vulnerability

Scanning Diagnostics: Failed to enable Windows Services

Severity
1
CVSS
(AV:L/AC:H/Au:M/C:N/I:N/A:N)
Published
2021-11-02
Added
2021-11-02
Modified
2021-11-02

Description


The following information is for Scan Diagnostic purposes only, and is not indicative of a detected vulnerability.



The template is configured to Enable Windows Services, but the scan engine failed to do this. This is likely due to the provided credentials lacking the required permissions to remotely enable services.




Windows Registry access is critical to accurate Vulnerability and Policy scans. The registry contains information that is used to detect software, services and vulnerabilities. It is also used to ascertain certain configuration options that are required for policy assessments.

Solution(s)

rapid7-diagnostics-enable-windows-services-permissionsrapid7-diagnostics-enable-remote-registryrapid7-diagnostics-configure-wmi-for-registry-access

References

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.