Apply labels to affected devices
OVAL definitions contain the information required to perform OVAL tests. This information can include checks for registry entries, file versions, and WMI (Windows Management Instrumentation) data.
OVAL test definitions pass through a series of phases before being released. Depending on where a definition is in this process, it is assigned one of the following status values:
Other possible status values include:
For more information about the stages of OVAL definitions, go to http://cve.mitre.org.
When OVAL tests are enabled, all available OVAL tests run on the target devices.
OVAL test details do not indicate the severity of the vulnerability. Use your own judgment to determine whether to test your network for the presence of a particular vulnerability.
You can view OVAL tests and definitions in the Administrator Console.
a. |
Log in to the appliance Administrator Console, https://appliance_hostname/admin. Or, if the Show organization menu in admin header option is enabled in the appliance General Settings, select an organization in the drop-down list in the top-right corner of the page next to the login information. |
c. |
On the OVAL Scan panel, click Catalog. |
2. |
Optional: Limit which tests are displayed by using the View By drop-down list or Search field to find OVAL tests by OVAL-ID, CVE Number, operating system, or text. |
3. |
Click a Name link in the OVAL Catalog list. |
The OVAL Definition Detail page displays the following information:
The table at the bottom of the OVAL Tests: Definition page displays the list of devices in your network that contain the vulnerability. For convenience, a printer-friendly version of this data is available.
The appliance runs OVAL tests automatically based on the schedule specified in OVAL Settings.
It takes approximately one hour to run OVAL tests. In addition, OVAL Tests consume a large amount of memory and CPU resources, which might affect the performance of target devices. To minimize the disruption to users, run OVAL tests weekly or monthly and during hours when users are least likely to be inconvenienced.
In addition, you can run OVAL tests manually by logging in to the device as Administrator and running debug.bat. This file is usually located in the program data directory. For example: C:\ProgramData\Quest\KACE\kbots_cache\packages\kbots\9
If you are running OVAL tests periodically or if you want to obtain the OVAL test results for only a few devices, you can assign a label to those devices. You can then use the Run Now function to run OVAL tests on those devices only.
For more information about using labels, see About labels.
The appliance checks for new OVAL definitions every night, but you should expect new definitions every month. If OVAL tests are enabled, the appliance downloads new OVAL definitions to all managed devices during the next scripting update whenever a new package becomes available, regardless of the OVAL schedule settings.
The OVAL update ZIP file can be more than 30 MB in size — large enough to impact the performance of devices with slow connections. The ZIP file includes both 32- and 64-bit versions of the OVAL Interpreter and uses the correct version for the device. The OVAL Interpreter requires Microsoft .NET Framework and supports both the full (“Extended”) and Client Profile versions.
To run OVAL tests, you must enable OVAL, select target devices and operating systems, and establish a run schedule.
OVAL tests require extensive resources and can affect the performance of target devices. Therefore, exercise caution when configuring OVAL settings.
a. |
Log in to the appliance Administrator Console, https://appliance_hostname/admin. Or, if the Show organization menu in admin header option is enabled in the appliance General Settings, select an organization in the drop-down list in the top-right corner of the page next to the login information. |
c. |
On the OVAL Scan panel, click Schedules. |
2. |
In the Configure section, specify the following settings: |
3. |
In the Deploy section, specify the following settings: |
Setting |
Description |
Labels |
Limit deployment to devices that belong to specified labels. To select labels, click Edit, drag labels to the Limit Deployment to window, then click Save.
If you select a label that has a Replication Share or an alternate download location, the appliance copies digital assets from that Replication Share or alternate download location instead of downloading them directly from the appliance.
|
Devices |
Limit deployment to specific devices. In the drop-down list, select the devices to which you want to deploy the application. To filter the list, type a few characters in the Devices field. The number next to the field indicates the number of devices available. Scoped users can see only those devices that are associated with their role, when the role is assigned a label. For more information about user roles, see Add or edit User Roles. |
Operating Systems |
Select the operating systems you want to deploy to.
a. |
Click Manage Operating Systems. |
b. |
In the Operating Systems dialog box that appears, select the OS versions in the navigation tree, as applicable. |
You have an option to select OS versions by their family, product, architecture, release ID, or build version. You can choose a specific build version, or a parent node, as needed. Selecting a parent node in the tree automatically selects the associated child nodes. This behavior allows you to select any future OS versions, as devices are added or upgraded in your managed environment. For example, to select all build current and future versions associated with the Windows 10 x64 architecture, under All > Windows > Windows 10, select x64. |
4. |
In the Schedule section, specify the time and frequency for running OVAL: |
Setting |
Description |
None |
Run in combination with an event rather than on a specific date or at a specific time. |
Every n minutes/hours |
Run at a specified interval. |
Every day/specific day at HH:MM |
Run daily at a specified time, or run on a designated day of the week at a specified time. |
Run on the nth of every month/specific month at HH:MM |
Run on the same day every month, or a specific month, at the specified time. |
Run on the nth weekday of every month/specific month at HH:MM |
Run on the specific weekday of every month, or a specific month, at the specified time. |
Custom |
Run according to a custom schedule.
Use standard 5-field cron format (extended cron format is not supported):
Use the following when specifying values:
• |
Asterisks (*): Include the entire range of values in a field with an asterisk. For example, an asterisk in the hour field indicates every hour. |
• |
Commas (,): Separate multiple values in a field with a comma. For example, 0,6 in the day of the week field indicates Sunday and Saturday. |
• |
Hyphens (-): Indicate a range of values in a field with a hyphen. For example, 1-5 in the day of the week field is equivalent to 1,2,3,4,5, which indicates Monday through Friday. |
• |
Slashes (/): Specify the intervals at which to repeat an action with a slash. For example, */3 in the hour field is equivalent to 0,3,6,9,12,15,18,21. The asterisk ( *) specifies every hour, but /3 restricts this to hours divisible by 3. |
Examples:
|
View Task Schedule |
Click to view the task schedule. The Task Schedule dialog box displays a list of scheduled. Click a task to review the task details. For more information, see View task schedules. |
6. |
Click Run Now to run the script immediately. |
The OVAL Report page shows the OVAL tests that have been run since the last time the OVAL definitions were updated.
OVAL results are deleted from this page when OVAL definitions are updated. To save the results, schedule an OVAL device report to run periodically. See Add report schedules.
a. |
Log in to the appliance Administrator Console, https://appliance_hostname/admin. Or, if the Show organization menu in admin header option is enabled in the appliance General Settings, select an organization in the drop-down list in the top-right corner of the page next to the login information. |
c. |
In the Reporting section, click Show summary results. |
From the Test detail view, you can view all the devices that failed the OVAL test, and you can assign a label to those devices so that you can patch them later.
b. |
Under Reporting, click Show device compliance. |
3. |
Select Choose Action, then select the appropriate label under Apply Label to Affected Devices. |
The OVAL Device Compliance page shows a list of devices with OVAL test results. Here, you can view a summary of tests that were run on specific devices.
The label under the Device column in the OVAL Computer Report page is the inventory ID assigned by the appliance Inventory component.
For more information about any of the devices in the report, click the linked device name to navigate to the device detail page.
a. |
Log in to the appliance Administrator Console, https://appliance_hostname/admin. Or, if the Show organization menu in admin header option is enabled in the appliance General Settings, select an organization in the drop-down list in the top-right corner of the page next to the login information. |
c. |
Under Reporting, click Show summary results. |
The OVAL Device Compliance page appears containing a list of OVAL reports.
View the OVAL Report
OVAL definitions contain the information required to perform OVAL tests. This information can include checks for registry entries, file versions, and WMI (Windows Management Instrumentation) data.
OVAL test definitions pass through a series of phases before being released. Depending on where a definition is in this process, it is assigned one of the following status values:
Other possible status values include:
For more information about the stages of OVAL definitions, go to http://cve.mitre.org.
When OVAL tests are enabled, all available OVAL tests run on the target devices.
OVAL test details do not indicate the severity of the vulnerability. Use your own judgment to determine whether to test your network for the presence of a particular vulnerability.
You can view OVAL tests and definitions in the Administrator Console.
a. |
Log in to the appliance Administrator Console, https://appliance_hostname/admin. Or, if the Show organization menu in admin header option is enabled in the appliance General Settings, select an organization in the drop-down list in the top-right corner of the page next to the login information. |
c. |
On the OVAL Scan panel, click Catalog. |
2. |
Optional: Limit which tests are displayed by using the View By drop-down list or Search field to find OVAL tests by OVAL-ID, CVE Number, operating system, or text. |
3. |
Click a Name link in the OVAL Catalog list. |
The OVAL Definition Detail page displays the following information:
The table at the bottom of the OVAL Tests: Definition page displays the list of devices in your network that contain the vulnerability. For convenience, a printer-friendly version of this data is available.
The appliance runs OVAL tests automatically based on the schedule specified in OVAL Settings.
It takes approximately one hour to run OVAL tests. In addition, OVAL Tests consume a large amount of memory and CPU resources, which might affect the performance of target devices. To minimize the disruption to users, run OVAL tests weekly or monthly and during hours when users are least likely to be inconvenienced.
In addition, you can run OVAL tests manually by logging in to the device as Administrator and running debug.bat. This file is usually located in the program data directory. For example: C:\ProgramData\Quest\KACE\kbots_cache\packages\kbots\9
If you are running OVAL tests periodically or if you want to obtain the OVAL test results for only a few devices, you can assign a label to those devices. You can then use the Run Now function to run OVAL tests on those devices only.
For more information about using labels, see About labels.
The appliance checks for new OVAL definitions every night, but you should expect new definitions every month. If OVAL tests are enabled, the appliance downloads new OVAL definitions to all managed devices during the next scripting update whenever a new package becomes available, regardless of the OVAL schedule settings.
The OVAL update ZIP file can be more than 30 MB in size — large enough to impact the performance of devices with slow connections. The ZIP file includes both 32- and 64-bit versions of the OVAL Interpreter and uses the correct version for the device. The OVAL Interpreter requires Microsoft .NET Framework and supports both the full (“Extended”) and Client Profile versions.
To run OVAL tests, you must enable OVAL, select target devices and operating systems, and establish a run schedule.
OVAL tests require extensive resources and can affect the performance of target devices. Therefore, exercise caution when configuring OVAL settings.
a. |
Log in to the appliance Administrator Console, https://appliance_hostname/admin. Or, if the Show organization menu in admin header option is enabled in the appliance General Settings, select an organization in the drop-down list in the top-right corner of the page next to the login information. |
c. |
On the OVAL Scan panel, click Schedules. |
2. |
In the Configure section, specify the following settings: |
3. |
In the Deploy section, specify the following settings: |
Setting |
Description |
Labels |
Limit deployment to devices that belong to specified labels. To select labels, click Edit, drag labels to the Limit Deployment to window, then click Save.
If you select a label that has a Replication Share or an alternate download location, the appliance copies digital assets from that Replication Share or alternate download location instead of downloading them directly from the appliance.
|
Devices |
Limit deployment to specific devices. In the drop-down list, select the devices to which you want to deploy the application. To filter the list, type a few characters in the Devices field. The number next to the field indicates the number of devices available. Scoped users can see only those devices that are associated with their role, when the role is assigned a label. For more information about user roles, see Add or edit User Roles. |
Operating Systems |
Select the operating systems you want to deploy to.
a. |
Click Manage Operating Systems. |
b. |
In the Operating Systems dialog box that appears, select the OS versions in the navigation tree, as applicable. |
You have an option to select OS versions by their family, product, architecture, release ID, or build version. You can choose a specific build version, or a parent node, as needed. Selecting a parent node in the tree automatically selects the associated child nodes. This behavior allows you to select any future OS versions, as devices are added or upgraded in your managed environment. For example, to select all build current and future versions associated with the Windows 10 x64 architecture, under All > Windows > Windows 10, select x64. |
4. |
In the Schedule section, specify the time and frequency for running OVAL: |
Setting |
Description |
None |
Run in combination with an event rather than on a specific date or at a specific time. |
Every n minutes/hours |
Run at a specified interval. |
Every day/specific day at HH:MM |
Run daily at a specified time, or run on a designated day of the week at a specified time. |
Run on the nth of every month/specific month at HH:MM |
Run on the same day every month, or a specific month, at the specified time. |
Run on the nth weekday of every month/specific month at HH:MM |
Run on the specific weekday of every month, or a specific month, at the specified time. |
Custom |
Run according to a custom schedule.
Use standard 5-field cron format (extended cron format is not supported):
Use the following when specifying values:
• |
Asterisks (*): Include the entire range of values in a field with an asterisk. For example, an asterisk in the hour field indicates every hour. |
• |
Commas (,): Separate multiple values in a field with a comma. For example, 0,6 in the day of the week field indicates Sunday and Saturday. |
• |
Hyphens (-): Indicate a range of values in a field with a hyphen. For example, 1-5 in the day of the week field is equivalent to 1,2,3,4,5, which indicates Monday through Friday. |
• |
Slashes (/): Specify the intervals at which to repeat an action with a slash. For example, */3 in the hour field is equivalent to 0,3,6,9,12,15,18,21. The asterisk ( *) specifies every hour, but /3 restricts this to hours divisible by 3. |
Examples:
|
View Task Schedule |
Click to view the task schedule. The Task Schedule dialog box displays a list of scheduled. Click a task to review the task details. For more information, see View task schedules. |
6. |
Click Run Now to run the script immediately. |
The OVAL Report page shows the OVAL tests that have been run since the last time the OVAL definitions were updated.
OVAL results are deleted from this page when OVAL definitions are updated. To save the results, schedule an OVAL device report to run periodically. See Add report schedules.
a. |
Log in to the appliance Administrator Console, https://appliance_hostname/admin. Or, if the Show organization menu in admin header option is enabled in the appliance General Settings, select an organization in the drop-down list in the top-right corner of the page next to the login information. |
c. |
In the Reporting section, click Show summary results. |
From the Test detail view, you can view all the devices that failed the OVAL test, and you can assign a label to those devices so that you can patch them later.
b. |
Under Reporting, click Show device compliance. |
3. |
Select Choose Action, then select the appropriate label under Apply Label to Affected Devices. |
The OVAL Device Compliance page shows a list of devices with OVAL test results. Here, you can view a summary of tests that were run on specific devices.
The label under the Device column in the OVAL Computer Report page is the inventory ID assigned by the appliance Inventory component.
For more information about any of the devices in the report, click the linked device name to navigate to the device detail page.
a. |
Log in to the appliance Administrator Console, https://appliance_hostname/admin. Or, if the Show organization menu in admin header option is enabled in the appliance General Settings, select an organization in the drop-down list in the top-right corner of the page next to the login information. |
c. |
Under Reporting, click Show summary results. |
The OVAL Device Compliance page appears containing a list of OVAL reports.
About SCAP
SCAP (Secure Content Automation Protocol), is a set of open standards that enumerate software flaws, monitor security-related configurations and product names, and examine systems to determine the presence of vulnerabilities and rank (score) the impact of the discovered security issues on Windows devices.
SCAP is maintained by the National Institute of Standards and Technology (NIST), and its use is mandated by government agencies such as the US OMB (United States Office of Management and Budget).
SCAP uses the US government’s National Vulnerability Database (NVD), which is a standards-based vulnerability management data repository. NVD includes databases of security checklists, security-related software flaws, misconfigurations, product names, and impact metrics. For more information on SCAP and NVD, go to the NIST websites at http://scap.nist.gov/index.html and http://nvd.nist.gov/.
The appliance supports SCAP 1.0, 1.1, and 1.2, and SCAP is certified to run on Windows 7 and higher platforms (32-bit and 64-bit systems).
The appliance conducts SCAP scans using the KACE Agent software that is installed on managed devices. SCAP is not available for devices that do not have the KACE Agent software installed, such as Agentless devices.
The appliance conducts SCAP scans by running scripts on selected Agent-managed devices using security configuration checklists from the National Checklist Repository.
For SCAP versions 1.0 and 1.1, the script checks the SCAP data stream written in XML formats using the following SCAP standards: CCE, CPE, CVE, CVSS, OVAL, and XCCDF. See Definitions of SCAP standards.
SCAP 1.2 adds the concept of the "Data Stream," where all of the individual results files are combined into a single XML file. In addition, SCAP 1.2 adds a new output format called ARF (Asset Report Format 1.1). For more information, go to http://scap.nist.gov/specifications/arf/.
The appliance uses the Agent software to perform SCAP scan compliance checks. The results files are uploaded to the appliance or organization database and collated into a single file for reporting to a government agency (if required). Results are also displayed for each device on the appliance’s SCAP Scan Results page.
If the Organization component is enabled on your appliance, you view SCAP scan results for each organization separately.
SCAP uses the OVAL Interpreter version 5.10.1 and provides:
These features improve software security, threat assessment, and vulnerability correction.
SCAP scans monitor device security using specified protocols and standards.
Standard |
Definition |
CCE |
Common Configuration Enumeration provides unique identifiers to system configuration issues for facilitating fast and accurate correlation of configuration data across multiple information sources and tools.
The compliance checking results produced by the appliance SCAP scan include the relevant CCE ID references for XCCDF and OVAL definitions for every rule checked as designated by the checklist definition.
CCE information is available both in the XCCDF result file and the appliance’s SCAP Scan Results page. |
CPE |
Common Platform Enumeration is a structured naming scheme for information technology systems, platforms, and packages. Based on the generic syntax for Uniform Resource Identifiers (URI), CPE includes a formal name format, a language for describing complex platforms, a method for checking names against a system, and a description format for binding text and tests to a name. In essence, CPE ensures that the security checklist is applied to the correct platform.
This information is available both in the XCCDF result file and the appliance’s SCAP Scan Results page. |
CVE |
Common Vulnerability and Exposures is a list or dictionary that provides standard identifiers (common names) for publicly known security vulnerabilities and software flaws.
The compliance checking results produced by the appliance SCAP scan include the relevant CVE ID references and OVAL definition for every rule checked in the checklist definition.
For every patch or vulnerability, CVE ID references are provided in the appliance’s SCAP Scan Result page.
The CVE information is stored in a patch result XML file generated by the scan. The file is available for inspection and verification in the Agent’s working directory and on the server’s SCAP Scan Results page. |
CVSS |
Common Vulnerability Scoring System provides an open framework for communicating the characteristics and impacts of IT vulnerabilities. Its quantitative model helps ensure repeatable accurate measurement while enabling users to see the underlying vulnerability characteristics that were used to generate the scores. CVSS is well suited for industries, organizations, and governments that need accurate and consistent vulnerability impact scores. Among others, CVSS assists prioritizing vulnerability remediation activities and calculating the severity of vulnerabilities. The National Vulnerability Database (NVD) provides CVSS scores for almost all known vulnerabilities. |
OVAL |
Open Vulnerability and Assessment Language is an international, information security, community standard for promoting open and publicly available security content. It standardizes the transfer of this information across the entire spectrum of security tools and services.
The results of each OVAL test are written to several files on the target device and then compiled into a single result file on the appliance and displayed on the SCAP Scan Results page. |
SCAP |
Secure Content Automation Protocol is a set of open standards that enumerate software flaws, monitor security-related configurations and product names, and examine devices to determine the presence of vulnerabilities and rank (score) the impact of the discovered security issues. See About SCAP. |
XCCDF |
The eXtensible Configuration Checklist Description Format is a specification language for writing security checklists, benchmarks, and related documents. An XCCDF file contains a structured collection of security configuration rules for a set of target devices. The specification is designed to support information interchange, document generation, organizational and situational tailoring, automated compliance testing, and compliance scoring. See How a SCAP scan works. |
SCAP supported versions and platforms
SCAP (Secure Content Automation Protocol), is a set of open standards that enumerate software flaws, monitor security-related configurations and product names, and examine systems to determine the presence of vulnerabilities and rank (score) the impact of the discovered security issues on Windows devices.
SCAP is maintained by the National Institute of Standards and Technology (NIST), and its use is mandated by government agencies such as the US OMB (United States Office of Management and Budget).
SCAP uses the US government’s National Vulnerability Database (NVD), which is a standards-based vulnerability management data repository. NVD includes databases of security checklists, security-related software flaws, misconfigurations, product names, and impact metrics. For more information on SCAP and NVD, go to the NIST websites at http://scap.nist.gov/index.html and http://nvd.nist.gov/.
The appliance supports SCAP 1.0, 1.1, and 1.2, and SCAP is certified to run on Windows 7 and higher platforms (32-bit and 64-bit systems).
The appliance conducts SCAP scans using the KACE Agent software that is installed on managed devices. SCAP is not available for devices that do not have the KACE Agent software installed, such as Agentless devices.
The appliance conducts SCAP scans by running scripts on selected Agent-managed devices using security configuration checklists from the National Checklist Repository.
For SCAP versions 1.0 and 1.1, the script checks the SCAP data stream written in XML formats using the following SCAP standards: CCE, CPE, CVE, CVSS, OVAL, and XCCDF. See Definitions of SCAP standards.
SCAP 1.2 adds the concept of the "Data Stream," where all of the individual results files are combined into a single XML file. In addition, SCAP 1.2 adds a new output format called ARF (Asset Report Format 1.1). For more information, go to http://scap.nist.gov/specifications/arf/.
The appliance uses the Agent software to perform SCAP scan compliance checks. The results files are uploaded to the appliance or organization database and collated into a single file for reporting to a government agency (if required). Results are also displayed for each device on the appliance’s SCAP Scan Results page.
If the Organization component is enabled on your appliance, you view SCAP scan results for each organization separately.
SCAP uses the OVAL Interpreter version 5.10.1 and provides:
These features improve software security, threat assessment, and vulnerability correction.
SCAP scans monitor device security using specified protocols and standards.
Standard |
Definition |
CCE |
Common Configuration Enumeration provides unique identifiers to system configuration issues for facilitating fast and accurate correlation of configuration data across multiple information sources and tools.
The compliance checking results produced by the appliance SCAP scan include the relevant CCE ID references for XCCDF and OVAL definitions for every rule checked as designated by the checklist definition.
CCE information is available both in the XCCDF result file and the appliance’s SCAP Scan Results page. |
CPE |
Common Platform Enumeration is a structured naming scheme for information technology systems, platforms, and packages. Based on the generic syntax for Uniform Resource Identifiers (URI), CPE includes a formal name format, a language for describing complex platforms, a method for checking names against a system, and a description format for binding text and tests to a name. In essence, CPE ensures that the security checklist is applied to the correct platform.
This information is available both in the XCCDF result file and the appliance’s SCAP Scan Results page. |
CVE |
Common Vulnerability and Exposures is a list or dictionary that provides standard identifiers (common names) for publicly known security vulnerabilities and software flaws.
The compliance checking results produced by the appliance SCAP scan include the relevant CVE ID references and OVAL definition for every rule checked in the checklist definition.
For every patch or vulnerability, CVE ID references are provided in the appliance’s SCAP Scan Result page.
The CVE information is stored in a patch result XML file generated by the scan. The file is available for inspection and verification in the Agent’s working directory and on the server’s SCAP Scan Results page. |
CVSS |
Common Vulnerability Scoring System provides an open framework for communicating the characteristics and impacts of IT vulnerabilities. Its quantitative model helps ensure repeatable accurate measurement while enabling users to see the underlying vulnerability characteristics that were used to generate the scores. CVSS is well suited for industries, organizations, and governments that need accurate and consistent vulnerability impact scores. Among others, CVSS assists prioritizing vulnerability remediation activities and calculating the severity of vulnerabilities. The National Vulnerability Database (NVD) provides CVSS scores for almost all known vulnerabilities. |
OVAL |
Open Vulnerability and Assessment Language is an international, information security, community standard for promoting open and publicly available security content. It standardizes the transfer of this information across the entire spectrum of security tools and services.
The results of each OVAL test are written to several files on the target device and then compiled into a single result file on the appliance and displayed on the SCAP Scan Results page. |
SCAP |
Secure Content Automation Protocol is a set of open standards that enumerate software flaws, monitor security-related configurations and product names, and examine devices to determine the presence of vulnerabilities and rank (score) the impact of the discovered security issues. See About SCAP. |
XCCDF |
The eXtensible Configuration Checklist Description Format is a specification language for writing security checklists, benchmarks, and related documents. An XCCDF file contains a structured collection of security configuration rules for a set of target devices. The specification is designed to support information interchange, document generation, organizational and situational tailoring, automated compliance testing, and compliance scoring. See How a SCAP scan works. |