11.07.2015 Views

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

Improving Web Application Security: Threats and - CGISecurity

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

How To: Implement Patch Management 749You can also specify a range of computers by using the /r option. For example:mbsacli /r 192.168.0.1-192.168.0.254 /n OS+IIS+SQL+PASSWORDFinally, you can scan a domain by using the /d option. For example:mbsacli /d NameOfMyDomain /n OS+IIS+SQL+PASSWORD To analyze the generated report1. Run MBSA by double-clicking the desktop icon or by selecting it from thePrograms menu.2. Click Pick a security report to view <strong>and</strong> open the report or reports, if you scannedmultiple computers.3. To view the results of a scan against the target machine, mouse over the computername listed. Individual reports are sorted by the timestamp of the report.As previously described, the advantage of the comm<strong>and</strong> line method is that it maybe scripted <strong>and</strong> scheduled to execute. This schedule is determined by the exposureof your systems to hostile networks, <strong>and</strong> by your security policy.MBSA Output ExplainedThe following example was taken using the MBSA version 1.1.Figure 2Screenshot of the report details for a scanned machine

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!