The Secunia Corporate Software Inspector (CSI) is an authenticated internal vulnerability scanner, capable of assessing the security state of programs that run on Microsoft Windows, Apple OSX and Red Hat Enterprise Linux (RHEL) computers, enabling you to fix the vulnerabilities before they are actively exploited.
Secunia was founded in 2002 by its current principals. Secunia is a privately held, financially strong, and profitable company with a strong track record. Today the Secunia community includes leading security experts, system and network administrators, and our own website is visited by more than 5 million unique visitors annually. The Secunia CSI has been a leading vulnerability scanner for the Windows environment since the beginning of 2008, and following coverage for Apple OSX and Red Hat Enterprise Linux (RHEL) has been added.
The Secunia CSI is a proactive solution that can be used in addition to firewalls, IDS and other network security systems. It will help you secure and monitor your network against new threats that otherwise are not monitored.
The Secunia CSI is used across multiple segments, including the Fortune 1000, small to medium businesses, consultants and managed service providers. Regardless of the environment, the scalable, secure end-to-end solution is unchanged.
SPS stands for Secunia Package System and offers increased scope and flexibility in terms of patching and configuring hosts. You can customise the language options of packages and thereby patch in multiple languages, or remotely uninstall applications, among many other things.
To scan Apple Mac OS X machines, you need to deploy the Single Host Agent locally on the target system.
The installation can only be done under the MAC Terminal, as the agent will be installed as a daemon (service) under the LocalSystem account.
Installation of Local Services on MAC OS X systems requires root privileges. The ‘root’ account is disabled by default on MAC systems; therefore you need to enable it in order to proceed.
The Secunia CSI Agent for MAC OS X (csia) is a small, simple, customisable and extremely powerful Secunia CSI scan engine that offers a fully featured command line interface (CLI) to the Secunia CSI scanning functionality.
This allows you to run CSI scans directly from the command line, or to launch scans by using the Secunia CSI console.
You can download the agent binary under Scanning > Scanning via Local Agents > Download Local Agents.
Use the database Console page to access Secunia’s SQL database. You can access the content of each table by selecting the table name in the Tables pane. Expand the table name to view the objects and data types within that table.
To create an SQL query, right-click a table and select Show Data to automatically create a SELECT * FROM table query from the specific table. You can also right-click a table and select Schedule Query to create a scheduled export for the table and save the output to a CSV file.
The Details and Results panes display the status of the query.
The Secunia CSI scan consists of 2 parts; the first part is third-party applications that the Secunia CSI scans for, the second part is Microsoft patching status that the Secunia CSI gets from the Windows Update Agent (WUA). If the second part of the scan is not successful you'll get a Partial scan result.
Once the Secunia CSI download has completed, start the installer and then start the product. Provide your user name and password that was given by your Secunia representative. When the installation is complete you can start configuring your scans.
CSI 7.0 requires no installation, just plugin, deamon and agents.
The Secunia CSI is a light weight non-intrusive scanner that has been optimised to give minimum footprint on network utilisation. With guidance from a Secunia Solution Specialist each customer will be trained in how to optimise the scan process according to their network design and capability.
An update of the signature files is always conducted as soon as the Secunia CSI starts a scan. If there is an error in fetching the latest signature files you will be prompted with information about this.
The Secunia CSI scans for third-party applications and Microsoft software to the Windows, Mac OS X and Red Hat Enterprise Linux (RHEL) platforms. Scanning Mac OS X and RHEL is available through agent based scanning (single host agent).
Download the agent from your Secunia CSI console (available from the Download Network Agent menu).
The Secunia CSI Agent is a small, simple, customisable, and extremely powerful scan engine that offers a fully featured command line interface (CLI) to the CSI scanning functionality. This allows you to run CSI scans directly on the command line or to embed the Agent in a customised script. Write "csia.exe -h" for a full list of arguments supported by the CSI Agent.
The most common way to use the agent is in Single Host Mode. Single Host Mode (Install the agent as a local service): csia.exe -i -L
NOTE: The "csia.exe" file is a customised executable, unique and private for your account. This means that the CSI Agent automatically links scans to your Secunia CSI account, without you performing any extra actions.
Since the scan process works by looking at the actual files on the system scanned, the result is extremely reliable as a program obviously cannot be installed on a system without the actual files being present. This in turn means that the Secunia CSI rarely identifies false-positives and thus the result from the Secunia CSI can be used immediately without doing additional data/results mining.
Yes, the Secunia CSI 6.0 introduces a new feature for publishing packages using third-party patch deployment solutions, for example Altiris. In order to support this new feature Secunia has enhanced the package export feature. The exported xml file now contains additional information that can be helpful in creating packages in other tools, including:
Yes. Custom Scan Rules allow you to create and maintain custom rules for scanning customer created programs, drivers, and plugins. Go to Scanning > Filter Scan Results > Custom Scan Rules and click New Custom Scan Rule and enter a Name for the rule and the Filename to scan. You can also click Browse to search for the file you want to add to the rule.
Please note that the file to be scanned must contain valid File Version Information.
You can create and configure Smart Groups to help you prioritize your remediation efforts and stay secure and compliant by allowing you to filter and segment your data.
Go to Results > Smart Groups > Smart Group Configuration and click New Smart Group to configure a new Smart Group which you can base on a variety of criteria, including:
Program Status - End-of-Life, Insecure, Patched
Criticality - Extremely Critical, Highly Critical, and so on
Host Name/Site Name - considered relevant to the Smart Group
SAID Creation Date - for example, to include all Programs that are insecure and with a Secunia Advisory ID that is older than 7 days
Silent Installation - available or not available for a product
Product Name - to manually add products
You can also click Templates in the Configure New Smart Group window to open the Smart Group Example Use Cases window. Select an appropriate use case and click Use Template to populate the Configure New Smart Group window, which you can then edit to match your specific requirements.
You can click Export in any grid view to copy the displayed information to the clipboard or save as a CSV file. The Export feature automatically extracts and transfers data using export schedules (for example, daily) from the Secunia CSI into Security Information and Event Management (SIEM) solutions and reporting tools. The data is exported in CSV format.
The Activity Log window displays information about user activity within the Secunia CSI, for example "write" actions, logins, and so on, with the exception of scans (due to the volume of data generated). You can access a full activity and login log for compliance monitoring and auditing purposes.
Yes. You can view and manage the VIM accounts that have been verified and integrated with the Secunia CSI and create Asset Lists for the integrated VIM accounts. The Asset Lists are updated automatically with the Secunia CSI scan results.
Yes. Use the IP Access Management window set IP Access Rules to configure the IP addresses the Secunia CSI console can be accessed from. Note: you require administrative privileges to use this feature.
The first IP Access Rule you set up must always be a whitelist rule and must include the external (public) IP address of the console you are creating the rule from. If, for example, you check ipconfig you will find the internal IP address, which will not work. You can find your external IP address by using an Internet search engine and typing “find my ip address”.
Ignore Rules – Previously, this feature was used to create and maintain Ignore Rules for excluding specific content from results and reports. The Secunia CSI 7 allows you to create Host and Product Smart Groups that scan and display only the content you specify.
Local Database Console – Previously, this feature was used to create custom SQL queries for the local database in the Secunia CSI and has been replaced with the Reporting > Database Access > Database Console.
Maintenance menu – Previously contained the Permanent Logout and Database Cleanup options and has been removed. A Logout push button has been added to the upper right of the screen and the Database Cleanup option is now located under the Reporting > Database Access > Database Cleanup menu.
Results > Hosts – Previously displayed all the hosts maintained within your account and has been replaced with Host Smart Groups, where you can view the existing configured Host Smart Groups and configure new Smart Groups.
Results > Programs and Operating Systems – Previously displayed a list of all the Programs or Operating Systems found via the CSI scans and has been replaced with Product Smart Groups, where you can view the existing configured Product Smart Groups and configure new Smart Groups.
Results > Secunia Advisories – Previously displayed all advisories relevant to Insecure or End-of-Life products in your environment and has been replaced with Advisory Smart Groups.
Static Dashboard – Previously, for each dashboard profile created, a static URL was automatically created so that the user could use the static URL to view the dashboard on any web browser. The Secunia CSI 7 now uses a browser interface which makes this feature redundant.
Trend Reporting – Previously displayed as part of the Results > Hosts and Results > Sites pages and has been removed as all results are now viewed through Smart Groups.
User Management – Previously, this feature was used by the Secunia CSI main account to create other Secunia CSI accounts. Accounts, Shadow Accounts and Reporting on Sub-accounts and has been replaced with Administration.
Smart Groups have been pre-created for you by Secunia under the Results menu and include Host, Product and Advisory Smart Groups. All Hosts, All Products and All Advisories are the default Smart Groups for each category and cannot be edited or deleted. You can create, view, edit or delete new Smart Groups to match your specific requirements and help you prioritize your remediation efforts - and stay secure and compliant - by allowing you to filter and segment your data. Click Create New Smart Group to configure a new Smart Group. Click Templates to open the Smart Group Example Use Cases page. Select an appropriate use case and click Use Template to populate the Smart Group Overview and Configuration page, which you can then edit to match your specific requirements.
The Secunia CSI will store your credentials after the first login so that you are not prompted for credentials every time you start the solution. If you would like to be prompted for credentials the next time you start the Secunia CSI solution (for example, if you or someone else wants to login to the CSI as a different user or if you want to disallow access to the CSI for someone else using your computer who does not have a valid CSI account) click Logout on the upper right of the screen.
The user can login to the Secunia CSI 7 from any internet browser (SaaS) for instant access to their data and reports - from anywhere, at any time. Please note: For some modules, for example Patching, to work a browser plugin is required and is currently available only for Internet Explorer.
The Secunia Daemon is a stand-alone executable that executes the scanning and import schedules configured in the Secunia CSI 7 console. It runs as a background service with no user interaction. The Secunia Daemon can be downloaded from www.secunia.com. The Secunia Daemon integrates a number of local data sources in the user’s network with the Secunia Cloud. It should be deployed to a node in the network that has high availability (for example, the server running the SCCM or SQL server). Once deployed, the Daemon will regularly scan the data sources, based on the configuration created in the Secunia CSI, for:
Active Directory scanning
SCCM import (SQL + WSUS)
WSUS state change
The Secunia Daemon uses the System Center 2012 Configuration Manager SQL Database Settings that are specified in the Configure dialog. If those settings haven't yet been specified when the Secunia Daemon has been run then it will check for them again in 10 minutes and every 10 minutes afterwards until it gets them. The Secunia Daemon checks with Secunia every 10 minutes to download new schedules or fetch changes to existing schedules as long as it is not in the process of processing scans. The results are displayed in the Secunia CSI Completed Scans page.
To enable Scanning and Patching, the first time the you login to the Secunia CSI 7 you should click the link on the bottom of the page and follow the on-screen instructions to download and install the CSI Plugin. Please note that the plugin is compatible with, and should be run using, the latest version of Internet Explorer. The CSI Plugin is installed locally and must be installed on the machine that you are running the Secunia CSI console from. Once the CSI Plugin has been installed the download link is removed from the page.
Extremely Critical (5 of 5) Typically used for remotely exploitable vulnerabilities that can lead to system compromise. Successful exploitation does not normally require any interaction and exploits are in the wild. These vulnerabilities can exist in services like FTP, HTTP, and SMTP or in certain client systems like email programs or browsers.
Highly Critical (4 of 5) Typically used for remotely exploitable vulnerabilities that can lead to system compromise. Successful exploitation does not normally require any interaction but there are no known exploits available at the time of disclosure. Such vulnerabilities can exist in services like FTP, HTTP, and SMTP or in client systems like email programs or browsers.
Moderately Critical (3 of 5) Typically used for remotely exploitable Denial of Service vulnerabilities against services like FTP, HTTP, and SMTP, and for vulnerabilities that allow system compromises but require user interaction. This rating is also used for vulnerabilities allowing system compromise on LANs in services like SMB, RPC, NFS, LPD and similar services that are not intended for use over the Internet.
Less Critical (2 of 5) Typically used for cross-site scripting vulnerabilities and privilege escalation vulnerabilities. This rating is also used for vulnerabilities allowing exposure of sensitive data to local users.
Not Critical (1 of 5) Typically used for very limited privilege escalation vulnerabilities and locally exploitable Denial of Service vulnerabilities. This rating is also used for non-sensitive system information disclosure vulnerabilities (e.g. remote disclosure of installation path of applications).
The Secunia CSI 5.x and 6.x feature a Local Database Console that allows you to run SQL queries against the local database.
You can easily access all the information that is currently stored in the local database of the Secunia CSI and use it in many different ways, such as creating custom reports or feeding it into other applications.
From the Local Database Console, right-click in a table name to see the data being hold in that table. Type the SQL query under SQLite Query window and click Run.
Use Export to export the data into the Clipboard or into a .CSV file. In the Secunia CSI 6.x you can schedule exports at regular intervals.
CSI 7 (with the SC2012 Plugin) packages download from csi7.dl.secunia.com:443.
Although the console displays dl.secunia.com:80 in the UI, it is transformed to csi7.dl.secunia.com:443 behind the scenes. The port 80 package URL can be copied/downloaded by pasting the URL into a browser. The port 443 package cannot because it requires an extra download token that is used internally by the wizard. It differs from the port 80 package in that it supports customer parameters that the wizard supplies.
Using the Secunia CSI you have access to four different scan approaches:
On Demand Scanning From the CSI GUI you can easily create scan groups manually. The groups can then be configured to do scans based on IP-range, IP- network or Host-name.
CSI Agent – Single Mode The Secunia CSI Agent is a standalone executable file that can run as a local service. The agent can be configured to scan the system at regular intervals.
CSI Agent – Network Appliance Mode If you prefer not to install agents locally on each PC or use login scripts you can use the agent in Appliance Mode. This enables you to schedule scans from the Appliance Mode agent to selected networks. The scan groups base their scans on IP-range, IP-network or Host-name. All administration will be conducted from the Secunia CSI GUI.
SCCM Inventory Import You can connect to your local SCCM server and, if you have inventory features enabled on the SCCM client agent, the Secunia CSI can import it by connecting to your SCCM server.
Yes. The Secunia CSI is designed to integrate with Microsoft WSUS/SCCM to deploy security patches that were found missing from the scan results. The Secunia CSI also provides an SDK, allowing users to integrate with their preferred patch deployment solution, such as for example Altiris Deployment Solution. Through this integration the Secunia CSI allows network administrators to easily handle the entire vulnerability management life cycle.
The number of systems that can be scanned by the Secunia CSI is dependent on the license that you have purchased from Secunia. If you reach your license limit, deleting old systems from the Secunia CSI will release the corresponding number of licenses. If you need additional licenses, please contact your Secunia Sales Representative.
Although login of concurrent sessions is possible, the Secunia CSI is designed to allow only one session per account. If you wish to have several Secunia CSI accounts, please ask your Secunia Sales Representative about the Secunia CSI User Management add-on.
It should be taken into consideration that in order to perform remote scans, the target systems must have the right services and ports enabled. Please refer to the system requirements for Agent-less scans.
By using the Suggest Software feature available in Secunia CSI, you can easily request Secunia to start monitoring the missing software. Requests from our customers are highly appreciated and will be promptly addressed.
In the Internet Options (Control Panel or under Internet Explorer/Tools), verify that https://*.secunia.com/ is present in the Trusted sites. If not, please add it.
If your network connection passes through a proxy that needs authentication, please open a command prompt window, go to the path where the Secunia CSI is installed, and launch Secunia CSI with the following command: csi.exe -x proxy:port If you also need to specify the proxy authentication, launch Secunia CSI with the following command: csi.exe -x proxy:port -U username:password
In order to get a more verbose error message, start Secunia CSI from the command prompt with logging options. csi.exe -d debugfile.txt -v the logging can also be combined with other options, like this: csi.exe -x proxy:port -U username:password -d debugfile.txt -v
The Secunia CSI is designed to use the built-in Windows Update Agent so that it can check for missing patches from Microsoft. If you have a WSUS server in your network, the Secunia CSI can adapt and retrieve the OS results based on the internal WSUS. You can also configure it to check with the official Microsoft Update website.
No. Due to its lightweight design, the Secunia CSI is able to run in the most common Windows systems. For more detailed information, please refer to the system requirements for running the Secunia CSI Centralised Dashboard.
Please login to the Secunia CSI and go to Support > Contact Information to reach the Secunia Customer Support Center. You can also send your question to email@example.com and one of solution specialist would be assigned to you.
One way to change the limit is to run the following script with WSUS_SERVER_NAME, USE_SECURE_CONNECTION, and WANTED_LIMIT set as appropriate. WANTED_LIMIT is in MB and cannot exceed 2047 as this is the upper limit WSUS supports:
In the Secunia CSI 6.x user interface go to Patching > Configuration > WSUS / SCCM, enter the WSUS server name and port and click Save. If it is the first time you connect, a wizard will guide you through the steps needed to create certificates and the GPO settings that enable deployment of third-party patches. You can also refer to our technical user guide which provides step by step instructions on how to connect the Secunia CSI with the WSUS server.
Yes, WSUS is a no-cost download from Microsoft. However, you must have a valid Windows Server 2003 or 2008 license for the WSUS server itself, as well as Windows Client Access Licenses (CALs) for each machine updated by WSUS. Be sure to discuss your unique licensing needs with a Microsoft Partner or your Microsoft Account Representative.
A Secunia CSI wizard will automatically implement the GPO settings, including certificate distribution necessary to deploy third-party applications. Go to the Secunia CSI Patching > WSUS / SCCM Configuration and click Configure Upstream Server.
If you want to do this manually the settings needed are as follows: Enable and Set the following values in: Policies/Administrative Templates/Windows Components/Windows Update
Specify intranet Microsoft update service location (Your WSUS location)
Allow signed updates from an intranet Microsoft update service location
The 'WSUS Publishers Self-signed' -certificate should be copied to:
In the Secunia CSI menu, go to Patch>Deployment>right-click one or several hosts, and select “Verify and Install Certificate”.
CSI 5.0 & CSI 6.0
IMPORTANT! On Windows Vista, 7, 2008 you must run the Secunia CSI as an administrator (right-click and select “Run as administrator”) when pushing out the certificates. Make sure that Remote Registry Service is enabled on client machine.
If you do not want to use the Secunia CSI wizard, you can export the Certificate from the WSUS Server and import it to the target hosts either manually or through a GPO.
Export the certificate. To manually copy the certificate, please do the following:
On the computer where the certificate is to be installed go to: Start > run type in mmc and press enter.
Go to: File > Add/Remove Snap-in > Add > Certificates > Add > Computer Account > Next > Another computer Type the name of the WSUS Server in the text box and click Finish
Close the “Add Standalone Snap-in” dialog box. Now you have a link to certificate stores in the mmc UI. The one referring to the WSUS Server will have a “WSUS” certificate store in its root. Select that and click the certificate.
Right-click the “WSUS Publishers Self-signed” certificate and select: All Tasks > Export.
Choose all the defaults in the “Certificate Export Wizard” and save the file somewhere on your local file system.
Certificate distribution - using GPO The “WSUS Publishers Self-signed” -certificate must be copied to “Trusted Publishers” and “Trusted Root Certification Authorities” on each client computer that will receive packages from the WSUS Server.
Certificate distribution - Manually. If you do not want to use GPO to distribute the certificate, you can manually copy the certificate from the WSUS server to the local computer. This requires local admin rights.
On the computer where the certificate will be installed go to: Start > run type in mmc and press enter.
Go to: File > Add/Remove Snap-in > Add > Certificates > Add > Computer Account > Next > Local computer and click Finish. Close the “Add Standalone Snap-in” dialog box.
Right-click the respective folder for “Trusted Root Certification Authorities” and “Trusted Publishers” and import the certificate that you exported in the previously step. Go to All Tasks > Import Locate the file you created in Step 1 and choose the default options through the “Certificate Import Wizard”. This procedure must be repeated on each computer that will create and publish packages, as well as on each computer that should install the packages.
If you cannot find “Trusted Publishers” on the Windows 2003 server, please do the following:
Open “Group Policy Manager” under Computer Configuration > Windows Settings > Software Restriction Policies
Right-click and create a new SR policy if you haven’t got one already
Under Additional rules, right-click and create new “Certificate rule”.
Click Browse and select the exported certificate that is being used to sign the updates (.cer file). Change the “Security Level” to Unrestricted otherwise you will stop the computers running any programs!
Verify the GPO setting 'Windows Updates/Allow signed updates from an intranet Microsoft update service location' is enabled. In addition, also verify the following on the local host:
Check the registry on the client computer: HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\WindowsUpdateCheck that the key AcceptTrustedPublisherCerts is set to 1 (if not, change it to 1) Perform these commands, and try again. Net stop wuauserv Net start wuauserv wuauclt /detectnow wuauclt /updatenow
Make sure client machine has WSUS Publisher Self Signed certificate present in Trusted Root Certification Authority and Trusted Publishers.
Add https://*.secunia.com to trusted sites in Internet Options > Security > Trusted sites. On Windows 7, Vista, 2008 you need to run Internet Explorer as an administrator (Right-click and select Run as administrator), then go to Tools > Internet Options > Security > Trusted sites and add https://*.secunia.com
Login and go to Configuration > Settings and check the checkbox Enable logging. If you want to start the Secunia CSI in debug-mode, start it from the command prompt with the following command: csi.exe -d debugfile.txt -v
The Secunia CSI does not recognize what language version that is installed. In cases where the Vendor provides different installations based on the language we will provide a link for each language in SPS wizard.
Make sure that you downloaded the CSI Setup file and stored it locally on your system before installing it. If it still gives you this error message, then clear the “Temporary Internet” files for your browser, download the setup file again, and restart the installation process.
The Secunia CSI Agent service will not work when installed into %SystemRoot%\system32 on a 64 bit system. Although the agent may appear to be correctly installed, it will fail to start. Install the agent in a 32bit compliant directory, and the service will start properly.
Because the configuration is stored in the users HKEY_CURRENT_USER\Software\Secunia\csia and that registry hive is not available during the installation of the agent, the installation should be done with the runas.exe thus making sure the registry hive is loaded: runas /user:firstname.lastname@example.org "csia -A -i -R email@example.com"
If you're using Microsoft SCCM, the package created and published with the Secunia CSI will be available in your SCCM console, so it can be managed just like any other update. The package will be available under Computer Management/Software Updates/Update Repository/Security Updates/Vendor, also including the criticality of the vulnerability addressed by that specific update.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.