Authenticated Scanning Using SMB: Configuration Guide
Authenticated Scanning Using SMB: Configuration Guide
Version: 1.3
2018-07-27
Copyright
Trademark
Outpost24®, OUTSCAN™, and HIAB™ are trademarks of Outpost24® in Sweden and other
countries.
1 Authenticated Scanning
This guide will provide you with the technical procedure to succeed with authenticated
scanning for Windows targets when using OUTSCAN or HIAB.
This document covers procedure for:
► Windows 7
► Windows 8
► Windows 8.1
► Windows 10
► Windows Server 2008 R2
► Windows Server 2012 R2
► Windows 2016 Server
Note: When performing authenticated scanning against windows hosts, the scanner
creates and starts a service called O24 Auth on the target machine.
This service is used to execute commands on the target and send the results back to the
scanner.
Do not remove the service during scanning, it will stop and remove itself after it is done.
1.1 Windows 7
To succeed with authenticated scanning using SMB for Windows 7 targets, follow the
procedure below.
Caution
The following steps are only applicable for Windows 7 Pro or higher, NOT Windows 7
Home.
To enable Remote Registry (optional, can also be configured within the scanner):
Press the Windows Start Button and open Run Prompt by entering Run in the
search field.
Type services.msc in the Run Prompt and press OK. This will open Services.
Under Services (Local) find Remote Registry >> right click and select Properties.
Note: If Remote Registry is already enabled on your device, go to Step 2.
Figure 3 Network and Sharing Center >> Change Advanced Sharing Settings >> Turn on File and
Printer Sharing
To succeed with the authentication, the account in use needs to either be a Domain User
Account or a local user part of the Administrator Group.
Domain User Account: Make sure that the domain user account is a member of the
Administrators group, this user will run with full administrator access on therefore User
Account Control (UAC) does not need to be disabled.
Local User: Make sure that the local account is included in the Administrators Group:
Access Microsoft Management Console by pressing Windows Start Button and enter
mmc into the search field.
Click Local Users and Groups, located on the left-hand side.
If you cannot see Local Users and Groups, click the File Menu and choose
Add/Remove Snap-in.
Click Local Users and Groups >> Add >> Local Computer >> Finish >> Ok
Enter the Groups folder and double click the Administrators group.
If the account is not listed under Members, click Add >> Enter the name of the
already created account that you wish to add >> click Check Names >> click Ok >>
click Ok
Figure 4 Microsoft Management Console
File >> Add/Remove Snap-In >> Local Users and Groups >> Groups >> Administrator >> Members
Note: The following step are not recommended, if possible use the domain user
account.
Make sure that the Windows User Account Control (UAC) is disabled.
Access the Run Prompt through Windows Start Menu by entering Run into the search field.
Type regedit in the Run Prompt and click OK, this will open the Registry Editor.
Navigate to
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\
system
Right click the System Folder, choose New >> DWORD (32-bit) Value and name
the DWORD LocalAccountTokenFilterPolicy
Right click the newly created DWORD and choose Modify, in the Edit Window set
Value Data to 1.
If User Account Control is disabled, EnableLUA must be set to 0 in
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\
System
To succeed with authenticated scanning using SMB for Windows 8.1 targets, follow the
steps below.
Note: The following steps are only applicable for Windows 8.1 Pro or higher, NOT
Windows 8.1 Home.
To enable Remote Registry (Optional, can also be configured within the scanner):
Click the Windows Start Button and open Run Prompt by entering Run in the search field.
Type services.msc in the Run Prompt and press OK - this will open Services.
Under Services (Local) find Remote Registry >> Right Click and select Properties.
Note: If Remote Registry is already enabled on your device, skip to Step 2.
In Remote Registry Properties (Local Computer), change the Startup Type to
Automatic and start the service.
Figure 7 Network and Sharing Center >> Change Advanced Sharing Settings >> Turn on File
and Printer Sharing
To succeed with the authentication, the account in use needs to either be a Domain User
Account or a local user part of the Administrator Group.
Domain User Account - Make sure that the domain user account is a member of the
Administrators group, this user will run with full administrator access on therefore User
Account Control (UAC) does not need to be disabled.
Local User - To make sure that the local account is included in the Administrators
Group:
Access Microsoft Management Console by pressing Windows Start Button and enter
mmc into the search field.
Click Local Users and Groups on the left-hand side.
If you don’t see Local Users and Groups click the File Menu and choose
Add/Remove Snap-in.
Click Local Users and Groups >> Add.
Click Local Computer >> Finish >> Ok.
Enter the Groups folder and double click the Administrators group. If the account is
not listed under Members, click Add >> Enter the name of the already created
account that you wish to add >> click Check Names >> click Ok >> click Ok.
10
File >> Add/Remove Snap-In >> Local Users and Groups >> Groups >> Administrator
>> Members
Make sure that the Windows User Account Control (UAC) is disabled.
Access the Run Prompt through Windows Start Menu by entering Run into the search field.
Type regedit in the Run Prompt and click OK, this will open the Registry Editor
Navigate to
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\
system.
Right click the System Folder, choose New >> DWORD (32-bit) Value and name the
DWORD LocalAccountTokenFilterPolicy.
Right click the newly created DWORD and choose Modify, in the Edit Window set
Value Data to “1”.
11
12
1.3 Windows 10
To succeed with authenticated scanning using SMB for Windows 10 targets, follow the
steps given below:
Note: The following steps are only applicable for Windows 10 Pro or higher, NOT
Windows 10 Home.
To enable Remote Registry (Optional, can also be configured within the scanner)
Click the Windows Start Button and open Run Prompt by entering Run in the search field..
Type services.msc in the Run Prompt and press OK - this will open Services
Under Services (Local) find Remote Registry >> Right Click and select Properties.
Note: If Remote Registry is already enabled on your device, skip to Step 2
In Remote Registry Properties (Local Computer), change the Startup Type to
Automatic and start the service.
13
Figure 11 Network and Sharing Center >> Change Advanced Sharing Settings >> Turn on
File and Printer Sharing
To succeed with authentication, the account in use needs to either be a Domain User
Account or a local user part of the Administrator Group.
Domain User Account: Make sure that the domain user account is a member of the
Administrators group, this user will run with full administrator access on therefore User
Account Control (UAC) does not need to be disabled.
14
Local User: Make sure that the local account is included in the Administrators Group:
Access Microsoft Management Console by pressing Windows Start Button and enter mmc
into the search field.
Click Local Users and Groups on the left-hand side.
If you don’t see Local Users and Groups click the File Menu and choose
Add/Remove Snap-in.
Click Local Users and Groups >> Add.
Click Local Computer >> Finish >> Ok.
Enter the Groups folder and double click the Administrators group.
If the account is not listed under Members, click Add >> Enter the name of the
already created account that you wish to add >> click Check Names >> click Ok >>
click Ok.
File >> Add/Remove Snap-In >> Local Users and Groups >> Groups >> Administrator >> Members
Note: The following step are not recommended, if possible use the domain user account.
15
Make sure that the Windows User Account Control (UAC) is disabled.
Access the Run Prompt through Windows Start Menu by entering Run into the search field.
Type regedit in the Run Prompt and click OK, this will open the Registry Editor.
Navigate to
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\
system.
Right click the System Folder, choose New >> DWORD (32-bit) Value and name the
DWORD LocalAccountTokenFilterPolicy.
Right click the newly created DWORD and choose Modify, in the Edit Window set
Value Data to 1.
If User Account Control is disabled, EnableLUA must be set to 0 in
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\
System.
To enable Remote Registry (Optional, can also be configured within the scanner)
Press the Windows Start Button and open Run Prompt by entering Run in the search field.
Type services.msc in the Run Prompt and press OK, this will open Services.
Under Services (Local) find Remote Registry >> Right Click and select Properties.
Note: If Remote Registry is already enabled on your device, skip to Step 2
In Remote Registry Properties (Local Computer), change the Startup Type to
Automatic and start the service.
17
Figure 15 Network and Sharing Center >> Change Advanced Sharing Settings >> Turn on
File and Printer Sharing
To succeed with the Authentication, the account in use needs to either be a Domain
User Account or a local user part of the Administrator Group.
Domain User Account - Make sure that the domain user account is a member of the
Administrators group, this user will run with full administrator access on therefore User
Account Control (UAC) does not need to be disabled.
18
Local User - Make sure that the local account is included in the Administrators Group:
Access Microsoft Management Console by pressing Windows Start Button and enter
mmc into the search field.
Click Local Users and Groups on the left-hand side.
If you don’t see Local Users and Groups click the File Menu and choose
Add/Remove Snap-in.
Click Local Users and Groups >> Add.
Click Local Computer >> Finish >> Ok .
Enter the Groups folder and double click the Administrators group .
If the account is not listed under Members, click Add >> Enter the name of the
already created account that you wish to add >> click Check Names >> click Ok >>
click Ok.
File >> Add/Remove Snap-In >> Local Users and Groups >> Groups >>
Administrator >> Members
19
Note: The following step are not recommended, if possible use the domain user account.
Make sure that the Windows User Account Control (UAC) is disabled.
Access the Run Prompt through Windows Start Menu by entering Run in the search field.
Type regedit in the Run Prompt and click OK, this will open the Registry Editor..
Navigate to
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\
system
Right click the System Folder, choose New >> DWORD (32-bit) Value and name the
DWORD LocalAccountTokenFilterPolicy.
Right click the newly created DWORD and choose Modify, in the Edit Window set
Value Data to 1.
If UAC is disabled, EnableLUA must be set to 0 in
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\
System.
20
21
To enable Remote Registry (optional, can also be configured within the scanner)
Access the Run Prompt through Windows Start Menu by entering Run into the search field.
Type services.msc in the Run Prompt and press OK, this will open Services.
Under Services (Local) find Remote Registry >> Right Click and select Properties.
If Remote Registry is already enabled on your device, skip to Step 2.
In Remote Registry Properties (Local Computer) change the Startup Type to
Automatic and start the service.
22
Figure 19 Network and Sharing Center >> Change Advanced Sharing Settings >> Turn on
File and Printer Sharing
To succeed with authentication, the account in use needs to either be a Domain User
Account or a local user part of the Administrator Group.
Domain User Account - Make sure that the domain user account is a member of the
Administrators group, this user will run with full administrator access on therefore User
Account Control (UAC) does not need to be disabled.
23
Local User - Make sure that the local account is included in the Administrators Group:
Access Microsoft Management Console by pressing Windows Start button and enter mmc
into the search field.
Click Local Users and Groups on the left-hand side.
If you don’t see Local Users and Groups click the File Menu and choose
Add/Remove Snap-in.
Click Local Users and Groups >> Add.
Click Local Computer >> Finish >> Ok .
Enter the Groups folder and double click the Administrators group.
If the account is not listed under Members, click Add >> Enter the name of the
already created account that you wish to add >> click Check Names >> click Ok >>
click Ok
File >> Add/Remove Snap-In >> Local Users and Groups >> Groups >> Administrator
>> Members
24
Note: The following step are not recommended, if possible use the domain user account.
25
Step 4
Figure 22 Local Computer Policy >> Computer Configuration >> Administrative Templates >>
Network >> Network Connections >> Windows Firewall >> Standard Profile >> Windows
Firewall: Allow Inbound File and Printer >> Sharing Exception
26
Enable Remote Registry (optional, can also be configured within the scanner)
Press the Windows Start Button and open Run Prompt by entering Run in the search field.
Type services.msc in the Run Prompt and press OK, this will open Services.
Under Services (Local) find Remote Registry >> Right Click and select Properties.
If Remote Registry is already enabled on your device, skip to Step 2.
In Remote Registry Properties (Local Computer) change the Startup Type to
Automatic and start the service.
27
Figure 24 Network and Sharing Center >> Change Advanced Sharing Settings >> Turn on
File and Printer Sharing
To succeed with the authentication, the account in use needs to be either a Domain
User Account or a local user part of the Administrator Group.
Domain User Account - Make sure that the domain user account is a member of the
Administrators group, this user will run with full administrator access on therefore User
Account Control (UAC) does not need to be disabled.
Local User - Make sure that the local account is included in the Administrators Group:
Access Microsoft Management Console by pressing Windows Start Button and enter
mmc into the search field.
Click Local Users and Groups on the left-hand side.
If you don’t see Local Users and Groups click the File Menu and choose
Add/Remove Snap-in.
Click Local Users and Groups >> Add.
Click Local Computer >> Finish >> Ok.
Enter the Groups folder and double click the Administrators group
If the account is not listed under Members, click Add >> Enter the name of the
already created account that you wish to add >> click Check Names >> click Ok >>
click Ok
28
File >> Add/Remove Snap-In >> Local Users and Groups Groups >> Administrator >> Members
Note: The following steps are not recommended, if possible use the domain user
account.
Access the Run Prompt through Windows Start Menu by entering “Run” into the search
field.
Type regedit in the Run Prompt and click OK, this will open the Registry Editor.
Navigate to
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\
system.
Right click the System Folder, choose New >> DWORD (32-bit) Value and name the
DWORD LocalAccountTokenFilterPolicy.
Right click the newly created DWORD and choose Modify, in the Edit Window set
Value Data to 1.
If User Account Control is disabled, EnableLUA must be set to 0 in
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\
System.
29
30
Figure 27 Local Computer Policy >> Computer Configuration >> Administrative Templates >>
Network >> Network Connections >> Windows Firewall >> Standard Profile >> Windows
Firewall: Allow Inbound File and Printer >> Sharing Exception
31
Enable Remote Registry (optional, can also be configured within the scanner)
Start powershell by typing powershell in CMD.
In powershell, write Get-Service RemoteRegistry to verify the status of the service.
If the service is not running, write Run-Service RemoteRegistry.
To set the service to run automatically, write Set-Service RemoteRegistry –
startuptype automatic.
If you wish to view information and status of all your services, write Get-WmiObject
win32_service | Select Name, DisplayName, State, StartMode | Sort Name.
32
For the authentication to succeed the account in use needs to either be the built in
Administrator or a part of the Administrator Group.
Built in Administrator
To active the built-in administrator account:
In CMD Run the command “net user administrator /active: yes”
Local User
Make sure the local account is included in the Administrators Group:
Start powershell by typing powershell in CMD
In powershell, run the command net localgroup administrator to list the uses within
the administrator group
If the user is not included run the command net localgroup administrators
“<username>” /add to add the user
33
34
Figure 28 Options
This action will toggle a new window in which you can navigate to the Authentication
tab. Here you can choose SMB in the drop-down menu and enter the credentials that will
be in use, and also if the scanner is allowed to Enable Remote Registry by checking
the box for this. On the right-hand side of the Credentials Grid there is a Test button,
using this will test the credentials against the target and verify if the authentication was
successful or not.
35
36
This action will toggle a new window where you are allowed to choose SMB in the drop-
down menu and enter the credentials that will be in use for all targets in this group. You
may also decide if the scanner should be allowed to Enable Remote Registry by
checking the box for this. On the right-hand side of the Credentials Grid there is a Test
button, using this will test the credentials against the target and verify if the
authentication was successful or not.
Figure 31 Authentication
37
In the Maintaining Scanning Policy window, there is a SMB tab in which you are
allowed to enter the credentials that will be in use. You may also decide if the scanner is
allowed to Enable Remote Registry by checking the box for this.
Below the credentials grid there is a Test Credentials button, using this against a
provided target will test the credentials and verify if the authentication was successful or
not.
38