Account Weakness

by David Schwalenberg
February 19, 2014

This dashboard presents vulnerabilities related to accounts and credentials. These vulnerabilities include default accounts, blank passwords, vulnerabilities that allow bypassing authentication, insecure and non-compliant account settings, and more. Potentially suspicious login activity is also noted, to bring attention to accounts that are more threatened and require greater protection.

The dashboard and its components are available in the SecurityCenter 4.7 Dashboard app feed, an app store of dashboards, reports, and assets.

The dashboard requirements are:

  • SecurityCenter 4.7
  • Nessus 5.2.5
  • PVS 4.0.1
  • LCE 4.2.2
  • Compliance data

Listed below are the included components:

Account Weakness – Authentication Vulnerabilities (Passive Detection)
This matrix shows passive detections of authentication vulnerabilities. Each indicator highlights those vulnerabilities with the given keyword(s) in their name.

Account Weakness – Authentication Vulnerabilities (Active Detection)
This matrix shows active detections of authentication vulnerabilities. Each indicator highlights those vulnerabilities with the given keyword(s) in their name.

Account Weakness – Windows Account Vulnerabilities (Active Detection)
This matrix shows active detections of Windows account vulnerabilities.

Account Weakness – Suspicious Login Activity (Events from Last 72 Hours)
This matrix shows potentially suspicious login activity. This activity can bring attention to accounts that are more threatened and require greater protection.

Account Weakness – Top 50 Password Compliance Issues
This table displays the top 50 compliance issues with “password” in their name. Note that in order for data to appear in this table, appropriate audit/compliance scans must first be run on the network.

Account Weakness – Top 50 Account Compliance Issues
This table displays the top 50 compliance issues with “account” in their name. Note that in order for data to appear in this table, appropriate audit/compliance scans must first be run on the network.