Identify hosts within the network.
Identify protocols in use within the network.
Develop a list of hosts and services provided by each.
Create a professional report detailing the information above as the initial document for development of the network security plan.