The Microsoft Baseline Security Analyzer A practical look….

Slides:



Advertisements
Similar presentations
Patch Management Patch Management in a Windows based environment
Advertisements

Auditing Microsoft Active Directory
Your Definitive Lockdown Guide
Configuring Windows to run Dr.Web scanner remotely.
WSUS Presented by: Nada Abdullah Ahmed.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
Module 5: Configuring Access for Remote Clients and Networks.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 10: Server Administration.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Microsoft Baseline Security Analyzer INLS 187 Security Software Presentation by Hinár György Polczer
Patching MIT SUS Services IS&T Network Infrastructure Services Team.
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Maintaining and Updating Windows Server 2008
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Installing and Configuring a Secure Web Server COEN 351 David Papay.
Microsoft Office 2013 ®® Appendix A Introduction to Cloud Computing.
Group Policy in Microsoft Windows Active Directory.
IT:Network:Microsoft Applications
SUS Services ECE Computer Facilities. SUS Services Software Update Services Microsoft Security And Critical Update Service Microsoft Security And Critical.
Security Audit Tools Project. CT 395 IT Security I Professor Igbeare Summer Quarter 2009 August 25, 2009.
Principles of Computer Security: CompTIA Security + ® and Beyond, Second Edition © 2010 Baselines Chapter 14.
ITE 370. Deployment Deployment is the process used to distribute a finished application (or component) to be installed on other computers.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Module 4: Add Client Computers and Devices to the Network.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
Chapter SIx Maintaining a Computer Part I: Configuring, Updating, and Upgrading the OS.
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
CIS 460 – Network Design Seminar Network Security Scanner Tool GFI LANguard.
Network Management Tool Amy Auburger. 2 Product Overview Made by Ipswitch Affordable alternative to expensive & complicated Network Management Systems.
CN1176 Computer Support Kemtis Kunanuraksapong MSIS with Distinction MCT, MCTS, MCDST, MCP, A+
SMS 2003 Deployment and Managing Windows Security Rafal Otto Internet Services Group Department of Information Technology CERN 26 May 2016.
Computer Security and Penetration Testing Chapter 16 Windows Vulnerabilities.
Time lag between discovering issue and resolving Difficult to find solutions and patches that can help resolve issue Service outages expensive and.
DIT314 ~ Client Operating System & Administration CHAPTER 5 MANAGING USER ACCOUNTS AND GROUPS Prepared By : Suraya Alias.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Module 1: Installing Microsoft Windows XP Professional.
Module 5: Configuring Internet Explorer and Supporting Applications.
Module 6: Designing Security for Network Hosts
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
Turning Windows 7 into a Web Server Ch 28. Understanding Internet Information Services.
Vulnerability Scanning Vulnerability scanners are automated tools that scan hosts and networks for known vulnerabilities and weaknesses Credentialed vs.
Microsoft Management Seminar Series SMS 2003 Change Management.
IST 222 Day 3. Homework for Today Take up homework and go over Go to Microsoft website and check out their hardware compatibility list.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
NetTech Solutions Supporting Users and Troubleshooting Desktop Applications on Microsoft Windows XP Instructor Richard Fredrickson.
NetTech Solutions Protecting the Computer Lesson 10.
Virtualization Technology and Microsoft Virtual PC 2007 YOU ARE WELCOME By : Osama Tamimi.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
Remote Access Usages. Remote Desktop Remote desktop technology makes it possible to view another computer's desktop on your computer. This means you can.
Features Of SQL Server 2000: 1. Internet Integration: SQL Server 2000 works with other products to form a stable and secure data store for internet and.
By Daniel Grim. What Is Windows NT? IPSEC/Windows Firewall NTFS File System Registry Permissions Managing User Accounts Conclusion Outline.
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
By the end of this lesson you will be able to: 1. Determine the preventive support measures that are in place at your school.
Managing Office 365 Identities and Requirements.
Maintaining and Updating Windows Server 2008 Lesson 8.
NETWORK SECURITY LAB 1170 REHAB ALFALLAJ CT1406. Introduction There are a number of technologies that exist for the sole purpose of ensuring that the.
11 DEPLOYING AN UPDATE MANAGEMENT INFRASTRUCTURE Chapter 6.
Download and install add-in Download and install office windows components from the following link Click Here.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
How to convert a Demo to Multi-user
Lesson 6: Configuring Servers for Remote Management
Grades4sure PDF Dumps CompTIA Security + Certification Exam
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts.
Unit 27: Network Operating Systems
Information Security Session October 24, 2005
Lesson #7 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 7 Configuring Devices and Updates.
Chapter 7 – and 8 pp 155 – 202 of Web security by Lincoln D. Stein
How Enterprise Agents can be installed remotely on protected objects
Presentation transcript:

The Microsoft Baseline Security Analyzer A practical look….

Overview of Network Management Larger networks means: More computers to manage. More computers to maintain. Bigger security management issues. More computers to check for security holes. IT Departments Must Continue to manage workstations even during growth. Effectively find solutions to remain efficient in network security management.

The Microsoft Baseline Security Analyzer The Tool: –Scans computers locally or remotely for any possible security hazards. Weak Passwords. Unnecessary services that are running. Firewall status. File Shares –Scans Microsoft related products or technologies for any missing patches or updates. Microsoft Update Patches Microsoft Office Updates Microsoft Windows Vulnerabilities

The Microsoft Baseline Security Analyzer The Tool: –Has the ability to scan itself or multiple computers. Up to 10,000 computers can be scanned.

The Microsoft Baseline Security Analyzer Installation –Download the msi file from: –System Requirements Windows NT 4.x Windows 2000 Windows XP or Windows Server 2003 –For Scanning: Locally: Must be an administrator user. Remotely: Must have domain administrator privileges (or administrator access to the remote computer[s]).

The MSBA User Interface

Using The MSBA Local Scan –Click on “Scan a Computer” –Select your computer using the drop down box –Click “Start Scan”

Using The MSBA Remote Scan –Click on “Scan a Computer” or “Scan Multiple Computers” –Enter the computer name or select the domain to scan or enter an IP range. –Click “Start Scan”

Using The MSBA The Results Single Computer Scan –Report of the single computer scanned shows. Multiple Computer Scan –Select the report of the computer scanned.

Using The MSBA

The Security Report

Details of Report Most reports includes: Microsoft Office Updates Critical Updates or Patches Weak Password Check File Systems Guest Accounts Administrator Accounts Recommended is two. Windows Version Recommended Settings in: –Windows –Internet Explorer –Services –Firewall –File Sharing

Details of Report

What is the Tool Doing?! The MSBA uses a product and update catalogue from the Microsoft web site. Or a local intranet website that stores the catalogue. The MSBA parses through the catalogue (XML file) and compares certain values in the registry as well as scan the OS internally. Both remote and local scans are very similar however, To do a complete scan remotely, the remote registry service must be enabled.

Some Opinions Pros Very flexible. Command line interface allows customized output. Very efficient. Can scan up to 10,000 computers in one scan. Scans transparently. No downtime required. General User Interface acts like a Wizard. (Step 1, 2, 3…) Cons Security scans do not take into account recently discovered vulnerabilities. Accuracy depends on Microsoft’s knowledge of vulnerabilities. Only scans Microsoft technologies. Microsoft’s control of vulnerability information. –Ultimately, you will only know if Microsoft makes it known. At one point, Microsoft knew of a vulnerability for six months before information was released. Source: CBC News Online Article: – Can give false alarms if you have set your own settings.

Some Opinions The Bottom Line –Very useful in enterprise style networks. –A straightforward tool that allows any user to run it. –Free.

Thank You! Kaleem Maxwell