Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Blog

Subscribe

Microsoft Patch Management Integration with Nessus - Part 1 WSUS

This is the first post in a two-part series that will cover how to configure Nessus and/or SecurityCenter to integrate with Microsoft's patch management software.

WSUS Patch Management Integration

Windows Server Update Services (WSUS) is available from Microsoft to manage the distribution of updates and hotfixes for Microsoft products. WSUS server 3.0 SP2 supports management of patches for the products listed here, as well as Windows 7 and Windows server 2003 SP2 patches. If you are not familiar with WSUS it is freely available to Microsoft customers as part of your Windows server licensing agreement. A great article that covers all aspects of planning, deployment, and configuration is Windows Server Update Services Learning Roadmap Community Edition.

Nessus and SecurityCenter have the ability to query WSUS to verify whether or not patches are installed on systems managed by WSUS and display the patch information through the Nessus or SecurityCenter. When performing scans with the WSUS patch management plugins enabled and configured please note the following:

  • Credentials entered into the policy take priority - If you've entered credentials into the scan policy and they are valid for a target system, Nessus will login and perform credentialed scanning without querying the WSUS server data.

  • WSUS is queried when credentials fail - If credentials are not valid for a target system, or credentials are not entered at all into the policy at all, the WSUS server will be queried to obtain patch information for those targets. This also applies to other policy settings that may cause a credentialed scan to fail, such as the remote registry or administrative shares settings.
  • The WSUS plugin communicates only with the WSUS server - The WSUS plugin makes a connection to the WSUS server IP/hostname and port specified in the policy configuration (see below in the "Patch Management WSUS Preferences"). This is an important point, as the Nessus server(s) will require access to your WSUS server, which could mean making firewall rule changes to allow the connections. However, this is a significant advantage as your target systems do not need to communicate with the Nessus server directly, which means host firewalls and remote registry settings will not get in the way of a patch audit.
  • Patch information is only as up-to-date as your WSUS server - The data returned to Nessus by WSUS is only as current as the most recent data that the WSUS server has obtained from its managed hosts.

WSUS scanning is performed using the following two Nessus plugins:

You can receive patch information for systems you may not be able to access directly from the scanner, or for systems for which you may not have valid credentials, which allows for a more a more reliable and robust scan. Nessus also now implements a way to view WSUS patch information from the web interface. Following is a walk-through on how to configure this feature for WSUS:

CAUTION: IT administrators are expected to manage the patch monitoring software themselves and install any agents required by the patch management system on their systems.

Creating the Policy

General

From the Nessus web interface, click on the "Policies" tab and then "Add". For SecurityCenter go to the "Support" menu and choose "Scan policies", then click "Add". Directions for each tab under the Add Policy menu are described in this section.

If WSUS patch management scans are run as part of a network-based or credentialed vulnerability scan, all port scanning settings can be configured as they would in a typical scan policy. If you plan to run a separate scan and only wish to see results obtained from WSUS you can safely disable all of the port scanners, including "Ping Host". This will force Nessus to only run the plugins you've selected and skip the port scanning entirely.

WSUS General Configuration

Click for larger image

Plugin Selection

When Nessus is configured to query a WSUS server it does not require that you enter credentials into the policy. For the WSUS patch management scans to run, at least two specific plugins must be enabled. These plugins can easily be found by searching for “WSUS” or “Patch Management” on the plugin filtering configuration page:

Next, you will need to enable the plugins required as shown below:

WSUS plugin filtering

Click for larger image

Enabling the Patch Management: Missing updates from WSUS Plugin

WSUS Patch Management Missing Updates” border=

Click for larger image

Enabling the Patch Management: WSUS server setting

WSUS Patch Management WSUS Settings

Click for larger image

Patch Management: Microsoft Plugin Families

Be certain to enable all of the plugins associated with Microsoft bulletins by selecting the "Windows : Microsoft bulletins" plugin family. WSUS contains information about Microsoft bulletins, which covers more than operating system patches and extends to software such as Microsoft Office.

Enable Microsoft Plugin Families

Click for larger image

Patch Management WSUS Preferences

To provide Nessus with the required information about your WSUS server go to "Preferences" and select "Patch Management WSUS server settings" from the drop-down menu:

WSUS Plugin Preferences Selection

Click for larger image

The IP address or hostname, port, and credentials for the WSUS server must be provided for WSUS scanning to work properly:

WSUS Plugin Configuration Settings

Click for larger image

Reporting

The reports currently look very much the same as the ones generated if Nessus were to log into the host directly, except it includes an indication that the patch information was obtained from WSUS:

WSUS Report Result

Click for larger image

Reporting Tip: You can filter on the string "according to WSUS" in the "Vulnerability text" field to obtain a list of all patching information obtained from your WSUS server.

Conclusion

It should be noted that this new feature, as well as the integration with other patch management systems, is also available to our SecurityCenter customers. The policy configuration screens are very similar and the functionality is the same. Look for more posts on how to configure integration with SCCM, VmwareGo, and Red Hat Satellite server in addition to new SecurityCenter dashboards that will include information from your patch management systems.

Related Articles

Cybersecurity News You Can Use

Enter your email and never miss timely alerts and security guidance from the experts at Tenable.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy.

Your Tenable Vulnerability Management trial also includes Tenable Lumin and Tenable Web App Scanning.

Tenable Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

100 assets

Choose Your Subscription Option:

Buy Now

Try Tenable Web App Scanning

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable One Exposure Management platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Your Tenable Web App Scanning trial also includes Tenable Vulnerability Management and Tenable Lumin.

Buy Tenable Web App Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578

Buy Now

Try Tenable Lumin

Visualize and explore your exposure management, track risk reduction over time and benchmark against your peers with Tenable Lumin.

Your Tenable Lumin trial also includes Tenable Vulnerability Management and Tenable Web App Scanning.

Buy Tenable Lumin

Contact a Sales Representative to see how Tenable Lumin can help you gain insight across your entire organization and manage cyber risk.

Try Tenable Nessus Professional Free

FREE FOR 7 DAYS

Tenable Nessus is the most comprehensive vulnerability scanner on the market today.

NEW - Tenable Nessus Expert
Now Available

Nessus Expert adds even more features, including external attack surface scanning, and the ability to add domains and scan cloud infrastructure. Click here to Try Nessus Expert.

Fill out the form below to continue with a Nessus Pro Trial.

Buy Tenable Nessus Professional

Tenable Nessus is the most comprehensive vulnerability scanner on the market today. Tenable Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year.

Select Your License

Buy a multi-year license and save.

Add Support and Training

Try Tenable Nessus Expert Free

FREE FOR 7 DAYS

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Already have Tenable Nessus Professional?
Upgrade to Nessus Expert free for 7 days.

Buy Tenable Nessus Expert

Built for the modern attack surface, Nessus Expert enables you to see more and protect your organization from vulnerabilities from IT to the cloud.

Select Your License

Buy a multi-year license and save more.

Add Support and Training