![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.96171 |
Category: | Windows |
Title: | Leave information on scanned Windows hosts |
Summary: | This routine stores information about the scan on the scanned; host, provided it is a Windows system remote registry and WMI access. |
Description: | Summary: This routine stores information about the scan on the scanned host, provided it is a Windows system remote registry and WMI access. Vulnerability Insight: The information cover hostname, scan start time and scan end time. No details about the actual scan results are stored on the scanned host. By default, this routine is disabled even it is selected to run. To activate it, it needs to be explicitly enabled with its corresponding preference switch. The preference 'Message' may contain 3 placeholder where respective content will be inserted into the message when the message is finally created on the target system: '::HOSTNAME::', '::SCAN_START::' and '::SCAN_STOP::'. At the end of the scan, the message will be written into the registry key 'SOFTWARE\VulScanInfo'. CVSS Score: 0.0 CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:N |
Copyright | Copyright (C) 2013 Greenbone AG |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |