Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Registry Access Failures Report

by Josef Weiss
February 11, 2016

Determining the Windows systems that failed authentication is important. When a system fails a credentialed scan, patch and compliance auditing will be incomplete or possibly inaccurate. Just as important is the continuous analysis of the scans results as changes to networks and hosts could affect the risk exposure of an organization. This report template is designed to report registry access failures using the results of Nessus plugin 26917, “Microsoft Windows SMB Registry : Nessus Cannot Access the Windows Registry”.

Credentialed scanning is beneficial and provides a safe method of obtaining information from servers and workstations. Credentialed scans require fewer ports to be open between the scanner and the target(s) and require less network bandwidth and target resources. Which means that the odds of a credentialed scan causing device resource or availability issues are minimal. Information from credentialed scanning is more accurate and provides a larger vulnerability picture of the device being scanned than traditional port scanning. Credentialed scanning also allows for customized auditing of the devices content.

If you intend to use Nessus to perform registry-based checks against Windows devices, the registry checks will not work if the “Remote Registry Access” service (winreg) has been disabled on the remote host or can not be connected to with the supplied credentials. When Nessus is not able to access the remote Windows Registry via PIPE\winreg, plugin 26917 returns the results. The results are presented to the analyst in this report. Results display the following information on each host: IP address, MAC address, DNS name, NetBIOS name, as well as the repository.

Please note Nessus has the ability to start the remote registry service on a Windows host. More information may be found by researching the Nessus preference setting “SMB Registry : Start the Registry Service during the scan” referred to in the SecurityCenter User Guide.

The report is available in the SecurityCenter Feed, a comprehensive collection of dashboards, reports, Assurance Report Cards, and assets. The report can be easily located in the SecurityCenter Feed under the category Monitoring.

The report requirements are:

  • SecurityCenter 5.0.0
  • Nessus 6.5.4

SecurityCenter Continuous View (CV) provides continuous network monitoring, vulnerability identification, risk reduction, and compliance monitoring. SecurityCenter CV is continuously updated with information about advanced threats, zero-day vulnerabilities, and new types of regulatory compliance configuration audits. SecurityCenter CV allows for the most comprehensive and integrated view of network health.

The report contains the following chapters:

  • Executive Summary - The Executive Summary provides an overview of the main chapter of this report. Presented is a table and bar chart with an overview of registry access failures.
  • Registry Access Failure Details - The Registry Access Failure Details chapter presents a vulnerability summary of the hosts that have registry access failures.
Try for Free Buy Now

Try Tenable.io Vulnerability Management


Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now and run your first scan within 60 seconds.

Buy Tenable.io Vulnerability Management

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

Try Nessus Professional Free


Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.