<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Patch / Vulnerability Scanner in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Patch-Vulnerability-Scanner/m-p/5026#M209</link>
    <description>&lt;P&gt;Hi, Does anyone have a recommendation for a patch&amp;nbsp;/ vulnerability&amp;nbsp;scanner for off-line systems?&amp;nbsp; I'm interested in running a list of patches needed for installed software.&amp;nbsp; I specifically want something to augment WSUS that covers non-Microsoft products.&amp;nbsp; I think MITRE used to publish a file that could be used with SCAP Scanner, but they no longer publish it.&amp;nbsp; Any suggestions and recommendations would be appreciated.&lt;/P&gt;&lt;P&gt;- Pat&lt;/P&gt;</description>
    <pubDate>Mon, 08 Jan 2018 16:27:53 GMT</pubDate>
    <dc:creator>patd</dc:creator>
    <dc:date>2018-01-08T16:27:53Z</dc:date>
    <item>
      <title>Patch / Vulnerability Scanner</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Patch-Vulnerability-Scanner/m-p/5026#M209</link>
      <description>&lt;P&gt;Hi, Does anyone have a recommendation for a patch&amp;nbsp;/ vulnerability&amp;nbsp;scanner for off-line systems?&amp;nbsp; I'm interested in running a list of patches needed for installed software.&amp;nbsp; I specifically want something to augment WSUS that covers non-Microsoft products.&amp;nbsp; I think MITRE used to publish a file that could be used with SCAP Scanner, but they no longer publish it.&amp;nbsp; Any suggestions and recommendations would be appreciated.&lt;/P&gt;&lt;P&gt;- Pat&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2018 16:27:53 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Patch-Vulnerability-Scanner/m-p/5026#M209</guid>
      <dc:creator>patd</dc:creator>
      <dc:date>2018-01-08T16:27:53Z</dc:date>
    </item>
    <item>
      <title>Re: Patch / Vulnerability Scanner</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Patch-Vulnerability-Scanner/m-p/5030#M210</link>
      <description>&lt;P&gt;We're using Nessus Professional for our on-line/off-line systems.&amp;nbsp; The learning curve is a little steep, but it works great.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you don't have any budget for it, you could build a Kali Linux box and run scans as cron jobs that way, too.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2018 16:40:13 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Patch-Vulnerability-Scanner/m-p/5030#M210</guid>
      <dc:creator>John</dc:creator>
      <dc:date>2018-01-08T16:40:13Z</dc:date>
    </item>
    <item>
      <title>Re: Patch / Vulnerability Scanner</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Patch-Vulnerability-Scanner/m-p/5036#M211</link>
      <description>&lt;P&gt;Microsoft Baseline Security Analyzer (MBSA) may be what you are looking for if you are a Windows shop:&amp;nbsp;&amp;nbsp;&lt;A href="https://www.microsoft.com/en-us/download/details.aspx?id=7558" target="_blank"&gt;https://www.microsoft.com/en-us/download/details.aspx?id=7558&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2018 16:51:11 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Patch-Vulnerability-Scanner/m-p/5036#M211</guid>
      <dc:creator>jltrinka</dc:creator>
      <dc:date>2018-01-08T16:51:11Z</dc:date>
    </item>
    <item>
      <title>Re: Patch / Vulnerability Scanner</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Patch-Vulnerability-Scanner/m-p/5054#M212</link>
      <description>My team uses Nessus professional, after syncing the scanner from an online connection we move it to the stand alone systems and scan (our systems are stand alone networks, ie: not connected to. other networks, if yours is a standalone computer, I would recommend creating a dedicated network between the Nessus scanner you your target machine.</description>
      <pubDate>Mon, 08 Jan 2018 18:09:00 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Patch-Vulnerability-Scanner/m-p/5054#M212</guid>
      <dc:creator>StevenJ6052</dc:creator>
      <dc:date>2018-01-08T18:09:00Z</dc:date>
    </item>
    <item>
      <title>Re: Patch / Vulnerability Scanner</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Patch-Vulnerability-Scanner/m-p/5058#M213</link>
      <description>&lt;P&gt;I should add that I am trying to avoid buying a Nessus license which is very costly.&amp;nbsp;I would prefer a low / no cost solution if there are alternatives out there since I have more than one system to scan.&amp;nbsp; Also, MBSA only does Windows patches,&amp;nbsp;and we have&amp;nbsp;WSUS that&amp;nbsp;gives us this info. I was hoping for a product that would&amp;nbsp;check other vendor apps (Adobe reader, etc.) that require patches.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Kali Linux and Metasploit tools may be viable options, but I have not tried these yet.&amp;nbsp;I was just hoping for several options to consider, and get a sense of what others have experienced with specific tools.&amp;nbsp; I have read that several tools require a fair amount of fine tuning to reduce false positives, so first-hand experience feedback is appreciated.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;Thanks to all who have replied so far.&lt;/P&gt;&lt;P&gt;- Pat&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2018 18:30:21 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Patch-Vulnerability-Scanner/m-p/5058#M213</guid>
      <dc:creator>patd</dc:creator>
      <dc:date>2018-01-08T18:30:21Z</dc:date>
    </item>
    <item>
      <title>Re: Patch / Vulnerability Scanner</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Patch-Vulnerability-Scanner/m-p/5066#M214</link>
      <description>&lt;P&gt;Have you looked at Qualys?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"&lt;A href="https://www.qualys.com/forms/freescan/" rel="nofollow" target="_blank"&gt;Qualys FreeScan&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;provides up to 10 free scans of URLs or IPs of Internet facing or local servers or machines. You initially access it via their web portal and then download their virtual machine software if running scans on your internal network."&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2018 19:11:02 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Patch-Vulnerability-Scanner/m-p/5066#M214</guid>
      <dc:creator>Adamantium</dc:creator>
      <dc:date>2018-01-08T19:11:02Z</dc:date>
    </item>
    <item>
      <title>Re: Patch / Vulnerability Scanner</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Patch-Vulnerability-Scanner/m-p/5067#M215</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/96257325"&gt;@Adamantium&lt;/a&gt; wrote:&lt;BR /&gt;&lt;P&gt;Have you looked at Qualys?&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;"&lt;A href="https://www.qualys.com/forms/freescan/" target="_blank" rel="nofollow"&gt;Qualys FreeScan&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;provides up to 10 free scans of URLs or IPs of Internet facing or local servers or machines. You initially access it via their web portal and then download their virtual machine software if running scans on your internal network."&lt;/SPAN&gt;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;No, I haven't checked them.&amp;nbsp; I'll give them a look.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the suggestion.&lt;/P&gt;&lt;P&gt;- Pat&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2018 19:15:54 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Patch-Vulnerability-Scanner/m-p/5067#M215</guid>
      <dc:creator>patd</dc:creator>
      <dc:date>2018-01-08T19:15:54Z</dc:date>
    </item>
    <item>
      <title>Re: Patch / Vulnerability Scanner</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Patch-Vulnerability-Scanner/m-p/5070#M216</link>
      <description>&lt;P&gt;OpenVAS may be a good alternative for you.&amp;nbsp; It's an open sourced fork of Nessus (from back in the day) and generates similar results.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2018 19:25:50 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Patch-Vulnerability-Scanner/m-p/5070#M216</guid>
      <dc:creator>jltrinka</dc:creator>
      <dc:date>2018-01-08T19:25:50Z</dc:date>
    </item>
    <item>
      <title>Re: Patch / Vulnerability Scanner</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Patch-Vulnerability-Scanner/m-p/5073#M217</link>
      <description>&lt;P&gt;I'd agree OpenVAS is a good, no-cost solution for vulnerabilty scanning and Identification though it lacks some reporting features.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Nessus, as stated, is a good system and is very good at reporting on asset vulnerabilites.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Personally, I enjoy using Nexpose (InsightVM). Does a lot of the same things and reporting/management is good.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Both Nessus and Nexpose cost money, OpenVas is the no cost option. There are a load of other systems that so similar things so check what's on offer with each, weigh up cost/value add and happy hunting!&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All of these systems tend to be OS agnostic too.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2018 20:12:16 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Patch-Vulnerability-Scanner/m-p/5073#M217</guid>
      <dc:creator>HTCPCP-TEA</dc:creator>
      <dc:date>2018-01-08T20:12:16Z</dc:date>
    </item>
    <item>
      <title>Re: Patch / Vulnerability Scanner</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Patch-Vulnerability-Scanner/m-p/5075#M218</link>
      <description>&lt;P&gt;OpenVAS for the low cost option but Nessus is pretty much the gold standard. If you need to show proof of patching Nessus and its reporting capabilities makes the cost worth it.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jan 2018 20:28:07 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Patch-Vulnerability-Scanner/m-p/5075#M218</guid>
      <dc:creator>infosec_james</dc:creator>
      <dc:date>2018-01-08T20:28:07Z</dc:date>
    </item>
    <item>
      <title>Re: Patch / Vulnerability Scanner</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Patch-Vulnerability-Scanner/m-p/5090#M219</link>
      <description>Microsoft no more provides SCAP content for scanning its products or other products on its platform. You would mostly need to work with a vendor. If it were non-MS system, you could use OpenSCAP for scanning and SCAP content from the respective vendors such as Red Hat and Ubuntu.</description>
      <pubDate>Tue, 09 Jan 2018 01:58:52 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Patch-Vulnerability-Scanner/m-p/5090#M219</guid>
      <dc:creator>praving5</dc:creator>
      <dc:date>2018-01-09T01:58:52Z</dc:date>
    </item>
    <item>
      <title>Re: Patch / Vulnerability Scanner</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Patch-Vulnerability-Scanner/m-p/5122#M220</link>
      <description>&lt;P&gt;Thanks to all who replied, there are several good ideas here.&amp;nbsp;&lt;/P&gt;&lt;P&gt;I appreciate the feedback.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;- Pat&lt;/P&gt;</description>
      <pubDate>Tue, 09 Jan 2018 20:23:44 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Patch-Vulnerability-Scanner/m-p/5122#M220</guid>
      <dc:creator>patd</dc:creator>
      <dc:date>2018-01-09T20:23:44Z</dc:date>
    </item>
    <item>
      <title>Re: Patch / Vulnerability Scanner</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Patch-Vulnerability-Scanner/m-p/16291#M607</link>
      <description>&lt;P&gt;Im late here but you can try GFI Languard if its Windows/CentOS/Linux systems&lt;/P&gt;</description>
      <pubDate>Fri, 09 Nov 2018 22:48:43 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Patch-Vulnerability-Scanner/m-p/16291#M607</guid>
      <dc:creator>tim2</dc:creator>
      <dc:date>2018-11-09T22:48:43Z</dc:date>
    </item>
  </channel>
</rss>

