IncidentResponsev2

Verify Patch Compliance on All Hosts

Task Verify Patch Compliance on all Host Systems

Conditions

Given domain credentials with the appropriate permissions, and a vulnerability scanner or OS-native update utility, perform vulnerability scans and patch audits from an incident response workstation.

Operator Note: Patch management and validation is critical during incidents. Attackers often leverage missing patches for initial access and lateral movement. Verifying patch compliance ensures hosts are not vulnerable to known exploits.

Standards

End State

All enclave target systems have been scanned and patch compliance verified. Any deficiencies are tracked and approved for remediation or accepted risk.


Notes


Manual Steps

Vulnerability Scanning

OpenVAS (Linux / Cross-platform)

MBSA (Windows Legacy / GUI)

MBSA (Command Line)

mbsacli /i 127.0.0.1 /n OS+IIS+SQL+PASSWORD
mbsacli /c domain\machinename /n OS+IIS+SQL+PASSWORD
mbsacli /r 192.168.0.1-192.168.0.254 /n OS+IIS+SQL+PASSWORD
mbsacli /d NameOfMyDomain /n OS+IIS+SQL+PASSWORD

OS Native Methods

Windows PowerShell (Modern alternative to MBSA)

Get-HotFix

Operator Note: Use Get-HotFix to list installed updates and patch level.


Ubuntu / Debian based:

apt-get update
apt-get upgrade
apt-get dist-upgrade

Red Hat Enterprise Linux 2.1-4:

up2date
up2date-nox --update
up2date -u <PACKAGE NAME>

Red Hat Enterprise Linux 5:

pup

Red Hat Enterprise Linux 6:

yum update
yum list installed <PACKAGE NAME>
yum install <PACKAGE NAME>
yum update <PACKAGE NAME>

Kali:

apt-get update && apt-get upgrade

Running Script (Example Script for Windows Hosts)

# Pull patch information from multiple Windows hosts
$computers = @("Host1", "Host2", "Host3")

foreach ($computer in $computers) {
    Get-HotFix -ComputerName $computer | Select-Object PSComputerName, HotFixID, InstalledOn | Export-Csv ".\PatchStatus_$computer.csv" -Append -NoTypeInformation
}

Operator Note: This script pulls hotfix lists from remote hosts and saves them to CSV.


Dependencies


Other Available Tools

Tool Platform Use Case
OpenVAS / Greenbone Cross-platform Full vulnerability scanning
MBSA (Legacy) Windows Patch auditing (deprecated but useful for legacy)
PowerShell (Get-HotFix) Windows Simple local/remote patch status
WSUS Windows Enterprise Patch deployment + compliance
SCCM (MEMCM) Windows Enterprise Enterprise patch management
Qualys / Nessus Cross-platform Enterprise vulnerability scanning

Operator Recommendations and Additional Tools

Operator Checklist

Best Practices


References

OpenVAS Setup Instructions
OpenVAS Documentation
Microsoft Baseline Security Analyzer
NIST SP 800-42 Guidelines on Network Security Testing
NIST SP 800-40 Creating a Patch and Vulnerability Management Program


Revision History

Date Version Description Author
2025-05-02 2.0 Full original + enriched with multi-OS operator guidance, PowerShell, alternate tooling, checklist and best practices Leo