|
Description:
|
|
Modifying Vulnerability Scan Results Post-Scan - A new Nessus feature allows end-users to apply rules to vulnerability scan results and modify them after the scan has completed. This is an extremely useful feature, as severity, at its core, is specific to each organization. Also, as I've found over the years, exploitability is dependent on many things. Adjusting the results according is a useful tool, how do you see end-users taking advantage of this new feature?
Old Vulnerabilities - A new SecurityCenter dashboard was released which allows you to view vulnerabilities old than 30 days. While this can help enforce your patching policies, its typically the older vulnerabilities that could have the most impact. Often it takes some time to be able to exploit a vulnerability reliably. Have you looked at vulnerabilities older than a year? How about two years? This query can also help identify machines that have fallen out of the patching process, and it is these systems that can often pose the most risk to security breaches.
Detecting Devices - While much of the focus in IT is getting Windows systems and major applications patched, this leaves the smaller things vulnerable. Several new plugins for PVS were added allowing you to detect different types of devices. What is the risk? A great example is a multi-function printer. Most folks don't pay much attention, however people are faxing/scanning/printing sensitive documents all the time. Some devices keep a record of everything going through the device, and with open shares and default password rampant on these systems, it can lead to data leakage. |