Single factor authentication everywhere.
Zero telemetry and monitoring.
Endpoint management dependent on a protocol that has a zero day every other week (SMB) or worse, no endpoint management at all.
Given no AD, Windows accounts are likely shared, and more than even odds they're admins too.
More than likely has RDP open to the entire LAN.
More than likely has crap passwords on admin accounts.
More than likely has a version of MSSQL running that is no supported, and not patched.
More than likely has crap passwords on SQL level authentication.
In short, the environment isn't managed, at all and it was never deployed correctly even with this operational context.
All of this means, as soon as anyone in that office clicks on the wrong thing, the entire operation goes up in smoke and in the process, exposes PHI.
This is how you get sued! The best case scenario for you is when it he gets hit, and he will get hit, you simply lose a customer because he's out of business. Either way, you need to replace the customer for your own operational integrity.
If you want to fix it, and there is no AD, then make sure that server is on its own VLAN, a hardware firewall only allows HTTPs from the LAN to that server, there's a real SSL certificate on that service, the platform is patched, the platform is running a supported and patched version of SQL, and the platform has something like Datto protecting it. Oh, and it needs to have the most recent version of Eaglesoft on it too. You will be tempted to punch RDP pinholes, DO NOT GIVE IN to this temptation. Open and close firewall rules on the local hardware firewall as required to enable management access, and make sure that firewall has an MFA protected admin login.
Or... because it's probably easier to read, the Copilot rewrite of above.

Snapshot of a Severely Mismanaged Environment
- Authentication: Single-factor authentication across the board—no MFA anywhere.
- Visibility: No telemetry, no monitoring. You're flying blind.
- Endpoint Management: Either nonexistent or reliant on SMB, a protocol plagued by frequent zero-days.
- User Accounts: No Active Directory means Windows accounts are likely shared—and odds are, they’re local admins.
- Remote Access: RDP is probably open to the entire LAN.
- Credentials: Admin accounts likely use weak passwords.
- Database: MSSQL is probably outdated, unsupported, and unpatched.
- SQL Auth: Expect weak or default credentials at the SQL authentication level.

What This Means
This environment is not just poorly managed—it was never properly deployed to begin with. One wrong click by any user, and the entire operation could be compromised, exposing Protected Health Information (PHI) in the process.
This is how lawsuits happen.
Best-case scenario: the client gets breached, goes out of business, and you lose them. Worst-case: you're implicated in a PHI exposure and face legal and reputational fallout. Either way, your operational integrity takes a hit.

If You’re Going to Fix It (Without AD)
Here’s the minimum viable remediation plan:
- Network Segmentation: Isolate the server on its own VLAN.
- Firewall Rules: Use a hardware firewall to restrict LAN traffic to HTTPS only. No RDP pinholes—ever. (Temporary access, then disable the rule)
- SSL: Install a valid SSL certificate on the hosted service.
- Platform Patching: Ensure the OS and application stack are fully patched.
- SQL Server: Run a supported and patched version of MSSQL.
- Backup & DR: Use a robust solution like Datto for backup and disaster recovery.
- Application Patching: Ensure the latest version of Eaglesoft is installed.
- Secure Admin Access: Use firewall rule toggling for remote management, and protect firewall admin access with MFA.
This isn’t just about best practices—it’s about survival. If you're supporting this kind of environment, you're sitting on a powder keg. Fix it before it blows.