Patent attributes
Techniques for providing a network auditing service may be provided. Information about a configuration of a potentially compromised network of computer resources may be compared to a maintained and standard network configuration that is distinct from the potentially compromised network to determine differences. In one example, the potentially compromised network of computer resources may be periodically scanned for configuration information, which may be compared to the standard network configuration to determine if any changes have occurred that would indicate security problems. A report of the differences between the potentially compromised network and the standard network configuration information may be generated and provided for presentation.