{"id":259,"date":"2005-04-10T20:10:00","date_gmt":"2005-04-11T01:10:00","guid":{"rendered":"https:\/\/www.suramya.com\/blog\/2005\/04\/10\/tools-to-audit-a-windows-server\/"},"modified":"2022-06-16T15:18:11","modified_gmt":"2022-06-16T09:48:11","slug":"tools-to-audit-a-windows-server","status":"publish","type":"post","link":"https:\/\/www.suramya.com\/blog\/2005\/04\/tools-to-audit-a-windows-server\/","title":{"rendered":"Tools to Audit a Windows Server"},"content":{"rendered":"\n<p>Here are some links to software\/articles that will help you Audit your windows server(s):<\/p>\n<p><b>Software:<\/b><\/p>\n<ul>\n<li><a href='http:\/\/www.microsoft.com\/technet\/security\/tools\/mbsahome.mspx'>MS baseline security Analyzer<\/a>\n<\/li>\n<li><a href='http:\/\/www.gfi.com\/pages\/files.htm'>Security audit\/scanner<\/a>\n<\/li>\n<li><a href='http:\/\/www.nessus.org\/'>NESSUS<\/a>\n<\/li>\n<li><a href='http:\/\/www.insecure.org\/nmap\/'>nmap Security Scanner<\/a>\n<\/li>\n<li><a href='http:\/\/www.isecom.org\/osstmm\/%27'>Framework for Auditing<\/a>\n<\/li>\n<li><a href='http:\/\/www.metasploit.com\/projects\/Framework\/'>Exploits for Testing<\/a>\n<\/li>\n<\/ul>\n<p><b>Articles:<\/b><\/p>\n<ul>\n<li><a href='http:\/\/www.securitydocs.com\/Operating_System\/Microsoft\/Windows_2000_and_NT'>Windows 2000\/NT Security<\/a>\n<\/li>\n<li><a href='http:\/\/www.securitydocs.com\/Vulnerability_Management\/Auditing'>Vulnerability Management<\/a>\n<\/li>\n<li><a href='http:\/\/csrc.nist.gov\/checklists\/presentations\/panel3-vendor_session-business_case_analysis_for_checklist_development\/Ferguson.pdf'>Checklist Development<\/a><\/li>\n<\/ul>\n<p>&#8211; Suramya<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Here are some links to software\/articles that will help you Audit your windows server(s): Software: MS baseline security Analyzer Security audit\/scanner NESSUS nmap Security Scanner Framework for Auditing Exploits for Testing Articles: Windows 2000\/NT Security Vulnerability Management Checklist Development &#8211; Suramya<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"","activitypub_status":"","footnotes":""},"categories":[20,17,2],"tags":[],"class_list":["post-259","post","type-post","status-publish","format-standard","hentry","category-security-toolsapps","category-security-tutorials","category-techie-stuff"],"_links":{"self":[{"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/posts\/259","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/comments?post=259"}],"version-history":[{"count":1,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/posts\/259\/revisions"}],"predecessor-version":[{"id":5050,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/posts\/259\/revisions\/5050"}],"wp:attachment":[{"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/media?parent=259"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/categories?post=259"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.suramya.com\/blog\/wp-json\/wp\/v2\/tags?post=259"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}