ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Had a vulnerability assessment with Nessus and it found hundreds of missing critical Windows OS updates from as far back as 2016 - is this even right?

    IT Discussion
    11
    68
    2.8k
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • stacksofplatesS
      stacksofplates @IRJ
      last edited by

      @irj said in Had a vulnerability assessment with Nessus and it found hundreds of missing critical Windows OS updates from as far back as 2016 - is this even right?:

      @tim_g said in Had a vulnerability assessment with Nessus and it found hundreds of missing critical Windows OS updates from as far back as 2016 - is this even right?:

      You'd think they would be running OpenVAS or SCAP or something similar instead of just scanning for patches that may or may not apply to the server...

      What are you talking about? It only runs applicable scripts. Nessus is much better than either of those solutions.

      I don't think it compares to SCAP. That's just hardening rules. I really like OpenSCAP it's just a different tool.

      ObsolesceO 1 Reply Last reply Reply Quote 0
      • ObsolesceO
        Obsolesce @stacksofplates
        last edited by

        @stacksofplates said in Had a vulnerability assessment with Nessus and it found hundreds of missing critical Windows OS updates from as far back as 2016 - is this even right?:

        @irj said in Had a vulnerability assessment with Nessus and it found hundreds of missing critical Windows OS updates from as far back as 2016 - is this even right?:

        @tim_g said in Had a vulnerability assessment with Nessus and it found hundreds of missing critical Windows OS updates from as far back as 2016 - is this even right?:

        You'd think they would be running OpenVAS or SCAP or something similar instead of just scanning for patches that may or may not apply to the server...

        What are you talking about? It only runs applicable scripts. Nessus is much better than either of those solutions.

        I don't think it compares to SCAP. That's just hardening rules. I really like OpenSCAP it's just a different tool.

        OpenSCAP is what I meant... I didn't know there was a difference between OpenSCAP and SCAP.

        stacksofplatesS 1 Reply Last reply Reply Quote 0
        • stacksofplatesS
          stacksofplates @Obsolesce
          last edited by

          @tim_g said in Had a vulnerability assessment with Nessus and it found hundreds of missing critical Windows OS updates from as far back as 2016 - is this even right?:

          @stacksofplates said in Had a vulnerability assessment with Nessus and it found hundreds of missing critical Windows OS updates from as far back as 2016 - is this even right?:

          @irj said in Had a vulnerability assessment with Nessus and it found hundreds of missing critical Windows OS updates from as far back as 2016 - is this even right?:

          @tim_g said in Had a vulnerability assessment with Nessus and it found hundreds of missing critical Windows OS updates from as far back as 2016 - is this even right?:

          You'd think they would be running OpenVAS or SCAP or something similar instead of just scanning for patches that may or may not apply to the server...

          What are you talking about? It only runs applicable scripts. Nessus is much better than either of those solutions.

          I don't think it compares to SCAP. That's just hardening rules. I really like OpenSCAP it's just a different tool.

          OpenSCAP is what I meant... I didn't know there was a difference between OpenSCAP and SCAP.

          SCAP is the NIST stuff. OpenSCAP is the tool.

          IRJI ObsolesceO 2 Replies Last reply Reply Quote 1
          • IRJI
            IRJ @stacksofplates
            last edited by

            @stacksofplates said in Had a vulnerability assessment with Nessus and it found hundreds of missing critical Windows OS updates from as far back as 2016 - is this even right?:

            @tim_g said in Had a vulnerability assessment with Nessus and it found hundreds of missing critical Windows OS updates from as far back as 2016 - is this even right?:

            @stacksofplates said in Had a vulnerability assessment with Nessus and it found hundreds of missing critical Windows OS updates from as far back as 2016 - is this even right?:

            @irj said in Had a vulnerability assessment with Nessus and it found hundreds of missing critical Windows OS updates from as far back as 2016 - is this even right?:

            @tim_g said in Had a vulnerability assessment with Nessus and it found hundreds of missing critical Windows OS updates from as far back as 2016 - is this even right?:

            You'd think they would be running OpenVAS or SCAP or something similar instead of just scanning for patches that may or may not apply to the server...

            What are you talking about? It only runs applicable scripts. Nessus is much better than either of those solutions.

            I don't think it compares to SCAP. That's just hardening rules. I really like OpenSCAP it's just a different tool.

            OpenSCAP is what I meant... I didn't know there was a difference between OpenSCAP and SCAP.

            SCAP is the NIST stuff. OpenSCAP is the tool.

            You can also run NIST specific audits with nessus.

            stacksofplatesS 1 Reply Last reply Reply Quote 0
            • ObsolesceO
              Obsolesce @stacksofplates
              last edited by

              @stacksofplates said in Had a vulnerability assessment with Nessus and it found hundreds of missing critical Windows OS updates from as far back as 2016 - is this even right?:

              @tim_g said in Had a vulnerability assessment with Nessus and it found hundreds of missing critical Windows OS updates from as far back as 2016 - is this even right?:

              @stacksofplates said in Had a vulnerability assessment with Nessus and it found hundreds of missing critical Windows OS updates from as far back as 2016 - is this even right?:

              @irj said in Had a vulnerability assessment with Nessus and it found hundreds of missing critical Windows OS updates from as far back as 2016 - is this even right?:

              @tim_g said in Had a vulnerability assessment with Nessus and it found hundreds of missing critical Windows OS updates from as far back as 2016 - is this even right?:

              You'd think they would be running OpenVAS or SCAP or something similar instead of just scanning for patches that may or may not apply to the server...

              What are you talking about? It only runs applicable scripts. Nessus is much better than either of those solutions.

              I don't think it compares to SCAP. That's just hardening rules. I really like OpenSCAP it's just a different tool.

              OpenSCAP is what I meant... I didn't know there was a difference between OpenSCAP and SCAP.

              SCAP is the NIST stuff. OpenSCAP is the tool.

              Ah, gotcha

              1 Reply Last reply Reply Quote 0
              • stacksofplatesS
                stacksofplates @IRJ
                last edited by

                @irj said in Had a vulnerability assessment with Nessus and it found hundreds of missing critical Windows OS updates from as far back as 2016 - is this even right?:

                @stacksofplates said in Had a vulnerability assessment with Nessus and it found hundreds of missing critical Windows OS updates from as far back as 2016 - is this even right?:

                @tim_g said in Had a vulnerability assessment with Nessus and it found hundreds of missing critical Windows OS updates from as far back as 2016 - is this even right?:

                @stacksofplates said in Had a vulnerability assessment with Nessus and it found hundreds of missing critical Windows OS updates from as far back as 2016 - is this even right?:

                @irj said in Had a vulnerability assessment with Nessus and it found hundreds of missing critical Windows OS updates from as far back as 2016 - is this even right?:

                @tim_g said in Had a vulnerability assessment with Nessus and it found hundreds of missing critical Windows OS updates from as far back as 2016 - is this even right?:

                You'd think they would be running OpenVAS or SCAP or something similar instead of just scanning for patches that may or may not apply to the server...

                What are you talking about? It only runs applicable scripts. Nessus is much better than either of those solutions.

                I don't think it compares to SCAP. That's just hardening rules. I really like OpenSCAP it's just a different tool.

                OpenSCAP is what I meant... I didn't know there was a difference between OpenSCAP and SCAP.

                SCAP is the NIST stuff. OpenSCAP is the tool.

                You can also run NIST specific audits with nessus.

                Well it does some things I “think” Nessus doesn’t. It will scan VMs without an agent or logging in from the hypervisor. OpenSCAP also has all of RHELs gardening rules baked in like sysctl configs and things like AIDE.

                1 Reply Last reply Reply Quote 1
                • stacksofplatesS
                  stacksofplates
                  last edited by

                  Haha it’s only somewhat decent with gardening rules. It has many better hardening rules.

                  1 Reply Last reply Reply Quote 0
                  • IRJI
                    IRJ
                    last edited by

                    Here is an example of patching not being good enough. This needs an additional reg key.

                    https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-8529

                    1 Reply Last reply Reply Quote 0
                    • 1
                    • 2
                    • 3
                    • 4
                    • 4 / 4
                    • First post
                      Last post