Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Mac OS X Security Dashboard

by Stephanie Dunn
September 4, 2015

Mac OS X Security Dashboard

As the popularity of Apple products continues to grow within organizations, so has the adoption of the Apple Mac OS X systems into enterprise environments. This has also been fueled by changes in the mobile workforce, and the need for a flexible and mobile environment for employees has become essential. Many mobile workers access corporate resources from remote networks, which can potentially introduce viruses and malware into a corporate network. Macs are just as vulnerable to malware as any other platform, and the need for an organization to proactively monitor systems for vulnerabilities and protect against malware infections is vital. The Mac OS X Security dashboard provides details on installed Mac-based software, identifies Mac OS X versions, and detects OS X and software vulnerabilities.

Over the years, the Mac OS X operating system has obtained a reputation of being one of the most stable and secure operating systems (OS) due to the solid UNIX foundation, and ease of use. In addition, Mac OS X systems have been known for providing increased stability, reliability, and productivity among end users. While the Apple Mac OS X operating system is usually considered safer than most operating systems on the market, the potential for attacks are growing. Organizations should treat Mac OS-based risk management as serious as any other operating system. The potential for targeted attacks, malware infections, and exploited vulnerabilities will increase over time. The importance of securing Mac OS X systems should remain a top priority for any organization.

This dashboard provides several components that aid in ensuring the security of Mac OS X-based systems. The first column of components includes a matrix of detected hosts with Mac OS X 10.4 and later installed. This information can be used to provide a quick visual representation of the number of OS X-based systems and respective versions. The next two components present both the top Mac software vulnerabilities, along with the total number of vulnerabilities for Apple software by severity level. The analyst should review all vulnerabilities further to determine the overall risk to the organization. However, all high-risk vulnerabilities should be addressed and remediated first starting from critical on down. 

The Log Correlation Engine (LCE) is leveraged within this dashboard providing alerts based on the “OSX” normalized event type. Each normalized event presented provides statistical information on the specific Mac OS event types, along with IP address, and user summary. The next component presents specific Apple software vulnerabilities, and is categorized by row. The LCE identifies the Common Platform Enumeration (CPE) strings for the respective software, along with log content to identify existing vulnerabilities, and associated Common Vulnerabilities and Exposures (CVE). 

This dashboard also includes a component that presents both active and passive vulnerabilities for the Chrome, Firefox, Safari, and Opera web browsers on Mac OS X systems. Web browsers regularly interact with other hosts on the Internet, making OS X browsers a prime target for attackers. Any vulnerable web browser can pose a security risk to an organization’s network, if left unpatched. Apple includes a built-in software update tool that detects, publishes, and schedules software updates for Mac OS systems. However, if the tool settings aren’t secured properly, the settings can be adjusted or turned off by corporate users. This component goes a step further by reporting on the number of hosts that have software installed, along with existing vulnerabilities, both critical and exploitable that should be remediated.

The dashboard and its components are available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, assurance report cards and assets. The dashboard can be easily located in the Tenable.sc Feed under the category Monitoring.

The dashboard requirements are:

  • Tenable.sc 4.8.2
  • Nessus 8.6.0
  • NNM 5.9.0
  • LCE 6.0.0

When preparing initial credentialed scans, the analyst should also monitor for any failures. Credentialed scans failures can result from OS X systems being offline or unreachable, inventory changes, or invalid credentials. Failures can result in unpatched vulnerabilities on systems that can present security risks for an organization. By continuously monitoring credentialed scans, organizations will be able to obtain accurate patch and compliance auditing of OS X systems.

    Tenable's Tenable.sc Continuous View (CV) is the market-defining continuous network monitoring platform. Tenable.sc CV includes active vulnerability detection with Nessus and passive vulnerability detection with Tenable's Nessus Network Monitor (NNM), as well as log correlation with Tenable's Log Correlation Engine (LCE). Using Tenable.sc CV, an organization will obtain the most comprehensive and integrated view of its network providing visibility and ensuring the security of Mac OS X systems.

    The dashboard contains the following components:

    • Mac OS X Security - OS Summary: The OS Summary component presents detected OS X systems by version and code name on a network. The Vulnerability type searches for the keyword “Mac OS X 10.x” with “x” identifying the code name. When a OS X version is not present, the indication remains off (or uncolored); if a system with the specific OS X version is present, the indication changes to a purple. Clicking on the indicator will bring up the analysis screen to display details on the OS X systems. In the analysis screen, setting the tool to List OS will display the OS X version and subversion, along with the number of IP address by count. This information can be useful to the analyst in identifying OS X versions and counts for auditing purposes. Upgrading any outdated OS X systems can address multiple security flaws at once, which reduces overall risk to a network. In addition, organizations that upgrade OS X systems will be able to take advantage of the enhanced features within the new operating system, and gain improved performance.
    • Apple Summary - Apple Status At a Glance: This component gives a quick visual status report on patching efforts for Apple applications. The number of critical, high, and medium vulnerabilities is displayed across three columns, as well as the number of days they have been detected. Represented are known vulnerabilities that have existed for: Over 30 Days, the Last 30 Days, or the Last 7 Days.
    • Software Summary - MacOS Top 5: The Mac OS Top 5 component displays the Top 5 vulnerabilities detected on Mac OS Systems. The list is sorted by severity so that the top vulnerabilities that need to be remediated by the analyst are displayed first. In addition, the number of hosts affected by the vulnerability along with the corresponding plugin are also presented.
    • Mac OS X Security - Event Data By Type: The Event Data by Type table displays trend data based on the “OSX” normalized event type that occurred within the past 72 hours. The list is sorted so that the host with the highest number of events by count is at the top, along with their associated counts. The Log Correlation Engine (LCE) keeps track of collected data on events for each IP address. This allows the LCE to learn the average number of events per hour for each day. Normalized event data is compared very hour to the previous time period for that host. If any deviations from normal behavior have occurred, an event will be generated. The analyst can obtain additional information by clicking on the Browse Component Data icon. Clicking on each event type will provide specific OS X event type details. This information will assist the analyst in monitoring Mac OS X user and system activity on a network.
    • Apple Summary - Vulnerability Summary: This component displays various Apple technologies by row, and enumerates any found vulnerabilities across the columns. Presented is the number of systems on which the technology has been located, the number of identified vulnerabilities, the ratio of vulnerable systems, and the count of how many are exploitable.
    • Mac OS X Security - Top 10 Most Prevalent Detections: The Top 10 most prevalent detections component displays information on detected Mac OS X-based software on a network. The detected software is sorted by severity, along with the total number of system affected by host. To identify Mac OS X-based vulnerabilities, the “Mac OS X Local Security Checks” plugin family is used. In addition, the “detection” plugin name is also used to narrow down any detected vulnerabilities. The plugin ID, name, family and severity rating are also displayed for the analyst. If additional information is required, the analyst can click on the Browse Component Data icon, and click on the respective vulnerability. Details such as Plugin Name, IP address, DNS name, MAC Address, and a description of remediating the vulnerability are provided. This table can be beneficial to the analyst in detecting OS X software on a network, and assist in remediation efforts by identifying outdated software that needs to be upgraded.
    • Mac OS X Security - Browser Summary: The Browser Summary component presents four of the most popular Mac OS X web browsers with active and passive vulnerabilities. This matrix includes four columns that present both count and ratio statics for each browser. The first column presents the total number of vulnerabilities by count. The systems column displays the number of systems that use the respective browser, and have vulnerabilities present. The critical and exploitable vulnerabilities columns each display a ratio of critical and exploitable vulnerabilities compared to the total number of vulnerabilities detected for each browser. This component is able to precisely identify Mac OS X-based vulnerabilities by utilizing the “Mac OS X Local Security Checks” plugin family. For each row, the respective web browser name is used within the plugin name field to detect outstanding vulnerabilities within that browser. Clicking on an indicator will bring up the vulnerability analysis screen to display details on the vulnerabilities.
    • Mac OS X Security – Software Enumeration: The Software Enumeration component uses plugin 22869 (Software Enumeration (SSH)) and plugin 83991 (List Installed Mac OS X Software) to extract a list of software from Mac OS X systems two different ways. The Software enumeration plugin works by running a command via SSH, which pulls a generic list of currently installed packages on the OS X system. The List Installed Mac OS X Software plugin gathers information on installed packages and software on the OS X system. This plugin presents a more in-depth list by providing information and versions on utilities, drivers, frameworks, and default Apple packages. Each Mac OS X host is scanned against each plugin, and presents a ratio of the total number of Mac OS X systems and compares that to the number of systems that were scanned. The analyst can obtain additional information by clicking on each indicator, and then switching the tool to Detailed Vulnerability list.
    Try for Free Buy Now
    Tenable.io FREE FOR 30 DAYS

    Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

    Tenable.io BUY

    Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

    65 assets

    Choose Your Subscription Option:

    Buy Now
    Try for Free Buy Now

    Try Nessus Professional Free


    Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

    Buy Nessus Professional

    Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

    Buy a multi-year license and save. Add Advanced Support for access to phone, community and chat support 24 hours a day, 365 days a year. Full details here.

    Try for Free Buy Now

    Try Tenable.io Web Application Scanning


    Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

    Buy Tenable.io Web Application Scanning

    Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

    5 FQDNs


    Buy Now

    Try for Free Contact Sales

    Try Tenable.io Container Security


    Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

    Buy Tenable.io Container Security

    Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

    Try for Free Contact Sales

    Try Tenable Lumin


    Visualize and explore your Cyber Exposure, track risk reduction over time and benchmark against your peers with Tenable Lumin.

    Buy Tenable Lumin

    Contact a Sales Representative to see how Lumin can help you gain insight across your entire organization and manage cyber risk.