| Tenable PluginID | CVE | Description | Language | Link |
|---|---|---|---|---|
| N/A | N/A | Windows OS Updates - Re-enable Automatic Updates | Shell | View Remediation |
| N/A | N/A | Guest Account Group Membership - Remove from Administrators & Disable | Shell | View Remediation |
| 56710 | N/A | Wireshark / Ethereal Unsupported Version Detection - Force Remove | PowerShell | View Remediation |
| 57608 | N/A | SMB Signing Not Required - Re-enable SMB Signing | PowerShell | View Remediation |
| 58453 | N/A | Terminal Services Doesn't Use Network Level Authentication (NLA) Only | PowerShell | View Remediation |
| 63478 | N/A | Microsoft Windows LM / NTLMv1 Authentication Enabled | Shell | View Remediation |
Run in Command Prompt (Admin):
reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /v ScheduledInstallDay /t REG_DWORD /d 0 /f; reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /v NoAutoUpdate /t REG_DWORD /d 0 /f; reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU" /v AUOptions /t REG_DWORD /d 4 /fVerify with:
reg query "HKLM\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdate\AU"Run in Command Prompt (Admin) one at a time:
net localgroup Administrators Guest /deletenet user Guest /active:noPowerShell script: wireshark-winpcap-force-remove.ps1
Run directly as Administrator:
Invoke-WebRequest -Uri "https://raw.githubusercontent.com/kenbananola/ken-remediation-scripts/main/wireshark-winpcap-force-remove.ps1" -OutFile "$env:TEMP\wireshark-remove.ps1"; PowerShell -ExecutionPolicy Bypass -File "$env:TEMP\wireshark-remove.ps1"Run in PowerShell (Admin):
Set-SmbServerConfiguration -RequireSecuritySignature $true -EnableSecuritySignature $true -ForceVerify with:
Get-SmbServerConfiguration | Select RequireSecuritySignature, EnableSecuritySignatureBoth values should return True.
Run in PowerShell (Admin):
Set-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" -Name "UserAuthentication" -Value 1 -ForceVerify with:
Get-ItemProperty -Path "HKLM:\SYSTEM\CurrentControlSet\Control\Terminal Server\WinStations\RDP-Tcp" -Name "UserAuthentication"UserAuthentication should return 1.
Run in Command Prompt (Admin):
reg add "HKLM\SYSTEM\CurrentControlSet\Control\Lsa" /v LmCompatibilityLevel /t REG_DWORD /d 5 /fVerify with:
reg query "HKLM\SYSTEM\CurrentControlSet\Control\Lsa" /v LmCompatibilityLevelIt should return 0x5.