Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Registry Access Failures Report

by Cesar Navas
February 11, 2016

Determining the Windows systems that failed authentication is important. When a system fails a credentialed scan, patch and compliance auditing will be incomplete or possibly inaccurate. Just as important is the continuous analysis of the scans results as changes to networks and hosts could affect the risk exposure of an organization. This report template is designed to report registry access failures using the results of Nessus plugin 26917, “Microsoft Windows SMB Registry : Nessus Cannot Access the Windows Registry”.

Credentialed scanning is beneficial and provides a safe method of obtaining information from servers and workstations. Credentialed scans require fewer ports to be open between the scanner and the target(s) and require less network bandwidth and target resources. Which means that the odds of a credentialed scan causing device resource or availability issues are minimal. Information from credentialed scanning is more accurate and provides a larger vulnerability picture of the device being scanned than traditional port scanning. Credentialed scanning also allows for customized auditing of the devices content.

If you intend to use Nessus to perform registry-based checks against Windows devices, the registry checks will not work if the “Remote Registry Access” service (winreg) has been disabled on the remote host or can not be connected to with the supplied credentials. When Nessus is not able to access the remote Windows Registry via PIPE\winreg, plugin 26917 returns the results. The results are presented to the analyst in this report. Results display the following information on each host: IP address, MAC address, DNS name, NetBIOS name, as well as the repository.

Please note Nessus has the ability to start the remote registry service on a Windows host. More information may be found by researching the Nessus preference setting “SMB Registry : Start the Registry Service during the scan” referred to in the Tenable.sc User Guide.

The report is available in the Tenable.sc Feed, a comprehensive collection of dashboards, reports, Assurance Report Cards, and assets. The report can be easily located in the Tenable.sc Feed under the category Monitoring.

The report requirements are:

  • Tenable.sc 5.0.0
  • Nessus 8.5.1

Tenable.sc Continuous View (CV) provides continuous network monitoring, vulnerability identification, risk reduction, and compliance monitoring. Tenable.sc CV is continuously updated with information about advanced threats, zero-day vulnerabilities, and new types of regulatory compliance configuration audits. Tenable.sc CV allows for the most comprehensive and integrated view of network health.

The report contains the following chapters:

  • Executive Summary - The Executive Summary provides an overview of the main chapter of this report. Presented is a table and bar chart with an overview of registry access failures.
  • Registry Access Failure Details - The Registry Access Failure Details chapter presents a vulnerability summary of the hosts that have registry access failures.
Try for Free Buy Now

Try Tenable.io

FREE FOR 60 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

$2,275.00

Buy Now

Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 60 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578.00

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 60 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.