Saving Microsoft Baseline Security Analyzer Reports

 

Saving Microsoft Baseline Security Analyzer Reports

Reports are a key feature of an audit trail; here you are auditing the configuration a server device and logging the information for a situation in the future where accountability is a necessity for tracking changes to a network topology.

In this exercise, you will learn to save MBSA reports.

Learning Outcomes

After completing this exercise, you will be able to:

  • Save the MBSA Report

Your Devices

You will be using the following devices in this lab. Please power these on now.

  • PLABDC01 - (Windows Server 2019 - Domain Server)
  • PLABWIN10 - (Windows 10 - Workstation)

Practice Labs screenshot.

Task 1 - Save the MBSA Report

In this task, you will save a generated report as an XPS document, which is an open format designed and supported by Microsoft.

Step 1

Ensure that the required devices are powered on. Connect to PLABWIN10.

On the desktop, double-click Microsoft Baseline Security Analyzer 2.1.

Figure 4.1 Screenshot of PLABWIN10
Figure 4.1 Screenshot of PLABWIN10: Double-clicking the MBSA icon on the desktop.

Step 2

In the MBSA window, click the View existing security scan reports link.

Figure 4.2 Screenshot of PLABWIN10
Figure 4.2 Screenshot of PLABWIN10: Clicking the View existing security scan reports link.

Step 3

On the Choose a security scan report to view page, you may get to see one or more reports. The number of reports depends on the time you have run the scan. Click a report.

Figure 4.3 Screenshot of PLABWIN10
Figure 4.3 Screenshot of PLABWIN10: Clicking the listed reports.

Step 4

The report contents are displayed. Click the Print this report link, located towards the bottom left-hand corner of the window.

Figure 4.4 Screenshot of PLABWIN10
Figure 4.4 Screenshot of PLABWIN10: Clicking the Print this report link.

Step 5

The Print dialog box is displayed. In the Select Printer section, scroll across and select Microsoft XPS Document Writer and click Print.

Figure 4.5 Screenshot of PLABWIN10
Figure 4.5 Screenshot of PLABWIN10: Clicking the Print button in the Print dialog box.

Step 6

Name the file PLABDC01, keep the extension as .oxps and save the file to the Documents.

Figure 4.6 Screenshot of PLABWIN10
Figure 4.6 Screenshot of PLABWIN10: Saving the MBSA report in the Save Print Output As dialog box.

Step 7

Now minimize the MBSA window.

Figure 4.7 Screenshot of PLABWIN10
Figure 4.7 Screenshot of PLABWIN10: Minimizing the MBSA window.

Step 8

From the taskbar, click File Explorer and then navigate to the Documents folder in the left pane.

Figure 4.8 Screenshot of PLABWIN10
Figure 4.8 Screenshot of PLABWIN10: Showing the MBSA scan report in the Downloads folder.

Step 9

Notice that a file named PLABDC01 is present in the Documents folder. Double-click the file to read the output of the report.

Figure 4.9 Screenshot of PLABWIN10
Figure 4.9 Screenshot of PLABWIN10: Double-clicking the scan report in File Explorer.

Step 10

The PLABDC01.oxps - XPS Viewer window is displayed. It displays the contents of the PLABDC01 report.

This file is, in fact, part of the auditing performed against windows machines, and typically it would be kept as a record of actions that have been taken and recognized.

Figure 4.10 Screenshot of PLABWIN10
Figure 4.10 Screenshot of PLABWIN10: Showing the MBSA report in XPS Viewer.

Close the XPS Viewer and File Explorer windows.

/

Analyze Vulnerability Scan Results and Prioritize Activities

After you have scanned devices, servers, and Web applications for vulnerabilities, you need to analyze the vulnerability results now. This is because after discovering vulnerabilities, you need to make good use of them in penetration testing.

In this exercise, you will learn about analyzing the vulnerability scan results.

Learning Outcomes

After completing this exercise, you will be able to:

  • Explain False Positive
  • Know about Mapping Vulnerabilities

    Task 1 - Explain False Positive

    Please connect to PLABKALI01 to view the list of vulnerability results.

    A false positive is a condition, which is typically detected by a scanner, but it actually does not exist. It is about a condition that is considered to be present in a result but it does not exist. For example, a vulnerability may indicate that MySQL has a vulnerability, but, in reality, it does not exist or is not considered a vulnerability. Vulnerability scan results can produce several false positives. A vulnerability scanner may show false positives due to several reasons:

    • It is unable to recognize an executable or service.
    • To cover up a vulnerability, you may have implemented a compensating control. Therefore, the vulnerability may be shown as false positive even though it is covered by a compensating control.
    • The vulnerability scanner does not have updated definitions.
    • The scanner configurations are not correct, and therefore, several services or configuration settings may be marked as false positives.

    As a pentester, you must be able to identify false positives. Each scan result should be researched and calculated, whether it is a false positive or not. You will not know about every vulnerability that you discover, but researching can certainly prevent wastage of hours of work.

    Task 2 - Map Vulnerabilities

    After generating a list of vulnerabilities, you need to map them. In a network environment, there can be several targets that can have associated vulnerabilities. You may run more than one vulnerability scans. After you are done with the scans, you can collate the vulnerabilities in a single document and map them with the targets. You should update this document as and when you run a vulnerability scan.

    Figure 5.1 Screenshot of PLABKALI01
    Figure 5.1 Screenshot of PLABKALI01: Showing the list of vulnerabilities.

    Note: You can run MBSA once again to review the vulnerabilities. The password expiration should not appear on the list.

    Comments

    Popular Posts