Facebook Google Plus Twitter LinkedIn YouTube RSS Menú Buscar Recursos - BlogRecursos - Seminario webRecursos - InformeRecursos - Eventoicons_066 icons_067icons_068icons_069icons_070

Admin Discovery Report

by Ryan Seguin
junio 27, 2017

Rogue administrator accounts leave systems open to unauthorized access often without triggering network alarms. Systems Administrators can sometimes leave default administrator and guest accounts, which also compromises network access. Active scanning and log correlation assists analysts in identifying all of the administrator accounts in an environment. This report presents a summary of administrative account information, which can aid in identifying authorized and unauthorized access within the network. 

In addition to reporting on unauthorized accounts, this report enables administrators to inventory the number of administrator accounts that have been purposefully or accidentally enabled across the network. Analysts can also find a list of vulnerabilities relating to administrative accounts to better understand the threats posed to their systems by admin accounts.

Information provided within this report contains details on administrative accounts that have been detected within the environment. Tenable Nessus actively scans and enumerates administrative accounts such as 'admin,' 'administrator' or 'root,' which are also default accounts that may need to be disabled as desired. 

This report is available in the SecurityCenter Feed, a comprehensive collection of dashboards, reports, Assurance Report Cards and assets. The report can be easily located in the SecurityCenter Feed under the category Monitoring.

The report requirements are:

  • SecurityCenter 5.5
  • Nessus 6.10.7
  • LCE 5.0.1

Tenable SecurityCenter Continuous View (SecurityCenter CV) is the market-defining continuous network monitoring solution, and can assist in securing an organization’s internal network and effectively responding to intrusions and attacks. SecurityCenter CV is continuously updated with information about advanced threats, zero-day vulnerabilities and new regulatory compliance data. Active scanning periodically examines systems to determine vulnerabilities and compliance concerns. Agent scanning enables scanning and detection of vulnerabilities on transient and isolated devices. Host data and data from other security products is analyzed to monitor the network for malware, intrusions and other forms of malicious activity. SecurityCenter CV provides an organization with the most comprehensive view of the network and the intelligence needed to support proactive intrusion prevention efforts. 

The following chapters are included in this report:

Executive Summary:  The Executive Summary chapter provides detailed information about administrative accounts throughout the network. Information contained within this chapter presents a high-level overview of the admin access to all assets.

Admin Account Details: This chapter presents Administrative (including non-administrative) accounts that are enabled and whose passwords never expire, and any critical vulnerabilities (if any) that are associated with administrative accounts.

Members of Admin Groups: The following systems contain users that are also members of the Administrators Group.

Probar gratis Comprar ahora

Probar Tenable.io Vulnerability Management


Disfrute de acceso completo a una plataforma moderna de gestión de vulnerabilidad basada en la nube que permite visualizar y realizar un seguimiento de los activos con una precisión inigualable. Regístrese ahora y ejecute el primer análisis en 60 segundos.

Comprar Tenable.io Vulnerability Management

Disfrute de acceso completo a una plataforma moderna de gestión de vulnerabilidad basada en la nube que permite visualizar y realizar un seguimiento de los activos con una precisión inigualable. Compre hoy mismo una suscripción anual.

65 activos

Probar Nessus Professional gratis


Nessus® es el escáner de vulnerabilidades más completo que existe en el mercado actual. Con Nessus Professional, le ayudará a automatizar el proceso de escaneo de vulnerabilidades, ahorrar tiempo en sus ciclos de cumplimiento y hacer participar a su equipo de TI.