{"id":223,"date":"2014-09-03T02:24:35","date_gmt":"2014-09-02T19:24:35","guid":{"rendered":"http:\/\/www.seven-stones.biz\/blog\/?p=223"},"modified":"2014-09-03T02:24:35","modified_gmt":"2014-09-02T19:24:35","slug":"windows-vulnerability-management-a-cheat-sheet","status":"publish","type":"post","link":"https:\/\/www.seven-stones.biz\/blog\/windows-vulnerability-management-a-cheat-sheet\/","title":{"rendered":"Windows Vulnerability Management: A Cheat Sheet"},"content":{"rendered":"<p>So its been a long time since my last post. In fact it is almost an entire calendar year. But if we ask our delusional\/non-cynical (delete\u00a0as appropriate)\u00a0colleagues, we discover that we should try to look to the positive. The last post was on 10th September 2013. So do not focus on the fact that its nearly 1 year since my last post, focus on the 1 week between this post and the 1 year mark. That is quite something! Remember people: positivity is key. 51 weeks instead of 52. All is good.<\/p>\n<p>And to make up for the proportional short-fall of pearls of wisdom, I am hereby making <em><strong>freely available<\/strong> <\/em>a spreadsheet I developed: its a compendium of information with regard to Windows 2008 Server vulnerabilities.\u00a0In vulnerability management, the tool (McAfee VM 7.5 in this case, but it could be any tool) produces long lists of vulnerability. Some of these can be false positives. Others will be bona fide. Then, where there is vulnerability, there is risk, and the level of that risk to the business needs to be deduced.<\/p>\n<p>The response of the organisation to the above-mentioned list of vulnerability is usually an IT response &#8211; a collaboration between security and operations, or at least it should be. Security typically is not in a position to deduce the risk and \/ or the remedial actions by themselves. This is where the spreadsheet comes in. All of the information is in one document and the information that is needed to deduce factors such as impact, ease of exploit, risk, false positive, etc&#8230;its all there.<\/p>\n<p>Operating system security checklists are\u00a0as thin on\u00a0the ground (and in their content) as they are critical in the prevention (and also\u00a0detection) world.\u00a0Work in this\u00a0area is seen as boring and unsexy. It doesn&#8217;t involve anything that could get\u00a0you a place as a speaker at a Black Hat conference. There is nothing in this realm that involves some\u00a0fanciful breach technique.<\/p>\n<p>Overall, forget perimeter firewalls and anti-virus &#8211; <strong><em>operating system security is now the front line in the battle against unauthorised access<\/em><\/strong>.<\/p>\n<p>The <a title=\"CIS Benchmarks\" href=\"https:\/\/benchmarks.cisecurity.org\/\">CIS Benchmarks<\/a>\u00a0are quoted by many as a source of operating system configuration security check items and fair play to the folks at CIS for producing these documents.<\/p>\n<p>The columns are as such:<\/p>\n<ul>\n<li>&#8220;CIS&#8221; : the CIS subtitle for the vulnerability<\/li>\n<li>&#8220;Recommended VM Test&#8221;: yes or no, is this a test that is worth doing? (not all of them are worth it, some are outdated, some are just silly)<\/li>\n<li>&#8220;McAfee Test Available&#8221;: yes or no<\/li>\n<li>&#8220;McAfee Test ID&#8221;: numeric code of the test pattern with McAfee VM 7.5<\/li>\n<li>&#8220;Comments&#8221;:\u00a0summary of the CIS text that describes the vulnerability<\/li>\n<li>&#8220;Test \/ Reg Key&#8221;: the registry key to check, or other test for the vulnerability<\/li>\n<li>&#8220;Group Policy&#8221;: The GPO value related to the vulnerability if applicable<\/li>\n<li>&#8220;Further comments&#8221;: Some rationale from experience. For example, likelihood of being a false positive, impact, risk, ease of exploit, how to exploit. Generally &#8211; more details that can help the Analyst when interfacing with Windows support staff.<\/li>\n<li>&#8220;McAfee VM test notes&#8221;: This is a scratchpad for the Analyst to make notes, as a reference for any other Analysts who may be performing some testing. For example, if the test regularly yields a false positive, note the fact here.<\/li>\n<li>&#8220;References&#8221;: URLs and other material that give some background information. Mostly these are relevant Microsoft Technet articles.<\/li>\n<\/ul>\n<p><a href=\"http:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/MVM-CIS-Spreadoe.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-230\" src=\"http:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/MVM-CIS-Spreadoe-300x147.png\" alt=\"MVM-CIS-Spreadoe\" width=\"300\" height=\"147\" srcset=\"https:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/MVM-CIS-Spreadoe-300x147.png 300w, https:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/MVM-CIS-Spreadoe-1024x503.png 1024w, https:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/MVM-CIS-Spreadoe-500x245.png 500w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>So if anyone would like a copy of this spread sheet, please don&#8217;t hesitate to <a title=\"Contact Us\" href=\"http:\/\/www.seven-stones.biz\/contact.php\">contact me<\/a>. No &#8211; I will not spam you or share your contact details.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>So its been a long time since my last post. In fact it is almost an entire calendar year. But if we ask our delusional\/non-cynical (delete\u00a0as appropriate)\u00a0colleagues, we discover that we should try to look to the positive. The last &hellip; <a href=\"https:\/\/www.seven-stones.biz\/blog\/windows-vulnerability-management-a-cheat-sheet\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[65,1],"tags":[86,79,72],"class_list":["post-223","post","type-post","status-publish","format-standard","hentry","category-cis-benchmarks","category-general","tag-cis-benchmarks","tag-vulnerability-assessment","tag-vulnerability-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Windows Vulnerability Management: A Cheat Sheet - Security Macromorphosis<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.seven-stones.biz\/blog\/windows-vulnerability-management-a-cheat-sheet\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Windows Vulnerability Management: A Cheat Sheet - Security Macromorphosis\" \/>\n<meta property=\"og:description\" content=\"So its been a long time since my last post. In fact it is almost an entire calendar year. But if we ask our delusional\/non-cynical (delete\u00a0as appropriate)\u00a0colleagues, we discover that we should try to look to the positive. The last &hellip; Continue reading &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.seven-stones.biz\/blog\/windows-vulnerability-management-a-cheat-sheet\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Macromorphosis\" \/>\n<meta property=\"article:published_time\" content=\"2014-09-02T19:24:35+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/MVM-CIS-Spreadoe-300x147.png\" \/>\n<meta name=\"author\" content=\"itibble@gmail.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@seven_stones\" \/>\n<meta name=\"twitter:site\" content=\"@seven_stones\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"itibble@gmail.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/windows-vulnerability-management-a-cheat-sheet\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/windows-vulnerability-management-a-cheat-sheet\\\/\"},\"author\":{\"name\":\"itibble@gmail.com\",\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/#\\\/schema\\\/person\\\/dd7adbe0152f2279b133661b823e0c28\"},\"headline\":\"Windows Vulnerability Management: A Cheat Sheet\",\"datePublished\":\"2014-09-02T19:24:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/windows-vulnerability-management-a-cheat-sheet\\\/\"},\"wordCount\":601,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/windows-vulnerability-management-a-cheat-sheet\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.seven-stones.biz\\\/blog\\\/wp-content\\\/uploads\\\/MVM-CIS-Spreadoe-300x147.png\",\"keywords\":[\"CIS Benchmarks\",\"Vulnerability Assessment\",\"Vulnerability Management\"],\"articleSection\":[\"CIS Benchmarks\",\"General\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/windows-vulnerability-management-a-cheat-sheet\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/windows-vulnerability-management-a-cheat-sheet\\\/\",\"url\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/windows-vulnerability-management-a-cheat-sheet\\\/\",\"name\":\"Windows Vulnerability Management: A Cheat Sheet - Security Macromorphosis\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/windows-vulnerability-management-a-cheat-sheet\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/windows-vulnerability-management-a-cheat-sheet\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.seven-stones.biz\\\/blog\\\/wp-content\\\/uploads\\\/MVM-CIS-Spreadoe-300x147.png\",\"datePublished\":\"2014-09-02T19:24:35+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/#\\\/schema\\\/person\\\/dd7adbe0152f2279b133661b823e0c28\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/windows-vulnerability-management-a-cheat-sheet\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/windows-vulnerability-management-a-cheat-sheet\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/windows-vulnerability-management-a-cheat-sheet\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/wp-content\\\/uploads\\\/MVM-CIS-Spreadoe.png\",\"contentUrl\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/wp-content\\\/uploads\\\/MVM-CIS-Spreadoe.png\",\"width\":2392,\"height\":1176},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/windows-vulnerability-management-a-cheat-sheet\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Windows Vulnerability Management: A Cheat Sheet\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/\",\"name\":\"Security Macromorphosis\",\"description\":\"Ian Tibble&#039;s Security Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/#\\\/schema\\\/person\\\/dd7adbe0152f2279b133661b823e0c28\",\"name\":\"itibble@gmail.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4efc9caa4c914912bcf9dd199b33f34a0d42e56752f4f713cd8d0c5416733603?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4efc9caa4c914912bcf9dd199b33f34a0d42e56752f4f713cd8d0c5416733603?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4efc9caa4c914912bcf9dd199b33f34a0d42e56752f4f713cd8d0c5416733603?s=96&d=mm&r=g\",\"caption\":\"itibble@gmail.com\"},\"description\":\"Author of Security De-engineering, CTO at Seven Stones (Indonesia)\",\"sameAs\":[\"http:\\\/\\\/www.seven-stones.biz\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Windows Vulnerability Management: A Cheat Sheet - Security Macromorphosis","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.seven-stones.biz\/blog\/windows-vulnerability-management-a-cheat-sheet\/","og_locale":"en_US","og_type":"article","og_title":"Windows Vulnerability Management: A Cheat Sheet - Security Macromorphosis","og_description":"So its been a long time since my last post. In fact it is almost an entire calendar year. But if we ask our delusional\/non-cynical (delete\u00a0as appropriate)\u00a0colleagues, we discover that we should try to look to the positive. The last &hellip; Continue reading &rarr;","og_url":"https:\/\/www.seven-stones.biz\/blog\/windows-vulnerability-management-a-cheat-sheet\/","og_site_name":"Security Macromorphosis","article_published_time":"2014-09-02T19:24:35+00:00","og_image":[{"url":"http:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/MVM-CIS-Spreadoe-300x147.png","type":"","width":"","height":""}],"author":"itibble@gmail.com","twitter_card":"summary_large_image","twitter_creator":"@seven_stones","twitter_site":"@seven_stones","twitter_misc":{"Written by":"itibble@gmail.com","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.seven-stones.biz\/blog\/windows-vulnerability-management-a-cheat-sheet\/#article","isPartOf":{"@id":"https:\/\/www.seven-stones.biz\/blog\/windows-vulnerability-management-a-cheat-sheet\/"},"author":{"name":"itibble@gmail.com","@id":"https:\/\/www.seven-stones.biz\/blog\/#\/schema\/person\/dd7adbe0152f2279b133661b823e0c28"},"headline":"Windows Vulnerability Management: A Cheat Sheet","datePublished":"2014-09-02T19:24:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.seven-stones.biz\/blog\/windows-vulnerability-management-a-cheat-sheet\/"},"wordCount":601,"commentCount":0,"image":{"@id":"https:\/\/www.seven-stones.biz\/blog\/windows-vulnerability-management-a-cheat-sheet\/#primaryimage"},"thumbnailUrl":"http:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/MVM-CIS-Spreadoe-300x147.png","keywords":["CIS Benchmarks","Vulnerability Assessment","Vulnerability Management"],"articleSection":["CIS Benchmarks","General"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.seven-stones.biz\/blog\/windows-vulnerability-management-a-cheat-sheet\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.seven-stones.biz\/blog\/windows-vulnerability-management-a-cheat-sheet\/","url":"https:\/\/www.seven-stones.biz\/blog\/windows-vulnerability-management-a-cheat-sheet\/","name":"Windows Vulnerability Management: A Cheat Sheet - Security Macromorphosis","isPartOf":{"@id":"https:\/\/www.seven-stones.biz\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.seven-stones.biz\/blog\/windows-vulnerability-management-a-cheat-sheet\/#primaryimage"},"image":{"@id":"https:\/\/www.seven-stones.biz\/blog\/windows-vulnerability-management-a-cheat-sheet\/#primaryimage"},"thumbnailUrl":"http:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/MVM-CIS-Spreadoe-300x147.png","datePublished":"2014-09-02T19:24:35+00:00","author":{"@id":"https:\/\/www.seven-stones.biz\/blog\/#\/schema\/person\/dd7adbe0152f2279b133661b823e0c28"},"breadcrumb":{"@id":"https:\/\/www.seven-stones.biz\/blog\/windows-vulnerability-management-a-cheat-sheet\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.seven-stones.biz\/blog\/windows-vulnerability-management-a-cheat-sheet\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.seven-stones.biz\/blog\/windows-vulnerability-management-a-cheat-sheet\/#primaryimage","url":"https:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/MVM-CIS-Spreadoe.png","contentUrl":"https:\/\/www.seven-stones.biz\/blog\/wp-content\/uploads\/MVM-CIS-Spreadoe.png","width":2392,"height":1176},{"@type":"BreadcrumbList","@id":"https:\/\/www.seven-stones.biz\/blog\/windows-vulnerability-management-a-cheat-sheet\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.seven-stones.biz\/blog\/"},{"@type":"ListItem","position":2,"name":"Windows Vulnerability Management: A Cheat Sheet"}]},{"@type":"WebSite","@id":"https:\/\/www.seven-stones.biz\/blog\/#website","url":"https:\/\/www.seven-stones.biz\/blog\/","name":"Security Macromorphosis","description":"Ian Tibble&#039;s Security Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.seven-stones.biz\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.seven-stones.biz\/blog\/#\/schema\/person\/dd7adbe0152f2279b133661b823e0c28","name":"itibble@gmail.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4efc9caa4c914912bcf9dd199b33f34a0d42e56752f4f713cd8d0c5416733603?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4efc9caa4c914912bcf9dd199b33f34a0d42e56752f4f713cd8d0c5416733603?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4efc9caa4c914912bcf9dd199b33f34a0d42e56752f4f713cd8d0c5416733603?s=96&d=mm&r=g","caption":"itibble@gmail.com"},"description":"Author of Security De-engineering, CTO at Seven Stones (Indonesia)","sameAs":["http:\/\/www.seven-stones.biz"]}]}},"_links":{"self":[{"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/posts\/223","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/comments?post=223"}],"version-history":[{"count":6,"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/posts\/223\/revisions"}],"predecessor-version":[{"id":231,"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/posts\/223\/revisions\/231"}],"wp:attachment":[{"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/media?parent=223"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/categories?post=223"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/tags?post=223"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}