Belarc Advisor - Anyone using it ???

Discussion in 'other software & services' started by zpro, Jul 29, 2012.

Thread Status:
Not open for further replies.
  1. zpro

    zpro Registered Member

    Joined:
    Mar 4, 2009
    Posts:
    38
    I just install this software Belarc Advisor (FREEEWARE), and it scan everything on your computer, and display via a web browser, the most import feature is the security man, talk about giving you the facts - hard and cold. yikes.

    my security was a 1.25 out of 10 , all my updates are good, and my antivirus is good. but my windows setting are not good.

    I will post just some of the setting that are not set right, if someone can tell me if these setting mark with x mean failed. and check means passed. do I need to really fix all these ? ? o_O

    Security Options Settings Section Score: 0.00 of 0.63
    1. Accounts: Administrator account status (CCE-9199)
    2. Accounts: Guest account status (CCE-8714)
    3. Accounts: Limit local account use to blank passwords to console logon only (CCE-941:cool:
    4. Accounts: Rename administrator account (CCE-8484)
    5. Accounts: Rename guest account (CCE-9229)
    6. Audit: Audit the access of global system objects (CCE-9150)
    7. Audit: Audit the use of Backup and Restore privilege (CCE-8789)
    8. Audit: Force audit policy subcategory settings (Windows Vista or later) to override audit policy category settings (CCE-9432)
    9. Devices: Prevent users from installing printer drivers (CCE-9026)
    10. Devices: Restrict CD-ROM access to locally logged-on user only" (CCE-9304)
    11. Devices: Restrict floppy access to locally logged-on user only (CCE-9440)
    12. Domain member: Digitally encrypt or sign secure channel data (always) (CCE-8974)
    13. Domain member: Digitally encrypt secure channel data (when possible) (CCE-9251)
    14. Domain member: Digitally sign secure channel data (when possible) (CCE-9375)
    15. Domain member: Disable machine account password changes (CCE-9295)
    16. Domain member: Maximum machine account password age (CCE-9123)
    17. Domain member: Require strong (Windows 2000 or later) session key (CCE-9387)
    18. Interactive logon: Do not display last user name (CCE-9449)
    19. Interactive logon: Do not require CTRL+ALT+DEL (CCE-9317)
    20. Interactive logon: Message text for users attempting to log on (CCE-8973)
    21. Interactive logon: Message title for users attempting to log on (CCE-8740)
    22. Interactive logon: Number of previous logons to cache (in case domain controller is not available) (CCE-8487)
    23. Interactive logon: Prompt user to change password before expiration (CCE-9307)
    24. Interactive logon: Require Domain Controller authentication to unlock workstation (CCE-881:cool:
    25. Interactive logon: Smart card removal behavior (CCE-9067)
    26. Microsoft network client: Digitally sign communications (always) (CCE-9327)
    27. Microsoft network client: Digitally sign communications (if server agrees) (CCE-9344)
    28. Microsoft network client: Send unencrypted password to third-party SMB servers (CCE-9265)
    29. Microsoft network server: Amount of idle time required before suspending session (CCE-9406)
    30. Microsoft network server: Digitally sign communications (always) (CCE-9040)
    31. Microsoft network server: Digitally sign communications (if client agrees) (CCE-8825)
    32. Microsoft network server: Disconnect clients when logon hours expire (CCE-935:cool:
    33. Microsoft network server: SPN Target name validation (CCE-8503)
    34. Network access: Allow anonymous SID-Name translation (CCE-9531)
    35. Network access: Do not allow anonymous enumeration of SAM accounts (CCE-9249)
    36. Network access: Do not allow anonymous enumeration of SAM accounts and shares (CCE-9156)
    37. Network access: Do not allow storage of passwords and credentials for network authentication (CCE-8654)
    38. Network access: Let Everyone permissions apply to anonymous users (CCE-8936)
    39. Network access: Named Pipes that can be accessed anonymously - netlogon, lsarpc, samr, browser (CCE-921:cool:
    40. Network access: Remotely accessible registry paths (CCE-9121)
    41. Network access: Remotely accessible registry paths and sub paths (CCE-9386)
    42. Network access: Restrict anonymous access to Named Pipes and Shares (CCE-9540)
    43. Network access: Shares that can be accessed anonymously (CCE-9196)
    44. Network access: Sharing and security model for local accounts (CCE-9503)
    45. Network security: Allow Local System to use computer identity for NTLM (CCE-9096)
    46. Network security: Allow LocalSystem NULL session fallback (CCE-8804)
    47. Network Security: Allow PKU2U authentication requests to this computer to use online identities (CCE-9770)
    48. Network Security: Configure encryption types allowed for Kerberos (CCE-9532)
    49. Network security: Do not store LAN Manager hash value on next password changes (CCE-8937)
    50. Network security: Force logoff when logon hours expire (CCE-9704)
    51. Network security: LAN Manager Authentication Level (CCE-8806)
    52. Network security: LDAP client signing requirements (CCE-976:cool:
    53. Network security: Minimum session security for NTLM SSP based (including secure RPC) clients (CCE-9534)
    54. Network security: Minimum session security for NTLM SSP based (including secure RPC) servers (CCE-9736)
    55. Recovery Console: Allow Automatic Administrative Logon (CCE-8807)
    56. Recovery Console: Allow Floppy Copy and Access to All Drives and All Folders (CCE-8945)
    57. Shutdown: Allow System to be Shut Down Without Having to Log On (CCE-9707)
    58. Shutdown: Clear Virtual Memory Pagefile (CCE-9222)
    59. System Cryptography: Use FIPS compliant algorithms for encryption, hashing, and signing (CCE-9266)
    60. System objects: Require case insensitivity for non-Windows subsystems (CCE-9319)
    61. System objects: Strengthen default permissions of internal system objects (CCE-9191)
    62. User Account Control: Admin Approval Mode for the Built-in Administrator account (CCE-8811)
    63. User Account Control: Allow UIAccess application to prompt for elevation without using the secure desktop (CCE-9301)
    64. User Account Control: Behavior of the elevation prompt for administrators in Admin Approval Mode (CCE-895:cool:
    65. User Account Control: Behavior of the elevation prompt for standard users (CCE-8813)
    66. User Account Control: Detect application installations and prompt for elevation (CCE-9616)
    67. User Account Control: Only elevate executables that are signed and validated (CCE-9021)
    68. User Account Control: Only elevate UIAccess applications that are installed in secure locations (CCE-9801)
    69. User Account Control: Run all administrators in Admin Approval Mode (CCE-9189)
    70. User Account Control: Switch to the secure desktop when prompting for elevation (CCE-9395)
    71. User Account Control: Virtualize file and registry write failures to per-user locations (CCE-8817)
    72. MSS: (AutoAdminLogon) Enable Automatic Logon (Not Recommended) (CCE-9342)
    73. MSS: (DisableIPSourceRouting) IP source routing protection level (protects against packet spoofing) (CCE-9496)
    74. MSS: (DisableIPSourceRouting IPv6) IP source routing protection level (protects against packet spoofing) (CCE-8655)
    75. MSS: (EnableICMPRedirect) Allow ICMP redirects to override OSPF generated routes (CCE-8513)
    76. MSS: (Hidden) Hide computer from the browse list (Not Recommended except for highly secure environments) (CCE-8560)
    77. MSS: (KeepAliveTime)How often keep-alive packets are sent in milliseconds (CCE-9426)
    78. MSS: (NoDefaultExempt) Enable NoDefaultExempt for IPSec Filtering (recommended) (CCE-9439)
    79. MSS: (NoNameReleaseOnDemand) Allow the computer to ignore NetBIOS name release requests except from WINS servers (CCE-8562)
    80. MSS: (PerformRouterDiscovery) Allow IRDP to detect and configure DefaultGateway addresses (could lead to DoS) (CCE-945:cool:
    81. MSS: (SafeDllSearchMode) Enable Safe DLL search mode (recommended) (CCE-934:cool:
    82. MSS: (ScreenSaverGracePeriod) The time in seconds before the screen saver grace period expires (0 recommended) (CCE-8591)
    83. MSS: (TCPMaxDataRetransmissions) How many times unacknowledged data is retransmitted (3 recommended, 5 is default) (CCE-9456)
    84. MSS: (TcpMaxDataRetransmissions IPv6) How many times unacknowledged data is retransmitted (3 recommended, 5 is default) (CCE-9487)
    85. MSS: (WarningLevel) Percentage threshold for the security event log at which the system will generate a warning (CCE-9501)

    please note: this is only a few..yikes.
    I never knew there was so much more ... have about 40 checks, and the rest x failed. out of 85

    Again, anyone whom knows this app well, please advise.
    :rolleyes:
     
    Last edited by a moderator: Jul 29, 2012
  2. ABee

    ABee Registered Member

    Joined:
    Jun 2, 2010
    Posts:
    330
    You asked Belarc for information, and you got it. ;)

    I've been using Belarc for years. So have many other people. Very useful program.

    My main use for it is simply to check/verify on Microsoft security patches. I've never used the feature you've displayed.
    The Belarc utility only provides information, it's up to you to assess whether or not you want to act upon that information to make any changes to your machine.

    'Rename Administrator account', 'rename Guest account', for example: The Guest account and the hidden Administrator account are simply default names given by the OS, and most people never touch or alter them. So not changing the names or putting any password protection on those accounts means it's going to theoretically be easier for a remote attacker to find his way into your machine.

    Ideally, you should change those names and put a password on the accounts. But not changing them or passwording them doesn't automatically mean it's open season for bad guys to have at your computer. Depends on other factors as well. You have to make an assessment, or not.

    Belarc is a fine utility. But don't get carried away concerning over every little thing it might flag as any sort of potential security risk.
    You can unplug from the wall and your machine will be untouchable by hackers, but that also makes it kind of tough for you to use it as well, know what I mean?

    Belarc says you need to change your online or domain passwords more often. Now it's up to you to decide if you really need to do that, or if that's something you're really not too concerned about. Etc.
     
  3. zpro

    zpro Registered Member

    Joined:
    Mar 4, 2009
    Posts:
    38
    ok, there was allot of other things it found to be open or not closed according to its standard... I got a score of 1.25 out of 10 assuming that not good, and yes all patches are in place, and anti-virus is working..etc all have green but the score security score was low, so I check to see what the program recommend to fix...

    yikes at least 3 - 4 pages of stuff. I was just concern,
    because allot of the information shown, some of it I never known... that could be a issue. That why I ask for someone whom has used the program, and what kinda of security score you gotten.

    I guess if you follow there guide lines, your system would be rock harden..., and thus, we would not allot of the anti-virus, and malware software.

    Cheers
    :doubt:
     
Loading...
Thread Status:
Not open for further replies.