diff --git a/infection_monkey/config.py b/infection_monkey/config.py
index 3472c63a8..6a01a7e29 100644
--- a/infection_monkey/config.py
+++ b/infection_monkey/config.py
@@ -146,7 +146,7 @@ class Configuration(object):
     max_iterations = 1
 
     scanner_class = TcpScanner
-    finger_classes = [SMBFinger, SSHFinger, PingScanner, HTTPFinger, MySQLFinger, ElasticFinger]
+    finger_classes = [SMBFinger, SSHFinger, PingScanner, HTTPFinger, MySQLFinger, ElasticFinger, MSSQLFinger]
     exploiter_classes = [SmbExploiter, WmiExploiter,  # Windows exploits
                          SSHExploiter, ShellShockExploiter, SambaCryExploiter,  # Linux
                          ElasticGroovyExploiter,  # multi
diff --git a/infection_monkey/network/mssql_fingerprint.py b/infection_monkey/network/mssql_fingerprint.py
index 70f4f2369..9409c2255 100644
--- a/infection_monkey/network/mssql_fingerprint.py
+++ b/infection_monkey/network/mssql_fingerprint.py
@@ -50,15 +50,17 @@ class MSSQLFinger(HostFinger):
             sock.sendto(message, server_address)
             data, server = sock.recvfrom(self.BUFFER_SIZE)
         except socket.timeout:
-            LOG.error('Socket timeout reached, maybe browser service on host: {0} doesnt exist'.format(host))
+            LOG.info('Socket timeout reached, maybe browser service on host: {0} doesnt exist'.format(host))
             sock.close()
             return False
 
         host.services[self.SERVICE_NAME] = {}
 
         # Loop through the server data
-        for server in data[3:].decode().split(';;'):
-            instance_info = server.split(';')
+        instances_list = data[3:].decode().split(';;')
+        LOG.info('{0} MSSQL instances found'.format(len(instances_list)))
+        for instance in instances_list:
+            instance_info = instance.split(';')
             if len(instance_info) > 1:
                 host.services[self.SERVICE_NAME][instance_info[1]] = {}
                 for i in range(1, len(instance_info), 2):