Keeping your system updated is very important to avoid new malwares and to fix vulnerabilities that allow a malicious user have a full control on your system, well I used to enable the automatic update on all Microsoft based systems as we have monthly the patch Tuesday tradition.
Now this seems to be not enough by many security specialist including Microsoft experts, that’s why we have a free security service that are released to make all users updated and if you miss any update you will have the full guidance about how to fix it.
Microsoft Baseline Security Analyzer (MBSA) is a very important component that you can use to check MS based system against latest security updates or even misconfiguration by administrators, after running the program you need to select the computer you are looking to scan this can be by inserting the name or IP address, than you select options for the report including the following:
1. Check windows administrative vulnerabilities
2. Scan for weak passwords
3. Check IIS administrative vulnerabilities
4. Check for SQL administrative vulnerabilities
5. Check for security updates
By default you will have all these options are selected, as you may notice that the tool is dedicated for MS based applications without looking for third parties Apps. My report results are not very good as I found a missed security update so need to fix this. This is the first scan screenshot (click to enlarge):
After I have applied all required patches MBSA turned to green, this mean that all is ok and up to date, this is second screenshot after update (click to enlarge):
As you can see that Microsoft Baseline Security Analyzer (MBSA) is a real addition for your assets so you can scan several MS based component remotely for checking your system with latest security patches. with automatic update you can miss many patches dues to not restarting the system or network problem so MBSA will help you to detect and analyse your computer against latest security measures.
You can have more information and download the tool from here: http://technet.microsoft.com/en-us/security/cc184924