Get on-the-go access to the latest insights featured on our Trustworthy Computing blogs.
This article in our series on Microsoft’s free security tools is focused on a tool called the Microsoft Baseline Security Analyzer (MBSA). Many years ago before Windows Update was available, servicing software was much more painful than it is today. Microsoft released security updates weekly, and there were few deployment technologies available to help determine which systems needed which updates. I wrote an article on this topic if you are interested in a walk down memory lane. For those IT administrators that lived through those days, the MBSA was a godsend. Today, 10 years later, the MBSA is still a free security tool that many, many IT Professionals use to help manage the security of their environments.
The MBSA is an easy-to-use tool designed for IT professionals and helps small and medium-sized businesses determine their security state in accordance with Microsoft security recommendations and offers specific remediation guidance. It is a standalone security and vulnerability scanner designed to provide a streamlined method for identifying common security misconfigurations and missing security updates. MBSA is used by many leading third-party security vendors and security auditors and, on average, scans over 3 million computers each week.
The MBSA provides built-in checks to determine if Windows administrative vulnerabilities are present, if weak passwords are being used on Windows accounts, the presence of known IIS and SQL administrative vulnerabilities, and which security updates are required on each individual system. The MBSA provides dynamic assessment of missing security updates. The MBSA can scan one or more computers by domain, IP address range or other grouping. Once complete, the MBSA provides a detailed report and instructions on how to help turn your system into a more secure working environment. The MBSA will create and store individual XML security reports for each computer scanned and will display the reports in the graphical user interface in HTML.
To use the MBSA tool, users will need either Windows Server 2008 R2, Windows 7, Server 2003, Server 2008, Vista, XP or Windows 2000 and will need administrator privileges sufficient to scan the target computers.
After installing MBSA and running the tool, users are taken to the screen seen below which provides quick access to three different sides of the application. Users can scan a computer using its name or IP address, scan multiple computers within a domain name or a range of IP addresses, or view existing security scan reports. There are even more options available through the command-line interface to support scripting and fine-tuned control over MBSA’s scanning and reporting features.
From the MBSA scan menu, users have the option to select some or all of the following, which are all checked by default:• Windows administrative vulnerabilities: the MBSA checks for Windows account-related issues, such as an open Guest account or too many administrative accounts. It also looks at the number of file shares and the PC's file system to make sure you're using NTFS instead of FAT for better security.
The MBSA also provides an expanded list of options beyond what is available via the graphic interface via the command-line interface. These options can be accessed by opening a command-prompt in the MBSA installation directory and running MBSACLI.exe /?. The additional features are especially helpful when scripting, performing MBSA scans on specific PCs during login, or managing security scans across a large number of PCs.
After you select the appropriate options and computers, you then trigger the scan, which typically takes several minutes to run. By default, the MBSA will automatically attempt to reach Microsoft Update for the latest catalog. The MBSA will augment the scan using any updates approved by the WSUS admin in managed environments. In situations where there is no Internet connectivity and no WSUS server, the MBSA will use the offline (WSUSSCN2.CAB) catalog to perform a security scan. Once the scan has completed, the MBSA will generate a full on-screen report, displaying the results of the scan item by item.
A completed scan report groups its findings into categories matching the options in the scan menu, such as administrative vulnerabilities, SQL Server status and security updates. This is helpful in quickly resolving any issues discovered. The top of the report indicates which of three data sources were used, including Microsoft Update (the live service), Windows Server Update Services (a managing WSUS server) or Microsoft Update offline (when no other data source was available). It will also display the actual WSUS server used (if appropriate) and the date of the offline catalog. If an MBSA scan report is older than 7 days, the report will also indicate that a new scan should be performed to ensure an up-to-date security assessment.
If you are looking for a free security tool that provides a streamlined method to identify missing security updates and common security misconfigurations then I recommend using the Microsoft Baseline Security Analyzer. For more information please check out these additional resources:
Tim RainsDirectorTrustworthy Computing
Read other parts of this series
Part 1: Microsoft’s Free Security Tools - Series IntroductionPart 2: Microsoft’s Free Security Tools - Attack Surface AnalyzerPart 3: Microsoft’s Free Security Tools - Enhanced Mitigation Experience ToolkitPart 4: Microsoft’s Free Security Tools – BinScope Binary AnalyzerPart 5: Microsoft’s Free Security Tools - Threat Modeling Part 6: Microsoft’s Free Security Tools – banned.hPart 7: Microsoft’s Free Security Tools – Windows Defender OfflinePart 8: Microsoft’s Free Security Tools – PortqryPart 9: Microsoft’s Free Security Tools – SummaryPart 10: Microsoft Free Security Tools – Microsoft Baseline Security Analyzer