Access Denied: Making MBSA Ignore Patches to Disabled Services

Prevent updates for disabled services and features from generating false positives on MBSA reports.

ITPro Today

December 14, 2003

1 Min Read
ITPro Today logo in a gray background | ITPro Today

Because we disable unneeded services and features, we don't install patches that address vulnerabilities in those features and services. We run Microsoft Baseline Security Analyzer (MBSA) against our network to identify systems that fall through the cracks and are missing updates. However, on the vulnerability report for each computer, MBSA reports as false positives all the patches that we've determined are unnecessary. How can we configure MBSA to ignore patches we choose not to install?

If you deploy your patches through Microsoft Software Update Services (SUS), you can configure MBSA 1.1 and later to prevent those false positives. On the MBSA Pick multiple computers to scan page, select the Use SUS Server check box and specify the address of your SUS server, as Figure 1 shows. When MBSA scans for missing updates, it will look only for updates that are approved on your SUS server and will report only the missing patches that you need.

Sign up for the ITPro Today newsletter
Stay on top of the IT universe with commentary, news analysis, how-to's, and tips delivered to your inbox daily.

You May Also Like