MS ¿ø°Ý º¸¾ÈÁ¡°Ëµµ±¸ (Microsoft Baseline Security Analyzer)
½Ã½ºÅÛ °ü¸®ÀÚµéÀÌ
´ç¸éÇÑ °¡Àå Å« ¹®Á¦Á¡Àº °ü¸®ÇØ¾ß ÇÒ ½Ã½ºÅÛÀÇ ¼ö°¡ ¹æ´ëÇÏ´Ù´Â °ÍÀÌ´Ù. ÀÌ·¯ÇÑ ¹®Á¦Á¡À» ÇØ°áÇϱâ À§ÇÏ¿© À©µµ¿ì ¿î¿µÃ¼Á¦¸¦ »ç¿ëÇÏ´Â ¼¹ö(ÀϹÝ
PCµµ »ç¿ë°¡´É)¿¡ ´ëÇÏ¿© ¸¶ÀÌÅ©·Î¼ÒÇÁÆ®¿¡¼ ¹èÆ÷ÇÏ´Â º¸¾ÈÁ¡°Ëµµ±¸(Microsoft Baseline Security Analyzer)ÀÇ »ç¿ëÀ»
±ÇÀåÇÑ´Ù. ÇØ´ç µµ±¸´Â ³×Æ®¿öÅ© »óÀÇ ´Ù¼ö ½Ã½ºÅÛ¿¡ ´ëÇÏ¿© ¿ø°Ý Á¡°Ë°¡´ÉÇϱ⠶§¹®¿¡ ¸Å¿ì À¯¿ëÇÏ´Ù.
°¡. ´Ù¿î·Îµå ¹×
¼³Ä¡
º¸¾ÈÁ¡°Ëµµ±¸´Â ´ÙÀ½ÀÇ ÁÖ¼Ò¿¡¼ ´Ù¿î¹ÞÀ» ¼ö ÀÖ´Ù. <http://support.microsoft.com/kb/914791/ko> »ó´ÜÀÇ
ÁÖ¼Ò·Î Á¢¼ÓÇϸé´Ù¿î·Îµå ¸Þ´º°¡ ³ªÅ¸³´Ù. ´Ù¿î·Îµå ¿Ï·áÈÄ, ´Ù¿î·Îµå ¹ÞÀº¡°MBSASetup-en.msi¡±ÆÄÀÏÀ» ´õºíŬ¸¯ÇÏ¿© ÇØ´ç µµ±¸¸¦
¼³Ä¡ÇÑ´Ù. ¼³Ä¡°¡ ¿Ï·áµÇ¸é ¹ÙÅÁȸ鿡¡°Microsoft Baseline Security Analyzer¡±¾ÆÀÌÄÜÀÌ »ý¼ºµÈ´Ù.
³ª. ½Ã½ºÅÛ Á¡°Ë
MBSA º¸¾Èµµ±¸¸¦ ½ÇÇàÇϸé (±×¸² 4-1-2)¿Í °°Àº ÃʱâȸéÀÌ ³ªÅ¸³ª¸ç,
ÁÂÃøÀÇ ¸Þ´º¿¡¼ ¿øÇÏ´Â ÀÛ¾÷À» ¼±ÅÃÇÒ ¼ö ÀÖÀ¸¸ç, °¢ ¸Þ´ºÀÇ Àǹ̴ [Ç¥ 4-1-1]°ú °°´Ù.
¸Þ´º |
ÀÇ¹Ì |
Welcome |
Ãʱâȸé |
Pick a computer to scan |
´ÜÀÏ ½Ã½ºÅÛÀ» È£½ºÆ®¸íÀ̳ª IPÁÖ¼Ò·Î Áö Á¤ÇÏ¿© Á¡°Ë |
Pick a security report to view |
Á¡°Ë¸®Æ÷Æ® °Ë»ö ¹× ¿¶÷ |
View a security report |
ÃÖ±Ù Á¡°Ë °á°ú È®ÀÎ | [Ç¥ 4-1-1] MBSA ¸Þ´º¼³¸í
MBSA Ãʱâȸé (±×¸² 4-1-2)
½Ã½ºÅÛ Á¡°Ë ÀýÂ÷´Â ´ÙÀ½°ú °°À¸¸ç, (±×¸² 4-1-3)ÀÇ Á¡°ËȸéÀ» ÂüÁ¶ÇÑ´Ù.
¡Ü ÁÂÃøÀÇ ¸Þ´º¿¡¼¡°Pick a
computer to scan¡±À» ¼±ÅÃÇÏ¿© Á¡°ËÇÏ°íÀÚ ÇÏ´Â ½Ã½ºÅÛÀÇ IPÁÖ¼Ò ¶Ç´Â È£½ºÆ®¸íÀ» ÀÔ·ÂÇÑ´Ù ¡Ø È£½ºÆ®¸íÀ» ÀÔ·ÂÇÏ¿© Á¡°ËÇÏ´Â °æ¿ì
ÇÑ±Û È£½ºÆ®¸íÀº ½ÇÇàÀÌ ºÒ°¡´ÉÇÏ´Ù. ¹Ýµå½Ã ¿µ¹® È£½ºÆ®¸íÀ» ÁöÁ¤ÇÏ¿© Á¡°ËÇÑ´Ù. ¡Ü Á¡°Ë°á°úº¸°í¼ ¸íÀ» ¼³Á¤ÇÑ´Ù.
±âº»ÀûÀ¸·Î¡°µµ¸ÞÀθí, È£½ºÆ®¸í(Á¡°ËÀϽÃ)¡±ÀÇ Çü½ÄÀ¸·Î Ç¥ ½ÃµÈ´Ù. ¡Ü °¢ ½Ã½ºÅÛ¿¡ ÇØ´çÇÏ´Â Á¡°Ë¿É¼ÇÀ» ¼³Á¤ÇÑ´Ù. Á¡°Ë¿É¼ÇÀº [Ç¥
4-1-2]¿Í °°À¸¸ç, ÇØ´ç ½Ã½ºÅÛ¿¡ ´ëÇÑ Á¤º¸°¡ ºÎÁ·ÇÑ °æ¿ì ¸ðµç ¿É¼ÇÀ» »ç¿ëÇÏ¿© Á¡°ËÇÒ °ÍÀ» ±ÇÀåÇÑ´Ù. ¡Ü ÃÖÇÏ´ÜÀÇ¡°Start
Scan¡±À» Ŭ¸¯ÇÏ¿© Á¡°ËÀ» ½ÃÀÛÇÑ´Ù.
MBSA Á¡°Ëȸé (±×¸²
4-1-3)
MBSA ½ÇÇà½Ã Á¡°ËÇ׸ñÀ» ¸¶ÀÌÅ©·Î¼ÒÇÁÆ®·ÎºÎÅÍ ´Ù¿î·Îµå(XMLÇü½Ä) ¹Þ¾Æ °»½ÅÇϹǷΠÁ¡°Ë Ç׸ñÀÇ ¾÷µ¥ÀÌÆ®´Â °í·ÁÇÏÁö
¾Ê¾Æµµ µÈ´Ù.
Á¡°ËÇ׸ñ(¿É¼Ç) |
ÀÇ¹Ì |
Check for Windows vulnerabilities |
À©µµ¿ì Ãë¾àÁ¡ Ç׸ñ Á¡°Ë (Çʼö) |
Check for weak passwords |
½Ã½ºÅÛ »óÀÇ ¸ðµç °èÁ¤ Áß Ãë¾àÇÑ ºñ¹Ð ¹øÈ£ Á¡°Ë |
Check for IIS vulnerabilities |
IIS¼¹ö Ãë¾àÁ¡ Á¡°Ë (IIS¼³Ä¡ ½Ã½ºÅÛ ´ë»ó) |
Check for SQL vulnerabilities |
SQL¼¹ö Ãë¾àÁ¡ Á¡°Ë (SQL¼¹ö ¼³Ä¡ ½Ã½ºÅÛ ´ë»ó) |
Check for Security updates |
º¸¾È ¾÷µ¥ÀÌÆ® Á¡°Ë (Çʼö) | ´Ù¼öÀÇ ½Ã½ºÅÛÀ» Á¡°ËÇÏ°íÀÚ¡°Pick multiple
computers to scan¡±¸Þ´º¸¦ ÀÌ¿ëÇÏ¸é µµ¸ÞÀÎ ¸í ¶Ç´Â IP¿µ¿ªÀ» ÀÔ·ÂÇÒ ¼ö ÀÖÀ¸¸ç, Á¡°Ë ¿É¼Ç ¹× ½ÇÇà ¹æ¹ýÀº
µ¿ÀÏÇÏ´Ù.
´Ù. Á¡°Ë°á°ú È®ÀÎ ¹× Á¶Ä¡
½Ã½ºÅÛ Á¡°ËÀÌ ¿Ï·áµÇ¸é ÇØ´ç Á¡°Ë°á°ú¿¡ ´ëÇÑ º¸°í¼°¡ ³ªÅ¸³ª¸ç,
ÀÌ´Â Â÷ÈÄ¿¡µµ Á¶È¸ °¡´ÉÇÏ´Ù. Á¡°Ë°á°ú º¸°í¼´Â (±×¸² 4-1-4)¿Í °°ÀÌ ³ªÅ¸³´Ù.
MBSA Á¡°Ë°á°ú ȸé (±×¸²
4-1-4)
°á°úº¸°í¼ »ó´ÜÀº ´ë»ó ½Ã½ºÅÛ(È£½ºÆ®¸í, IPÁÖ¼Ò) ¹× Á¡°ËÀϽà µî¿¡ ´ëÇÑ Á¤º¸¸¦ Ç¥½ÃÇÏ¿© ÁÖ¸ç, MBSA µµ±¸ÀÇ ¹öÀü
¹× Á¡°ËÇ׸ñ µ¥ÀÌÅͺ£À̽º ¹öÀü µîµµ ¸í½ÃÇÑ´Ù. ÇÏ´Ü ºÎºÐ¿¡¼´Â Á¡°ËÇ׸ñ ÆÐÄ¡ ¿©ºÎ µî¿¡ ´ëÇÏ¿© ±âÈ£·Î Ç¥½ÃÇÏ¿© ÁÖ¸ç, ÆÐÄ¡°¡ ¼³Ä¡µÇÁö ¾ÊÀº
°æ¿ì¿¡´Â Ȳ»ö ¡¿Ç¥, Á¤»óÀûÀ¸·Î ÆÐÄ¡°¡ ¼³Ä¡µÈ °æ¿ì ³ì»ö ¡ýÇ¥·Î Ç¥½ÃÇÑ´Ù. Á¡°Ëº¸°í¼´Â ÁÂÃø ÇÏ´ÜÀÇ¡°Print¡±¸Þ´º¸¦ ÅëÇÏ¿© ÀμⰡ
°¡´ÉÇϸç,¡° Copy¡±¸Þ´º¸¦ ÀÌ¿ëÇÏ¿© ´Ù¸¥ ÇüÅÂÀÇ º¸°í¼·Î ÆíÁýÀÌ °¡´ÉÇÏ¿© ¸Å¿ì À¯¿ëÇÏ´Ù.Á¡°ËµÈ °á°ú¿¡ ´ëÇÑ ¼¼ºÎ³»¿ëÀº °¢ Ç׸ñ¿¡ ´ëÇÏ¿© ¸µÅ©°¡
µÇ¾î ÀÖÀ¸¸ç, ÆÐÄ¡°¡ Àû¿ëµÇÁö ¾ÊÀº Ç׸ñ¿¡ ´ëÇؼ´Â Ãë¾àÁ¡ ¹× º¸¾È °áÇÔÀ» ¼öÁ¤ÇÒ ¼ö ÀÖµµ·Ï ÇÖÇȽº ¹øÈ£ ¶Ç´Â ¼ºñ½º ÆÑ ¹öÀü ¹× ´Ù¿î·Îµå
¸µÅ©¸¦ Á¦½ÃÇÑ´Ù.
Ãâó -Çѱ¹Á¤º¸º¸È£ÁøÈï¿ø »çÀ̹ö¾ÈÀü¸Þ´º¾ó Áß
|
|