Windows scan with Domain User
Any user or admin can be used to perform an authenticated scan. More permissions means more information which can be gathered. However, this may complicate security.
This instruction guides you in creating an user with permissions to perform an authenticated scan with security in mind.
Create Security Group
Add a new group in your Active Directory named "SecurityHive Vulnerability Scan".
Select the following values:
Scope: Global
Type: Security
Add the account you would like to use to the SecurityHive Vulnerability Scan group.
Create Group Policy
Create a new Group Policy Object named "SecurityHive Vulnerability GPO".
Add group to GPO
Right-click on SecurityHive Vulnerability GPO and select Edit.
Expand Computer configuration > Policies > Windows Settings > Security Settings > Restricted Groups.
Add a group by browsing and entering "SecurityHive Vulnerability Scan".
Click Check Names and continue.
Add the Administrators group to "This group is a member of:" and click OK.
Allow WMI
Right-click SecurityHive Vulnerability GPO and click Edit.
Expand Computer configuration > Policies > Windows Settings > Security Settings > Windows Firewall with Advanced Security > Windows Firewall with Advanced Security > Inbound Rules.
Add a new rule with the "Predefined" option and select "Windows Management Instrumentation (WMI)" and click Next.
Select the following boxes:
Windows Management Instrumentation (ASync-In)
Windows Management Instrumentation (WMI-In)
Windows Management Instrumentation (DCOM-In)
Click Next and Finish.
Link GPO
Right-click the domain or OU and select "Link an Existing GPO". Select the SecurityHive Vulnerability GPO.
Configure Windows
Under Windows Firewall > Windows Firewall Settings, enable File and Printer Sharing.
Use gpedit.msc to start the GPO Editor. Open Local Computer Policy > Administrative Templates > Network > Network Connections > Windows Firewall > Standard Profile > Windows Firewall : Allow Inbound file and printer exception, and enable it.
Navigate to Local Computer Policy > Administrative Templates > Network > Network Connections > Prohobit use of Internet connection firewall on your DNS domain and make sure it is set to either Disabled or Not Configured.
The Remote Registry service must be enabled (it's disabled by default). With the appropriate permissions, SecurityHive's Vulnerability Scan will try to start it while scanning.
Linux/Unix via SSH
A normal user is usually enough to perform an Authenticated Scan. The login is performed via SSH. This can be done either with passwords or a SSH key. The more permissions a user has, the more results and settings can be detected. In some cases root user access may be required.