I am looking for a list of the specific access rights needed by a
windows domain account to successfully read the registry and system file
versions.  I am referencing smb_nt_ms06-001.nasl, ID 20382.

  Nessus docs suggest that the "Classic" security model needs to be
invoked and that an account needs to be an "Administrator", either in
the local admin group or a member of the domain admin group, which in
turn is added to the local admin group.  

  Through domain policy, I can override local settings and force the
"Classic" security model.  

  Instead of simply tossing the nessus scanning user account into the
domain admin group, I would like to assign the minimum access rights.  I
can use domain policy to give nessus user full access to the
....\SecurePipeServers\winreg key.  This assumes Remote Registry service
is running.  Domain policy 'could' forcefully enable this service as
well.  Would granting "Log on as Service" be equivalent to modifying
this registry key?

  To read file system version numbers relies on "File and Printer
sharing" to be available and accessible.  Again domain policy 'could'
enable this as well as change the Scope of the exception to include a
list of nessus scanners if the local firewall is enabled (XPSP2 and
greater).  What additional rights are required to give the nessus user
the ability to read file versions?

High level steps for a custom domain policy

  Assign nessus user to nessusgroup
  mod winreg key to include nessusgroup
  start remote registry
  start file and print sharing with local firewall
  mod exception list to nessus scanner Ips
  what step(s) to allow nessusgroup file system version reads access?

Regards,
Drew

_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to