[Okta Webinar] Learn how to a build a cloud-first strategyRegister Now

x
?
Solved

SCCM and vuln scanners

Posted on 2011-10-06
1
Medium Priority
?
1,228 Views
Last Modified: 2012-05-12
Hey - I am not overly familiar with System Center Configuration Manager and how it can be used to identify control issues with windows workstations/servers.

Historically our security/audit use MBSA / Nessus to scan such devices - can SCCM be used to run similair reports. Or perhaps put another way - what can MBSA / Nessus find that SCCM cant find? If anything?

Does SCCM replace the need to vulnerability scanners?
0
Comment
Question by:pma111
1 Comment
 
LVL 65

Accepted Solution

by:
btan earned 2000 total points
ID: 36930556
Below is related post but simply say that mbsa and sccm would be checking the same only on microsoft related patches and configuration baseline. Check out microsoft security compliance mgr that create or have existing security baseline references for gpo. I see nessus or vulnerability scanner differently as it need not be microsoft specific and it check for low hanging like open ports, services, vulnerability type of cve etc. gfi languard does a good check and remediate as well.

 http://social.technet.microsoft.com/Forums/en-US/configmgrgeneral/thread/2a67f5d8-8f41-48f7-99f3-2cbc4e34f786
0

Featured Post

Industry Leaders: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you are like me and like multiple layers of protection, read on!
With the evolution of technology, we have finally reached a point where it is possible to have home automation features like having your thermostat turn up and door lock itself when you leave, as well as a complete home security system. This is a st…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

834 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question