Given domain credentials with the appropriate permissions, and a vulnerability scanner or OS-native update utility, perform vulnerability scans and patch audits from an incident response workstation.
Operator Note: Patch management and validation is critical during incidents. Attackers often leverage missing patches for initial access and lateral movement. Verifying patch compliance ensures hosts are not vulnerable to known exploits.
All enclave target systems have been scanned and patch compliance verified. Any deficiencies are tracked and approved for remediation or accepted risk.
https://x.x.x.x:9392
Start Scan
Scan a computer
or Scan more than one computer
Check for security updates
onlymbsacli /i 127.0.0.1 /n OS+IIS+SQL+PASSWORD
mbsacli /c domain\machinename /n OS+IIS+SQL+PASSWORD
mbsacli /r 192.168.0.1-192.168.0.254 /n OS+IIS+SQL+PASSWORD
mbsacli /d NameOfMyDomain /n OS+IIS+SQL+PASSWORD
Get-HotFix
Operator Note: Use
Get-HotFix
to list installed updates and patch level.
apt-get update
apt-get upgrade
apt-get dist-upgrade
up2date
up2date-nox --update
up2date -u <PACKAGE NAME>
pup
yum update
yum list installed <PACKAGE NAME>
yum install <PACKAGE NAME>
yum update <PACKAGE NAME>
apt-get update && apt-get upgrade
# Pull patch information from multiple Windows hosts
$computers = @("Host1", "Host2", "Host3")
foreach ($computer in $computers) {
Get-HotFix -ComputerName $computer | Select-Object PSComputerName, HotFixID, InstalledOn | Export-Csv ".\PatchStatus_$computer.csv" -Append -NoTypeInformation
}
Operator Note: This script pulls hotfix lists from remote hosts and saves them to CSV.
Tool | Platform | Use Case |
---|---|---|
OpenVAS / Greenbone | Cross-platform | Full vulnerability scanning |
MBSA (Legacy) | Windows | Patch auditing (deprecated but useful for legacy) |
PowerShell (Get-HotFix) | Windows | Simple local/remote patch status |
WSUS | Windows Enterprise | Patch deployment + compliance |
SCCM (MEMCM) | Windows Enterprise | Enterprise patch management |
Qualys / Nessus | Cross-platform | Enterprise vulnerability scanning |
OpenVAS Setup Instructions
OpenVAS Documentation
Microsoft Baseline Security Analyzer
NIST SP 800-42 Guidelines on Network Security Testing
NIST SP 800-40 Creating a Patch and Vulnerability Management Program
Date | Version | Description | Author |
---|---|---|---|
2025-05-02 | 2.0 | Full original + enriched with multi-OS operator guidance, PowerShell, alternate tooling, checklist and best practices | Leo |