Verify target configuration / access for authenticated (LSC) scans


When doing Authenticated Scans specific requirements on target systems with Linux/UNIX or Windows needs to be fulfilled.

If the requirements are not fulfilled the detection of installed software and possible existing vulnerabilities might fail. To help with such situations (if the Credentials are configured) a “Log” entry of the one of the following two NVTs (depending on the target) will provide various information within a report:

SSH: SSH Authenticated Scan Info Consolidation (OID:

SMB/Windows: Windows LSC Authenticated Scan Info Consolidation (OID:

No way to get any result/report from target host
Testing individual vulnerability tests
Inconsistent results when scanning Windows