Access to the remote registry and C$ shares were all that was necessary for
MBSA 1.2.1 to perform both Vulnerability Assessment (VA) and security update
(patch) checks. With MBSA 2.x, the remote registry and C$ access is only
sufficient enough to perform VA checks. The security update checks are
performed by the WUA agent on each target machine. So not only is an
exception through the firewall necessary to establish a connetion to each
target client's WUA client, the latest WUA client available must be
installed to each target machine.
When scanning a single machine, access directly to that machine is all that
is necessary. When scanning an IP address or domain, you also need to
ensure your DNS/WINS lookup tables are up-to-date so MBSA can obtain the
list of target machines based on either IP address or domain controller
(WINS/DNS) registration.
A few things to troubleshoot:
o Confirm all prerequisites for remote scanning in MBSA 2.x have been
reviewed (see the online MBSA 2.x FAQ or the MBSA help for details). These
are different than MBSA 1.2.1, so you'll likely want to review these.
o Manually install the latest WUA agent to a few target machines in a
smaller IP address range to confirm a smaller sampling of clients with the
latest clients will successfully scan
o Confirm your WINS/DNS lookups resolve to the specific IP address
and/or NetBIOS name of your target machines (perhaps type PING <Machine
Name> and PING <IP address> to confirm both respond with the same IP address
for the target machine)
Please let me know how these steps work and if they help you resolve this
issue. You may also want to try the MBSA 2.1 Beta which is eacy to download
and try. Thanks.
--
--
Doug Neal [MSFT]
du...@online.microsoft.com
This posting is provided "AS IS" with no warranties, and confers no rights.
If newsgroup discussion with experts and MVPs is unable to solve a problem
to your satisfaction, feel free to contact PSS for support on the Microsoft
Baseline Security Analyzer (MBSA). Information is available at the following
link:
http://support.microsoft.com/default.aspx
This e-mail address does not receive e-mail, but is used for newsgroup
postings only.
"Lydell Anderson" <lydella...@NOSPAM.hotmail.com> wrote in message
news:%23Fqw22j...@TK2MSFTNGP04.phx.gbl...
"Doug Neal [MSFT]" <du...@online.microsoft.com> wrote in message
news:%23kUtPRl...@TK2MSFTNGP02.phx.gbl...
"Lydell Anderson" <lydella...@NOSPAM.hotmail.com> wrote in message
news:OssOxJpI...@TK2MSFTNGP06.phx.gbl...
I'm sorry I wasn't able to help solve this issue at this time. But please
reply back concerning your resolution with PSS so we can share this with the
broader MBSA community.
--
--
Doug Neal [MSFT]
du...@online.microsoft.com
This posting is provided "AS IS" with no warranties, and confers no rights.
If newsgroup discussion with experts and MVPs is unable to solve a problem
to your satisfaction, feel free to contact PSS for support on the Microsoft
Baseline Security Analyzer (MBSA). Information is available at the following
link:
http://support.microsoft.com/default.aspx
This e-mail address does not receive e-mail, but is used for newsgroup
postings only.
"Lydell Anderson" <lydella...@NOSPAM.hotmail.com> wrote in message
news:u2pqVL5K...@TK2MSFTNGP05.phx.gbl...