The OS Vulnerability via XPSs report shows all extended stored procedures that grant non-Administrator users permission to access operating system functions.
Warning
Recommendation
Some extended stored procedures give access to powerful system features. To avoid compromising the system security, review carefully the list of permissions and remove the ones that are not needed.
Any member of the sysadmin always has permission to access these procedures.
Getting Started
Follow these steps to create a report:
- Select the Date, Policy, and Baseline options from the Report Settings box.
- Select a target instance.
- Click the View Report button to generate your report.