Technical Reference for the MBSA Management Pack

Computer Attributes in the MBSA Management Pack

The MBSA Management Pack uses the following computer attributes that are installed with the Microsoft Operations Manager 2005 Management Pack:

  • Microsoft Operations Manager 2005 Agent

  • Microsoft Operations Manager 2005 Server

Computer Groups in the MBSA Management Pack

The MBSA Management Pack uses the following computer groups that are installed with the Microsoft Operations Manager 2005 Management Pack:

  • Microsoft Operations Manager 2005 Agent

  • Microsoft Operations Manager 2005 Server

Notification Groups in the MBSA Management Pack

None

MBSA Management Pack Task Details

Table 7 Management Pack Task Details

Task

Description

Displays Output

Windows 2000

Windows Server 2003

Agent-Managed

Server-Managed

Download mssecure.cab from File Transfer server

Initiates a File Transfer Response on the agent to download an updated mssecure.cab file from the configured File Transfer server.

X

X

X

X

X

Run MBSA Scan

Runs the MBSA patch and vulnerability scan on the target computer.

X

X

X

X

X

Scripts in the MBSA Management Pack

MBSA Install and Run

Description

This script determines if MBSA is installed on a monitored computer. If it is not installed, this script installs MBSA. This script also runs an MBSA scan.

Type

JScript

Run Location

Agent computer.

Rules

  • The MBSA Install and Run script is associated with the following event rule:

  • \Baseline Security Analyzer 1.2\MOM Agent\Event Rules\Run vulnerability and security patch scan

This rule is disabled by default.

Script Parameters

Table 8 Script Parameters

Script Parameter

Description and Default Value

HistoryPatchScanCommand

Runs the MBSA patch scan with the -history[n] command-line option. The variable [n] is set to 1, which displays the updates that have been explicitly installed. The value for this parameter is the command that runs scan: Syntax"%programfiles%\Microsoft Baseline Security Analyzer\mbsacli.exe" -hf -sms -x "%programfiles%\Microsoft Baseline Security Analyzer\MSSecure.cab" -f "%userprofile%\SecurityScans\MomHPScan.xml" -unicode -nvc -history 1

MBSAProductGuid

The guid for MBSA: Syntax{5FA4690C-1975-4F94-9A64-274F29BD9221}

MBSASetupFile

The file for installing MBSA: SyntaxMBSASetup-en.msi

PatchScanCommand

Runs the MBSA patch scan. The value for this parameter is the command that runs the scan: Syntax"%programfiles%\Microsot Baseline Security Analyzer\mbsacli.exe" -hf -sms -x "%programfiles%\Microsoft Baseline Security Analyzer\MSSecure.cab" -f "%userprofile%\SecurityScans\MomPScan.xml" -unicode -nvc

VulnerabilityScanCommand

Runs the MBSA Vulnerability Scan. The value for this parameter is the command that runs the scan: Syntax"%programfiles%\Microsoft Baseline Security Analyzer\mbsacli.exe" -n Updates -o MomVScanNew -nvc

MBSA Patch Scan Parser

Description

This script parses the MBSA Patch Scan log and generates events. Script parameters allow you to exclude or include specific items in the patch scan.

Type

JScript

Run Location

Agent computer.

Rules

  • The MBSA Patch Scan Parser script is associated with the following event rules:

  • \Baseline Security Analyzer 1.2\MOM Agent\Event Rules\Process patch scan results

  • \Baseline Security Analyzer 1.2\MOM Agent\Event Rules\Respond to Win32_PatchState Modification

These rules are enabled by default.

Script Parameters

Table 9 Script Parameters

Script Parameter

Description

Default Value

ExcludeList

This list of items to exclude from the patch scan.

None

IncludeList

The list of items to include in the patch scan.

None

MBSA Vulnerability Scan Parser

Description

This script parses the MBSA Vulnerability Scan log and generates events.

Type

JScript

Run Location

Agent computer.

Rules

  • The MBSA Vulnerability Scan Parser script is associated with the following event rule:

  • \Baseline Security Analyzer 1.2\MOM Agent\Event Rules\Process vulnerability scan results

This rule is enabled by default.

Script Parameters

None.

Rules in the MBSA Management Pack

Baseline Security Analyzer 1.2\File Transfer Server

Table 10 Rules

Rule

Type

Enabled

Severity

Dependency notes and other notes

Download mssecure.cab from https://www.microsoft.com

Event

Yes

None

Disable this rule if you are manually downloading the mssecure.cab file. For more information, see "Manually Downloading the MSSecure.cab File" earlier in this guide.

Baseline Security Analyzer 1.2\MOM Agent

The MBSA Management Pack public views depend on rules in this rule group being enabled.

Table 81 Rules

Rule

Type

Enabled

Severity

Dependency notes and other notes

Service Pack not installed

Event

Yes

Warning

 

Run Vulnerability and security patch scan

Event

No

None

This rule must be enabled for the following reports to run successfully:

  • Security Summary

  • Security Updates and Vulnerabilities

Process vulnerability scan results

Event

Yes

 

No alert is generated by default.

Security patch not installed

Event

Yes

Warning

 

Download mssecure.cab from File Transfer server

Event

Yes

None

 

Process patch scan results

Event

Yes

 

No alert is generated by default.

Download Directory Creation Warning

Event

Yes

Warning

 

Respond to Win32_PatchState Modification

Event

Yes

 

No alert is generated by default

Collect Microsoft Security Baseline Analyzer events

Collec-tion

Yes

None

 

Baseline Security Analyzer 1.2\MOM Agent\IE Vulnerabilities

The Internet Explorer Vulnerability Alerts public view depends on rules in this rule group being enabled.

Table 12 Rules

Rule

Type

Enabled

Severity

Dependency notes and other notes

IE Vulnerability: IE Zones are not configured for security

Event

Yes

Critical Error

 

IE Vulnerability: IE Enhanced Security configuration not enabled for Non-Administrators

Event

No

Warning

 

IE Vulnerability: IE Enhanced Security configuration not enabled for Administrators

Event

Yes

Critical Error

 

Baseline Security Analyzer 1.2\MOM Agent\IIS Vulnerabilities

The Internet Information Services Vulnerability Alerts public view depends on rules in this rule group being enabled.

Table 13 Rules

Rule

Type

Enabled

Severity

Dependency notes and other notes

IIS Vulnerability: MSADC and Scripts virtual directories are installed

Event

No

Warning

 

IIS Vulnerability: IIS parent paths are enabled

Event

Yes

Critical Error

 

IIS Vulnerability: IISADMPWD virtual directory is installed

Event

No

Warning

 

IIS Vulnerability: IIS sample applications found

Event

Yes

Critical Error

 

IIS Vulnerability: IIS Lockdown Tool has not been run on this server

Event

Yes

Critical Error

 

IIS Vulnerability: IIS logging disabled

Event

No

Information

 

IIS Vulnerability: IIS on Domain Controller

Event

No

Information

 

Baseline Security Analyzer 1.2\MOM Agent\SQL Vulnerabilities

The SQL Server Vulnerability Alerts public view depends on rules in this rule group being enabled.

Table 14 Rules

Rule

Type

Enabled

Severity

Dependency notes and other notes

SQL Vulnerability: Everyone group has more than Read permission to SQL registry keys

Event

Yes

Critical Error

 

SQL Vulnerability: SQL Server/MSDE password exposed in clear text log

Event

Yes

Critical Error

 

SQL Vulnerability: SQL Server/MSDE local account password is weak

Event

Yes

Critical Error

 

SQL Vulnerability: BUILTIN\Administrators is member of SQL SysAdmin role

Event

No

Warning

 

SQL Vulnerability: SQL Server/MSDE service accounts are running as LocalSystem

Event

No

Warning

 

SQL Vulnerability: SQL Server/MSDE using Mixed Mode Authentication

Event

No

Warning

 

SQL Vulnerability: SQL Server/MSDE directory access is not secure

Event

Yes

Critical Error

 

SQL Vulnerability: Guest account has access to one or more databases

Event

No

Warning

 

SQL Vulnerability: SQL Server/MSDE on Domain Controller

Event

No

Information

 

SQL Vulnerability: Non-SysAdmin user has CmdExec privileges

Event

Yes

Critical Error

 

SQL Vulnerability: Too many users in the SQL SysAdmin role

Event

No

Warning

 

Baseline Security Analyzer 1.2\MOM Agent\Windows OS Vulnerabilities

The Operating System Vulnerability Alerts public view depends on rules in this rule group being enabled.

Table 15 Rules

Rule

Type

Enabled

Severity

Dependency notes and other notes

OS Vulnerability: Local account password blank or weak

Event

No

Warning

 

OS Vulnerability: Internet Connection Firewall is disabled

Event

No

Information

 

OS Vulnerability: Too many users in the local administrators group

Event

No

Warning

 

OS Vulnerability: Auto logon enabled

Event

Yes

Critical Error

 

OS Vulnerability: "Password never expires" set on local account

Event

No

Warning

 

OS Vulnerability: CurrentRestrictAnonymous registry setting dangerous

Event

Yes

Critical Error

 

OS Vulnerability: Automatic Updates not enabled

Event

No

Warning

 

OS Vulnerability: Local Guest account enabled

Event

Yes

Critical Error

 

OS Vulnerability: Logon/Logoff event auditing disabled

Event

No

Information

 

OS Vulnerability: File system is not NTFS

Event

Yes

Critical Error