It also contains links that provide more detailed information, such as What was scannedResult Details, and How to Correct this. The MBSA scan summary is organized into sections. The more often you run the scan, the less often you will be prompted to fix something. This report file is stored on the computer from which you ran the MBSA tool. The MBS Setup window displays.
|Published (Last):||28 December 2019|
|PDF File Size:||20.43 Mb|
|ePub File Size:||4.75 Mb|
|Price:||Free* [*Free Regsitration Required]|
After you run a MBSA scan, the tool will provide you with specific suggestions for remediating security vulnerabilities. An MBSA scan can reduce and eliminate possible threats caused by security configuration problems and missing security updates. IIS 5. Scans a computer for insecure configuration settings. You may see a File Download — Security Warning window. It is safe to run or save this file. You may see an Internet Explorer — Security Warning window.
It is safe to run this file. The MBS Setup window displays. Click Next. Select the button next to I accept the license agreement and click Next.
Select a destination for the installation and click Next. Click the Install button to start the installation. A window will display when the installation has been successfully completed. Click OK. Click Scan a computer. Leave all options set to default and click Start Scan.
MBSA will download the list of latest security catalogue from Microsoft and begin the scan. Once the scan is complete, the scan results are shown in an organized report with several sections. Each section may require you to take different actions in order to remediate any problems that have been detected. On the left you will see a column labeled Score. Scan this list for any Red Xs. A red X represents an item that needs to be fixed.
This report file is stored on the computer from which you ran the MBSA tool. MBSA displays different icons in the report score columns depending upon whether a vulnerability was found on the scanned machine. For the administrative vulnerability checks, a red X is used when a critical check failed for example, a user has a blank password.
A yellow X is used when a non-critical check failed for example, an account has a password that does not expire. A green checkmark is used when a check passes that is, no issue was found for that particular check. A blue asterisk is used for best practice checks for example, checking if auditing is enabled. For the security update checks, a red exclamation mark is used when a security update is missing or a security check could not be performed from the scanned computer.
A yellow X is used for warning messages for example, the computer does not have the latest service pack or update rollup. Scores cannot be changed or reassigned for system configuration checks. It also contains links that provide more detailed information, such as What was scanned, Result Details, and How to Correct this.
The more often you run the scan, the less often you will be prompted to fix something. If it has been a while since you last updated your computer, this will most likely be marked with a red X. Running updates on your computer will fix these problems.
Windows Checks The Windows and Desktop Applications check determines if your current configuration leaves your computer vulnerable to easy attacks. Potential problems include weak passwords, Automatic Updates that are not turned on, Firewalls that are not turned on, or applications that need to be updated.
If any of these items are marked with a red X , then a How to correct this link will display. Click this link to open a page with instructions for correcting the problem. Analyzing the Scan For each vulnerability, MBSA provides additional details about the scan via the What was scanned link, the Result details link, and the How to correct this link.
The screen shot below displays the window that appears after you click on the Result details link. The Result details window contains details about the vulnerability in this case, weak passwords. The screen shot below displays the window that appears after you click on the How to correct this link. The How to correct this window displays the recommended solution with step-by-step instructions.
Once you have reviewed the report and corrected all the vulnerabilities, rerun MBSA to check that there are no more additional vulnerabilities that exist on your system. If you are not a system administrator, you should not run these scans. Note: If either of these services is unavailable or disabled, the scan results will indicate this. The scan will result in an error if these services do not have an exception configured in the Windows Firewall.
EXPORT MBSA REPORT TO PDF
You have not selected any file s to download. Total Size: 0 Microsoft recommends you install a download manager. A download manager is recommended for downloading multiple files. Microsoft Download Manager Manage all your internet downloads with this easy-to-use manager.
How To Export MBSA reports to Excel or anything else?
Visit Microsoft for a list of supported versions of Microsoft Office. MBSA performs the following actions during a scan: A yellow X is used when a non-critical check failed for example, an account has a password that does not expire. Scans a computer for insecure configuration settings. On the left you will see a column labeled Score. Once you have reviewed the report and corrected all the vulnerabilities, rerun MBSA to check that there are no more additional vulnerabilities that exist on your system. You may see an Internet Explorer — Security Warning window.