Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 5 Current »

Overview

This guide will walk through remotely scanning a domain-joined Microsoft SQL Database using CIS-CAT Pro Assessor v4 GUI. If the Database is not domain joined, please see the this guide: https://cisecurity.atlassian.net/l/cp/cgtfNpKt

Requirements

  • Windows target machine hosting the SQL server is domain-joined

  • SQL Authentication Mode is set to Mixed Mode (SQL and Windows Authentication)

  • User conducting scan has sysadmin permissions

Implementation Steps

Open the GUI

Select Advanced → Add remote or local target system

Fill out the appropriate information as shown below:

Scroll down and add the Benchmark. Once you select the Benchmark and press ‘Add’ you will be prompted for the JDBC string:

An example connection string could look like below:

jdbc:sqlserver://CIS-SERVER:1433;integratedSecurity=true;

Once the JDBC string is built and the Test Connection is successful, select OK

Select ‘Save’ on the bottom right to move to the Target Systems page

Select ‘Next’ on the bottom right to move to the final page

On the final page, select the reporting options and logging level:

Once the options are configured to your liking, select next and the scan will begin

Troubleshooting Steps

If the scan is unsuccessful, check the SQL logs for a ’Login failed for user' message that matches the username in your JDBC string. Here’s a way to get SQL logs: https://docs.microsoft.com/en-us/sql/relational-databases/performance/view-the-sql-server-error-log-sql-server-management-studio?view=sql-server-ver15

Check that the WinRM connection is properly configured: WinRM troubleshooting for remote CIS-CAT Pro assessment of a Windows target system

See the this section of the documentation for more information on JDBC string structure: https://ccpa-docs.readthedocs.io/en/latest/Configuration%20Guide/#database-assessment


Copyright © 2022 Center for Internet Security® Privacy Policy


  • No labels