Nessus 8 7 PDF
Nessus 8 7 PDF
Nessus 8 7 PDF
x User Guide
Navigate Nessus 17
System Requirements 18
Hardware Requirements 19
Software Requirements 22
Licensing Requirements 26
Deployment Considerations 27
Host-Based Firewalls 28
IPv6 Support 29
Virtual Machines 30
Antivirus Software 31
Security Warnings 32
Add a Root CA 39
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Install Nessus and Nessus Agents 46
Download Nessus 47
Install Nessus 49
Upgrade Nessus 69
Configure Nessus 75
Link to Tenable.io 78
Managed by Tenable.sc 84
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Manage Activation Code 86
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Scans 118
Credentials 160
Database 165
Host 169
SNMPv3 170
SSH 171
Windows 181
Miscellaneous 190
Mobile 194
Compliance 208
Plugins 212
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Configure Dynamic Plugins 213
Dashboard 237
Vulnerabilities 239
Live Results 246
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Scan Exports and Reports 250
Policies 261
Scanners 277
Agents 283
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Modify Agent Settings 285
Clustering 302
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Settings Page 316
About 317
Custom CA 360
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Notifications 369
Accounts 372
My Account 373
Users 376
Nessus-Service 391
Nessuscli 394
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Default Data Directories 406
Prerequisites 419
Prerequisites 425
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Welcome to Nessus 8.7.x
Nessus Solutions
Tenable.io
Tenable.io is a subscription based license and is available at the Tenable Store.
Tenable.io enables security and audit teams to share multiple Nessus scanners, scan schedules, scan
policies and most importantly scan results among an unlimited set of users or groups.
By making different resources available for sharing among users and groups, Tenable.io allows for
endless possibilities for creating highly customized work flows for your vulnerability management pro-
gram, regardless of locations, complexity, or any of the numerous regulatory or compliance drivers
that demand keeping your business secure.
In addition, Tenable.io can control multiple Nessus scanners, schedule scans, push policies and view
scan findings—all from the cloud, enabling the deployment of Nessus scanners throughout your net-
work to multiple physical locations, or even public or private clouds.
l Up to 2 quarterly report submissions for PCI ASV validation through Tenable, Inc..
l 24/7 access to the Tenable, Inc. Support Portal for Nessus knowledge base and support ticket
creation
Nessus Professional
Nessus Professional, the industry’s most widely deployed vulnerability assessment solution helps you
reduce your organization’s attack surface and ensure compliance. Nessus features high-speed asset
discovery, configuration auditing, target profiling, malware detection, sensitive data discovery, and
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 12 -
respective owners.
more.
Nessus supports more technologies than competitive solutions, scanning operating systems, network
devices, hypervisors, databases, web servers, and critical infrastructure for vulnerabilities, threats, and
compliance violations.
With the world’s largest continuously-updated library of vulnerability and configuration checks, and
the support of Tenable, Inc.’s expert vulnerability research team, Nessus sets the standard for vul-
nerability scanning speed and accuracy.
Nessus Agents
Nessus Agents, available with Tenable.io and Nessus Manager, increase scan flexibility by making it
easy to scan assets without needing ongoing host credentials or assets that are offline, as well as
enable large-scale concurrent scanning with little network impact.
Nessus Agents are lightweight, low-footprint programs that you install locally on hosts to supplement
traditional network-based scanning or to provide visibility into gaps that are missed by traditional
scanning. Nessus Agents collect vulnerability, compliance, and system data, and report that inform-
ation back to a manager for analysis. With Nessus Agents, you extend scan flexibility and coverage. You
can scan hosts without using credentials, as well as offline assets and endpoints that intermittently
connect to the internet. You can also run large-scale concurrent agent scans with little network impact.
Nessus Agents help you address the challenges of traditional network-based scanning, specifically for
the assets where it's impossible or nearly impossible to consistently collect information about your
organization's security posture. Traditional scanning typically occurs at selected intervals or during des-
ignated windows and requires systems to be accessible when a scan is executed. If laptops or other
transient devices are not accessible when a scan is executed, they are excluded from the scan, leaving
you blind to vulnerabilities on those devices. Nessus Agents help reduce your organization’s attack sur-
face by scanning assets that are off the network or powered-down during scheduled assessments or
by scanning other difficult-to-scan assets.
Once installed on servers, portable devices, or other assets found in today’s complex IT environments,
Nessus Agents identify vulnerabilities, policy violations, misconfigurations, and malware on the hosts
where they are installed and report results back to the managing product. You can manage Nessus
Agents with Nessus Manager or Tenable.io (including Tenable.io on-prem).
Nessus Manager
Note: Nessus Manager is no longer sold as of February 1, 2018. For existing standalone Nessus Manager
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 13 -
respective owners.
customers, service will continue to be provided through the duration of your contract. Nessus Manager
will continue to be supported and provisioned for the purposes of managing agents.
Nessus Manager combines the powerful detection, scanning, and auditing features of Nessus, the
world’s most widely deployed vulnerability scanner, with extensive management and collaboration
functions to reduce your attack surface.
Nessus Manager enables the sharing of resources including Nessus scanners, scan schedules, policies,
and scan results among multiple users or groups. Users can engage and share resources and respons-
ibilities with their co-workers; system owners, internal auditors, risk and compliance personnel, IT
administrators, network admins and security analysts. These collaborative features reduce the time
and cost of security scanning and compliance auditing by streamlining scanning, malware and mis-
configuration discovery, and remediation.
Nessus Manager protects physical, virtual, mobile and cloud environments. Nessus Manager is avail-
able for on-premises deployment or from the cloud, as Tenable.io. Nessus Manager supports the
widest range of systems, devices and assets, and with both agent-less and Nessus Agent deployment
options, easily extends to mobile, transient and other hard-to-reach environments.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 14 -
respective owners.
Get Started with Nessus
Prepare
l Ensure that your setup meets the minimum system requirements:
l Hardware Requirements
l Software Requirements
2. Create a scan.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 15 -
respective owners.
4. Configure the scan:
l Configure the scan settings available for your template.
l (Optional) If you are running a compliance scan, select the compliance audits your scan
includes.
l (Optional) If you are using an advanced scan template, select what plugins your scan
includes.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 16 -
respective owners.
Navigate Nessus
The top navigation bar displays links to the two main pages: Scans and Settings. You can perform all
Nessus primary tasks using these two pages. Click a page name to open the corresponding page.
Item Description
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 17 -
respective owners.
System Requirements
This section includes information related to the requirements necessary to install Nessus and Nessus
Agents.
l Hardware Requirements
l Software Requirements
l Licensing Requirements
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 18 -
respective owners.
Hardware Requirements
Enterprise networks can vary in performance, capacity, protocols, and overall activity. Resource
requirements to consider for Nessus deployments include raw network speed, the size of the network
being monitored, and the configuration of Nessus.
Note: The following recommendations are guidelines for the minimum hardware allocations. Certain
types of scans are more resource intensive. If you run complex scans, especially those with credentials,
you may require additional disk space, memory, and processing power.
Storage Requirements
You must install Nessus on direct-attached storage (DAS) devices. Nessus does not support storage
area networks (SANs) or network-attached storage (NAS) configurations.
Disk space: 30 GB
Nessus Manager
The following table lists the hardware requirements for Nessus Manager.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 19 -
respective owners.
Scenario Minimum Recommended Hardware
Virtual Machine
Nessus can be installed on a Virtual Machine that meets the same requirements. If your virtual
machine is using Network Address Translation (NAT) to reach the network, many of the Nessus vul-
nerability checks, host enumeration, and operating system identification are negatively affected.
Nessus Agents
Nessus Agents are designed to be lightweight and to use only minimal system resources. Generally, a
Nessus Agent uses 40 MB of RAM (all pageable). A Nessus Agent uses almost no CPU while idle, but is
designed to use up to 100% of CPU when available during jobs.
For more information on Nessus Agent resource usage, see Agent Software Footprint and Agent
Host System Utilization.
The following table outlines the minimum recommended hardware for operating a Nessus Agent. Nes-
sus Agents can be installed on a virtual machine that meets the same requirements specified.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 20 -
respective owners.
Hardware Minimum Requirement
RAM < 1 GB
Note: You can control the priority of the Nessus Agent relative to the priority of other tasks running on
the system. For more information see Agent CPU Resource Control in the Nessus Agent Deployment
and User Guide.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 21 -
respective owners.
Software Requirements
Operating
Supported Versions
System
32-bit l Debian 7, Debian 8, and Debian 9 / Kali Linux 1, 2017.1, and Rolling
Linux
l Red Hat ES 6, CentOS 6, Oracle Linux 6 (including Unbreakable Enterprise Ker-
nel)
64-bit Win- l Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Win-
dows dows Server 2012 R2, Windows Server 2016
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 22 -
respective owners.
Operating
Supported Versions
System
Tip: Windows Server 2008 R2’s bundled version of Microsoft IE does not interface
with a Java installation properly. This causes Nessus to not perform as expected in
some situations: Microsoft’s policy recommends not using MSIE on server operating
systems.
For increased performance and scan reliability when installing on a Windows plat-
form, Tenable highly recommends that Nessus be installed on a server product from
the Microsoft Windows family such as Windows Server 2008 R2.
Nessus Agents
See the following table to understand the software requirements for Nessus agents.
Operating
Supported Versions
System
l SUSE 11 Enterprise
l Ubuntu 9.10, Ubuntu 10.04, Ubuntu 11.04, Ubuntu 11.10, Ubuntu 12.04, Ubuntu
12.10, Ubuntu 13.04, Ubuntu 13.10, Ubuntu 14.04, Ubuntu 16.04, and Ubuntu
17.10
64-bit l Amazon Linux 2015.03, Amazon Linux 2015.09, Amazon Linux 2017.09, and
Linux Amazon Linux 2018.03
l Fedora 20, Fedora 21, Fedora 24, Fedora 25, Fedora 26, and Fedora 27
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 23 -
respective owners.
Operating
Supported Versions
System
l Ubuntu 9.10, Ubuntu 10.04, Ubuntu 11.04, Ubuntu 11.10, Ubuntu 12.04, Ubuntu
12.10, Ubuntu 13.04, Ubuntu 13.10, Ubuntu 14.04, Ubuntu 16.04, and Ubuntu
17.10
64-bit Win- l Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Win-
dows dows Server Server 2012 R2, Windows Server 2016, Windows Server 2019
Note: For Nessus 7.0 and later, you must enable Transport Layer Security (TLS) 1.2 in your browser.
PDF Report Requirements
The Nessus .pdf report generation feature requires the latest version of Oracle Java or OpenJDK.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 24 -
respective owners.
Install Oracle Java or OpenJDK prior to installing Nessus.
Note: If you install Oracle Java or OpenJDK after you install Nessus, you must reinstall Nessus to
enable PDF report generation.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 25 -
respective owners.
Licensing Requirements
It is recommended that you obtain the Activation Code before starting the installation process, as it is
required before you can set up Nessus.
l is a one-time code, unless your license or subscription changes, at which point a new activation
code will be issued to you.
Note: For more information about managing Nessus offline, refer to the Nessus User Guide.
You may purchase a Nessus subscription through the Tenable, Inc. online store at https://store.ten-
able.com/ or via a purchase order through Authorized Nessus Partners. You will then receive an
Activation Code from Tenable, Inc.. This code will be used when configuring your copy of Nessus for
updates.
Note: See the Obtain an Activation Code page to obtain an Activation Code.
If you are using Tenable.sc to manage your Nessus scanners, the Activation Code and plugin updates
are managed from Tenable.sc. You must start Nessus before it communicates with Tenable.sc, which it
normally does not do without a valid Activation Code and plugins. To have Nessus ignore this require-
ment and start (so that it can get the information from Tenable.sc), when you register your scanner,
select Managed by SecurityCenter.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 26 -
respective owners.
Deployment Considerations
When deploying Nessus, knowledge of routing, filters, and firewall policies is often helpful. Deploying
behind a NAT device is not desirable unless it is scanning the internal network. Any time a vulnerability
scan flows through a NAT device or application proxy of some sort, the check can be distorted and a
false positive or negative can result.
In addition, if the system running Nessus has personal or desktop firewalls in place, these tools can
drastically limit the effectiveness of a remote vulnerability scan. Host-based firewalls can interfere with
network vulnerability scanning. Depending on your firewall’s configuration, it may prevent, distort, or
hide the probes of a Nessus scan.
Certain network devices that perform stateful inspection, such as firewalls, load balancers, and Intru-
sion Detection/Prevention Systems, may react negatively when a scan is conducted through them. Nes-
sus has a number of tuning options that can help reduce the impact of scanning through such devices,
but the best method to avoid the problems inherent in scanning through such network devices is to
perform a credentialed scan.
If you configure Nessus Manager for agent management, Tenable does not recommend using Nessus
Manager as a local scanner. For example, do not configure Tenable.sc scan zones to include Nessus
Manager and avoid running network-based scans directly from Nessus Manager. These configurations
can negatively impact agent scan performance.
l Host-Based Firewalls
l IPv6 Support
l Virtual Machines
l Antivirus Software
l Security Warnings
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 27 -
respective owners.
Host-Based Firewalls
Port 8834
The Nessus user interface uses port 8834. If not already open, open port 8834 by consulting your fire-
wall vendor's documentation for configuration instructions.
Allow Connections
If your Nessus server is configured on a host with 3rd-party firewall such as ZoneAlarm or Windows
firewall, you must configure it to allow connections from the IP addresses of the clients using Nessus.
To open the ports required for Nessus, use the following commands:
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 28 -
respective owners.
IPv6 Support
Nessus supports scanning of IPv6 based resources. Many operating systems and devices ship with IPv6
support enabled by default. To perform scans against IPv6 resources, at least one IPv6 interface must
be configured on the host where Nessus is installed, and Nessus must be on an IPv6 capable network
(Nessus cannot scan IPv6 resources over IPv4, but it can enumerate IPv6 interfaces via credentialed
scans over IPv4). Both full and compressed IPv6 notation is supported when initiating scans.
Scanning IPv6 Global Unicast IP address ranges is not supported unless the IPs are entered separately
(i.e., list format). Nessus does not support ranges expressed as hyphenated ranges or CIDR addresses.
Nessus supports Link-local ranges with the link6 directive as the scan target or local link with eth0.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 29 -
respective owners.
Virtual Machines
If your virtual machine uses Network Address Translation (NAT) to reach the network, many of Nessus
vulnerability checks, host enumeration, and operating system identification are negatively affected.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 30 -
respective owners.
Antivirus Software
Due to the large number of TCP connections generated during a scan, some anti-virus software pack-
ages may classify Nessus as a worm or a form of malware.
If your anti-virus software gives a warning, select Allow to let Nessus continue scanning.
If your anti-virus package has an option to add processes to an exception list, add nessusd.exe, nes-
sus-service.exe, and nessuscli.exe.
For more information about whitelisting Nessus folders, files, and processes in security products, see
File and Process Whitelist.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 31 -
respective owners.
Security Warnings
By default, Nessus is installed and managed using HTTPS and SSL uses port 8834. The default install-
ation of Nessus uses a self-signed SSL certificate.
During the web-based portion of the Nessus installation, the following message regarding SSL
appears:
You are likely to get a security alert from your web browser saying that the SSL cer-
tificate is invalid. You may either choose to temporarily accept the risk, or you can
obtain a valid SSL certificate from a registrar.
This information refers to a security related message you encounter when accessing the Nessus UI
(https://[server IP]:8834).
l an untrusted site
l an unsecure connection
Because Nessus is providing a self-signed SSL certificate, this is expected and normal behavior.
Bypassing SSL warnings
Based on the browser you are using, use the steps below to proceed to the Nessus login page.
Browser Instructions
Mozilla Firefox Select I Understand the Risks, and then select Add Exception.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 32 -
respective owners.
Manage SSL Certificates
This section contains information related to the management of SSL certificates. This section includes
the following topics:
l Add a Root CA
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 33 -
respective owners.
Custom SSL Certificates
By default, Nessus is installed and managed using HTTPS and SSL support and uses port 8834. Default
installation of Nessus uses a self-signed SSL certificate.
To avoid web browser warnings, a custom SSL certificate specific to your organization can be used.
During the installation, Nessus creates two files that make up the certificate: servercert.pem and
serverkey.pem. These files must be replaced with certificate files generated by your organization or
a trusted certificate authority (CA).
Before replacing the certificate files, stop the Nessus server. Replace the two files and restart the Nes-
sus server. Subsequent connections to the scanner should not display an error if the certificate was
generated by a trusted CA.
Linux /opt/nessus/com/nessus/CA/servercert.pem
/opt/nessus/var/nessus/CA/serverkey.pem
FreeBSD /usr/local/nessus/com/nessus/CA/servercert.pem
/usr/local/nessus/var/nessus/CA/serverkey.pem
C:\ProgramData\Tenable\Nessus\nessus\CA\serverkey.pem
/Library/Nessus/run/var/nessus/CA/serverkey.pem
You can also use the /getcert switch to install the root CA in your browser, which will remove
the warning.
https://[IP address]:8834/getcert
Note: To set up an intermediate certificate chain, a file named serverchain.pem must be placed in
the same directory as the servercert.pem file. This file contains the 1-n intermediate certificates (con-
catenated public certificates) necessary to construct the full certificate chain from the Nessus server
to its ultimate root certificate (one trusted by the user’s browser).
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 34 -
respective owners.
SSL Client Certificate Authentication
Nessus supports use of SSL client certificate authentication. This allows use of SSL client certificates,
smart cards, and CAC authentication when the browser is configured for this method.
Nessus allows for password-based or SSL Certificate authentication methods for user accounts. When
creating a user for SSL certificate authentication, the nessuscli mkcert-client utility is used
through the command line on the Nessus server.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 35 -
respective owners.
Create a New Custom CA and Server Certificate
To allow SSL certificate authentication in Nessus, you must configure the Nessus web server with
a certificate authority (CA) and server certificate.
This allows the web server to trust certificates created by the CA for authentication purposes. Gen-
erated files related to certificates must be owned by root:root, and have the correct permissions by
default.
Note: You must re-link any connected Nessus Agents or managed scanners after loading new cer-
tificates.
Steps
1. Create a new custom CA and server certificate for the Nessus server using the nessuscli
mkcert command at the command line. This will place the certificates in their correct dir-
ectories.
When prompted for the hostname, enter the DNS name or IP address of the server in the
browser such as https://hostname:8834/ or https://ipaddress:8834/. The default certificate
uses the hostname.
2. If you want to use a CA certificate instead of the Nessus generated one, make a copy of the self-
signed CA certificate using the appropriate command for your OS:
Linux
# cp /opt/nessus/com/nessus/CA/cacert.pem /op-
t/nessus/com/nessus/CA/ORIGcacert.pem
C:\ProgramData\Tenable\Nessus\nessus\CA\ORIGcacert.pem
3. If the certificates to be used for authentication are created by a CA other than the Nessus server,
the CA certificate must be installed on the Nessus server.
Linux
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 36 -
respective owners.
Copy the organization’s CA certificate to /opt/nessus/com/nessus/CA/cacert.pem
4. Configure the Nessus server for certificate authentication. Once certificate authentication is
enabled, log in using a username and password is disabled.
Caution: Nessus does not support connecting Agents, Remote Scanners, or Managed Scanners
using the force_pubkey_auth option. Configure an alternate port to enable supporting remote
agents and scanners with force_pubkey_auth enabled using remote_listen_port in the
Advanced Settings.
Linux
# /opt/nessus/sbin/nessuscli fix --set force_pubkey_auth=yes
Windows
C:\> cd C:\Program Files\Tenable\Nessus\
5. Once the CA is in place and the force_pubkey_auth setting is enabled, restart the Nessus ser-
vices with the service nessusd restart command.
Note: Any linked Agents will still have an old certificate (ms_cert) and communication will fail to
the Nessus Manager. Relink the Agent using the following commands:
After Nessus has been configured with the proper CA certificate(s), you can log in to Nessus using SSL
client certificates, Smart Cards, and CACs.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 37 -
respective owners.
Upload a Custom CA Certificate
These steps describe how to upload a custom certificate authority (CA) certificate to the Nessus web
server through the command line.
Steps
1. Create one or more custom CA and server certificates.
cp /opt/nessus/com/nessus/CA/cacert.pem
/opt/nessus/com/nessus/CA/cacert.pem.orig
cp /opt/nessus/var/nessus/CA/cakey.pem /opt/nessus/var/nessus/CA/cakey.pem.orig
cp /opt/nessus/com/nessus/CA/servercert.pem
/opt/nessus/com/nessus/CA/servercert.pem.orig
cp /opt/nessus/var/nessus/CA/serverkey.pem
/opt/nessus/var/nessus/CA/serverkey.pem.orig
cp customCA.pem /opt/nessus/com/nessus/CA/cacert.pem
cp customCA.key /opt/nessus/var/nessus/CA/cakey.pem
cp servercert.pem /opt/nessus/com/nessus/CA/servercert.pem
cp server.key /opt/nessus/var/nessus/CA/serverkey.pem
4. Restart Nessus:
Note: Any linked agent has an old certificate in its configuration, (ms_cert) and upon restart, com-
munication fails to the manager. You can remedy this by relinking the agent to the controller:
You can also load the cacert.pem file into the custom_CA.inc file in the Agents plugin directory:
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 38 -
respective owners.
Add a Root CA
These steps describe how to add a root certificate authority (CA) public certificate to the list of trusted
scanners for Nessus.
Steps
1. If your certificate is in PEM format, save the certificate as a text file.
Tip: You can save more than one certificate in a single text file.
Linux
/opt/nessus/lib/nessus/plugins
Windows
C:\ProgramData\Tenable\Nessus\nessus\plugins
Mac OS X
/Library/Nessus/run/lib/nessus/plugins
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 39 -
respective owners.
Create Nessus SSL Certificates for Login
To log in to a Nessus server with SSL certificates, the certificates must be created with the proper util-
ity. For this process, the nessuscli mkcert-client command line utility is used on the system. The
six questions asked are to set defaults for the creation of users during the current session. These
include certificate lifetime, country, state, location, organization, and organizational unit. The defaults
for these options may be changed during the actual user creation if desired. The user will then be cre-
ated one at a time as prompted. At the end of the process the certificates are copied appropriately and
are used to log in to the Nessus server.
Linux:
# /opt/nessus/sbin/nessuscli mkcert-client
2. Fill in the fields as prompted. The process is identical on a Linux or Windows server.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 40 -
respective owners.
Tip: The client certificates will be placed in the temporary directory in Nessus:
Linux: /opt/nessus/var/nessus/tmp/
Mac OS X: /Library/Nessus/run/var/nessus/tmp/
Windows: C:\ProgramData\Tenable\Nessus\tmp
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 41 -
respective owners.
Tip: Windows installations of Nessus do not come with man pages (local manual instructions).
Consult the Tenable, Inc. Support Portal for additional details on commonly used Nessus execut-
ables.
3. Two files are created in the temporary directory. In the example demonstrated in the previous
step, cert_sylvester.pem and key_sylvester.pem were created. These two files must be
combined and exported into a format that may be imported into the web browser such as .pfx.
This may be accomplished with the openssl program and the following command:
The resulting file combined_sylvester.pfx is created in the directory from which the command is
launched. This file must then be imported into the web browser’s personal certificate store.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 42 -
respective owners.
Enable Connections with Smart Card or CAC Card
Once the CAcert has been created for the smart card, CAC, or similar device, you must create cor-
responding Nessus users. During this process, the users created must match the CN used on the card
that the user will use to connect.
Linux
# /opt/nessus/sbin/nessuscli mkcert-client
2. Fill in the fields as prompted. The process is identical on a Linux or Windows server. The user-
name must match the CN supplied by the certificate on the card.
Tip: Client certificates are created in a randomized temporary directory appropriate to the sys-
tem. The temporary directory will be identified on the line beginning with "Your client certificates
are in". For the use of card authentication, these certificates are not needed and may be deleted.
Once created, a user with the proper card may access the Nessus server and authenticate auto-
matically once their PIN or similar secret is provided.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 43 -
respective owners.
Connect with Certificate or Card Enabled Browser
The following information is provided with the understanding that your web browser is configured for
SSL certificate authentication. This includes the proper trust of the CA by the web browser. Please
refer to your web browser’s help files or other documentation to configure this feature.
The process for certificate login begins when a user connects to Nessus.
Steps
1. Launch a web browser and navigate to the Nessus server.
The web browser presents a list of available certificate identities to select from.
2. Once a certificate has been selected, a prompt for the PIN or password for the certificate is
presented (if required) to access your certificate. When the PIN or password is successfully
entered, the certificate will be available for the current session with Nessus.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 44 -
respective owners.
3. Upon navigating to the Nessus user interface, you may briefly see the username and password
screen followed by an automatic login as the designated user. The Nessus user interface may be
used normally.
Note: If you log out of the session, you will be presented with the standard Nessus login screen.
If you want to log in again with the same certificate, refresh your web browser. If you need to use
a different certificate, you must restart your web browser session.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 45 -
respective owners.
Install Nessus and Nessus Agents
This section includes information and steps required for installing Nessus and Nessus agents on all
supported operating systems.
Nessus
l Install Nessus on Mac OS X
Nessus Agents
l Install a Nessus Agent on Mac OS X
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 46 -
respective owners.
Download Nessus
When downloading Nessus from the downloads page, ensure the package selected is specific to your
operating system and processor.
There is a single Nessus package per operating system and processor. Nessus Manager and Nessus
Professional do not have different packages; your activation code determines which Nessus product
will be installed.
Nessus-<version number>- Nessus <version number> for Windows Server 2008, Server 2008
x64.msi R2*, Server 2012, Server 2012 R2, 7, 8, and 10 - x86-64
Nessus-<version number>- Nessus <version number> for Debian 6 and 7 / Kali Linux - AMD64
debian6_amd64.deb
Nessus-<version num- Nessus <version number> for Mac OS X 10.8, 10.9, and 10.10 - x86-
ber>.dmg 64
Nessus-<version number>- Nessus <version number> for Red Hat ES 6 / CentOS 6 / Oracle
es6.i386.rpm Linux 6 (including Unbreakable Enterprise Kernel) - i386
Nessus-<version number>- Nessus <version number> for SUSE 10.0 Enterprise - x86_64
suse10.x86_64.rpm
Nessus-<version number>- Nessus <version number> for Ubuntu 11.10, 12.04, 12.10, 13.04,
ubuntu1110_amd64.deb 13.10, and 14.04 - AMD64
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 47 -
respective owners.
Nessus Agent Packages Nessus Agent Package Descriptions
NessusAgent-<version num- Nessus Agent <version number> for Windows Server 2008, Server
ber>-x64.msi 2008 R2*, Server 2012, Server 2012 R2, 7, 8, and 10 - x86-64
NessusAgent-<version num- Nessus Agent <version number> for Amazon Linux 2015.03,
ber>-amzn.x86_64.rpm 2015.09 - x86-64
NessusAgent-<version num- Nessus Agent <version number> for Debian 6 and 7 / Kali Linux -
ber>-debian6_i386.deb i386
NessusAgent-<version num- Nessus Agent <version number> for Mac OS X 10.8, 10.9, and 10.10
ber>.dmg - x86-64
NessusAgent-<version num- Nessus Agent <version number> for Red Hat ES 6 / CentOS 6 /
ber>-es6.x86_64.rpm Oracle Linux 6 (including Unbreakable Enterprise Kernel) - x86_64
NessusAgent-<version num- Nessus Agent <version number> for Fedora 20 and 21 - x86_64
ber>-fc20.x86_64.rpm
NessusAgent-<version num- Nessus Agent <version number> for Ubuntu 11.10, 12.04, 12.10,
ber>-ubuntu1110_ 13.04, 13.10, and 14.04 - AMD64
amd64.deb
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 48 -
respective owners.
Install Nessus
This section describes how to install Nessus Manager and Nessus Professional on the following oper-
ating systems:
l Linux
l Windows
l Mac OS X
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 49 -
respective owners.
Install Nessus on Linux
Caution: If you install a Nessus Agent, Manager, or Scanner on a system with an existing Nessus Agent,
Manager, or Scanner running nessusd, the installation process will kill all other nessusd processes. You
may lose scan data as a result.
Debian version 6
# dpkg -i Nessus-<version number>-debian6_amd64.deb
FreeBSD version 10
# pkg add Nessus-<version number>-fbsd10-amd64.txz
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 50 -
respective owners.
Install Nessus on Windows
Caution: If you install a Nessus Agent, Manager, or Scanner on a system with an existing Nessus Agent,
Manager, or Scanner running nessusd, the installation process will kill all other nessusd processes. You
may lose scan data as a result.
2. On the License Agreement screen, read the terms of the Tenable, Inc. Nessus software license
and subscription agreement.
3. Select the I accept the terms of the license agreement option, and then click Next.
4. On the Destination Folder screen, select the Next button to accept the default installation
folder. Otherwise, select the Change button to install Nessus to a different folder.
5. On the Ready to Install the Program screen, select the Install button.
The Installing Tenable, Inc. Nessus screen will be displayed and a Status indication bar will illus-
trate the installation progress. The process may take several minutes.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 51 -
respective owners.
1. On the Welcome to the WinPcap Setup Wizard screen, select the Next button.
2. On the WinPcap License Agreement screen, read the terms of the license agreement, and
then select the I Agree button to continue.
3. On the WinPcap Installation options screen, ensure that the Automatically start the WinP-
cap driver at boot time option is checked, and then select the Install button.
4. On the Completing the WinPcap Setup Wizard screen, select the Finish button.
TheTenable Nessus InstallShield Wizard Completed screen appears.
After the InstallShield Wizard completes, the Welcome to Nessus page loads in your default
browser.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 52 -
respective owners.
Install Nessus on Mac OS X
Caution: If you install a Nessus Agent, Manager, or Scanner on a system with an existing Nessus Agent,
Manager, or Scanner running nessusd, the installation process will kill all other nessusd processes. You
may lose scan data as a result.
Introduction
The Welcome to the Tenable, Inc. Nessus Server Installer window provides general information
about the Nessus installation.
License
1. On the Software License Agreement screen, read the terms of the Tenable, Inc. Nessus soft-
ware license and subscription agreement.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 53 -
respective owners.
4. To continue installing Nessus, select the Agree button, otherwise, select the Disagree button to
quit and exit.
Installation Type
On the Standard Install on <DriveName> screen, choose one of the following options:
l Select the Install button to continue using the default installation location.
Installation
When the Preparing for installation screen appears, you will be prompted for a username and pass-
word.
1. Enter the Name and Password of an administrator account or the root user account.
2. On the Ready to Install the Program screen, select the Install button.
Next, the Installing Tenable, Inc. Nessus screen will be displayed and a Status indication bar will
illustrate the remaining installation progress. The process may take several minutes.
Summary
When the installation is complete, you will see the The installation was successful screen.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 54 -
respective owners.
Install Nessus Agents
This section describes how to install a Nessus Agent on the following operating systems:
l Linux
l Windows
l Mac OS X
Once installed, Nessus Agents are linked to Nessus Manager or Tenable.io. Linked agents automatically
download plugins from the manager upon connection; this process can take several minutes and is
required before an agent can return scan results.
Once installed, an agent links to Nessus Manager or Tenable.io after a random delay ranging from zero
to five minutes. Enforcing a delay reduces network traffic when deploying or restarting large amounts
of agents, and reduces the load on Nessus Manageror Tenable.io. Agents automatically download plu-
gins from the manager upon linking; this process can take several minutes and is required before an
agent can return scan results.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 55 -
respective owners.
Retrieve the Linking Key
Before you begin the Nessus Agent installation process, you must retrieve the Nessus Agent Linking
Key from Nessus Manager.
Option Set To
Host The static IP address or hostname you set during the Nessus Manager
installation.
Key The Linking Key specific to your instance of Nessus Manager. For example:
2d38345603b5b59a4526e39640655c3288a00324097a08f7a93e5480940d1cae
5. Click Close.
What to do next:
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 56 -
respective owners.
Install a Nessus Agent on Linux
Caution: If you install a Nessus Agent on a system where an existing Nessus Agent, Nessus Manager, or
Nessus scanner is running nessusd, the installation process kills all other nessusd processes. You may
lose scan data as a result.
NessusAgent-<version number>-es6.i386.rpm
NessusAgent-<version number>-es7.x86_64.rpm
NessusAgent-<version number>-ubuntu1110_i386.deb
NessusAgent-<version number>-ubuntu910_amd64.deb
NessusAgent-<version number>-ubuntu910_i386.deb
NessusAgent-<version number>-debian6_i386.deb
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 57 -
respective owners.
Example Linux Install Commands
Fedora
# rpm -ivh NessusAgent-<version number>-fc20.x86_64.rpm
Ubuntu
# dpkg -i NessusAgent-<version number>-ubuntu1110_i386.deb
Debian
# dpkg -i NessusAgent-<version number>-debian6_amd64.deb
You can install a full plugins set before linking for the purpose of reducing the bandwidth impact dur-
ing a mass installation. This is accomplished via the nessuscli agent update command with the
--file parameter specifying the location the plugins set. This must be done prior to starting the Nes-
sus Agent. For example:
The plugins set must be less than five days old. A stale plugins set older than five days will force a full
plugins download to occur. You can download a recent plugins set from the Nessus Agents download
page.
Note: After installing a Nessus Agent, you must manually start the service using the command
/sbin/service nessusagent start.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 58 -
respective owners.
Argument Required? Value
--host yes
--port yes
--name no Specify a name for your agent. If you do not specify a name for your
agent, the name defaults to the name of the computer where you are
installing the agent.
--groups no Specify existing agent group or groups where you want to add the
agent. If you do not specify an agent group during the install process,
you can add your linked agent to an agent group later in Nessus Man-
ager or Tenable.io.
--offline- no For Nessus Agents 7.0.3 or later, you can install the Nessus Agent on a
install system even if it is offline. Add the command line option offline-
install="yes" to the command line input. The Nessus Agent will
periodically attempt to link itself to either Tenable.io or Nessus Man-
ager.
If the information that you provide is incorrect, a "Failed to link agent" error appears.
Note: If you attempt to clone an agent and link it to Nessus Manager or Tenable.io, a 409 error may
appear. This error appears because another machine has been linked with the same uuid value in the
/etc/machine_id or /etc/tenable_tag file. To resolve this issue, replace the value in the /etc/ten-
able_tag file with a valid UUIDv4 value. If the /etc/machine_id file does not exist, you can delete
/etc/tenable_tag to generate a new value.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 59 -
respective owners.
Verify a Linked Agent
To verify a linked agent in Nessus Manager:
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 60 -
respective owners.
Install a Nessus Agent on Windows
Caution: If you install a Nessus Agent on a system where an existing Nessus Agent, Nessus Manager, or
Nessus scanner is running nessusd, the installation process kills all other nessusd processes. You may
lose scan data as a result.
Note: This procedure describes deploying Nessus Agents via the command line. You can also deploy
Nessus Agents with a standard Windows service such as Active Directory (AD), Systems Management
Server (SMS), or other software delivery system for MSI packages. For more information on deploying
via these methods, see the appropriate vendor's documentation.
l For Nessus Agents 7.0.3 or later, you can install the Nessus Agent on a system even if it is offline.
Add the command line option NESSUS_OFFLINE_INSTALL="yes" to the command line input.
The Nessus Agent will periodically attempt to link itself to either Tenable.io or Nessus Manager. If
the agent cannot connect to the controller then it retries every hour, and if the agent can con-
nect to the controller but the link fails then it retries every 24 hours.
l Additionally, you can install a full plugins set before linking for the purpose of reducing the band-
width impact during a mass installation. Add the command line option NESSUS_PLUGINS_
FILEPATH="C:\path\to\plugins_set.tgz" where plugins_set.tgz is a recent plugins set
tarball less than five days old. A stale plugins set older than five days will force a full plugins
download to occur. You can download a recent plugins set from the Nessus Agents download
page.
l NESSUS_GROUPS - Specify existing agent group or groups where you want to add the agent. If
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 61 -
respective owners.
you do not specify an agent group during the install process, you can add your linked agent to
an agent group later in Nessus Manager or Tenable.io.
Note: The agent group name is case-sensitive and must match exactly.
Note: Quotation marks (") are necessary when listing multiple groups, or one group with spaces
in its name. For example:
l GroupName
l "Group Name"
l "Group, Another Group"
l NESSUS_NAME
l NESSUS_PROXY_AGENT
l NESSUS_PROXY_PASSWORD
l NESSUS_PROXY_SERVER
l NESSUS_PROXY_USERNAME
l NESSUS_CA_PATH
l NESSUS_PROCESS_PRIORITY
l NESSUS_PLUGINS_FILEPATH
2. Next, double-click the file name to start the installation process. The Welcome to the
InstallShield Wizard for Nessus Agent window appears.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 62 -
respective owners.
Complete the Windows InstallShield Wizard
Caution: On Windows 7 x64 Enterprise, Windows 8 Enterprise, and Windows Server 2012, you may be
required to perform a reboot to complete installation.
Note: For Nessus Agents 7.0 and later, if you want to include the system tray application in your install-
ation, see the procedure described in System Tray Application.
1. In the Welcome to the InstallShield Wizard for Nessus Agent window, click Next to con-
tinue.
2. In the License Agreement window, read the terms of the Tenable, Inc. Nessus software license
and subscription agreement.
4. Click Next.
5. In the Destination Folder window, click Next to accept the default installation folder.
-or-
Click Change to browse and select a different folder where you want to install Nessus Agents.
Server yes
(host)
Groups no Specify existing agent groups(s) where you want to add the
agent.
Note: The agent name defaults to the name of the computer where you are installing the agent.
7. Click Next.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 63 -
respective owners.
9. If presented with a User Account Control message, click Yes to allow the Nessus Agent to
install.
Note: If you attempt to clone an Agent and link it to Nessus Manager or Tenable.io, a 409 error may
appear. This error appears because another machine has been linked with the same uuid value in the
HKLM/Software/Tenable/TAG file. To resolve this issue, replace the value in the HKLM/Soft-
ware/Tenable/TAG file with a valid UUIDv4 value.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 64 -
respective owners.
Install a Nessus Agent on Mac OS X
Caution: If you install a Nessus Agent on a system where an existing Nessus Agent, Nessus Manager, or
Nessus scanner is running nessusd, the installation process kills all other nessusd processes. You may
lose scan data as a result.
To install the Nessus Agent, you can use either the GUI installation wizard or the command line.
GUI Installation:
2. Open Terminal.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 65 -
respective owners.
3. At the command prompt, enter the following command:
You can install a full plugins set before linking for the purpose of reducing the bandwidth impact dur-
ing a mass installation. This is accomplished via the nessuscli agent update command with the
--file parameter specifying the location the plugins set. This must be done prior to starting the Nes-
sus Agent. For example:
The plugins set must be less than five days old. A stale plugins set older than five days will force a full
plugins download to occur. You can download a recent plugins set from the Nessus Agents download
page.
1. Open Terminal.
For example:
--host yes
--port yes
--name no Specify a name for your agent. If you do not specify a name for
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 66 -
respective owners.
your agent, the name defaults to the name of the computer
where you are installing the agent.
--groups no Specify existing agent group or groups where you want to add
the agent. If you do not specify an agent group during the
install process, you can add your linked agent to an agent
group later in Nessus Manager or Tenable.io.
--offline- no For Nessus Agents 7.0.3 or later, you can install the Nessus
install Agent on a system even if it is offline. Add the command line
option NESSUS_OFFLINE_INSTALL="yes" to the command
line input. The Nessus Agent will periodically attempt to link
itself to either Tenable.io or Nessus Manager.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 67 -
respective owners.
Upgrade Nessus and Nessus Agents
This section included information for upgrading Nessus and Nessus Agents on all supported operating
systems.
l Upgrade Nessus
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 68 -
respective owners.
Upgrade Nessus
This section includes information for upgrading Nessus Manager and Nessus Professional.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 69 -
respective owners.
Upgrade from Evaluation
If you used an evaluation version of Nessus and are now upgrading to a full-licensed version of Nes-
sus, you simply need to type your full-version Activation Code on the Settings page, on the About tab.
4. Click Activate.
Nessus downloads and install the Nessus engine and the latest Nessus plugins, and then
restarts.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 70 -
respective owners.
Upgrade Nessus on Linux
Download Nessus
From the Tenable Downloads Page, download the latest, full-license version of Nessus.
Note: Nessus automatically stops nessusd when you run the upgrade command.
SUSE version 11
# rpm -Uvh Nessus-<version number>-suse11.i586.rpm
Fedora version 20
# rpm -Uvh Nessus-<version number>-fc20.x86_64.rpm
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 71 -
respective owners.
Upgrade Nessus on Windows
Download Nessus
From the Tenable Downloads Page, download the latest, full-license version of Nessus. The down-
load package is specific the Nessus build version, your platform, your platform version, and your CPU.
Nessus-<version number>-x64.msi
2. On the License Agreement screen, read the terms of the Tenable, Inc. Nessus software license
and subscription agreement.
3. Select the I accept the terms of the license agreement option, and then select the Next but-
ton.
4. On the Destination Folder screen, select the Next button to accept the default installation
folder. Otherwise, select the Change button to install Nessus to a different folder.
5. On the Ready to Install the Program screen, select the Install button.
The Installing Tenable, Inc. Nessus screen will appear and a Status indication bar will display
the upgrade progress.
6. On the Tenable Nessus InstallShield Wizard Completed screen, select the Finish button.
Nessus will load in your default browser, where you can log in.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 72 -
respective owners.
Upgrade Nessus on Mac OS X
The process of upgrading Nessus on a Mac is the same process as a new Mac Install.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 73 -
respective owners.
Upgrade a Nessus Agent
After you install Nessus Agents, Nessus Manager or Tenable.io updates the agents automatically.
In certain cases, such as airgapped or Internet restricted networks, you may want to download applic-
ation updates manually from the Tenable Support Portal.
4. Click I Agree.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 74 -
respective owners.
Configure Nessus
Refer to the Security Warnings section for steps necessary to bypass the SSL warnings.
Note: Depending on your environment, plugin configuration and initialization can take several minutes.
To configure Nessus:
1. On the Welcome to Nessus screen, select how you want to deploy Nessus.
l Managed by Tenable.sc
l Offline
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 75 -
respective owners.
Install Nessus Essentials, Professional, or Manager
This option installs a standalone versions of Nessus Essentials, Nessus Professional, or Nessus Man-
ager. During installation, you will be prompted to enter your Nessus Activation Code; this Activation
Code determines which product will be installed.
l Nessus Essentials — The free version of Nessus for educators, students, and hobbyists.
l Nessus Manager — The enterprise solution for managing Nessus Agents at scale.
2. Click Continue.
If you selected Nessus Professional or Nessus Manager, the Register Nessus screen
appears.
If you selected Nessus Essentials, the Get an activation code screen appears.
a. On the Get an activation code screen, type your name and email address.
b. Click Email.
The Activation Code is the code you obtained from your activation email or from the Tenable
Downloads Page.
5. Click Continue.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 76 -
respective owners.
6. Create a Nessus administrator user account that you use to log in to Nessus:
7. Click Submit.
Nessus finishes the configuration process, which may take several minutes.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 77 -
respective owners.
Link to Tenable.io
During initial installation, you can install Nessus as a remote scanner linked to Tenable.io. If you
choose not to link the scanner during initial installation, you can link your Nessus scanner later.
Note: Once you link Nessus to Tenable.io, it remains linked until you unlink it.
2. Click Continue.
4. In the Linking Key box, type the linking key of your Tenable.io instance.
6. (Optional) To configure advanced settings such as proxy, plugin feed, and master password, click
Settings.
a. In the Host box, type the hostname or IP address of your proxy server.
b. In the Port box, type the port number of the proxy server.
c. In the Username box, type the name of a user account that has permissions to
access and use the proxy server.
d. In the Password box, type the password of the user account that you specified in
the previous step.
e. In the Auth Method drop-down box, select an authentication method to use for the
proxy. If you do not know, select AUTO DETECT.
f. If your proxy requires a preset user agent, in the User-Agent box, type the user
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 78 -
respective owners.
agent name; otherwise, leave it blank.
g. Click Save.
a. In the Custom Host box, type the hostname or IP address of a custom plugin feed.
b. Click Save.
If you set a master password, Nessus encrypts all policies and credentials contained
in the policy, and prompts you for the password as needed.
b. Click Save.
7. Click Continue.
8. Create a Nessus administrator user account that you use to log in to Nessus:
9. Click Submit.
Nessus finishes the configuration process, which may take several minutes.
10. Using the administrator user account you created, Sign In to Nessus.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 79 -
respective owners.
Link to Industrial Security
During initial installation, you can install Nessus as a remote scanner linked to Industrial Security. If
you choose not to link the scanner during initial installation, you can link your Nessus scanner later.
2. Click Continue.
6. In the Linking Key box, type the linking key that appears on the Settings > Sensor Con-
figuration page in Industrial Security.
8. (Optional) To configure advanced settings such as proxy, plugin feed, and master password, click
Settings.
a. In the Host box, type the hostname or IP address of your proxy server.
b. In the Port box, type the port number of the proxy server.
c. In the Username box, type the name of a user account that has permissions to
access and use the proxy server.
d. In the Password box, type the password of the user account that you specified in
the previous step.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 80 -
respective owners.
e. In the Auth Method drop-down box, select an authentication method to use for the
proxy. If you do not know, select AUTO DETECT.
f. If your proxy requires a preset user agent, in the User-Agent box, type the user
agent name; otherwise, leave it blank.
g. Click Save.
a. In the Custom Host box, type the hostname or IP address of a custom plugin feed.
b. Click Save.
If you set a master password, Nessus encrypts all policies and credentials contained
in the policy, and prompts you for the password as needed.
b. Click Save.
9. Click Continue.
10. Create a Nessus administrator user account that you use to log in to Nessus:
Nessus finishes the configuration process, which may take several minutes.
12. Using the administrator user account you created, Sign In to Nessus.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 81 -
respective owners.
Link to Nessus Manager
During initial installation, you can install Nessus as a remote scanner linked to Nessus Manager. If you
choose not to link the scanner during initial installation, you can link your Nessus scanner later.
Note: Once you link Nessus to Nessus Manager, it remains linked until you unlink it.
2. Click Continue.
6. In the Linking Key box, type the linking key from Nessus Manager.
8. (Optional) To configure advanced settings such as proxy, plugin feed, and master password, click
Settings.
a. In the Host box, type the hostname or IP address of your proxy server.
b. In the Port box, type the port number of the proxy server.
c. In the Username box, type the name of a user account that has permissions to
access and use the proxy server.
d. In the Password box, type the password of the user account that you specified in
the previous step.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 82 -
respective owners.
e. In the Auth Method drop-down box, select an authentication method to use for the
proxy. If you do not know, select AUTO DETECT.
f. If your proxy requires a preset user agent, in the User-Agent box, type the user
agent name; otherwise, leave it blank.
g. Click Save.
a. In the Custom Host box, type the hostname or IP address of a custom plugin feed.
b. Click Save.
If you set a master password, Nessus encrypts all policies and credentials contained
in the policy, and prompts you for the password as needed.
b. Click Save.
9. Click Continue.
10. Create a Nessus administrator user account, which you use to log in to Nessus:
Nessus finishes the configuration process, which may take several minutes.
12. Using the administrator user account you created, Sign In to Nessus.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 83 -
respective owners.
Managed by Tenable.sc
During initial installation, you can install Nessus as a remote scanner linked to Tenable.sc. If you
choose not to link the scanner during initial installation, you can link your Nessus scanner later.
Note: Once you link Nessus to Tenable.sc, it remains linked until you unlink it.
2. Click Continue.
4. (Optional) To configure advanced settings such as proxy, plugin feed, and master password, click
Settings.
a. In the Host box, type the hostname or IP address of your proxy server.
b. In the Port box, type the port number of the proxy server.
c. In the Username box, type the name of a user account that has permissions to
access and use the proxy server.
d. In the Password box, type the password of the user account that you specified in
the previous step.
e. In the Auth Method drop-down box, select an authentication method to use for the
proxy. If you do not know, select AUTO DETECT.
f. If your proxy requires a preset user agent, in the User-Agent box, type the user
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 84 -
respective owners.
agent name; otherwise, leave it blank.
g. Click Save.
a. In the Custom Host box, type the hostname or IP address of a custom plugin feed.
b. Click Save.
If you set a master password, Nessus encrypts all policies and credentials contained
in the policy, and prompts you for the password as needed.
b. Click Save.
5. Click Continue.
6. Create a Nessus administrator user account, which you use to log in to Nessus:
7. Click Submit.
Nessus finishes the configuration process, which may take several minutes.
What to do next:
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 85 -
respective owners.
Manage Activation Code
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 86 -
respective owners.
View Your Activation Code
2. In the Main Menu of the support portal, select the Activation Codes.
3. Next to your product name, select the x button to expand the product details.
Platform Command
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 87 -
respective owners.
Reset Activation Code
In Nessus Manager and Nessus Professional legacy versions, if you uninstall and reinstall Nessus, you
need to reset your activation code.
3. Next to your product name, select the x button to expand the product details.
Note: Reset codes have a 10 day waiting period before you can reset your code again.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 88 -
respective owners.
Update Activation Code
In the event that you receive a new license with a corresponding activation code, you must register the
new activation code in Nessus.
Note: If you are working with Nessus offline, see Manage Nessus Offline.
User Interface
1. In Nessus, in the top navigation bar, click Settings.
2. In the Overview tab, click the button next to the activation code.
2. Run the nessuscli fetch --register <Activation Code> command specific to your
operating system.
Platform Command
Nessus downloads and installs the Nessus engine and the latest Nessus plugins, and then
restarts.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 89 -
respective owners.
Note: To register Nessus without automatically downloading and installing the latest updates,
use the command nessuscli fetch --register-only.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 90 -
respective owners.
Transfer Activation Code
In Nessus Professional 7.0 or later, you can use an activation code on multiple systems. This allows you
to easily transfer a Nessus license from one system to another without resetting your activation code
each time.
When you transfer the activation code to a system, it becomes the active instance of Nessus for that
license. Only the most recently activated system can receive plugin updates. All previous instances of
Nessus with that activation code still function, but cannot receive plugin updates. On inactive
instances, the following error message appears: Access to the feed has been denied, likely due
to an invalid or transferred license code.
To transfer an activation code, use one of the following procedures on the system that you want to
make the active instance of Nessus.
4. Click Continue.
5. In the Register your scanner window, in the Scanner Type drop-down box, select Nessus
Essentials, Professional, or Manager.
7. Click Continue.
Nessus finishes the installation process, which may take several minutes. Once installation is
complete, the license is active on this instance of Nessus.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 91 -
respective owners.
3. In the Overview tab, click the button next to the activation code.
1. On the system on which you want to activate Nessus, open a command prompt.
2. Run the nessuscli fetch --register <Activation Code> command specific to your
operating system.
Platform Command
Nessus downloads and installs the Nessus engine and the latest Nessus plugins, and then
restarts.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 92 -
respective owners.
Manage Nessus Offline
To manage Nessus offline, you need two computers: the Nessus server, which is not connected to the
internet, and another computer that is connected to the internet.
These instructions apply to Nessus 6.3 and newer and direct you to the following
URL: https://plugins.nessus.org/v2/offline.php .
If you are using a version of Nessus 6.2 or earlier, you must use the information and instructions
displayed at the following URL: https://plugins.nessus.org/offline.php .
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 93 -
respective owners.
In this case, you will perform the following operations:
1. Use the Custom URL that you saved and copied during your first offline Download and Copy
Plugins operation.
Computer A Computer B
Operation
(Offline Nessus) (Online Computer)
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 94 -
respective owners.
Install Nessus Offline
A Nessus Offline registration is suitable for computers that will be running Nessus, but are not con-
nected to the internet. To ensure that Nessus has the most up-to-date plugins, Nessus servers not con-
nected to the internet must perform these specific steps to register Nessus.
This process requires the use of two computers: the computer where you are installing Nessus, which
is not connected to the internet, and another computer that is connected to the internet.
For the instructions below, we'll use computers A (offline Nessus server) and B (online computer) as
examples.
1. During the browser portion of the Nessus installation, in the Registration drop-down, select
Offline.
2. Once Offline is selected, the page displays a unique Challenge Code. In the example below, the
challenge code is: aaaaaa11b2222cc33d44e5f6666a777b8cc99999.
2. In the top field, type the challenge code that was displayed on the Nessus Product Regis-
tration screen.
The Offline Update Page Details displays and includes the following elements:
l Custom URL: The custom URL displayed downloads a compressed plugins file. This file is
used by Nessus to obtain plugin information. This URL is specific to your Nessus license
and must be saved and used each time plugins need to be updated.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 95 -
respective owners.
l License: The complete text-string starting with -----BEGIN Tenable, Inc. LICENSE-----
and ends with -----END Tenable, Inc. LICENSE----- is your Nessus product license
information. Tenable uses this text-string to confirm your product license and registration.
l nessus.license file: At the bottom of the web page, there is an embedded file that
includes the license text-string.
Tip: This custom URL is specific to your Nessus license and must be saved and used each time
plugins need to be updated.
2. Copy the compressed TAR file to the Nessus offline (A) system.
Platform Command
Linux # /opt/nessus/sbin/
FreeBSD # /usr/local/nessus/sbin/
Mac OS X # /Library/Nessus/run/sbin/
2. On the computer where you are installing Nessus (A), on the Nessus Product Registration
screen, paste the complete text-string starting with -----BEGIN Tenable, Inc. LICENSE----- and
ends with -----END Tenable, Inc. LICENSE----- .
3. Select Continue.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 96 -
respective owners.
Nessus will finish the installation process; this may take several minutes.
4. Using the System Administrator account you created during setup, Sign In to Nessus.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 97 -
respective owners.
Generate Challenge Code
Before performing offline update operations, you may need to generate a unique identifier on the Nes-
sus server. This identifier is called a challenge code.
Whereas an activation code is used when performing Nessus operations when connected to the inter-
net, a license is used when performing offline operations; the generated challenge code enables you
to view and use your license for offline operations.
Steps
1. On the offline system running Nessus (A), open a command prompt.
2. Use the nessuscli fetch --challenge command specific to your operating system.
Platform Command
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 98 -
respective owners.
Generate Your License
By default, when Nessus is installed, your license is hidden, and is automatically registered. This
license is not viewable.
However, in the event that your Nessus Server is not connected to the internet (i.e., is offline) a license
must be generated. This license is unique to your Nessus product and cannot be shared.
Your license is a text-based file that contains a string of alphanumeric characters. The license is cre-
ated and based on your unique generated challenge code.
1. On a system with internet access (B), navigate to the Nessus Offline Registration Page.
4. Select Submit.
At the bottom of the resulting web page, there is an embedded nessus.license file that
includes the license text string displayed.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 99 -
respective owners.
Download and Copy License File (nessus.license)
After you have generated your Nessus license, you now need to download and then copy the license
to the offline system (A) running Nessus.
Note: These instructions apply to Nessus 6.3 and newer and directs you to the following
URL: https://plugins.nessus.org/v2/offline.php.
If you are using a version of Nessus 6.2 or earlier, you must use the information and instructions dis-
played on the following URL: https://plugins.nessus.org/offline.php.
1. While still using the computer with internet access (B), select the on-screen nessus.license link.
The link will download the nessus.license file.
2. Copy the nessus.license file to the offline system (A) running Nessus 6.3 and newer.
Platform Directory
Linux # /opt/nessus/etc/nessus/
FreeBSD # /usr/local/nessus/etc/nessus
Windows C:\ProgramData\Tenable\Nessus\conf
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 100 -
respective owners.
Register Your License with Nessus
In the event that you receive a new license and Activation Code, the license must be re-registered with
Nessus.
When your Nessus server is offline, you must generate a license, download the license, and then
register your license with Nessus.
Once downloaded and copied to your offline Nessus server, use the nessuscli fetch -- register
command that corresponds to your operating system.
2. Use the nessuscli fetch --register-offline command specific to your operating system.
Platform Command
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 101 -
respective owners.
Download and Copy Plugins
After submitting the required information on the Offline Update Page Details, download the Nessus
Plugins compressed TAR file.
Download Plugins
1. Using the computer with internet access (B), copy and save the on-screen custom URL link.
Note: This custom URL is specific to your Nessus license and must be used each time plugins
need to be downloaded and updated again.
Platform Directory
Linux # /opt/nessus/sbin/
FreeBSD # /usr/local/nessus/sbin/
4. Next, on the offline (A) system running Nessus, Install Plugins Manually.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 102 -
respective owners.
Install Plugins Manually
You can manually update Nessus plugins in two ways: the user interface or the command line inter-
face.
l Download and copy the Nessus plugins compressed TAR file to your system.
4. In the Manual Software Update dialog box, select Upload your own plugin archive, and then
select Continue.
5. Navigate to the compressed TAR file you downloaded, select it, then click Open.
2. Use the nessuscli update <tar.gz filename> command specific to your operating sys-
tem.
Platform Command
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 103 -
respective owners.
Platform Command
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 104 -
respective owners.
Update Nessus Software Manually
On Nessus Manager, you can manually update software on an offline system in two ways.
l Option 1: Use the Manual Software Update feature in the Nessus user interface.
l Option 2: Use the command line interface and the nessuscli update command.
2. On the offline system running Nessus (A), in the top navigation bar, select Settings.
5. In the Manual Software Update dialog box, select Upload your own plugin archive, and then
select Continue.
6. Navigate to the directory where you downloaded the compressed TAR file.
3. Use the nessuscli update <tar.gz filename> command specific to your operating sys-
tem.
Platform Command
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 105 -
respective owners.
Platform Command
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 106 -
respective owners.
Offline Update Page Details
When you are working with Nessus offline, use the https://plugins.nessus.org/v2/offline.php page.
Based on the steps you are using to Manage Nessus Offline, the resulting web page displayed
includes the following elements:
l Custom URL: The custom URL displayed downloads a compressed plugins file. This file is used
by Nessus to obtain plugin information. This URL is specific to your Nessus license and must be
saved and used each time plugins need to be updated.
l License: The complete text-string starting with -----BEGIN Tenable, Inc. LICENSE----- and
ends with -----END Tenable, Inc. LICENSE----- is your Nessus product license information.
Tenable uses this text-string to confirm your product license and registration.
l nessus.license file: At the bottom of the web page, there is an embedded file that includes the
license text-string.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 107 -
respective owners.
Remove Nessus and Nessus Agents
This section includes information for removing Nessus and Nessus Agents.
l Nessus Removal
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 108 -
respective owners.
Nessus Removal
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 109 -
respective owners.
Uninstall Nessus on Linux
3. In the upper right corner, select the Export button, and then choose the Nessus DB option.
SUSE
# /etc/rc.d/nessusd stop
FreeBSD
# service nessusd stop
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 110 -
respective owners.
Debian/Kali and Ubuntu
# dpkg -l | grep Nessus
FreeBSD
# pkg_info | grep Nessus
Remove Nessus
1. Using the package name identified, use the remove command specific to your Linux-style oper-
ating system.
FreeBSD
# pkg delete <package name>
2. Using the command specific to your Linux-style operating system, remove remaining files that
were not part of the original installation.
Linux
# rm -rf /opt/nessus
FreeBSD
# rm -rf /usr/local/nessus/bin
This completes the process of uninstalling the Nessus on the Linux operating systems.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 111 -
respective owners.
Uninstall Nessus on Windows
1. Navigate to the portion of Windows that allows you to Add or Remove Programs or Uninstall
or change a program.
3. Click Uninstall.
4. Click Yes.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 112 -
respective owners.
Uninstall Nessus on Mac OS X
Stop Nessus
1. In System Preferences, select the Nessus button.
/Library/Nessus
/Library/LaunchDaemons/com.tenablesecurity.nessusd.plist
/Library/PreferencePanes/Nessus Preferences.prefPane
/Applications/Nessus
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 113 -
respective owners.
Remove Nessus Agent
This section includes information for uninstalling a Nessus Agent from hosts.
Note: For instructions on how to remove an agent from a manager while leaving the agent installed on
the host, see Unlink an Agent.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 114 -
respective owners.
Uninstall a Nessus Agent on Linux
FreeBSD
# pkg_info | grep NessusAgent
2. Using the package name identified, type the remove command specific to your Linux-style oper-
ating system.
FreeBSD
# pkg delete <Agent package name>
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 115 -
respective owners.
Uninstall a Nessus Agent on Windows
1. Navigate to the portion of Windows where you can Add or Remove Programs or Uninstall or
change a program.
3. Click Uninstall.
A dialog box appears, prompting you to confirm your selection to remove Nessus.
4. Click Yes.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 116 -
respective owners.
Uninstall a Nessus Agent on Mac OS X
1. Remove the Nessus directories. Using Finder, locate and delete the following items.
l /Library/NessusAgent
l /Library/LaunchDaemons/com.tenablesecurity.nessusagent.plist
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 117 -
respective owners.
Scans
On the Scans page, you can create, view, and manage scans and resources. To access the Scans page,
in the top navigation bar, click Scans. The left navigation bar displays the Folders and Resources sec-
tions.
l Scan Results
l Scan Folders
l Policies
l Plugins
l Customized Reports
l Scanners
l Agents
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 118 -
respective owners.
Scan and Policy Templates
When you first create a Scan or Policy, the Scan Templates section or Policy Templates section
appears, respectively. Templates are provided for scanners and agents. If you have created custom
policies, they appear in the User Defined tab.
Note: If a plugin requires authentication or settings to communicate with another system, the plugin is
not available on agents. This includes, but is not limited to:
l Patch management.
l Mobile device management.
l Cloud infrastructure audit.
l Database checks that require authentication.
For information on agent templates, see Agent Scan and Policy Templates.
The following tables list the templates that are available in Nessus and brief explanations of each tem-
plate.
When you configure a Tenable-provided scan template, you can modify only the settings included for
the template type. When you create a user-defined template, you can modify a custom set of settings
for your scan.
For descriptions of all settings, see Settings.
Scanner Templates
Scanner templates fall into three categories: Discovery, Vulnerabilities, and Compliance.
Tip: In the Nessus interface, use the search box to quickly find a template.
Template Description
Discovery
Host Dis- Performs a simple scan to discover live hosts and open ports.
covery
Vulnerabilities
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 119 -
respective owners.
Template Description
Advanced An advanced scan without any recommendations, where you can configure a
Dynamic Scan dynamic plugin filter instead of manually selecting plugin families or individual
plugins. As Tenable releases new plugins or plugin attributes change, the scan
dynamically includes or excludes plugins depending on your filter. This allows
you to tailor your scans for specific vulnerabilities while ensuring that the scan
stays up to date as new plugins are released. See Configure Dynamic Plugins.
Basic Net- Performs a full system scan that is suitable for any host. For example, you could
work Scan use this template to perform an internal vulnerability scan on your organization's
systems.
Badlock Performs remote and local checks for CVE-2016-2118 and CVE-2016-0128.
Detection
Bash Shell- Performs remote and local checks for CVE-2014-6271 and CVE-2014-7169.
shock Detec-
tion
Spectre and Performs remote and local checks for CVE-2017-5753, CVE-2017-5715, and CVE-
Meltdown 2017-5754.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 120 -
respective owners.
Template Description
Compliance
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 121 -
respective owners.
Agent Templates
In both Nessus Manager and Tenable.io, default templates for agent scans appear in the Agent tab.
The manager interface provides brief explanations of each default template.
Note: If you create custom policies for agent scans, those templates appear in the User Defined tab.
The table below briefly describes the settings for the default agent scan templates. You may also have
access to special templates.
For a comprehensive explanation of template settings, see the documentation for Nessus Manager or
Tenable.io.
Agent Templates
Agent templates fall into two categories: Vulnerabilities and Compliance.
Template Description
Vulnerabilities
Compliance
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 122 -
respective owners.
Scan and Policy Settings
Scan or Policy Settings are organized into collections of configuration items, specifically Basic, Dis-
covery, Assessment, Report, and Advanced settings. Each of these collections are subdivided into
further sections. For example, the Basic settings include the General, Schedule, Notifications, and
Permissions sections. Additionally, the sections may contain groups of related configuration items.
For example, the Host Discovery section contains the General Settings, Ping Methods, Fragile
Devices, Wake-on-LAN, and Network Type groups.
The following sections of the documentation are organized to reflect the interface. For example, if you
wanted to find information about the General section ( 3 in the previous image) of the Basic settings ( 2
in the previous image) that appears when you select the Settings tab ( 1 in the previous image), you
should locate the table labeled General in the Basic topic. The tables include subheadings to reflect
groups of related configuration items that appear in a particular section.
The following settings exist for each policy, though available configuration items may vary based on
the selected template:
l Basic
l Discovery
l Assessment
l Report
l Advanced
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 123 -
respective owners.
Basic Scan Settings
The Basic scan settings are used to specify certain organizational and security-related aspects of the
scan or policy, including the name of the scan, its targets, whether the scan is scheduled, and who has
access to the scan, among other settings.
Note: Configuration items that are required by a particular scan or policy are indicated in the Nessus
interface.
l General
l Schedule
l Notifications
l Permissions
General
Default
Setting Description
Value
Name None Specifies the name of the scan or policy. This value is displayed on the
Nessus interface.
Folder My Specifies the folder where the scan appears after being saved.
Scans
Agent None (Agent scans only) Specifies the agent group or groups you want the
Groups scan to target. Select an existing agent group from the drop-down box,
or create a new agent group. For more information, see Create a New
Agent Group .
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 124 -
respective owners.
Scan Win- 1 hour (Agent scans only) (Required) Specifies the time frame during which
dow agents must report in order to be included and visible in vulnerability
reports. Use the drop-down box to select an interval of time, or click
to type a custom scan window.
Scanner Varies (Nessus Manager only) Specifies the scanner that performs the scan.
Targets None Specifies one or more targets to be scanned. If you select a target
group or upload a targets file, you are not required to specify addi-
tional targets.
Tip: You can force Nessus to use a given host name for a server during
a scan by using the hostname[ip] syntax (e.g., www.example.com
[192.168.1.1]).
Schedule
By default, scans are not scheduled. When you first access the Schedule section, the Enable Sched-
ule setting appears, set to Off. To modify the settings listed on the following table, click the Off but-
ton. The rest of the settings appear.
Default
Setting Description
Value
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 125 -
respective owners.
l Once: Schedule the scan at a specific time.
Starts Varies Specifies the exact date and time when a scan launches.
The starting date defaults to the date when you are creating the
scan. The starting time is the nearest half-hour interval. For
example, if you create your scan on 09/31/2018 at 9:12 AM, the
default starting date and time is set to 09/31/2018 and 09:30.
Timezone America/New Specifies the timezone of the value set for Starts.
York
Repeat Varies Specifies the interval at which a scan is relaunched. The default
Every value of this item varies based on the frequency you choose.
Repeat Varies Specifies what day of the week a scan repeats. This item appears
On only if you specify Weekly for Frequency.
The value for Repeat On defaults to the day of the week on which
you create the scan.
Repeat By Day of the Specifies when a monthly scan is relaunched. This item appears
Month only if you specify Monthly for Frequency.
Summary N/A Provides a summary of the schedule for your scan based on the val-
ues you have specified for the available settings.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 126 -
respective owners.
Notifications
Default
Setting Description
Value
Email Recip- None Specifies zero or more email addresses, separated by commas, that are
ient(s) alerted when a scan completes and the results are available.
Report Nessus (Nessus Professional only) Specifies the report type (CSV, Nessus, or
Type PDF) that you want to attach to the email.
Max Attach- 25 (Nessus Professional only) Specifies the maximum size, in megabytes
ment Size (MB), of any report attachment. If the report exceeds the maximum size,
then it is not attached to the email. Nessus does not support report
attachments larger than 50 MB.
Permissions
Using settings in the Permissions section, you can assign various permissions to groups and indi-
vidual users. When you assign a permission to a group, that permission applies to all users within the
group. The following table describes the permissions that can be assigned.
Permission Description
No Access Groups and users set to No Access cannot interact with the scan in any way. When
you create a scan or policy, by default no other users or groups have access to it.
Can View Groups and users set to Can View can view the results of the scan.
Can Control Groups and users set to Can Control can launch, pause, and stop a scan, as well
as view its results.
Can Con- Groups and users set to Can Configure can modify the configuration of the scan
figure in addition to all other permissions.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 127 -
respective owners.
Scan Targets
Hostname targets that look like either a link6 target (start with the text "link6") or like one of the two
IPv6 range forms can be forced to be processed as a hostname by putting single quotes around the tar-
get.
The following table explains target types, examples, and a short explanation of what happens when
that target type is scanned.
Target
Example Explanation
Description
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 128 -
respective owners.
Target
Example Explanation
Description
The text link6 or link6%16 Multicast ICMPv6 echo requests are sent
'link6' option- out on the interface specified by the
ally followed scope identifier to the ff02::1 address. All
by an IPv6 hosts that respond to the request are
scope iden- scanned. If no IPv6 scope identifier is
tifier given the requests are sent out on all
interfaces. Note that usage of interfaces
names for the scope identifier is not sup-
ported on Windows platforms
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 129 -
respective owners.
Target
Example Explanation
Description
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 130 -
respective owners.
Discovery Scan Settings
The Discovery scan settings relate to discovery and port scanning, including port ranges and meth-
ods.
Note: Configuration items that are required by a particular scan or policy are indicated in the Nessus
interface.
l Host Discovery
l Port Scanning
l Service Discovery
The following tables list by section all available settings. When you select any template other than
Advanced Network Scan, the Scan Type setting also appears.
Scan Type
The Scan Type setting appears for all templates that have Discovery settings, except Advanced Net-
work Scan. The options that are available for the Scan Type setting vary from template to template.
The following table describes the options that are available per template. If a template is not listed in
the table, no Discovery settings are available for that template.
Note: When Custom is selected, the following sections appear: Host Discovery, Port Scanning, and
Service Discovery.
l Thorough
l Custom
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 131 -
respective owners.
Basic Network Scan Three options are available:
l OS Identification
l Custom
l Custom
l Default (default)
l Custom
l Custom
Host Discovery
By default, some settings in the Host Discovery section are enabled. When you first access the Host
Discovery section, the Ping the remote host item appears and is set to On.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 132 -
respective owners.
l General Settings
l Ping Methods
l Fragile Devices
l Wake-on-LAN
l Network Type
Default
Setting Description
Value
Ping the On This option enables Nessus to ping remote hosts on multiple ports
remote host to determine if they are alive. When set to On, General Settings
and Ping Methods appear.
Note: To scan VMware guest systems, Ping the remote host must
be set to Off.
General Settings
Use Fast Net- Disabled If a host responds to ping, Nessus attempts to avoid false positives,
work Discovery performing additional tests to verify the response did not come
from a proxy or load balancer. Fast network discovery bypasses
those additional tests.
Ping Methods
ARP Enabled Ping a host using its hardware address via Address Resolution Pro-
tocol (ARP). This only works on a local network.
Destination built- Destination ports can be configured to use specific ports for TCP
ports (TCP) in ping. This specifies the list of ports that are checked via TCP ping.
ICMP Enabled Ping a host using the Internet Control Message Protocol (ICMP).
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 133 -
respective owners.
Assume ICMP Disabled Assume ICMP unreachable from the gateway means the host is
unreachable down When a ping is sent to a host that is down, its gateway may
from the gate- return an ICMP unreachable message. When this option is enabled,
way means the when Nessus receives an ICMP Unreachable message, it considers
host is down the targeted host dead. This is to help speed up discovery on some
networks.
Note: Some firewalls and packet filters use this same behavior for
hosts that are up, but connected to a port or protocol that is
filtered. With this option enabled, this leads to the scan con-
sidering the host is down when it is indeed up.
Maximum num- 2 Specifies the number of attempts to retry pinging the remote host.
ber of retries
UDP Disabled Ping a host using the User Datagram Protocol (UDP).
UDP is a stateless protocol, meaning that communication is not per-
formed with handshake dialogues. UDP-based communication is
not always reliable, and because of the nature of UDP services and
screening devices, they are not always remotely detectable.
Fragile Devices
Scan Novell Disabled When enabled, Nessus scans Novell NetWare hosts.
Netware hosts
Scan Oper- Disabled When enabled, Nessus performs a full scan of Operational Tech-
ational Tech- nology (OT) devices such as programmable logic controllers (PLCs)
nology devices and remote terminal units (RTUs) that monitor environmental
factors and the activity and state of machinery. When disabled, Nes-
sus uses ICS/SCADA Smart Scanning to cautiously identify OT
devices and stops scanning them once they are discovered.
Wake-on-LAN
List of None The Wake-on-LAN (WOL) menu controls which hosts to send WOL
MAC Addresses magic packets to before performing a scan.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 134 -
respective owners.
For example:
33:24:4C:03:CC:C7
FF:5C:2C:71:57:79
Boot time wait 5 The amount of time to wait for hosts to start before performing the
(in minutes) scan.
Network Type
Network Type Mixed Specifies if you are using publicly routable IPs, private non-internet
(use RFC routable IPs, or a mix of these.
1918)
This setting has three options:
l Private LAN
The default value, Mixed, should be selected if you are using RFC
1918 addresses and have multiple routers within your network.
Port Scanning
The Port Scanning section includes settings that define how the port scanner behaves and which
ports to scan.
l Ports
Default
Setting Description
Value
Ports
Consider Disabled If a port is not scanned with a selected port scanner (for example,
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 135 -
respective owners.
Default
Setting Description
Value
Unscanned the port falls outside of the specified range), Nessus considers it
Ports as closed.
Closed
Port Scan Default Two keywords can be typed into the Port scan range box.
Range
l default instructs Nessus to scan approximately 4,790 com-
monly used ports. The list of ports can be found in the nessus-
services file.
The custom range specified for a port scan is applied to the pro-
tocols you have selected in the Network Port Scanners group of
settings.
If scanning both TCP and UDP, you can specify a split range specific
to each protocol. For example, if you want to scan a different range
of ports for TCP and UDP in the same policy, you would type T:1-
1024,U:300-500.
You can also specify a set of ports to scan for both protocols, as well
as individual ranges for each separate protocol. For example, 1-
1024,T:1024-65535,U:1025.
SSH (net- Enabled This option uses netstat to check for open ports from the local
stat) machine. It relies on the netstat command being available via an SSH
connection to the target. This scan is intended for Linux-based sys-
tems and requires authentication credentials.
WMI (net- Enabled A WMI-based scan uses netstat to determine open ports.
stat)
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 136 -
respective owners.
Default
Setting Description
Value
Note: If enabled, any custom range typed in the Port Scan Range
box is ignored.
SNMP Enabled When enabled, if the appropriate credentials are provided by the
user, Nessus can better test the remote host and produce more
detailed audit results. For example, there are many Cisco router
checks that determine the vulnerabilities present by examining the
version of the returned SNMP string. This information is necessary
for these audits.
Only run net- Enabled Rely on local port enumeration first before relying on network port
work port scans.
scanners if
local port
enumeration
failed
Verify open Disabled If a local port enumerator (e.g., WMI or netstat) finds a port, Nessus
TCP ports also verifies that it is open remotely. This helps determine if some
form of access control is being used (e.g., TCP wrappers, firewall).
found by
local port
enumerators
TCP Disabled On some platforms (e.g., Windows and Mac OS X), enabling this scan-
ner causes Nessus to use the SYN scanner to avoid serious per-
formance issues native to those operating systems.
Override auto- Disabled When enabled, this setting overrides automatic firewall detection.
matic firewall
This setting has three options:
detection
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 137 -
respective owners.
Default
Setting Description
Value
SYN Enabled Use the Nessus SYN scanner to identify open TCP ports on the target
hosts. SYN scans are generally considered to be less intrusive than
TCP scans depending on the security monitoring device, such as a
firewall or Intrusion Detection System (IDS). The scanner sends a SYN
packet to the port, waits for SYN-ACK reply, and determines the port
state based on a reply or lack of reply.
UDP Disabled This option engages Nessus built-in UDP scanner to identify open
UDP ports on the targets.
Service Discovery
The Service Discovery section includes settings that attempt to map each open port with the service
that is running on that port.
l General Settings
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 138 -
respective owners.
Default
Setting Description
Value
General Settings
Probe all Enabled Attempts to map each open port with the service that is running on
ports to find that port.
services
Caution: In some rare cases, probing might disrupt some services
and cause unforeseen side effects.
Identify cer- 60 Identifies SSL and TLS certificates that are within the specified num-
tificates expir- ber of days of expiring.
ing within x
days
Enumerate all True When enabled, Nessus ignores the list of ciphers advertised by
SSL ciphers SSL/TLS services and enumerates them by attempting to establish
connections using all possible ciphers.
Enable CRL False When enabled, Nessus checks that none of the identified cer-
checking (con- tificates have been revoked.
nects to inter-
net)
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 139 -
respective owners.
Assessment Scan Settings
The Assessment scan settings are used for configuring how a scan identifies vulnerabilities, as well as
what vulnerabilities are identified. This includes identifying malware, assessing the vulnerability of a
system to brute force attacks, and the susceptibility of web applications.
l General
l Brute Force
l SCADA
l Web Applications
l Windows
l Malware
Scan Type
The Scan Type setting contains options that vary from template to template.
The Nessus interface provides descriptions of each option. The Custom option displays different
Assessment settings depending on the selected template.
l Custom
General
The General section includes the following groups of settings:
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 140 -
respective owners.
l Accuracy
l Antivirus
l SMTP
Accuracy
Override Disabled In some cases, Nessus cannot remotely determine whether a flaw
normal is present or not. If report paranoia is set to Show potential
Accuracy false alarms then a flaw is reported every time, even when there
is a doubt about the remote host being affected. Conversely, a
paranoia setting of Avoid potential false alarms causes Nessus
to not report any flaw whenever there is a hint of uncertainty
about the remote host. Not enabling Override normal accuracy is a
middle ground between these two settings.
Perform Disabled Causes various plugins to work harder. For example, when looking
thorough through SMB file shares, a plugin can analyze 3 directory levels
tests deep instead of 1. This could cause much more network traffic and
(may dis- analysis in some cases. By being more thorough, the scan is more
rupt your intrusive and is more likely to disrupt the network, while poten-
network tially providing better audit results.
or impact
scan
speed)
Antivirus
Antivirus 0 Configure the delay of the Antivirus software check for a set num-
definition ber of days (0-7). The Antivirus Software Check menu allows you to
grace direct Nessus to allow for a specific grace time in reporting when
period antivirus signatures are considered out of date. By default, Nessus
(in days) considers signatures out of date regardless of how long ago an
update was available (e.g., a few hours ago). This can be con-
figured to allow for up to 7 days before reporting them out of
date.
SMTP
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 141 -
respective owners.
Third Nessus attempts to send spam through each SMTP device to the address listed in this
party field. This third party domain address must be outside the range of the site being
domain scanned or the site performing the scan. Otherwise, the test may be aborted by the
SMTP server.
From The test messages sent to the SMTP server(s) appear as if they originated from the
address address specified in this field.
To Nessus attempts to send messages addressed to the mail recipient listed in this field.
address The postmaster address is the default value since it is a valid address on most mail
servers.
Brute Force
The Brute Force section includes the following groups of settings:
l General Settings
l Oracle Database
l Hydra
Default
Setting Description
Value
General Settings
Only use Enabled In some cases, Nessus can test default accounts and known default
credentials passwords. This can cause the account to be locked out if too many
provided consecutive invalid attempts trigger security protocols on the oper-
by the user ating system or application. By default, this setting is enabled to pre-
vent Nessus from performing these tests.
Oracle Database
Hydra
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 142 -
respective owners.
Hydra options only appear when Hydra is installed on the same computer as the scanner or agent
executing the scan.
Logins file A file that contains user names that Hydra uses during the scan.
Passwords A file that contains passwords for user accounts that Hydra uses dur-
file ing the scan.
Number of 16 The number of simultaneous Hydra tests that you want to execute. By
parallel default, this value is 16.
tasks
Try empty Enabled If enabled, Hydra tries user names without using a password.
passwords
Try login as Enabled If enabled, Hydra tries a user name as the corresponding password.
password
Stop brute Disabled If enabled, Hydra stops brute forcing user accounts after the first time
forcing an account is successfully accessed.
after the
first suc-
cess
Add Enabled If disabled, only the user names specified in the logins file are used for
accounts the scan. Otherwise, additional user names discovered by other plu-
found by gins are added to the logins file and used for the scan.
other plu-
gins to the
login file
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 143 -
respective owners.
SAP R/3 Cli- The ID of the SAP R/3 client that you want Hydra to test.
ent ID (0 -
99)
Cisco login This password is used to log in to a Cisco system before brute forcing
password enable passwords. If no password is provided here, Hydra attempts to
log in using credentials that were successfully brute forced earlier in
the scan.
Web page Enter a web page that is protected by HTTP basic or digest authen-
to brute tication. If a web page is not provided here, Hydra attempts to brute
force force a page discovered by the Nessus web crawler that requires HTTP
authentication.
HTTP proxy If Hydra successfully brute forces an HTTP proxy, it attempts to access
test web- the website provided here via the brute forced proxy.
site
LDAP DN The LDAP Distinguish Name scope that Hydra authenticates against.
SCADA
Default
Setting Description
Value
Modbus/TCP Coil Modbus uses a function code of 1 to read coils in a Modbus slave. Coils rep-
Access resent binary output settings and are typically mapped to actuators. The
ability to read coils may help an attacker profile a system and identify
ranges of registers to alter via a write coil message.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 144 -
respective owners.
Default
Setting Description
Value
Modbus/TCP Coil Modbus uses a function code of 1 to read coils in a Modbus slave. Coils rep-
Access resent binary output settings and are typically mapped to actuators. The
ability to read coils may help an attacker profile a system and identify
ranges of registers to alter via a write coil message.
ICCP/COTP TSAP The ICCP/COTP TSAP Addressing menu determines a Connection Oriented
Addressing Weak- Transport Protocol (COTP) Transport Service Access Points (TSAP) value on
ness an ICCP server by trying possible values.
Stop 8 Specifies the ending TSAP value to try. All values between the Start and
COTP Stop values are tried.
TSAP
Web Applications
By default, web applications are not scanned. When you first access the Web Application section, the
Scan Web Applications setting appears and is set to Off. To modify the Web Application settings lis-
ted on the following table, click the Off button. The rest of the settings appear.
l General Settings
l Web Crawler
General Settings
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 145 -
respective owners.
Setting Default Value Description
Use a cus- Mozilla/4.0 (compatible; Specifies which type of web browser Nessus imper-
tom User- MSIE 8.0; Windows NT 5.1; sonates while scanning.
Agent Trident/4.0)
Web Crawler
Start crawl- / The URL of the first page that is tested. If multiple
ing from pages are required, use a colon delimiter to sep-
arate them (e.g., /:/php4:/base).
Excluded /server_privileges\.php <> Specifies portions of the web site to exclude from
pages log out being crawled. For example, to exclude the /manual
(regex) directory and all Perl CGI, set this field to:
(^/manual) <> (\.pl(\?.*)?$).
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 146 -
respective owners.
Setting Default Value Description
Abort web Disabled If Nessus cannot log in to the target via HTTP, then
application do not run any web application tests.
tests if
HTTP login
fails
Try all HTTP Disabled This option instructs Nessus to also use POST
methods requests for enhanced web form testing. By default,
the web application tests only use GET requests,
unless this option is enabled. Generally, more com-
plex applications use the POST method when a user
submits data to the application. This setting
provides more thorough testing, but may con-
siderably increase the time required. When selected,
Nessus tests each script or variable with both GET
and POST requests. This setting provides more thor-
ough testing, but may considerably increase the
time required.
Test embed- Disabled Embedded web servers are often static and contain
ded web no customizable CGI scripts. In addition, embedded
servers web servers may be prone to crash or become non-
responsive when scanned. Tenable recommends
scanning embedded web servers separately from
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 147 -
respective owners.
Setting Default Value Description
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 148 -
respective owners.
Setting Default Value Description
Do not stop Disabled This setting determines when a new flaw is targeted.
after first This applies at the script level. Finding an XSS flaw
flaw is does not disable searching for SQL injection or
found per header injection, but unless otherwise specified,
web page there is at most one report for each type on a given
port. Note that several flaws of the same type (e.g.,
XSS, SQLi, etc.) may be reported if they were caught
by the same attack.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 149 -
respective owners.
Setting Default Value Description
URL for http://rfi.nessus.org/rfi.txt During Remote File Inclusion (RFI) testing, this set-
Remote File ting specifies a file on a remote host to use for tests.
Inclusion By default, Nessus uses a safe file hosted by Ten-
able, Inc. for RFI testing. If the scanner cannot reach
the internet, you can use an internally hosted file
for more accurate RFI testing.
Windows
The Windows section contains the following groups of settings:
l General Settings
Default
Setting Description
Value
General Settings
Request inform- Disabled If enabled, domain users are queried instead of local users.
ation about the
SMB Domain
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 150 -
respective owners.
User Enumeration Methods
You can enable as many of the user enumeration methods as appropriate for user discovery.
SAM Registry Enabled Nessus enumerates users via the Security Account Manager
(SAM) registry.
ADSI Query Enabled Nessus enumerates users via Active Directory Service Interfaces
(ADSI). To use ADSI, you must configure credentials under Cre-
dentials > Miscellaneous > ADSI.
RID Brute For- Disabled Nessus enumerates users via relative identifier (RID) brute for-
cing cing. Enabling this setting enables the Enumerate Domain Users
and Enumerate Local User settings.
Start UID 1000 The beginning of a range of IDs where Nessus attempts to enu-
merate domain users.
End UID 1200 The end of a range of IDs where Nessus attempts to enumerate
domain users.
Start UID 1000 The beginning of a range of IDs where Nessus attempts to enu-
merate local users.
End UID 1200 The end of a range of IDs where Nessus attempts to enumerate
local users.
Malware
The Malware section contains the following groups of settings:
l General Settings
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 151 -
respective owners.
Default
Setting Description
Value
General Settings
Disable DNS res- Disabled Checking this option prevents Nessus from using the cloud to
olution compare scan findings against known malware.
Custom Netstat None A text file that contains a list of known bad IP addresses that you
IP Threat List want to detect.
Each line in the file must begin with an IPv4 address. Optionally,
you can add a description by adding a comma after the
IP address, followed by the description. You can also use hash-
delimited comments (e.g., #) in addition to comma-delimited com-
ments.
Provide your None Additional known bad MD5 hashes can be uploaded via a text file
own list of that contains one MD5 hash per line. Optionally, you can include
known bad MD5 a description for a hash by adding a comma after the hash, fol-
hashes lowed by the description. If any matches are found when scan-
ning a target, the description appears in the scan results. Hash-
delimited comments (e.g., #) can also be used in addition to the
comma-delimited ones.
Provide your None Additional known good MD5 hashes can be uploaded via a text
own list of file that contains one MD5 hash per line. It is possible to (option-
known good ally) add a description for each hash in the uploaded file. This is
MD5 hashes done by adding a comma after the hash, followed by the descrip-
tion. If any matches are found when scanning a target, and a
description was provided for the hash, the description appears in
the scan results. Standard hash-delimited comments (e.g., # ) can
optionally be used in addition to the comma-delimited ones.
Hosts file whitel- None Nessus checks system hosts files for signs of a compromise (e.g.,
ist Plugin ID 23910 titled Compromised Windows System (hosts File
Check)). This option allows you to upload a file containing a list of
IPs and hostnames to be ignored by Nessus during a scan.
Include one IP and one hostname (formatted identically to your
hosts file on the target) per line in a regular text file.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 152 -
respective owners.
Yara Rules
Yara Rules File None A .yar file containing the YARA rules to be applied in the scan.
You can only upload one file per scan, so include all rules in a
single file. For more information, see yara.readthedocs.io.
Scan file system Off Turning on this option allows you to scan system directories and
files on host computers.
Scan User Pro- Off Enables file system scanning to scan user profiles.
files
Custom Filescan None A custom file that lists directories to be scanned by malware file
Directories scanning. List each directory on one line.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 153 -
respective owners.
Report Scan Settings
l Processing
l Output
Default
Setting Description
Value
Processing
Show missing Enabled If enabled, includes superseded patch information in the scan
patches that report.
have been
superseded
Hide results Enabled If enabled, the list of dependencies is not included in the report. If
from plugins ini- you want to include the list of dependencies in the report, disable
tiated as a this setting.
dependency
Output
Allow users to Enabled When enabled, allows users to delete items from the report. When
edit scan results performing a scan for regulatory compliance or other types of
audits, disable the setting to show that the scan was not tampered
with.
Designate hosts Disabled Uses the host name rather than IP address for report output.
by their DNS
name
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 154 -
respective owners.
Default
Setting Description
Value
Display unreach- Disabled When enabled, hosts that did not reply to the ping request are
able hosts included in the security report as dead hosts. Do not enable this
option for large IP blocks.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 155 -
respective owners.
Advanced Scan Settings
The Advanced scan settings provide increased control over scan efficiency and the operations of a
scan, as well as the ability to enabled plugin debugging.
l General Settings
l Performance
l Debug Settings
Scan Type
The Scan Type setting appears for the following templates:
l Basic Network Scan
l Malware Scan
All templates that include the Scan Type setting have the same options:
l Default
l Custom
Note: When Custom is selected, the General section appears. The General section includes the settings
that appear on the following table.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 156 -
respective owners.
The following table includes the default values for the Advanced Network Scan template. Depending
on the template you select, certain default values may vary.
Default
Setting Description
Value
General Settings
Enable Safe Enabled When enabled, disables all plugins that may have an adverse effect
Checks on the remote host.
Stop scan- Disabled When enabled, Nessus stops scanning if it detects that the host has
ning hosts become unresponsive. This may occur if users turn off their PCs
that become during a scan, a host has stopped responding after a denial of ser-
unresponsive vice plugin, or a security mechanism (for example, an IDS) has star-
during the ted to block traffic to a server. Normally, continuing scans on these
scan machines sends unnecessary traffic across the network and delay
the scan.
Performance
Slow down Disabled This enables Nessus to detect when it is sending too many packets
the scan and the network pipe is approaching capacity. If detected, Nessus
when net- throttles the scan to accommodate and alleviate the congestion.
work con- Once the congestion has subsided, Nessus automatically attempts
gestion is to use the available space within the network pipe again.
detected
Network 5 Specifies the time that Nessus waits for a response from a host
timeout (in unless otherwise specified within a plugin. If you are scanning over
seconds) a slow connection, you may want to set this to a higher number of
seconds.
Max sim- 5 Specifies the maximum number of checks a Nessus scanner will per-
ultaneous form against a single host at one time.
checks per
host
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 157 -
respective owners.
Default
Setting Description
Value
Max sim- 30, or the Specifies the maximum number of hosts that a Nessus scanner will
ultaneous Nessus scan at the same time.
hosts per scanner
scan advanced
setting
max_
hosts,
whichever
is smaller.
Max number none Specifies the maximum number of established TCP sessions for a
of con- single host.
current TCP
sessions per This TCP throttling option also controls the number of packets per
host second the SYN scanner sends, which is 10 times the number of
TCP sessions. E.g., if this option is set to 15, the SYN scanner sends
150 packets per second at most.
Max number none This setting limits the maximum number of established TCP ses-
of con- sions for the entire scan, regardless of the number of hosts being
current TCP scanned.
sessions per
scan
Custom file- none A plain text file containing a list of filepaths to exclude from all plu-
path exclu- gins that search using the find command on Unix systems.
sions for
In the file, enter one filepath per line, formatted per patterns
Unix find
command allowed by the Unix find command -path argument. For more
information, see the find command man page.
Custom none A plain text file containing a list of filesystems to exclude from all
filesystem plugins that search using the find command on Unix systems.
exclusions
In the file, enter one filesystem per line, using filesystem types sup-
for Unix find
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 158 -
respective owners.
Default
Setting Description
Value
command ported by the Unix find command -fstype argument. For more
information, see the find command man page.
Debug Settings
Log scan Disabled Logs the start and finish time for each plugin used during a scan to
details nessusd.messages.
Enable plu- Disabled Attaches available debug logs from plugins to the vulnerability out-
gin debug- put of this scan.
ging
Audit Trail Default Controls verbosity of the plugin audit trail. All audit trail data
Verbosity includes the reason why plugins were not included in the scan.
Include the Default Controls whether to include the scan KB, which includes additional
KB debugging data, in the scan results.
For Nessus scans, Default includes the KB. For agent scans,
Default uses the global setting Include KB Data (agent_merge_
kb) set in Advanced Settings.
Enumerate Disabled Displays a list of plugins that were launched during the scan. You
launched plu- can view the list in scan results under plugin 112154.
gins
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 159 -
respective owners.
Credentials
When you configure a scan or policy's Credentials, the Nessus scanner can be granted local access to
scan the target system without requiring an agent. This can facilitate scanning of a very large network
to determine local exposures or compliance violations. As noted, some steps of policy creation may be
optional. Once created, the policy is saved with recommended settings.
Nessus leverages the ability to log into remote Linux hosts via Secure Shell (SSH); and with Windows
hosts, Nessus leverages a variety of Microsoft authentication technologies. Note that Nessus also uses
the Simple Network Management Protocol (SNMP) to make version and information queries to routers
and switches.
The scan or policy’s Credentials page allows you to configure the Nessus scanner to use authen-
tication credentials during scanning. Configuring credentials allows Nessus to perform a wider variety
of checks that result in more accurate scan results.
Note: By default, when creating credentialed scans or polices, hosts are identified and marked with a
Tenable Asset Identifier (TAI). This globally unique identifier is written to the host's registry or file sys-
tem and subsequent scans can retrieve and use the TAI.
This option is enabled (by default) or disabled in the Advanced > General Settings of a scan or policy's
configuration settings: Create unique identifier on hosts scanned using credentials
There are several forms of authentication supported including but not limited to databases, SSH, Win-
dows, network devices, patch management servers, and various plaintext authentication protocols.
In addition to operating system credentials, Nessus supports other forms of local authentication.
The following types of credentials are managed in the Credentials section of the scan or policy:
l Cloud Services
l Database, which includes MongoDB, Oracle, MySQL, DB2, PostgreSQL, and SQL Server
l Miscellaneous services, which include VMware, Red Hat Enterprise Virtualization (RHEV), IBM
iSeries, Palo Alto Networks PAN-OS, and directory services (ADSI and X.509)
l Plaintext authentication mechanisms including FTP, HTTP, POP3, and other services
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 160 -
respective owners.
Credentialed scans can perform any operation that a local user can perform. The level of scanning is
dependent on the privileges granted to the user account. The more privileges the scanner has via the
login account (e.g., root or administrator access), the more thorough the scan results.
Note: Nessus opens several concurrent authenticated connections. Ensure that the host being audited
does not have a strict account lockout policy based on concurrent sessions.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 161 -
respective owners.
Cloud Services
Nessus supports Amazon Web Services (AWS), Microsoft Azure, Rackspace, and Salesforce.com.
AWS
Users can select Amazon AWS from the Credentials menu and enter credentials for compliance audit-
ing an account in AWS.
Option Description
AWS Secret Key AWS secret key that provides the authentication for AWS Access Key ID.
Regions Rest of In order for Nessus to audit an AWS account, you must define the regions
to access the you want to scan. Per Amazon policy, you need different credentials to
World audit account configuration for the China region than you need for the
Rest of the World. Choosing the Rest of the World opens the fol-
lowing choices:
l us-east-1
l us-east-2
l us-west-1
l us-west-2
l ca-central-1
l eu-west-1
l eu-west-2
l eu-central-1
l ap-northeast-1
l ap-northeast-2
l ap-southeast-1
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 162 -
respective owners.
l ap-southeast-2
l sa-east-1
l us-gov-west-1
Verify SSL Enabled Verify the validity of the SSL digital certificate.
Certificate
Microsoft Azure
Option Description
Client Id The application ID (also known as client ID) for your registered application.
Subscription List subscription IDs to scan, separated by a comma. If this field is blank, all sub-
IDs scriptions will be audited.
Office 365
Option Description
Client Id The application ID (also known as client ID) for your registered application.
Rackspace
Option Description
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 163 -
respective owners.
Authentication Specify Password or API-Key from the drop-down box.
Method
Salesforce.com
Users can select Salesforce.com from the Credentials menu. This allows Nessus to log in to Sales-
force.com as the specified user to perform compliance audits.
Option Description
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 164 -
respective owners.
Database
Nessus supports database authentication using PostgreSQL, DB2, MySQL SQL Server, Oracle, and Mon-
goDB.
Database
Nessus supports the following authentication methods:
Password
Option Description
Database Nessus supports Oracle, SQL Server, MySQL, DB2, Informix/DRDA, and Post-
Type greSQL.
Option Description
Central Cre- The port on which the CyberArk Central Credential Provider is listening.
dential Provider
Port
CyberArk AIM The URL of the AIM service. By default, this field uses /AIMWeb-
Service URL service/v1.1/AIM.asmx.
Central Cre- If the CyberArk Central Credential Provider is configured to use basic authen-
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 165 -
respective owners.
Option Description
dential Provider tication, you can fill in this field for authentication.
Username
Central Cre- If the CyberArk Central Credential Provider is configured to use basic authen-
dential Provider tication, you can fill in this field for authentication.
Password
Safe The safe on the CyberArk Central Credential Provider server that contained the
authentication information you would like to retrieve.
CyberArk Client The file that contains the PEM certificate used to communicate with the Cyber-
Certificate Ark host.
CyberArk Client The file that contains the PEM private key for the client certificate.
Certificate Priv-
ate Key
CyberArk Client (Optional) The passphrase for the private key, if required.
Certificate Priv-
ate Key Pass-
phrase
AppId The AppId that has been allocated permissions on the CyberArk Central Cre-
dential Provider to retrieve the target password.
Folder The folder on the CyberArk Central Credential Provider server that contains the
authentication information you would like to retrieve.
CyberArk The unique name of the credential you want to retrieve from CyberArk.
Account Details
Name
Use SSL If CyberArk Central Credential Provider is configured to support SSL through IIS
check for secure communication.
Verify SSL Cer- If CyberArk Central Credential Provider is configured to support SSL through IIS
tificate and you want to validate the certificate, select this option. Refer to the custom_
CA.inc documentation for how to use self-signed certificates.
Database Type Nessus supports Oracle, SQL Server, MySQL, DB2, Informix/DRDA, and Post-
greSQL.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 166 -
respective owners.
Lieberman (Nessus Manager only)
Option Description Required
Lieberman user The Lieberman explicit user for authenticating to the Lieberman yes
API.
Lieberman pass- The password for the Lieberman explicit user. yes
word
Lieberman The alias used for the authenticator in Lieberman. The name no
Authenticator should match the name used in Lieberman.
Lieberman Cli- The file that contains the PEM certificate used to communicate no
ent Certificate with the Lieberman host.
Note: If you use this option, you do not have to enter inform-
ation in the Lieberman user, Lieberman password, and Lieber-
man Authenticator fields.
Lieberman Cli- The file that contains the PEM private key for the client cer- no
ent Certificate tificate.
Private Key
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 167 -
respective owners.
Option Description Required
Use SSL If Lieberman is configured to support SSL through IIS, check for no
secure communication.
Verify SSL Cer- If Lieberman is configured to support SSL through IIS and you no
tificate want to validate the certificate, check this option. Refer to Cus-
tom CA documentation for how to use self-signed certificates.
System Name In the rare case your organization uses one default Lieberman no
entry for all managed systems, enter the default entry name.
Database Port The port on which Nessus communicates with the database. yes
Database Name (PostgreSQL and DB2 databases only) The name of the database. no
MongoDB
Option Description
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 168 -
respective owners.
Host
l SNMPv3
l Windows
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 169 -
respective owners.
SNMPv3
Users can select SNMPv3 settings from the Credentials menu and enter credentials for scanning sys-
tems using an encrypted network management protocol.
These credentials are used to obtain local information from remote systems, including network
devices, for patch auditing or compliance checks.
There is a field for entering the SNMPv3 user name for the account that will perform the checks on the
target system, along with the SNMPv3 port, security level, authentication algorithm and password, and
privacy algorithm and password.
If Nessus is unable to determine the community string or password, it may not perform a full audit of
the service.
Option Description
Port Direct Nessus to scan a different port if SNMP is running on a port other
than 161.
Security level Select the security level for SNMP: authentication, privacy, or both.
Authentication Select MD5 or SHA1 based on which algorithm the remote service sup-
algorithm ports.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 170 -
respective owners.
SSH
On Linux systems and supported network devices, Nessus uses Secure Shell (SSH) protocol version 2
based programs (e.g., OpenSSH, Solaris SSH, etc.) for host-based checks.
This mechanism encrypts the data in transit to protect it from being viewed by sniffer programs. Nes-
sus supports five types of authentication methods for use with SSH: username and password, pub-
lic/private keys, digital certificates, and Kerberos.
Users can select SSH settings from the Credentials menu and enter credentials for scanning Linux sys-
tems.
These credentials are used to obtain local information from remote Linux systems for patch auditing
or compliance checks.
Note: Non-privileged users with local access on Linux systems can determine basic security issues,
such as patch levels or entries in the /etc/passwd file. For more comprehensive information, such as
system configuration data or file permissions across the entire system, an account with root privileges
is required
Default
Option Description
Value
Preferred port 22 This option can be set to direct Nessus to connect to SSH if it is
running on a port other than 22.
Client version OpenSSH_ Specifies which type of SSH client Nessus will impersonate while
5.0 scanning.
Attempt least Cleared Enables or disables dynamic privilege escalation. When enabled,
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 171 -
respective owners.
Default
Option Description
Value
privilege Nessus attempts to run the scan with an account with lesser priv-
(experimental) ileges, even if the Elevate privileges with option is enabled. If a
command fails, Nessus will escalate privileges. Plugins 102095 and
102094 report which plugins ran with or without escalated priv-
ileges.
Public Key
Public Key Encryption, also referred to as asymmetric key encryption, provides a more secure authen-
tication mechanism by the use of a public and private key pair. In asymmetric cryptography, the public
key is used to encrypt data and the private key is used to decrypt it. The use of public and private keys
is a more secure and flexible method for SSH authentication. Nessus supports both DSA and RSA key
formats.
Like Public Key Encryption, Nessus supports RSA and DSA OpenSSH certificates. Nessus also requires
the user certificate, which is signed by a Certificate Authority (CA), and the user’s private key.
Note: Nessus supports the OpenSSH SSH public key format. Formats from other SSH applications,
including PuTTY and SSH Communications Security, must be converted to OpenSSH public key format.
The most effective credentialed scans are when the supplied credentials have root privileges. Since
many sites do not permit a remote login as root, Nessus can invoke su, sudo, su+sudo, dzdo, .k5login,
or pbrun with a separate password for an account that has been set up to have su or sudo privileges.
In addition, Nessus can escalate privileges on Cisco devices by selecting Cisco ‘enable’ or .k5login for
Kerberos logins.
Note: Nessus supports the blowfish-cbc, aes-cbc, and aes-ctr cipher algorithms. Some commercial vari-
ants of SSH do not have support for the blowfish algorithm, possibly for export reasons. It is also pos-
sible to configure an SSH server to only accept certain types of encryption. Check your SSH server to
ensure the correct algorithm is supported.
Nessus encrypts all passwords stored in policies. However, the use of SSH keys for authentication
rather than SSH passwords is recommended. This helps ensure that the same username and password
you are using to audit your known SSH servers is not used to attempt a log in to a system that may not
be under your control.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 172 -
respective owners.
Note: For supported network devices, Nessus will only support the network device’s username and pass-
word for SSH connections.
If an account other than root must be used for privilege escalation, it can be specified under the Escal-
ation account with the Escalation password.
Option Description
Username Username of the account which is being used for authentication on the
host system.
Private Key RSA or DSA Open SSH key file of the user.
Certificate
Option Description
Username Username of the account which is being used for authentication on the
host system.
User Certificate RSA or DSA Open SSH certificate file of the user.
Private Key RSA or DSA Open SSH key file of the user.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 173 -
respective owners.
Option Description
CyberArk AIM The URL of the AIM service. By default, this field uses /AIMWeb-
Service URL service/v1.1/AIM.asmx.
Central Cre- The port on which the CyberArk Central Credential Provider is listening.
dential Provider
Port
Central Cre- If the CyberArk Central Credential Provider is configured to use basic authen-
dential Provider tication, you can fill in this field for authentication.
Username
Central Cre- If the CyberArk Central Credential Provider is configured to use basic authen-
dential Provider tication, you can fill in this field for authentication.
Password
Safe The safe on the CyberArk Central Credential Provider server that contained the
authentication information you would like to retrieve.
CyberArk Client The file that contains the PEM certificate used to communicate with the Cyber-
Certificate Ark host.
CyberArk Client The file that contains the PEM private key for the client certificate.
Certificate Priv-
ate Key
CyberArk Client (Optional) The passphrase for the private key, if required.
Certificate Priv-
ate Key Pass-
phrase
AppId The AppId that has been allocated permissions on the CyberArk Central Cre-
dential Provider to retrieve the target password.
Folder The folder on the CyberArk Central Credential Provider server that contains
the authentication information you would like to retrieve.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 174 -
respective owners.
Option Description
PolicyId The PolicyID assigned to the credentials you would like to retrieve from the
CyberArk Central Credential Provider.
Use SSL If CyberArk Central Credential Provider is configured to support SSL through
IIS check for secure communication.
Verify SSL Cer- If CyberArk Central Credential Provider is configured to support SSL through
tificate IIS and you want to validate the certificate check this. Refer to the custom_
CA.inc documentation for how to use self-signed certificates.
CyberArk The unique name of the credential you want to retrieve from CyberArk.
Account Details
Name
CyberArk Elev- The privilege escalation method you want to use to increase the user's priv-
ate Privileges ileges after initial authentication. Your selection determines the specific
With options you must configure.
Kerberos
Kerberos, developed by MIT’s Project Athena, is a client/server application that uses a symmetric key
encryption protocol. In symmetric encryption, the key used to encrypt the data is the same as the key
used to decrypt the data. Organizations deploy a KDC (Key Distribution Center) that contains all users
and services that require Kerberos authentication. Users authenticate to Kerberos by requesting a TGT
(Ticket Granting Ticket). Once a user is granted a TGT, it can be used to request service tickets from the
KDC to be able to utilize other Kerberos based services. Kerberos uses the CBC (Cipher Block Chain)
DES encryption protocol to encrypt all communications.
Note: You must already have a Kerberos environment established to use this method of authentication.
The Nessus implementation of Linux-based Kerberos authentication for SSH supports the aes-cbc and
aes-ctr encryption algorithms. An overview of how Nessus interacts with Kerberos is as follows:
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 175 -
respective owners.
l nessusd requests a Kerberos TGT, along with login and password
l nessusd is logged in
In both Windows and SSH credentials settings, you can specify credentials using Kerberos keys from a
remote system. Note that there are differences in the configurations for Windows and SSH.
Option Description
Key Dis- This host supplies the session tickets for the user.
tribution
Center
(KDC)
KDC Port This option can be set to direct Nessus to connect to the KDC if it is running on a
port other than 88.
KDC Trans- The KDC uses TCP by default in Linux implementations. For UDP, change this
port option. Note that if you need to change the KDC Transport value, you may also
need to change the port as the KDC UDP uses either port 88 or 750 by default,
depending on the implementation.
Realm The Realm is the authentication domain, usually noted as the domain name of the
target (e.g., example.com).
If Kerberos is used, sshd must be configured with Kerberos support to verify the ticket with the KDC.
Reverse DNS lookups must be properly configured for this to work. The Kerberos interaction method
must be gssapi-with-mic.
Password
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 176 -
respective owners.
Option Description
Username The username that is used to authenticate via ssh to the system.
(required)
Domain Set the domain the username is part of if using Windows credentials.
Thycotic This is the value that the secret is stored as on the Thycotic server. It is referred to
Secret Name as the “Secret Name” on the Thycotic server.
(required)
Thycotic This is used to set the transfer method, target , and target directory for the scan-
Secret ner. The value can be found in Admin > Configuration > Application Settings >
Server URL Secret Server URL on the Thycotic server. For example consider the following
(required) address https://pw.mydomain.com/SecretServer/. We will parse this to know that
https defines it is a ssl connection, pw.mydomain.com is the target address,
/SecretServer/ is the root directory.
Thycotic This value is used in cloud instances of Thycotic to define which organization your
Organization query should hit.
(required)
Thycotic This is an optional value set if the domain value is set for the Thycotic server.
Domain
(optional)
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 177 -
respective owners.
Private Key Use key based authentication for SSH connections instead of password.
(optional)
Verify SSL Verify if the SSL Certificate on the server is signed by a trusted CA.
Certificate
Thycotic elev- The privilege escalation method you want to use to increase the user's privileges
ate priv- after initial authentication. Multiple options for privilege escalation are supported,
ileges with including su, su+sudo and sudo. Your selection determines the specific options
you must configure.
Checkout (Required) The length of time, in minutes, that you want to keep credentials
duration checked out in BeyondTrust. Configure the Checkout duration to exceed the typ-
ical duration of your Nessus scans. If a password from a previous scan is still
checked out when a new scan begins, the new scan fails.
Use SSL If enabled, Nessus uses SSL through IIS for secure communications. You must con-
figure SSL through IIS in BeyondTrust before enabling this option.
Verify SSL If enabled, Nessus validates the SSL certificate. You must configure SSL through IIS
certificate in BeyondTrust before enabling this option.
Use private If enabled, Nessus uses private key-based authentication for SSH connections
key instead of password authentication. If it fails, the password will be requested.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 178 -
respective owners.
Use priv- If enabled, BeyondTrust uses the configured privilege escalation command. If it
ilege escal- returns something, it will use it for the scan.
ation
Lieberman The Lieberman explicit user for authenticating to the Lieberman yes
user RED API.
Lieberman The alias used for the authenticator in Lieberman. The name no
Authenticator should match the name used in Lieberman.
Lieberman Cli- The file that contains the PEM certificate used to communicate no
ent Certificate with the Lieberman host.
Note: If you use this option, you do not have to enter information
in the Lieberman user, Lieberman password, and Lieberman
Authenticator fields.
Lieberman Cli- The file that contains the PEM private key for the client certificate. no
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 179 -
respective owners.
Option Description Required
ent Certificate
Private Key
Use SSL If Lieberman is configured to support SSL through IIS, check for no
secure communication.
Verify SSL Cer- If Lieberman is configured to support SSL through IIS and you no
tificate want to validate the certificate, check this option. Refer to Custom
CA documentation for how to use self-signed certificates.
System Name In the rare case your organization uses one default Lieberman no
entry for all managed systems, enter the default entry name.
Custom pass- The password prompt used by the target host. Only use this set- no
word prompt ting when an interactive SSH session fails due to Nessus receiving
an unrecognized password prompt on the target host's interactive
SSH shell.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 180 -
respective owners.
Windows
The Windows credentials menu item has settings to provide Nessus with information such as SMB
account name, password, and domain name. By default, you can specify a username, password, and
domain with which to log in to Windows hosts. Additionally, Nessus supports several different types of
authentication methods for Windows-based systems: CyberArk, Kerberos, LM Hash, NTLM Hash, and
Thycotic Secret Server.
l The Lanman authentication method was prevalent on Windows NT and early Windows 2000
server deployments. It is retained for backward compatibility.
l The NTLM authentication method, introduced with Windows NT, provided improved security
over Lanman authentication. The enhanced version, NTLMv2, is cryptographically more secure
than NTLM and is the default authentication method chosen by Nessus when attempting to log
into a Windows server. NTLMv2 can make use of SMB Signing.
l SMB signing is a cryptographic checksum applied to all SMB traffic to and from a Windows
server. Many system administrators enable this feature on their servers to ensure that remote
users are 100% authenticated and part of a domain. In addition, make sure you enforce a policy
that mandates the use of strong passwords that cannot be easily broken via dictionary attacks
from tools like John the Ripper and L0phtCrack. It is automatically used by Nessus if it is
required by the remote Windows server. Note that there have been many different types of
attacks against Windows security to illicit hashes from computers for re-use in attacking servers.
SMB Signing adds a layer of security to prevent these man-in-the-middle attacks.
l The SPNEGO (Simple and Protected Negotiate) protocol provides Single Sign On (SSO) capability
from a Windows client to a variety of protected resources via the users’ Windows login cre-
dentials. Nessus supports use of SPNEGO Scans and Policies: Scans 54 of 151 with either
NTLMSSP with LMv2 authentication or Kerberos and RC4 encryption. SPNEGO authentication hap-
pens through NTLM or Kerberos authentication; nothing needs to be configured in the Nessus
policy.
l If an extended security scheme (such as Kerberos or SPNEGO) is not supported or fails, Nessus
will attempt to log in via NTLMSSP/LMv2 authentication. If that fails, Nessus will then attempt to
log in using NTLM authentication.
l Nessus also supports the use of Kerberos authentication in a Windows domain. To configure
this, the IP address of the Kerberos Domain Controller (actually, the IP address of the Windows
Active Directory Server) must be provided.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 181 -
respective owners.
Server Message Block (SMB) is a file-sharing protocol that allows computers to share information
across the network. Providing this information to Nessus will allow it to find local information from a
remote Windows host. For example, using credentials enables Nessus to determine if important secur-
ity patches have been applied. It is not necessary to modify other SMB parameters from default set-
tings.
The SMB domain field is optional and Nessus will be able to log on with domain credentials without
this field. The username, password, and optional domain refer to an account that the target machine
is aware of. For example, given a username of joesmith and a password of my4x4mpl3, a Windows
server first looks for this username in the local system’s list of users, and then determines if it is part
of a domain.
Regardless of credentials used, Nessus always attempts to log into a Windows server with the fol-
lowing combinations:
The actual domain name is only required if an account name is different on the domain from that on
the computer. It is entirely possible to have an Administrator account on a Windows server and within
the domain. In this case, to log onto the local server, the username of Administrator is used with the
password of that account. To log onto the domain, the Administrator username would also be used,
but with the domain password and the name of the domain.
When multiple SMB accounts are configured, Nessus will try to log in with the supplied credentials
sequentially. Once Nessus is able to authenticate with a set of credentials, it will check subsequent cre-
dentials supplied, but only use them if administrative privileges are granted when previous accounts
provided user access.
Some versions of Windows allow you to create a new account and designate it as an administrator.
These accounts are not always suitable for performing credentialed scans. Tenable recommends that
the original administrative account, named Administrator be used for credentialed scanning to ensure
full access is permitted. On some versions of Windows, this account may be hidden. The real admin-
istrator account can be unhidden by running a DOS prompt with administrative privileges and typing
the following command:
If an SMB account is created with limited administrator privileges, Nessus can easily and securely scan
multiple domains. Tenable recommends that network administrators consider creating specific
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 182 -
respective owners.
domain accounts to facilitate testing. Nessus includes a variety of security checks for Windows Vista,
Windows 7, Windows 8, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Win-
dows Server 2012 R2 that are more accurate if a domain account is provided. Nessus does attempt to
try several checks in most cases if no account is provided.
Note: The Windows Remote Registry service allows remote computers with credentials to access the
registry of the computer being audited. If the service is not running, reading keys and values from the
registry will not be possible, even with full credentials. This service must be started for a Nessus cre-
dentialed scan to fully audit a system using credentials.
For more information, see the Tenable, Inc. blog post Dynamic Remote Registry Auditing - Now you
see it, now you don’t!
Credentialed scans on Windows systems require that a full administrator level account be used.
Several bulletins and software updates by Microsoft have made reading the registry to determine soft-
ware patch level unreliable without administrator privileges, but not all of them. Nessus plugins will
check that the provided credentials have full administrative access to ensure they execute properly.
For example, full administrative access is required to perform direct reading of the file system. This
allows Nessus to attach to a computer and perform direct file analysis to determine the true patch
level of the systems being evaluated.
Never send Enabled For security reasons, Windows credentials are not sent in the clear
credentials in by default.
the clear
Do not use Enabled If this option is disabled, then it is theoretically possible to trick Nes-
NTLMv1 sus into attempting to log into a Windows server with domain cre-
authentication dentials via the NTLM version 1 protocol. This provides the remote
attacker with the ability to use a hash obtained from Nessus. This
hash can be potentially cracked to reveal a username or password.
It may also be used to directly log into other servers. Force Nessus
to use NTLMv2 by enabling the Only use NTLMv2 setting at scan
time. This prevents a hostile Windows server from using NTLM and
receiving a hash. Because NTLMv1 is an insecure protocol this
option is enabled by default.
Start the Disabled This option tells Nessus to start the Remote Registry service on com-
Remote puters being scanned if it is not running. This service must be run-
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 183 -
respective owners.
Option Default Description
Registry ser- ning in order for Nessus to execute some Windows local check plu-
vice during gins.
the scan
Enable admin- Disabled This option will allow Nessus to access certain registry entries that
istrative can be read with administrator privileges.
shares during
the scan
Option Description
CyberArk AIM The URL of the AIM service. By default, this field uses /AIMWeb-
Service URL service/v1.1/AIM.asmx.
Central Cre- The port on which the CyberArk Central Credential Provider is listening.
dential Provider
Port
Central Cre- If the CyberArk Central Credential Provider is configured to use basic authen-
dential Provider tication, you can fill in this field for authentication.
Username
Central Cre- If the CyberArk Central Credential Provider is configured to use basic authen-
dential Provider tication, you can fill in this field for authentication.
Password
Safe The safe on the CyberArk Central Credential Provider server that contained
the authentication information you would like to retrieve.
CyberArk Client The file that contains the PEM certificate used to communicate with the Cyber-
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 184 -
respective owners.
Option Description
CyberArk Client The file that contains the PEM private key for the client certificate.
Certificate Priv-
ate Key
AppId The AppId that has been allocated permissions on the CyberArk Central Cre-
dential Provider to retrieve the target password.
Folder The folder on the CyberArk Central Credential Provider server that contains
the authentication information you would like to retrieve.
PolicyId The PolicyID assigned to the credentials you would like to retrieve from the
CyberArk Central Credential Provider.
Use SSL If CyberArk Central Credential Provider is configured to support SSL through
IIS check for secure communication.
Verify SSL Cer- If CyberArk Central Credential Provider is configured to support SSL through
tificate IIS and you want to validate the certificate check this. Refer to custom_CA.inc
documentation for how to use self-signed certificates.
CyberArk The unique name of the credential you want to retrieve from CyberArk.
Account Details
Name
Kerberos
Option Default Description
Password none Like with other credentials methods, this is the user password on the
target system. This is a required field.
Key Dis- none This host supplies the session tickets for the user. This is a required
tribution field.
Center
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 185 -
respective owners.
Option Default Description
(KDC)
KDC Port 88 This option can be set to direct Nessus to connect to the KDC if it is run-
ning on a port other than 88.
KDC Trans- TCP Note that if you need to change the KDC Transport value, you may also
port need to change the port as the KDC UDP uses either port 88 or 750 by
default, depending on the implementation.
Domain none The Windows domain that the KDC administers. This is a required field.
LM Hash
Option Description
NTLM Hash
Option Description
Thycotic (Required) The value you want Nessus to use when setting the transfer method,
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 186 -
respective owners.
Secret target, and target directory for the scanner. Find the value on the Thycotic server,
Server URL in Admin > Configuration > Application Settings > Secret Server URL.
Thycotic (Required) The password associated with the Thycotic Login Name you
Password provided.
Thycotic In cloud instances of Thycotic, the value that identifies which organization the Nes-
Organization sus query should target.
Private Key If enabled, Nessus uses key-based authentication for SSH connections instead of
password authentication.
Verify SSL If enabled, Nessus verifies the SSL Certificate on the Thycotic server.
Certificate
For more information about using self-signed certificates, see Custom SSL Cer-
tificates.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 187 -
respective owners.
Checkout (Required) The length of time, in minutes, that you want to keep credentials
duration checked out in BeyondTrust. Configure the Checkout duration to exceed the typ-
ical duration of your Nessus scans. If a password from a previous scan is still
checked out when a new scan begins, the new scan fails.
Use SSL If enabled, Nessus uses SSL through IIS for secure communications. You must con-
figure SSL through IIS in BeyondTrust before enabling this option.
Verify SSL If enabled, Nessus validates the SSL certificate. You must configure SSL through IIS
certificate in BeyondTrust before enabling this option.
Use private If enabled, Nessus uses private key-based authentication for SSH connections
key instead of password authentication. If it fails, the password will be requested.
Use priv- If enabled, BeyondTrust uses the configured privilege escalation command. If it
ilege escal- returns something, it will use it for the scan.
ation
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 188 -
respective owners.
Option Description Required
Lieberman password The password for the Lieberman explicit user. yes
Lieberman Client Certificate The file that contains the PEM certificate used to no
communicate with the Lieberman host.
Lieberman Client Certificate The file that contains the PEM private key for the no
Private Key client certificate.
Lieberman Client Certificate The passphrase for the private key, if required. no
Private Key Passphrase
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 189 -
respective owners.
Miscellaneous
This section includes information and settings for credentials in the Miscellaneous section.
ADSI
ADSI requires the domain controller information, domain, and domain admin and password.
ADSI allows Nessus to query an ActiveSync server to determine if any Android or iOS-based devices are
connected. Using the credentials and server information, Nessus authenticates to the domain con-
troller (not the Exchange server) to directly query it for device information. This feature does not
require any ports be specified in the scan policy. These settings are required for mobile device scan-
ning.
Option Description
Nessus supports obtaining the mobile information from Exchange Server 2010 and 2013 only; Nessus
cannot retrieve information from Exchange Server 2007.
F5
Option Description
HTTPS When enabled, connect using secure communication (HTTPS). When disabled,
connect using standard HTTP.
Verify SSL Cer- Verify that the SSL certificate is valid. If you are using a self-signed certificate, dis-
tificate able this setting.
IBM iSeries
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 190 -
respective owners.
Option Description
Netapp API
Option Description
Username (Required) Username for an account on the Netapp system that has HTTPS access.
vFiler If this setting is blank, the scan audits for all discovered Netapp virtual filers (vFilers)
on target systems. To limit the audit to a single vFiler, type the name of the vFiler.
Port Ports to scan on target systems. Type a comma-separated list of port numbers.
OpenStack
Option Description
Tenant Name (Required) Name of the specific tenant the scan uses to authenticate. A tenant
for Authentic- (also known as a project) is a group of resources that can be controlled by users
ation in the tenant.
HTTPS When enabled, connect using secure communication (HTTPS). When disabled,
connect using standard HTTP.
Verify SSL Cer- Verify that the SSL certificate is valid. If you are using a self-signed certificate, dis-
tificate able this setting.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 191 -
respective owners.
Password (Required) The Pan-OS password.
Verify SSL Cer- Verify that the SSL certificate is valid. If the target is using a self-signed cer-
tificate tificate, disable this setting.
Password Username to the password to login to the RHEV server. This is a required
field.
Verify SSL Cer- Verify that the SSL certificate for the RHEV server is valid.
tificate
Option Description
Do not verify SSL Cer- Do not verify that the SSL certificate for the ESXi server is valid.
tificate
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 192 -
respective owners.
Credential Description
Verify SSL Certificate Verify that the SSL certificate for the ESXi server is valid.
X.509
Option Description
CA certificate to trust (Required) The trusted Certificate Authority's (CA) digital certificate.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 193 -
respective owners.
Mobile
AirWatch
Option Description
AirWatch Environment API URL The URL of the SOAP or REST API
(required)
API Keys (required) The API Key for the Airwatch REST API
Verify SSL Certificate Verify if the SSL Certificate on the server is signed by a trus-
ted CA.
Server (required) The server URL to authenticate with Apple Profile Manager
Port Set to use a different port to authenticate with Apple Profile Man-
ager
Verify SSL Certificate Verify if the SSL Certificate on the server is signed by a trusted CA.
Force device updates Force devices to update with Apple Profile Manager immediately
Device update timeout Number of minutes to wait for devices to reconnect with Apple Pro-
(minutes) file Manager
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 194 -
respective owners.
Good MDM
Option Description
Port (required) Set the port to use to authenticate with Good MDM
Verify SSL Certificate Verify if the SSL Certificate on the server is signed by a trusted CA.
MaaS360
Option Description
App access key (required) The App Access Key provided for MaaS360
MobileIron
Option Description
VSP Admin The server URL Nessus uses to authenticate to the MobileIron administrator portal.
Portal URL
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 195 -
respective owners.
Portal portal (typically, port 443 or 8443). The system assumes port 443 by default.
Port
Port (Optional) The port Nessus uses to authenticate to MobileIron (typically, port 443).
Username The username for the account you want Nessus to use to authenticate to MobileIron.
Password The password for the account you want Nessus to use to authenticate to MobileIron.
Verify SSL When enabled, Nessus verifies that the SSL Certificate on the server is signed by a
Certificate trusted CA.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 196 -
respective owners.
Patch Management
Nessus Manager can leverage credentials for the Red Hat Network Satellite, IBM BigFix, Dell KACE 1000,
WSUS, and SCCM patch management systems to perform patch auditing on systems for which cre-
dentials may not be available to the Nessus scanner.
Options for these patch management systems can be found under Credentials in their respective
drop-down boxes: Symantec Altiris, IBM BigFix, Red Hat Satellite Server, Microsoft SCCM, Dell KACE
K1000, and Microsoft WSUS.
IT administrators are expected to manage the patch monitoring software and install any agents
required by the patch management system on their systems.
l IBM BigFix
l Symantec Altiris
If you provide credentials for a host, as well as one or more patch management systems, Nessus com-
pares the findings between all methods and report on conflicts or provide a satisfied finding. Use the
Patch Management Windows Auditing Conflicts plugins to highlight patch data differences between the
host and a patch management system.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 197 -
respective owners.
l If the credential check sees a system but it is unable to authenticate against the system, it uses
the data obtained from the patch management system to perform the check. If Nessus is able to
connect to the target system, it performs checks on that system and ignores KACE K1000 output.
l The data returned to Nessus by KACE K1000 is only as current as the most recent data that the
KACE K1000 has obtained from its managed hosts.
You must provide credentials for the Dell KACE K1000 system for K1000 scanning to work properly.
Under the Credentials tab, select Patch Management, then select Dell KACE K1000.
Server none KACE K1000 IP address or system name. This is a required field.
Database 3306 Port the K1000 database is running on (typically TCP 3306).
Port
Organization ORG1 The name of the organization component for the KACE K1000 data-
Database base. This component will begin with the letters ORG and end with a
Name number that corresponds with the K1000 database username.
Database none Username required to log into the K1000 database. R1 is the default if
Username no user is defined. The username will begin with the letter R. This user-
name will end in the same number that represents the number of the
organization to scan. This is a required field
K1000 Data- none Password required to authenticate the K1000 Database Username.
base Pass- This is a required field.
word
IBM BigFix
IBM BigFix is available from IBM to manage the distribution of updates and hotfixes for desktop sys-
tems. Nessus and Tenable.sc have the ability to query IBM BigFix to verify whether or not patches are
installed on systems managed by IBM BigFix and display the patch information.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 198 -
respective owners.
l If the credential check sees a system but it is unable to authenticate against the system, it will
use the data obtained from the patch management system to perform the check. If Nessus is
able to connect to the target system, it will perform checks on that system and ignore IBM BigFix
output.
l The data returned to Nessus by TEM is only as current as the most recent data that the IBM BigFix
server has obtained from its managed hosts.
l Patch Management: Tivoli Endpoint Manager Compute Info Initialization (Plugin ID 62559)
l Patch Management: Missing updates from Tivoli Endpoint Manager (Plugin ID 62560)
l Patch Management: IBM Tivoli Endpoint Manager Server Settings (Plugin ID 62558)
l Patch Management: Tivoli Endpoint Manager Get Installed Packages (Plugin ID 65703)
Credentials for the IBM BigFix server must be provided for IBM BigFix scanning to work properly.
Web Reports Server None Name of IBM BigFix Web Reports Server
Web Reports Port none Port that the IBM BigFix Web Reports Server listens
Verify SSL certificate Enabled Verify that the SSL certificate is valid
Package reporting is supported by RPM-based and Debian-based distributions that IBM BigFix officially
supports. This includes Red Hat derivatives such as RHEL, CentOS, Scientific Linux, and Oracle Linux, as
well as Debian and Ubuntu. Other distributions may also work, but unless IBM BigFix officially supports
them, there is no support available.
For local check plugins to trigger, only RHEL, CentOS, Scientific Linux, Oracle Linux, Debian, and
Ubuntu are supported. The plugin Patch Management: Tivoli Endpoint Manager Get Installed Packages
must be enabled.
In order to use these auditing features, you must make changes to the IBM BigFix server. You must
import a custom analysis into IBM BigFix so that detailed package information is retrieved and made
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 199 -
respective owners.
available to Nessus. Before beginning, save the following text to a file on the IBM BigFix system, and
name it with a .bes extension.
l If the credentialed check sees a system but it is unable to authenticate against the system, it will
use the data obtained from the patch management system to perform the check. If Nessus is
able to connect to the target system, it will perform checks on that system and ignore SCCM out-
put.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 200 -
respective owners.
l The data returned by SCCM is only as current as the most recent data that the SCCM server has
obtained from its managed hosts.
l Nessus connects to the server that is running the SCCM site (e.g., credentials must be valid for
the SCCM service, meaning an admin account in SCCM with the privileges to query all the data in
the SCCM MMC). This server may also run the SQL database, or the database as well as the SCCM
repository can be on separate servers. When leveraging this audit, Nessus must connect to the
SCCM Server, not the SQL or SCCM server if they are on a separate box.
Nessus SCCM patch management plugins support SCCM 2007 and SCCM 2012.
Credentials for the SCCM system must be provided for SCCM scanning to work properly. Under the Cre-
dentials tab, select Patch Management and then Microsoft SCCM.
Credential Description
l If the credential check sees a system but it is unable to authenticate against the system, it will
use the data obtained from the patch management system to perform the check. If Nessus is
able to connect to the target system, it will perform checks on that system and ignore WSUS out-
put.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 201 -
respective owners.
l The data returned to Nessus by WSUS is only as current as the most recent data that the WSUS
server has obtained from its managed hosts.
Credentials for the WSUS system must be provided for WSUS scanning to work properly. Under the Cre-
dentials tab, select Patch Management and then Microsoft WSUS.
Verify SSL certificate Enabled Verify that the SSL certificate is valid
Although not supported by Tenable, Inc., the RHN Satellite plugin will also work with Spacewalk Server,
the Open Source Upstream Version of Red Hat Satellite. Spacewalk has the capability of managing dis-
tributions based on Red Hat (RHEL, CentOS, Fedora) and SUSE. Tenable supports the Satellite server
for Red Hat Enterprise Linux.
l If the credential check sees a system, but it is unable to authenticate against the system, it will
use the data obtained from the patch management system to perform the check. If Nessus is
able to connect to the target system, it will perform checks on that system and ignore RHN Satel-
lite output.
l The data returned to Nessus by RHN Satellite is only as current as the most recent data that the
Satellite server has obtained from its managed hosts.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 202 -
respective owners.
Satellite scanning is performed using five Nessus plugins:
l Patch Management: Patch Schedule From Red Hat Satellite Server (Plugin ID 84236)
l Patch Management: Red Hat Satellite Server Get Installed Packages (Plugin ID 84235)
l Patch Management: Red Hat Satellite Server Get Managed Servers (Plugin ID 84234)
l Patch Management: Red Hat Satellite Server Get System Information (Plugin ID 84237)
If the RHN Satellite server is version 6, three additional Nessus plugins are used:
l Patch Management: Red Hat Satellite Server Get Installed Packages (Plugin ID 84231)
Verify SSL Certificate Enabled Verify that the SSL certificate is valid
Symantec Altris
Altiris is available from Symantec to manage the distribution of updates and hotfixes for Linux, Win-
dows, and Mac OS X systems. Nessus and Tenable.sc have the ability to use the Altiris API to verify
whether or not patches are installed on systems managed by Altiris and display the patch information
through the Nessus or Tenable.sc web interface.
l If the credential check sees a system but it is unable to authenticate against the system, it will
use the data obtained from the patch management system to perform the check. If Nessus is
able to connect to the target system, it will perform checks on that system and ignore Altiris out-
put.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 203 -
respective owners.
l The data returned to Nessus by Altiris is only as current as the most recent data that the Altiris
has obtained from its managed hosts.
l Nessus connects to the Microsoft SQL server that is running on the Altiris host (e.g., credentials
must be valid for the MSSQL database, meaning a database account with the privileges to query
all the data in the Altiris MSSQL database). The database server may be run on a separate host
from the Altiris deployment. When leveraging this audit, Nessus must connect to the MSSQL data-
base, not the Altiris server if they are on a separate box.
Credentials for the Altiris Microsoft SQL (MSSQL) database must be provided for Altiris scanning to
work properly. Under the Credentials tab, select Patch Management and then Symantec Altiris.
Database Port 5690 Port the Altiris database is running on (Typically TCP 5690)
Database Symantec_ The name of the MSSQL database that manages Altiris patch
Name CMDB information.
Database User- None Username required to log into the Altiris MSSQL database. This is
name a required field.
Database Pass- none Password required to authenticate the Altiris MSSQL database.
word This is a required field.
Use Windows Disabled Denotes whether or not to use NTLMSSP for compatibility with
Authentication older Windows Servers, otherwise it will use Kerberos
To ensure Nessus can properly utilize Altiris to pull patch management information, it must be con-
figured to do so.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 204 -
respective owners.
Plaintext Authentication
Caution: Using plaintext credentials is not recommended. Use encrypted authentication methods when
possible.
If a secure method of performing credentialed checks is not available, users can force Nessus to try to
perform checks over unsecure protocols; use the Plaintext Authentication options.
This menu allows the Nessus scanner to use credentials when testing HTTP, NNTP, FTP, POP2, POP3,
IMAP, IPMI, SNMPv1/v2c, and telnet/rsh/rexec.
By supplying credentials, Nessus may have the ability to do more extensive checks to determine vul-
nerabilities. HTTP credentials supplied will be used for Basic and Digest authentication only.
Credentials for FTP, IPMI, NNTP, POP2, and POP3 require only a username and password.
HTTP
There are four different types of HTTP Authentication methods: Automatic authentication, Basic/Digest
authentication, HTTP login form, and HTTP cookies import.
Login method POST Specify if the login action is performed via a GET or POST request.
Follow 30x redir- 0 If a 30x redirect code is received from a web server, this directs
ections Nessus to follow the link provided or not.
(# of levels)
Invert authen- Disabled A regex pattern to look for on the login page, that if found, tells
ticated regex Nessus authentication was not successful (e.g., Authentication
failed!).
Use authen- Disabled Rather than search the body of a response, Nessus can search
ticated regex on the HTTP response headers for a given regex pattern to better
HTTP headers determine authentication state.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 205 -
respective owners.
Option Default Description
Use authen- Disabled The regex searches are case sensitive by default. This instructs
ticated regex on Nessus to ignore case.
HTTP headers
Authentication methods
Automatic authentication
Username and Password Required
Basic/Digest authentication
Username and Password Required
Option Description
Login page The absolute path to the login page of the application, e.g., /login.html.
Login sub- The action parameter for the form method. For example, the login form for
mission page <form method="POST" name="auth_form" action="/login.php"> would be /lo-
gin.php.
Check authen- The absolute path of a protected web page that requires authentication, to bet-
tication on ter assist Nessus in determining authentication status, e.g., /admin.html.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 206 -
respective owners.
Option Description
page
Regex to verify A regex pattern to look for on the login page. Simply receiving a 200 response
successful code is not always sufficient to determine session state. Nessus can attempt to
authentication match a given string such as Authentication successful!
telnet/rsh/rexec
The telnet/rsh/rexec authentication section is also username and password, but there are additional
Global Settings for this section that can allow you to perform patch audits using any of these three pro-
tocols.
SNMPv1/v2c
SNMPv1/v2c configuration allows you to use community strings for authentication to network devices.
Up to 4 SNMP community strings can be configured.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 207 -
respective owners.
Compliance
Nessus can perform vulnerability scans of network services as well as log in to servers to discover any
missing patches.
However, a lack of vulnerabilities does not mean the servers are configured correctly or are “com-
pliant” with a particular standard.
The advantage of using Nessus to perform vulnerability scans and compliance audits is that all of this
data can be obtained at one time. Knowing how a server is configured, how it is patched and what vul-
nerabilities are present can help determine measures to mitigate risk.
At a higher level, if this information is aggregated for an entire network or asset class, security and risk
can be analyzed globally. This allows auditors and network managers to spot trends in non-compliant
systems and adjust controls to fix these on a larger scale.
When configuring a scan or policy, you can include one or more compliance checks.
FireEye SSH
HP ProCurve SSH
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 208 -
respective owners.
Huawei SSH
MongoDB MongoDB
Rackspace Rackspace
RHEV RHEV
Unix SSH
VMware vCenter/vSphere VMware ESX SOAP API or VMware vCenter SOAP API
WatchGuard SSH
Windows Windows
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 209 -
respective owners.
SCAP Settings
Security Content Automation Protocol (SCAP) is an open standard that enables automated man-
agement of vulnerabilities and policy compliance for an organization. It relies on multiple open stand-
ards and policies, including OVAL, CVE, CVSS, CPE, and FDCC policies.
When you select the SCAP and OVAL Auditing template, you can modify SCAP settings.
You can select Linux (SCAP), Linux (OVAL), Windows (SCAP), or Windows (OVAL). The settings for
each option are described in the following table.
Default
Setting Description
Value
SCAP File None A valid zip file that contains full SCAP content (XCCDF, OVAL,
and CPE for versions 1.0 and 1.1; DataStream for version
1.2).
SCAP Version 1.2 The SCAP version that is appropriate for the content in the
uploaded SCAP file.
SCAP Data None (SCAP Version 1.2 only) The Data Stream ID that you copied
Stream ID from the SCAP XML file.
Example:
<data-stream id="scap_gov.nist_datastream_
USGCB-Windows-7-1.2.3.1.zip">
SCAP Benchmark None The Benchmark ID that you copied from the SCAP XML file.
ID
Example:
<xccdf:Benchmark id="xccdf_gov.nist_
benchmark_USGCB-Windows-7">
SCAP Profile ID None The Profile ID that you copied from the SCAP XML file.
Example:
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 210 -
respective owners.
<xccdf:Profile id="xccdf_gov.nist_profile_
united_states_government_configuration_
baseline_version_1.2.3.1">
OVAL Result Full results w/ The information you want the results file to include.
Type system char-
The results file can be one of the following types: full results
acteristics
with system characteristics, full results without system char-
acteristics, or thin results.
OVAL definitions None A valid zip file that contains OVAL standalone content.
file
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 211 -
respective owners.
Plugins
Plugins options enables you to select security checks by Plugin Family or individual plugins checks.
Clicking on the Plugin Family allows you to enable (green) or disable (gray) the entire family. Select-
ing a family displays the list of its plugins. Individual plugins can be enabled or disabled to create very
specific scans.
A family with some plugins disabled is blue and displays Mixed to indicate only some plugins are
enabled. Clicking on the plugin family loads the complete list of plugins, and allow for granular selec-
tion based on your scanning preferences.
Selecting a specific Plugin Name displays the plugin output that would be seen in a report.
The plugin details include a Synopsis, Description, Solution, Plugin Information, and Risk Inform-
ation.
When a scan or policy is created and saved, it records all of the plugins that are initially selected. When
new plugins are received via a plugin update, they are automatically enabled if the family they are asso-
ciated with is enabled. If the family has been disabled or partially enabled, new plugins in that family
are also automatically disabled.
Caution: The Denial of Service family contains some plugins that could cause outages on a network if
the Safe Checks option is not enabled, in addition to some useful checks that will not cause any harm.
The Denial of Service family can be used in conjunction with Safe Checks to ensure that any potentially
dangerous plugins are not run. However, it is recommended that the Denial of Service family not be
used on a production network unless scheduled during a maintenance window and with staff ready to
respond to any issues.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 212 -
respective owners.
Configure Dynamic Plugins
With the Advanced Dynamic Scan template, you can create a scan or policy with dynamic plugin fil-
ters instead of manually selecting plugin families or individual plugins. As Tenable, Inc. releases new
plugins, any plugins that match your filters are automatically added to the scan or policy. This allows
you to tailor your scans for specific vulnerabilities while ensuring that the scan stays up to date as new
plugins are released.
l Create a Policy.
l Plugin attribute: See the Plugin Attributes table for plugin attribute descriptions.
l Filter argument: Select is equal to, is not equal to, contains, does not contain,
greater than, or less than to specify how the filter should match for the selected plugin
attribute.
l Value: Depending on the plugin attribute you selected, enter a value or select a value from
the drop-down menu.
7. Click Save.
Nessus creates the scan or policy, which automatically updates when Tenable adds new plugins
that match the dynamic plugin filters.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 213 -
respective owners.
Special Use Templates
Note: For more information about performing custom audits with Nessus, see the Custom Auditing
video.
Compliance
Nessus compliance auditing can be configured using one or more of the following Scanner and Agent
templates.
Mobile Device
With Nessus Manager, the Nessus Mobile Devices plugin family provides the ability to obtain inform-
ation from devices registered in a Mobile Device Manager (MDM) and from Active Directory servers that
contain information from Microsoft Exchange Servers.
l To query for information, the Nessus scanner must be able to reach the Mobile Device Man-
agement servers. You must ensure no screening devices block traffic to these systems from the
Nessus scanner. In addition, Nessus must be given administrative credentials (e.g., domain
administrator) to the Active Directory servers.
l To scan for mobile devices, Nessus must be configured with authentication information for the
management server and the mobile plugins. Since Nessus authenticates directly to the man-
agement servers, a scan policy does not need to be configured to scan specific hosts.
l For ActiveSync scans that access data from Microsoft Exchange servers, Nessus will retrieve
information from phones that have been updated in the last 365 days.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 214 -
respective owners.
may also be used to complete scans after significant changes to your network, as required by PCI DSS
11.2.3.
PCI Tenable.io The PCI Quarterly External Scan template is only available in Ten-
Quarterly Only able.io. Using this template, Tenable.io tests for all PCI DSS
External external scanning requirements, including web applications.
Scan
The scan results obtained using the PCI Quarterly External Scan
template may be submitted to Tenable, Inc. (an Approved Scanning
Vendor) for PCI validation.
PCI Nessus Man- For Nessus Manager and Nessus Professional versions, Tenable
Quarterly ager provides the PCI Quarterly External Scan (Unofficial) template.
External
This template can be used to simulate an external scan (PCI DSS
Scan (Unof-
Nessus Pro- 11.2.2) to meet PCI DSS quarterly scanning requirements. However,
ficial)
fessional the scan results from the Unofficial template cannot be submitted
to Tenable, Inc. for PCI Validation.
PCI Nessus Man- The Internal PCI Network Scan template can be used to meet PCI
Quarterly ager DSS Internal scanning requirement (11.2.1).
External
Scan (Unof-
Nessus Pro-
ficial)
fessional
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 215 -
respective owners.
l SCAP compliance auditing requires sending an executable to the remote host.
l Systems running security software (e.g., McAfee Host Intrusion Prevention), may block or quar-
antine the executable required for auditing. For those systems, an exception must be made for
the either the host or the executable sent.
l When using the SCAP and OVAL Auditing template, you can perform Linux and Windows SCAP
CHECKS to test compliance standards as specified in NIST’s Special Publication 800-126.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 216 -
respective owners.
Unofficial PCI ASV Validation Scan
Approved Scanning Vendors (ASVs) are organizations that validate adherence to certain Data Security
Standards (DSS) requirements by performing vulnerability scans of internet facing environments of
merchants and service providers.
Tenable, Inc. is a Payment Card Industry (PCI) ASV, and is certified to validate vulnerability scans of
internet-facing systems for adherence to certain aspects of the PCI DSS and Tenable.io is a validated
ASV solution.
Nessus Professional and Nessus Manager features two PCI related scan templates: Internal
PCI Network Scan and Unofficial PCI Quarterly External Scan.
Note: while the PCI DSS requires you to provide evidence of passing or "clean" scans on at least a
quarterly basis, you are also required to perform scans after any significant changes to your network
(PCI DSS 11.2.3).
For more information on performing and submitting an official PCI Quarterly External Scan, see the
Tenable.io User Guide.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 217 -
respective owners.
Only Tenable.io customers have the option to submit their PCI scan results to Tenable, Inc. for PCI ASV
validation.
When submitted, scan results are uploaded and the scan results can be reviewed from a PCI DSS per-
spective.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 218 -
respective owners.
Create and Manage Scans
This section contains the following tasks available on the Scans page.
l Create a Scan
l Import a Scan
l Delete a Scan
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 219 -
respective owners.
Example: Host Discovery
Knowing what hosts are on your network is the first step to any vulnerability assessment. Launch a
host discovery scan to see what hosts are on your network, and associated information such as IP
address, FQDN, operating systems, and open ports, if available. After you have a list of hosts, you can
choose what hosts you want to target in a specific vulnerability scan.
Hosts discovered by a host discovery scan do not count towards your license limit, if applicable. For
more information, see License Utilization.
The following overview describes a typical workflow of creating and launching a host discovery scan,
then creating a follow-up scan that target discovered hosts that you choose. In Nessus Essentials and
Nessus Professional trials, a wizard walks you through a simplified version of this process. You can
always manually launch a host discovery scan or follow-up scan using the workflow outlined in this
overview.
Tip: For IP addresses, you can use CIDR notation (e.g., 192.168.0.0/24), a range (e.g.,
192.168.0.1-192.168.0.255), or a comma-separated list (e.g., 192.168.0.0,192.168.0.1). For more
information, see Scan Targets.
5. To launch the scan immediately, click the button, and then click Launch.
Nessus runs the host discovery scan, and the My Scans page appears.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 220 -
respective owners.
6. In the scans table, click the row of a completed host discovery scan.
The scan's results page appears.
7. In the Hosts tab, view the hosts that Nessus discovered, and any available associated inform-
ation, such as IP address, FQDN, operating system, and open ports.
2. In the scans table, click the row of your completed host discovery scan.
The scan's results page appears.
4. Select the check box next to each host you want to scan in your new scan.
Nessus automatically populates the Targets list with the hosts you previously selected.
8. Configure the rest of the scan settings, as described in Scan and Policy Settings.
9. To launch the scan immediately, click the button, and then click Launch.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 221 -
respective owners.
Create a Scan
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 222 -
respective owners.
Import a Scan
You can import a scan that was exported in Nessus (.nessus) or Nessus DB (.db) format. With an
imported scan, you can view scan results, export new reports for the scan, rename the scan, and
update the description. You cannot launch imported scans or update policy settings.
You can also import .nessus files as policies. For more information, see Import a Policy.
To import a scan:
3. Browse to and select the scan file that you want to import.
Note: Supported file types are exported Nessus ( .nessus) and Nessus DB ( .db) files.
5. Click Upload.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 223 -
respective owners.
Create an Agent Scan
Tip: Use the search box in the top navigation bar to filter templates on the tab currently in view.
8. If you want to launch the scan later, click the Save button.
-or-
If you want to launch the scan immediately, click the button, then click Launch.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 224 -
respective owners.
Modify Scan Settings
3. In the scans table, select the check box on the row corresponding to the scan that you want to
configure.
5. Click Configure.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 225 -
respective owners.
Configure an Audit Trail
3. On the scans table, click the scan for which you want to configure an audit trail.
The scan results appear.
5. In the Plugin ID box, type the plugin ID used by one or more scans.
and/or
A list appears, which displays the results that match the criteria that you entered in one or both
boxes.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 226 -
respective owners.
Delete a Scan
3. On the scans table, on the row corresponding to the scan that you want to delete, click the
button.
4. To permanently delete the scan, in the left navigation bar, click the Trash folder.
5. On the scans table, on the row corresponding to the scan that you want to permanently delete,
click the button.
Tip: On the Trash page, in the upper right corner, click the Empty Trash button to permanently delete
all scans in the Trash folder.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 227 -
respective owners.
Scan Results
You can view scan results to help you understand your organization’s security posture and vul-
nerabilities. Color-coded indicators and customizable viewing options allow you to customize how you
view your scan’s data.
Page Description
Dashboard In Nessus Manager, the default scan results page displays the Dashboard view.
Compliance If the scan includes compliance checks, this list displays counts and details sor-
ted by vulnerability severity.
If the scan is configured for compliance scanning, the button allows you to
navigate between the Compliance and Vulnerability results.
Remediations If the scan's results include Remediation information, this list displays sug-
gested remediations that address the highest number of vulnerabilities.
Notes The Notes page displays additional information about the scan and the scan’s
results.
History The History displays a listing of scans: Start Time, End Time, and the Scan
Statuses.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 228 -
respective owners.
Create a New Scan from Scan Results
When you view scan results, you can select scanned hosts that you want to target in a new scan. When
you create a new scan, Nessus automatically populates the targets with the hosts that you selected.
4. Select the check box next to each host you want to scan in your new scan.
Nessus automatically populates the Targets list with the hosts you previously selected.
8. Configure the rest of the scan settings, as described in Scan and Policy Settings.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 229 -
respective owners.
Search and Filter Results
You can search or use filters to view specific scan results. You can filter hosts and vulnerabilities, and
you can create detailed and customized scan result views by using multiple filters.
2. In the Search Hosts box above the hosts table, type text to filter for matches in host names.
As you type, Nessus automatically filters the results based on your text.
2. In the Search Vulnerabilities box above the vulnerabilities table, type text to filter for matches
in vulnerability titles.
As you type, Nessus automatically filters the results based on your text.
To create a filter:
1. Do one of the following:
l In scan results, click the Hosts tab.
l In scan results, in the Hosts tab, click a specific host to view its vulnerabilities.
l Plugin attribute: See the Plugin Attributes table for plugin attribute descriptions.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 230 -
respective owners.
l Filter argument: Select is equal to, is not equal to, contains, or does not contain to
specify how the filter should match for the selected plugin attribute.
l Value: Depending on the plugin attribute you selected, enter a value or select a value from
the drop-down menu.
5. Click Apply.
Your filter is applied and the table displays vulnerabilities that match your filters.
To remove filters:
1. Click Filter next to the search box.
The filters are removed from the vulnerabilities displayed in the table.
Plugin Attributes
The following table lists plugins attributes you can use to filter results.
Option Description
Bugtraq ID Filter results based on if a Bugtraq ID is equal to, is not equal to, contains, or does
not contain a given string (e.g., 51300).
CANVAS Filter results based on if the presence of an exploit in the CANVAS exploit frame-
Exploit work is equal to or is not equal to true or false.
Framework
CANVAS Filter results based on which CANVAS exploit framework package an exploit exists
Package for. Options include CANVAS, D2ExploitPack, or White_Phosphorus.
CERT Advis- Filter results based on if a CERT Advisory ID (now called Technical Cyber Security
ory ID Alert) is equal to, is not equal to, contains, or does not contain a given string (e.g.,
TA12-010A).
CORE Exploit Filter results based on if the presence of an exploit in the CORE exploit framework
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 231 -
respective owners.
Framework is equal to or is not equal to true or false.
CPE Filter results based on if the Common Platform Enumeration (CPE) is equal to, is
not equal to, contains, or does not contain a given string (e.g., Solaris).
CVE Filter results based on if a Common Vulnerabilities and Exposures (CVE) v2.0 ref-
erence is equal to, is not equal to, contains, or does not contain a given string
(e.g., 2011-0123).
CVSS Base Filter results based on if a Common Vulnerability Scoring System (CVSS) v2.0 base
Score score is less than, is more than, is equal to, is not equal to, contains, or does not
contain a string (e.g., 5).
This filter can be used to select by risk level. The severity ratings are derived from
the associated CVSS score, where 0 is Info, less than 4 is Low, less than 7 is
Medium, less than 10 is High, and a CVSS score of 10 will be flagged Critical.
CVSS Tem- Filter results based on if a CVSS v2.0 temporal score is less than, is more than, is
poral Score equal to, is not equal to, contains, or does not contain a string (e.g., 3.3).
CVSS Tem- Filter results based on if a CVSS v2.0 temporal vector is equal to, is not equal to,
poral Vector contains, or does not contain a given string (e.g., E:F).
CVSS Vector Filter results based on if a CVSS v2.0 vector is equal to, is not equal to, contains, or
does not contain a given string (e.g., AV:N).
CVSS 3.0 Filter results based on if a Common Vulnerability Scoring System (CVSS) v3.0 base
Base Score score is less than, is more than, is equal to, is not equal to, contains, or does not
contain a string (e.g., 5).
This filter can be used to select by risk level. The severity ratings are derived from
the associated CVSS score, where 0 is Info, less than 4 is Low, less than 7 is
Medium, less than 10 is High, and a CVSS score of 10 will be flagged Critical.
CVSS 3.0 Filter results based on if a CVSS v3.0 temporal score is less than, is more than, is
Temporal equal to, is not equal to, contains, or does not contain a string (e.g., 3.3).
Score
CVSS 3.0 Filter results based on if a CVSS v3.0 temporal vector is equal to, is not equal to,
Temporal contains, or does not contain a given string (e.g., E:F).
Vector
CVSS 3.0 Filter results based on if a CVSS v3.0 vector is equal to, is not equal to, contains, or
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 232 -
respective owners.
Vector does not contain a given string (e.g., AV:N).
CWE Filter results based on Common Weakness Enumeration (CWE) if a CVSS vector is
equal to, is not equal to, contains, or does not contain a CWE reference number
(e.g., 200).
Exploit Avail- Filter results based on the vulnerability having a known public exploit.
able
Exploit Data- Filter results based on if an Exploit Database ID (EBD-ID) reference is equal to, is
base ID not equal to, contains, or does not contain a given string (e.g., 18380).
Exploitability Filter results based on if the exploitability ease is equal to or is not equal to the fol-
Ease lowing values: Exploits are available, No exploit is required, or No known exploits
are available.
Exploited by Filter results based on whether a plugin performs an actual exploit, usually an
Nessus ACT_ATTACK plugin.
Hostname Filter results if the host is equal to, is not equal to, contains, or does not contain a
given string (e.g., 192.168 or lab). For agents, you can search by the agent target
name. For other targets, you can search by the target's IP address or DNS name,
depending on how the scan was configured.
IAVA Filter results based on if an IAVA reference is equal to, is not equal to, contains, or
does not contain a given string (e.g., 2012-A-0008).
IAVB Filter results based on if an IAVB reference is equal to, is not equal to, contains, or
does not contain a given string (e.g., 2012-A-0008).
IAVM Sever- Filter results based on the IAVM severity level (e.g., IV).
ity
In The News Filter results based on whether the vulnerability covered by a plugin has had cov-
erage in the news.
Malware Filter results based on whether the plugin detects malware; usually ACT_GATHER_
INFO plugins.
Metasploit Filter results based on if the presence of a vulnerability in the Metasploit Exploit
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 233 -
respective owners.
Exploit Framework is equal to or is not equal to true or false.
Framework
Metasploit Filter results based on if a Metasploit name is equal to, is not equal to, contains,
Name or does not contain a given string (e.g., xslt_password_reset).
Microsoft Filter results based on Microsoft security bulletins like MS17-09, which have the
Bulletin format MSXX-XXX , where X is a number.
Microsoft KB Filter results based on Microsoft knowledge base articles and security advisories.
Patch Public- Filter results based on if a vulnerability patch publication date is less than, is more
ation Date than, is equal to, is not equal to, contains, or does not contain a string (e.g.,
12/01/2011).
Plugin Filter results if Plugin Description contains, or does not contain a given string (e.g.,
Description remote).
Plugin Fam- Filter results if Plugin Name is equal to or is not equal to one of the designated
ily Nessus plugin families. The possible matches are provided via a drop-down menu.
Plugin ID Filter results if plugin ID is equal to, is not equal to, contains, or does not contain
a given string (e.g., 42111).
Plugin Modi- Filter results based on if a Nessus plugin modification date is less than, is more
fication Date than, is equal to, is not equal to, contains, or does not contain a string (e.g.,
02/14/2010).
Plugin Name Filter results if Plugin Name is equal to, is not equal to, contains, or does not con-
tain a given string (e.g., windows).
Plugin Out- Filter results if Plugin Description is equal to, is not equal to, contains, or does not
put contain a given string (e.g., PHP)
Plugin Filter results based on if a Nessus plugin publication date is less than, is more
Publication than, is equal to, is not equal to, contains, or does not contain a string (e.g.,
Date 06/03/2011).
Plugin Type Filter results if Plugin Type is equal to or is not equal to one of the two types of
plugins: local or remote.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 234 -
respective owners.
Port Filter results based on if a port is equal to, is not equal to, contains, or does not
contain a given string (e.g., 80).
Protocol Filter results if a protocol is equal to or is not equal to a given string (e.g., http).
Risk Factor Filter results based on the risk factor of the vulnerability (e.g., Low, Medium, High,
Critical).
Secunia ID Filter results based on if a Secunia ID is equal to, is not equal to, contains, or does
not contain a given string (e.g., 47650).
See Also Filter results based on if a Nessus plugin see also reference is equal to, is not
equal to, contains, or does not contain a given string (e.g., seclists.org).
Solution Filter results if the plugin slution contains or does not contain a given string (e.g.,
upgrade).
Synopsis Filter results if the plugin solution contains or does not contain a given string (e.g.,
PHP).
Vulnerability Filter results based on if a vulnerability publication date earlier than, later than,
Publication on, not on, contains, or does not contain a string (e.g., 01/01/2012).
Date
Note: Pressing the button next to the date will bring up a calendar interface for
easier date selection.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 235 -
respective owners.
Compare Scan Results
You can compare two scan results to see differences between them. The comparison shows what is
new since the baseline (i.e., the primary result selected), not a differential of the two results. You can-
not compare imported scans or more than two scans.
Comparing scan results helps you see how a given system or network has changed over time. This
information is useful for compliance analysis by showing how vulnerabilities are being remediated, if
systems are patched as new vulnerabilities are found, or how two scans may not be targeting the same
hosts.
2. Click a scan.
4. In the row of both scan results you want to compare, select the check box.
6. In the drop-down box, select a scan baseline for the comparison, then click Continue.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 236 -
respective owners.
Dashboard
In Nessus Manager, you can configure a scan to display the scan’s results in an interactive dashboard
view.
Based on the type of scan performed and the type of data collected, the dashboard displays key values
and trending indicators.
Dashboard View
Based on the type of scan performed and the type of data collected, the dashboard displays key values
and a trending indicator.
Dashboard Details
Name Description
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 237 -
respective owners.
Current Vul- The number of vulnerabilities identified by the scan, by severity.
nerabilities
Host Count The percentage of hosts scanned by credentialed and non-credentialed author-
Comparison ization types: without authorization, new without authorization, with author-
ization, and new with authorization.
Vulnerabilities Vulnerabilities found over a period of time. At least 2 scans must be completed
Over Time for this chart to appear.
Top Hosts Top 8 hosts that had the highest number of vulnerabilities found in the scan.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 238 -
respective owners.
Vulnerabilities
Vulnerabilities are instances of a potential security issue found by a plugin. In your scan results, you
can choose to view all vulnerabilities found by the scan, or vulnerabilities found on a specific host.
All vulnerabilities detected by a scan Scans > [scan name] > Vulnerabilities
Vulnerabilities detected by a scan on a specific host Scans > Hosts > [scan name]
l View Vulnerabilities
l Modify a Vulnerability
l Group Vulnerabilities
l Snooze a Vulnerability
l Live Results
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 239 -
respective owners.
View Vulnerabilities
You can view all vulnerabilities found by a scan, or vulnerabilities found on a specific host by a scan.
When you drill down on a vulnerability, you can view information such as plugin details, description,
solution, output, risk information, vulnerability information, and reference information.
To view vulnerabilities:
4. (Optional) To sort the vulnerabilities, click an attribute in the table header row to sort by that
attribute.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 240 -
respective owners.
Modify a Vulnerability
You can modify a vulnerability to change its severity level or hide it. This allows you to re-prioritize the
severity of results to better account for your organization’s security posture and response plan. When
you modify a vulnerability from the scan results page, the change only applies to that vulnerability
instance for that scan unless you indicate that the change should apply to all future scans. To modify
severity levels for all vulnerabilities, use Plugin Rules.
To modify a vulnerability:
5. In the Severity drop-down box, select a severity level or Hide this result.
Note: If you hide a vulnerability, it cannot be recovered and you accept its associated risks. To
temporarily hide a vulnerability, use Vulnerability Snoozing.
If you select this option, Nessus modifies this vulnerability for all future scans. Nessus does not
modify vulnerabilities found in past scans.
7. Click Save.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 241 -
respective owners.
Group Vulnerabilities
When you group vulnerabilities, plugins with common attributes such as Common Platform
Enumeration (CPE), service, application, and protocol nest under a single row in scan results. Group-
ing vulnerabilities gives you a shorter list of results, and shows you related vulnerabilities together.
When groups are enabled, the number of vulnerabilities in the group appears next to the severity indic-
ator, and the group name says (Multiple Issues).
The severity indicator for a group is based on the vulnerabilities in the group. If all the vulnerabilities
in a group have the same severity, Nessus displays that severity level. If the vulnerabilities in a group
have differing severities, Nessus displays the Mixed severity level.
To group vulnerabilities:
1. In the top navigation bar, click Scans.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 242 -
respective owners.
l Click a specific host to view vulnerabilities found on that host.
-or-
To ungroup vulnerabilities:
1. In the header row of the vulnerabilities table, click .
A new vulnerabilities table appears and displays the vulnerabilities in the group.
To set group severity types to the highest severity within the group:
By default, groups that contain vulnerabilities with different vulnerabilities display the severity type
Mixed. You can change this setting to display the highest severity of any vulnerability in the group.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 243 -
respective owners.
Snooze a Vulnerability
When you snooze a vulnerability, it does not appear in the default view of your scan results. You
choose a period of time for which the vulnerability is snoozed – once the snooze period expires, the
vulnerability awakes and appears in your list of scan results. You can also manually wake a vul-
nerability or choose to display snoozed vulnerabilities. Snoozing affects all instances of the vul-
nerability in a given scan, so you cannot snooze vulnerabilities only on a specific host.
To snooze a vulnerability:
-or-
-or-
l Click Custom .
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 244 -
respective owners.
l If you selected a preset snooze period, click Snooze to confirm your selection.
l If you selected a custom snooze period, select the date you want the vulnerability to
snooze until, then click Snooze.
The vulnerability is snoozed for the selected period of time and does not appear in the default
view of scan results.
2. Click Wake.
The vulnerability is no longer snoozed, and appears in the default list of scan results.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 245 -
respective owners.
Live Results
Nessus is automatically updated with new plugins, which allows you to assess your assets for new vul-
nerabilities. However, if your scan is on an infrequent schedule, the scan may not run new plugins
until several days after the plugin update. This gap could leave your assets exposed to vulnerabilities
that you are not aware of.
In Nessus Professional, you can use live results to view scan results for new plugins based on a scan's
most recently collected data, without running a new scan. Live results allow you to see potential new
threats and determine if you need to manually launch a scan to confirm the findings. Live results are
not results from an active scan; they are an assessment based on already-collected data. Live results
don't produce results for new plugins that require active detection, like an exploit, or that require data
that was not previously collected.
Live results appear with striped coloring in scan results. In the Vulnerabilities tab, the severity indic-
ator is striped, and the Live icon appears next to the plugin name.
The results page displays a note indicating that the results include live results. Tenable recommends
that you manually launch a scan to confirm the findings. The longer you wait between active scans, the
more outdated the data may be, which lessens the effectiveness of live results.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 246 -
respective owners.
l Enable or Disable Live Results
l Remove Live Results
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 247 -
respective owners.
Enable or Disable Live Results
The first time you enable live results on a scan, the scan results update to include findings for plugins
that were enabled since the last scan. The scan then updates with live results whenever there is a new
plugin update. live results are not results from an active scan; they are an assessment based on a
scan's most recently collected data. Live results don't produce results for new plugins that require act-
ive detection, like an exploit, or that require data that was not previously collected. To learn more, see
Live Results.
4. Click Save.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 248 -
respective owners.
Remove Live Results
In Nessus Professional, if a scan includes live results, Nessus displays the following notice on the scan
results page.
If you remove live results, they no longer appear on the scan results page. However, live results will re-
appear the next time the plugins are updated unless you disable the feature for the scan.
Tip: To launch the scan and confirm the live results findings, click Launch in the notice before you
remove the findings.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 249 -
respective owners.
Scan Exports and Reports
Scans can be exported as a Nessus file or a Nessus DB file, as described in Export a Scan. These files
can then be imported as a scan or policy, as described in Import a Scan and Import a Policy.
You can also create a scan report in several different formats, as described in Create a Scan Report.
Some formats allow you to customize the information that is included; formats that do not allow cus-
tomization include all selected scan information in the report.
Allows Cus-
Format Description
tomization?
Exports
Reports
PDF A report generated in PDF format. Depending on the size of the Yes
report, PDF generation may take several minutes. Either Oracle
Java or OpenJDK is required for PDF reports.
HTML A report generated using standard HTML that allows cus- Yes
tomization. This report opens in a new tab in your browser.
CSV A comma-separated values (CSV) export that can be used to import Yes
into many external programs such as databases, spreadsheets, and
more.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 250 -
respective owners.
Create a Scan Report
You can create a scan report to help you analyze the vulnerabilities and suggested remediations on
affected hosts. You can create a scan report in PDF, HTML, or CSV format, and customize it to contain
only certain information.
When you create a scan report, it includes the results that are currently visible on your scan results
page. You can also select certain hosts or vulnerabilities to further narrow your report.
2. Click a scan.
The scan's results page appears.
3. (Optional) To create a scan report that includes specific scan results, do the following:
l Use search to narrow your scan results.
l In the Hosts tab, select the check box in each row of a host you want to include in the scan
report.
l In the Vulnerabilities tab, select the check box in each row of each vulnerability or vul-
nerability group that you want to include in the scan report.
Note: You can make selections in either Hosts or Vulnerabilities, but not across both tabs.
5. From the drop-down box, select the format in which you want to export the scan results.
CSV
a. Select the check boxes for the columns you want to appear in the CSV report.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 251 -
respective owners.
Tip: To select all columns, click Select All. To clear all columns, click Clear. To reset
columns to the system default, click System.
b. (Optional) To save your current configuration as the default for CSV reports, select the
Save as default check box.
PDF
Do one of the following:
a. Select Custom.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 252 -
respective owners.
l Formatting Options — Select whether to Include page breaks between vul-
nerability results.
HTML
Do one of the following:
a. Select Custom.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 253 -
respective owners.
Export a Scan
You can export a scan from one Nessus scanner and import it to a different Nessus scanner. This helps
you manage your scan results, compare reports, back up reports, and facilitates communication
between groups within an organization. For more information, see Import a Scan and Import a
Policy.
You can export scan results as a Nessus file or as a Nessus DB file. For more information, see Scan
Exports and Reports.
To export a scan:
2. Click a scan.
The scan's results page appears.
4. From the drop-down box, select the format in which you want to export the scan results.
l If you select Nessus DB format, the Export as Nessus DB dialog box appears.
b. Click Export.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 254 -
respective owners.
Customized Reports
On the Customized Reports page in Nessus Professional, you can customize the title and logo that
appear on each report.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 255 -
respective owners.
Customize Report Settings
3. In the Custom Name box, type the name that you want to appear on the report.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 256 -
respective owners.
Scan Folders
On the Scans page, the left navigation bar is divided into the Folders and Resources sections. The
Folders section always includes the following default folders that cannot be removed:
l My Scans
l All Scans
l Trash
When you access the Scans page, the My Scans folder appears. When you create a scan, it appears by
default in the My Scans folder.
The All Scans folder displays all scans you have created as well as any scans with which you have per-
mission to interact. You can click on a scan in a folder to view scan results.
The Trash folder displays scans that you have deleted. In the Trash folder, you can permanently
remove scans from your Nessus instance, or restore the scans to a selected folder. If you delete a
folder that contains scans, all scans in that folder are moved to the Trash folder. Scans stored in the
Trash folder are automatically deleted after 30 days.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 257 -
respective owners.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 258 -
respective owners.
Manage Scan Folders
Create a Folder
1. In the top navigation bar, click Scans.
2. If the scan you want to move is not in the My Scans folder, on the left navigation bar, click the
folder that contains the scan you want to move.
3. On the scans table, select the check box on the row corresponding to the scan that you want to
configure.
4. Click More. Point to Move To, and click the folder that you want to move the scan to.
Rename a Folder
1. In the top navigation bar, click Scans.
2. In the left navigation bar, next to the folder that you want to rename, click the button, and
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 259 -
respective owners.
then click Rename.
Delete a Folder
1. In the top navigation bar, click Scans.
2. In the left navigation bar, next to the folder that you want to rename, click the button, and
then click Delete.
The folder is deleted. If the folder contained scans, those scans are moved to the Trash folder.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 260 -
respective owners.
Policies
A policy is a set of predefined configuration options related to performing a scan. After you create a
policy, you can select it as a template when you create a scan.
Note: For information about default policy templates and settings, see the Scan and Policy Templates
topic.
Policy Characteristics
l Parameters that control technical aspects of the scan such as timeouts, number of hosts, type of
port scanner, and more.
l Credentials for local scans (e.g., Windows, SSH), authenticated Oracle database scans, HTTP, FTP,
POP, IMAP, or Kerberos based authentication.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 261 -
respective owners.
l Database compliance policy checks, report verbosity, service detection scan settings, Unix com-
pliance checks, and more.
l Offline configuration audits for network devices, allowing safe checking of network devices
without needing to scan the device directly.
l Windows malware scans which compare the MD5 checksums of files, both known good and mali-
cious files.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 262 -
respective owners.
Create a Policy
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 263 -
respective owners.
Import a Policy
You can import a scan or policy that was exported as a Nessus file (.nessus) and import it as a
policy. You can then view and modify the configuration settings for the imported policy. You cannot
import a Nessus DB file as a policy.
To import a policy:
4. Browse to and select the scan file that you want to import.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 264 -
respective owners.
Modify Policy Settings
3. In the policies table, select the check box on the row corresponding to the policy that you want
to configure.
5. Click Configure.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 265 -
respective owners.
Delete a Policy
3. On the policies table, on the row corresponding to the policy that you want to delete, click the
button.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 266 -
respective owners.
About Nessus Plugins
As information about new vulnerabilities are discovered and released into the general public domain,
Tenable, Inc. research staff designs programs to enable Nessus to detect them.
These programs are named plugins, and are written in the Nessus proprietary scripting language,
called Nessus Attack Scripting Language (NASL).
Plugins contain vulnerability information, a generic set of remediation actions, and the algorithm to
test for the presence of the security issue.
Nessus supports the Common Vulnerability Scoring System (CVSS) and supports both v2 and v3 values
simultaneously. If both CVSS2 and CVSS3 attributes are present, both scores are calculated. However in
determining the Risk Factor attribute, currently the CVSS2 scores take precedence.
Plugins also are utilized to obtain configuration information from authenticated hosts to leverage for
configuration audit purposes against security best practices.
To view plugin information, see a list of newest plugins, view all Nessus plugins, and search for specific
plugins, see the Nessus Plugins home page.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 267 -
respective owners.
During the Product Registration portion of the Browser Portion of the Nessus install, Nessus down-
loads all plugins and compiles them into an internal database.
You can also use the nessuscli fetch —register command to manually download plugins. For
more details, see the Command Line section of this guide.
Optionally, during the Registration portion of the Browser Portion of the Nessus install, you can
choose the Custom Settings link and provide a hostname or IP address to a server which hosts your
custom plugin feed.
Tip: Plugins are obtained from port 443 of plugins.nessus.org, plugins-customers.nessus.org, or plugins-
us.nessus.org.
You can also use the nessuscli update --plugins-only command to manually update plugins.
For more details, see the Command Line section of this guide.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 268 -
respective owners.
Create a Limited Plugin Policy
The list of plugin families appears, and by default, all of the plugin families are enabled.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 269 -
respective owners.
7. Click the plugin family that you want to include.
The list of plugins appears in the left navigation bar.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 270 -
respective owners.
8. For each plugin that you want to enable, click the Disabled button.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 271 -
respective owners.
Tip: You can search for plugins and plugin families using the Search Plugin Families box in the
upper right corner.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 272 -
respective owners.
Plugin Rules
Plugin Rules allow you to hide or change the severity of any given plugin. In addition, rules can be lim-
ited to a specific host or specific time frame. From this page you can view, create, edit, and delete your
rules.
The Plugin Rules option provides a facility to create a set of rules that dictate the behavior of certain
plugins related to any scan performed. A rule can be based on the Host (or all hosts), Plugin ID, an
optional Expiration Date, and manipulation of Severity.
This allows you to re-prioritize the severity of plugin results to better account for your organization’s
security posture and response plan.
Severity: Low
This rule is created for scans performed on IP address 192.168.0.6. Once saved, this Plugin Rule
changes the default severity of plugin ID 79877 (CentOS 7 : rpm (CESA-2014:1976) to a severity of low
until 12/31/2016. After 12/31/2016, the results of plugin ID 79877 will return to its critical severity.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 273 -
respective owners.
Create a Plugin Rule
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 274 -
respective owners.
Modify a Plugin Rule
3. On the plugin rules table, select the plugin rule that you want to modify.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 275 -
respective owners.
Delete a Plugin Rule
3. On the plugin rules table, in the row for the plugin that you want to modify, click the button.
A dialog box appears, confirming your selection to delete the plugin rule.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 276 -
respective owners.
Scanners
By default, Tenable.io is configured with a regional, specific cloud scanner. In addition to using the
default cloud scanner, users can also link Nessus scanners, NNM scanners, and Nessus Agents to Ten-
able.io.
Once linked to Tenable.io, use the Tenable.io key to add remote scanners to Scanner Groups. You can
also manage and select remote scanners when configuring scans.
The Linked Scanners page displays scanner names, types, and permissions.
The Scanners page displays the Linking Key and a list of remote scanners. You can click on a linked
scanner to view details about that scanner.
Scanners are identified by scanner type and indicate if the scanner has Shared permissions.
Remote scanners can be linked to Nessus Manager with the Linking Key or valid account credentials.
Once linked, scanners can be managed locally and selected when configuring scans.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 277 -
respective owners.
Link Nessus Scanner
To link your Nessus scanner during initial installation, see Configure Nessus.
If you choose not to link the scanner during initial installation, you can link Nessus scanner later. You
can link a Nessus scanner to a manager such as Nessus Manager, Tenable.io, or Industrial Security 1.2
or later.
If your scanner is already linked to Tenable.sc, you can unlink by toggling the On switch to Off. You can
then link the scanner to Tenable.io or Nessus Manager, but you cannot relink to Tenable.sc from the
interface.
1. In the user interface of the manager you want to link to, copy the Linking Key, found on the fol-
lowing page:
4. Fill out the linking settings for your manager as described in Remote Link.
5. Click Save.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 278 -
respective owners.
Enable or Disable a Scanner
Enable a Scanner
1. In the top navigation bar, click Scans.
3. In the scanners table, in the row for the scanner that you want to enable, hover over the but-
ton.
becomes .
Disable a Scanner
1. In the top navigation bar, click Scans.
3. In the scanners table, in the row for the scanner that you want to disable, hover over the but-
ton.
becomes .
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 279 -
respective owners.
Remove a Scanner
3. In the scanners table, in the row for the scanner that you want to remove, click the button.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 280 -
respective owners.
Download Managed Scanner Logs
As an administrator in Nessus Manager, you can request and download a log file containing logs and
system configuration data from any of your managed scanners and Nessus Agents. This information
can help you troubleshoot system problems, and also provides an easy way to gather data to submit
to Tenable Support.
You can store a maximum of five log files from each managed scanner in Nessus Manager. Once the
limit is reached, you must remove an old log file to download a new one.
Note: You can only request logs from Nessus scanners running 8.1 and later.
3. In the scanners table, click the scanner for which you want to download logs.
Note: If you have reached the maximum of five log files, the Request Logs button is disabled.
Remove an existing log before downloading a new one.
Nessus Manager requests the logs from the managed scanner the next time it checks in, which
may take several minutes. You can view the status of the request in the user interface until the
download is complete.
l In the row of the log you want to remove, click the button.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 281 -
respective owners.
To cancel a pending or failed log download:
l In the row of the pending or failed log download that you want to cancel, click the button.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 282 -
respective owners.
Agents
Agents increase scan flexibility by making it easy to scan assets without needing ongoing host cre-
dentials or assets that are offline. Additionally, agents enable large-scale concurrent scanning with
little network impact.
The Agents page displays the Linking Key and a list of linked agents. You can click on a linked agent to
view details about that agent. There are four tabs available on the Agents page: Linked Agents,
Agent Groups, Blackout Windows, and Agent Settings.
Once linked, an agent must be added to a group for use when configuring scans. Linked agents will
automatically download plugins from the manager upon connection. Agents are automatically
unlinked after a period of inactivity.
Note: Agents can take several minutes to download plugins, but it is required before an agent returns
scan results.
Agent Groups
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 283 -
respective owners.
Agent groups are used to organize and manage the agents linked to your scanner. Each agent can be
added to any number of groups and scans can be configured to use these groups as targets.
Note: Agent group names are case sensitive. When you link agents using System Center Configuration
Manager (SCCM) or the command line, you must use the correct case.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 284 -
respective owners.
Modify Agent Settings
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 285 -
respective owners.
Agent Settings
You can configure system-wide agent settings to specify inactive agent options and blackout win-
dow settings for all your linked agents. For more information on creating, modifying, and deleting
blackout windows, see Blackout Windows.
Option Description
Manage Agents
Track unlinked When this setting is enabled, agents that are unlinked are preserved in the
agents manager along with the corresponding agent data. This option can also be
set using the nessuscli utility.
Remove agents Specifies the number of days an agent can be inactive before the manager
that have been removes the agent.
inactive for X days
Requires that Track unlinked agents is enabled.
Blackout Windows
Enforce a per- When enabled, Nessus enforces a permanent blackout window schedule
manent blackout and any rules below are applied.
window schedule
Note: Any scheduled blackout windows are overridden by the permanent
blackout window.
Prevent software When enabled, agents do not receive software updates during scheduled
updates blackout windows.
Prevent plugin When enabled, agents do not receive plugin updates during scheduled
updates blackout windows.
Prevent agent When enabled, the system does not run agent scans during scheduled black-
scans out windows.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 286 -
respective owners.
Filter Agents
4. Configure the options as necessary. Depending on the parameter you select, different options
appear:
IP Address is equal to In the text box, type the IPv4 or IPv6 addresses on which
you want to filter.
is not equal
to
contains
does not
contain
Last Con- earlier than In the text box, type the date on which you want to filter.
nection
later than
Last Plugin
on
Update
not on
Last Scanned
Member of is equal to From the drop-down list, select from your existing agent
Group groups.
is not equal
to
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 287 -
respective owners.
Parameter Operator Expression
Name is equal to In the text box, type the agent name on which you want to
filter.
is not equal
to
contains
does not
contain
Platform contains In the text box, type the platform name on which you want
to filter.
does not
contain
Version is equal to In the text box, type the version you want to filter.
is not equal
to
contains
does not
contain
5. Click Apply.
The manager filters the list of agents to include only those that match your configured options.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 288 -
respective owners.
Export Agents
3. (Optional) Click the Filter button to apply a filter to the agents list.
4. In the upper right corner, click Export. If a drop-down appears, click CSV.
The agents.csv file exported from Nessus Manager contains the following data:
Field Description
Status The status of the agent at the time of export. Possible values are unlinked,
online, or offline.
Last Plugin The date (in ISO-8601 format) the agent's plugin set was last updated.
Update
Last Scanned The date (in ISO-8601 format) the agent last performed a scan of the host.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 289 -
respective owners.
Download Linked Agent Logs
As an administrator in Nessus Manager, you can request and download a log file containing logs and
system configuration data from any of your managed scanners and agents. This information can help
you troubleshoot system problems, and also provides an easy way to gather data to submit to Tenable
Support.
You can store a maximum of five log files from each agent in Nessus Manager. Once the limit is
reached, you must remove an old log file to download a new one.
Note: You can only request logs from Nessus Agents running 7.2 and later.
3. In the agents table, click the agent for which you want to download logs.
Note: If you have reached the maximum of five log files, the Request Logs button is disabled.
Remove an existing log before downloading a new one.
Nessus Manager requests the logs from the agent the next time it checks in, which may take sev-
eral minutes. You can view the status of the request in the user interface until the download is
complete.
l In the row of the log you want to remove, click the button.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 290 -
respective owners.
To cancel a pending or failed log download:
l In the row of the pending or failed log download that you want to cancel, click the button.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 291 -
respective owners.
Unlink an Agent
When you unlink an agent, the agent disappears from the Agents page, but the system retains related
data for the period of time specified in agent settings.
3. For Nessus 7.1.1 and later: In the agents table, in the row for the agent that you want to unlink,
click the button.
-or-
For Nessus 7.1.0 and earlier: In the agents table, in the row for the agent that you want to unlink,
click the button.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 292 -
respective owners.
4. In the agents table, select the check box in each row for each agent you want to unlink.
Note: To select all agents that match your current filter, select the check box in the table header.
If you have multiple pages of agents and select all agents, Nessus Manager selects all agents
that match your filter across all pages, not only the current page.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 293 -
respective owners.
Agent Groups
You can use agent groups to organize and manage the agents linked to your Nessus Manager. You can
add an agent to more than one group, and configure scans to use these groups as targets.
Tenable recommends that you size agent groups appropriately, particularly if you are managing scans
in Nessus Manager and then importing the scan data into Tenable.sc. You can size agent groups when
you manage agents in Nessus Manager.
The more agents that you scan and include in a single agent group, the more data that the manager
must process in a single batch. The size of the agent group determines the size of the .nessus file
that must be imported into Tenable.sc. The .nessus file size affects hard drive space and bandwidth.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 294 -
respective owners.
Create a New Agent Group
You can use agent groups to organize and manage the agents linked to your account. You can add an
agent to more than one group, and configure scans to use these groups as targets.
5. In the Name box, type a name for the new agent group.
6. Click Add.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 295 -
respective owners.
Modify an Agent Group
4. In the row for the agent group that you want to modify, click the button.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 296 -
respective owners.
Delete an Agent Group
4. In the row for the agent group that you want to delete, click the button.
5. Click Delete.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 297 -
respective owners.
Blackout Windows
Blackout Windows allow you to prevent any combination of agent software updates, plugin updates,
and agent scans from being installed or executed, based on a given schedule. Blackout windows apply
to all linked agents.
You can configure a permanent agent blackout window and optional rules on the Agent Settings tab.
See Agent Settings for details on the permanent agent blackout window and each optional rule.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 298 -
respective owners.
Create a Blackout Window
Blackout windows will apply to all linked agents and will prevent the agents from receiving and apply-
ing software updates during scheduled windows. Agents will still receive plugin updates and continue
performing scheduled scans during these windows.
6. Click Save.
The blackout window goes into effect and appears on the Blackout Windows tab.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 299 -
respective owners.
Modify a Blackout Window
Use this procedure to manage a blackout window for agent scanning in Nessus Manager.
4. In the blackout window table, click the blackout window you want to modify.
The Blackout Windows / <Name> window appears, where <Name> is the name of the selected
blackout window.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 300 -
respective owners.
Delete a Blackout Window
Use this procedure to delete a blackout window for agent scanning in Nessus Manager.
4. In the blackout window table, in the row for the blackout window that you want to delete, click
the delete button ( ).
A dialog box appears, confirming your selection to delete the blackout window.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 301 -
respective owners.
Clustering
With Nessus Manager clustering, you can deploy and manage large numbers of agents from a single
Nessus Manager instance. For Tenable.sc users with over 10,000 agents and up to 200,000 agents, you
can manage your agent scans from a single Nessus Manager, rather than needing to link multiple
instances of Nessus Manager to Tenable.sc.
A Nessus Manager instance with clustering enabled acts as a parent node to child nodes, each of
which manage a smaller number of agents. Once a Nessus Manager instance becomes a parent node,
it no longer manages agents directly. Instead, it acts as a single point of access where you can manage
scan policies and schedules for all the agents across the child nodes. With clustering, you can scale
your deployment size more easily than if you had to manage several different Nessus Manager
instances separately.
Without clustering, you deploy 10 Nessus Manager instances, each supporting 10,000 agents. You
must manually manage each Nessus Manager instance separately, such as setting agent scan policies
and schedules, and updating your software versions. You must separately link each Nessus Manager
instance to Tenable.sc.
With clustering, you use one Nessus Manager instance to manage 100,000 agents. You enable clus-
tering on Nessus Manager, which turns it into a parent node, a management point for child nodes. You
link 10 child nodes, each of which manages around 10,000 agents. You can either link new agents or
migrate existing agents to the cluster. The child nodes receive agent scan policy, schedule, and plugin
and software updates from the parent node. You link only the Nessus Manager parent node to Ten-
able.sc.
Definitions
Parent node — The Nessus Manager instance with clustering enabled, which child nodes link to.
Child node — A Nessus instance that acts as a node that Nessus Agents connect to.
Nessus Manager cluster — A parent node, its child nodes, and associated agents.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 302 -
respective owners.
l Clustering System Requirements
l Enable Clustering
l Link a Node
l Rebalance Nodes
l Delete a Node
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 303 -
respective owners.
Clustering System Requirements
The following are system requirements for the parent node and child nodes. These estimations
assume that the KB and audit trail settings are disabled. If those settings are enabled, the size required
can significantly increase.
Note: The amount of disk space needed depends on how many agent scan results are kept and for how
long. For example, if you run a single 5000 agent scan result once per day and keep scan results for 7
days, the estimated disk space used is 35 GB. The disk space required per scan result varies based on
the consistency, number, and types of vulnerabilities detected.
l Disk: Estimated minimum of 5 GB per 5000 agents per scan per day
l CPU: 2 cores
l RAM: 8 GB
Note: Disk space is used to temporarily store agent scan results, both individual and combined, before
uploading the results to the parent node.
l CPU: 2 cores
l RAM: 8 GB
l CPU: 4 cores
l RAM: 16 GB
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 304 -
respective owners.
Agents
l Linked agents must be on software version 7.4.0 or later.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 305 -
respective owners.
Enable Clustering
When you enable clustering on Nessus Manager it becomes a parent node. You can then link child
nodes, each of which manages Nessus Agents. You cannot reverse clustering and turn Nessus Manager
into a regular scanner or Nessus Agent manager.
Note: To enable Nessus Manager clustering in Nessus 8.5.x or 8.6.x, you must contact your Tenable rep-
resentative. In Nessus Manager 8.7.x and later, you can enable clustering using the following procedure.
Caution: You cannot reverse clustering and turn Nessus Manager into a regular, non-clustered
Nessus Manager instance.
5. Click Save.
What to do next:
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 306 -
respective owners.
Get Linking Key from Parent Node
You need the linking key from the cluster parent node to link child nodes or migrate agents to the
cluster.
What to do next:
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 307 -
respective owners.
Link a Node
To link a node to a cluster, you install an instance of Nessus as a cluster child node, then configure the
node to link to the parent node of the cluster.
1. Install Nessus as described in the appropriate Install Nessus procedure for your operating sys-
tem.
3. Click Continue.
4. From the Managed by drop-down box, select Nessus Manager (Cluster Node).
5. Click Continue.
6. Create a Nessus administrator user account, which you use to log in to Nessus:
7. Click Submit.
Nessus finishes the configuration process, which may take several minutes.
1. In the Nessus child node, use the administrator user account you created during initial con-
figuration to sign in to Nessus.
The Agents page appears. By default, the Node Settings tab is open.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 308 -
respective owners.
3. Fill out the General Settings:
l Node Name — Type a unique name that is used to identify this Nessus child node on the
parent node.
l (Optional) Node Host — Type the hostname or IP address that Nessus Agents should use
to access the child node.
l Cluster Linking Key — Paste or type the linking key that you copied from the Nessus Man-
ager parent node.
l Parent Node Host — Type the hostname or IP address of the Nessus Manager parent
node to which you are linking.
l Parent Node Port — Type the port for the specified host. The default is 8834.
l Use Proxy — Select the check box if you want to connect to the parent node via the proxy
settings set in Proxy Server.
5. Click Save.
What to do next:
l Log in to the Nessus Manager parent node to manage linked Nessus Agents, rather than man-
aging agents from the child node.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 309 -
respective owners.
Migrate Agents to a Cluster
If you have an instance of Nessus Manager with linked agents, you can choose to migrate the asso-
ciated agents to an existing cluster. After the agents successfully migrate to the cluster, the agents are
then unlinked from their original Nessus Manager. Any agents that did not successfully migrate remain
linked to the original Nessus Manager. The original Nessus Manager remains as a Nessus Manager
instance and does not become part of the cluster.
l Ensure there is an existing cluster available for the agents to migrate to. If you do not have an
existing cluster, enable clustering on the Nessus Manager instance you want to act as the par-
ent node for the cluster.
l Get the linking key from the Nessus Manager parent node for the cluster.
l Parent Node Hostname — Type the hostname or IP address of the Nessus Manager par-
ent node of the cluster to which you are migrating.
l Parent Node Port — Type the port for the specified parent node host. The default is 8834.
l Parent Node Linking Key — Paste or type the linking key that you copied from the Nes-
sus Manager parent node, as described in Link a Node.
l Enable Agent Migration — Select this check box to migrate agents to the cluster. Disable
the check box to stop migrating agents, if agents are currently in the process of migrating.
5. Click Save.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 310 -
respective owners.
Nessus Manager begins or stops migrating agents to the cluster, depending on whether you have
selected Enable Agent Migration.
What to do next:
l Log in to the Nessus Manager parent node to manage linked Nessus Agents.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 311 -
respective owners.
View or Edit a Node
On Nessus Manager with clustering enabled, you can view the list of child nodes currently linked to the
parent node. You can view details for a specific node, such as its status, IP address, number of linked
agents, software information, and plugin set. If agents on the node are currently running a scan, a
scan progress bar appears.
You can edit a node's name or the maximum number of agents that can be linked to the child node.
5. In the Node Details tab, view detailed information for the selected node.
l Max Agents: Type the maximum number of agents that can be linked to the child node.
The default value is 10000 and the maximum value is 20000.
8. Click Save.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 312 -
respective owners.
Rebalance Nodes
Nessus Agents may become unevenly distributed across child nodes for a number of reasons. For
example, when a child node is temporarily unavailable, was disabled, was deleted, or was recently
added. When the imbalance passes a certain threshold, Nessus Manager gives you the option to rebal-
ance child nodes.
When you rebalance child nodes, Nessus Agents get redistributed evenly across child nodes. Nessus
Agents unlink from an overloaded child node and relink to a child node with more availability.
Nessus Manager rebalances the Nessus Agent distribution across child nodes.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 313 -
respective owners.
Enable or Disable Nodes
If you disable a child node, its linked Nessus Agents relink to another available child node. If you re-
enable a child node, Nessus Agents may become unevenly distributed, at which point you can choose
to Rebalance Nodes.
l To enable a node:
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 314 -
respective owners.
Delete a Node
When you delete a child node, linked Nessus Agents eventually relink to another available child node,
though it may take longer than if you disable the child node.
If you delete a node, you cannot undo this action. If you only want to temporarily disable a child node,
see Enable or Disable Nodes.
4. In the row of the child node you want to delete, click the button.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 315 -
respective owners.
Settings Page
l About
l Advanced
l Proxy Server
l Remote Link
l SMTP Server
l Custom CA
l My Account
l Users
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 316 -
respective owners.
About
The About page displays an overview of Nessus licensing and plugin information. When you access the
product settings, the About page appears by default. Basic users cannot view the Software Update or
Master Password tabs. Standard users can only view the product version and basic information
about the current plugin set.
To download logs, click the Download Logs button in the upper-right corner of the page. For more
information, see Download Logs.
Value Description
Nessus Professional
Last The date on which the plugin set was last refreshed.
Updated
Note: For Nessus Professional 8.5 and later, you cannot run scans or download new
plugins after your license expires. You can still access your system and scan reports
for 30 days after expiration.
Policy The ID of the current version of the policy template set.
Template
Version
Nessus Manager
Licensed The number of hosts you can scan, depending on your license.
Hosts
Licensed The number of scanners that you have licensed that are currently in use.
Scanners
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 317 -
respective owners.
Value Description
Licensed The number of agents that you have licensed that are currently in use.
Agents
Last The date on which the plugin set was last refreshed.
Updated
Policy The ID of the current version of the policy template set.
Template
Version
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 318 -
respective owners.
License Utilization
In Nessus Essentials or a Nessus Professional trial, you have a license limit that determines the num-
ber of hosts that you can scan.
Hosts discovered by a host discovery scan do not count towards your license limit. If a host has not
been scanned in 90 days, it no longer counts towards the license limit. You can view your license use
to see what hosts are counting towards the license limit and when Nessus last scanned hosts.
License Limits
Product Host limit
Nessus Essentials 16
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 319 -
respective owners.
View License Use
In Nessus Essentials or a Nessus Professional trial, you can check how many hosts you have scanned
out of your license limit.
Nessus displays hosts that currently count against your license limit and the following inform-
ation:
Column Description
First The date Nessus first scanned the host for vulnerabilities, which is the date the
Scanned host started counting towards your license.
Last The number of days ago Nessus last scanned the host for vulnerabilities. If Nes-
Scanned sus does not scan the host for 90 days, the host stops counting towards the
license limit.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 320 -
respective owners.
Update Nessus Software
l Update all components: Updates the Nessus engine and downloads the latest plugin set.
In the Update Frequency box, select the interval at which you want Nessus to update (Daily,
Weekly, or Monthly).
-or-
A box appears where you can type the number of hours you want to define as the interval.
5. In the Update Server box, type the server from which you want Nessus to download plugins.
4. In the Update Server box, type the server from which you want Nessus to download plugins.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 321 -
respective owners.
Nessus downloads any available updates.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 322 -
respective owners.
Set a Master Password
If you set a master password, Nessus encrypts all policies and credentials contained in the policy, and
prompts you for the password as needed.
Caution: If you lose your master password, it cannot be recovered by an administrator or Tenable Sup-
port.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 323 -
respective owners.
Advanced Settings
The Advanced Settings page allows you to manually configure Nessus. You can configure advanced
settings from the Nessus user interface, or from the command line interface. Nessus validates your
input values to ensure only valid configurations are allowed.
l User Interface
l Scanning
l Logging
l Performance
l Security
l Cluster
l Miscellaneous
l Custom
Details
l Advanced settings apply globally across your Nessus instance.
l To configure advanced settings, you must use a Nessus administrator user account.
l Not all advanced settings are automatically populated in the Nessus interface.
l Settings that require restarting Nessus for the change to apply are indicated by the icon in the
user interface.
User Interface
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 324 -
respective owners.
Valid Val-
Setting Identifier Description Default
ues
Nessus Web xmlrpc_ The port that the Nessus web 8834 Integers
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 325 -
respective owners.
Valid Val-
Setting Identifier Description Default
ues
Scanning
Valid
Iden- Defaul-
Setting Description Val-
tifier t
ues
Audit audit_ Controls verbosity of the plugin audit trail. Full full full,
Trail trail audit trails include the reason why plugins were not par-
Verbosity included in the scan.
tial,
none
Auto auto_ Automatically activates the plugins that are yes yes
Enable enable_ depended on. If disabled, not all plugins may run or no
Plugin depend- despite being selected in a scan policy.
Depend- encies
encies
CGI Path- cgi_path A colon-delimited list of CGI paths to use for web /cgi- String
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 326 -
respective owners.
Valid
Iden- Defaul-
Setting Description Val-
tifier t
ues
Max Plu- plugin_ The maximum size, in kilobytes (KB), of plugin out- 1000 Intege-
gin Out- output_ put to be included in exported scan results with the rs.
put Size max_ .nessus format. If the output exceeds the max- If set
size_kb imum size, it is truncated in the report. to 0,
no
limit
is
enfor-
ced.
Max- report.m- The maximum number of allowable ports. If there 1024 Intege-
imum ax_ports are more ports in the scan results than this value, rs
Ports in the excess will be discarded. This limit helps guard
Scan against fake targets that may have thousands of
Reports reported ports, but can also result in valid results
being deleted from the scan results database, so
you may want to increase the default if this is a
problem.
Nessus rules Location of the Nessus rules file (nessusd.rules). Nessus String
Rules
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 327 -
respective owners.
Valid
Iden- Defaul-
Setting Description Val-
tifier t
ues
File Loca- The following are the defaults for each operating config
tion system: dir-
Linux: /op- ectory
t/nessus/etc/nessus/nessusd.rules for
your
Mac OS X: /Library/Nes-
oper-
sus/run/var/nessus/conf/nessusd.rules
ating
Windows: C:\Pro- system
gramData\Ten-
able\Nessus\nessus\conf\nessusd.rules
Non-Sim- non_sim- Specifies ports against which two plugins cannot 139, String
ultan- ult_ports not be run simultaneously. 445,
eous 3389
Ports
Paused paused_ The duration, in minutes, that a scan can remain in 0 Intege-
Scan scan_ the paused state before it is terminated. rs 0-
Timeout timeout 10080
PCAP pcap.sna- The snapshot size used for packet capture; the max- 0 Intege-
Snap- plen imum size of a captured network packet. Typically, rs 0-
shot this value is automatically set based on the scan- 26214-
Length ner's NIC. However, depending on your network con- 4
figuration, packets may be truncated, resulting in
the following message in your scan report: "The cur-
rent snapshot length of ### for interface X is too
small." You can increase the length to avoid packets
being truncated.
Port port_ The default range of ports that the scanner plugins defau- defa-
Range range probe. lt ult,
all, a
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 328 -
respective owners.
Valid
Iden- Defaul-
Setting Description Val-
tifier t
ues
range
of
ports,
a
comm-
a-sep-
arate-
d list
of
ports
and/-
or
port
range-
s.
Spe-
cify
UDP
and
TCP
ports
by
pre-
fixing
each
range
by T:
or U:.
Reverse reverse_ When enabled, targets are identified by their fully no yes
DNS Loo- lookup qualified domain name (FQDN) in the scan report. or no
kups When disabled, the report identifies the target by
hostname or IP address.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 329 -
respective owners.
Valid
Iden- Defaul-
Setting Description Val-
tifier t
ues
Safe safe_ When enabled, Nessus uses safe checks, which use yes yes
Checks checks banner grabbing rather than active testing for a vul- or no
nerability.
Silent silent_ When enabled, the list of plugin dependencies and yes yes
Plugin depend- their output are not included in the report. A plugin or no
Depend- encies may be selected as part of a policy that depends on
encies other plugins to run. By default, Nessus runs those
plugin dependencies, but does not include their out-
put in the report. When disabled, Nessus includes
both the selected plugin and any plugin depend-
encies in the report.
Slice Net- slice_net- If this option is set, Nessus does not scan a network no yes
work work_ incrementally (10.0.0.1, then 10.0.0.2, then 10.0.0.3, or no
Addresse- addresse- and so on) but attempts to slice the workload
s s throughout the whole network (e.g., it scans
10.0.0.1, then 10.0.0.127, then 10.0.0.2, then
10.0.0.128, and so on).
Logging
Valid
Iden- Defa-
Setting Description Val-
tifier ult
ues
Log log_ When enabled, scan logs include the user name, scan no yes
Addi- details name, and current plugin name in addition to the or no
tional base information. You may not see these additional
Scan details unless log_whole_attack is also enabled.
Details
Log log_ Logs verbose details of the scan. Helpful for debug- no yes
Verb- whole_ ging issues with the scan, but this may be disk intens- or no
ose attack ive. To add additional details, enable log_details.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 330 -
respective owners.
Valid
Iden- Defa-
Setting Description Val-
tifier ult
ues
Scan
Details
Nessus dumpfile Location of a dump file for debugging output if gen- Nes- String
Dump erated. sus
File
The following are the defaults for each operating sys- log
Loca-
tem: dir-
tion
Linux: ect-
ory
/opt/nessus/var/nessus/logs/nessud.dump
for
Mac OS X: your
/Library/Nes- oper-
sus/run/var/nessus/logs/nessusd.dump ating
sys-
Windows:
tem
C:\Pro-
gramData\Ten-
able\Nessus\nessus\logs\nessusd.dump
Nessus nasl_log_ The type of NASL engine output in nessusd.dump. nor- nor-
Dump type mal mal,
File Log
none,
Level
trac-
e, or
full.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 331 -
respective owners.
Valid
Iden- Defa-
Setting Description Val-
tifier ult
ues
Nessus logfile Location where the Nessus log file is stored. Nes- String
Scan- sus
The following are the defaults for each operating sys-
ner Log
tem: log
Loca-
dir-
tion Linux:
ect-
/op- ory
t/nes- for
sus/var/nessus/logs/nessusd.messages your
Mac OS X: oper-
ating
/Library/Nes-
sys-
sus/run/var/nessus/logs/nessusd.messages
tem
Windows:
C:\Pro-
gramData\Ten-
able\Nessus\nessus\logs\nessusd.messages
Use Mil- logfile_ When enabled, log timestamps are in milliseconds. no yes
lisecon- msec When disabled, log timestamps are in seconds. or no
ds in
Logs
Performance
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 332 -
respective owners.
Valid Val-
Setting Identifier Description Default
ues
Engine Thread Pool thread_pool_ The size of the pool 200 Integers 0-
Size size of threads available 500
for use by the scan
engine. Asyn-
chronous tasks can
be deferred to these
threads, and this
value controls the
maximum number of
threads to be cre-
ated.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 333 -
respective owners.
Valid Val-
Setting Identifier Description Default
ues
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 334 -
respective owners.
Valid Val-
Setting Identifier Description Default
ues
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 335 -
respective owners.
Valid Val-
Setting Identifier Description Default
ues
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 336 -
respective owners.
Valid Val-
Setting Identifier Description Default
ues
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 337 -
respective owners.
Valid Val-
Setting Identifier Description Default
ues
Webserver Thread Pool www_thread_ Thread pool size for 100 Integers 0-
Size pool_size the web- 500
server/backend.
Security
Valid Val-
Setting Identifer Description Default
ues
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 338 -
respective owners.
Valid Val-
Setting Identifer Description Default
ues
Agents & Scanners
Valid Val-
Setting Identifier Description Default
ues
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 339 -
respective owners.
Valid Val-
Setting Identifier Description Default
ues
Note: If Nes-
sus Manager
updates are
disabled
entirely,
updates are
not down-
loaded.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 340 -
respective owners.
Valid Val-
Setting Identifier Description Default
ues
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 341 -
respective owners.
Valid Val-
Setting Identifier Description Default
ues
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 342 -
respective owners.
Valid Val-
Setting Identifier Description Default
ues
Cluster
Note: The following settings are only available in Nessus Manager with clustering enabled.
Valid Val-
Setting Identifier Description Default
ues
Agent Clus- agent_ Scans will be aborted after run- 3600 Integers >
tering Scan cluster_ ning this many seconds without 299
Cutoff scan_cutoff a child node update.
Miscellaneous
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 343 -
respective owners.
Iden- Defaul- Valid Val-
Setting Description
tifier t ues
Initial ms_ (Nessus Manager only) Sleep time between man- 30 Integers
Sleep agent_ aged scanner and agent requests. This can be 5-3300
Time sleep overridden by Nessus Manager or Tenable.io.
Nessus dbg_ The port on which nessusd listens for ndbg cli- None String in
Debug port ent connections. If left empty, no debug port is one of
Port established. the fol-
lowing
formats:
port or
localhost
:port or
ip:port
Nessus config_ Location of the configuration file that contains Nessus String
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 344 -
respective owners.
Iden- Defaul- Valid Val-
Setting Description
tifier t ues
Non-User report_ The age threshold (in days) for removing old sys- 30 Integers >
Scan Res- cleanu- tem-user scan reports. 0
ult p_
Cleanup threshol-
Threshold d_days
Path to path_ Custom path to Java for PDF exports. If not set, None String
Java to_java Nessus uses the system path.
Must be
an abso-
lute file
path.
Remote remote_ This setting allows Nessus to operate on dif- None Integer
Scanner listen_ ferent ports: one dedicated to communicating
Port port with remote agents and scanners (comms port)
and the other for user logins (management
port). By adding this setting, you can link your
managed scanners and agents a different port
(e.g., 9000) instead of the port defined in
xmlrpc_listen_port (default 8834).
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 345 -
respective owners.
Iden- Defaul- Valid Val-
Setting Description
tifier t ues
Scan source_ Source IPs to use when running on a multi- None IP addres-
Source IP ip homed host. If multiple IPs are provided, Nes- s or
(s) sus will cycle through them whenever it per- comma-
forms a new connection. separated
list of
IP addres-
ses.
Send Tele- send_ When enabled, Tenable collects usage statistics yes yes or no
metry tele- that cannot be attributed to a specific user or
metry customer. Tenable does not collect personal
data or personally identifying information (PII).
User Scan scan_ The number of days after which scan history 0 0 or
Result history_ and data for completed scans is permanently integers
Deletion expir- deleted. larger
Threshold ation_ than or
days equal to
3.
If set to 0,
all history
is
retained.
Custom
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 346 -
respective owners.
Not all advanced settings are populated in the Nessus user interface, but some settings can be set in
the command line interface. If you create a custom setting, it appears in the Custom tab.
The following table lists available advanced settings that are not listed by default in the Nessus user
interface but can still be configured.
nessus_syn_scan- Sets the max number of SYN packets that 65536 Integers
ner.global_through- Nessus sends per second during its port
put.max scan (no matter how many hosts are
scanned in parallel). Adjust this setting
based on the sensitivity of the remote
device to large numbers of SYN packets.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 347 -
respective owners.
Create a New Setting
4. In the Name box, type the key for the new setting.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 348 -
respective owners.
Modify a Setting
3. In the settings table, click the row for the setting you want to modify.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 349 -
respective owners.
Delete a Setting
3. In the settings table, in the row for the setting you want to delete, click the button.
4. Click Delete.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 350 -
respective owners.
LDAP Server
In Nessus Manager, the LDAP Server page displays options that allow you to configure a Lightweight
Directory Access Protocol (LDAP) server to import users from your directory.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 351 -
respective owners.
Configure an LDAP Server
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 352 -
respective owners.
Proxy Server
The Proxy Server page displays options that allow you to configure a proxy server. If the proxy you
use filters specific HTTP user agents, you can type a custom user-agent string in the User-Agent box.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 353 -
respective owners.
Configure a Proxy Server
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 354 -
respective owners.
Remote Link
The Remote Link page displays options that allow you to link your Nessus scanner to a licensed Nes-
sus Manager or Tenable.io.
If your scanner is already linked to Tenable.sc, you can unlink by toggling the On switch to Off. You
can then link the scanner to Tenable.io or Nessus Manager, but you cannot relink to Tenable.sc from
the interface.
Option Set To
Scanner The name you want to use for this Nessus scanner.
Name
Manager The static IP address or hostname of the Nessus Manager instance you want to
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 355 -
respective owners.
Option Set To
Use Select or deselect the check box depending on your proxy settings. If you select
Proxy Use Proxy, you must also configure:
Link to Tenable.io
Scanner cloud.tenable.com
Name
Linking The key specific to your instance of Tenable.io. The key looks something like the
Key following string:
2d38435603c5b59a4526d39640655c3288b00324097a08f7a93e5480940d1cae
Use Select or deselect the check box depending on your proxy settings. If you select
Proxy Use Proxy, you must also configure:
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 356 -
respective owners.
Option Set To
Scanner The name you want to use for this Nessus scanner in Industrial Security.
Name
Linking The key specific to your instance of Industrial Security. It will look something like
Key the following string:
2d38435603c5b59a4526d39640655c3288b00324097a08f7a93e5480940d1cae
Use Select or deselect the check box depending on your proxy settings. If you select
Proxy Use Proxy, you must also configure:
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 357 -
respective owners.
SMTP Server
The SMTP Server page displays options that allow you to configure a Simple Mail Transfer Protocol
(SMTP) server. When you configure an SMTP server, Nessus emails scan results to the list of recipients
that you specify.
Note: To configure an SMTP server for Nessus, you must have an HTML compatible email client.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 358 -
respective owners.
Configure an SMTP Server
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 359 -
respective owners.
Custom CA
The Custom CA page displays a text box that you can use to upload a custom certificate authority (CA)
in Nessus. For instructions on how to create a custom CA, see the Create a New Custom CA and
Server Certificate topic.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 360 -
respective owners.
Add a Custom CA
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 361 -
respective owners.
Upgrade Assistant
You can upgrade data from Nessus to to Tenable.io via the Upgrade Assistant tool.
For more information, please refer to the Upgrade Assistant documentation: https://-
docs.tenable.com/upgradeassistant/nessus
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 362 -
respective owners.
Password Management
The Password Management page, available in Nessus 7.1, displays settings that allow you to set para-
meters for passwords, login notifications, and the session timeout.
Session 30 The web session timeout in minutes. Users are logged out auto-
Timeout matically if their session is idle for longer than this timeout value.
(mins)
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 363 -
respective owners.
Setting Default Description
Max Login 5 The maximum number of user login attempts allowed by Nessus
Attempts before the account is locked out. Setting this value to 0 disables
this feature.
Min Pass- 8 This setting defines the minimum number of characters for pass-
word Length words of accounts.
Login Noti- Off Login notifications allow the user to see the last successful login
fications and failed login attempts (date, time, and IP), and if any failed login
attempts have occurred since the last successful login.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 364 -
respective owners.
Configure Password Management
Note: Changes to the Session Timeout and Max Login Attempts settings require a restart to
take effect.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 365 -
respective owners.
Scanner Health
The Scanner Health page provides you with information about the performance of your Nessus scan-
ner. You can monitor real-time health and performance data to help troubleshoot scanner issues.
Scanner alerts provide information about system errors that may cause your scanner to malfunction.
Information is updated every 30 seconds.
l Overview
l Network
l Alerts
Overview
Widget Description Actions
Scanner Alerts about areas where your Nessus scanner per- Click an alert to see more
Alerts formance may be suffering. Alerts can have a sever- details.
ity level of Info, Low, Medium, or High.
If there are more than five
alerts, click More Alerts to
see the full list of alerts.
Memory Graph displaying how many MB of memory Nessus Hover over a point on the
Usage His- used over time. graph to see detailed data.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 366 -
respective owners.
tory
CPU Usage Graph displaying the percentage of CPU load Nes- Hover over a point on the
History sus used over time. graph to see detailed data.
Scanning Graph displaying the number of scans Nessus ran Hover over a point on the
History and active targets Nessus scanned over time. graph to see detailed data.
Network
Widget Description Actions
Scanning His- Graph displaying the number of scans Nessus ran Hover over a point on the
tory and active targets Nessus scanned over time. graph to see detailed data.
Network Con- Graph displaying the number of TCP sessions Nes- Hover over a point on the
nections sus creates during scans over time. graph to see detailed data.
Network Graph displaying how much traffic Nessus is send- Hover over a point on the
Traffic ing and receiving over the network over time. graph to see detailed data.
Number of Graph displaying how many reverse DNS Hover over a point on the
DNS Lookups (rDNS) and DNS lookups Nessus performs over graph to see detailed data.
time.
DNS Lookup Graph displaying the average time that Nessus Hover over a point on the
Time takes to perform rDNS and DNS lookups over time. graph to see detailed data.
Alerts
Widget Description Actions
Scanner List of alerts about areas where your Nessus scanner performance Click an alert
Alerts may be suffering. Alerts can have a severity level of Info, Low, to see more
Medium, or High. details.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 367 -
respective owners.
Monitor Scanner Health
The Scanner Health page provides you with information about the performance of your Nessus scan-
ner. For more information about performance data, see Scanner Health.
3. (Optional) To adjust the time scale on a graph, on the Overview tab, from the drop-down box,
select a time period.
The graphs on both the Overview and Network tabs reflect the selected time period.
4. (Optional) To hide an item from a time graph, click the item in the legend.
Tip: Hiding items automatically adjusts the scale to the visible items and allows you to to clearly
view one data set at a time.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 368 -
respective owners.
Notifications
Nessus may periodically display notifications such as login attempts, errors, system information, and
license expiration information. These notifications appear after you log in, and you can choose to
acknowledge or dismiss each notification. For more information, see Acknowledge Notifications.
The following table describes the two ways you can view notifications:
Current notifications The bell icon in the top Displays notifications that appeared during
this session.
navigation bar ( )
When you acknowledge a notification, it no
longer appears in your current notification
session, but continues to be listed in the noti-
fication history.
Notification history Settings > Noti- Displays all notifications from the past 90
fications days.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 369 -
respective owners.
Acknowledge Notifications
When you acknowledge a notification, it no longer appears in your current notification session, but
continues to be listed in the notification history. You cannot acknowledge notifications from the noti-
fication history view. For more information on viewing notification history, see View Notifications.
If you choose not to acknowledge a notification, it appears the next time you log in. You cannot
acknowledge some notifications – instead, you must take the recommended action.
To acknowledge a notification:
Note: Clearing notifications does not acknowledge notifications; it removes them from your cur-
rent notifications. You can still view cleared notifications in notification history.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 370 -
respective owners.
View Notifications
You can view outstanding notifications from your current session, and you can also view a history of
notifications from the past 90 days. For information on managing notifications, see Acknowledge Noti-
fications.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 371 -
respective owners.
Accounts
This section contains the following tasks available in the Accounts section of the Settings page.
l Generate an API Key
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 372 -
respective owners.
My Account
The Account Settings page displays settings for the current authenticated user.
API Keys
An API Key consists of an Access Key and a Secret Key. API Keys authenticate with the Nessus REST
API (version 6.4 or greater) and pass with requests using the X-ApiKeys HTTP header.
Note:
l API Keys are only presented upon initial generation. Store API keys in a safe location.
l API Keys cannot be retrieved by Nessus. If you lose your API Key, you must generate a new
API Key.
l Regenerating an API Key will immediately deauthorize any applications currently using the key.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 373 -
respective owners.
Modify Your User Account
4. Click Save.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 374 -
respective owners.
Generate an API Key
Caution: Generating a new API key will replace any existing keys and deauthorize any linked applic-
ations.
Note: Customers may not directly access Nessus scanning APIs to configure or launch scans, except as
permitted as part of the Tenable.sc and Tenable.io enterprise solutions.
4. Click Generate.
5. Click Generate.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 375 -
respective owners.
Users
The User Profile page displays a table of all Nessus user accounts. This documentation refers to that
table as the users table. Each row of the users table includes the user name, the date of the last login,
and the role assigned to the account.
User accounts are assigned roles that dictate the level of access a user has in Nessus. You can change
the role of a user account at any time, as well as disable the account. The following table describes the
roles that can be assigned to users:
Name Description
Standard Standard users can create scans, policies, and user asset lists.
Administrator Administrators have the same privileges as Standard users, but can also manage
users, user groups, and scanners. In Nessus Manager, administrators can view
scans that are shared by users.
System System Administrators have the same privileges as Administrators, but can also
Administrator manage and modify system configuration settings.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 376 -
respective owners.
Create a User Account
This procedure can be performed by an administrator in Nessus Manager or Nessus Professional with
legacy features. Multiple users are not available in Nessus Professional 7.0 and later.
4. Type in the settings as necessary, and select a role for the user.
5. Click Save.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 377 -
respective owners.
Modify a User Account
This procedure can be performed by an administrator in Nessus Manager or Nessus Professional with
legacy features. Multiple users are not available in Nessus Professional 7.0 and later.
3. In the users table, click the user whose account you want to modify.
The <Username> page appears, where <Username> is the name of the selected user.
5. Click Save.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 378 -
respective owners.
Delete a User Account
3. In the users table, in the row for the user that you want to delete, click the button.
4. Click Delete.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 379 -
respective owners.
Transfer User Data
In instances of Nessus with multiple users, such as Nessus Manager, you can transfer a user's data to a
system administrator. When you transfer user data, you transfer ownership of all policies, scans, scan
results, and plugin rules to a system administrator account. Transferring user data is useful if you
need to remove a user account but do not want to lose their associated data in Nessus.
1. Log in to Nessus with the system administrator account to which you want to transfer user data.
4. In the users table, select the check box for each user whose data you want to transfer to your
account.
Note: Once you transfer user data, you cannot undo the action.
Nessus transfers ownership of the selected user's policies, scans, scan results, and plugin rules
to the administrator account.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 380 -
respective owners.
Download Logs
As an administrator, you can download a log file containing local Nessus logs and system con-
figuration data. This information can help you troubleshoot system problems, and also provides an
easy way to gather data to submit to Tenable Support.
You can choose to download two types of log files: Basic or Extended. The Basic option contains
recent Nessus log data as well as system information, including operating system version, CPU stat-
istics, available memory and disk space, and other data that can help you troubleshoot. The Extended
option also includes recent Nessus webserver log records, system log data, and network configuration
information.
To download logs:
l Extended: All information in the Basic option, Nessus webserver log data, and additional
system logs.
4. (Optional) Select Sanitize IPs to hide the first two octets of IPv4 addresses in the logs.
5. Click Download.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 381 -
respective owners.
Additional Resources
l Scan Targets
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 382 -
respective owners.
Agent Software Footprint
Note: Performance varies by environment and you may or may not see similar results.
* Under certain conditions, disk usage can spike up to 2GB, e.g. when a plugins-code.db defrag-
mentation operation is in progress.
**Assuming only one scan a day with no plugin updates. Used nethogs program to collect network
usage (sent/received) of nessusd. After a single scan that detected 66 vulnerabilities on the agent
host, 0.855 MB was sent and received (breakdown: .771 MB sent, .084 MB received). After two total
scans, 1.551 MB was sent and 0.204 MB was received. Set to > 1 MB day as the polling for jobs adds up
(~0.008 MB per poll).
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 383 -
respective owners.
Agent Host System Utilization
Note: Performance varies by environment and you may or may not see similar results.
Generally, a Nessus Agent uses 40 MB of RAM (all pageable). A Nessus Agent uses almost no CPU while
idle, but is designed to use up to 100% of CPU when available during jobs.
To measure network utilization when uploading results, Tenable monitored Agent uploads intoTen-
able.io over a 7 day period. Of over 36,000 uploads observed:
l Plugins consume approximately 300 MB of disk space (varies based on operating system).
However, under certain conditions, disk usage can spike up to 2GB, e.g. when a plugins-
code.db defragmentation operation is in progress.
l Scan results from Nessus Agents to Nessus Manager and Tenable.io range between 2-3 MB.
l Check-in frequency starts at 30 seconds and is adjusted by Nessus Manager orTenable.io based
on the management system load (number of agents).
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 384 -
respective owners.
Amazon Web Services
For information on integrating Nessus with Amazon Web Services, see the Nessus (BYOL) on Amazon
Web Services Quick Start Guide.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 385 -
respective owners.
Command Line Operations
This section includes command line operations for Nessus and Nessus Agents.
Tip: During command line operations, prompts for sensitive information, such as a password, do not
show characters as you type. However, the data is recorded and is accepted when you press
the Enter key.
l Nessus-Service
l Nessuscli
l Nessuscli Agent
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 386 -
respective owners.
Start or Stop Nessus
The following represent best practices for starting and stopping Nessus.
Mac OS X
1. Navigate to System Preferences.
-or-
Start or
Mac OS X Command Line Operation
Stop
Windows
1. Navigate to Services.
3. To stop the Nessus service, right-click Tenable Nessus, and then click Stop.
-or-
To restart the Nessus service, right-click Tenable Nessus, and then click Start.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 387 -
respective owners.
Start or Stop Windows Command Line Operation
Linux
Use the following commands:
SUSE
FreeBSD
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 388 -
respective owners.
Start or Stop a Nessus Agent
The following represent best practices for starting and stopping a Nessus Agent on a host.
Mac OS X
1. Navigate to System Preferences.
-or-
Start or
Mac OS X Command Line Operation
Stop
Windows
1. Navigate to Services.
3. To stop the service, right-click Tenable Nessus Agent, and then click Stop.
-or-
To restart the Nessus Agent service, right-click Tenable Nessus Agent, and then click Start.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 389 -
respective owners.
Start or Stop Windows Command Line Operation
Linux
Use the following commands:
SUSE
FreeBSD
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 390 -
respective owners.
Nessus-Service
If necessary, whenever possible, Nessus services should be started and stopped using Nessus Service
controls in the operating system’s interface.
However, there are many nessus-service functions that can be performed through a command line
interface.
The # killall nessusd command is used to stop all Nessus services and in-process scans.
Nessus-Service Syntax
Operating
Command
System
Linux
# /opt/nessus/sbin/nessus-service -q -D
FreeBSD
# /usr/local/nessus/sbin/nessus-service -q -D
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 391 -
respective owners.
Nessusd Commands
Option Description
-c <con- When starting the nessusd server, this option is used to specify the server-side nes-
fig-file> susd configuration file to use. It allows for the use of an alternate configuration file
instead of the standard db.
-a When starting the nessusd server, this option is used to tell the server to only listen
<address> to connections on the address <address> that is an IP, not a machine name. This
option is useful if you are running nessusd on a gateway and if you do not want
people on the outside to connect to your nessusd.
-S <ip When starting the nessusd server, force the source IP of the connections established
[,ip2,…]> by Nessus during scanning to <ip>. This option is only useful if you have a mul-
tihomed machine with multiple public IP addresses that you would like to use
instead of the default one. For this setup to work, the host running nessusd must
have multiple NICs with these IP addresses set.
-D When starting the nessusd server, this option forces the server to run in the back-
ground (daemon mode).
-t Check the time stamp of each plugin when starting up to only compile newly
updated plugins.
If a master password is set, Nessus encrypts all policies and credentials contained in
the policy. When a password is set, the Nessus UI prompts you for the password.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 392 -
respective owners.
Option Description
If your master password is set and then lost, it cannot be recovered by your admin-
istrator nor Tenable, Inc. Support.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 393 -
respective owners.
Nessuscli
This allows the user to manage user accounts, modify advanced settings, manage digital certificates,
report bugs, update Nessus, and fetch necessary license information.
Nessuscli Syntax
Operating System Command
or
C:\ProgramData\Tenable\Nessus
Nessuscli Commands
Command Description
Help Commands
nessuscli [cmd] help Displays additional help for specific commands identified in
the nessuscli help output.
The bug reporting commands create an archive that can be sent to Tenable, Inc. to help diagnose
issues. By default, the script runs in interactive mode.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 394 -
respective owners.
Command Description
User Commands
nessuscli chpasswd <user- Allows you to change a user’s password. You are prompted to
name> enter the Nessus user’s name. Passwords are not echoed on
the screen.
Fetch Commands
nessuscli fetch -- Uses your Activation Code to register Nessus online, but does
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 395 -
respective owners.
Command Description
nessuscli fetch -- Registers Nessus 6.3 and newer with the nessus.license file
register-offline nes- obtained from https://plugins.nessus.org/v2/offline.php .
sus.license
Note: If you are using a version of Nessus 6.2 or earlier, you
must use the information and instructions displayed on
https://plugins.nessus.org/offline.php. In Nessus 6.2 and
earlier, the license is contained in the fc.file.
nessuscli fetch --check Displays whether Nessus is properly registered and is able to
receive updates.
nessuscli fetch --code- Displays the Nessus Activation Code being used by Nessus.
in-use
Fix Commands
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 396 -
respective owners.
Command Description
nessuscli fix --reset This command deletes all your registration information and
preferences, causing Nessus to run in a non-registered state.
Nessus Manager retains the same linking key after resetting.
nessuscli fix --reset- This command resets Nessus to a fresh state, deleting all regis-
all tration information, settings, data, and users.
Certificate Commands
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 397 -
respective owners.
Command Description
nessuscli update By default, this tool respects the software update options selec-
ted through the Nessus UI.
nessuscli update <tar.gz Updates Nessus plugins by using a TAR file instead of getting
filename> the updates from the plugin feed. The TAR file is obtained
when you Manage Nessus Offline - Download and Copy Plu-
gins steps.
Manager Commands
Used for generating plugin updates for your managed scanners and agents connected to a man-
ager.
nessuscli manager down- Downloads core component updates for remotely managed
load-core agents and scanners.
nessuscli manager gen- Generates plugins archives for remotely managed agents and
erate-plugins scanners.
Used for linking, unlinking and viewing the status of remote managed scanners.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 398 -
respective owners.
Command Description
--proxy-password=<password>
--proxy-agent=<agent>
Note: You cannot link a scanner via the CLI if the scanner has
already been registered. You can either link via the user inter-
face, or reset the scanner to unregister it (however, you lose
all scanner data).
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 399 -
respective owners.
Nessuscli Agent
Use the nessuscli agent utility to perform some Nessus Agent functions through a command line
interface.
Note: You must run all nessuscli agent commands as a user with administrative privileges.
or
C:\ProgramData\Tenable\Nessus Agent
Help Commands
Optional arguments:
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 400 -
respective owners.
Command Description
# nessuscli agent link Using the Nessus Agent Linking Key, this command links the
--key=<key> --host- agent to the Nessus Manager or Tenable.io.
t=<host> --port=<port> Required arguments:
--key=<key>
--host=<host>
--port=<port>
Optional arguments:
--name=<name>
--groups=<group1,group2,...>
--ca-path=<ca_file_name>
--offline-install
--proxy-host=<host>
--proxy-port=<port>
--proxy-username=<username>
--proxy-password=<password>
--proxy-agent=<agent>
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 401 -
respective owners.
Command Description
Tenable.io arguments:
--cloud
--file=<plugins_set.tgz>
# nessuscli agent Displays the status of the agent, jobs pending, and if the agent is
status linked or not linked to server.
Optional arguments:
Fix Commands
Note: Restart the agent service for the change to take effect in
Nessus Manager.
# nessuscli fix --set Tracks unique agent assets by MAC address to prevent duplicates
track_unique_agent- and outdated agents from appearing in Nessus Manager if a sys-
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 402 -
respective owners.
Command Description
# nessuscli fix --set Sets the maximum number of times an agent should retry in the
max_retries="<value>" event of a failure when executing the agent link, agent
status, or agent unlink commands. The commands retry, the
specified number of times, consecutively, sleeping increasing
increments of time set by retry_sleep_milliseconds
between attempts. The default value for max_retries is 0.
Note: This setting does not affect offline updates or the agent's
normal 24 hour check-in after it is linked.
# nessuscli fix --set Sets the number of milliseconds that an agent sleeps for between
retry_sleep_mil- retries in event of a failure when executing the agent link,
liseconds="<value>" agent status, or agent unlink commands. The default is
1500 milliseconds (1.5 seconds).
nessuscli fix --secure Displays a list of agent settings and their values.
--list
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 403 -
respective owners.
Command Description
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 404 -
respective owners.
Update Nessus Software
When updating Nessus components, you can use the nessuscli update commands, also found in the
command line section.
Note: If you are working with Nessus offline, see Manage Nessus Offline.
nessuscli update By default, this tool respects the software update options selec-
ted through the Nessus UI.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 405 -
respective owners.
Default Data Directories
The default Nessus data directory contains logs, certificates, temporary files, database backups, plu-
gins databases, and other automatically generated files.
Refer to the following table to determine the default data directory for your operating system.
Linux /opt/nessus/var/nessus
Windows C:\ProgramData\Tenable\Nessus\nessus
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 406 -
respective owners.
File and Process Whitelist
Nessus should be whitelisted in third-party endpoint security products such as anti-virus applications
and host-based intrusion and prevention systems.
Note: If your Windows installation uses a non-standard drive or folder structure, use the
%PROGRAMFILES% and %PROGRAMDATA% environment variables.
The table below contains a list of Nessus folders, files, and processes that should be whitelisted. For
information about whitelisting Nessus Agent processes, see File and Process Whitelist in the Nessus
Agent User Guide.
Windows
Files
C:\Program Files\Tenable\Nessus\*
C:\ProgramData\Tenable\Nessus\*
Processes
C:\Program Files\Tenable\Nessus\nessuscli.exe
C:\Program Files\Tenable\Nessus\nessusd.exe
C:\Program Files\Tenable\Nessus\nasl.exe
C:\Program Files\Tenable\Nessus\nessus-service.exe
Linux
Files
/opt/nessus/sbin/*
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 407 -
respective owners.
/opt/nessus/bin/*
Processes
/opt/nessus/bin/nasl
/opt/nessus/sbin/nessusd
/opt/nessus/sbin/nessuscli
/opt/nessus/sbin/nessus-service
macOS
Files
/Library/Nessus/run/sbin/*
/Library/Nessus/run/bin/*
Processes
/Library/Nessus/run/bin/nasl
/Library/Nessus/run/sbin/nessus-service
/Library/Nessus/run/sbin/nessuscli
/Library/Nessus/run/sbin/nessusd
/Library/Nessus/run/sbin/nessusmgt
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 408 -
respective owners.
Manage Logs Using log.json
You can configure the size and location of log data by editing the log.json file.
1. Using a text editor, open the log.json file, located in the following directory:
l Linux: /opt/nessus/var/nessus/log.json
l Mac OS X: /Library/Nessus/run/var/nessus/log.json
l Windows: C:\ProgramData\Tenable\Nessus\nessus\log.json
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 409 -
respective owners.
log file The following are the default paths for each operating
system:
Linux: /opt/nessus/var/nessus/logs/<file-
name>
Mac:
/Library/Nessus/run/var/nessus/logs/<file-
name>
Windows: C:\Pro-
gramData\Tenable\Nessus\nessus\logs\<file-
name>
Linux example
{
"reporters": [
{
"tags": [
"response"
],
"reporter": {
"type": "file",
"rotation_strategy": "daily",
"rotation_time": "86400",
"max_size": "536870912",
"max_files": "1024",
"file": "/opt/nessus/var/nessus/logs/www_server.log"
},
"format": "combined"
},
{
"tags": [
"log",
"info",
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 410 -
respective owners.
"warn",
"error",
"trace"
],
"reporter": {
"type": "file",
"file": "/opt/nessus/var/nessus/logs/backend.log"
},
"context": true,
"format": "system"
}
]
}
{
"reporters": [
{
"tags": [
"response"
],
"reporter": {
"type": "file",
"rotation_strategy": "daily",
"rotation_time": "86400",
"max_size": "536870912",
"max_files": "1024",
"file": "/Library/Nessus/run/var/nessus/logs/www_server.log"
},
"format": "combined"
},
{
"tags": [
"log",
"info",
"warn",
"error",
"trace"
],
"reporter": {
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 411 -
respective owners.
"type": "file",
"file": /Library/Nessus/run/var/nessus/logs/backend.log"
},
"context": true,
"format": "system"
}
]
}
Windows example
Note: The backslash ( \) is special character in JSON. To enter a backslash in a path string, you must
escape the first backslash with a second backslash so the path parses correctly.
{
"reporters": [
{
"tags": [
"response"
],
"reporter": {
"type": "file",
"rotation_strategy": "daily",
"rotation_time": "86400",
"max_size": "536870912",
"max_files": "1024",
"file": "C:\\ProgramData\\Tenable\\Nessus\\nessus\\logs\\www_server.log"
},
"format": "combined"
},
{
"tags": [
"log",
"info",
"warn",
"error",
"trace"
],
"reporter": {
"type": "file",
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 412 -
respective owners.
"file": "C:\\ProgramData\\Tenable\\Nessus\\nessus\\logs\\backend.log"
},
"context": true,
"format": "system"
}
]
}
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 413 -
respective owners.
Nessus Credentialed Checks
In addition to remote scanning, Nessus can be used to scan for local exposures. For information about
configuring credentialed checks, see Credentialed Checks on Windows and Credentialed Checks
on Linux.
Purpose
External network vulnerability scanning is useful to obtain a snapshot in time of the network services
offered and the vulnerabilities they may contain. However, it is only an external perspective. It is
important to determine what local services are running and to identify security exposures from local
attacks or configuration settings that could expose the system to external attacks that may not be
detected from an external scan.
In a typical network vulnerability assessment, a remote scan is performed against the external points
of presence and an on-site scan is performed from within the network. Neither of these scans can
determine local exposures on the target system. Some of the information gained relies on the banner
information displayed, which may be inconclusive or incorrect. By using secured credentials, the Nes-
sus scanner can be granted local access to scan the target system without requiring an agent. This can
facilitate scanning of a very large network to determine local exposures or compliance violations.
The most common security problem in an organization is that security patches are not applied in a
timely manner. A Nessus credentialed scan can quickly determine which systems are out of date on
patch installation. This is especially important when a new vulnerability is made public and executive
management wants a quick answer regarding the impact to the organization.
Another major concern for organizations is to determine compliance with site policy, industry stand-
ards (such as the Center for Internet Security (CIS) benchmarks) or legislation (such as Sarbanes-Oxley,
Gramm-Leach-Bliley or HIPAA). Organizations that accept credit card information must demonstrate
compliance with the Payment Card Industry (PCI) standards. There have been quite a few well-pub-
licized cases where the credit card information for millions of customers was breached. This rep-
resents a significant financial loss to the banks responsible for covering the payments and heavy fines
or loss of credit card acceptance capabilities by the breached merchant or processor.
Access Level
Credentialed scans can perform any operation that a local user can perform. The level of scanning is
dependent on the privileges granted to the user account that Nessus is configured to use.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 414 -
respective owners.
Non-privileged users with local access on Linux systems can determine basic security issues, such as
patch levels or entries in the /etc/passwd file. For more comprehensive information, such as system
configuration data or file permissions across the entire system, an account with “root” privileges is
required.
Credentialed scans on Windows systems require that an administrator level account be used. Several
bulletins and software updates by Microsoft have made reading the registry to determine software
patch level unreliable without administrator privileges. Administrative access is required to perform
direct reading of the file system. This allows Nessus to attach to a computer and perform direct file
analysis to determine the true patch level of the systems being evaluated. On Windows XP Pro, this file
access will only work with a local administrator account if the “Network access: Sharing and security
model for local accounts” policy is changed to “Classic – local users authenticate as themselves”.
This plugin detects if either SSH or Windows credentials did not allow the scan to log into the remote
host. When a login is successful, this plugin does not produce a result.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 415 -
respective owners.
Credentialed Checks on Windows
The process described in this section enables you to perform local security checks on Windows sys-
tems. Only Domain Administrator accounts can be used to scan Domain Controllers.
3. Name the group Nessus Local Access. Set Scope to Global and Type to Security.
4. Add the account you will use to perform Nessus Windows Authenticated Scans to the Nessus
Local Access group.
Add the Nessus Local Access group to the Nessus Scan GPO
1. Right-click Nessus Scan GPO Policy, then select Edit.
2. Expand Computer configuration > Policies > Windows Settings > Security Settings >
Restricted Groups.
3. In the left navigation bar on Restricted Groups, right-click and select Add Group.
4. In the Add Group dialog box, select browse and enter Nessus Local Access.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 416 -
respective owners.
6. Select OK twice to close the dialog box.
9. Select OK twice.
Nessus uses Server Message Block (SMB) and Windows Management Instrumentation (WMI). You must
ensure Windows Firewall allows access to the system.
Allow WMI on Windows Vista, 7, 8, 10, 2008, 2008 R2, 2012, 2012 R2,
and 2016 Windows Firewall
1. Right-click Nessus Scan GPO Policy, then select Edit.
2. Expand Computer configuration > Policies > Windows Settings > Security Settings > Win-
dows Firewall with Advanced Security > Windows Firewall with Advanced Security >
Inbound Rules.
4. Choose the Predefined option, and select Windows Management Instrumentation (WMI)
from the drop-down box.
5. Select Next.
7. Select Next.
8. Select Finish.
Tip: Later, you can edit the predefined rule created and limit the connection to the ports by IP Address
and Domain User to reduce any risk for abuse of WMI.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 417 -
respective owners.
1. In Group policy management console, right-click the domain or the OU and select Link an Exist-
ing GPO.
2. Using the gpedit.msc tool (via the Run prompt), invoke the Group Policy Object Editor. Nav-
igate to Local Computer Policy > Administrative Templates > Network > Network Con-
nections > Windows Firewall > Standard Profile > Windows Firewall : Allow inbound file
and printer exception, and enable it.
3. While in the Group Policy Object Editor, navigate to Local Computer Policy > Administrative
Templates > Network > Network Connections > Prohibit use of Internet connection fire-
wall on your DNS domain and ensure it is set to either Disabled or Not Configured.
4. The Remote Registry service must be enabled (it is disabled by default). It can be enabled
manually for continuing audits, either by an administrator or by Nessus. Using plugin IDs 42897
and 42898, Nessus can enable the service just for the duration of the scan.
Note: Enabling this option configures Nessus to attempt to start the remote registry service prior to
starting the scan.
The Windows credentials provided in the Nessus scan policy must have administrative permissions to
start the Remote Registry service on the host being scanned.
Caution: While not recommended, Windows User Account Control (UAC) can be disabled.
Tip: To turn off UAC completely, open the Control Panel, select User Accounts and then set Turn User
Account Control to off. Alternatively, you can add a new registry key named LocalAc-
countTokenFilterPolicy and set its value to 1.
This key must be created in the registry at the following location: HKLM\SOFTWARE\Microsoft\ Win-
dows\CurrentVersion\Policies\system\LocalAccountTokenFilterPolicy.
For more information on this registry setting, consult the MSDN 766945 KB. In Windows 7 and 8, if UAC is
disabled, then EnableLUA must be set to 0 in HKEY_LOCAL_MACHINE\Soft-
ware\Microsoft\Windows\CurrentVersion\Policies\System as well.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 418 -
respective owners.
Prerequisites
A very common mistake is to create a local account that does not have enough privileges to log on
remotely and do anything useful. By default, Windows will assign new local accounts Guest privileges if
they are logged into remotely. This prevents remote vulnerability audits from succeeding. Another com-
mon mistake is to increase the amount of access that the Guest users obtain. This reduces the security
of your Windows server.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 419 -
respective owners.
Enable Windows Logins for Local and Remote Audits
The most important aspect about Windows credentials is that the account used to perform the checks
should have privileges to access all required files and registry entries, which in many cases means
administrative privileges. If Nessus is not provided the credentials for an administrative account, at
best it can be used to perform registry checks for the patches. While this is still a valid method to
determine if a patch is installed, it is incompatible with some third party patch management tools that
may neglect to set the key in the policy. If Nessus has administrative privileges, then it will actually
check the version of the dynamic-link library (.dll) on the remote host, which is considerably more
accurate.
Make sure that the configuration of this account is not set with a typical default of Guest only: local
users authenticate as guest. Instead, switch this to Classic: local users authenticate as them-
selves.
To configure the server to allow logins from a domain account, use the Classic security model. To do
this, follow these steps:
3. Select Computer Configuration > Windows Settings > Security Settings > Local Policies >
Security Options.
4. In the list, select Network access: Sharing and security model for local accounts.
The Network access: Sharing and security model for local accounts window appears.
5. In the Local Security Setting section, in the drop-down box, select Classic - local users authen-
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 420 -
respective owners.
ticate as themselves.
6. Click OK.
This will cause users local to the domain to authenticate as themselves, even though they are not phys-
ically local on the particular server. Without doing this, all remote users, even real users in the domain,
will authenticate as a guest and will likely not have enough credentials to perform a remote audit.
Configuring Windows XP
When performing authenticated scans against Windows XP systems, there are several configuration
options that must be enabled:
l File & Printer Sharing must be enabled in the target’s network configuration.
l Ports 139 and 445 must be open between the Nessus scanner and the target.
l An SMB account must be used that has local administrator rights on the target.
You may be required to change the Windows local security policies or they could block access or inher-
ent permissions. A common policy that will affect credentialed scans is found under:
Administrative Tools > Local Security Policy > Security Settings > Local Policies > Security
Options > Network access: Sharing and security model for local accounts.
If this local security policy is set to something other than Classic - local users authenticate as
themselves, a compliance scan will not run successfully.
l Under Windows Firewall > Windows Firewall Settings, enable File and Printer Sharing.
l Using the Run prompt, run gpedit.msc and enable Group Policy Object Editor. Navigate
to Local Computer Policy > Administrative Templates > Network > Network Connections
> Windows Firewall > Standard Profile > Windows Firewall : Allow inbound file and
printer exception and enable it.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 421 -
respective owners.
l While in the Group Policy Object Editor, navigate to Local Computer Policy > Administrative
Templates > Network > Network Connections > Prohibit use of Internet connection fire-
wall on your DNS domain. This option must be set to either Disabled or Not Configured.
l Windows User Account Control (UAC) must be disabled, or a specific registry setting must be
changed to allow Nessus audits. To turn off UAC completely, open the Control Panel, select User
Accounts and then set Turn User Account Control to Off. Alternatively, you can add a new
registry DWORD named LocalAccountTokenFilterPolicy and set its value to “1”. This key must
be created in the registry at the following location: HKLM\SOFTWARE\Mi-
crosoft\Windows\CurrentVersion\Policies\system\LocalAcc oun-
tTokenFilterPolicy. For more information on this registry setting, consult the MSDN 766945
KB.
l The Remote Registry service must be enabled (it is disabled by default). It can be enabled for a
one-time audit, or left enabled permanently if frequent audits are performed.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 422 -
respective owners.
Configure Nessus for Windows Logins
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 423 -
respective owners.
Credentialed Checks on Linux
The process described in this section enables you to perform local security checks on Linux based sys-
tems. The SSH daemon used in this example is OpenSSH. If you have a commercial variant of SSH, your
procedure may be slightly different.
You can enable local security checks using an SSH private/public key pair or user credentials and sudo
or su access.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 424 -
respective owners.
Prerequisites
Some commercial variants of SSH do not have support for the blowfish cipher, possibly for export reas-
ons. It is also possible to configure an SSH server to only accept certain types of encryption. Check that
your SSH server supports the correct algorithm.
User Privileges
For maximum effectiveness, the SSH user must have the ability to run any command on the system. On
Linux systems, this is known as root privileges. While it is possible to run some checks (such as patch
levels) with non-privileged access, full compliance checks that audit system configuration and file per-
missions require root access. For this reason, it is strongly recommended that SSH keys be used
instead of credentials when possible.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 425 -
respective owners.
Enable SSH Local Security Checks
This section is intended to provide a high-level procedure for enabling SSH between the systems
involved in the Nessus credential checks. It is not intended to be an in-depth tutorial on SSH. It is
assumed the reader has the prerequisite knowledge of Linux system commands.
To generate the key pair, use ssh-keygen and save the key in a safe place. In the following example
the keys are generated on a Red Hat ES 3 installation.
# ssh-keygen -t dsa
Generating public/private dsa key pair.
Enter file in which to save the key (/Users/test/.ssh/id_dsa):
/home/test/Nessus/ssh_key
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in
/home/test/Nessus/ssh_key.
Your public key has been saved in
/home/test/Nessus/ssh_key.pub.
The key fingerprint is:
06:4a:fd:76:ee:0f:d4:e6:4b:74:84:9a:99:e6:12:ea
#
Do not transfer the private key to any system other than the one running the Nessus server. When
ssh-keygen asks you for a passphrase, enter a strong passphrase or press the Return key twice (i.e.,
do not set any passphrase). If a passphrase is specified, it must be specified in Policies > Credentials
> SSH settings in order for Nessus to use key-based authentication.
Nessus Windows users may wish to copy both keys to the main Nessus application directory on the sys-
tem running Nessus (C:\Program Files\Tenable\Nessus by default), and then copy the public
key to the target systems as needed. This makes it easier to manage the public and private key files.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 426 -
respective owners.
On every target system to be scanned using local security checks, create a new user account dedicated
to Nessus. This user account must have exactly the same name on all systems. For this document, we
will call the user nessus, but you can use any name.
Once the account is created for the user, make sure that the account has no valid password set. On
Linux systems, new user accounts are locked by default, unless an initial password was explicitly set. If
you are using an account where a password had been set, use the passwd –l command to lock the
account.
You must also create the directory under this new account’s home directory to hold the public key. For
this exercise, the directory will be /home/nessus/.ssh. An example for Linux systems is provided
below:
# passwd –l nessus
# cd /home/nessus
# mkdir .ssh
#
For Solaris 10 systems, Sun has enhanced the passwd(1) command to distinguish between locked
and non-login accounts. This is to ensure that a user account that has been locked may not be used to
execute commands (e.g., cron jobs). Non-login accounts are used only to execute commands and do
not support an interactive login session. These accounts have the “NP” token in the password field of
/etc/shadow. To set a non-login account and create the SSH public key directory in Solaris 10, run
the following commands:
# passwd –N nessus
# grep nessus /etc/shadow
nessus:NP:13579::::::
# cd /export/home/nessus
# mkdir .ssh
#
Now that the user account is created, you must transfer the key to the system, place it in the appro-
priate directory and set the correct permissions.
Example
From the system containing the keys, secure copy the public key to system that will be scanned for
host checks as shown below. 192.1.1.44 is an example remote system that will be tested with the host-
based checks.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 427 -
respective owners.
# scp ssh_key.pub root@192.1.1.44:/home/nessus/.ssh/authorized_keys
#
You can also copy the file from the system on which Nessus is installed using the secure ftp command,
sftp. Note that the file on the target system must be named authorized_keys.
Repeat this process on all systems that will be tested for SSH checks (starting at “Creating a User
Account and Setting up the SSH Key” above).
Test to make sure that the accounts and networks are configured correctly. Using the simple Linux
command id, from the Nessus scanner, run the following command:
If it successfully returns information about the Nessus user, the key exchange was successful.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 428 -
respective owners.
Configure Nessus for SSH Host-Based Checks
If you have not already done so, secure copy the private and public key files to the system that you will
use to access the Nessus scanner, as described in Enable SSH Local Security Checks.
3. Select SSH.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 429 -
respective owners.
Run Nessus as Non-Privileged User
Nessus 6.7 and later has the ability to run as a non-privileged user.
Limitations
l When scanning localhost, Nessus plugins assume that they are running as root. Therefore, cer-
tain types of scans may fail. For example, because Nessus is now running as a non-privileged
user, file content Compliance Audits may fail or return erroneous results since the plugins are
not able to access all directories.
l nessuscli does not have a --no-root mode. Running commands with nessuscli as root
could potentially create files in the Nessus install directory owned by root, which can prohibit
Nessus from accessing them successfully. Use care when running nessuscli, and potentially fix
permissions with chown after using it.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 430 -
respective owners.
Run Nessus on Linux with Systemd as a Non-Privileged User
Limitations
l For use with Nessus 6.7 or later.
l When scanning localhost, Nessus plugins assume that they are running as root. Therefore, cer-
tain types of scans may fail. For example, because Nessus is now running as a non-privileged
user, file content Compliance Audits may fail or return erroneous results since the plugins are
not able to access all directories.
l nessuscli does not have a --no-root mode. Running commands with nessuscli as root
could potentially create files in the Nessus install directory owned by root, which can prohibit
Nessus from accessing them successfully. Use care when running nessuscli, and potentially fix
permissions with chown after using it.
Steps
1. If you have not already, install Nessus.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 431 -
respective owners.
If this is only a manager, and you do not want this instance of Nessus to perform scans, you
need to provide it only with the capability to change its resource limits.
If you want this instance of Nessus to perform scans, you need to add additional permissions to
allow packet forgery and enabling promiscuous mode on the interface.
l Remove: ExecStart=/opt/nessus/sbin/nessus-service -q
l Add: User=nonprivuser
[Service]
Type=simple
PIDFile=/opt/nessus/var/nessus/nessus-service.pid
ExecStart=/opt/nessus/sbin/nessus-service -q --no-root
Restart=on-abort
ExecReload=/usr/bin/pkill nessusd
EnvironmentFile=-/etc/sysconfig/nessusd
User=nonprivuser
[Install]
WantedBy=multi-user.target
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 432 -
respective owners.
sudo systemctl daemon-reload
sudo service nessusd start
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 433 -
respective owners.
Run Nessus on Linux with init.d Script as a Non-Privileged
User
Limitations
These steps are for use with Nessus 6.7 or later.
When scanning localhost, Nessus plugins assume that they are running as root. Therefore, certain
types of scans may fail. For example, because Nessus is now running as a non-privileged user, file con-
tent Compliance Audits may fail or return erroneous results since the plugins are not able to access all
directories.
Because nessuscli does not have a --no-root mode, running commands with nessuscli as root
could potentially create files in the Nessus install directory owned by root, which can prohibit Nessus
from accessing them successfully. Use care when running nessuscli, and potentially fix permissions
with chown after using it.
Steps
1. If you have not already, install Nessus.
Tip:
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 434 -
respective owners.
cap_net_admin is used to put the interface in promiscuous mode.
cap_net_raw is used to create raw sockets for packet forgery.
cap_sys_resource is used to set resource limits.
If this is only a manager, and you do not want this instance of Nessus install to perform scans,
you need to provide it only with the capability to change its resource limits.
If you want this instance of Nessus to perform scans, you need to add additional permissions to
allow packet forgery and enabling promiscuous mode on the interface.
CentOS
daemon --user=nonprivuser /opt/nessus/sbin/nessus-service -q -D --no-root
Debian
start-stop-daemon --start --oknodo --user nonprivuser --name nessus --pid-
file --chuid nonprivuser --startas /opt/nessus/sbin/nessus-service -- -q
-D --no-root
Depending on your operating system, the resulting script should appear as follows:
CentOS
start() {
KIND="$NESSUS_NAME"
echo -n $"Starting $NESSUS_NAME : "
daemon --user=nonprivuser /opt/nessus/sbin/nessus-service -q -D --no-root
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 435 -
respective owners.
echo "."
return 0
}
Debian
start() {
KIND="$NESSUS_NAME"
echo -n $"Starting $NESSUS_NAME : "
start-stop-daemon --start --oknodo --user nonprivuser --name nessus --
pidfile --chuid nonprivuser --startas /opt/nessus/sbin/nessus-service -- -q -D
--no-root
echo "."
return 0
}
7. Start nessusd.
Note: If you are running Nessus on Debian, after starting Nessus, run the chown -R non-
privuser:nonprivuser /opt/nessus command to regain ownership of directories created at
runtime.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 436 -
respective owners.
Run Nessus on Mac OS X as a Non-Privileged User
Limitations
l For use with Nessus 6.7 or later.
l When scanning localhost, Nessus plugins assume that they are running as root. Therefore, cer-
tain types of scans may fail. For example, because Nessus is now running as a non-privileged
user, file content Compliance Audits may fail or return erroneous results since the plugins are
not able to access all directories.
l nessuscli does not have a --no-root mode. Running commands with nessuscli as root
could potentially create files in the Nessus install directory owned by root, which could cause
Nessus to be unable to access them appropriately. Use care when running nessuscli, and
potentially fix permissions with chown after using it.
Steps
1. If you have not already done so, Install Nessus on MacOSX.
3. On the Mac, in System Preferences > Users & Groups, create a new Group.
4. Next, in System Preferences > Users & Groups, create the new Standard User. This user will
be configured to run as the Nessus non-privileged account.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 437 -
respective owners.
5. Add the new user to the group you created in Step 1.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 438 -
respective owners.
6. Remove 'world' permissions on Nessus binaries in the /sbin directory.
7. Change ownership of /Library/Nessus/run directory to the non-root (Standard) user you cre-
ated in Step 2.
8. Give that user read/write permissions to the /dev/bpf* devices. A simple way to do this is to
install Wireshark, which creates a group called access_bpf, as well as a corresponding launch
daemon to set appropriate permissions on /dev/bpf* at startup. In this case, you can simply
assign the nonpriv user to be in the access_bpf group. Otherwise, you will need to create a
launch daemon giving the "nonpriv" user, or a group that it is a part of, read/write permissions
to all /dev/bpf*.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 439 -
respective owners.
/Library/LaunchDaemons/com.tenablesecurity.nessusd.plist file and add the following
lines. Do not modify any of the existing lines.
<string>--no-root</string>
<key>UserName</key>
<string>nonprivuser</string>
11. Using sysctl, verify the following parameters have the minimum values:
$ sysctl debug.bpf_maxdevices
debug.bpf_maxdevices: 16384
$ sysctl kern.maxfiles
kern.maxfiles: 12288
$ sysctl kern.maxfilesperproc
kern.maxfilesperproc: 12288
$ sysctl kern.maxproc
kern.maxproc: 1064
$ sysctl kern.maxprocperuid
kern.maxprocperuid: 1064
12. If any of the values in Step 9. do not meet the minimum requirements, take the following steps
to modify values.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 440 -
respective owners.
Example:
$ cat /etc/sysctl.conf
kern.maxfilesperproc=12288
kern.maxproc=1064
kern.maxprocperuid=1064
13. Next, using the launchctl limit command, verify your OS default values.
$ launchctl limit
cpu unlimited unlimited
filesize unlimited unlimited
data unlimited unlimited
stack 8388608 67104768
core 0 unlimited
rss unlimited unlimited
memlock unlimited unlimited
maxproc 709 1064
maxfiles 256 unlimited
14. If any of the values in Step 11. are not set to the default OSX values above, take the following
steps to modify values.
Using the a text editor, edit the launchd.conf file with the correct, default values as shown in
Step 11.
Example:
$ cat /etc/launchd.conf
limit maxproc 709 1064
Note: Some older versions of OSX have smaller limits for maxproc. If your version of OSX sup-
ports increasing the limits through /etc/launchctl.conf, increase the value.
15. For all changes to take effect either reboot your system or reload the launch daemon.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 441 -
respective owners.
Run Nessus on FreeBSD as a Non-Privileged User
Limitations
l For use with Nessus 6.7 or later.
l When scanning localhost, Nessus plugins assume that they are running as root. Therefore, cer-
tain types of scans may fail. For example, because Nessus is now running as a non-privileged
user, file content Compliance Audits may fail or return erroneous results since the plugins are
not able to access all directories.
l nessuscli does not have a --no-root mode. Running commands with nessuscli as root
could potentially create files in the Nessus install directory owned by root, which could cause
Nessus to be unable to access them appropriately. Use care when running nessuscli, and poten-
tially fix permissions with chown after using it.
Note: Unless otherwise noted, execute the following commands in a root login shell.
# adduser
Username: nonprivuser
Full name: NonPrivUser
Uid (Leave empty for default):
Login group [nonprivuser]:
Login group is nonprivuser. Invite nonprivuser into other groups?
[]:
Login class [default]:
Shell (sh csh tcsh bash rbash nologin) [sh]:
Home directory [/home/nonprivuser]:
Home directory permissions (Leave empty for default):
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 442 -
respective owners.
Use password-based authentication? [yes]:
Use an empty password? (yes/no) [no]:
Use a random password? (yes/no) [no]:
Enter password:
Enter password again:
Lock out the account after creation? [no]:
Username : nonprivuser
Password : *****
Full Name : NonPrivUser
Uid : 1003
Class :
Groups : nonprivuser
Home : /home/nonprivuser
Home Mode :
Shell : /bin/sh
Locked : no
OK? (yes/no): yes
adduser: INFO: Successfully added (nonprivuser) to the user
database.
Add another user? (yes/no): no
Goodbye!
5. Create a group to give the non-root user access to the /dev/bpf device and allow them to use
raw sockets.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 443 -
respective owners.
pw groupadd access_bpf
pw groupmod access_bpf -m nonprivuser
# pw groupshow access_bpf
access_bpf:*:1003:nonprivuser
# ulimit -a
cpu time (seconds, -t) unlimited
file size (512-blocks, -f) unlimited
data seg size (kbytes, -d) 33554432
stack size (kbytes, -s) 524288
core file size (512-blocks, -c) unlimited
max memory size (kbytes, -m) unlimited
locked memory (kbytes, -l) unlimited
max user processes (-u) 6670
open files (-n) 58329
virtual mem size (kbytes, -v) unlimited
swap limit (kbytes, -w) unlimited
sbsize (bytes, -b) unlimited
pseudo-terminals (-p) unlimited
8. If any of the values in Step 6. do not meet the minimum requirements, take the following steps
to modify values.
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 444 -
respective owners.
service sysctl restart
9. Next, using a text editor, modify the /usr/local/etc/rc.d/nessusd service script to remove
and add the following lines:
Remove: /usr/local/nessus/sbin/nessus-service -D -q
Add: chown root:access_bpf /dev/bpf
Add: chmod 660 /dev/bpf
Add: daemon -u nonprivuser /usr/local/nessus/sbin/nessus-service -D -q --
no-root
nessusd_start() {
echo 'Starting Nessus...'
chown root:access_bpf /dev/bpf
chmod 660 /dev/bpf
daemon -u nonprivuser /usr/local/nessus/sbin/nessus-service -D -q --no-root
}
nessusd_stop() {
test -f /usr/local/nessus/var/nessus/nessus-service.pid && kill `cat
/usr/local/nessus/var/nessus/nessus-service.pid` && echo 'Stopping Nessus...'
&& sleep 3
}
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 445 -
respective owners.
Upgrade Assistant
You can upgrade data from Nessus to to Tenable.io via the Upgrade Assistant tool.
For more information, please refer to the Upgrade Assistant documentation: https://-
docs.tenable.com/upgradeassistant/nessus
Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are
registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their - 446 -
respective owners.