i Citadel™ Security Software Inc. Hercules® Vulnerability Assessment and Remediation Overview Document Number: 205-01-0007 Hercules v4.1 Document Version: 1.0 May 2006 Acknowledgements THIS SOFTWARE AND DOCUMENTATION IS PROVIDED "AS IS," AND COPYRIGHT HOLDERS MAKE NO REPRESENTATIONS OR WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO, WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PARTICULAR PURPOSE OR THAT THE USE OF THE SOFTWARE OR DOCUMENTATION WILL NOT INFRINGE ANY THIRD PARTY PATENTS, COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS. COPYRIGHT HOLDERS WILL NOT BE LIABLE FOR ANY DIRECT, INDIRECT, SPECIAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF ANY USE OF THE SOFTWARE OR DOCUMENTATION. The name and trademarks of copyright holders may NOT be used in advertising or publicity pertaining to the software without specific, written prior permission. Title to copyright in this software and any associated documentation will at all times remain with copyright holders. AssetGuard, Citadel, and ConnectGuard are trademarks of Citadel Security Software Inc. Hercules and Hercules FlashBox are registered trademarks of Citadel Security Software Inc. Hercules software is copyrighted by Citadel Security Software Inc. This software and/or methods using this software and/or portions or combinations thereof are covered by U.S. Patent No. 7,000,247 and U.S. and foreign patents pending and trademarks. Active Directory, Notepad, Microsoft, Windows, Windows NT, Windows Server, and SQL Server are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. Adobe and Adobe Reader are registered trademarks of Adobe Systems Incorporated. AIX and PowerPC are trademarks or registered trademarks of International Business Machines Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. in the United States and other countries. Apache is a trademark of the Apache Software Foundation. AppSight is a trademark of Insight Software Ltd. CVE and MITRE, and OVAL are either trademarks or registered trademarks of the MITRE Corporation. Foundstone and FoundScan Engine are either trademarks or registered trademarks of Foundstone, Inc. HP-UX, PA-RISC, and Tru64 are trademarks or registered trademarks of Hewlett Packard Company in the United States. Intel and Pentium are registered trademarks of Intel. Internet Security Systems, System Scanner, Internet Scanner, and SiteProtector are either trademarks or registered trademarks of Internet Security Systems, Inc. Linux is a registered trademark of Linus Torvalds. Mac OS X is a registered trademark of Apple Computer, Inc. nCircle and nCircle IP360 are either registered trademarks or trademarks of nCircle Network Security, Inc. QualysGuard and Qualys are trademarks of Qualys, Inc. Red Hat is a registered trademark of Red Hat, Inc. REM, Retina, and eEye are either trademarks or registered trademarks of eEye Digital Security. SAINT is a registered trademark of the Saint Corporation. SANS is a trademark of SANS/ESCAL. SecureScoutSP is a trademark of NexantiS Corporation. Shavlik and HfNetChk are either trademarks or registered trademarks of Shavlik Technologies, LLC. STAT and Guardian are either trademarks or registered trademarks of Harris Corporation. Sun and Solaris are trademarks of Sun Microsystems, Inc. in the United States and other countries. UNIX is a registered trademark in the United States and other countries, exclusively licensed through X/Open Company, Ltd. WinZip is a registered trademark of WinZip Computing, Inc. W3C® SOFTWARE NOTICE AND LICENSE Copyright © 1994-2004 World Wide Web Consortium http://www.w3.org/, (Massachusetts Institute of Technology http://www.lcs.mit.edu/, Institut National de Recherche en Informatique et en Automatique <http:// www.inria.fr/>, Keio University <http://www.keio.ac.jp/>). All Rights Reserved. http://www.w3.org/Consortium/Legal/ This W3C work (including software, documents, or other related items) is being provided by the copyright holders under the following license. By obtaining, using and/or copying this work, you (the licensee) agree that you have read, understood, and will comply with the following terms and conditions: Permission to use, copy, modify, and distribute this software and its documentation, with or without modification, for any purpose and without fee or royalty is hereby granted, provided that you include the following on ALL copies of the software and documentation or portions thereof, including modifications, that you make.The full text of this NOTICE in a location viewable to users of the redistributed or derivative work. Any pre-existing intellectual property disclaimers, notices, or terms and conditions. If none exist, a short notice of the following form (hypertext is preferred, text is permitted) should be used within the body of any redistributed or derivative code: "Copyright © 2004 World Wide Web Consortium http://www.w3.org, (Massachusetts Institute of Technology http://www.lcs.mit.edu/, Institut National de Recherche en Informatique et en Automatique http:// www.inria.fr/, Keio University http://www.keio.ac.jp/). All Rights Reserved. http://www.w3.org/Consortium/ Legal/" Notice of any changes or modifications to the W3C files, including the date changes were made. (We recommend you provide URIs to the location from which the code is derived.) All other products are trademarks of their respective holders. Copyright © 2002-2006 by Citadel Security Software Inc. All rights reserved. Citadel Security Software Inc. * Two Lincoln Centre * 5420 LBJ Freeway, Suite 1600 * Dallas, TX 75240 Phone: (214) 520-9292 * Fax: (214) 520-9293 * Email: support@citadel.com * Website: http://www.citadel.com Contents 1 Overview................................................................................................................................. 1 2 Device Discovery .................................................................................................................... 2 3 Vulnerability Assessment...................................................................................................... 3 Selecting a Vulnerability Assessment Tool .......................................................................................... 3 Preparing for Assessment...................................................................................................................... 4 Running the Assessment ....................................................................................................................... 4 4 Vulnerability Review ............................................................................................................. 5 5 Vulnerability Remediation.................................................................................................... 6 6 Vulnerability Management ................................................................................................... 7 7 Vulnerability Assessment Tools............................................................................................ 8 eEye Digital Security Retina Network Security Scanner...................................................................... 8 eEye Digital Security REM................................................................................................................... 9 Foundstone FoundScan Engine............................................................................................................. 9 Harris STAT Scanner............................................................................................................................ 9 Harris STAT Guardian Scanner ............................................................................................................ 9 ISS Internet Scanner............................................................................................................................ 10 ISS System Scanner ............................................................................................................................ 10 ISS SiteProtector ................................................................................................................................. 10 Microsoft Baseline Security Analyzer ................................................................................................ 10 nCircle IP360 Vulnerability Management System.............................................................................. 11 NexantiS SecureScout SP ................................................................................................................... 11 Qualys QualysGuard Scanner ............................................................................................................. 11 SAINT Scanning Engine..................................................................................................................... 11 Tenable Nessus Scanner...................................................................................................................... 12 Tenable NeWT Scanner ...................................................................................................................... 12 The MITRE Corporation OVAL Definition Interpreter...................................................................... 12 v Hercules Vulnerability Assessment and Remediation Overview Customer Support When you purchase a Customer Support Agreement and register your Citadel software product, you are eligible to receive technical support according to the terms of the contract you purchased. Citadel provides two levels of technical support: Standard support—Available by phone 7 A.M. - 7 P.M. US Central Standard Time on Citadel Security Software normal business days. Premium support—Available by phone 7 days x 24 hours x 365 days of the year. Registered users can reach Citadel Customer Support in any of the following ways: vi • Toll-free hot line at 888-9-CITADEL, (888-924-8233) • E-mail at support@citadel.com • Customer Support Portal on the Citadel website at http://www.citadel.com/ Hercules Vulnerability Assessment and Remediation Overview 1 Overview Promoting network security involves adopting proactive practices that identify and eliminate risks before they can be exploited. Vulnerabilities that can be exploited within an enterprise network include software defects, unnecessary services, unsecured accounts, backdoors, and misconfigurations. Remediating security vulnerabilities must be automated—manual remediation has become cost prohibitive. Consider these metrics: • When the average Microsoft® Windows® device is scanned for the first time it contains 70100 vulnerabilities. • It takes a security administrator an average of one hour to fix each vulnerability or approximately 100 hours of manual remediation for each computer. If you apply these metrics to an enterprise network with several hundred or thousands of computers the timeframes, resources, and dollar amounts associated with manual vulnerability remediation become astronomical. This guide describes how to achieve a high level of network security at a low cost. The proposed best practice includes the following steps: 1. Device Discovery 2. Vulnerability Assessment 3. Vulnerability Review 4. Vulnerability Remediation 5. Vulnerability Management Device discovery is the process of identifying all devices on the network by IP address. Vulnerability assessment is the process of detecting known vulnerabilities on network computers. This process is performed with automated scanning software or auditing practices. Vulnerability review is the process of selecting the vulnerabilities to fix based on risk assessment, and determining whether the remediation can be automated. Vulnerability remediation is the process of eliminating the security flaws. Vulnerability management is the process of developing and implementing a policy compliance plan and scheduling automated vulnerability remediation. Such plans ensure these steps are performed as often as required to maintain a secure network. This guide is designed to help you devise an effective scanning and remediation strategy using Citadel’s Hercules® software and its supported assessment tools. Hercules automated vulnerability remediation solution is the first vulnerability remediation solution to automate the resolution of all classes of vulnerabilities. 1 Hercules Vulnerability Assessment and Remediation Overview 2 Device Discovery Wireless access points, laptops and other mobile computing devices are proliferating in networks due to their ease of use and low acquisition costs. These devices can contain sensitive data assets and are easily exploitable Device discovery enables you to map your network, set a baseline for the identified devices, and track rogue devices as they enter or leave the network. Use an assessment tool or other network mapping software that scans all networks and sub-networks to identify all devices with their associated IP addresses. Information typically collected during device discovery includes the following: • The number of devices • The type of devices (such as computers with Windows® operating systems, UNIX® operating systems, Linux® operating systems, Mac OS X® operating system, and edge devices, printers, etc.) • Unexpected or rogue devices • Wireless networks It is important to match the devices found to internal IT asset tracking or equipment lists to validate each piece of equipment. Any devices found that are not accounted for via asset tracking require additional research. You should add such devices to the IT asset inventory or remove the devices from the network. In large computing environments, discovery can take a substantial amount of time. You should perform device discovery on a regular basis as part of centralized IT security control. Device discovery represents the first step to eliminating one of the biggest threats to corporate networks today—exploitation of devices that are “under the radar” of IT security. 2 Hercules Vulnerability Assessment and Remediation Overview 3 Vulnerability Assessment Selecting a Vulnerability Assessment Tool You typically perform vulnerability assessment with an automated vulnerability assessment tool. Vulnerability assessment tools can be classified as Network-based or Host-based. Network-based assessment tools scan a range of IP addresses from a centralized computer. They probe and detect vulnerabilities through port scanning and other remote access methods. Host-based assessment tools require the installation of a client software component on each device you want to scan. The client software is responsible for inspecting the system for vulnerabilities and reporting findings to a centralized database or management console. Both of these architectures have advantages and disadvantages. In making a selection of the type of assessment tool to use, keep the following in mind: • Determine which networks will be scanned and the transport routes used for assessment. • Determine the appropriate rights required to perform the assessment. Many tools require administrative privileges to obtain complete scan results. Often this requirement determines who is responsible for scanning which devices. • When evaluating host based vulnerability assessment tools, consider whether the tool includes client deployment tools and the method of client distribution. • Evaluate the computing environment as a whole based on the device discovery process. • Determine if the selected scanner provides an acceptable level of assessment for your platforms. Consider the types of checks that are performed • Consider the operating systems that are supported. • The quantity and quality of assessment intelligence data provided by the available tools varies greatly. Citadel recommends you perform scans using multiple tools to get a clear picture of your organizations’ current security posture. Using multiple tools provides some overlap in data. It also provides the benefit of performing additional checks that may not be identified by the primary scanner of choice. 3 Hercules Vulnerability Assessment and Remediation Overview Preparing for Assessment After selecting an appropriate vulnerability assessment tool, you must install and configure it to work appropriately in your environment. The configuration process requires an understanding of what knowledge is gained during device discovery. You must understand the appropriate audits or checks to perform against each device. Most scanners perform tests based on non-destructive and destructive methodologies. Nondestructive methodologies assess the device without attempting to break in or exploit the system. Destructive methodologies attempt to exploit the vulnerability on the system. In cases where the system is vulnerable, it can actually cause damage or downtime to the system. This is most notable when running assessments for denial of service attacks or buffer overflows that cause the device to stop responding. To prepare for the assessment, do the following: • Carefully analyze the assessment policies available from the vendor • Disable any destructive tests to prevent unwanted side effects • Become intimately familiar with the testing process on the majority of the vulnerabilities being scanned Bandwidth requirements and CPU overhead should be taken into consideration before performing a scan. Performing an assessment of a medium to large size network with about 1500 devices can provide significant bandwidth utilization. Depending on the test selected, it can also generate moderate to high CPU utilization on the device being scanned. Additionally, it is best to schedule or run the assessment during non-peak business hours. This ensures the scanning software does not compete for bandwidth with normal daily business traffic. Running the Assessment After determining the devices to scan, the type of assessment to perform, and the best time of day to run the assessment, the next step is to implement the assessment process by distinct network segments. That is, use the assessment tool to scan each segment separately. Performing a phased assessment minimizes the bandwidth utilization when assessing a network composed of many devices For detailed instructions on how to perform an assessment, see the assessment tool documentation. 4 Hercules Vulnerability Assessment and Remediation Overview 4 Vulnerability Review Depending on the number of devices scanned and the number of vulnerabilities scanned for, most assessment tools produce large volumes of data. During the vulnerability review process, you analyze the data generated during assessment to determine which devices and vulnerabilities will be remediated, in what order, and whether there are exceptions that must be handled manually. Almost all remediations can be automated. An example of a manual remediation is installing a patch to a third-party application. Citadel suggests you perform the review by the segments used for assessment. Consider the following approach: 1. During the initial review, the security team performs tasks such as the following: • Create a list of unique, identified vulnerabilities. (Eliminate duplicate or extraneous data.) • Devise a risk scale, such as 1 – 5, 1 being the highest risk. • Determine the risk associated with each vulnerability and assign a risk rank to each. • Prioritize the vulnerability list, beginning with the highest risk items. • Hand off the list to the system owners and business unit directors. 2. System owners and business unit directors then take responsibility for the following: • Review the risk to vulnerability assignments and revise as needed. • Determine the acceptable level of risk to the network when weighed against requirements for accessibility. • Define the cutoff in the prioritized list that divides vulnerabilities that will be remediated from those that will be tolerated. • Review the revised list with the security assessment team for consensus. Use change control procedures, where applicable, to track updates. 3. Finally, the security assessment team make final decisions and perform handoffs as follows: • Identify the vulnerabilities for which remediation can be automated; update the list. • Plan automated remediation by subnetwork; hand off list for automated remediations to the individual who will use the Hercules software. • Assign any remaining vulnerability remediation tasks to the team who will perform the manual remediations. 5 Hercules Vulnerability Assessment and Remediation Overview 5 Vulnerability Remediation Remediation is defined as the process of correcting a fault or deficiency, or, in this case, a vulnerability. Hercules software provides relief by automating the remediation of the vulnerabilities identified during the assessment process. The software also provides reports and management tools to track the vulnerabilities that must be handled manually. Performing remediation using Hercules software significantly reduces the amount of time required to research and deploy remediation to vulnerable systems. To manage manual remediations, a process should be created that determines when systems will be remediated and by which technician. In addition you must address the following items: • • • • • • • • • • Where is the device physically located? Can the device be accessed after hours? Is travel time involved? Does the technician have the necessary access rights (administrative etc.) to the system? Has the research been performed to know what is required to implement the fix? Does the fix involve updating software? Is the software downloadable from the Internet? Does the computer have access to the Internet? What happens after the fix is implemented? Does it require the system to be rebooted? If so, can it be rebooted without creating downtime for mission critical applications? Fortunately, Hercules vulnerability assessment system eliminates the majority of research related work required for manual remediations. After you develop the process and plan, you can proceed with remediation as follows: 1. Use Hercules to perform all automated remediations. 2. Execute the process for manual remediation. 6 Hercules Vulnerability Assessment and Remediation Overview 6 Vulnerability Management Management of vulnerabilities and remediation is important to keep the network operating securely and efficiently. Vulnerability assessment and remediation is not a one-time process. Regularly scheduled vulnerability assessment and remediation must be consistently performed and managed to produce any level of success. Effectively managing vulnerabilities includes performing routine assessment and remediation as well as device discovery. Each company should review the personnel and resources within their organization to develop a security team to manage this process. Security personnel should be well trained and knowledgeable of industry best practices and the tools available. Citadel recommends you have at least one certified security professional available to assist with crises and provide knowledge assistance. Most importantly when managing vulnerability assessment and remediation, a plan must be developed to maintain the assessment checks performed by the assessment tools. This includes periodic updates via Internet enabled software downloads and upgrades from the software vendor. It is also highly recommended to maintain support contracts for commercially available security tools. This ensures that the product is maintained and updated in a timely manner and provides knowledgeable support staff when needed. Security news and vulnerability intelligence must be continually monitored to identify new threats as they emerge. Numerous free and subscription type services offer browser-based and direct feeds that supply timely security intelligence information. Implementing these procedures and practices will ensure that vulnerabilities are eliminated before they are exploited by malicious hackers to gain confidential data or induce downtime on the network. 7 Hercules Vulnerability Assessment and Remediation Overview 7 Vulnerability Assessment Tools Hercules enterprise security software uses supported vulnerability assessment tools to assess the network and discover vulnerabilities on the devices it scans. After the assessment is complete, Hercules technology uses the results to build remediation profiles for the devices that were assessed. To simplify the remediation process, the Hercules vulnerability assessment and remediation system includes an import wizard for the following supported vulnerability assessment tools: • eEye® Digital Security Retina® Network Security Scanner • eEye Digital Security REM™ Security Management Console • Foundstone, Inc.® FoundScan Engine™ • Harris STAT® Scanner • Harris STAT Scanner 6.2.1 and above (Guardian) • Internet Security Systems™ Internet Scanner® • Internet Security Systems™ SiteProtector™ • Internet Security Systems™ System Scanner™ • Microsoft® Baseline Security Analyzer (MBSA) • nCircle® IP360™ Vulnerability Management System • NexantiS SecureScout SP™ • Qualys™, Inc. QualysGuard® Scanner • Saint Corporation SAINT® Scanning Engine • Tenable Network Security™ Nessus Scanner • Tenable Network Security NeWT Scanner • The MITRE Corporation OVAL™ Definition Interpreter Vulnerability assessment data from several different scanners can be combined to create a single view of all assessment data. This is accomplished by importing the data from several different sources. During the import process, the Hercules software automatically combines the vulnerability information and associates it with the appropriate device. eEye Digital Security Retina Network Security Scanner The eEye Digital Security Retina Network Security Scanner is a network based vulnerability assessment tool. It can be used to perform assessments on all devices on the network including Windows, UNIX, Linux, and edge devices. Retina can be used to schedule scans from the command line. It also offers a graphical user interface to assist users in managing assessment policies and scan sessions. For details on this product, see http://www.eeye.com/html/products/retina/index.html. While Retina is performing a scan, it stores the results of the scan in a proprietary .rtd file or within an ODBC database connected by a DSN. Hercules Import Wizard for Retina uses this .rtd file or an ODBC database connection to import the results and create Remediation profiles. 8 Hercules Vulnerability Assessment and Remediation Overview eEye Digital Security REM The eEye Digital Security’s family of scanners now includes the importing of scanned data from the REM (Remote Enterprise Management) Security Management Console. REM is a networkbased vulnerability assessment tool. It can be used to perform assessments on all devices on the network including Windows, UNIX, Linux, and edge devices. You can import vulnerability and device information directly from the REM database. The REM Security Management Console aggregates data from the Retina Security Scanner and Retina WiFi Scanner. For details, see http://www.eeye.com/html/products/rem/. Foundstone FoundScan Engine Foundstone FoundScan Engine(http://www.foundstone.com) discovers and maps your complete network environment—including routers, firewalls, servers and custom Web applications—and then probes these areas for vulnerabilities. FoundScan consists of three components: an SQL database that holds scan data, an engine that scans for vulnerabilities, and a Web portal that allows users to access the information in the database through their Web browser. FoundScan imports the data directly from the FoundScan database into the Hercules database. The FoundScan engine is at the core of McAfee Foundstone Enterprise 4.0. Harris STAT Scanner The Harris STAT Scanner (http://www.statonline.com) is a network based vulnerability assessment tool. It can be used to perform assessments on most network devices including Windows, UNIX, Linux, and edge devices. STAT Scanner offers a graphical user interface to assist users in managing assessment policies and scan sessions. While STAT is performing a scan, it stores the results of the scan in a database file. Hercules Import Wizard for STAT Scanner uses this database file to import the results and create remediation profiles. Harris STAT Guardian Scanner The Harris STAT Guardian Scanner (http://www.stat.harris.com) is a network based vulnerability assessment tool. It can be used to perform assessments on most network devices including Windows, UNIX, Linux, and edge devices. The vulnerability assessment scan engine, STAT® Scanner 6.2, is the foundation of STAT Guardian VMS. STAT Scanner 6.0 provides adaptive scanning capabilities to accurately find vulnerabilities in multiple computer operating platforms and applications. STAT Guardian stores the results of its scans in a database on a local web server. Hercules Import Wizard for STAT Guardian Scanner uses a web service on the local Guardian web server to import the results and create remediation profiles. Support begins with STAT Scanner 6.2.1. 9 Hercules Vulnerability Assessment and Remediation Overview ISS Internet Scanner The Internet Security Systems (ISS) Internet Scanner is a network based vulnerability assessment tool. It can be used to perform assessments on all devices on the network including Windows, UNIX, Linux, and edge devices. Internet Scanner can be used to schedule scans from the command line. It also offers a graphical user interface to assist users in managing assessment policies and scan sessions. For details, see: http://www.iss.net/products_services/enterprise_protection/vulnerability_assessment/scanner_internet.php While Internet Scanner is performing a scan, it stores the results of the scan in a database file. Hercules Import Wizard for Internet Scanner uses this database file to import the results and create remediation profiles. ISS System Scanner ISS System Scanner is a host based vulnerability assessment tool. It can be used to perform assessments on devices that it supports including Windows, UNIX, and Linux. System Scanner offers a graphical user interface to assist users in managing assessment policies and scan sessions. While System Scanner is performing a scan, it stores the results of the scan in a database file. Hercules Import Wizard for System Scanner uses this database file to import the results and create Remediation profiles. For details on the ISS System Scanner, see: http://www.iss.net/products_services/enterprise_protection/vulnerability_assessment/scanner_system.php ISS SiteProtector The Internet Security Systems™ SiteProtector™ management system enables you to monitor and control network security systems across multiple sites from a central location. You can monitor your networks for intrusion activity, assess vulnerabilities, and prioritize events. For details on SiteProtector, see: http://www.iss.net/products_services/enterprise_protection/rssite_protector/siteprotector.php Microsoft Baseline Security Analyzer The Microsoft® Baseline Security Analyzer (MBSA) allows administrators to scan local and remote systems for missing security patches as well as common security misconfigurations. MBSA includes a graphical and command line interface that can perform local or remote scans of Windows operating systems (Windows® 2000, Windows® XP, and Windows Server™ 2003). MBSA scans for missing security updates and service packs for Windows, IE, Internet Information Services (IIS), SQL Server™, Exchange, and Windows Media Player. MBSA will create and store individual XML security reports for each computer scanned and will display the reports in the graphical user interface in HTML. For details on MBSA, see: http://www.microsoft.com/technet/security/tools/mbsahome.mspx) You need a dedicated folder for the output files generated by the MBSA scan. The Hercules software browses the folder for the files, rather than browsing for each file individually. If you use MBSA 1.2.1, the output files are .xml files. If you use MBSA 2.0, the result is an html file with an .mbsa extension. 10 Hercules Vulnerability Assessment and Remediation Overview nCircle IP360 Vulnerability Management System The IP360 Vulnerability Management System from nCircle (http://www.ncircle.com) is an appliance-based vulnerability management solution that discovers, assesses, and protects devices within the enterprise network against common vulnerabilities. The IP360 Device Profilers track changes to the network environment, discover new vulnerabilities, and report network status using a non-disruptive scanning technology that accurately reveals the scope of your infrastructure without taxing network bandwidth. The IP360 Vulnerability Management System minimizes false positives and negatives associated with some scanners. The nCircle IP360 scanner can export the results of a scan in an XML file. Hercules Import Wizard for nCircle uses this XML file to import the results and create Remediation profiles. NexantiS SecureScout SP NexantiS SecureScout SP (http://www.securescout.com/securescoutsp) is a multi-user software product for enterprise vulnerability assessment needs. SecureScout SP provides automation, control and management of security testing. SecureScout SP users can enjoy an unprecedented level of Managed Security through the on-going testing of internal and public-facing IP addresses. For Managed Security Service Providers, SecureScout SP can be rebranded. SecureScout SP imports the data directly from the SecureScout database into the Hercules database. Qualys QualysGuard Scanner The QualysGuard (http://www.qualys.com) scanner is currently offered as an ASP solution for customers to perform scans of devices accessible through an outward facing internet connection. QualysGuard performs various assessments on Windows, UNIX, Linux, Solaris™, and network devices. Hercules software integrates with QualysGuard by allowing the import of previously saved scans from a local XML file or by authenticating to the QualysGuard service and downloading the appropriate scan reports for import. SAINT Scanning Engine The SAINT Scanning engine (http://www.saintcorporation.com/products/saint_engine.html) is a vulnerability scanner that pinpoints security risks accurately, while being easy to use. It finds targets, does a port scan, and then a vulnerability check. SAINT Scanning Engine imports the data directly from the SAINT database into the Hercules database. 11 Hercules Vulnerability Assessment and Remediation Overview Tenable Nessus Scanner Nessus (http://www.nessus.org) is a network based vulnerability assessment tool that is supported by the Open Source community. It is free to download and use on any network and can be customized to fit specific environments. See http://www.tenablesecurity.com/products/nessus.shtml. Nessus is installed and runs on Linux or UNIX hosts. It can scan a variety of different platforms including Windows, UNIX, Linux, and edge devices. It is recommended that before attempting to install and use Nessus that you have a good understanding of UNIX or Linux and are comfortable with installing and configuring software on those platforms. Through the support of the Open Source communities, several Nessus clients have been developed that allow users to control and manage Nessus scans from platforms other than Linux. For example, NessusWx provides a Windows interface that allows scheduling and running of vulnerability assessments. These clients communicate with the Nessus server installed on a Linux or UNIX computer to perform the scan and reporting functions. Tenable NeWT Scanner Tenable Network Security (www.tenablesecurity.com) produces NeWT, a Windows version of the Nessus scanner used with Windows 2000 and Windows XP machines. NeWT stands for "Nessus for Windows Technology". Hercules accepts NeWT data as an XML file. The MITRE Corporation OVAL Definition Interpreter OVAL (Open Vulnerability and Assessment Language) is a specification for describing vulnerabilities in XML format. This standard defines three main XML schemas, one of which is the OVAL Definitions Schema, which is used to test for the presence of specific vulnerabilities, configuration issues, and/or patches. The OVAL Definition Interpreter is a reference implementation of OVAL that was created to show how information can be collected from a computer to evaluate, and carry out the OVAL definitions for that platform. The OVAL Definition Interpreter can be downloaded from http://oval.mitre.org/ free of charge. The OVAL Importer enables the import of the results of files generated by the OVAL Definition Interpreter into Hercules. You can import OVAL results files from other supported OVALcompatible scanners, for example, ThreatGuard. The OVAL Importer will support version 4.1 and 4.2 of the OVAL Definition Interpreter. The OVAL Definition Interpreter runs on Windows and Red Hat operating systems, specifically, Windows NT 4.0, Windows 2000 Professional, Windows XP, Windows 2000 Server, and Windows Server 2003, Red Hat Linux 9, and Red Hat Enterprise Linux 3. 12