Disable Admin Approval Mode (F-Secure) 0 (0)

This step can be skipped if you are using a domain account (recommended) or a built-in local administrator account to authenticate to Windows systems. This step is only required if F-Secure Elements Vulnerability Management is configured to use a local user account and added to the local administrator’s group. To disable the Admin Approval Mode, do […]

Read More

Create a Windows domain account (F-Secure) 0 (0)

To create a new domain account, you may use the command given here, which must be executed using administrator credentials. Log in as an administrator and open a command prompt with administrative privileges. Adjust the following command so it fits your organization and execute it: dsadd user “cn=radar_account,cn=users,dc=ORGANIZATION,dc=COM” -samid \ radar_account -upn [email protected] -pwd PASSWORD […]

Read More

Configuring Windows authenticated scanning (RPC) (F-Secure) 0 (0)

Before applying changes, F-Secure recommends that you discuss all potential changes to the Group Policy with your network administrator. For more information about Group Policy, refer to your Microsoft documentation on Group Policy deployment. The following summarizes the requirements for enabling authenticated scanning for Windows: A user account must meet one of the following requirements: […]

Read More

Troubleshooting Windows authenticated scanning (WinRM) (F-Secure) 0 (0)

It is recommended that you verify the functionality of the new account from a remote host before using the account for Windows authenticated scanning. Note: Run the commands described in steps 1 – 5 directly on the target machine. This verifies that Windows Remote Management (WinRM) is configured properly on that machine and has sufficient permissions […]

Read More

Configuring the WinRM service to use HTTP through GPO (F-Secure) 0 (0)

For larger domain environments, we recommend that you configure the WinRM service via Group Policy. Note: Using HTTP for WinRM is not recommended outside a domain environment where the NTLM protocol does not provide a sufficient level of protection for credentials. This also means that using HTTP is particularly inadequate when using scan nodes that are […]

Read More

Configuring the WinRM service to use HTTP on individual hosts (F-Secure) 0 (0)

You can configure the WinRM service used for authenticated scanning to handle network traffic over HTTP. Note: Using HTTP for WinRM is not recommended outside a domain environment where the NTLM protocol does not provide a sufficient level of protection for credentials. This also means that using HTTP is particularly inadequate when using scan nodes that […]

Read More

Create a dedicated user account (F-Secure) 0 (0)

We recommend that you create a dedicated user account for Elements Vulnerability Management with access to WinRM. To create a new user account: Go to Control Panel > Administrative Tools > Computer Management > Local Users and Groups > Users. Add a new user account. Add the new user account to the Administrators group. Source : Official F-Secure Brand Editor by : BEST Antivirus KBS Team

Read More

Updating PowerShell (F-Secure) 0 (0)

The configuration requires PowerShell version 5.0 or newer, although we recommend updating PowerShell to the latest version. To check the PowerShell version and update it: Open a PowerShell console with administrative privileges. Run the following command to check the installed version of PowerShell: Get-Host | Select-Object Version If necessary, download the required version of PowerShell […]

Read More