Skip to content

Commit 2b4491d

Browse files
committed
acrolinx fixes
1 parent 2042e80 commit 2b4491d

File tree

1 file changed

+19
-19
lines changed

1 file changed

+19
-19
lines changed

defender-vulnerability-management/windows-authenticated-scan.md

Lines changed: 19 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -27,10 +27,10 @@ ms.collection:
2727
> [!IMPORTANT]
2828
> This feature will be deprecated by the end of November 2025 and will not be supported beyond that date. More information about this change are in the [Windows authenticated scan deprecation FAQs](defender-vulnerability-management-faq.md#windows-authenticated-scan-deprecation-faqs).
2929
30-
Authenticated scan for Windows provides the ability to run scans on unmanaged Windows devices. You can remotely target by IP ranges or hostnames and scan Windows services by providing Microsoft Defender Vulnerability Management with credentials to remotely access the devices. Once configured the targeted unmanaged devices will be scanned regularly for software vulnerabilities. By default, the scan will run every four hours with options to change this interval or have it only run once.
30+
Authenticated scan for Windows provides the ability to run scans on unmanaged Windows devices. You can remotely target by IP ranges or hostnames and scan Windows services by providing Microsoft Defender Vulnerability Management with credentials to remotely access the devices. Once configured, the targeted unmanaged devices are scanned regularly for software vulnerabilities. By default, the scan runs every four hours with options to change this interval or have it only run once.
3131

3232
> [!NOTE]
33-
> To use this feature you'll require Microsoft Defender Vulnerability Management Standalone or if you're already a Microsoft Defender for Endpoint Plan 2 customer, the Defender Vulnerability Management add-on.
33+
> To use this feature, Microsoft Defender Vulnerability Management Standalone is required. If you're already a Microsoft Defender for Endpoint Plan 2 customer, the Defender Vulnerability Management add-on is required.
3434
3535
Security administrators can then see the latest security recommendations and review recently discovered vulnerabilities for the targeted device in the [Microsoft Defender portal](https://security.microsoft.com).
3636

@@ -39,18 +39,18 @@ Security administrators can then see the latest security recommendations and rev
3939
4040
## Scanner Installation
4141

42-
Similar to [network device](/defender-endpoint/network-devices) authenticated scan, you'll need a scanning device with the scanner installed. If you don't already have the scanner installed, see [Install the scanner](/defender-endpoint/network-devices#install-the-scanner) for steps on how to download and install it.
42+
Similar to [network device](/defender-endpoint/network-devices) authenticated scan, you need a scanning device with the scanner installed. If you don't already have the scanner installed, see [Install the scanner](/defender-endpoint/network-devices#install-the-scanner) for steps on how to download and install it.
4343

4444
> [!NOTE]
4545
> No changes are required for pre-existing installed scanners.
4646
4747
## Prerequisites
4848

49-
The following section lists the pre-requisites you need to configure to use Authenticated scan for Windows.
49+
The following section lists the prerequisites you need to configure to use Authenticated scan for Windows.
5050

5151
### Scanning account
5252

53-
A scanning account is required to remotely access the devices. This must be a [Group Managed Service Account (gMsa)](/windows-server/security/group-managed-service-accounts/group-managed-service-accounts-overview/).
53+
A scanning account is required to remotely access the devices. The account must be a [Group Managed Service Account (gMsa)](/windows-server/security/group-managed-service-accounts/group-managed-service-accounts-overview/).
5454

5555
> [!NOTE]
5656
> We recommend the gMSA account is a least privileged account with only the required scanning permissions and is set to cycle the password regularly.
@@ -63,10 +63,10 @@ To create a gMsa account:
6363
New-ADServiceAccount -Name gmsa1 -PrincipalsAllowedToRetrieveManagedPassword scanner-win11-i$ -KerberosEncryptionType RC4, AES128, AES256 -Verbose
6464
```
6565

66-
- gmsa1 stands for the name of the account you are creating, and scanner-win11-I$ stands for the machine name where the scanner agent will run. Only this machine will be able to retrieve the account password. You can provide a comma separated list of machines.
66+
- gmsa1 stands for the name of the account you are creating, and scanner-win11-I$ stands for the machine name where the scanner agent runs. Only this machine is able to retrieve the account password. You can provide a comma separated list of machines.
6767
- Modifying an existing account can be done with *Get-ADServiceAccount* and *Set-ADServiceAccount*
6868

69-
2. To Install the AD Service Account, on the machine where the scanner agent will run using an elevated PowerShell window, run:
69+
2. To Install the AD Service Account, on the machine where the scanner agent runs using an elevated PowerShell window, run:
7070

7171
```powershell
7272
Install-ADServiceAccount -Identity gmsa1
@@ -76,7 +76,7 @@ If your PowerShell doesn't recognize those commands, it probably means you're mi
7676

7777
### Devices to be scanned
7878

79-
Use the table below for guidance on the configurations required, along with the permissions needed for the scanning account, on each device to be scanned:
79+
Use the following table for guidance on the configurations required, along with the permissions needed for the scanning account, on each device to be scanned:
8080

8181
> [!NOTE]
8282
> The below steps are only one recommended way to configure the permissions on each device to be scanned and uses the Performance Monitor Users group. You can also configure the permissions in the following ways:
@@ -90,18 +90,18 @@ Use the table below for guidance on the configurations required, along with the
9090
|:---|:---|
9191
|Windows Management Instrumentation (WMI) is enabled|To enable remote Windows Management Instrumentation (WMI): <ul><li>Verify the Windows Management Instrumentation service is running.</li><li>Go to **Control Panel** \> **All Control Panel Items** \> **Windows Defender Firewall** \> **Allowed applications** and ensure Windows Management Instrumentation (WMI) is allowed through Windows Firewall.</li></ul>|
9292
|Scanning account is a member of Performance Monitor Users group|The scanning account must be a member of the **Performance Monitor Users** group on the device to be scanned.|
93-
|Performance Monitor Users group has 'Enable Account' and 'Remote Enable' permissions on Root/CIMV2 WMI namespace|To verify or enable these permissions: <ul><li>Run wmimgmt.msc.</li><li>Right click **WMI Control (Local)** and select **Properties**.</li><li>Go to the Security tab.</li><li>Select the relevant WMI namespace and select **Security**.</li><li>Add the specified group and select to allow the specific permissions.</li><li>Select **Advanced**, choose the specified entry and select **Edit**.</li><li>Set **Applies To** to "This namespace and subnamespaces".</li></ul>|
93+
|Performance Monitor Users group has 'Enable Account' and 'Remote Enable' permissions on Root/CIMV2 WMI namespace|To verify or enable these permissions: <ul><li>Run wmimgmt.msc.</li><li>Right click **WMI Control (Local)** and select **Properties**.</li><li>Go to the Security tab.</li><li>Select the relevant WMI namespace and select **Security**.</li><li>Add the specified group and select to allow the specific permissions.</li><li>Select **Advanced**, choose the specified entry, and select **Edit**.</li><li>Set **Applies To** to "This namespace and subnamespaces".</li></ul>|
9494
|**Performance Monitor Users** group should have permissions on DCOM operations|To verify or enable these permissions: <ul><li>Run dcomcnfg.</li><li>Navigate to **Component Services** \> **Computers** \> **My Computer**.</li><li>Right click My Computer and choose **Properties**.</li><li>Go to the COM Security tab.</li><li>Go to **Launch and Activation Permissions** and select **Edit Limits**.</li><li>Add the specified group and select to allow **Remote Activation**.</li></ul>|
9595

9696
### Configure a group of devices with a group policy
9797

98-
A group policy will let you bulk apply the configurations required, as well as the permissions required for the scanning account, to a group of devices to be scanned.
98+
A group policy lets you bulk apply the configurations required, and the permissions required for the scanning account, to a group of devices to be scanned.
9999

100100
Follow these steps on a domain controller to configure a group of devices at the same time:
101101

102102
|Step|Description|
103103
|---|---|
104-
|Create a new Group Policy Object|<ul><li>On the domain controller open the Group Policy Management Console.</li><li>Follow these steps to [Create a Group Policy Object](/windows/security/threat-protection/windows-firewall/create-a-group-policy-object).</li><li>Once your Group Policy Object (GPO) is created, right-click on your GPO and select **Edit** to open the Group Policy Management Editor console and complete the steps below.</li></ul>|
104+
|Create a new Group Policy Object|<ul><li>On the domain controller, open the Group Policy Management Console.</li><li>Follow these steps to [Create a Group Policy Object](/windows/security/threat-protection/windows-firewall/create-a-group-policy-object).</li><li>Once your Group Policy Object (GPO) is created, right-click on your GPO and select **Edit** to open the Group Policy Management Editor console and complete the steps below.</li></ul>|
105105
|Enable Windows Management Instrumentation (WMI)|To enable remote Windows Management Instrumentation (WMI): <ul><li>Go to **Computer Configuration** \> **Policies** \> **Windows Settings** \> **Security Settings** \> **System Services**.</li><li>Right-click **Windows Management Instrumentation**.</li><li>Select the **Define this policy setting** box and choose **Automatic**.</li></ul>|
106106
|Allow WMI through the firewall|To allow Windows Management Instrumentation (WMI) through the firewall: <ul><li>Go to **Computer Configuration** \> **Policies** \> **Windows Settings** \> **Security Settings** \> **Windows Defender Firewall and Advanced Security** \> **Inbound Rules**.</li><li>Right-click and select **New Rule**.</li><li>Choose **Predefined** and select **Windows Management Instrumentation (WMI)** from the list. Then select **Next**.</li><li>Select the **Windows Management Instrumentation (WMI-In)** checkbox. Then select **Next**.</li><li>Select **Allow the connection**. Then select **Finish**.</li><li>Right-click the newly added rule and select **Properties**.</li><li>Go to the **Advanced** tab and uncheck the **Private** and **Public** options as only **Domain** is required.</li></ul>|
107107
|Grant permissions to perform DCOM operations|To grant permissions to perform DCOM operations: <ul><li>Go to **Computer Configuration** \> **Policies** \> **Windows Settings** \> **Security Settings** \> **Local Policies** \> **Security Operations**.</li><li>Right-click **DCOM: Machine Launch Restrictions in Security Descriptor Definition Language (SDDL) syntax** and select **Properties**.</li><li>Select **Define this policy setting** box and select **Edit Security**.</li><li>Add the user or group you are granting permissions to and select **Remote Activation**.</li></ul>|
@@ -155,7 +155,7 @@ Process {
155155
}
156156
```
157157

158-
Once the GPO policy is applied to a device, all the required settings will be applied and your gMSA account will be able to access and scan the device.
158+
Once the GPO policy is applied to a device, all the required settings are applied and your gMSA account is able to access and scan the device.
159159

160160
## Configure a new authenticated scan
161161

@@ -167,27 +167,27 @@ To configure a new authenticated scan:
167167
:::image type="content" source="/defender/media/defender-vulnerability-management/authenticated-scan.png" alt-text="Screenshot of the add new authenticated scan screen" lightbox="/defender/media/defender-vulnerability-management/authenticated-scan.png":::
168168

169169
3. Enter a **Scan name**.
170-
4. Select the **Scanning device:** The onboarded device you'll use to scan the unmanaged devices.
171-
5. Enter the **Target (range):** The IP address ranges or hostnames you want to scan. You can either enter the addresses or import a CSV file. Importing a file will override any manually added addresses.
172-
6. Select the **Scan interval:** By default, the scan will run every four hours, you can change the scan interval or have it only run once, by selecting 'Do not repeat'.
170+
4. Select the **Scanning device:** The onboarded device you use to scan the unmanaged devices.
171+
5. Enter the **Target (range):** The IP address ranges or hostnames you want to scan. You can either enter the addresses or import a CSV file. Importing a file overrides any manually added addresses.
172+
6. Select the **Scan interval:** By default, the scan runs every four hours. You can change the scan interval or have it only run once, by selecting 'Do not repeat'.
173173
7. Choose your **Authentication method** - there are two options to choose from:
174174
- Kerberos (preferred)
175175
- Negotiate
176176

177177
> [!NOTE]
178178
> Negotiate option will fallback to NTLM in cases where Kerberos fails. Using NTLM is not recommended as it is not a secure protocol.
179179
180-
8. Enter the credentials Microsoft Defender Vulnerability Management will use to remotely access the devices:
180+
8. Enter the credentials Microsoft Defender Vulnerability Management uses to remotely access the devices:
181181

182-
- **Use azure KeyVault:** If you manage your credentials in Azure KeyVault you can enter the Azure KeyVault URL and Azure KeyVault secret name to be accessed by the scanning device to provide credentials
182+
- **Use azure KeyVault:** If you manage your credentials in Azure KeyVault, you can enter the Azure KeyVault URL and Azure KeyVault secret name to be accessed by the scanning device to provide credentials
183183
- For the Azure KeyVault secret value use [gMSA account details](/windows-server/security/group-managed-service-accounts/group-managed-service-accounts-overview/) in the format **Domain;Username**
184184
9. Select **Next** to run or skip the test scan. For more information on test scans, see [Scan and add network devices](/defender-endpoint/network-devices#scan-and-add-network-devices).
185185
10. Select **Next** to review the settings and then select **Submit** to create your new authenticated scan.
186186

187187
> [!NOTE]
188188
> As the authenticated scanner currently uses an encryption algorithm that is not compliant with [Federal Information Processing Standards (FIPS)](/windows/security/threat-protection/security-policy-settings/system-cryptography-use-fips-compliant-algorithms-for-encryption-hashing-and-signing/), the scanner can't operate when an organization enforces the use of FIPS compliant algorithms.
189189
>
190-
> To allow algorithms that are not compliant with FIPS, set the following value in the registry for the devices where the scanner will run: Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\FipsAlgorithmPolicy with a DWORD value named **Enabled** and value of **0x0**
190+
> To allow algorithms that are not compliant with FIPS, set the following value in the registry for the devices where the scanner runs: Computer\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\FipsAlgorithmPolicy with a DWORD value named **Enabled** and value of **0x0**
191191
>
192192
> FIPS compliant algorithms are only used in relation to departments and agencies of the United States federal government.
193193
@@ -196,7 +196,7 @@ To configure a new authenticated scan:
196196
You can use APIs to create a new scan and view all existing configured scans in your organization. For more information, see:
197197

198198
- [Get all scan definitions](/defender-endpoint/api/get-all-scan-definitions)
199-
- [Add, delete or update a scan definition](/defender-endpoint/api/add-a-new-scan-definition)
199+
- [Add, delete, or update a scan definition](/defender-endpoint/api/add-a-new-scan-definition)
200200
- [Get all scan agents](/defender-endpoint/api/get-all-scan-agents)
201201
- [Get scan agent by Id](/defender-endpoint/api/Get-agent-details)
202202
- [Get scan history by definition](/defender-endpoint/api/get-scan-history-by-definition)

0 commit comments

Comments
 (0)