I am using MBSA for Windows server security audit reports. Although, FAQs on MBSA outline steps for successful remote security scans using MBSA; however, GPO-based settings for managed systems require additional work. This is due permissions on registry key HKLM\Software\Classes\AppID\{B366DEBE-645B-43A5-B865-DDD82C345492}. This solution is tested in Hyper-V based virtual environment with Windows 2008 R2, see reference website links at the end.
The startup script below uses REG and SUBINACL tools.
The port exceptions are as follows.
Additionally; policies, "Windows Firewall: Allow inbound file and printer sharing exception" and "Windows Firewall: Allow inbound remote administration exception" are enabled for scanning server.
References:
1. http://www.microsoft.com/mbsa
2. http://www.microsoft.com/downloads/en/details.aspx?FamilyID=e8ba3e56-d8fe-4a91-93cf-ed6985e3927b&displaylang=en
The startup script below uses REG and SUBINACL tools.
The port exceptions are as follows.
Additionally; policies, "Windows Firewall: Allow inbound file and printer sharing exception" and "Windows Firewall: Allow inbound remote administration exception" are enabled for scanning server.
References:
1. http://www.microsoft.com/mbsa
2. http://www.microsoft.com/downloads/en/details.aspx?FamilyID=e8ba3e56-d8fe-4a91-93cf-ed6985e3927b&displaylang=en
Hi.
ReplyDeleteI will post a manual-work in this respect.
Regards
Hi, it would be nice if you could post the stroings from the screenshots as text, so it's possible to copy-paste it :) Thanks.
ReplyDeleteThis is the file we use:
ReplyDeleteConfigAdwFW-MBSA.cmd
---
@Echo Off
Cls
Set RegKey=HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{B366DEBE-645B-43A5-B865-DDD82C345492}
Set UtilDir=\\SERVER\Utils\W2K3_ResKit\
Reg Query "%RegKey%" | Find /i "Endpoints REG_MULTI_SZ ncacn_ip_tcp,0,49494"
If %Errorlevel% equ 0 Goto End
"%UtilDir%\subinacl.exe" /keyreg "%RegKey%" /setowner=Administrators
"%UtilDir%\subinacl.exe" /keyreg "%RegKey%" /grant=Administrators=F
"%UtilDir%\subinacl.exe" /keyreg "%RegKey%" /grant=SYSTEM=F
Reg Add "%RegKey%" /v Endpoints /t REG_MULTI_SZ /d ncacn_ip_tcp,0,49494 /f
:End
---
Make sure the FIND command contains the correct number of spaces (omitted by the browser in the above) or just use Find /i "ncacn_ip_tcp,0,49494" instead - that ought to be enough I guess.
ReplyDeleteThis comment has been removed by the author.
ReplyDeleteHere the powerhell version. I kept subinacl.exe with my script (Same folder)
ReplyDeleteFunction RegistryValue($Regkey, $name)
{
#Change rights on regkey
cd $PSScriptRoot
.\subinacl.exe /keyreg $Regkey /setowner=Administrators
.\subinacl.exe /keyreg $Regkey /grant=Administrators=F
.\subinacl.exe /keyreg $Regkey /grant=SYSTEM=F
#Add new value for DCOM settings
Set-ItemProperty -Path "HKLM:\SOFTWARE\Classes\AppID\{B366DEBE-645B-43A5-B865-DDD82C345492}" -Name $name -Value ([string[]]("ncacn_ip_tcp,0,49494"))
}
#*=============================================
$Regkey = "HKEY_LOCAL_MACHINE\SOFTWARE\Classes\AppID\{B366DEBE-645B-43A5-B865-DDD82C345492}"
$name = "Endpoints"
RegistryValue $Regkey $name