=\"4.27.4\" _module_preset=\"default\" background_color=\"RGBA(255,255,255,0)\" custom_padding=\"3%||2%||false|false\" animation_style=\"fade\" border_width_all=\"2px\" border_color_all=\"#F07F1D\" border_radii_portrait=\"on|100%|100%|100%|100%\" border_color_all_portrait=\"RGBA(255,255,255,0)\" box_shadow_style_image=\"preset4\" box_shadow_horizontal_image=\"0px\" box_shadow_vertical_image=\"0px\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<p><span style=\"font-size: 18px;font-weight: 300\">Securing company notebooks is an important protection for companies. While network perimeters are often the focus of defense measures, many hackers use employees' end devices as a point of entry for their attacks. A workstation pentest is therefore an important tool for protecting your company network.<\/span><\/p>\n<p>[\/et_pb_testimonial][\/et_pb_column][\/et_pb_row][et_pb_row custom_padding_last_edited=\"on|phone\" _builder_version=\"4.27.2\" _module_preset=\"default\" custom_margin_tablet=\"\" custom_margin_phone=\"0px||0px||false|false\" custom_margin_last_edited=\"on|phone\" custom_padding_tablet=\"\" custom_padding_phone=\"0px||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.27.2\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.2\" _module_preset=\"default\" custom_margin_tablet=\"\" custom_margin_phone=\"||5%||false|false\" custom_margin_last_edited=\"on|phone\" custom_padding_tablet=\"\" custom_padding_phone=\"||0px||false|false\" custom_padding_last_edited=\"on|phone\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>What Checks Are Included in Your Workstation Pentests?<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.2\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]The following checks are carried out during workstation pentesting:[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" _builder_version=\"4.27.2\" _module_preset=\"default\" custom_padding=\"0px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_2\" _builder_version=\"4.27.2\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text disabled_on=\"on|off|off\" _builder_version=\"4.27.2\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<ul>\n<li>Checking the hard disk encryption<\/li>\n<li>Analysis of scheduled tasks and cronjobs<\/li>\n<li>Checks for insecurely set file permissions<\/li>\n<li>Search for locally stored access data<\/li>\n<li>Write access to services that are executed with higher rights<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.27.2\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text disabled_on=\"on|off|off\" _builder_version=\"4.27.2\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<ul>\n<li>Investigations of highly privileged processes that use user-controlled resources<\/li>\n<li>Checking the configured hardening mechanisms<\/li>\n<li>Analysis of network service<\/li>\n<\/ul>\n<p>[\/et_pb_text][et_pb_text disabled_on=\"off|on|on\" _builder_version=\"4.27.2\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<ul>\n<li>Checking the hard disk encryption<\/li>\n<li>Analysis of scheduled tasks and cronjobs<\/li>\n<li>Checks for insecurely set file permissions<\/li>\n<li>Search for locally stored access data<\/li>\n<li>Write access to services that are executed with higher rights<\/li>\n<li>Investigations of highly privileged processes that use user-controlled resources<\/li>\n<li>Checking the configured hardening mechanisms<\/li>\n<li>Analysis of network service<\/li>\n<\/ul>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_4,3_4\" custom_padding_last_edited=\"on|desktop\" _builder_version=\"4.27.2\" _module_preset=\"default\" custom_padding=\"4%||24px||false|false\" custom_padding_tablet=\"4%||24px||false|false\" custom_padding_phone=\"4%||24px||false|false\" border_width_all=\"2px\" border_color_all=\"#00a2b6\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_4\" _builder_version=\"4.27.2\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_image src=\"https:\/\/www.usd.de\/wp-content\/uploads\/security-analysis-pentest-grafik-tipp.svg\" title_text=\"security-analysis-pentest-grafik-tipp\" align=\"center\" align_tablet=\"center\" align_phone=\"center\" align_last_edited=\"on|phone\" _builder_version=\"4.27.2\" _module_preset=\"default\" width=\"75%\" width_tablet=\"75%\" width_phone=\"40%\" width_last_edited=\"on|phone\" custom_margin=\"0px|||20%|false|false\" custom_margin_tablet=\"0px|||0px|false|false\" custom_margin_phone=\"4%|||30%|false|false\" custom_margin_last_edited=\"on|phone\" custom_padding=\"||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_image][\/et_pb_column][et_pb_column type=\"3_4\" _builder_version=\"4.27.2\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.2\" _module_preset=\"default\" custom_margin_tablet=\"\" custom_margin_phone=\"|8%|0%|8%|false|false\" custom_margin_last_edited=\"on|phone\" custom_padding_tablet=\"\" custom_padding_phone=\"1%||4%||false|false\" custom_padding_last_edited=\"on|phone\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3><span style=\"color: #f07f1d\">Our Tip: Security Audits<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_text _builder_version=\"4.27.2\" _module_preset=\"default\" custom_margin=\"|3%|3%||false|false\" custom_margin_tablet=\"|3%|3%||false|false\" custom_margin_phone=\"|3%|3%|1%|false|false\" custom_margin_last_edited=\"on|phone\" custom_padding=\"|3%|||false|false\" custom_padding_tablet=\"|3%|||false|false\" custom_padding_phone=\"|8%||8%|false|false\" custom_padding_last_edited=\"on|phone\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]Optionally, we conduct a security audit that takes into account recognized IT security standards, best practices and the benchmarks of the Center for Internet Security (CIS). We derive  risks from the identified vulnerabilities and typical security gaps and show you ways to sustainably improve your company's security.[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/security-audits\/\" url_new_window=\"on\" button_text=\"Learn more\" button_alignment=\"left\" _builder_version=\"4.27.2\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_text_color=\"#f49525\" button_bg_color=\"RGBA(255,255,255,0)\" button_border_width=\"1px\" button_border_color=\"#f49525\" custom_margin=\"||1%||false|false\" custom_margin_tablet=\"||1%||false|false\" custom_margin_phone=\"7%|8%|1%|8%|false|false\" custom_margin_last_edited=\"on|phone\" custom_padding_tablet=\"\" custom_padding_phone=\"||||false|false\" custom_padding_last_edited=\"on|phone\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.16\" _module_preset=\"default\" custom_margin=\"-8px||||false|false\" custom_padding=\"||2px|||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.16\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_divider color=\"#d8d8d8\" _builder_version=\"4.27.2\" _module_preset=\"default\" custom_margin=\"5%||||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_divider][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\"4.27.2\" _module_preset=\"default\" custom_margin=\"0px|auto|0px|auto|false|false\" custom_padding=\"||0px||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"4_4\" _builder_version=\"4.20.2\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.2\" _module_preset=\"default\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h2>Get More Insights<\/h2>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\"1_2,1_2\" _builder_version=\"4.27.2\" _module_preset=\"default\" custom_padding=\"19px|||||\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][et_pb_column type=\"1_2\" _builder_version=\"4.27.2\" _module_preset=\"default\" background_color=\"rgba(10,0,0,0.7)\" background_image=\"https:\/\/www.usd.de\/wp-content\/uploads\/usd-herolab-pentest-kachel-news-workstation.jpg\" background_blend=\"multiply\" custom_padding=\"||4%||false|false\" global_colors_info=\"{}\" background__hover_enabled=\"off|hover\" theme_builder_area=\"post_content\"][et_pb_text _builder_version=\"4.27.2\" _module_preset=\"2f9ba085-a5fa-4356-993b-05b9ace0780d\" custom_padding=\"47px|30px|25px|30px|false|true\" link_option_url=\"https:\/\/www.usd.de\/en\/pentest\/pentest-benefits\/\" link_option_url_new_window=\"on\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"]<\/p>\n<h3 style=\"text-align: left\"><span style=\"color: #f07f1d\">Pentest:<\/span><span style=\"color: #ffffff\"><br \/>\nYour benefits at a glance<\/span><\/h3>\n<p>[\/et_pb_text][et_pb_button button_url=\"https:\/\/www.usd.de\/en\/pentest\/pentest-benefits\/\" url_new_window=\"on\" button_text=\"Learn more\" button_alignment=\"center\" _builder_version=\"4.27.2\" _module_preset=\"7d5eca5e-7ccf-4359-a023-e8404a31180a\" button_text_color=\"#F07F1D\" button_bg_color=\"RGBA(255,255,255,0)\" button_border_width=\"1px\" custom_margin=\"||1%||false|false\" global_colors_info=\"{}\" theme_builder_area=\"post_content\"][\/et_pb_button][\/et_pb_column][et_pb_column type=\"1_2\" _builder_version=\"4.27.2\" _module_preset=\"default\" background_enable_color=\"off\" background_enable_image=\"off\" background_blend=\"multiply\" custom_padding=\"||7.7%||false|false\" global_colors_info=\"{}\" background__hover_enabled=\"off|hover\" theme_builder_area=\"post_content\"][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Workstation Pentest Prevent attacks on your company network via your employees' workstationsWorkstation Pentest Prevent attacks on your company network via your employees' workstationsMany attacks on company networks begin with the compromise of a single end device, e.g. a company notebook. An employee inadvertently clicks on a phishing email that installs malware on their device. The [&hellip;]<\/p>\n","protected":false},"author":96,"featured_media":43789,"parent":40183,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"footnotes":""},"class_list":["post-18617","page","type-page","status-publish","has-post-thumbnail","hentry"],"_links":{"self":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/18617","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/users\/96"}],"replies":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/comments?post=18617"}],"version-history":[{"count":4,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/18617\/revisions"}],"predecessor-version":[{"id":62972,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/18617\/revisions\/62972"}],"up":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/pages\/40183"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media\/43789"}],"wp:attachment":[{"href":"https:\/\/www.usd.de\/en\/wp-json\/wp\/v2\/media?parent=18617"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}