Nessus 8 15
Nessus 8 15
Nessus 8 15
x User Guide
Last Updated: June 21, 2023
Copyright © 2023 Tenable, Inc. All rights reserved. Tenable, Tenable Nessus, Tenable Lumin, Assure, and the Tenable logo are registered trademarks of Tenable, Inc. or its affiliates. All other
products or services are trademarks of their respective owners.
Table of Contents
Prepare 24
System Requirements 30
Hardware Requirements 30
Storage Requirements 31
NIC Requirements 32
Virtual Machine 35
Nessus Agents 36
Software Requirements 36
Tenable Nessus 38
Nessus Agents 39
Supported Browsers 40
SELinux Requirements 41
- 2-
Licensing Requirements 44
Deployment Considerations 46
Port Requirements 46
Tenable Nessus Manager, Tenable Nessus Professional, Tenable Nessus Expert, Ten-
able Nessus Essentials, and Tenable Nessus Scanners 48
Host-Based Firewalls 50
IPv6 Support 51
Antivirus Software 53
Security Warnings 54
Trust a Custom CA 65
- 3-
Complete the Windows InstallShield Wizard 79
Operators 84
Environment Variables 85
Upgrade Nessus 94
-4-
Scenario 1: New Nessus Install 124
- 5-
Download and Copy Plugins 148
Scans 171
- 6-
Scan and Policy Settings 182
General 184
Schedule 187
Notifications 189
Permissions 190
General 195
Permissions 196
Identity 207
General 231
SCADA 236
Windows 243
Malware 245
Databases 248
- 7-
Preconfigured Assessment Scan Settings 249
Credentials 274
DB2 279
MySQL 280
Oracle 281
PostgreSQL 283
Cassandra 285
MongoDB 285
Password 288
Import 290
CyberArk 290
Lieberman 300
- 8-
SNMPv3 304
SSH 306
Windows 325
HTTP 368
NNTP 371
FTP 372
POP2 373
POP3 374
IMAP 375
IPMI 376
Compliance 379
Plugins 387
- 9-
Create a Scan 393
Severity 411
CVSS 412
- 10 -
Create a New Scan from Scan Results 422
Dashboard 433
Vulnerabilities 435
Policies 456
- 11-
How do I get Tenable Nessus plugins? 463
Agents 476
- 12 -
Delete an Agent Group 498
Clustering 505
Child Node (Tenable Nessus Scanner Managed by Tenable Nessus Manager Parent
Node) 508
Agents 509
- 13 -
Add an Agent to a Cluster Group 531
Scanners 539
Settings 546
About 547
Scanning 556
Logging 561
Performance 567
Security 576
Cluster 585
Miscellaneous 587
- 14 -
Custom 592
Custom CA 613
Overview 618
Network 619
Alerts 620
Notifications 622
Accounts 625
- 15 -
My Account 626
Users 629
Windows 636
Linux 637
macOS 637
Windows 638
Linux 638
macOS 639
Nessus-Service 640
Notes 645
Nessuscli 645
- 16 -
Nessuscli Commands 647
Linking 693
Preferences 694
- 17 -
User 695
Purpose 696
Add the "Nessus Local Access" Group to the "Nessus Scan GPOPolicy" 702
Prerequisites 707
Prerequisites 713
Example 716
- 18 -
Run Tenable Nessus as Non-Privileged User 719
- 19 -
Welcome to Tenable Nessus 8.15.x
If you are new to Tenable Nessus®, see Get Started with Tenable Nessus.
Tenable Vulnerability Management enables security and audit teams to share multiple Tenable Nes-
sus scanners, scan schedules, scan policies and most importantly scan results among an unlimited
set of users or groups.
By making different resources available for sharing among users and groups, Tenable Vulnerability
Management allows for endless possibilities for creating highly customized work flows for your vul-
nerability management program, regardless of locations, complexity, or any of the numerous reg-
ulatory or compliance drivers that demand keeping your business secure.
In addition, Tenable Vulnerability Management can control multiple Tenable Nessus scanners, sched-
ule scans, push policies and view scan findings—all from the cloud, enabling the deployment of Nes-
sus scanners throughout your network to multiple physical locations, or even public or private
clouds.
l Up to two quarterly report submissions for PCI ASV validation through Tenable, Inc.
- 20 -
l 24/ 7 access to the Tenable Community site for Tenable Nessus knowledge base and support
ticket creation
Tenable Nessus Professional, the industry’s most widely deployed vulnerability assessment solution
helps you reduce your organization’s attack surface and ensure compliance. Tenable Nessus fea-
tures high-speed asset discovery, configuration auditing, target profiling, malware detection, sens-
itive data discovery, and more.
Tenable Nessus supports more technologies than competitive solutions, scanning operating sys-
tems, network devices, hypervisors, databases, web servers, and critical infrastructure for vul-
nerabilities, threats, and compliance violations.
With the world’s largest continuously updated library of vulnerability and configuration checks, and
the support of Tenable, Inc.’s expert vulnerability research team, Tenable Nessus sets the standard
for vulnerability scanning speed and accuracy.
Tenable Nessus Expert combines the industry’s most widely deployed vulnerability assessment solu-
tion with new features and functionality that are specifically engineered to address the extended
modern attack surface. With Nessus Expert you can not only reduce your organization’s IP-based
attack surface and ensure compliance, but also identify vulnerabilities and policy violations in Infra-
structure as Code (IaC) and identify previously unknown internet-facing assets.
Tenable Nessus Expert supports more technologies than competitive solutions, scanning operating
systems, network devices, IaC repositories, hypervisors, databases, web servers, and critical infra-
structure for vulnerabilities, threats, and compliance violations.
With the world’s largest continuously updated library of vulnerability and configuration checks, and
the support of Tenable's expert vulnerability research team, Tenable Nessus Expert sets the stand-
ard for vulnerability scanning speed, accuracy, and is the only tool designed to address today’s mod-
ern attack surface.
- 21-
Nessus Expert Product Page
Note:Tenable Nessus Manager is no longer sold as of February 1, 2018. For existing standalone Tenable Nes-
sus Manager customers, Tenable continues to provide service through the duration of your contract. Ten-
able continues to support and provision Tenable Nessus Manager for the purpose of managing agents.
Nessus Manager combines the powerful detection, scanning, and auditing features of Nessus, the
world’s most widely deployed vulnerability scanner, with extensive management and collaboration
functions to reduce your attack surface.
Nessus Manager enables the sharing of resources including Nessus scanners, scan schedules,
policies, and scan results among multiple users or groups. Users can engage and share resources
and responsibilities with their co-workers; system owners, internal auditors, risk and compliance
personnel, IT administrators, network admins, and security analysts. These collaborative features
reduce the time and cost of security scanning and compliance auditing by streamlining scanning,
malware and misconfiguration discovery, and remediation.
Nessus Manager protects physical, virtual, mobile, and cloud environments. Nessus Manager is avail-
able for on-premises deployment or from the cloud, as Tenable Vulnerability Management. Nessus
Manager supports the widest range of systems, devices and assets, and with both agent-less and
Nessus Agent deployment options, easily extends to mobile, transient, and other hard-to-reach
environments.
For Tenable Nessus Agent documentation, see the Tenable Nessus Agent User Guide.
Nessus Agents, available with Tenable Vulnerability Management and Nessus Manager, increase
scan flexibility by making it easy to scan assets without needing ongoing host credentials or assets
that are offline, and enable large-scale concurrent scanning with little network impact.
Tenable Nessus Agents are lightweight, low-footprint programs that you install locally on hosts to
supplement traditional network-based scanning or to provide visibility into gaps that traditional
scanning misses. Tenable Nessus Agents collect vulnerability, compliance, and system data, and
report that information back to a manager for analysis. With Tenable Nessus Agents, you extend
scan flexibility and coverage. You can scan hosts without using credentials, and offline assets and
- 22 -
endpoints that intermittently connect to the internet. You can also run large-scale concurrent agent
scans with little network impact.
Tenable Nessus Agents help you address the challenges of traditional network-based scanning, spe-
cifically for the assets where it's impossible or nearly impossible to consistently collect information
about your organization's security posture. Traditional scanning typically occurs at selected inter-
vals or during designated windows and requires systems to be accessible when a scan is executed.
If laptops or other transient devices are not accessible when a scan is executed, they are excluded
from the scan, leaving you blind to vulnerabilities on those devices. Tenable Nessus Agents help
reduce your organization’s attack surface by scanning assets that are off the network or powered-
down during scheduled assessments or by scanning other difficult-to-scan assets.
Once installed on servers, portable devices, or other assets found in today’s complex IT envir-
onments, Tenable Nessus Agents identify vulnerabilities, policy violations, misconfigurations, and
malware on the hosts where you install them and report results back to the managing product. You
can manage Tenable Nessus Agents with Tenable Nessus Manager or Tenable Vulnerability Man-
agement.
- 23 -
Prepare
l Ensure that your setup meets the minimum system requirements:
l Hardware Requirements
l Software Requirements
- 24 -
Install and Configure Tenable Nessus
l Follow the installation steps depending on your Tenable Nessus software and operating sys-
tem, as described in Install Tenable Nessus.
- 25 -
Create and Configure Scans
1. Run a host discovery scan to identify assets on your network.
2. Create a scan.
When you configure a Tenable-provided scan template, you can modify only the settings
included for the scan template type. When you create a user-defined scan template, you can
modify a custom set of settings for your scan. Tenable sometimes refers to a user-defined
template as a policy.
l (Optional) If you are running a compliance scan, select the compliance audits your scan
includes.
l (Optional) If you are using an advanced scan template, select what plugins your scan
includes.
- 26 -
View and Analyze Scan Results
l View scan results.
- 27 -
Refine Tenable Nessus Settings
l Adjust scan settings to address warning messages.
- 28 -
Navigate Tenable Nessus
The top navigation bar shows links to the two main pages: Scans and Settings. You can perform all
Tenable Nessus primary tasks using these two pages. Click a page name to open the corresponding
page.
Item Description
- 29 -
System Requirements
You can run Tenable Nessus in the following environments.
Cloud Microsoft
Azure
Hardware
Hardware Requirements
Enterprise networks can vary in performance, capacity, protocols, and overall activity. Resource
requirements to consider for Nessus deployments include raw network speed, the size of the net-
work, and the configuration of Nessus.
Note: The following recommendations are guidelines for the minimum hardware allocations. Certain types
of scans are more resource intensive. If you run complex scans, especially those with credentials, you may
require more disk space, memory, and processing power.
Tip: For information about Tenable Core + Nessus, see Requirements in the Tenable Core User Guide.
- 30 -
Storage Requirements
Tenable Nessus only supports storage area networks (SANs) or network-attached storage (NAS) con-
figurations when installed on a virtual machine managed by an enterprise class hypervisor. Tenable
Nessus Manager requires higher disk throughput and may not be appropriate for remote storage. If
you install Tenable Nessus on a non-virtualized host, you must do so on direct-attached storage
(DAS) devices.
Tenable recommends a minimum of 5,000 MB of temporary space for the Nessus scanner to run
properly.
- 31-
NIC Requirements
Tenable recommends you configure the following, at minimum, to ensure network interface con-
troller (NIC) compatibility with Tenable Nessus:
l Disable packet capture applications that share a NIC with Tenable Nessus.
l Avoid deploying Tenable Nessus in a Docker container that shares a NIC with another Docker
container.
For assistance confirming if other aspects of your NIC configuration are compatible with Tenable
Nessus, contact Tenable Support.
- 32 -
Tenable Nessus Scanners and Tenable Nessus Professional
The following table lists the hardware requirements for Tenable Nessus scanners and Tenable Nes-
sus Professional.
Disk space: 30 GB, not including space used by the host operating
system
Note: Your usage (e.g., scan results, plugin updates, and logs)
increases the amount of disk space needed over time.
Disk space: 30 GB, not including space used by the host operating
system
Note: Your usage (e.g., scan results, plugin updates, and logs)
increases the amount of disk space needed over time.
- 33 -
Tenable Nessus Manager
The following table lists the hardware requirements for Tenable Nessus Manager.
Note: The suggested minimum recommended hardware is based on the total number of agents that check
into the manager daily.
- 34 -
Virtual Machine
You can install Tenable Nessus on a Virtual Machine that meets the same requirements.
Note: Using Network Address Translation (NAT) to connect your virtual machine to the network negatively
affects many of the Tenable Nessus vulnerability checks, host enumeration, and operating system iden-
tification.
- 35 -
Nessus Agents
Tenable Nessus Agents are lightweight and only minimal system resources. Generally, a Tenable
Nessus Agent uses 40 MB of RAM (all pageable). A Tenable Nessus Agent uses almost no CPU while
idle, but is designed to use up to 100% of CPU when available during jobs.
For more information on Tenable Nessus Agent resource usage, see Agent Software Footprint.
The following table outlines the minimum recommended hardware for operating a Tenable Nessus
Agent. You can install Tenable Nessus Agents on a virtual machine that meets the same require-
ments specified.
Disk Space l Agents 7.7.x and earlier: > 1GB, not including space used by the host
operating system
l Agents 8.0.x and later: > 3 GB, not including space used by the host oper-
ating system
l Agents 10.0.x and later: > 2 GB, not including space used by the host
operating system
The agent may require more space during certain processes, such as a plu-
gins-code.db defragmentation operation.
Note: You can control the priority of the Tenable Nessus Agent relative to the priority of other tasks run-
ning on the system. For more information see Agent CPU Resource Control in the Tenable Nessus Agent
Deployment and User Guide.
Software Requirements
- 36 -
Tenable Nessus supports Linux, Windows, and macOS operating systems.
Tip: For information about Tenable Core + Nessus, see System Requirements in the Tenable Core User Guide.
- 37 -
Tenable Nessus
For Tenable Nessus software requirements, see the Nessus Software Requirements in the General
Requirements User Guide.
- 38 -
Nessus Agents
For Tenable Nessus Agent software requirements, see the Agent Software Requirements in the Gen-
eral Requirements User Guide.
- 39 -
Supported Browsers
Nessus supports the following browsers:
- 40 -
SELinux Requirements
Tenable Nessus supports disabled, permissive, and enforcing mode Security-Enhanced Linux
(SELinux) policy configurations.
l Disabled and permissive mode policies typically do not require customization to interact with
Tenable Nessus.
l Enforcing mode policies require customization to interact with Tenable Nessus. For more
information, see Customize SELinux Enforcing Mode Policies.
Note:Tenable recommends testing your SELinux configurations before deploying on a live network.
- 41-
PDF Report Requirements
The Nessus .pdf report generation feature requires the latest version of Oracle Java or OpenJDK.
Note: If you install Oracle Java or OpenJDK after you install Nessus, you must reinstall Nessus to enable
PDF report generation.
- 42 -
Customize SELinux Enforcing Mode Policies
Security-Enhanced Linux (SELinux) enforcing mode policies require customization to interact with
Tenable Nessus.
Tenable Support does not assist with customizing SELinux policies, but Tenable recommends mon-
itoring your SELinux logs to identify errors and solutions for your policy configuration.
1. Run the sealert tool, where /var/log/audit/audit.log is the location of your SELinux
audit log:
sealert -a /var/log/audit/audit.log
The tool runs and generates a summary of error alerts and solutions. For example:
4. Run the sealert tool again to confirm you resolved the error alerts.
- 43 -
Licensing Requirements
Nessus is available to operate either as a subscription or managed by Tenable Security Center. Ten-
able Nessus requires a plugin feed Activation Code to operate in subscription mode. This code iden-
tifies which version of Tenable Nessus that Tenable licensed you to install and use, and if
applicable, how many IP addresses you can scan, how many remote scanners you can link to Ten-
able Nessus, and how many Nessus Agents you can link to Tenable Nessus Manager. Tenable Nes-
sus Manager licenses are specific to your deployment size, especially for large deployments or
deployments with multiple Tenable Nessus Manager instances. Discuss your requirements with your
Tenable Customer Success Manager.
Tenable recommends that you obtain the Activation Code before starting the installation process,
as it is required before you can set up Tenable Nessus.
l is a one-time code, unless your license or subscription changes, at which point Tenable will
issue you a new activation code.
l is not case-sensitive.
Note: For more information about managing Tenable Nessus offline, refer to the Nessus User Guide.
You may purchase a Tenable Nessus subscription through the Tenable, Inc. online store at
https:/ / store.tenable.com/ or via a purchase order through Authorized Nessus Partners. You will
then receive an Activation Code from Tenable, Inc.. This code will be used when configuring your
copy of Tenable Nessus for updates.
Note: See the Obtain an Activation Code page to obtain an Activation Code.
If you are using Tenable Security Center to manage your Nessus scanners, the Activation Code and
plugin updates are managed from Tenable Security Center. You must start Nessus before it com-
municates with Tenable Security Center, which it normally does not do without a valid Activation
Code and plugins. To have Nessus ignore this requirement and start (so that it can get the
- 44 -
information from Tenable Security Center), when you register your scanner, select Managed by
SecurityCenter.
- 45 -
Deployment Considerations
When deploying Tenable Nessus, knowledge of routing, filters, and firewall policies is often helpful.
Deploying behind a NAT device is not desirable unless it is scanning the internal network. Anytime a
vulnerability scan flows through a NAT device or application proxy of some sort, the check can dis-
tort and a false positive or negative can result.
In addition, if the system running Tenable Nessus has personal or desktop firewalls in place, these
tools can drastically limit the effectiveness of a remote vulnerability scan. Host-based firewalls can
interfere with network vulnerability scanning. Depending on your firewall’s configuration, it may pre-
vent, distort, or hide the probes of a Tenable Nessus scan.
Certain network devices that perform stateful inspection, such as firewalls, load balancers, and
Intrusion Detection/ Prevention Systems, may react negatively when Tenable Nessus conducts a
scan through them. Tenable Nessus has several tuning options that can help reduce the impact of
scanning through such devices, but the best method to avoid the problems inherent in scanning
through such network devices is to perform a credentialed scan.
If you configure Tenable Nessus Manager for agent management, Tenable does not recommend
using Tenable Nessus Manager as a local scanner. For example, do not configure Tenable Security
Center scan zones to include Tenable Nessus Manager and avoid running network-based scans dir-
ectly from Tenable Nessus Manager. These configurations can negatively impact agent scan per-
formance.
l Port Requirements
l Host-Based Firewalls
l IPv6 Support
l Antivirus Software
l Security Warnings
Port Requirements
- 46 -
Tenable Nessus port requirements include Tenable Nessus Manager, Tenable Nessus Professional,
Tenable Nessus Expert, Tenable Nessus Essentials, and Tenable Nessus scanner-specific require-
ments and Tenable Nessus Agent-specific requirements.
- 47 -
Tenable Nessus Manager, Tenable Nessus Professional, Tenable
Nessus Expert, Tenable Nessus Essentials, and Tenable Nessus
Scanners
Your Tenable Nessus instances require access to specific ports for inbound and outbound traffic.
Inbound Traffic
Port Traffic
Outbound Traffic
Port Traffic
- 48 -
Tenable Nessus Agents
Your Tenable Nessus Agents require access to specific ports for outbound traffic.
Outbound Traffic
Port Traffic
- 49 -
Host-Based Firewalls
Port 8834
The Nessus user interface uses port 8834. If not already open, open port 8834 by consulting your
firewall vendor's documentation for configuration instructions.
Allow Connections
If you configured the Nessus server on a host with 3rd-party firewall such as ZoneAlarm or Windows
firewall, you must configure it to allow connections from the IP addresses of the clients using Nes-
sus.
To open the ports required for Nessus, use the following commands:
- 50 -
IPv6 Support
Nessus supports scanning of IPv6 based resources. Many operating systems and devices ship with
IPv6 support enabled by default. To perform scans against IPv6 resources, you must configure at
least one IPv6 interface on the host where Nessus is installed, and Nessus must be on an IPv6 cap-
able network (Nessus cannot scan IPv6 resources over IPv4, but it can enumerate IPv6 interfaces
via credentialed scans over IPv4). Both full and compressed IPv6 notation are supported when ini-
tiating scans.
Nessus does not support scanning IPv6 Global Unicast IP address ranges unless you enter the IPs
separately (in list format). Nessus does not support ranges expressed as hyphenated ranges or CIDR
addresses. Nessus supports Link-local ranges with the link6 directive as the scan target or local link
with eth0.
- 51-
Network Address Translation (NAT) Limitation
If your virtual machine uses Network Address Translation (NAT) to reach the network, many of Nes-
sus vulnerability checks, host enumeration, and operating system identification are negatively
affected.
- 52 -
Antivirus Software
Due to the large number of TCP connections generated during a scan, some anti-virus software
packages may classify Tenable Nessus as a worm or a form of malware. Antivirus software may
increase your scan processing times.
l If your anti-virus software warns you, select Allow to let Tenable Nessus continue scanning.
l If your anti-virus package gives you the option to add processes to an exception list, add
nessusd.exe, nessus-service.exe, and nessuscli.exe.
For more information about allowlisting Tenable Nessus folders, files, and processes in security
products, see File and Process Allowlist.
- 53 -
Security Warnings
By default, Nessus is installed and managed using HTTPS and SSL uses port 8834. The default
installation of Nessus uses a self-signed SSL certificate.
During the web-based portion of the Nessus installation, the following message regarding SSL
appears:
You are likely to get a security alert from your browser saying that the SSL certificate is
invalid. You may either choose to accept the risk temporarily, or you can obtain a valid
SSL certificate from a registrar.
This information refers to a security-related message you encounter when accessing the Nessus
user interface (https:/ / [ server IP] :8834).
l an untrusted site
l an unsecure connection
Browser Instructions
Mozilla Fire- Select I Understand the Risks, and then select Add Exception.
fox
Next select Get Certificate, and finally select Confirm Security Exception.
- 54 -
Certificates and Certificate Authorities
Tenable Nessus includes the following defaults:
l The default Tenable Nessus SSL certificate and key, which consists of two files: server-
cert.pem and serverkey.pem.
l A Tenable Nessus certificate authority (CA), which signs the default Tenable Nessus
SSL certificate. The CA consists of two files: cacert.pem and cakey.pem.
However, you may want to upload your own certificates or CAs for advanced configurations or to
resolve scanning issues. For more information, see:
l Custom SSL Server Certificates —View an overview of Tenable Nessus SSL server certificates
and troubleshoot common certificate problems.
l Create a New Server Certificate and CA Certificate —If you do not have your own cus-
tom CA and server certificate, you can use Tenable Nessus to create a new server cer-
tificate and CA certificate.
l Upload a Custom Server Certificate and CA Certificate —Replace the default certificate
that ships with Tenable Nessus.
l Create SSL Client Certificates for Login —Create an SSL client certificate to log in to Tenable
Nessus instead of using a username and password.
l Trust a Custom CA —Add a custom root CA to the list of CAs that Tenable Nessus trusts.
l Tenable Nessus Manager Certificates and Tenable Nessus Agent —Understand the certificate
chain between Tenable Nessus Manager and Tenable Nessus Agents and troubleshoot issues.
Linux /opt/nessus/com/nessus/CA/servercert.pem
/opt/nessus/var/nessus/CA/serverkey.pem
/opt/nessus/com/nessus/CA/cacert.pem
/opt/nessus/var/nessus/CA/cacert.key
- 55 -
Operating System Directory
FreeBSD /usr/local/nessus/com/nessus/CA/servercert.pem
/usr/local/nessus/var/nessus/CA/serverkey.pem
/usr/local/nessus/com/nessus/CA/cacert.pem
/usr/local/nessus/var/nessus/CA/cacert.key
Windows C:\ProgramData\Tenable\Nessus\nessus\CA\servercert.pem
C:\ProgramData\Tenable\Nessus\nessus\CA\serverkey.pem
C:\ProgramData\Tenable\Nessus\nessus\CA\cacert.pem
C:\ProgramData\Tenable\Nessus\nessus\CA\cacert.key
macOS /Library/Nessus/run/com/nessus/CA/servercert.pem
/Library/Nessus/run/var/nessus/CA/serverkey.pem
/Library/Nessus/run/com/nessus/CA/cacert.pem
/Library/Nessus/run/var/nessus/CA/cacert.key
- 56 -
Custom SSL Server Certificates
By default, Tenable Nessus uses an SSL certificate signed by the Tenable Nessus certificate author-
ity (CA), Nessus Certification Authority. During installation, Tenable Nessus creates two files that
make up the certificate: servercert.pem and serverkey.pem. This certificate allows you to
access Tenable Nessus over HTTPS through port 8834.
Because Nessus Certification Authority is not a trusted valid certificate authority, the certificate is
untrusted, which can result in the following:
l Your browser may produce a warning regarding an unsafe connection when you access Ten-
able Nessus via HTTPS through port 8834.
l Plugin 51192 may report a vulnerability when scanning the Tenable Nessus scanner host.
To resolve these issues, you can use a custom SSL certificate generated by your organization or a
trusted CA.
To configure Tenable Nessus to use custom SSL certificates, see the following:
l Create a New Server Certificate and CA Certificate. —If your organization does not have a cus-
tom SSL certificate, create your own using the built-in Tenable Nessus mkcert utility.
l Upload a Custom Server Certificate and CA Certificate —Replace the default certificate that
ships with Tenable Nessus.
l Trust a Custom CA —Add a custom CA to the list of CAs that Tenable Nessus trusts.
Troubleshooting
To troubleshoot common problems with using the default CA certificate with Tenable Nessus, see
the following table:
Problem Solution
- 57 -
l Use the /getcert path to install the root CA in your
browsers. Go to the following address in your
browser: https://[IP address]:8834/getcert.
l The certificate expired l Upload your own custom certificate and custom CA
to your browser:
l The certificate is self-
signed and therefore a. Upload a Custom Server Certificate and
untrusted CA Certificate.
Plugin 51192 reports that an Add your custom root CA to the list of CAs that Tenable
unknown CA was found at the Nessus trusts, as described in Trust a Custom CA.
top of the certificate chain.
- 58 -
Create a New Server Certificate and CA Certificate
If you do not have your own custom certificate authority (CA) and server certificate (for example, a
trusted certificate that your organization uses), you can use Tenable Nessus to create a new server
certificate and CA certificate.
The Tenable Nessus CA signs this server certificate, which means your browser may report that the
server certificate is untrusted.
Note: You need to be an administrator user or have root privileges to create a new custom CA and server
certificate.
Note: The following steps are applicable to both Tenable Nessus scanners and Tenable Nessus Manager.
1. Access the Tenable Nessus CLI as an administrator user or a user with root privileges.
Linux
# /opt/nessus/sbin/nessuscli mkcert
Windows
macOS
# /Library/Nessus/run/sbin/nessuscli mkcert
3. When prompted for the hostname, enter the DNS name or IP address of the Tenable Nessus
server in the browser such as https:/ / hostname:8834/ or https:/ / ipaddress:8834/ . The default
certificate uses the hostname.
What to do next:
- 59 -
l Because Nessus Certification Authority is not a trusted valid certificate authority, the cer-
tificate is untrusted, which can result in the following:
l Your browser may produce a warning regarding an unsafe connection when you access
Tenable Nessus via HTTPS through port 8834.
l Plugin 51192 may report a vulnerability when scanning the Tenable Nessus scanner host.
To resolve either of those issues, Trust a Custom CA. For more information about how Ten-
able Nessus uses custom SSL server certificates and CAs, see Custom SSL Server Cer-
tificates.
- 60 -
Upload a Custom Server Certificate and CA Certificate
These steps describe how to upload a custom server certificate and certificate authority
(CA) certificate to the Nessus web server through the command line.
You can use the nessuscli import-certs command to validate the server key, server certificate,
and CA certificate, check that they match, and copy the files to the correct locations. Alternatively,
you can also manually copy the files.
2. Type the following, replacing the server key, server certificate, and CA certificate with the
appropriate path and file names for each file.
Tenable Nessus validates the files, checks that they match, and copies the files to the correct
locations.
To upload a custom server certificate and CA certificate manually using the CLI:
For the location of the default certificate files for your operating system, see Location of Cer-
tificate Files.
Linux example
cp /opt/nessus/com/nessus/CA/cacert.pem /opt/nessus/com/nessus/CA/cacert.pem.orig
- 61-
cp /opt/nessus/var/nessus/CA/cakey.pem /opt/nessus/var/nessus/CA/cakey.pem.orig
cp /opt/nessus/com/nessus/CA/servercert.pem
/opt/nessus/com/nessus/CA/servercert.pem.orig
cp /opt/nessus/var/nessus/CA/serverkey.pem
/opt/nessus/var/nessus/CA/serverkey.pem.orig
Windows example
copy C:\ProgramData\Tenable\Nessus\nessus\CA\cacert.pem
C:\ProgramData\Tenable\Nessus\nessus\CA\cacert.pem.orig
copy C:\ProgramData\Tenable\Nessus\nessus\CA\cakey.pem
C:\ProgramData\Tenable\Nessus\nessus\CA\cakey.pem.orig
copy C:\ProgramData\Tenable\Nessus\nessus\CA\servercert.pem
C:\ProgramData\Tenable\Nessus\nessus\CA\servercert.pem.orig
copy C:\ProgramData\Tenable\Nessus\nessus\CA\serverkey.pem
C:\ProgramData\Tenable\Nessus\nessus\CA\serverkey.pem.orig
macOS example
cp /Library/NessusAgent/run/com/nessus/CA/cacert.pem
/Library/NessusAgent/run/com/nessus/CA/cacert.pem.orig
cp /Library/NessusAgent/run/var/nessus/CA/cakey.pem
/Library/NessusAgent/run/var/nessus/CA/cakey.pem.orig
cp /Library/NessusAgent/run/com/nessus/CA/servercert.pem
/Library/NessusAgent/run/com/nessus/CA/servercert.pem.orig
cp /Library/NessusAgent/run/var/nessus/CA/serverkey.pem
/Library/NessusAgent/run/var/nessus/CA/serverkey.pem.orig
Note: The certificates must be unencrypted, and you must name them servercert.pem and
serverkey.pem.
Note: If your certificate does not link directly to the root certificate, add an intermediate certificate
chain, a file named serverchain.pem, in the same directory as the servercert.pem file. This file
- 62 -
contains the 1-n intermediate certificates (concatenated public certificates) necessary to construct
the full certificate chain from the Nessus server to its ultimate root certificate (one trusted by the
user’s browser).
Linux example
cp customCA.pem /opt/nessus/com/nessus/CA/cacert.pem
cp cakey.pem /opt/nessus/var/nessus/CA/cakey.pem
cp servercert.pem /opt/nessus/com/nessus/CA/servercert.pem
cp serverkey.pem /opt/nessus/var/nessus/CA/serverkey.pem
Windows example
macOS example
cp customCA.pem /Library/NessusAgent/run/com/nessus/CA/cacert.pem
cp cakey.em /Library/NessusAgent/run/var/nessus/CA/cakey.em
cp servercert.pem /Library/NessusAgent/run/com/nessus/CA/servercert.pem
cp serverkey.pem /Library/NessusAgent/run/var/nessus/CA/serverkey.pem
6. In a browser, log in to the Tenable Nessus user interface as a user with administrator per-
missions.
What to do next:
- 63 -
l If Tenable Nessus does not already trust the CA, configure Tenable Nessus to Trust a Custom
CA.
- 64 -
Trust a Custom CA
By default, Tenable Nessus trusts certificate authorities (CAs) based on root certificates in the Moz-
illa Included CA Certificate list. Tenable Nessus lists the trusted CAs in the known_CA.inc file in the
Tenable Nessus directory. Tenable updates known_CA.inc when updating plugins.
If you have a custom root CA that is not included in the known CAs, you can configure Tenable Nes-
sus to trust the custom CA to use for certificate authentication.
You can use either the Tenable Nessus user interface or the command-line interface (CLI).
Note: For information about using custom SSL certificates, see Create SSL Client Certificates for Login.
Note: known_CA.inc and custom_CA.inc are used for trusting certificates in your network, and are not
used for Nessus SSL authentication.
To configure Tenable Nessus to trust a custom CA using the Tenable Nessus user inter-
face:
Note: Include the beginning text -----BEGIN CERTIFICATE----- and ending text -----
END CERTIFICATE-----.
- 65 -
Tip: You can save more than one certificate in a single text file, including the beginning and ending
text for each one.
4. Click Save.
Note: Include the beginning text -----BEGIN CERTIFICATE----- and ending text -----
END CERTIFICATE-----.
Tip: You can save more than one certificate in a single text file, including the beginning and ending
text for each one.
Linux
/opt/nessus/lib/nessus/plugins
Windows
C:\ProgramData\Tenable\Nessus\nessus\plugins
macOS
/Library/Nessus/run/lib/nessus/plugins
- 66 -
Create SSL Client Certificates for Login
You can configure Tenable Nessus to use SSL client certificate authentication for users to log in to
Tenable Nessus when accessing Tenable Nessus on port 8834. After you enable certificate authen-
tication, you can no longer log in using a username and password.
Caution: Tenable Nessus does not support connecting agents, remote scanners, or managed scanners
after you enable SSL client certificate authentication. Configure an alternate port to enable supporting
remote agents and scanners using the advanced setting remote_listen_port. For more information, see
Advanced Settings.
If you configure SSL client certificate authentication, Tenable Nessus also supports:
l Smart cards
To configure SSL client certificate authentication for Tenable Nessus user accounts:
1. Access the Tenable Nessus CLI as an administrator user or a user with equivalent privileges.
Linux
Windows
macOS
- 67 -
# /Library/Nessus/run/sbin/nessuscli fix --set force_pubkey_auth=yes
3. Create a client certificate for each user you want to be able to log in to Tenable Nessus via
SSL authentication.
Linux
# /opt/nessus/sbin/nessuscli mkcert-client
macOS
# /Library/Nessus/run/sbin/nessuscli mkcert-client
Windows
Note: The answers you provided in the initial prompts remain as defaults if you create sub-
sequent client certificates during the same session. However, you can change the values for
each client certificate you create.
Tenable Nessus creates the client certificates and places them in the Tenable Nessus
temporary directory:
l Linux: /opt/nessus/var/nessus/tmp/
l macOS: /Library/Nessus/run/var/nessus/tmp/
l Windows: C:\ProgramData\Tenable\Nessus\tmp
c. Combine the two files (the certificate and the key) and export them into a format that
you can import into the browser, such as .pfx.
In the previous example, the two files were key_sylvester.pem and cert_sylvester-
.pem.
- 68 -
For example, you can combine the two files by using the openssl program and the fol-
lowing command:
- 69 -
Tenable Nessus Manager Certificates and Tenable Nessus Agent
When you link an agent to Tenable Nessus Manager, you can optionally specify the certificate that
the agent should use when it links with Tenable Nessus Manager. This allows the agent to verify the
server certificate from Tenable Nessus Manager when the agent links with Tenable Nessus
Manager, and secures subsequent communication between the agent and Tenable Nessus Manager.
For more information on linking Tenable Nessus Agent, see Nessuscli.
If you do not specify the certificate authority (CA) certificate at link time, the agent receives and
trusts the CA certificate from the linked Tenable Nessus Manager. This ensures that subsequent
communication between the agent and Tenable Nessus Manager is secure.
The CA certificate the agent receives at linking time saves in the following location:
l
Linux
/opt/nessus_agent/var/nessus/users/nessus_ms_agent/ms_cert.pem
l
Windows
C:\ProgramData\Tenable\Nessus Agent\nessus\users\nessus_ms_agent\ms_cer-
t.pem
l
macOS
/Library/NessusAgent/run/lib/nessus/users/nessus_ms_agent/ms_cert.pem
Troubleshooting
If the agent cannot follow the complete certificate chain, an error occurs and the agent stops con-
necting with the manager. You can see an example of this event in the following sensor logs:
l nessusd.messages - Example: Server certificate validation failed: unable to get local issuer
certificate
l backend.log - Example: [ error] [ msmanager] SSL error encountered when negotiating with
<Manager_IP>:<PORT>. Code 336134278, unable to get local issuer certificate,
error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
- 70 -
A common reason your certificate chain may break is that you change the server certificate on Ten-
able Nessus Manager but do not update the CA certificate. The agent is then unable to com-
municate to the manager upon restart. To resolve this issue, do one of the following:
l Unlink and relink the agent to Tenable Nessus Manager, which resets the certificate so the
agent gets the correct CA certificate from Tenable Nessus Manager.
l Manually upload the correct cacert.pem file from Tenable Nessus Manager into the custom_
CA.inc file in the agent plugin directory:
l
Linux
/opt/nessus_agent/lib/nessus/plugins
l
Windows
C:\ProgramData\Tenable\Nessus Agent\nessus\plugins
l
macOS
/Library/NessusAgent/run/lib/nessus/plugins
l Generate a new server certificate on Tenable Nessus Manager using the CA for which the
agent already has the CA certificate, so that the certificate chain is still valid.
- 71-
Install Tenable Nessus
This section includes information and steps required for installing Nessus on all supported oper-
ating systems.
- 72 -
Download Tenable Nessus
You can download Tenable Nessus from the Tenable Downloads site.
When you download Tenable Nessus, ensure the package selected is specific to your operating sys-
tem and processor.
There is a single Tenable Nessus package per operating system and processor. Tenable Nessus Man-
ager, Tenable Nessus Professional, and Tenable Nessus Expert do not have different packages;
your activation code determines which Tenable Nessus product is installed.
- 73 -
Install Tenable Nessus
This section describes how to install Tenable Nessus Manager, Tenable Nessus Professional, and
Tenable Nessus Expert on the following operating systems:
l Linux
l Windows
l macOS
- 74 -
Install Tenable Nessus on Linux
Caution: If you install a Nessus Agent, Manager, or Scanner on a system with an existing Nessus Agent,
Manager, or Scanner running nessusd, the installation process will kill all other nessusd processes. You
may lose scan data as a result.
Note: Tenable Nessus does not support using symbolic links for /opt/nessus/.
2. From the command line, run the Nessus installation command specific to your operating sys-
tem.
Debian version 6
FreeBSD version 10
- 75 -
4. Open Tenable Nessus in your browser.
Caution: If you install a Nessus Agent, Manager, or Scanner on a system with an existing Nessus Agent,
Manager, or Scanner running nessusd, the installation process will kill all other nessusd processes. You
may lose scan data as a result.
Note: Tenable Nessus does not support using symbolic links for /opt/nessus/.
- 76 -
Download Nessus Package File
For details, refer to the Product Download topic.
- 77 -
Start Nessus Installation
1. Navigate to the folder where you downloaded the Nessus installer.
- 78 -
Complete the Windows InstallShield Wizard
1. First, the Welcome to the InstallShield Wizard for Tenable, Inc. Nessus screen appears. Select
Next to continue.
2. On the License Agreement screen, read the terms of the Tenable, Inc. Nessus software
license and subscription agreement.
3. Select the I accept the terms of the license agreement option, and then click Next.
4. On the Destination Folder screen, select the Next button to accept the default installation
folder. Otherwise, select the Change button to install Nessus to a different folder.
5. On the Ready to Install the Program screen, select the Install button.
The Installing Tenable, Inc. Nessus screen appears and a Status indication bar shows the install-
ation progress. The process may take several minutes.
After the InstallShield Wizard completes, the Welcome to Nessus page loads in your default
browser.
If the page does not load, do one of the following steps to open Tenable Nessus in your browser.
- 79 -
Install Tenable Nessus on macOS
Caution: If you install a Nessus Agent, Manager, or Scanner on a system with an existing Nessus Agent,
Manager, or Scanner running nessusd, the installation process will kill all other nessusd processes. You
may lose scan data as a result.
Note: Tenable Nessus does not support using symbolic links for /opt/nessus/.
Introduction
The Welcome to the Tenable, Inc. Nessus Server Installer window provides general information
about the Nessus installation.
License
- 80 -
1. On the Software License Agreement screen, read the terms of the Tenable, Inc. Nessus soft-
ware license and subscription agreement.
4. To continue installing Nessus, select the Agree button, otherwise, select the Disagree button
to quit and exit.
Installation Type
On the Standard Install on <DriveName> screen, choose one of the following options:
l Select the Install button to continue using the default installation location.
Installation
When the Preparing for installation screen appears, you are prompted for a username and pass-
word.
1. Enter the Name and Password of an administrator account or the root user account.
2. On the Ready to Install the Program screen, select the Install button.
Next, the Installing Tenable, Inc. Nessus screen appears and shows a Status indication bar for the
remaining installation progress. The process may take several minutes.
Summary
1. When the installation is complete, the The installation was successful screen appears. After
the installation completes, select Close.
- 81-
To install Nessus from the command line:
1. Open Terminal.
Tenable does not recommend deploying Tenable Nessus in a Docker container that shares a net-
work interface controller (NIC) with another Docker container.
Note: Tenable Nessus does not support storage volumes. Therefore, if you deploy a new Tenable Nessus
image, you will lose your data and need to reconfigure Tenable Nessus. However, while deploying the new
image, you can configure any initial user and linking information with environment variables, as described
in step 2 of the following procedure.
- 82 -
l Download and install Docker for your operating system.
l Access the Tenable Nessus Docker image from https:/ / hub.docker.com/ r/ tenable/ nessus.
1. In your terminal, use the docker pull command to get the image.
For the <version-OS> tag, you must specify the Tenable Nessus version and whether you are
pulling Oracle Linux 8 or Ubuntu. You can use the latest tag in place of a specific Tenable
Nessus version (for example, latest-ubuntu).
l Use the operators with the appropriate options for your deployment, as described in
Operators.
Note: Tenable recommends using environment variables to configure your instance of Tenable
Nessus when you run the image. If you do not include environment variables such as an activ-
ation code, username, password, or linking key (if creating a managed Tenable Nessus scan-
ner), you must configure those items later.
3. If you did not include environment variables, complete any remaining configuration steps in
the command-line interface or Tenable Nessus configuration wizard.
- 83 -
Operators
Operator Description
If you have several Tenable Nessus containers running, use a different host
port. The container port must be 8834 because Tenable Nessus listens on port
8834.
- 84 -
Environment Variables
The required and optional environment variables differ based on your Tenable Nessus license and
whether you are linking to Tenable Vulnerability Management. Click the following bullets to view the
environment variables.
Linking Options
Proxy Options
- 85 -
updates.
- 86 -
PASSWORD No Creates the password for the user.
- 87 -
Install Tenable Nessus Agents
To install agents, use the procedures described in the Nessus Agent User Guide.
Once installed, Tenable Nessus Agents are linked to Tenable Nessus Manager. Linked agents auto-
matically download plugins from the manager upon connection; this process can take several
minutes and you must perform it before an agent can return scan results.
Once installed, an agent links to Tenable Nessus Manager after a random delay ranging from zero to
five minutes. Enforcing a delay reduces network traffic when deploying or restarting large amounts
of agents, and reduces the load on Tenable Nessus Manager. Agents automatically download plugins
from the manager upon linking; this process can take several minutes and you before an agent can
return scan results.
- 88 -
Retrieve the Nessus Agent Linking Key
Before you begin the Tenable Nessus Agents installation process, you must retrieve the agent link-
ing key from Tenable Nessus Manager.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
2. (Optional) To modify the Linking Key, click the button next to the linking key.
l You regenerated your linking key and want to revert to a previous linking key.
l You have a mass deployment script where you want to predefine your linking key.
What to do next:
l Install Nessus Agent
- 89 -
Link an Agent to Tenable Nessus Manager
After you install Tenable Nessus Agent, link the agent to Tenable Nessus Manager.
2. At the agent command prompt, use the command nessuscli agent link using the sup-
ported arguments.
For example:
Linux:
macOS:
Windows:
The following table lists the supported arguments for nessuscli agent link:
- 90 -
Argument Required Value
--key yes The linking key that you retrieved from the manager.
--host yes The static IP address or hostname you set during the Tenable
Nessus Manager installation.
--name no A name for your agent. If you do not specify a name for your
agent, the name defaults to the name of the computer where
you are installing the agent.
--groups no One or more existing agent groups where you want to add the
agent. If you do not specify an agent group during the install
process, you can add your linked agent to an agent group
later in Tenable Nessus Manager.
- 91-
Argument Required Value
--proxy-pass- no The password of the user account that you specified as the
word username.
--proxy- no The user agent name, if your proxy requires a preset user
agent agent.
- 92 -
Upgrade Tenable Nessus and Tenable Nessus Agents
This section included information for upgrading Nessus and Nessus Agents on all supported oper-
ating systems.
l Upgrade Nessus
- 93 -
Upgrade Nessus
This section includes information for upgrading Nessus.
- 94 -
Upgrade from Evaluation
If you used an evaluation version of Nessus and are now upgrading to a full-licensed version of Nes-
sus, type your full-version activation code on the Settings page, on the About tab.
4. Click Activate.
Nessus downloads and install the Nessus engine and the latest Nessus plugins, and then
restarts.
For information about viewing, resetting, updating, and transferring activation codes, see Manage
Activation Code.
- 95 -
Update Tenable Nessus Software
Note: For information about upgrading an offline Tenable Nessus Manager that manages Tenable Nessus
scanners, see Update Nessus Manager Manually on an Offline System.
As an administrator user, you can configure how Tenable Nessus updates software components and
plugins. You can configure the Nessus update settings to update your Nessus version and plugins
automatically, or you can manually update the Nessus version and plugins.
3. (Tenable Nessus Professional, Tenable Nessus Expert, and Tenable Nessus Manager only) In
the Automatic Updates section, select one of the following options:
l Update all components: Tenable Nessus automatically updates its software and engine
and downloads the latest plugin set.
In Tenable Nessus Professional and managed Tenable Nessus scanners, Tenable Nessus
updates the software version according to your Nessus Update Plan setting.
l Update plugins: Tenable Nessus automatically downloads the latest plugin set.
4. (Tenable Nessus Professional and Tenable Nessus Expert only) If you enabled automatic
updates, in the Update Frequency section, do one of the following:
l If you want to set a standard update interval, from the drop-down box, select Daily,
Weekly, or Monthly.
l If you want to set a custom update frequency in hours, click the button, then type the
number of hours.
5. (Tenable Nessus Professional, Tenable Nessus Expert, and Tenable Vulnerability Management-
managed Tenable Nessus scanners only) Set the Nessus Update Plan to determine what
- 96 -
version Tenable Nessus automatically updates to:
Note: If you change your update plan and have automatic updates enabled, Tenable Nessus may
immediately update to align with the version represented by your selected plan. Tenable Nessus may
either upgrade or downgrade versions.
Option Description
Update to the latest Automatically updates to the latest Tenable Nessus version
GA release when it is made generally available (GA).
(Default) Note: This date is the same day the version is made gen-
erally available.
Opt in to Early Access Automatically updates to the latest Tenable Nessus version as
releases soon as it is released for Early Access (EA), typically a few
weeks before general availability.
Delay updates, stay- Does not automatically update to the latest Tenable Nessus ver-
ing on an older sion. Remains on an earlier version of Tenable Nessus set by
release Tenable, usually one release older than the current
generally available version, but no earlier than 8.10.0. When Ten-
able Nessus releases a new version, your Tenable Nessus
instance updates software versions, but stays on a version prior
to the latest release.
6. (Optional) Only if instructed to by Tenable Support, in the Update Server box, type the server
from which you want Nessus to download plugins.
Note: You cannot use this procedure to update Tenable Vulnerability Management or Tenable Security
Center-managed scanners.
- 97 -
1. In the top navigation bar, click Settings.
A window appears.
l Update all components: Tenable Nessus updates Nessus software and engine and down-
loads the latest plugin set.
In Tenable Nessus Professional and Tenable Nessus Expert, Tenable Nessus updates the
software version according to your Nessus Update Plan setting.
Note: If you change your update plan, Tenable Nessus may immediately update to align with
the version represented by your selected plan. Nessus may either upgrade or downgrade ver-
sions.
l Upload your own plugin archive: Tenable Nessus downloads plugins from a file that you
upload.
6. If you selected Upload your own plugin archive, browse for your file and select it.
- 98 -
Upgrade Nessus on Linux
Download Nessus
From the Tenable Downloads Page, download the latest, full-license version of Nessus.
Note: Nessus automatically stops nessusd when you run the upgrade command.
Red Hat 8 and later, CentOS 8 and later, Oracle Linux 8 and later, Fedora, SUSE
# /etc/init.d/nessusd start
- 99 -
Upgrade Nessus on Windows
Download Nessus
From the Tenable Downloads Page, download the latest, full-license version of Nessus. The down-
load package is specific the Nessus build version, your platform, your platform version, and your
CPU.
Nessus-<version number>-Win32.msi
Nessus-<version number>-x64.msi
2. On the License Agreement screen, read the terms of the Tenable, Inc. Nessus software
license and subscription agreement.
3. Select the I accept the terms of the license agreement option, and then select the Next but-
ton.
4. On the Destination Folder screen, select the Next button to accept the default installation
folder. Otherwise, select the Change button to install Nessus to a different folder.
5. On the Ready to Install the Program screen, select the Install button.
The Installing Tenable, Inc. Nessus screen appears and a Status indication bar shows the
upgrade progress.
6. On the Tenable Nessus InstallShield Wizard Completed screen, select the Finish button.
Nessus loads in your default browser, where you can log in.
- 100 -
Upgrade Nessus on macOS
The process of upgrading Nessus on macOS using the Nessus installation GUI is the same process
as a new Mac Install.
- 101-
Update a Nessus Agent
After you install an agent, Tenable Nessus Manager automatically updates the agent software based
on the agent update plan. For more information on configuring the agent update plan, see Agent
Updates.
Note: In addition to using the agent update plan, you can manually update agents through the command
line. For more information, see the Tenable Nessus Agent User Guide.
- 102 -
Downgrade Tenable Nessus Software
Tenable Nessus 8.10.0 and later supports the ability to downgrade Tenable Nessus to a previous ver-
sion of Tenable Nessus. You cannot downgrade to a version before 8.10.0.
You can downgrade Tenable Nessus software manually, or, for you can configure the Nessus Update
Plan to automatically downgrade to an older release.
l If Tenable Nessus has an encryption password, you cannot downgrade by changing the Ten-
able Nessus update plan. Remove the encryption password from Tenable Nessus before you
downgrade, then set the encryption password again after the downgrade is complete.
To remove the Tenable Nessus encryption password, see the How to remove the encryption
password (formerly master password) through the command-line knowledge base article. To
set the Tenable Nessus encryption password after downgrading, see Set an Encryption Pass-
word.
l Change your Tenable Nessus software update plan as described in Update Tenable Nes-
sus Software, set Automatic Updates to Disabled.
Linux
b. Manually install the Tenable Nessus version. Force install the new Tenable Nessus rpm
file over the current rpm file.
- 103 -
macOS
b. Manually install the Tenable Nessus version. Replace the current Tenable Nessus pkg file
with the new pkg file.
3. Set the Nessus Update Plan to determine what version Tenable Nessus automatically updates
to. To automatically downgrade, select Delay updates, staying on an older release.
Note: If you change your update plan and have automatic updates enabled, Tenable Nessus may
immediately update to align with the version represented by your selected plan. Tenable Nessus may
either upgrade or downgrade versions.
Option Description
Update to the latest Automatically updates to the latest Tenable Nessus version
GA release when it is made generally available (GA).
(Default) Note: This date is the same day the version is made gen-
erally available.
Opt in to Early Access Automatically updates to the latest Tenable Nessus version as
releases soon as it is released for Early Access (EA), typically a few
weeks before general availability.
Delay updates, stay- Does not automatically update to the latest Tenable Nessus ver-
ing on an older sion. Remains on an earlier version of Tenable Nessus set by
release
- 104 -
Tenable, usually one release older than the current
generally available version, but no earlier than 8.10.0. When Ten-
able Nessus releases a new version, your Tenable Nessus
instance updates software versions, but stays on a version prior
to the latest release.
- 105 -
Configure Tenable Nessus
When you access Tenable Nessus in a browser, a warning appears to regard a connection privacy
problem, an untrusted site, an unsecure connection, or a related security certificate issue. This is
normal behavior. Tenable Nessus provides a self-signed SSL certificate.
Refer to the Security Warnings section for steps necessary to bypass the SSL warnings.
Note: Depending on your environment, plugin configuration and initialization can take several minutes.
To configure Tenable Core + Tenable Nessus, see Deploy or Install Tenable Core in the Tenable
Core+ Tenable Nessus User Guide.
1. Follow the Install Tenable Nessus instructions to open to the Welcome to Nessus screen in
your browser.
2. On the Welcome to Nessus screen, select how you want to deploy Tenable Nessus.
- 106 -
Install Tenable Nessus Essentials, Professional, or Manager
This option installs a standalone version of Tenable Nessus Essentials, Nessus Professional, or Nes-
sus Manager. During installation, you must enter your Nessus Activation Code; this Activation Code
determines which product is installed.
For information on activating a Nessus trial, see Activate a Nessus Professional or Expert Trial.
1. On the Welcome to Nessus screen, select how you want to install Tenable Nessus:
l Nessus Home —The free version of Nessus for educators, students, and hobbyists.
l Nessus Expert —The industry-leading vulnerability assessment solution for the modern
attack surface.
l Nessus Manager —The enterprise solution for managing Nessus Agents at scale.
2. Click Continue.
l If you selected Nessus Professional, Nessus Expert, or Nessus Manager, the Register
Nessus screen appears.
l If you selected Nessus Essentials, the Get an activation code screen appears. Do one of
the following:
a. On the Get an activation code screen, type your name and email address.
b. Click Email.
- 107 -
The Activation Code is the code you obtained from your activation email or from the Tenable
Downloads Page.
4. Click Continue.
5. Create a Tenable Nessus administrator user account that you use to log in to Tenable Nessus:
6. Click Submit.
Tenable Nessus finishes the configuration process, which may take several minutes.
7. Using the administrator user account you created, Sign In to Tenable Nessus.
- 108 -
Link to Tenable Vulnerability Management
During initial installation, you can install Tenable Nessus as a remote scanner linked to Tenable Vul-
nerability Management. If you choose not to link the scanner during initial installation, you can link
your Tenable Nessus scanner later.
Note: If you use domain allow lists for firewalls, Tenable recommends adding *.cloud.tenable.com (with the
wildcard character) to the allow list. This ensures communication with sensor.cloud.tenable.com, which
the scanner uses to communicate with Tenable Vulnerability Management.
Note: Once you link Tenable Nessus to Tenable Vulnerability Management, it remains linked until you unlink
it .
l If the Tenable Nessus scanner is or was previously linked to Tenable Vulnerability Man-
agement, Tenable Security Center, or Tenable Nessus Manager, you need to unlink the scan-
ner or run the nessuscli fix --reset-all command (for more information, see Fix
Commands).
To link Tenable Nessus to Tenable Vulnerability Management from the Tenable Nessus
user interface:
2. Click Continue.
4. In the Linking Key box, type the linking key of your Tenable Vulnerability Management
instance.
- 109 -
6. (Optional) To configure advanced settings such as proxy, plugin feed, and encryption pass-
word, click Settings.
a. In the Host box, type the hostname or IP address of your proxy server.
b. In the Port box, type the port number of the proxy server.
Note: To view the ports that Tenable products require, see the What ports are required for
Tenable products? knowledge base article.
c. In the Username box, type the name of a user account that has permissions to
access and use the proxy server.
d. In the Password box, type the password of the user account that you specified in
the previous step.
e. In the Auth Method drop-down box, select an authentication method to use for the
proxy. If you do not know, select AUTO DETECT.
f. If your proxy requires a preset user agent, in the User-Agent box, type the user
agent name; otherwise, leave it blank.
g. Click Save.
a. In the Custom Host box, type the hostname or IP address of a custom plugin feed.
b. Click Save.
If you set an encryption password, Nessus encrypts all policies, scans results, and
scan configurations. You must enter the password when Tenable Nessus restarts.
- 110 -
istrator or Tenable Support.
b. Click Save.
7. Click Continue.
8. Create a Tenable Nessus administrator user account that you use to log in to Tenable Nessus:
9. Click Submit.
Tenable Nessus finishes the configuration process, which may take several minutes.
10. Using the administrator user account you created, Sign In to Tenable Nessus.
To link Tenable Nessus to Tenable Vulnerability Management from the command-line inter-
face (CLI):
If you registered or linked Tenable Nessus previously, you need to reset Tenable Nessus before link-
ing to Tenable Vulnerability Management.
Run the following commands to reset Tenable Nessus and link to Tenable Vulnerability Management
based on your operating system. To retrieve the linking key needed in the following commands, see
Link a Sensor in the Tenable Vulnerability Management user guide.
Note: The --reset-all command used in the following steps removes any existing users, data, settings,
and configurations. Tenable recommends exporting scan data and creating a backup before resetting. For
more information, see Backing Up Tenable Nessus.
Note: When running the adduser command in the following steps, create the user as a full admin-
istrator/ system administrator when prompted.
Linux:
Note: You must have root permissions or greater to run the link commands successfully.
- 111-
1. Open the Linux CLI.
# cd /opt/nessus/sbin
# ./nessuscli adduser
l If you are linking to a Tenable Vulnerability Management FedRAMP site, run the following
link command:
l If you are not linking to a FedRAMP site, run the following link command:
Windows:
Note: You must have admin permissions to run the link commands successfully.
- 112 -
> net stop "tenable nessus"
l If you are linking to a Tenable Vulnerability Management FedRAMP site, run the following
link command:
l If you are not linking to a FedRAMP site, run the following link command:
macOS:
Note: You must have admin permissions to run the link commands successfully.
1. Open Terminal.
- 113 -
# /Library/Nessus/run/sbin/nessuscli fix --reset-all
# /Library/Nessus/run/sbin/nessuscli adduser
l If you are linking to a Tenable Vulnerability Management FedRAMP site, run the following
link command:
l If you are not linking to a FedRAMP site, run the following link command:
- 114 -
Link to Tenable Security Center
During initial installation, you can install Tenable Nessus as a remote scanner linked to Tenable
Security Center. If you choose not to link the scanner during initial installation, you can link your Ten-
able Nessus scanner later.
Note: Once you link Tenable Nessus to Tenable Security Center, it remains linked until you unlink it .
Note: Tenable Security Center does not send plugins to linked Nessus Managers. Nessus Manager pulls plu-
gins directly from Tenable's plugin sites. Therefore, to update plugin sets, Nessus Manager needs access
to the internet and Tenable's plugin sites (for more information, see the Which Tenable sites should I allow?
community article). If your Nessus Manager does not have internet access, you can manually update its ver-
sion and plugins offline (for more information, see Manage Nessus Offline).
l If the Tenable Nessus scanner is or was previously linked to Tenable Vulnerability Man-
agement, Tenable Security Center, or Tenable Nessus Manager, you need to unlink the scan-
ner or run the nessuscli fix --reset-all command (for more information, see Fix
Commands).
2. Click Continue.
4. (Optional) To configure advanced settings such as proxy, plugin feed, and encryption pass-
word, click Settings.
a. In the Host box, type the hostname or IP address of your proxy server.
b. In the Port box, type the port number of the proxy server.
- 115 -
Note: To view the ports that Tenable products require, see the What ports are required for
Tenable products? knowledge base article.
c. In the Username box, type the name of a user account that has permissions to
access and use the proxy server.
d. In the Password box, type the password of the user account that you specified in
the previous step.
e. In the Auth Method drop-down box, select an authentication method to use for the
proxy. If you do not know, select AUTO DETECT.
f. If your proxy requires a preset user agent, in the User-Agent box, type the user
agent name; otherwise, leave it blank.
g. Click Save.
a. In the Custom Host box, type the hostname or IP address of a custom plugin feed.
b. Click Save.
If you set an encryption password, Nessus encrypts all policies, scans results, and
scan configurations. You must enter the password when Tenable Nessus restarts.
b. Click Save.
5. Click Continue.
6. Create a Tenable Nessus administrator user account, which you use to log in to Tenable Nes-
sus:
- 116 -
a. In the Username box, enter a username.
7. Click Submit.
Tenable Nessus finishes the configuration process, which may take several minutes.
8. Using the administrator user account you created, Sign In to Tenable Nessus.
What to do next:
l Add the Tenable Nessus scanner to Tenable Security Center as described in Add a Nessus
Scanner in the Tenable Security Center User Guide.
- 117 -
Link to Tenable Nessus Manager
Note: When deployed for Tenable Nessus Agent management in Tenable Security Center, Tenable Nessus
Manager does not support linking Tenable Nessus scanners.
During initial installation, you can install Tenable Nessus as a remote scanner linked to Tenable Nes-
sus Manager. If you choose not to link the scanner during initial installation, you can link your Ten-
able Nessus scanner later.
Note: Once you link Nessus to Tenable Nessus Manager, it remains linked until you unlink it .
l If the Tenable Nessus scanner is or was previously linked to Tenable Vulnerability Man-
agement, Tenable Security Center, or Tenable Nessus Manager, you need to unlink the scan-
ner or run the nessuscli fix --reset-all command (for more information, see Fix
Commands).
2. Click Continue.
6. In the Linking Key box, type the linking key from Tenable Nessus Manager.
8. (Optional) To configure advanced settings such as proxy, plugin feed, and encryption pass-
word, click Settings.
- 118 -
l (Optional) In the Proxy tab:
a. In the Host box, type the hostname or IP address of your proxy server.
b. In the Port box, type the port number of the proxy server.
Note: To view the ports that Tenable products require, see the What ports are required for
Tenable products? knowledge base article.
c. In the Username box, type the name of a user account that has permissions to
access and use the proxy server.
d. In the Password box, type the password of the user account that you specified in
the previous step.
e. In the Auth Method drop-down box, select an authentication method to use for the
proxy. If you do not know, select AUTO DETECT.
f. If your proxy requires a preset user agent, in the User-Agent box, type the user
agent name; otherwise, leave it blank.
g. Click Save.
a. In the Custom Host box, type the hostname or IP address of a custom plugin feed.
b. Click Save.
If you set an encryption password, Nessus encrypts all policies, scans results, and
scan configurations. You must enter the password when Tenable Nessus restarts.
b. Click Save.
9. Click Continue.
- 119 -
The Create a user account screen appears.
10. Create a Tenable Nessus administrator user account, which you use to log in to Tenable Nes-
sus:
Tenable Nessus finishes the configuration process, which may take several minutes.
12. Using the administrator user account you created, Sign In to Tenable Nessus.
- 120 -
Link a Node
To link a child node to a cluster, you install an instance of Tenable Nessus as a cluster child node,
then configure the node to link to the parent node of the cluster.
Note: If cluster child nodes have automatic software updates disabled, you must manually update them to
Nessus 8.12 or later to use agent cluster groups. If cluster child nodes have automatic software updates
enabled, nodes can take up to 24 hours to update. To ensure correct linking and configuration, wait for all
child nodes to update to a supported Nessus version before configuring custom cluster groups. All child
nodes must be on the same Nessus version and operating system.
1. Install Tenable Nessus as described in the appropriate Install Tenable Nessus procedure for
your operating system.
3. Click Continue.
4. From the Managed by drop-down box, select Nessus Manager (Cluster Node).
5. Click Continue.
6. Create a Tenable Nessus administrator user account, which you use to log in to Tenable Nes-
sus:
7. Click Submit.
Tenable Nessus finishes the configuration process, which may take several minutes.
- 121-
1. In the Tenable Nessus child node, use the administrator user account you created during ini-
tial configuration to sign in to Tenable Nessus.
The Agents page appears. By default, the Node Settings tab is open.
l Node Name —Type a unique name that identifies this Tenable Nessus child node on the
parent node.
l (Optional) Node Host —Type the hostname or IP address that Tenable Nessus Agents
should use to access the child node. If you do not provide a host node, Tenable Nessus
Agent uses the system hostname. If Tenable Nessus Agent cannot detect the hostname,
the link fails.
l (Optional) Node Port —Type the port for the specified host.
l Cluster Linking Key —Paste or type the linking key that you copied from the Tenable Nes-
sus Manager parent node.
l Parent Node Host —Type the hostname or IP address of the Tenable Nessus Manager
parent node to which you are linking.
l Parent Node Port —Type the port for the specified host. The default is 8834.
l (Optional) Use Proxy —Select the check box if you want to connect to the parent node
via the proxy settings set in Proxy Server.
5. Click Save.
The Tenable Nessus child node links to the parent node. Tenable Nessus logs you out of the
user interface and disables the user interface.
What to do next:
- 122 -
l Log in to the Tenable Nessus Manager parent node to manage linked Tenable Nessus Agents
and nodes.
l On the Tenable Nessus Manager parent node, manage cluster groups to organize your nodes
into groups that conform to your network topology. You must segment your network with
cluster groups when certain agents only have access to certain child nodes. By default, Nes-
sus assigns the node to the default cluster group.
- 123 -
Scenario 1: New Nessus Install
If you want to install Nessus, but, for security purposes, the server is not connected to the internet,
then follow the steps to install Nessus while offline. This process downloads and installs Nessus plu-
gins on the offline Nessus server.
- 124 -
Scenario 2: Update Nessus Licensing
If you have an existing Nessus server that is offline, and you want to update Nessus with the new
license/ activation code, then complete the following steps:
Caution: Tenable recommends saving the custom-offline plugin download URL described in step 5 before
continuing to step 6. The URL appears only once after registration. If you close the registration window
and forget the URL, you have to restart the registration process to generate a new URL.
- 125 -
Scenario 3: Update Nessus Plugins
You have an existing Nessus server that is offline and you need to update Nessus plugins. In this
scenario, you have already completed steps to Install Tenable NessusOffline but you need to install
the latest plugins.
1. Use the Custom URL that you saved and copied during your first offline Download and Copy
Plugins operation.
- 126 -
Nessus Offline Operations
For explanation purposes, we provide computers A (offline Nessus server) and B (online computer)
to demonstrate operations performed when managing Nessus offline.
Computer A Computer B
Operation
(Offline Nessus) (Online Computer)
- 127 -
Manage Activation Code
To manage your activation code, use the following topics:
- 128 -
View Activation Code
Platform Command
- 129 -
Reset Activation Code
You do not need to reset your activation code for the latest Tenable Nessus versions, and you are
able to re-register the same license with your original activation code.
In Nessus Professional 7.x and earlier versions, if you uninstall and reinstall Nessus, you need to
reset your activation code. Reset your activation code on the Tenable Community site, as described
in the Tenable Community Guide.
Note: Reset codes have a 10-day waiting period before you can reset your code again.
- 130 -
Update Activation Code
When you receive a new license with a corresponding activation code, you must register the new
activation code in Nessus.
Note: If you are working with Nessus offline, see Manage Tenable Nessus Offline.
User Interface
1. In Nessus, in the top navigation bar, click Settings.
2. In the Overview tab, click the button next to the activation code.
2. Run the nessuscli fetch --register <Activation Code> command specific to your
operating system.
Platform Command
Nessus downloads and installs the Nessus engine and the latest Nessus plugins, and then
restarts.
- 131-
Note: To register Nessus without automatically downloading and installing the latest updates, use
the command nessuscli fetch --register-only.
When you transfer the activation code to a system, it becomes the active instance of Nessus for
that license. Only the most recently activated system can receive plugin updates. All previous
instances of Nessus with that activation code still function, but cannot receive plugin updates. On
inactive instances, the following error message appears: Access to the feed has been denied, likely
due to an invalid or transferred license code.
To transfer an activation code, use one of the following procedures on the system that you want to
make the active instance of Nessus.
- 132 -
Nessus User Interface
1. Install Nessus as described in the appropriate procedure for your operating system.
4. Click Continue.
5. In the Register your scanner window, in the Scanner Type drop-down box, select Tenable Nes-
sus Essentials, Professional, or Manager.
7. Click Continue.
Nessus finishes the installation process, which may take several minutes. Once installation is
complete, the license is active on this instance of Nessus.
3. In the Overview tab, click the button next to the activation code.
- 133 -
Command Line Interface
Perform the following procedure as root, or use sudo as a non-root user.
1. On the system on which you want to activate Nessus, open a command prompt.
2. Run the nessuscli fetch --register <Activation Code> command specific to your
operating system.
Platform Command
Nessus downloads and installs the Nessus engine and the latest Nessus plugins, and then
restarts.
- 134 -
Scenario 1: New Nessus Install
If you want to install Nessus, but, for security purposes, the server is not connected to the internet,
then follow the steps to install Nessus while offline. This process downloads and installs Nessus plu-
gins on the offline Nessus server.
- 135 -
Scenario 2: Update Nessus Licensing
If you have an existing Nessus server that is offline, and you want to update Nessus with the new
license/ activation code, then complete the following steps:
Caution: Tenable recommends saving the custom-offline plugin download URL described in step 5 before
continuing to step 6. The URL appears only once after registration. If you close the registration window
and forget the URL, you have to restart the registration process to generate a new URL.
- 136 -
Scenario 3: Update Nessus Plugins
You have an existing Nessus server that is offline and you need to update Nessus plugins. In this
scenario, you have already completed steps to Install Tenable NessusOffline but you need to install
the latest plugins.
1. Use the Custom URL that you saved and copied during your first offline Download and Copy
Plugins operation.
- 137 -
Nessus Offline Operations
For explanation purposes, we provide computers A (offline Nessus server) and B (online computer)
to demonstrate operations performed when managing Nessus offline.
Computer A Computer B
Operation
(Offline Nessus) (Online Computer)
This process requires the use of two computers: the computer where you are installing Nessus,
which is not connected to the internet, and another computer that is connected to the internet.
For the following instructions, we use computers A (offline Tenable Nessus server) and B (online
computer) as examples.
1. During the browser portion of the Nessus installation, in the Registration drop-down, select
Offline.
A unique Challenge Code appears. In the following example, the challenge code is:
- 138 -
aaaaaa11b2222cc33d44e5f6666a777b8cc99999.
- 139 -
Generate the License
1. On a system with internet access (B), navigate to the Nessus Offline Registration Page.
2. In the top field, type the challenge code shown on the Nessus Product Registration screen.
The Offline Update Page Details appears and includes the following elements:
l Custom URL: The custom URL displayed downloads a compressed plugins file. This file
is used by Nessus to obtain plugin information. This URL is specific to your Nessus
license and must be saved and used each time plugins need to be updated.
l License: The complete text-string starting with -----BEGIN Tenable, Inc. LICENSE-----
and ends with -----END Tenable, Inc. LICENSE----- is your Nessus product license
information. Tenable uses this text-string to confirm your product license and regis-
tration.
l nessus.license file: At the bottom of the web page, there is an embedded file that
includes the license text-string.
- 140 -
Download and Copy Latest Plugins
1. While still using the computer with internet access (B), select the on-screen, custom URL.
Tip: This custom URL is specific to your Nessus license. Save it and use it each time you need to
update plugins.
2. Copy the compressed TAR file to the Nessus offline (A) system.
Platform Command
Linux # /opt/nessus/sbin/
FreeBSD # /usr/local/nessus/sbin/
macOS # /Library/Nessus/run/sbin/
- 141-
Copy and Paste License Text
1. While still using the computer with internet access (B), copy complete text string starting with
-----BEGIN Tenable, Inc. LICENSE----- and ends with -----END Tenable, Inc. LICENSE-----
2. On the computer where you are installing Nessus (A), on the Nessus Product Registration
screen, paste the complete text string starting with -----BEGIN Tenable, Inc. LICENSE-----
and ends with -----END Tenable, Inc. LICENSE-----.
3. Select Continue.
Nessus finishes the installation process; this may take several minutes.
4. Using the System Administrator account you created during setup, Sign In to Nessus.
- 142 -
Generate Challenge Code
Before performing offline update operations, you may need to generate a unique identifier on the
Tenable Nessus server. Tenable calls this identifier a challenge code.
Whereas you use an activation code when performing Tenable Nessus operations while connected
to the internet, you use a license when performing offline operations; the generated challenge code
enables you to view and use your license for offline operations.
2. Click Settings.
5. Click Activate.
2. Use the nessuscli fetch --challenge command specific to your operating system.
Platform Command
- 143 -
aaaaaa11b2222cc33d44e5f6666a777b8cc99999
- 144 -
Generate Your License
By default, when you install Tenable Nessus, your license is hidden and automatically registered.
You cannot view this license.
However, if your Tenable Nessus Server is not connected to the internet (in other words, it is off-
line), you must generate a license. This license is unique to your Tenable Nessus product, and you
cannot share it.
Your license is a text-based file that contains a string of alphanumeric characters. The license is
created and based on your unique generated challenge code.
1. On a system with internet access (B), navigate to the Tenable Nessus Offline Registration
Page.
4. Select Submit.
At the bottom of the resulting web page, an embedded nessus.license file that includes the
license text string appears.
- 145 -
Download and Copy License File (nessus.license)
After you have generated your Tenable Nessus license, you now need to download and then copy
the license to the offline system (A) running Tenable Nessus.
1. At the Tenable Nessus Offline Registration Page, while still using the computer with internet
access (B), select the on-screen nessus.license link.
The link downloads the nessus.license file.
2. Copy the nessus.license file to the offline system (A) running Tenable Nessus 6.3 and newer.
Platform Directory
Linux # /opt/nessus/etc/nessus/
FreeBSD # /usr/local/nessus/etc/nessus
macOS # /Library/Nessus/run/etc/nessus
Windows C:\ProgramData\Tenable\Nessus\conf
- 146 -
Register Your License with Nessus
When you receive a new license and Activation Code, you must re-register the license with Nessus.
When your Nessus server is offline, you must generate a license, download the license, and then
register your license with Nessus.
Once downloaded and copied to your offline Nessus server, use the nessuscli fetch -- register com-
mand that corresponds to your operating system.
2. Use the nessuscli fetch --register-offline command specific to your operating system.
Platform Command
- 147 -
Download and Copy Plugins
Note: The following process is only intended for organizations that do not want to enable automatic plugin
updates in their Tenable Nessus environment, or organizations that use offline environments. For inform-
ation about automatic plugin updates and how to enable them, see Update Tenable Nessus Software.
After submitting the required information on the Offline Update Page Details, download the Nessus
Plugins compressed TAR file.
Download Plugins
1. Using the computer with internet access (B), copy and save the on-screen custom URL link.
Note: This custom URL is specific to your Tenable Nessus license and you must use it each time you
need to download and update plugins again.
Caution: Tenable recommends saving the custom URL before continuing. The URL is only shown
once after registration. If you close the registration window and forget the URL, you have to restart
the registration process to generate a new URL.
Platform Directory
Linux # /opt/nessus/sbin/
FreeBSD # /usr/local/nessus/sbin/
macOS # /Library/Nessus/run/sbin/
4. Next, on the offline (A) system running Tenable Nessus, Install Plugins Manually.
- 148 -
Install Plugins Manually
You can manually update Nessus plugins in two ways: the user interface or the command-line inter-
face.
Note: You cannot use this procedure to update Tenable Vulnerability Management or Tenable Security
Center-managed scanners.
4. In the Manual Software Update dialog box, select Upload your own plugin archive, and then
click Continue.
5. Navigate to the compressed TAR file you downloaded, select it, then click Open.
2. Use the nessuscli update <tar.gz file name> command specific to your operating sys-
tem.
- 149 -
Platform Command
Note: If you receive a signature check failure error, check the integrity of your plugins archive, download
the plugins again, and retry the process. If the error persists, re-register Nessus or contact Tenable Sup-
port.
- 150 -
Update the Audit Warehouse Manually
The audit warehouse, which contains all currently published audits, updates automatically when you
upgrade to a new version of Tenable Nessus. You can perform an offline update to update the audit
warehouse without upgrading to a new version of Tenable Nessus.
To update the audit warehouse manually using the Tenable Nessus user interface:
Note: You cannot use this procedure to update Tenable Vulnerability Management or Tenable Security
Center-managed scanners.
4. In the Manual Software Update dialog box, select Upload your own plugin archive, and then
click Continue.
5. Navigate to the compressed TAR file you downloaded, select it, and then click Open.
2. Use the nessuscli update <tar.gz filename> command specific to your operating sys-
tem.
- 151-
Platform Command
- 152 -
Update Nessus Manager Manually on an Offline System
Note: Use the following steps to upgrade an offline Tenable Nessus Manager that manages Tenable Nessus
scanners. When upgrading other forms of Tenable Nessus offline (for example, Tenable Nessus Pro-
fessional, a Tenable Nessus Manager not managing Tenable Nessus scanners, or Tenable Nessus scanners
managed by Tenable Security Center), use the steps described in Update Tenable Nessus Software.
On Nessus Manager, you can manually update software on an offline system in two ways.
l Option 1: Use the Manual Software Update feature in the Nessus user interface.
l Option 2: Use the command-line interface and the nessuscli update command.
2. On the offline system running Nessus (A), in the top navigation bar, select Settings.
5. In the Manual Software Update dialog box, select Upload your own plugin archive, and then
select Continue.
6. Navigate to the directory where you downloaded the compressed TAR file.
3. Use the nessuscli update <tar.gz filename> command specific to your operating sys-
tem.
- 153 -
Platform Command
- 154 -
Offline Update Page Details
When you are working with Nessus offline, use the https:/ / plugins.nessus.org/ v2/ offline.php page.
Based on the steps you are using to Manage Tenable Nessus Offline, the resulting web page
includes the following elements:
l Custom URL: The custom URL displayed downloads a compressed plugins file. This file is
used by Nessus to obtain plugin information. This URL is specific to your Nessus license and
must be saved and used each time plugins need to be updated.
l License: The complete text-string starting with -----BEGIN Tenable, Inc. LICENSE----- and
ends with -----END Tenable, Inc. LICENSE----- is your Nessus product license information.
Tenable uses this text-string to confirm your product license and registration.
l nessus.license file: At the bottom of the web page, there is an embedded file that includes
the license text-string.
- 155 -
Back Up Tenable Nessus
Using the Nessus CLI, you can back up your Tenable Nessus to restore it later on any system, even
if it is a different operating system. When you back up Tenable Nessus, your license information
and settings are preserved. Tenable Nessus does not back up scan results.
Note: If you perform a cross-platform backup and restore between Linux and Windows systems, after you
restore Tenable Nessus, you must reconfigure any Tenable Nessus configurations that use schedules.
Schedules do not transfer correctly across these platforms because the operating systems use different
timezone names.
2. Create the Tenable Nessus backup file by running the following command:
l Linux: /opt/nessus/var/nessus
l Windows: C:\ProgramData\Tenable\Nessus\nessus
l macOS: /Library/Nessus/run/var/nessus
3. (Optional) Move the Tenable Nessus backup file to a backup location on your system.
What to do next:
l Restore Tenable Nessus
- 156 -
Restore Tenable Nessus
Using the Nessus CLI, you can use a previous backup of Tenable Nessus to restore later on any sys-
tem, even if it is a different operating system. When you back up Tenable Nessus, your license
information and settings are preserved. Tenable Nessus does not restore scan results.
On Tenable Nessus 8.11.1and later, you can restore a backup even if it was created on an earlier ver-
sion of Tenable Nessus. For example, if you are on Tenable Nessus 8.11.1, you can restore a backup
from Tenable Nessus 8.10.0.
Note: If you perform a cross-platform backup and restore between Linux and Windows systems, after you
restore Tenable Nessus, you must reconfigure any Tenable Nessus configurations that use schedules.
Schedules do not transfer correctly across these platforms because the operating systems use different
timezone names.
3. Restore Tenable Nessus from the backup file you previously saved by running the following
command:
Tenable Nessus begins initializing and uses the license information and settings from the
backup.
- 157 -
Remove Nessus and Nessus Agents
This section includes information for removing Nessus and Nessus Agents.
l Remove Nessus
- 158 -
Remove Nessus
This section includes information for uninstalling and removing Nessus.
- 159 -
Optional: Export your Scans and Policies
1. Go to the folder or folders where you store your scans.
3. In the upper right corner, select the Export button, and then choose the Nessus DB option.
- 160 -
Stop Nessus Processes
1. From within Nessus, verify any running scans have completed.
SUSE
# /etc/rc.d/nessusd stop
FreeBSD
# /etc/init.d/nessusd stop
- 161-
Remove Nessus
1. Run the remove command specific to your Linux-style operating system.
Red Hat 8 and later, CentOS 8 and later, Oracle Linux 8 and later, Fedora, SUSE
# dpkg -r Nessus
FreeBSD
2. Using the command specific to your Linux-style operating system, remove remaining files that
were not part of the original installation.
Linux
# rm -rf /opt/nessus
FreeBSD
# rm -rf /usr/local/nessus/bin
This completes the process of uninstalling the Nessus on the Linux operating systems.
- 162 -
Uninstall Nessus on Windows
1. (Optional) Export your scans and policies.
2. Stop Nessus.
3. Uninstall Nessus from the Windows user interface or the CLI following the steps below:
1. Navigate to the portion of Windows that allows you to Add or Remove Programs or Uninstall or
change a program.
3. Click Uninstall.
4. Click Yes.
Note: For information about optional msiexec /x parameters, see msiexec in the Microsoft doc-
umentation.
- 163 -
Uninstall Nessus on macOS
Stop Nessus
1. In System Preferences, select the Nessus button.
/Library/Nessus
/Library/LaunchDaemons/com.tenablesecurity.nessusd.plist
/Library/PreferencePanes/Nessus Preferences.prefPane
/Applications/Nessus
- 164 -
Remove Tenable Nessus as a Docker Container
When you remove Tenable Nessus running as a Docker container, you lose the container data.
1. In your terminal, stop the container from running using the docker stop command.
- 165 -
Remove Nessus Agent
This section includes information for uninstalling a Tenable Nessus Agent from hosts.
Note: For instructions on how to remove an agent from a manager while leaving the agent installed on the
host, see Unlink an Agent.
- 166 -
Uninstall a Nessus Agent on Linux
Red Hat 8 and later, CentOS 8 and later, Oracle Linux 8 and later, Fedora, SUSE
# dpkg -r NessusAgent
FreeBSD
What to do next:
l If you plan on reinstalling the Tenable Nessus Agent on the system, see the knowledge base
article on how to avoid linking errors.
- 167 -
Uninstall a Nessus Agent on Windows
1. Navigate to the portion of Windows where you can Add or Remove Programs or Uninstall or
change a program.
3. Click Uninstall.
A dialog box appears, prompting you to confirm your selection to remove Tenable Nessus
Agent.
4. Click Yes.
Note: On Windows, the Tenable Nessus Agent uninstall process automatically creates a backup file in
the %TEMP% directory. If you reinstall Tenable Nessus Agent within 24 hours, Tenable Nessus Agent
uses that backup file to restore the installation. If you want to reinstall Tenable Nessus Agent within
24 hours without using the backup, manually delete the backup file in the %TEMP% directory before-
hand.
Note: For information about optional msiexec /x parameters, see msiexec in the Microsoft doc-
umentation.
What to do next:
- 168 -
l If you plan on reinstalling the Tenable Nessus Agent on the system, see the knowledge base
article on how to avoid linking errors.
- 169 -
Uninstall a Nessus Agent on macOS
1. Remove the Tenable Nessus directories. From a command prompt, type the following com-
mands:
l $ sudo rm /Library/LaunchDaemons/com.tenablesecurity.nessusagent.plist
What to do next:
l If you plan on reinstalling the Tenable Nessus Agent on the system, see the knowledge base
article on how to avoid linking errors.
- 170 -
Scans
On the Scans page, you can create, view, and manage scans and resources. To access the Scans
page, in the top navigation bar, click Scans. The left navigation bar shows the Folders and
Resources sections.
l Scan Templates
l Scan Results
l Scan Folders
l Policies
l Terrascan
l Plugins
l Customized Reports
- 171-
l Scanners
l Agents
Scan Templates
You can use scan templates to create custom policies for your organization. Then, you can run
scans based on Tenable's scan templates or your custom policies' settings. For more information,
see Create a Policy.
When you first create a scan or policy, the Scan Templates section or Policy Templates section
appears, respectively. Tenable Nessus provides separate templates for scanners and agents,
depending on which sensor you want to use for scanning:
l Scanner Templates
l Agent Templates (Tenable Nessus Manager only) (Tenable Nessus Manager only)
If you have custom policies, they appear in the User Defined tab.
When you configure a Tenable-provided scan template, you can modify only the settings included
for the scan template type. When you create a user-defined scan template, you can modify a cus-
tom set of settings for your scan.
For descriptions of all the scanner and agent template settings, see Settings.
Note: If a plugin requires authentication or settings to communicate with another system, the
plugin is not available on agents. This includes, but is not limited to:
l Patch management
l Mobile device management
l Cloud infrastructure audit
l Database checks that require authentication
Scanner Templates
There are three scanner template categories in Tenable Nessus:
- 172 -
l Discovery —Tenable recommends using discovery scans to see what hosts are on your net-
work, and associated information such as IP address, FQDN, operating systems, and open
ports, if available. After you have a list of hosts, you can choose what hosts you want to target
in a specific vulnerability scan.
l Vulnerabilities —Tenable recommends using vulnerability scan templates for most of your
organization's standard, day-to-day scanning needs. Tenable also publishes vulnerability scan
templates that allow you to scan your network for a specific vulnerability or group of vul-
nerabilities. Tenable frequently updates the Tenable Nessus scan template library with tem-
plates that detect the latest vulnerabilities of public interest, such as Log4Shell.
Tip: In the Tenable Nessus user interface, use the search box to find a template quickly.
Note: If you configure Tenable Nessus Manager for agent management, Tenable does not recommend
using Tenable Nessus Manager as a local scanner. For example, do not configure Tenable Security Center
scan zones to include Nessus Manager and avoid running network-based scans directly from Tenable Nes-
sus Manager. These configurations can negatively impact agent scan performance. In most cases, use
agent scan templates when working in Tenable Nessus Manager.
Template Description
Discovery
Host Discovery Performs a simple scan to discover live hosts and open ports.
Launch this scan to see what hosts are on your network and associated
information such as IP address, FQDN, operating systems, and open
ports, if available. After you have a list of hosts, you can choose what
hosts you want to target in a specific vulnerability scan.
- 173 -
Note: Assets identified by discovery scans do not count toward your license.
Vulnerabilities
Basic Network Performs a full system scan that is suitable for any host. Use this tem-
Scan plate to scan an asset or assets with all of Nessus's plugins enabled. For
example, you can perform an internal vulnerability scan on your organ-
ization's systems.
Advanced Network The most configurable scan type. You can configure this scan template
Scan to match any policy. This template has the same default settings as the
basic scan template, but it allows for additional configuration options.
Note: Advanced scan templates allow you to scan more deeply using custom
configuration, such as faster or slower checks, but misconfigurations can
cause asset outages or network saturation. Use the advanced templates with
caution.
Advanced Dynamic An advanced scan without any recommendations, where you can con-
Scan figure dynamic plugin filters instead of manually selecting plugin families
or individual plugins. As Tenable releases new plugins, any plugins that
match your filters are automatically added to the scan or policy. This
allows you to tailor your scans for specific vulnerabilities while ensuring
that the scan stays up to date as new plugins are released.
Tenable Nessus detects malware using a combined allow list and block
list approach to monitor known good processes, alert on known bad pro-
cesses, and identify coverage gaps between the two by flagging
unknown processes for further inspection.
- 174 -
The Mobile Device Scan plugins allow you to obtain information from
devices registered in a Mobile Device Manager (MDM) and from Active Dir-
ectory servers that contain information from Microsoft Exchange Serv-
ers.
Intel AMT Security Performs remote and local checks for CVE-2017-5689.
Bypass
Spectre and Melt- Performs remote and local checks for CVE-2017-5753, CVE-2017-5715,
down and CVE-2017-5754.
- 175 -
Ripple20 Remote Detects hosts running the Treck stack in the network, which may be
Scan affected by Ripple20 vulnerabilities.
ProxyLogon: Performs remote and local checks to detect Microsoft Exchange Server
MS Exchange vulnerabilities related to CVE-2021-26855, CVE-2021-26857, CVE-2021-
26858, and CVE-2021-27065.
Use this template to check Active Directory for Kerberoasting, Weak Ker-
beros encryption, Kerberos pre-authentication validation, non-expiring
account passwords, unconstrained delegation, null sessions, Kerberos
KRBTGT, dangerous trust relationships, Primary Group ID integrity, and
blank passwords.
2022 Threat Land- Detects vulnerabilities featured in Tenable's 2022 Threat Landscape Ret-
scape Ret- rospective report.
rospective (TLR)
- 176 -
CISA Alerts AA22- Performs remote and local checks for vulnerabilities from CISA alerts
011A and AA22- AA22-011A and AA22-047A.
047A
Ransomware Performs remote and local checks for common ransomware vul-
Ecosystem nerabilities.
Compliance
Internal PCI Net- Performs an internal PCI DSS (11.2.1) vulnerability scan.
work Scan
This template creates scans that you can use to satisfy internal (PCI DSS
11.2.1) scanning requirements for ongoing vulnerability management pro-
grams that satisfy PCI compliance requirements. You can use these
scans for ongoing vulnerability management and to perform rescans until
passing or clean results are achieved. You can provide credentials to enu-
merate missing patches and client-side vulnerabilities.
Note: While the PCI DSS requires you to provide evidence of passing or
"clean" scans on at least a quarterly basis, you must also perform scans after
any significant changes to your network (PCI DSS 11.2.3).
- 177 -
policies may not allow you to scan devices or know credentials for
devices on the network for security reasons. Offline configuration audits
use host configuration files from hosts to scan instead. Through scan-
ning these files, you can ensure that devices' settings comply with audits
without the need to scan the host directly.
SCAP and OVAL Audits systems using SCAP and OVAL definitions.
Auditing
The National Institute of Standards and Technology (NIST) Security Con-
tent Automation Protocol (SCAP) is a set of policies for managing vul-
nerabilities and policy compliance in government agencies. It relies on
multiple open standards and policies, including OVAL, CVE, CVSS, CPE,
and FDCC policies.
- 178 -
sion Prevention), may block or quarantine the executable required
for auditing. For those systems, you must make an exception for
either the host or the executable sent.
l When using the SCAP and OVAL Auditing template, you can per-
form Linux and Windows SCAP CHECKS to test compliance stand-
ards as specified in NIST’s Special Publication 800-126.
l Vulnerabilities —Tenable recommends using vulnerability scan templates for most of your
organization's standard, day-to-day scanning needs.
Tip: In the Tenable Nessus user interface, use the search box to find a template quickly.
Template Description
Vulnerabilities
Basic Agent Performs a full system scan that is suitable for any host. Use this template
Scan to scan an asset or assets with all of Nessus's plugins enabled. For example,
you can perform an internal vulnerability scan on your organization's sys-
tems.
Advanced The most configurable scan type. You can configure this scan template to
Agent Scan match any policy. This template has the same default settings as the basic
scan template, but it allows for additional configuration options.
- 179 -
Note: Advanced scan templates allow you to scan more deeply using custom con-
figuration, such as faster or slower checks, but misconfigurations can cause
asset outages or network saturation. Use the advanced templates with caution.
Tenable Nessus Agent detects malware using a combined allow list and
block list approach to monitor known good processes, alert on known bad
processes, and identify coverage gaps between the two by flagging unknown
processes for further inspection.
Compliance
- 180 -
l When using the SCAP and OVAL Auditing template, you can perform
Linux and Windows SCAP CHECKS to test compliance standards as
specified in NIST’s Special Publication 800-126.
- 181-
Scan and Policy Settings
Scan settings enable you to refine parameters in scans to meet your specific network security
needs. The scan settings you can configure vary depending on the Tenable-provided template on
which a scan or policy is based.
You can configure these settings in individual scans or in policy from which you create individual
scans.
l Discovery Settings
l Assessment Settings
l Report Settings
l Advanced Settings
Settings in Policies
When configuring settings for policies, note the following:
l If you configure a setting in a policy, that setting applies to any scans you create based on
that policy.
l You base a policy on a Tenable-provided template. Most of the settings are identical to the set-
tings you can configure in an individual scan that uses the same Tenable-provided template.
However, certain Basic settings are unique to creating a policy, and do not appear when con-
figuring an individual scan. For more information, see Basic Settings for Policies.
l You can configure certain settings in a policy, but cannot modify those settings in an indi-
vidual scan based on a policy. These settings include Discovery, Assessment, Report,
Advanced, Compliance, SCAP, and Plugins. If you want to modify these settings for individual
scans, create individual scans based on a Tenable-provided template instead.
- 182 -
l If you configure Credentials in a policy, other users can override these settings by adding
scan-specific or managed credentials to scans based on the policy.
Note: This topic describes Basic settings you can set in scans. For Basic settings in policies, see Basic
Settings for Policies.
The Basic scan settings are used to specify certain organizational and security-related aspects of
the scan, including the name of the scan, its targets, whether the scan is scheduled, and who has
access to the scan, among other settings.
Configuration items that are required by a particular scan are indicated in the Tenable Nessus inter-
face.
- 183 -
General
Default
Setting Description
Value
Name None Specifies the name of the scan. This value is displayed on
the Tenable Nessus interface.
Folder My Scans Specifies the folder where the scan appears after being
saved.
Agent Groups None (Agent scans only) Specifies the agent group or groups you
want the scan to target. Select an existing agent group from
the drop-down box, or create a new agent group. For more
information, see Create a New Agent Group.
Scan Window 1hour (Agent scans only) (Required) Specifies the time frame dur-
ing which agents must report in order to be included and vis-
ible in vulnerability reports. Use the drop-down box to select
an interval of time, or click to type a custom scan window.
Scanner Auto-Select (Tenable Nessus Manager only) Specifies the scanner that
performs the scan.
Policy None This setting appears only when the scan owner edits an exist-
ing scan that is based on a policy.
- 184 -
Default
Setting Description
Value
In most cases, you set the policy at scan creation, then keep
the same policy each time you run the scan. However, you
may want to change the policy when troubleshooting or
debugging a scan. For example, changing the policy makes it
easy to enable or disable different plugin families, change
performance settings, or apply dedicated debugging policies
with more verbose logging.
When you change the policy for a scan, the scan history
retains the results of scans run under the previously-
assigned policy.
Target URL None (Web App templates only) Specifies the URL for the target
you want to scan, as it appears on your Tenable Nessus Web
Application Scanning license. Regular expressions and wild-
cards are not allowed. Targets must start with the http://
or https:// protocol identifier.
Note: If the URL you type in the Target box has a different
FQDN host from the URL that appears on your license, and your
scan runs successfully, the new URL you type counts as an addi-
tional asset on your license.
- 185 -
Default
Setting Description
Value
Tip: You can force Tenable Nessus to use a given host name
for a server during a scan by using the hostname[ip] syntax
(e.g., www.example.com[192.168.1.1]).
Show Dash- Off Select this check box to show a scan dashboard as the
board scan's default landing page.
- 186 -
Schedule
By default, scans are not scheduled. When you first access the Schedule section, the Enable Sched-
ule setting appears, set to Off. To modify the settings listed on the following table, click the Off but-
ton. The rest of the settings appear.
Starts Varies Specifies the exact date and time when a scan launches.
The starting date defaults to the date when you are cre-
ating the scan. The starting time is the nearest half-hour
interval. For example, if you create your scan on
09/ 31/ 2018 at 9:12 AM, the default starting date and time
is set to 09/ 31/ 2018 and 09:30.
Timezone America/ New Specifies the timezone of the value set for Starts.
- 187 -
Setting Default Value Description
York
Repeat Every Varies Specifies the interval at which a scan is relaunched. The
default value of this item varies based on the frequency
you choose.
Repeat On Varies Specifies what day of the week a scan repeats. This
item appears only if you specify Weekly for Frequency.
Repeat By Day of the Month Specifies when a monthly scan is relaunched. This item
appears only if you specify Monthly for Frequency.
- 188 -
Notifications
Default
Setting Description
Value
Email Recip- None Specifies zero or more email addresses, separated by com-
ient(s) mas, that are alerted when a scan completes and the results
are available.
Attach Report Off (Tenable Nessus Professional only) Specifies whether you
want to attach a report to each email notification. This option
toggles the Report Type and Max Attachment Size settings.
Report Type Nessus (Tenable Nessus Professional only) Specifies the report type
(CSV, Nessus, or PDF) that you want to attach to the email.
- 189 -
Permissions
Using settings in the Permissions section, you can assign various permissions to groups and indi-
vidual users. When you assign a permission to a group, that permission applies to all users within
the group. The following table describes the permissions that can be assigned.
Tip: Tenable recommends assigning permissions to user groups, rather than individual users, to minimize
maintenance as individual users leave or join your organization.
Permission Description
No Access Groups and users set to No Access cannot interact with the scan in any way.
When you create a scan, by default no other users or groups have access to
it.
Can View Groups and users set to Can View can view the results of the scan.
Can Control Groups and users set to Can Control can launch, pause, and stop a scan, as
well as view its results.
Can Configure Groups and users set to Can Configure can modify the configuration of the
scan in addition to all other permissions.
- 190 -
Scan Targets
You can specify the targets of a scan using several different formats. The following table explains
target types, examples, and a short explanation of what occurs when that Tenable Nessus scans
that target type.
Target Descrip-
Example Explanation
tion
- 191-
Target Descrip-
Example Explanation
tion
- 192 -
Target Descrip-
Example Explanation
tion
The text 'link6' link6 or link6%16 Tenable Nessus sends out mul-
optionally fol- ticast ICMPv6 echo requests on
lowed by an the interface specified by the
IPv6 scope scope identifier to the ff02::1
identifier address. Tenable Nessus scans
all hosts that respond to the
request. If you do not provide a
IPv6 scope identifier, Tenable
Nessus sends out the requests
on all interfaces.
Some text "Test Host 1[ 10.0.1.1] " or "Test Host 2 Tenable Nessus scans the IPv4
with either a [ 2001:db8::abcd] " or IPv6 address within the brack-
single IPv4 or ets like a normal single target.
IPv6 address
within square
brackets
Tip: You can process hostname targets that look like either a link6 target (start with the text "link6") or like
one of the two IPv6 range forms as a hostname by putting single quotes around the target.
- 193 -
Note: This topic describes Basic settings you can set in policies. For Basic settings in individual scans, see
Basic Settings for Scans.
You can use Basic settings to specify basic aspects of a policy, including who has access to the
policy.
- 194 -
General
The general settings for a policy.
- 195 -
Permissions
You can share the policy with other users by setting permissions for users or groups. When you
assign a permission to a group, that permission applies to all users within the group.
Permission Description
No Access (Default user only) Groups and users set to this permission cannot interact
with the policy in any way.
Can Use Groups and users with this permission can view the policy configuration and
use the policy to create scans.
Can Edit In addition to viewing the policy and using the policy to create scans, groups
and users with this permission can modify any policy settings except user per-
missions. However, they cannot export or delete the policy.
Note: If a scan is based on a policy, you cannot configure Discovery settings in the scan. You can only
modify these settings in the related policy.
Note: Tenable Nessus indicates the settings that are required by a particular scan or policy.
The Discovery settings relate to discovery and port scanning, including port ranges and methods.
If you select the Custom preconfigured setting option, or if you are using a scanner template that
does not include preconfigured discovery settings, you can manually configure Discovery settings in
the following categories:
Note: The following tables include settings for the Advanced Scan template. Depending on the template
you select, certain settings may not be available, and default values may vary.
- 196 -
Host Discovery
By default, Tenable Nessus enables some settings in the Host Discovery section. When you first
access the Host Discovery section, the Ping the remote host item appears and is set to On.
l General Settings
l Ping Methods
l Fragile Devices
l Wake-on-LAN
Default
Setting Description
Value
Ping the remote On If set to On, the scanner pings remote hosts on multiple
host ports to determine if they are alive. Additional options
General Settings and Ping Methods appear.
Scan unresponsive Disabled Specifies whether the Nessus scanner scans hosts that
hosts do not respond to any ping methods. This option is only
available for scans using the PCI Quarterly External Scan
template.
General Settings
Test the local Nes- Enabled When enabled, includes the local Nessus host in the
sus host scan. This is used when the Nessus host falls within the
target network range for the scan.
Use Fast Network Disabled When disabled, if a host responds to ping, Nessus
- 197 -
Discovery attempts to avoid false positives, performing additional
tests to verify the response did not come from a proxy
or load balancer. These checks can take some time,
especially if the remote host is firewalled.
Ping Methods
ARP Enabled Ping a host using its hardware address via Address Res-
olution Protocol (ARP). This only works on a local net-
work.
ICMP Enabled Ping a host using the Internet Control Message Protocol
(ICMP).
Assume ICMP Disabled Assume ICMP unreachable from the gateway means the
unreachable from host is down. When a ping is sent to a host that is down,
the gateway its gateway may return an ICMP unreachable message.
means the host is When this option is enabled, when the scanner receives
down an ICMP Unreachable message, it considers the targeted
host dead. This approach helps speed up discovery on
some networks.
Note: Some firewalls and packet filters use this same beha-
vior for hosts that are up, but connected to a port or pro-
tocol that is filtered. With this option enabled, this leads to
the scan considering the host is down when it is indeed up.
- 198 -
Maximum number 2 Specifies the number of attempts to retry pinging the
of retries remote host.
UDP Disabled Ping a host using the User Datagram Protocol (UDP). UDP
is a stateless protocol, meaning that communication is
not performed with handshake dialogues. UDP-based
communication is not always reliable, and because of
the nature of UDP services and screening devices, they
are not always remotely detectable.
Fragile Devices
Scan Network Disabled When enabled, the scanner scans network printers.
Printers
Scan Novell Net- Disabled When enabled, the scanner scans Novell NetWare hosts.
ware hosts
Scan Operational Disabled When enabled, the scanner performs a full scan of Oper-
Technology ational Technology (OT) devices such as programmable
devices logic controllers (PLCs) and remote terminal units (RTUs)
that monitor environmental factors and the activity and
state of machinery.
Wake-on-LAN
For example:
33:24:4C:03:CC:C7
- 199 -
FF:5C:2C:71:57:79
Boot time wait (in 5 The amount of time to wait for hosts to start before per-
minutes) forming the scan.
- 200 -
Port Scanning
The Port Scanning section includes settings that define how the port scanner behaves and which
ports to scan.
l Ports
Default
Setting Description
Value
Ports
Consider Disabled When enabled, if a port is not scanned with a selected port
Unscanned scanner (for example, the port falls outside of the specified
Ports as Closed range), the scanner considers it closed.
- 201-
Default
Setting Description
Value
If scanning both TCP and UDP, you can specify a split range
specific to each protocol. For example, if you want to scan
a different range of ports for TCP and UDP in the same
policy, you would type T:1-1024,U:300-500.
You can also specify a set of ports to scan for both pro-
tocols, as well as individual ranges for each separate pro-
tocol. For example, 1-1024,T:1024-65535,U:1025.
SSH (netstat) Enabled When enabled, the scanner uses netstat to check for open
ports from the local machine. It relies on the netstat com-
mand being available via an SSH connection to the target.
This scan is intended for Linux-based systems and requires
authentication credentials.
WMI (netstat) Enabled When enabled, the scanner uses netstat to determine open
ports while performing a WMI-based scan.
- 202 -
Default
Setting Description
Value
Only run net- Enabled If a local port enumerator runs, all network port scanners
work port scan- will be disabled for that asset.
ners if local port
enumeration
failed
Verify open TCP Disabled When enabled, if a local port enumerator (for example, WMI
ports found by or netstat) finds a port, the scanner also verifies that the
local port enu- port is open remotely. This approach helps determine if
merators some form of access control is being used (for example,
TCP wrappers or a firewall).
TCP Disabled Use the built-in Tenable Nessus TCP scanner to identify
open TCP ports on the targets, using a full TCP three-way
handshake. TCP scans are only possible if you are using
Linux or FreeBSD. On Windows or macOS, the scanner does
not do a TCP scan and instead uses the SYN scanner to
avoid performance issues native to those operating sys-
tems.
If you enable this option, you can also set the Override Auto-
matic Firewall Detection option.
SYN Enabled Use the built-in Tenable Nessus SYN scanner to identify
open TCP ports on the target hosts. SYN scans do not ini-
tiate a full TCP three-way handshake. The scanner sends a
SYN packet to the port, waits for SYN-ACK reply, and
- 203 -
Default
Setting Description
Value
If you enable this option, you can also set the Override Auto-
matic Firewall Detection option.
Override auto- Disabled This setting can be enabled if you enable either the TCP or
matic firewall SYN option.
detection
When enabled, this setting overrides automatic firewall
detection.
UDP Disabled This option engages the built-in Tenable Nessus UDP scan-
ner to identify open UDP ports on the targets.
- 204 -
Service Discovery
The Service Discovery section includes settings that attempt to map each open port with the ser-
vice that is running on that port.
l General Settings
Default
Setting Description
Value
General Settings
Probe all ports Enabled When enabled, the scanner attempts to map each open port
to find ser- with the service that is running on that port, as defined by
vices the Port scan range option.
Search for SSL On Controls how the scanner tests SSL-based services.
based services
Caution: Testing for SSL capability on all ports may be dis-
ruptive for the tested host.
Search for Known Specifies which ports on target hosts the scanner searches
SSL/ TLS on SSL/ TLS for SSL/ TLS services.
ports
This setting has two options:
Search for None Specifies which ports on target hosts the scanner searches
DTLS On for DTLS services.
- 205 -
Default
Setting Description
Value
l None
Identify cer- 60 When enabled, the scanner identifies SSL and TLS cer-
tificates expir- tificates that are within the specified number of days of
ing within x expiring.
days
Enumerate all True When enabled, the scanner ignores the list of ciphers advert-
SSL ciphers ised by SSL/ TLS services and enumerates them by attempt-
ing to establish connections using all possible ciphers.
Enable CRL False When enabled, the scanner checks that none of the iden-
checking (con- tified certificates have been revoked.
nects to inter-
net)
- 206 -
Identity
The Identity section allows you to enable or disable the collection of Active Directory data.
Default
Setting Description
Value
General Settings
Collect Identity Disabled Enable this setting to allow Tenable Nessus to gather user,
Data from Act- computer, and group objects from Active Directory.
ive Directory
This setting requires that you specify an Active Directory
user account for the scan. You also need to enable LDAPS
on the Domain Controller that the scan is targeting.
- 207 -
Preconfigured Discovery Scan Settings
Certain Tenable-provided scanner templates include preconfigured discovery settings, described in
the following table. The preconfigured discovery settings are determined by both the template and
the Scan Type that you select.
Discovery
- 208 -
o Always test the local Nes-
sus host
o Use fast network dis-
covery
- 209 -
o TCP
o ARP
o ICMP (2 retries)
Vulnerabilities
- 210 -
o Scan all ports (1-65535)
o Use netstat if credentials
are provided
o Use SYN scanner if
necessary
- 211-
o Use fast network dis-
covery
- 212 -
o ICMP (2 retries)
- 213 -
o Use SYN scanner if
necessary
- 214 -
o Use fast network dis-
covery
- 215 -
o Scan all TCP ports
o Detect SSL on all open
ports
- 216 -
o Scan TCP ports 23, 25,
80, and 443
o Detect SSL/ TLS on ports
where it is commonly
used
- 217 -
o Use fast network dis-
covery
- 218 -
o Scan all TCP ports
o Detect SSL on all open
ports
- 219 -
used
- 220 -
o Novell Netware hosts
- 221-
used
- 222 -
o Always test the local Nes-
sus host
o Use fast network dis-
covery
- 223 -
l Service Discovery Settings:
o Scan the default Tenable
Nessus port range
o Detect SSL/ TLS on ports
where it is commonly
used
- 224 -
o Scan all TCP ports
o Detect SSL on all open
ports
- 225 -
443
o Detect SSL/ TLS on ports
where it is commonly
used
- 226 -
o Detect SSL/ TLS on ports
where it is commonly
used
- 227 -
l Do not scan fragile devices.
Compliance
- 228 -
o Scan all ports (1-65535)
o Use netstat if credentials
are provided
o Use SYN scanner if
necessary
- 229 -
o Use fast network dis-
covery
Note: If a scan is based on a policy, you cannot configure Assessment settings in the scan. You can only
modify these settings in the related policy.
You can use Assessment settings to configure how a scan identifies vulnerabilities, as well as what
vulnerabilities are identified. This includes identifying malware, assessing the vulnerability of a sys-
tem to brute force attacks, and the susceptibility of web applications.
If you select the Custom preconfigured setting option, or if you are using a scanner template that
does not include preconfigured assessment settings, you can manually configure Assessment set-
tings in the following categories:
Note: The following tables include settings for the Advanced Scan template. Depending on the template
you select, certain settings may not be available, and default values may vary.
- 230 -
General
The General section includes the following groups of settings:
l Accuracy
l Antivirus
l SMTP
Accuracy
Override nor- Disabled In some cases, Tenable Nessus cannot remotely determine
mal Accur- whether a flaw is present or not. If report paranoia is set to
acy Show potential false alarms, a flaw is reported every time,
even when there is a doubt about the remote host being
affected. Conversely, a paranoia setting of Avoid potential
false alarms causes Tenable Nessus to not report any flaw
whenever there is a hint of uncertainty about the remote
host. As a middle ground between these two settings, dis-
able this setting.
Perform thor- Disabled Causes various plugins to work harder. For example, when
ough tests looking through SMB file shares, a plugin can analyze 3 dir-
(may disrupt ectory levels deep instead of 1. This could cause much more
your network network traffic and analysis sometimes. By being more thor-
or impact ough, the scan is more intrusive and is more likely to disrupt
scan speed) the network, while potentially providing better audit results.
Antivirus
Antivirus 0 Configure the delay of the Antivirus software check for a set
definition number of days (0-7). The Antivirus Software Check menu
grace period allows you to direct Tenable Nessus to allow for a specific
(in days) grace time in reporting when antivirus signatures are con-
sidered out of date. By default, Tenable Nessus considers
- 231-
signatures out of date regardless of how long ago an update
was available (for example, a few hours ago). You can con-
figure this setting to allow for up to 7 days before reporting
them out of date.
SMTP
Third party Tenable Nessus attempts to send spam through each SMTP device to the
domain address listed in this field. This third-party domain address must be outside
the range of the site Tenable Nessus is scanning or the site performing the
scan. Otherwise, the SMTP server might abort the test.
From The test messages sent to the SMTP server or servers appear as if they ori-
address ginated from the address specified in this field.
To address Tenable Nessus attempts to send messages addressed to the mail recipient lis-
ted in this field. The postmaster address is the default value since it is a valid
address on most mail servers.
- 232 -
Brute Force
The Brute Force section includes the following groups of settings:
l General Settings
l Oracle Database
l Hydra
Default
Setting Description
Value
General Settings
Only use cre- Enabled In some cases, Tenable Nessus can test default accounts
dentials and known default passwords. This can lock out an account
provided by the if too many consecutive invalid attempts trigger security
user protocols on the operating system or application. By
default, this setting is enabled to prevent Tenable Nessus
from performing these tests.
Oracle Database
Test default Disabled Test for known default accounts in Oracle software.
accounts (slow)
Hydra
Note: Hydra options only appear when Hydra is installed on the same computer as the scanner or
agent executing the scan.
Always enable Disabled Enables Hydra whenever Tenable Nessus performs the
Hydra (slow) scan.
Logins file A file that contains usernames that Hydra uses during the
scan.
Passwords file A file that contains passwords for user accounts that Hydra
uses during the scan.
- 233 -
Number of par- 16 The number of simultaneous Hydra tests that you want to
allel tasks execute. By default, this value is 16.
Try empty pass- Enabled If enabled, Hydra tries usernames without using a pass-
words word.
Stop brute for- Disabled If enabled, Hydra stops brute forcing user accounts after
cing after the the first time an account is successfully accessed.
first success
Add accounts Enabled If disabled, Tenable Nessus only uses the usernames spe-
found by other cified in the logins file for the scan. Otherwise, Tenable Nes-
plugins to the sus discovers more usernames using other plugins and
login file adds them to the logins file to use for the scan.
SAP R/ 3 Client The ID of the SAP R/ 3 client that you want Hydra to test.
ID (0 - 99)
Windows Local You can set this to Local accounts, Domain Accounts, or
accounts to accounts Either.
test
Cisco login You use this password to log in to a Cisco system before
password brute forcing enable passwords. If you do not enter a pass-
word here, Hydra attempts to log in using credentials that
were successfully brute forced earlier in the scan.
- 234 -
Web page to Enter a web page protected by HTTP basic or digest authen-
brute force tication. If you do not enter a web page here, Hydra
attempts to brute force a page discovered by the Tenable
Nessus web crawler that requires HTTP authentication.
- 235 -
SCADA
Default
Setting Description
Value
Modbus/ TCP Coil Access Modbus uses a function code of 1to read coils in a Modbus
server. Coils represent binary output settings and are typically
mapped to actuators. The ability to read coils may help an
attacker profile a system and identify ranges of registers to alter
via a write coil message.
ICCP/ COTP TSAP Address- The ICCP/ COTP TSAP Addressing menu determines a Con-
ing Weakness nection-Oriented Transport Protocol (COTP) Transport Service
Access Points (TSAP) value on an ICCP server by trying possible
values.
Stop COTP 8 Specifies the ending TSAP value to try. Tenable Nessus tries all
TSAP values between the Start and Stop.
- 236 -
Web Applications
By default, Tenable Nessus does not scan web applications. When you first access the Web Applic-
ation section, the Scan Web Applications setting appears and is Off. To modify the Web Application
settings listed on the following table, click the Off button. The rest of the settings appear.
l General Settings
l Web Crawler
General Settings
Use a custom Mozilla/ 4.0 (compatible; MSIE Specifies which type of browser Tenable
User-Agent 8.0; Windows NT 5.1; Nessus impersonates while scanning.
Trident/ 4.0)
Web Crawler
Start crawling / The URL of the first page that Tenable Nes-
from sus tests. If you want to test multiple
pages, use a colon delimiter to separate
them (for example, /:/php4:/base).
Excluded / server_privileges\ .php <> log Specifies portions of the web site to
pages (regex) out exclude from being crawled. For example,
to exclude the / manual directory and all
Perl CGI, set this field to: (^/ manual) <>
(\ .pl(\ ?.*)?$).
- 237 -
Setting Default Value Description
- 238 -
Setting Default Value Description
- 239 -
Setting Default Value Description
- 240 -
Setting Default Value Description
- 241-
Setting Default Value Description
URL for http:/ / rfi.nessus.org/ rfi.txt During Remote File Inclusion (RFI) testing,
Remote File this setting specifies a file on a remote
Inclusion host to use for tests. By default, Tenable
Nessus uses a safe file hosted by Tenable,
Inc. for RFI testing. If the scanner cannot
reach the internet, you can use an intern-
ally hosted file for more accurate RFI test-
ing.
- 242 -
Windows
The Windows section contains the following groups of settings:
l General Settings
Default
Setting Description
Value
General Settings
Request inform- Disabled If enabled, the sensor queries domain users instead of
ation about the local users. Enabling this setting allows plugins 10892 and
SMB Domain 10398 to run and plugins 72684 and 10907 to query domain
users.
You can enable as many of the user enumeration methods as appropriate for user discovery.
SAM Registry Enabled Tenable Nessus enumerates users via the Security
Account Manager (SAM) registry.
ADSI Query Enabled Tenable Nessus enumerates users via Active Directory Ser-
vice Interfaces (ADSI). To use ADSI, you must configure cre-
dentials under Credentials > Miscellaneous > ADSI.
WMI Query Enabled Tenable Nessus enumerates users via Windows Man-
agement Interface (WMI).
RID Brute For- Disabled Tenable Nessus enumerates users via relative identifier
cing (RID) brute forcing. Enabling this setting enables the Enu-
merate Domain Users and Enumerate Local User settings.
Start UID 1000 The beginning of a range of IDs where Tenable Nessus
attempts to enumerate domain users.
- 243 -
End UID 1200 The end of a range of IDs where Tenable Nessus attempts
to enumerate domain users.
Start UID 1000 The beginning of a range of IDs where Tenable Nessus
attempts to enumerate local users.
End UID 1200 The end of a range of IDs where Tenable Nessus attempts
to enumerate local users.
- 244 -
Malware
The Malware section contains the following groups of settings:
l General Settings
Default
Setting Description
Value
General Settings
Disable DNS res- Disabled Checking this option prevents Tenable Nessus from
olution using the cloud to compare scan findings against
known malware.
Custom Netstat IP None A text file that contains a list of known bad IP
Threat List addresses that you want to detect.
Provide your own list None You can upload any additional bad MD5 hashes via a
of known bad MD5 text file that contains one MD5 hash per line. Option-
hashes ally, you can include a description for a hash by adding
a comma after the hash, followed by the description. If
Tenable Nessus finds any matches while scanning a tar-
get, the description appears in the scan results. You
- 245 -
can use standard hash-delimited comments (for
example, #) in addition to the comma-separated com-
ments.
Provide your own list None You can upload any additional good MD5 hashes via a
of known good MD5 text file that contains one MD5 hash per line. It is pos-
hashes sible to (optionally) add a description for each hash in
the uploaded file. This is done by adding a comma
after the hash, followed by the description. If Tenable
Nessus finds any matches while scanning a target, and
a description was provided for the hash, the descrip-
tion appears in the scan results. You can use standard
hash-delimited comments (for example, #) in addition
to the comma-separated comments.
Hosts file allowlist None Tenable Nessus checks system hosts files for signs of
a compromise (for example, Plugin ID 23910 titled Com-
promised Windows System (hosts File Check). This
option allows you to upload a file containing a list of
IPs and hostnames that Tenable Nessus will ignore dur-
ing the scan. Include one IP and one hostname (format-
ted identically to your hosts file on the target) per line
in a regular text file.
Yara Rules
Yara Rules None A .yar file containing the YARA rules to be applied in
the scan. You can only upload one file per scan, so
include all rules in a single file. For more information,
see yara.readthedocs.io.
Scan file system Off Enabling this option allows you to scan system dir-
ectories and files on host computers.
- 246 -
Windows Directories
Scan User Profiles Off Enables file system scanning to scan user profiles.
Linux Directories
Scan $PATH Off Enable file system scanning to scan for $PATH loc-
ations.
MacOS Directories
Scan $PATH Off Enable file system scanning to scan $PATH locations.
Custom Directories
Custom Filescan Dir- None A custom file that lists directories to be scanned by
ectories malware file scanning. In the file, list each directory on
a new line. Tenable Nessus does not accept root dir-
ectories (such as C:\ or /) or variables (such as %Sys-
temroot%).
- 247 -
Databases
Default
Setting Description
Value
Oracle Database
Use Disabled When enabled, if at least one host credential and one
detected SIDs Oracle database credential are configured, the scanner
authenticates to scan targets using the host credentials,
and then attempts to detect Oracle System IDs (SIDs) loc-
ally. The scanner then attempts to authenticate using the
specified Oracle database credentials and the detected
SIDs.
- 248 -
Preconfigured Assessment Scan Settings
Certain Tenable-provided scanner templates include preconfigured assessment settings, described
in the following table. The preconfigured assessment settings are determined by both the template
and the Scan Type that you select.
Discovery
Host Discovery – –
Vulnerabilities
l Web Applications:
o Disable web application scan-
ning
l Web Applications:
o Start crawling from "/ "
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
o Test for known vul-
nerabilities in commonly
used web applications
o Generic web application
- 249 -
tests disabled
- 250 -
Scan for all web vul- l General Settings:
nerabilities (quick) o Avoid potential false alarms
o Enable CGI scanning
l Web Applications:
o Start crawling from "/ "
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
o Test for known vul-
nerabilities in commonly
used web applications
o Perform each generic web
app test for 5 minutes (max)
l Web Applications:
o Start crawling from "/ "
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
o Test for known vul-
nerabilities in commonly
used web applications
o Perform each generic web
app test for 10 minutes
(max)
- 251-
o Try all HTTP methods
o Attempt HTTP Parameter
Pollution
Advanced Scan – –
Advanced Dynamic – –
Scan
l Web Applications:
o Start crawling from "/ "
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
o Test for known vul-
nerabilities in commonly
used web applications
o Generic web application
tests disabled
l Web Applications:
- 252 -
o Start crawling from "/ "
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
o Test for known vul-
nerabilities in commonly
used web applications
o Perform each generic web
app test for 5 minutes (max)
l Web Applications:
o Start crawling from "/ "
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
o Test for known vul-
nerabilities in commonly
used web applications
o Perform each generic web
app test for 10 minutes
(max)
o Try all HTTP methods
o Attempt HTTP Parameter
Pollution
- 253 -
Credentialed Patch – Brute Force, Windows, and Malware
Audit defaults
Badlock Detection – –
DROWN Detection – –
l Web Applications
o Disable web application scan-
ning
l Web Applications
o Disable web application scan-
ning
l Web Applications
o Disable web application scan-
- 254 -
ning
Shadow Brokers – –
Scan
WannaCry Ransom- – –
ware
Compliance
l Web Applications:
o Disable web application scan-
ning
l Web Applications:
o Start crawling from "/ "
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
o Test for known vul-
nerabilities in commonly
used web applications
- 255 -
o Generic web application
tests disabled
l Web Applications:
o Start crawling from "/ "
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
o Test for known vul-
nerabilities in commonly
used web applications
o Perform each generic web
app test for 5 minutes (max)
l Web Applications:
o Start crawling from "/ "
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
o Test for known vul-
nerabilities in commonly
used web applications
o Perform each generic web
- 256 -
app test for 10 minutes
(max)
o Try all HTTP methods
o Attempt HTTP Parameter
Pollution
PCI Quarterly – –
External Scan
Policy Compliance – –
Auditing
- 257 -
Report Scan Settings
The Report scan settings include the following groups of settings:
l Processing
l Output
Default
Setting Description
Value
Processing
Override normal Disabled When disabled, provides the standard level of plugin activity
verbosity in the report. The output does not include the informational
plugins 56310, 64582, and 58651.
Hide results Enabled When enabled, the list of dependencies is not included in
from plugins ini- the report. If you want to include the list of dependencies in
tiated as a the report, disable this setting.
dependency
Output
- 258 -
Default
Setting Description
Value
Allow users to Enabled When enabled, allows users to delete items from the report.
edit scan res- When performing a scan for regulatory compliance or other
ults types of audits, disable the setting to show that the scan
was not tampered with.
Designate Disabled Uses the host name rather than IP address for report out-
hosts by their put.
DNS name
Display unreach- Disabled When enabled, hosts that did not reply to the ping request
able hosts are included in the security report as dead hosts. Do not
enable this option for large IP blocks.
Display Unicode Disabled When enabled, Unicode characters appear in plugin output
characters such as usernames, installed application names, and SSL
certificate information.
Note: If a scan is based on a policy, you cannot configure Advanced settings in the scan. You can only
modify these settings in the related policy.
The Advanced settings provide increased control over scan efficiency and the operations of a scan,
as well as the ability to enable plugin debugging.
- 259 -
If you select the Custom preconfigured setting option, or if you are using a Nessus Scanner tem-
plate that does not include preconfigured advanced settings, you can manually configure Advanced
settings in the following categories:
l General Settings
l Performance
l Debug Settings
Note: The following tables include settings for the Advanced Scan template. Depending on the template
you select, certain settings may not be available, and default values may vary.
General Settings
Enable Safe Enabled When enabled, disables all plugins that may have an
Checks adverse effect on the remote host.
- 260 -
Setting Default Value Description
Scan targets with Disabled When disabled, to avoid overwhelming a host, Tenable
multiple domain Nessus prevents against simultaneously scanning mul-
names in parallel tiple targets that resolve to a single IP address.
Instead, Tenable Nessus scanners serialize attempts to
scan the IP address, whether it appears more than
once in the same scan task or in multiple scan tasks on
that scanner. Scans may take longer to complete.
Performance
Slow down the Disabled When enabled, Tenable detects when it is sending too
scan when net- many packets and the network pipe is approaching
work congestion is capacity. If network congestion is detected, throttles
detected the scan to accommodate and alleviate the congestion.
- 261-
Setting Default Value Description
Network timeout 5 Specifies the time that Tenable waits for a response
(in seconds) from a host unless otherwise specified within a plugin.
If you are scanning over a slow connection, you may
want to set this to a higher number of seconds.
Max simultaneous 30, or the Ten- Specifies the maximum number of hosts that a scanner
hosts per scan able Nessus scans at the same time.
scanner
If you set Max simultaneous hosts per scan to more
advanced set-
than scanner’s max_hosts setting, Nessus caps Max
ting max_
simultaneous hosts per scan at the max_hosts value.
hosts value,
For example, if you set the Max simultaneous hosts per
whichever is
scan to 150 and scanner's max_hosts is set to 100, with
smaller.
more than 100 targets, Nessus scans 100 hosts sim-
ultaneously.
Max number of none Specifies the maximum number of established TCP ses-
concurrent TCP sions for a single host.
sessions per host
This TCP throttling option also controls the number of
packets per second the SYN scanner sends, which is 10
times the number of TCP sessions. For example, if this
option is set to 15, the SYN scanner sends 150 packets
per second at most.
Max number of none Specifies the maximum number of established TCP ses-
concurrent TCP sions the entire scan, regardless of the number of
sessions per scan hosts being scanned.
- 262 -
Setting Default Value Description
Exclude Filepath none A plain text file containing a list of filepaths to exclude
from all plugins that search using the find command
on Unix systems.
In the file, enter one filepath per line, formatted per pat-
terns allowed by the Unix find command -path argu-
ment. For more information, see the find command
man page.
Include Filepath none A plain text file containing a list of filepaths to include
from all plugins that search using the find command
on Unix systems.
In the file, enter one filepath per line, formatted per pat-
terns allowed by the Unix find command -path argu-
ment. For more information, see the find command
man page.
- 263 -
Setting Default Value Description
Windows Exclude none A plain text file containing a list of filepaths to exclude
Filepath from all plugins that search using Tenable's unmanaged
software directory scans.
Windows Include none A plain text file containing a list of filepaths to include
Filepath from all plugins that search using Tenable's unmanaged
software directory scans.
Debug Settings
Log scan details Disabled Logs the start and finish time for each plugin used dur-
ing a scan to nessusd.messages.
- 264 -
Setting Default Value Description
Enable plugin Disabled Attaches available debug logs from plugins to the vul-
debugging nerability output of this scan.
Audit Trail Verb- Default Controls verbosity of the plugin audit trail. All audit trail
osity data includes the reason why plugins were not included
in the scan.
Include the KB Default Controls whether to include the scan KB, which
includes more debugging data, in the scan results.
Maximum delay 0 (Agents 8.2 and later) If set, each agent in the agent
(minutes) group delays starting the scan for a random number of
minutes, up to the specified maximum. Staggered
starts can reduce the impact of agents that use a
shared resource, such as virtual machine CPU.
- 265 -
Setting Default Value Description
- 266 -
Preconfigured Advanced Scan Settings
Certain Tenable-provided Nessus Scanner templates include preconfigured advanced settings,
described in the following table. The preconfigured advanced settings are determined by both the
template and the Scan Type that you select.
Discovery
Vulnerabilities
- 267 -
Advanced Scan – All defaults
- 268 -
timeout
- 269 -
when network con-
gestion is detected
Compliance
- 270 -
o 2 simultaneous checks
per host (max)
o 15 second network read
timeout
o Slow down the scan
when network con-
gestion is detected
- 271-
Custom All defaults
- 272 -
width links o 2 simultaneous hosts
(max)
o 2 simultaneous checks
per host (max)
o 15 second network read
timeout
o Slow down the scan
when network con-
gestion is detected
- 273 -
Credentials
When you configure a scan or policy's Credentials, you can grant the Tenable Nessus scanner local
access to scan the target system without requiring an agent. This can facilitate scanning of a large
network to determine local exposures or compliance violations. As noted, some steps of policy cre-
ation may be optional. Once created, Tenable Nessus saves the policy with recommended settings.
Tenable Nessus has the ability to log into remote Linux hosts via Secure Shell (SSH); and with Win-
dows hosts, Tenable Nessus uses various Microsoft authentication technologies. Tenable Nessus
also uses the Simple Network Management Protocol (SNMP) to make version and information quer-
ies to routers and switches.
The scan or policy’s Credentials page allows you to configure the Tenable Nessus scanner to use
authentication credentials during scanning. Configuring credentials allows Tenable Nessus to per-
form a wider variety of checks that result in more accurate scan results.
There are several forms of authentication supported including but not limited to databases, SSH,
Windows, network devices, patch management servers, and various plaintext authentication pro-
tocols.
In addition to operating system credentials, Tenable Nessus supports other forms of local authen-
tication.
You can manage the following types of credentials in the Credentials section of the scan or policy:
l Cloud Services
l Database, which includes MongoDB, Oracle, MySQL, DB2, PostgreSQL, and SQL Server
l Miscellaneous services, which include VMware, Red Hat Enterprise Virtualization (RHEV), IBM
iSeries, Palo Alto Networks PAN-OS, and directory services (ADSI and X.509)
l Plaintext Authentication mechanisms including FTP, HTTP, POP3, and other services
- 274 -
Credentialed scans can perform any operation that a local user can perform. The level of scanning
depends on the privileges granted to the user account. The more privileges the scanner has via the
login account (for example, root or administrator access), the more thorough the scan results.
Note: Tenable Nessus opens several concurrent authenticated connections. Ensure that the host being
audited does not have a strict account lockout policy based on concurrent sessions.
If a scan contains multiple instances of one type of credential, Tenable Nessus tries the credentials
on each scan target in the order you added the credentials to the scan.
Note: Tenable Nessus uses the first credential that allows successful login to perform credentialed checks
on the target. After a credential allows a successful login, Tenable Nessus does not try any of the other cre-
dentials in the list, even if a different credential has greater privileges.
- 275 -
Cloud Services Credentials
Tenable Nessus supports Amazon Web Services (AWS), Microsoft Azure, Rackspace, and Sales-
force.com.
AWS
Users can select Amazon Web Service (AWS) from the Credentials menu and enter credentials for
compliance auditing an account in AWS.
Option Description
AWS Secret Key AWS secret key that provides the authentication for AWS Access Key
ID.
Regions to Rest of the For Tenable Nessus to audit an AWS account, you must define
access World the regions you want to scan. Per Amazon policy, you need dif-
ferent credentials to audit account configuration for the
China region than you need for the Rest of the World. Choos-
ing the Rest of the World opens the following choices:
l us-east-1
l us-east-2
l us-west-1
l us-west-2
l ca-central-1
l eu-west-1
l eu-west-2
- 276 -
l eu-central-1
l ap-northeast-1
l ap-northeast-2
l ap-southeast-1
l ap-southeast-2
l sa-east-1
l us-gov-west-1
Verify SSL Enabled Verify the validity of the SSL digital certificate.
Certificate
Microsoft Azure
Application ID The application ID (also known as client ID) for your Yes
registered application.
Client Secret The secret key for your registered application. Yes
- 277 -
Username The username required to log in to Microsoft Azure. Yes
Client ID The application ID (also known as client ID) for your Yes
registered application.
Rackspace
Option Description
Salesforce.com
Users can select Salesforce.com from the Credentials menu. This allows Tenable Nessus to log in to
Salesforce.com as the specified user to perform compliance audits.
Option Description
Database Credentials
The following topic describes the available Database credentials.
- 278 -
DB2
The following table describes the additional options to configure for IBM DB2 credentials.
Options Description
Auth Type The authentication method for providing the required credentials.
l Password
l Import
l CyberArk
l Lieberman
l Hashicorp Vault
For descriptions of the options for your selected authentication type, see
Database Credentials Authentication Types.
Database Port The TCP port that the IBM DB2 database instance listens on for com-
munications from Tenable Nessus Manager. The default is port 50000.
Database Name The name for your database (not the name of your instance).
Options Description
Port The TCP port that the Informix/ DRDA database instance listens on for com-
munications from Tenable Security Center. The default is port 1526.
- 279 -
MySQL
The following table describes the additional options to configure for MySQL credentials.
Options Description
Auth Type The authentication method for providing the required credentials.
l Password
l Import
l CyberArk
l Lieberman
l Hashicorp Vault
For descriptions of the options for your selected authentication type, see
Database Credentials Authentication Types.
Database Port The TCP port that the MySQL database instance listens on for com-
munications from Tenable Nessus Manager. The default is port 3306.
- 280 -
Oracle
The following table describes the additional options to configure for Oracle credentials.
Options Description
Auth Type The authentication method for providing the required credentials.
l Password
l Import
l CyberArk
l Lieberman
l Hashicorp Vault
Database Port The TCP port that the Oracle database instance listens on for com-
munications from Tenable Nessus Manager. The default is port 1521.
Auth Type The type of account you want Tenable Nessus Manager to use to access
the database instance:
l Normal
l System Operator
l SYSDBA
l SYSOPER
l NORMAL
Service Type The Oracle parameter you want to use to specify the database instance:
SID or Service NameSERVICE_NAME.
Service The SID value or SERVICE_NAME value for your database instance.
- 281-
Options Description
The Service value you enter must match your parameter selection for
the Service Type option.
- 282 -
PostgreSQL
The following table describes the additional options to configure for PostgreSQL credentials.
Options Description
Auth Type The authentication method for providing the required credentials.
l Password
l Client Certificate
l CyberArk
l Lieberman
l Hashicorp Vault
For descriptions of the options for your selected authentication type, see
Database Credentials Authentication Types.
Database Port The TCP port that the PostgreSQL database instance listens on for com-
munications from Tenable Nessus Manager. The default is port 5432.
- 283 -
SQL Server
The following table describes the additional options to configure for SQL Server credentials.
Options Description
Auth Type The authentication method for providing the required credentials.
l Password
l Import
l CyberArk
l Lieberman
l Hashicorp Vault
For descriptions of the options for your selected authentication type, see
Database Credentials Authentication Types.
Database Port The TCP port that the SQL Server database instance listens on for com-
munications from Tenable Nessus Manager. The default is port 1433.
AuthType The type of account you want Tenable Nessus Manager to use to access the
database instance: SQL or Windows.
Sybase ASE
The following table describes the additional options to configure for Sybase ASE credentials.
Options Description
Auth Type The authentication method for providing the required credentials.
l Password
- 284 -
Options Description
l CyberArk
l Lieberman
l Hashicorp Vault
For descriptions of the options for your selected authentication type, see
Database Credentials Authentication Types.
Database Port The TCP port that the Sybase ASE database instance listens on for com-
munications from Tenable Nessus Manager. The default is port 3638.
Auth Type The type of authentication used by the Sybase ASE database: RSA or Plain
Text.
Cassandra
Option Description
l CyberArk
l Lieberman
l Hashicorp Vault
For descriptions of the options for your selected authentication type, see Data-
base Credentials Authentication Types.
Port The port the database listens on. The default is port 9042.
MongoDB
- 285 -
Option Description
Auth Type The authentication method for providing the required credentials.
Note: This option is only available for non-legacy versions of the MongoDB authen-
tication method.
l Password
l Client Certificate
l CyberArk
l Lieberman
l Hashicorp Vault
For descriptions of the options for your selected authentication type, see
Database Credentials Authentication Types.
Port (Required) The TCP port that the MongoDB database instance listens on for
communications from Tenable Nessus Manager.
- 286 -
Client Certificate
The Client Certificate authentication type is supported for PostgreSQL databases only.
Client Certificate The file that contains the PEM certificate for the yes
database.
Client CA Certificate The file that contains the PEM certificate for the yes
database.
Client Certificate Priv- The file that contains the PEM private key for the yes
ate Key client certificate.
Client Certificate Priv- The passphrase for the private key, if required in no
ate Key Passphrase your authentication implementation.
- 287 -
Password
l SYSDBA
l SYSOPER
l NORMAL
l RSA
l Plain Text
- 288 -
Option Database Types Description Required
base instance.
l SID
l SERVICE_NAME
- 289 -
Import
Upload a .csv file with the credentials entered in the specified format. For descriptions of valid val-
ues to use for each item, see Database Credentials.
You must configure either CyberArk or HashiCorp credentials for a database credential in the same
scan so that Tenable Nessus can retrieve the credentials.
Note: Include the required data in the specified order, with commas between each value, without spaces.
For example, for Oracle with CyberArk: 192.0.2.255,1521,SID,service_id,username,SYSDBA,Cy-
berArk,Database-Oracle-SYS.
CyberArk
CyberArk is a popular enterprise password vault that helps you manage privileged credentials. Ten-
able Vulnerability Management can get credentials from CyberArk to use in a scan.
CyberArk Host The IP address or FQDN name for the CyberArk AIM yes
Web Service. This can be the host, or the host with
a custom URL added on in a single string.
- 290 -
Option Description Required
Client Certificate The file that contains the PEM certificate used to no
communicate with the CyberArk host.
Client Certificate Priv- The file that contains the PEM private key for the yes, if private
ate Key client certificate. key is applied
Client Certificate Priv- The passphrase for the private key, if required. yes, if private
ate Key Passphrase key is applied
- 291-
Option Description Required
Use SSL If enabled, the scanner uses SSL through IIS for no
secure communications. Enable this option if Cyber-
Ark is configured to support SSL through IIS.
Verify SSL Certificate If enabled, the scanner validates the SSL cer- no
tificate. Enable this option if CyberArk is con-
figured to support SSL through IIS and you want to
validate the certificate.
- 292 -
CyberArk (Legacy)
CyberArk is a popular enterprise password vault that helps you manage privileged credentials. Ten-
able Vulnerability Management can get credentials from CyberArk to use in a scan.
Database
Option Description Required
Types
Central Cre- All The port on which the CyberArk Central yes
dential Pro- Credential Provider is listening.
vider Port
CyberArk Cli- All The file that contains the PEM certificate no
- 293 -
Database
Option Description Required
Types
CyberArk Cli- All The file that contains the PEM private no
ent Certificate key for the client certificate.
Private Key
CyberArk All The AppId that has been allocated per- yes
AppId missions on the CyberArk Central Cre-
dential Provider to retrieve the target
password.
- 294 -
Database
Option Description Required
Types
Database Port All The port on which Tenable Nessus com- yes
municates with the database.
l Normal
l System Operator
l SYSDBA
l SYSOPER
l NORMAL
l RSA
l Plain Text
Instance Name SQL Server The name for your database instance. no
- 295 -
Database
Option Description Required
Types
l SID
l SERVICE_NAME
- 296 -
HashiCorp Vault
HashiCorp Vault is a popular enterprise password vault that helps you manage privileged cre-
dentials. Tenable Nessus can get credentials from HashiCorp Vault to use in a scan.
- 297 -
configured your App Role.
- 298 -
through IIS in Hashicorp
Vault before enabling this
option.
l SYSDBA
l SYSOPER
l NORMAL
l SID
l SERVICE_NAME
- 299 -
Lieberman
Lieberman is a popular enterprise password vault that helps you manage privileged credentials. Ten-
able Vulnerability Management can get credentials from Lieberman to use in a scan.
Lieberman user All The Lieberman explicit user for authen- yes
ticating to the Lieberman API.
Lieberman pass- All The password for the Lieberman expli- yes
word cit user.
Lieberman Client All The file that contains the PEM cer- no
Certificate tificate used to communicate with the
Lieberman host.
- 300 -
Option Database Type Description Required
Lieberman Client All The file that contains the PEM private no
Certificate Priv- key for the client certificate.
ate Key
- 301-
Option Database Type Description Required
Auth type Oracle (SQL Server, Oracle. and Sybase ASE yes
databases only)
SQL Server
SQL Server values include:
Sybase ASE
l Windows
l SQL
l SYSDBA
l SYSOPER
l NORMAL
l RSA
l Plain Text
Instance Name SQL Server The name for your database instance. no
l SID
l SERVICE_NAME
- 302 -
Host Credentials
Nessus supports the following forms of host authentication:
l SNMPv3
l Windows
- 303 -
SNMPv3
Users can select SNMPv3 settings from the Credentials menu and enter credentials for scanning
systems using an encrypted network management protocol.
Use these credentials to obtain local information from remote systems, including network devices,
for patch auditing or compliance checks.
There is a field for entering the SNMPv3 username for the account that performs the checks on the
target system, along with the SNMPv3 port, security level, authentication algorithm and password,
and privacy algorithm and password.
If Nessus is unable to determine the community string or password, it may not perform a full audit
of the service.
Note: You cannot configure SNMPv3 settings for the Basic Network Scan template.
Port The TCP port that SNMPv3 listens on for com- 161
munications from Tenable Nessus.
Privacy algorithm The encryption algorithm to use for SNMP traffic: AES
- 304 -
Option Description Default
AES or DES.
- 305 -
SSH
Use SSH credentials for host-based checks on Unix systems and supported network devices. Ten-
able Nessus uses these credentials to obtain local information from remote Unix systems for patch
auditing or compliance checks. Tenable Nessus uses Secure Shell (SSH) protocol version 2 based
programs (e.g., OpenSSH, Solaris SSH, etc.) for host-based checks.
Tenable Nessus encrypts the data to protect it from being viewed by sniffer programs.
Note: Non-privileged users with local access on Linux systems can determine basic security issues, such
as patch levels or entries in the /etc/passwd file. For more comprehensive information, such as system
configuration data or file permissions across the entire system, an account with root privileges is required.
Note: You can add up to 1000 SSH credentials in a single scan. For best performance, Tenable recom-
mends adding no more than 10 SSH credentials per scan.
See the following settings for the different SSH authentication methods:
There are four settings for SSH credentials that apply to all SSH Authentication methods.
Preferred 22 You can set this option to direct Tenable Nessus to connect
port to SSH if it is running on a port other than 22.
Client ver- OpenSSH_5.0 Specifies which type of SSH client Tenable Nessus imper-
sion sonates while scanning.
- 306 -
Option Default Value Description
least priv- enabled, Tenable Nessus attempts to run the scan with an
ilege account with lesser privileges, even if you enable the Elevate
privileges with option. If a command fails, Tenable Nessus
escalates privileges. Plugins 102095 and 102094 report which
plugins ran with or without escalated privileges.
Certificate
Option Description
Username Username of the account which is being used for authentication on the
host system.
CyberArk is a popular enterprise password vault that helps you manage privileged credentials. Ten-
able Nessus Manager can get credentials from CyberArk to use in a scan.
CyberArk Host The IP address or FQDN name for the CyberArk AIM yes
Web Service.
- 307 -
Option Description Required
Client Certificate The file that contains the PEM certificate used to no
communicate with the CyberArk host.
Client Certificate Priv- The file that contains the PEM private key for the yes, if private
ate Key client certificate. key is applied
Client Certificate Priv- The passphrase for the private key, if required. yes, if private
ate Key Passphrase key is applied
- 308 -
Option Description Required
Use SSL If enabled, the scanner uses SSL through IIS for no
secure communications. Enable this option if Cyber-
Ark is configured to support SSL through IIS.
Verify SSL Certificate If enabled, the scanner validates the SSL cer- no
tificate. Enable this option if CyberArk is con-
figured to support SSL through IIS and you want to
validate the certificate.
- 309 -
CyberArk (Legacy) (Tenable Nessus Manager only)
Option Description
CyberArk AIM The URL of the AIM service. By default, this field uses
Service URL /AIMWebservice/v1.1/AIM.asmx.
Central Cre- The CyberArk Central Credential Provider IP/ DNS address.
dential Provider
Host
Central Cre- The port on which the CyberArk Central Credential Provider is listening.
dential Provider
Port
Central Cre- If you configured the CyberArk Central Credential Provider to use basic
dential Provider authentication, you can fill in this field for authentication.
Username
Central Cre- If you configured the CyberArk Central Credential Provider to use basic
dential Provider authentication, you can fill in this field for authentication.
Password
Safe The safe on the CyberArk Central Credential Provider server that contained
the authentication information you would like to retrieve.
CyberArk Client The file that contains the PEM certificate used to communicate with the
Certificate CyberArk host.
CyberArk Client The file that contains the PEM private key for the client certificate.
Certificate Priv-
ate Key
CyberArk Client (Optional) The passphrase for the private key, if required.
Certificate Priv-
- 310 -
Option Description
AppId The AppId that has been allocated permissions on the CyberArk Central Cre-
dential Provider to retrieve the target password.
Folder The folder on the CyberArk Central Credential Provider server that contains
the authentication information you would like to retrieve.
PolicyId The PolicyID assigned to the credentials you would like to retrieve from the
CyberArk Central Credential Provider.
Use SSL If you configured the CyberArk Central Credential Provider to support SSL
through IIS, select this for secure communication.
Verify SSL Cer- Select this if you configured CyberArk Central Credential Provider to sup-
tificate port SSL through IIS and you want to validate the certificate. Refer to the
custom_CA.inc documentation for how to use self-signed certificates.
CyberArk The unique name of the credential you want to retrieve from CyberArk.
Account Details
Name
CyberArk Elev- The privilege escalation method you want to use to increase the user's priv-
ate Privileges ileges after initial authentication. Your selection determines the specific
With options you must configure.
Kerberos
Kerberos, developed by MIT’s Project Athena, is a client/ server application that uses a symmetric
key encryption protocol. In symmetric encryption, the key used to encrypt the data is the same as
the key used to decrypt the data. Organizations deploy a KDC (Key Distribution Center) that contains
all users and services that require Kerberos authentication. Users authenticate to Kerberos by
requesting a TGT (Ticket Granting Ticket). Once you grant a user a TGT, the user can use it to
request service tickets from the KDC to be able to utilize other Kerberos based services. Kerberos
- 311-
uses the CBC (Cipher Block Chain) DES encryption protocol to encrypt all communications.
Note: You must already have a Kerberos environment established to use this method of authentication.
The Tenable Nessus implementation of Linux-based Kerberos authentication for SSH supports the
aes-cbc and aes-ctr encryption algorithms. An overview of how Tenable Nessus interacts with Ker-
beros is as follows:
l nessusd is logged in
In both Windows and SSH credentials settings, you can specify credentials using Kerberos keys
from a remote system. There are differences in the configurations for Windows and SSH.
Option Description
Key Dis- This host supplies the session tickets for the user.
tribution
Center (KDC)
KDC Port You can set this option to direct Tenable Nessus to connect to the KDC if it
is running on a port other than 88.
KDC Transport The KDC uses TCP by default in Linux implementations. For UDP, change
this option. If you need to change the KDC Transport value, you may also
need to change the port as the KDC UDP uses either port 88 or 750 by
default, depending on the implementation.
- 312 -
Option Description
Realm The Realm is the authentication domain, usually noted as the domain name
of the target (for example, example.com).
If Kerberos is used, you must configure sshd with Kerberos support to verify the ticket with the
KDC. You must configure reverse DNS lookups properly for this to work. The Kerberos interaction
method must be gssapi-with-mic.
Password
Option Description
Custom pass- The password prompt used by the target host. Only use this setting when an
word prompt interactive SSH session fails due to Tenable Vulnerability Management receiv-
ing an unrecognized password prompt on the target host's interactive SSH
shell.
Public Key
Public Key Encryption, also referred to as asymmetric key encryption, provides a more secure
authentication mechanism by the use of a public and private key pair. In asymmetric cryptography,
Tenable Nessus uses the public key to encrypt data and Tenable Nessus uses the private key to
decrypt it. The use of public and private keys is a more secure and flexible method for SSH authen-
tication. Tenable Nessus supports both DSA and RSA key formats.
Like Public Key Encryption, Tenable Nessus supports RSA and DSA OpenSSH certificates. Tenable
Nessus also requires the user certificate, which is signed by a Certificate Authority (CA), and the
user’s private key.
- 313 -
Note: Tenable Nessus supports the openssh SSH public key format (pre-7.8 OpenSSH). Tenable Nessus
does not support the new OPENSSH format (OpenSSH versions 7.8+). To check which version you have,
check your private key contents. openssh shows -----BEGIN RSA PRIVATE KEY----- or -----BEGIN DSA
PRIVATE KEY-----, and the new, incompatible OPENSSH shows -----BEGIN OPENSSH PRIVATE KEY-----. You
must convert non-openssh formats, including PuTTY and SSH Communications Security, to the openssh
public key format.
The most effective credentialed scans are when the supplied credentials have root privileges. Since
many sites do not permit a remote login as root, Tenable Nessus can invoke su, sudo, su+sudo,
dzdo, .k5login, or pbrun with a separate password for an account that you set up to have su or sudo
privileges. In addition, Tenable Nessus can escalate privileges on Cisco devices by selecting Cisco
‘enable’ or .k5login for Kerberos logins.
Note: Tenable Nessus supports the blowfish-cbc, aes-cbc, and aes-ctr cipher algorithms. Some com-
mercial variants of SSH do not have support for the blowfish algorithm, possibly for export reasons. It is
also possible to configure an SSH server to accept certain types of encryption only. Check your SSH server
to ensure that it supports the correct algorithm.
Tenable Nessus encrypts all passwords stored in policies. However, Tenable recommends using
SSH keys for authentication rather than SSH passwords. This helps ensure that someone does not
use the same username and password you are using to audit your known SSH servers to attempt a
log into a system that may not be under your control.
Note: For supported network devices, Tenable Nessus only supports the network device’s username and
password for SSH connections.
If you have to use an account other than root for privilege escalation, you can specify it under the
Escalation account with the Escalation password.
Option Description
Username Username of the account which is being used for authentication on the
host system.
- 314 -
Option Description
Username The username that is used to authenticate via ssh to the system.
(required)
Domain Set the domain the username is part of if using Windows credentials.
Thycotic Secret This is the value to store the secret as on the Thycotic server. It is referred
Name (required) to as the “Secret Name” on the Thycotic server.
Thycotic Secret Use this option to set the transfer method, target, and target directory for
Server URL the scanner. You can find this value in Admin > Configuration > Application
(required) Settings > Secret Server URL on the Thycotic server. For example consider
the following address https:/ / pw.mydomain.com/ SecretServer/ . We parse
this to know that HTTPS defines it is a ssl connection, pw.mydomain.com is
the target address, / SecretServer/ is the root directory.
Thycotic Pass- The password associated with the Thycotic Login Name.
word (required)
Thycotic Organ- Use this value in cloud instances of Thycotic to define which organization
ization your query should hit.
(required)
Thycotic This is an optional value set if you set the domain value for the Thycotic
Domain server.
(optional)
Private Key Use key based authentication for SSH connections instead of password.
(optional)
- 315 -
Verify SSL Cer- Verify if the SSL Certificate on the server is signed by a trusted CA.
tificate
Thycotic elev- The privilege escalation method you want to use to increase the user's priv-
ate privileges ileges after initial authentication. Tenable Nessus supports multiple options
with for privilege escalation, including su, su+sudo and sudo. Your selection
determines the specific options you must configure.
Username (Required) The username to log in to the hosts you want to scan.
Checkout dur- (Required) The length of time, in minutes, that you want to keep credentials
ation checked out in BeyondTrust. Configure the Checkout duration to exceed
the typical duration of your Tenable Nessus scans. If a password from a pre-
vious scan is still checked out when a new scan begins, the new scan fails.
Use SSL If enabled, Tenable Nessus uses SSL through IIS for secure com-
munications. You must configure SSL through IIS in BeyondTrust before
enabling this option.
Verify SSL cer- If enabled, Tenable Nessus validates the SSL certificate. You must con-
tificate figure SSL through IIS in BeyondTrust before enabling this option.
- 316 -
Use private key If enabled, Tenable Nessus uses private key-based authentication for SSH
connections instead of password authentication. If it fails, Tenable Nessus
requests the password.
Use privilege If enabled, BeyondTrust uses the configured privilege escalation command.
escalation If it returns something, it uses it for the scan.
Lieberman user The Lieberman explicit user for authenticating to the yes
Lieberman RED API.
Lieberman pass- The password for the Lieberman explicit user. yes
word
Lieberman Client The file that contains the PEM certificate used to com- no
Certificate municate with the Lieberman host.
- 317 -
Option Description Required
Note: If you use this option, you do not have to enter inform-
ation in the Lieberman user, Lieberman password, and
Lieberman Authenticator fields.
Lieberman Client The file that contains the PEM private key for the client no
Certificate Priv- certificate.
ate Key
Verify SSL Cer- If Lieberman is configured to support SSL through IIS and no
tificate you want to validate the certificate, check this option.
Refer to Custom CA documentation for how to use self-
signed certificates.
System Name In the rare case your organization uses one default Lieber- no
man entry for all managed systems, enter the default
entry name.
Custom pass- The password prompt used by the target host. Only use no
word prompt this setting when an interactive SSH session fails due to
Tenable Nessus receiving an unrecognized password
prompt on the target host's interactive SSH shell.
WALLIX Host The IP address for the WALLIX Bastion host. yes
WALLIX Port The port on which the WALLIX Bastion API com- yes
- 318 -
Option Description Required
WALLIX User Your WALLIX Bastion user interface login user- yes
name.
WALLIX Password Your WALLIX Bastion user interface login pass- yes
word. Used for Basic authentication to the API.
WALLIX API Key The API key generated in the WALLIX Bastion yes
user interface. Used for API Key authentication
to the API.
Get Credential by The account name associated with a Device you Required only if
Device Account Name want to log in to the target systems with. you have a tar-
get and/ or
Note: If your device has more than one account device with mul-
you must enter the specific device name for the
account you want to retrieve credentials for. Fail-
tiple accounts.
ure to do this may result in credentials for the
wrong account returned by the system.
Elevate privileges with This enables WALLIX Bastion Privileged Access Required if you
Management (PAM). Use the drop-down menu to wish to escalate
- 319 -
Option Description Required
l SYSDBA
l SYSOPER
l NORMAL
- 320 -
Option Description Required
Hashicorp Vault (Required) The port on which Hashicorp Vault listens. yes
port
Hashicorp Vault API The URL Tenable Nessus Manager uses to access yes
URL Hashicorp Vault.
- 321-
Role Secret ID Required if you select App Role for Authentication yes
Type. The GUID generated by Hashicorp Vault when
you configured your App Role.
Authentication URL The URL Tenable Nessus Manager uses to access yes
Hashicorp Vault.
KV Engine URL The URL Tenable Nessus Manager uses to access the yes
Hashicorp Vault secrets engine.
Username Key The name in Hashicorp Vault that usernames are yes
stored under.
Password Key The key in Hashicorp Vault that passwords are stored yes
under.
Secret Name The key secret you want to retrieve values for. yes
Enable for Enables/ disables IBM DataPower Gateway use with yes
Hashicorp Vault Hashicorp Vault.
- 322 -
Note: Tenable supports multiple options for privilege escalate priv-
escalation, including su, su+sudo and sudo. For ileges.
example, if you select sudo, more fields for sudo user,
Escalation Account Name, and Location of sudo (dir-
ectory) are provided and can be completed to support
authentication and privilege escalation through
Hashicorp Vault.
- 323 -
Option Default Value
URL
Username (Required) The username to log in to the hosts you want to scan.
Checkout Dur- The length of time, in minutes, that you want to keep credentials checked
ation out in Centrify.
Use SSL When enabled, Tenable Nessus Manager uses SSL through IIS for secure
communications. You must configure SSL through IIS in Centrify before
enabling this option.
Verify SSL When enabled, Tenable Nessus Manager validates the SSL certificate.
You must configure SSL through IIS in Centrify before enabling this
option.
- 324 -
Option Default Value
Authentication URL The URL Tenable Nessus Manager uses to access Arcon.
Password Engine URL The URL Tenable Nessus Manager uses to access the pass-
words in Arcon.
Checkout Duration (Required) The length of time, in hours, that you want to
keep credentials checked out in Arcon.
Use SSL When enabled, Tenable Nessus Manager uses SSL through
IIS for secure communications. You must configure SSL
through IIS in Arcon before enabling this option.
Verify SSL When enabled, Tenable Nessus Manager validates the SSL
certificate. You must configure SSL through IIS in Arcon
before enabling this option.
Windows
The Windows credentials menu item has settings to provide Nessus with information such as SMB
account name, password, and domain name. By default, you can specify a username, password, and
domain with which to log in to Windows hosts. Also, Nessus supports several different types of
authentication methods for Windows-based systems.
- 325 -
l The Lanman authentication method was prevalent on Windows NT and early Windows 2000
server deployments. It is retained for backward compatibility.
l The NTLM authentication method, introduced with Windows NT, provided improved security
over Lanman authentication. The enhanced version, NTLMv2, is cryptographically more secure
than NTLM and is the default authentication method chosen by Nessus when attempting to
log into a Windows server. NTLMv2 can use SMB Signing.
l SMB signing is a cryptographic checksum applied to all SMB traffic to and from a Windows
server. Many system administrators enable this feature on their servers to ensure that remote
users are 100% authenticated and part of a domain. In addition, make sure you enforce a
policy that mandates the use of strong passwords that cannot be easily broken via dictionary
attacks from tools like John the Ripper and L0phtCrack. It is automatically used by Nessus if
the remote Windows server requires it. There have been many different types of attacks
against Windows security to illicit hashes from computers for re-use in attacking servers.
SMB Signing adds a layer of security to prevent these man-in-the-middle attacks.
l The SPNEGO(Simple and Protected Negotiate) protocol provides Single Sign On (SSO) cap-
ability from a Windows client to various protected resources via the users’ Windows login cre-
dentials. Nessus supports use of SPNEGOScans and Policies: Scans 54 of 151with either
NTLMSSP with LMv2 authentication or Kerberos and RC4 encryption. SPNEGOauthentication
happens through NTLM or Kerberos authentication; nothing needs to be configured in the Nes-
sus policy.
l If an extended security scheme (such as Kerberos or SPNEGO) is not supported or fails, Nes-
sus attempts to log in via NTLMSSP/ LMv2 authentication. If that fails, Nessus then attempts
to log in using NTLM authentication.
l Nessus also supports the use of Kerberos authentication in a Windows domain. To configure
this, the IP address of the Kerberos Domain Controller (actually, the IP address of the Win-
dows Active Directory Server) must be provided.
Server Message Block (SMB) is a file-sharing protocol that allows computers to share information
across the network. Providing this information to Nessus allows it to find local information from a
remote Windows host. For example, using credentials enables Nessus to determine if important
security patches have been applied. It is not necessary to modify other SMB parameters from
default settings.
- 326 -
The SMB domain setting is optional and Nessus is able to log on with domain credentials without
this setting. The username, password, and optional domain refer to an account that the target
machine is aware of. For example, given a username of joesmith and a password of my4x4mpl3, a
Windows server first looks for this username in the local system’s list of users, and then determines
if it is part of a domain.
Regardless of credentials used, Nessus always attempts to log into a Windows server with the fol-
lowing combinations:
The actual domain name is only required if an account name is different on the domain from that on
the computer. It is entirely possible to have an Administrator account on a Windows server and
within the domain. In this case, to log on to the local server, use the username of Administrator with
the password of that account. To log on to the domain, use the Administrator username with the
domain password and the name of the domain.
When multiple SMB accounts are configured, Nessus tries to log in with the supplied credentials
sequentially. Once Nessus is able to authenticate with a set of credentials, it checks subsequent
credentials supplied, but only use them if administrative privileges are granted when previous
accounts provided user access.
Some versions of Windows allow you to create a new account and designate it as an administrator.
These accounts are not always suitable for performing credentialed scans. Tenable recommends
that the original administrative account, named Administrator be used for credentialed scanning to
ensure full access is permitted. On some versions of Windows, this account may be hidden. The real
administrator account can be unhidden by running a DOS prompt with administrative privileges and
typing the following command:
If an SMB account is created with limited administrator privileges, Nessus can easily and securely
scan multiple domains. Tenable recommends that network administrators consider creating spe-
cific domain accounts to facilitate testing. Nessus includes various security checks for Windows 10,
11, Windows Server 2012, Server 2012 R2, Server 2016, Server 2019, and Server 2022 that are more
- 327 -
accurate if you provide a domain account. Nessus attempts to try several checks if no account is
provided.
Note: The Windows Remote Registry service allows remote computers with credentials to
access the registry of the computer being audited. If the service is not running, reading keys
and values from the registry is not possible, even with full credentials. This service must be star-
ted for a Nessus credentialed scan to fully audit a system using credentials.
For more information, see the Tenable blog post.
Credentialed scans on Windows systems require that you use a full administrator level account.
Several bulletins and software updates by Microsoft have made reading the registry to determine
software patch level unreliable without administrator privileges, but not all of them. Nessus plugins
check that the provided credentials have full administrative access to ensure they execute properly.
For example, full administrative access is required to perform direct reading of the file system. This
allows Nessus to attach to a computer and perform direct file analysis to determine the true patch
level of the systems being evaluated.
- 328 -
Authentication Methods
Never send cre- Enabled For security reasons, Windows credentials are not sent in
dentials in the the clear by default.
clear
Start the Remote Disabled This option tells Nessus to start the Remote Registry ser-
Registry service vice on computers being scanned if it is not running. This
during the scan service must be running for Nessus to execute some Win-
dows local check plugins.
Enable admin- Disabled This option allows Nessus to access the ADMIN$ and C$
istrative shares administrative shares, which can be read with admin-
during the scan istrator privileges.
- 329 -
Option Default Description
Start the Server Disabled When enabled, the scanner temporarily enables the Win-
service during the dows Server service, which allows the computer to share
scan files and other devices on a network. The service is dis-
abled after the scan completes.
CyberArk is a popular enterprise password vault that helps you manage privileged credentials. Nes-
sus Manager can get credentials from CyberArk to use in a scan.
CyberArk Host The IP address or FQDN name for the CyberArk AIM yes
Web Service. This can be the host, or the host with
a custom URL added on in a single string.
Client Certificate The file that contains the PEM certificate used to no
communicate with the CyberArk host.
- 330 -
Option Description Required
Client Certificate Priv- The file that contains the PEM private key for the yes, if private
ate Key client certificate. key is applied
Client Certificate Priv- The passphrase for the private key, if required. yes, if private
ate Key Passphrase key is applied
- 331-
Option Description Required
Use SSL If enabled, the scanner uses SSL through IIS for no
secure communications. Enable this option if Cyber-
Ark is configured to support SSL through IIS.
Verify SSL Certificate If enabled, the scanner validates the SSL cer- no
tificate. Enable this option if CyberArk is con-
figured to support SSL through IIS and you want to
validate the certificate.
CyberArk is a popular enterprise password vault that helps you manage privileged credentials. Nes-
sus Manager can get credentials from CyberArk to use in a scan.
Option Description
- 332 -
Option Description
CyberArk AIM The URL of the AIM service. By default, this setting uses
Service URL /AIMWebservice/v1.1/AIM.asmx.
Central Cre- The CyberArk Central Credential Provider IP/ DNS address.
dential Provider
Host
Central Cre- The port on which the CyberArk Central Credential Provider is listening.
dential Provider
Port
Central Cre- If the CyberArk Central Credential Provider is configured to use basic
dential Provider authentication, you can fill in this setting for authentication.
Username
Central Cre- If the CyberArk Central Credential Provider is configured to use basic
dential Provider authentication, you can fill in this setting for authentication.
Password
Safe The safe on the CyberArk Central Credential Provider server that contained
the authentication information you would like to retrieve.
CyberArk Client The file that contains the PEM certificate used to communicate with the
Certificate CyberArk host.
CyberArk Client The file that contains the PEM private key for the client certificate.
Certificate Priv-
ate Key
AppId The AppId that has been allocated permissions on the CyberArk Central Cre-
dential Provider to retrieve the target password.
- 333 -
Option Description
Folder The folder on the CyberArk Central Credential Provider server that contains
the authentication information you would like to retrieve.
PolicyId The PolicyID assigned to the credentials you would like to retrieve from the
CyberArk Central Credential Provider.
Verify SSL Cer- If CyberArk Central Credential Provider is configured to support SSL
tificate through IIS and you want to validate the certificate check this. Refer to cus-
tom_CA.inc documentation for how to use self-signed certificates.
CyberArk The unique name of the credential you want to retrieve from CyberArk.
Account Details
Name
Kerberos
Password none Like with other credentials methods, this is the user pass-
word on the target system. This is a required setting.
Key Dis- none This host supplies the session tickets for the user. This is a
tribution required setting.
Center (KDC)
KDC Port 88 You can configure this setting to direct Nessus to connect to
the KDC if it is running on a port other than 88.
KDC Transport TCP If you need to change the KDC Transport value, you may also
need to change the port as the KDC UDP uses either port 88
or 750 by default, depending on the implementation.
Domain none The Windows domain that the KDC administers. This is a
required setting.
- 334 -
LM Hash
Option Description
NTLM Hash
Option Description
Thycotic Secret (Required) The Secret Name value on the Thycotic server.
Name
Thycotic Secret (Required) The value you want Tenable Nessus to use when setting the
Server URL transfer method, target, and target directory for the scanner. Find the value
on the Thycotic server, in Admin > Configuration > Application Settings >
Secret Server URL.
- 335 -
Option Default Value
Thycotic Login (Required) The username for a user on the Thycotic server.
Name
Thycotic Pass- (Required) The password associated with the Thycotic Login Name you
word provided.
Thycotic Organ- In cloud instances of Thycotic, the value that identifies which organization
ization the Tenable Nessus query should target.
Private Key If enabled, Tenable Nessus uses key-based authentication for SSH con-
nections instead of password authentication.
Verify SSL Cer- If enabled, Tenable Nessus verifies the SSL Certificate on the Thycotic
tificate server.
For more information about using self-signed certificates, see Custom SSL
Server Certificates.
Username (Required) The username to log in to the hosts you want to scan.
Checkout dur- (Required) The length of time, in minutes, that you want to keep credentials
- 336 -
Option Default Value
Use SSL If enabled, Nessus uses SSL through IIS for secure communications. You
must configure SSL through IIS in BeyondTrust before enabling this option.
Verify SSL cer- If enabled, Nessus validates the SSL certificate. You must configure SSL
tificate through IIS in BeyondTrust before enabling this option.
Use private key If enabled, Nessus uses private key-based authentication for SSH con-
nections instead of password authentication. If it fails, the password is
requested.
Use privilege If enabled, BeyondTrust uses the configured privilege escalation command.
escalation If it returns something, it uses it for the scan.
- 337 -
Option Description Required
Lieberman Client Certificate The file that contains the PEM certificate no
used to communicate with the Lieberman
host.
Lieberman Client Certificate The file that contains the PEM private key no
Private Key for the client certificate.
- 338 -
Option Description Required
WALLIX Host The IP address for the WALLIX Bastion host. yes
WALLIX Port The port on which the WALLIX Bastion API com- yes
municates. By default, Tenable uses 443.
WALLIX User Your WALLIX Bastion user interface login user- yes
name.
WALLIX Password Your WALLIX Bastion user interface login pass- yes
word. Used for Basic authentication to the API.
WALLIX API Key The API key generated in the WALLIX Bastion yes
user interface. Used for API Key authentication
to the API.
Get Credential by The account name associated with a Device you Required only if
Device Account Name want to log in to the target systems with.
- 339 -
Option Description Required
Note: If your device has more than one account you have a tar-
you must enter the specific device name for the get and/ or
account you want to retrieve credentials for. Fail- device with mul-
ure to do this may result in credentials for the
tiple accounts.
wrong account returned by the system.
Elevate privileges with This enables WALLIX Bastion Privileged Access Required if you
Management (PAM). Use the drop-down menu to wish to escalate
select the privilege elevation method. To bypass privileges.
this function, leave this field set to Nothing.
- 340 -
Option Description Required
l SYSDBA
l SYSOPER
l NORMAL
Hashicorp Vault host (Required) The Hashicorp Vault IP address or DNS yes
address.
Hashicorp Vault port The port on which Hashicorp Vault listens. yes
- 341-
Option Default Value Required
Role Secret ID Required if you select App Role for Authentication yes
Type. The GUID generated by Hashicorp Vault when
you configured your App Role.
Authentication URL The URL Tenable Nessus Manager uses to access yes
Hashicorp Vault.
KV Engine URL The URL Tenable Nessus Manager uses to access yes
the Hashicorp Vault secrets engine.
Username Key The name in Hashicorp Vault that usernames are yes
stored under.
Password Key The key in Hashicorp Vault that passwords are yes
stored under.
Secret Name (Required) The key secret you want to retrieve val- yes
ues for.
- 342 -
Option Default Value Required
Username (Required) The username to log in to the hosts you want to scan.
Checkout Dur- The length of time, in minutes, that you want to keep credentials checked
ation out in Centrify.
- 343 -
Option Default Value
Use SSL When enabled, Tenable Nessus Manager uses SSL through IIS for secure
communications. You must configure SSL through IIS in Centrify before
enabling this option.
Verify SSL When enabled, Tenable Nessus Manager validates the SSL certificate.
You must configure SSL through IIS in Centrify before enabling this
option.
Authentication URL The URL Tenable Nessus Manager uses to access Arcon.
Password Engine URL The URL Tenable Nessus Manager uses to access the pass-
words in Arcon.
- 344 -
Option Default Value
scan.
Checkout Duration (Required) The length of time, in hours, that you want to
keep credentials checked out in Arcon.
Use SSL When enabled, Tenable Nessus Manager uses SSL through
IIS for secure communications. You must configure SSL
through IIS in Arcon before enabling this option.
Verify SSL When enabled, Tenable Nessus Manager validates the SSL
certificate. You must configure SSL through IIS in Arcon
before enabling this option.
- 345 -
Miscellaneous Credentials
This section includes information and settings for credentials in the Miscellaneous section.
ADSI
ADSI requires the domain controller information, domain, and domain admin and password.
ADSI allows Tenable Nessus to query an ActiveSync server to determine if any Android or iOS-based
devices are connected. Using the credentials and server information, Tenable Nessus authenticates
to the domain controller (not the Exchange server) to directly query it for device information. These
settings are required for mobile device scanning and Active Directory Starter Scans.
Tenable Nessus supports obtaining the mobile information from Exchange Server 2010 and 2013
only.
Domain Con- (Required) The name of the domain controller for Act- -
troller iveSync.
Nessus supports obtaining the mobile information from Exchange Server 2010 and 2013 only; Nes-
sus cannot retrieve information from Exchange Server 2007.
F5
Port (Required) The TCP port that F5 listens on for com- 443
- 346 -
munications from Tenable Nessus.
HTTPS When enabled, Tenable Nessus connects using secure com- enabled
munication (HTTPS).
Verify SSL When enabled, Tenable Nessus verifies that the enabled
Certificate SSL certificate on the server is signed by a trusted CA.
IBM iSeries
Username (Required) The username for the IBM iSeries account that Ten- -
able Nessus uses to perform checks on the target system.
Netapp API
Username (Required) The username for the Netapp API account with -
HTTPS access that Tenable Nessus uses to perform checks on
the target system.
To limit the audit to a single vFiler, type the name of the vFiler.
Port (Required) The TCP port that Netapp API listens on for com- 443
munications from Tenable Nessus.
- 347 -
Nutanix Prism
Nutanix Port (Required) The TCP port that the Nutanix Prism Cen- 9440
tral host listens on for communications from Ten-
able.
Discover Host This option adds any discovered Nutanix Prism Cen- -
tral hosts to the scan targets to be scanned.
Discover Virtual This option adds any discovered Nutanix Prism Cen- -
Machines tral Virtual Machines to the scan targets to be
scanned.
Verify SSL Certificate When enabled, Tenable Nessus verifies that the enabled
SSL certificate on the server is signed by a trusted
CA.
OpenStack
- 348 -
Option Description Default
Tenant Name for (Required) The name of the specific tenant the scan uses admin
Authentication to authenticate.
Port (Required) The TCP port that OpenStack listens on for 443
communications from Tenable Nessus.
Verify SSL Cer- When enabled, Tenable Nessus verifies that the enabled
tificate SSL certificate on the server is signed by a trusted CA.
Username (Required) The username for the PAN-OS account that Ten- -
able Nessus uses to perform checks on the target system.
Port (Required) The TCP port that PAN-OS listens on for com- 443
munications from Tenable Nessus.
HTTPS When enabled, Tenable Nessus connects using secure com- enabled
munication (HTTPS).
- 349 -
When disabled, Tenable Nessus connects using
standard HTTP.
Verify SSL When enabled, Tenable Nessus verifies that the enabled
Certificate SSL certificate on the server is signed by a trusted CA.
Username (Required) The username for RHEV account that Tenable Nes- -
sus uses to perform checks on the target system.
Port (Required) The TCP port that the RHEV server listens on for 443
communications from Tenable Nessus.
Verify SSL When enabled, Tenable Nessus verifies that the enabled
Certificate SSL certificate on the server is signed by a trusted CA.
Access to VMware servers is available through its native SOAP API. VMware ESX SOAP API allows
you to access the ESX and ESXi servers via username and password. Also, you have the option of
not enabling SSL certificate verification:
For more information on configuring VMWare ESX SOAP API, see Configure vSphere Scanning.
Tenable Nessus can access VMware servers through the native VMware SOAP API.
Username (Required) The username for the ESXi server account that -
Tenable Nessus uses to perform checks on the target sys-
- 350 -
Option Description Default
tem.
Do not verify Do not validate the SSL certificate for the ESXi server. disabled
SSL Cer-
tificate
For more information on configuring VMWare vCenter SOAP API, see Configure vSphere Scanning.
Tenable Nessus can access vCenter through the native VMware vCenter SOAP API. If available, Ten-
able Nessus uses the vCenter REST API to collect data in addition to the SOAP API.
(missing or bad snippet)
vCenter Port (Required) The TCP port that vCenter listens on for com- 443
munications from Tenable Nessus.
Verify SSL Cer- When enabled, Tenable Nessus verifies that the enabled
tificate SSL certificate on the server is signed by a trusted CA.
- 351-
Option Description Default
Auto Discover Man- This option adds any discovered VMware ESXi hypervisor not
aged VMware ESXi hosts to the scan targets you include in your scan. enabled
Hosts
Auto Discover Man- This option adds any discovered VMware ESXi hypervisor not
aged VMware ESXi virtual machines to the scan targets you include in your enabled
Virtual Machines scan.
X.509
Password for key (Required) The passphrase for the client private key. -
- 352 -
Mobile Credentials
AirWatch
Option Description
AirWatch Environment API URL The URL of the SOAP or REST API.
(required)
API Keys (required) The API Key for the Airwatch REST API.
Verify SSL Certificate Verify whether the SSL Certificate on the server is signed
by a trusted CA.
Option Description
Server (required) The server URL to authenticate with Apple Profile Manager.
Port Set to use a different port to authenticate with Apple Profile Man-
ager.
Verify SSL Certificate Verify whether the SSL Certificate on the server is signed by a
trusted CA.
- 353 -
Force device updates Force devices to update with Apple Profile Manager immediately.
Device update timeout Number of minutes to wait for devices to reconnect with Apple
(minutes) Profile Manager
Good MDM
Option Description
Port (required) Set the port to use to authenticate with Good MDM.
Verify SSL Cer- Verify whether the SSL Certificate on the server is signed by a trusted
tificate CA.
MaaS360
Option Description
- 354 -
(required)
Collect All When enabled, the scan collects all data types.
Device Data
When disabled, the scan collects one or more types of data to decrease the
scan time. When disabled, choose one or more of the following collection
options:
MobileIron
Option Description
VSP Admin The server URL Tenable Nessus uses to authenticate to the MobileIron admin-
Portal URL istrator portal.
VSP Admin (Optional) The port Tenable Nessus uses to authenticate to the MobileIron
Portal Port administrator portal (typically, port 443 or 8443). The system assumes port
443 by default.
Port (Optional) The port Tenable Nessus uses to authenticate to MobileIron (typ-
ically, port 443).
Username The username for the account you want Tenable Nessus to use to authen-
ticate to MobileIron.
- 355 -
Password The password for the account you want Tenable Nessus to use to authen-
ticate to MobileIron.
Verify SSL Cer- When enabled, Tenable Nessus verifies that the SSL Certificate on the server
tificate is signed by a trusted CA.
VMware Work- The SOAP URL or REST API URL you -- Yes
space One Envir- want to use to authenticate with VMware
onment API URL Workspace One.
API Key The API key for the VMware Workspace -- Yes
One REST API.
- 356 -
Option Description Default Required
a trusted CA.
- 357 -
Patch Management Credentials
Tenable Nessus can leverage credentials for patch management systems to perform patch auditing
on systems for which credentials may not be available to Nessus Professional or managed scan-
ners.
Note: Patch management integration is not available on Nessus Professional or managed scanners.
l HCL BigFix
l Symantec Altiris
You can configure patch management options in the Credentials section while creating a scan, as
described in Create a Scan.
IT administrators are expected to manage the patch monitoring software and install any agents
required by the patch management system on their systems.
Note: If the credential check sees a system but it is unable to authenticate against the system, it uses the
data obtained from the patch management system to perform the check. If Tenable Nessus is able to con-
nect to the target system, it performs checks on that system and ignores the patch management system
output.
Note: The data returned to Tenable Nessus by the patch management system is only as current as the
most recent data that the patch management system has obtained from its managed hosts.
- 358 -
If you provide credentials for a host and for one or more patch management systems, Tenable Nes-
sus compares the findings between all methods and report on conflicts or provide a satisfied find-
ing. Use the Patch Management Windows Auditing Conflicts plugins to highlight patch data
differences between the host and a patch management system.
KACE K1000 is available from Dell to manage the distribution of updates and hotfixes for Linux, Win-
dows, and macOS systems. Tenable Nessus can query KACE K1000 to verify whether or not patches
are installed on systems managed by KACE K1000 and display the patch information through the
Tenable Nessus user interface.
KACE K1000 scanning uses the following Tenable plugins: 76867, 76868, 76866, and 76869.
Database Port (Required) The TCP port that KACE K1000 listens on for com- 3306
munications from Tenable Nessus.
Organization (Required) The name of the organization component for the ORG1
Database Name KACE K1000 database (e.g., ORG1).
Database User- (Required) The username for the KACE K1000 account that R1
name Tenable Nessus uses to perform checks on the target sys-
tem.
K1000 Database (Required) The password for the KACE K1000 user. -
Password
HCL Bigfix is available to manage the distribution of updates and hotfixes for desktop systems. Ten-
able Nessus can query HCL Bigfix to verify whether or not patches are installed on systems man-
aged by HCL Bigfix and display the patch information.
- 359 -
Package reporting is supported by RPM-based and Debian-based distributions that HCL Bigfix offi-
cially supports. This includes Red Hat derivatives such as RHEL, CentOS, Scientific Linux, and
Oracle Linux, as well as Debian and Ubuntu. Other distributions may also work, but unless
HCL Bigfix officially supports them, there is no support available.
For local check plugins to trigger, only RHEL, CentOS, Scientific Linux, Oracle Linux, Debian,
Ubuntu, and Solaris are supported. Plugin 160250 must be enabled.
Tenable Nessus supports HCL Bigfix 9.5 and later and 10.x and later.
HCL Bigfix scanning uses the following Tenable plugins: 160247, 160248, 160249, 160250, and
160251.
Web Reports (Required) The name of HCL Bigfix Web Reports server. -
Server
Web Reports (Required) The TCP port that the HCL Bigfix Web Reports -
Port server listens on for communications from Tenable Nessus.
Web Reports (Required) The username for the HCL Bigfix Web Reports -
Username administrator account that Tenable Nessus uses to perform
checks on the target system.
Web Reports (Required) The password for the HCL Bigfix Web Reports -
Password administrator user.
HTTPS When enabled, Tenable Nessus connects using secure com- Enabled
munication (HTTPS).
Verify SSL When enabled, Tenable Nessus verifies that the Enabled
certificate SSL certificate on the server is signed by a trusted CA.
- 360 -
In order to use these auditing features, you must make changes to the HCL Bigfix server. You must
import a custom analysis into HCL Bigfixso that detailed package information is retrieved and made
available to Tenable Nessus.
From the HCL BigFix Console application, import the following .bes files.
BES file:
BES file:
- 361-
</GroupRelevance>
<Category></Category>
<Source>Internal</Source>
<SourceID></SourceID>
<SourceReleaseDate>2021-05-12</SourceReleaseDate>
<SourceSeverity></SourceSeverity>
<CVENames></CVENames>
<SANSID></SANSID>
<MIMEField>
<Name>x-fixlet-modification-time</Name>
<Value>Thu, 13 May 2021 21:50:58 +0000</Value>
</MIMEField>
<Domain>BESC</Domain>
<DefaultAction ID="Action1">
<Description>
<PreLink>Click </PreLink>
<Link>here</Link>
<PostLink> to deploy this action.</PostLink>
</Description>
<ActionScript MIMEType="application/x-sh"><![CDATA[#!/bin/sh
/usr/bin/showrev -a > /var/opt/BESClient/showrev_patches
/usr/sfw/bin/openssl base64 -in /var/opt/BESClient/showrev_patches -out /var/opt/BESClient/showrev_
patches.b64
]]></ActionScript>
</DefaultAction>
</Task>
</BES>
Microsoft System Center Configuration Manager (SCCM) is available to manage large groups of Win-
dows-based systems. Tenable Nessus can query the SCCM service to verify whether or not patches
are installed on systems managed by SCCM and display the patch information through the scan res-
ults.
Tenable Nessus connects to the server that is running the SCCM site (e.g., credentials must be
valid for the SCCM service, so the selected user must have privileges to query all the data in the
SCCM MMC). This server may also run the SQL database, or the database and the SCCM repository
can be on separate servers. When leveraging this audit, Tenable Nessus must connect to the SCCM
server via WMI and HTTPS.
SCCM scanning uses the following Tenable plugins: 57029, 57030, 73636, and 58186.
Note: SCCM patch management plugins support SCCM 2007, SCCM 2012, SCCM 2016, and SCCM 2019.
- 362 -
Credential Description Default
Username (Required) The username for the SCCM user account that Ten- -
able Nessus uses to perform checks on the target system. The
user account must have privileges to query all data in the
SCCM MMC.
Password (Required) The password for the SCCM user with privileges to -
query all data in the SCCM MMC.
Windows Server Update Services (WSUS) is available from Microsoft to manage the distribution of
updates and hotfixes for Microsoft products. Tenable Nessus can query WSUS to verify whether or
not patches are installed on systems managed by WSUS and display the patch information through
the Tenable Nessus user interface.
WSUS scanning uses the following Tenable plugins: 57031, 57032, and 58133.
Port (Required) The TCP port that Microsoft WSUS listens on 8530
for communications from Tenable Nessus.
- 363 -
Option Description Default
Red Hat Satellite is a systems management platform for Linux-based systems. Tenable Nessus can
query Satellite to verify whether or not patches are installed on systems managed by Satellite and
display the patch information.
Although not supported by Tenable, the Red Hat Satellite plugin also works with Spacewalk Server,
the Open Source Upstream Version of Red Hat Satellite. Spacewalk can manage distributions based
on Red Hat (RHEL, CentOS, Fedora) and SUSE. Tenable supports the Satellite server for Red Hat
Enterprise Linux.
Satellite scanning uses the following Tenable plugins: 84236, 84235, 84234, 84237, and 84238.
Port (Required) The TCP port that Red Hat Satellite listens on for 443
communications from Tenable Nessus.
Username (Required) The username for the Red Hat Satellite account -
that Tenable Nessus uses to perform checks on the target sys-
tem.
Password (Required) The password for the Red Hat Satellite user. -
Verify SSL When enabled, Tenable Nessus verifies that the Enabled
- 364 -
Option Description Default
Red Hat Satellite 6 is a systems management platform for Linux-based systems. Tenable Nessus
can query Satellite to verify whether or not patches are installed on systems managed by Satellite
and display the patch information.
Although not supported by Tenable, the Red Hat Satellite 6 plugin also works with Spacewalk
Server, the Open Source Upstream Version of Red Hat Satellite. Spacewalk can manage dis-
tributions based on Red Hat (RHEL, CentOS, Fedora) and SUSE. Tenable supports the Satellite
server for Red Hat Enterprise Linux.
Red Hat Satellite 6 scanning uses the following Tenable plugins: 84236, 84235, 84234, 84237, 84238,
84231, 84232, and 84233.
Port (Required) The TCP port that Red Hat Satellite 6 listens 443
on for communications from Tenable Nessus.
Password (Required) The password for the Red Hat Satellite 6 user. -
- 365 -
Option Description Default
standard HTTP.
Symantec Altris
Altiris is available from Symantec to manage the distribution of updates and hotfixes for Linux, Win-
dows, and macOS systems. Tenable Nessus has the ability to use the Altiris API to verify whether or
not patches are installed on systems managed by Altiris and display the patch information through
the Tenable Nessus user interface.
Tenable Nessus connects to the Microsoft SQL server that is running on the Altiris host. When lever-
aging this audit, if the MSSQL database and Altiris server are on separate hosts, Tenable Nessus
must connect to the MSSQL database, not the Altiris server.
Altiris scanning uses the following Tenable plugins: 78013, 78012, 78011, and 78014.
Database Port (Required) The TCP port that Altiris listens on for com- 5690
munications from Tenable Nessus.
Database Name (Required) The name of the MSSQL database that man- Symantec_
ages Altiris patch information. CMDB
Database User- (Required) The username for the Altiris MSSQL data- -
name base account that Tenable Nessus uses to perform
checks on the target system. Credentials must be valid
for a MSSQL databas account with the privileges to
query all the data in the Altiris MSSQL database.
- 366 -
Credential Description Default
Database Pass- (Required) The password for the Altiris MSSQL data- -
word base user.
Use Windows When enabled, use NTLMSSP for compatibility with Disabled
Authentication older Windows Servers.
Caution: Tenable does not recommend using plaintext credentials. Use encrypted authentication methods
when possible.
If a secure method of performing credentialed checks is not available, users can force Nessus to try
to perform checks over unsecure protocols; use the Plaintext Authentication options.
This menu allows the Nessus scanner to use credentials when testing HTTP , NNTP, FTP, POP2,
POP3, IMAP, IPMI, telnet/ rsh/ rexec, and SNMPv1/ v2c.
By supplying credentials, Nessus can perform more extensive checks to determine vulnerabilities.
Nessus uses the supplied HTTP credentials for Basic and Digest authentication only.
Credentials for FTP, IPMI, NNTP, POP2, and POP3 require only a username and password.
- 367 -
HTTP
There are four different types of HTTP Authentication methods: Automatic
authentication, Basic/ Digest authentication, HTTP login form, and HTTP cookies import.
Login method POST Specify if the login action is performed via a GET or POST
request.
Follow 30x redir- 0 If a 30x redirect code is received from a web server, this
ections directs Nessus to follow the link provided or not.
(# of levels)
Invert authen- Disabled A regex pattern to look for on the login page, that if found,
ticated regex tells Nessus authentication was not successful (for
example, Authentication failed!).
Use authen- Disabled Rather than search the body of a response, Nessus can
ticated regex on search the HTTP response headers for a given regex pat-
HTTP headers tern to determine the authentication state more accur-
ately.
Use authen- Disabled The regex searches are case sensitive by default. This
ticated regex on instructs Nessus to ignore case.
HTTP headers
Authentication methods
Automatic authentication
- 368 -
Basic/ Digest authentication
The HTTP login page settings provide control over where authenticated testing of a custom web-
based application begins.
Option Description
Login page The absolute path to the login page of the application (for example, / lo-
gin.html).
Login submission The action parameter for the form method. For example, the login form
page for <form method="POST" name="auth_form" action="/ login.php"> would
be / login.php.
Check authen- The absolute path of a protected web page that requires authentication,
tication on page to assist Nessus in determining authentication status (for example, / ad-
min.html).
Regex to verify A regex pattern to look for on the login page. Simply receiving a 200-
successful authen- response code is not always sufficient to determine session state. Nes-
tication sus can attempt to match a given string such as "Authentication suc-
cessful!"
- 369 -
To facilitate web application testing, Nessus can import HTTP cookies from another piece of soft-
ware (for example, browser, web proxy, etc.) with the HTTP cookies import settings. You can upload
a cookie file so that Nessus uses the cookies when attempting to access a web application. The
cookie file must be in Netscape format.
- 370 -
NNTP
Username (Required) The username for the NNTP account that Tenable -
Nessus uses to perform checks on the target system.
- 371-
FTP
Username (Required) The username for the FTP account that Tenable Nes- -
sus uses to perform checks on the target system.
- 372 -
POP2
Username (Required) The username for the POP2 account that Tenable -
Nessus uses to perform checks on the target system.
- 373 -
POP3
Username (Required) The username for the POP3 account that Tenable -
Nessus uses to perform checks on the target system.
- 374 -
IMAP
Username (Required) The username for the IMAP account that Tenable -
Nessus uses to perform checks on the target system.
- 375 -
IPMI
Username (Required) The username for the IMPI account that Tenable Nes- -
sus uses to perform checks on the target system.
- 376 -
telnet/ rsh/ rexec
The telnet/ rsh/ rexec authentication section is also username and password, but there are more
Global Settings for this section that can allow you to perform patch audits using any of these three
protocols.
- 377 -
SNMPv1/ v2c
SNMPv1/ v2c configuration allows you to use community strings for authentication to network
devices. You can configure up to four SNMP community strings.
UDP Port (Required) The TCP ports that SNMPv1/ v2c listens on for com- 161
munications from Tenable Nessus.
Additional
UDP port # 1
Additional UDP
port # 2
Additional UDP
port # 3
- 378 -
Compliance
Note: If a scan is based on a user-defined policy, you cannot configure Compliance settings in the scan.
You can only modify these settings in the related user-defined policy.
Tenable Nessus can perform vulnerability scans of network services as well as log in to servers to
discover any missing patches.
However, a lack of vulnerabilities does not mean the servers are configured correctly or are “com-
pliant” with a particular standard.
You can use Tenable Nessus to perform vulnerability scans and compliance audits to obtain all of
this data at one time. If you know how a server is configured, how it is patched, and what vul-
nerabilities are present, you can determine measures to mitigate risk.
At a higher level, if this information is aggregated for an entire network or asset class, security and
risk can be analyzed globally. This allows auditors and network managers to spot trends in non-com-
pliant systems and adjust controls to fix these on a larger scale.
When configuring a scan or policy, you can include one or more compliance checks, also known as
audits. Each compliance check requires specific credentials.
Some compliance checks are preconfigured by Tenable, but you can also create and upload custom
audits.
For more information on compliance checks and creating custom audits, see the Compliance
Checks Reference.
Aruba0S SSH
- 379 -
Compliance Check Required Credentials
Database Database
F5 F5
FireEye SSH
HP ProCurve SSH
- 380 -
Compliance Check Required Credentials
MongoDB MongoDB
OpenStack OpenStack
Rackspace Rackspace
RHEV RHEV
Unix SSH
VMware vCenter/ vSphere VMware ESX SOAP API or VMware vCenter SOAP API
WatchGuard SSH
Windows Windows
Zoom Zoom
- 381-
Upload a Custom Audit File
When you configure the Compliance settings of a Nessus scan, you can upload the following custom
audit files:
l A Security Content Automation Protocol (SCAP) Data Stream file downloaded from a
SCAP repository (for example, https:/ / nvd.nist.gov/ ncp/ repository).
The file must contain full SCAP content (Open Vulnerability and Assessment Language
(OVAL) and Extensible Configuration Checklist Description Format (XCCDF) content) or
OVAL standalone content.
l A custom audit file created or customized for a specific environment. For more information,
see the Nessus Compliance Checks Reference.
A list of the custom audit file types that you can upload appears.
- 382 -
7. Select the custom audit file type that you want to upload.
- 383 -
8. Click Add File. Select the custom audit file to upload from your machine.
Depending on the audit type, you may need to configure additional settings once you upload
the custom audit.
l To launch the scan immediately, click the button, and then click Launch.
- 384 -
SCAP Settings
Security Content Automation Protocol (SCAP) is an open standard that enables automated man-
agement of vulnerabilities and policy compliance for an organization. It relies on multiple open
standards and policies, including OVAL, CVE, CVSS, CPE, and FDCC policies.
When you select the SCAP and OVAL Auditing template, you can modify SCAP settings.
You can select Linux (SCAP), Linux (OVAL), Windows (SCAP), or Windows (OVAL). The following table
describes the settings for each option.
SCAP File None A valid zip file that contains full SCAP content
(XCCDF, OVAL, and CPE for versions 1.0 and 1.1;
DataStream for version 1.2).
SCAP Version 1.2 The SCAP version that is appropriate for the con-
tent in the uploaded SCAP file.
SCAP Data Stream ID None (SCAP Version 1.2 only) The Data Stream ID that
you copied from the SCAP XML file.
Example:
<data-stream id="scap_gov.nist_
datastream_USGCB-Windows-7-
1.2.3.1.zip">
SCAP Benchmark ID None The Benchmark ID that you copied from the
SCAP XML file.
Example:
<xccdf:Benchmark id="xccdf_
gov.nist_benchmark_USGCB-Windows-
7">
- 385 -
SCAP Profile ID None The Profile ID that you copied from the
SCAP XML file.
Example:
<xccdf:Profile id="xccdf_gov.nist_
profile_united_states_government_
configuration_baseline_version_
1.2.3.1">
OVAL Result Type Full results w/ sys- The information you want the results file to
tem char- include.
acteristics
The results file can be one of the following
types: full results with system characteristics,
full results without system characteristics, or
thin results.
OVAL definitions file None A valid zip file that contains OVAL standalone
content.
- 386 -
Plugins
The Advanced Scan templates include Plugin options.
Plugins options enable you to select security checks by Plugin Family or individual plugins checks.
For more information on specific plugins, see the Tenable plugins site. For more information on plu-
gin families, see About Plugin Families on the Tenable plugins site.
Clicking on the Plugin Family allows you to enable (green) or disable (gray) the entire family. Select-
ing a family shows the list of its plugins. You can enable or disable individual plugins to create spe-
cific scans.
A family with some plugins disabled is blue and shows Mixed to indicate only some plugins are
enabled. Clicking on the plugin family loads the complete list of plugins, and allow for granular selec-
tion based on your scanning preferences.
Selecting a specific Plugin Name shows the plugin output that you would see in a report.
The plugin details include a Synopsis, Description, Solution, Plugin Information, and Risk Inform-
ation.
Note: When you create and save a scan or policy, it records all the plugins that you select initially. When
Tenable Nessus receives new plugins via a plugin update, Nessus enables the new plugins automatically if
the family they are associated with is enabled. If the family was disabled or partially enabled, Nessus also
disables the new plugins in that family.
Caution: The Denial of Service family contains some plugins that could cause outages on a network if you
do not enable the Safe Checks option, in addition to some useful checks that do not cause any harm. You
can use the Denial of Service family with Safe Checks to ensure that Nessus does not run any potentially
dangerous plugins. However, Tenable recommends that you do not use the Denial of Service family on a
production network unless scheduled during a maintenance window and with staff ready to respond to any
issues.
- 387 -
Configure Dynamic Plugins
With the Advanced Dynamic Scan template, you can create a scan or policy with dynamic plugin fil-
ters instead of manually selecting plugin families or individual plugins. As Tenable releases new plu-
gins, any plugins that match your filters are added to the scan or policy automatically. This allows
you to tailor your scans for specific vulnerabilities while ensuring that the scan stays up to date as
new plugins are released.
For more information on specific plugins, see the Tenable plugins site. For more information on plu-
gin families, see About Plugin Families on the Tenable plugins site.
l Create a Scan.
l Create a Policy.
l Match Any or Match All: If you select All, only results that match all filters appear. If you
select Any, results that match any one of the filters appear.
l Plugin attribute: See the Plugin Attributes table for plugin attribute descriptions.
l Filter argument: Select is equal to, is not equal to, contains, does not contain, greater
than, or less than to specify how the filter should match for the selected plugin attrib-
ute.
l Value: Depending on the plugin attribute you selected, enter a value or select a value
from the drop-down menu.
Tenable Nessus lists the plugins that match the specified filters.
7. Click Save.
- 388 -
Tenable Nessus creates the scan or policy, which automatically updates when Tenable adds
new plugins that match the dynamic plugin filters.
- 389 -
Create and Manage Scans
This section contains the following tasks available on the Scans page.
l Create a Scan
l Import a Scan
l Delete a Scan
- 390 -
Example: Host Discovery
Knowing what hosts are on your network is the first step to any vulnerability assessment. Launch a
host discovery scan to see what hosts are on your network, and associated information such as IP
address, FQDN, operating systems, and open ports, if available. After you have a list of hosts, you
can choose what hosts you want to target in a specific vulnerability scan.
The following overview describes a typical workflow of creating and launching a host discovery
scan, then creating a follow-up scan that target-discovered hosts that you choose.
Tip: For IP addresses, you can use CIDR notation (for example, 192.168.0.0/ 24), a range (for
example, 192.168.0.1-192.168.0.255), or a comma-separated list (for example,
192.168.0.0,192.168.0.1). For more information, see Scan Targets.
5. To launch the scan immediately, click the button, and then click Launch.
Tenable Nessus runs the host discovery scan, and the My Scans page appears.
6. In the scans table, click the row of a completed host discovery scan.
- 391-
7. In the Hosts tab, view the hosts that Tenable Nessus discovered, and any available associated
information, such as IP address, FQDN, operating system, and open ports.
2. In the scans table, click the row of your completed host discovery scan.
4. Select the check box next to each host you want to scan in your new scan.
Tenable Nessus automatically populates the Targets list with the hosts you previously selec-
ted.
8. Configure the rest of the scan settings, as described in Scan and Policy Settings.
9. To launch the scan immediately, click the button, and then click Launch.
- 392 -
Create a Scan
1. In the top navigation bar, click Scans.
l To launch the scan immediately, click the button, and then click Launch.
- 393 -
Import a Scan
You can import an exported Tenable Nessus (.nessus) or Tenable Nessus DB (.db) scan. With an
imported scan, you can view scan results, export new reports for the scan, rename the scan, and
update the description. You cannot launch imported scans or update policy settings.
You can also import .nessus files as policies. For more information, see Import a Policy.
To import a scan:
3. Browse to and select the scan file that you want to import.
Note: Supported file types are exported Nessus (.nessus) and Nessus DB (.db) files.
5. Click Upload.
- 394 -
Create an Agent Scan
Tip: Use the search box in the top navigation bar to filter templates on the tab currently in view.
l If you want to launch the scan later, click the Save button.
b. Click Launch.
- 395 -
Modify Scan Settings
A standard user or administrator can perform this procedure.
3. In the scans table, select the check box on the row corresponding to the scan that you want
to configure.
5. Click Configure.
l Virtual machines
- 396 -
Scenario 1: Scanning ESXi/ vSphere Not Managed by vCenter
1. Create a scan.
2. In the Basic scan settings, in the Targets section, type the IP address or addresses of the
ESXi host or hosts.
6. In the Username box, type the username associated with the local ESXi account.
7. In the Password box, type the password associated with the local ESXi account.
8. If your vCenter host includes an SSL certificate (not a self-signed certificate), deselect the Do
not verify SSL Certificate check box. Otherwise, select the check box.
9. Click Save.
- 397 -
Scenario 2: Scanning vCenter-Managed ESXI/ vSpheres
1. Create a scan.
2. In the Basic scan settings, in the Targets section, type the IP addresses of:
6. In the vCenter Host box, type the IP address of the vCenter host.
7. In the vCenter Port box, type the port for the vCenter host. By default, this value is 443.
8. In the Username box, type the username associated with the local ESXi account.
9. In the Password box, type the password associated with the local ESXi account.
10. If the vCenter host is SSL enabled, enable the HTTPS toggle.
11. If your vCenter host includes an SSL certificate (not a self-signed certificate), select the
Verify SSL Certificate check box. Otherwise, deselect the check box.
- 398 -
Scenario 3: Scanning Virtual Machines
You can scan virtual machines just like any other host on the network. Be sure to include the IP
address or addresses of your virtual machine in your scan targets. For more information, see Create
a Scan.
- 399 -
Configure an Audit Trail
A standard user or administrator can perform this procedure.
3. On the scans table, click the scan for which you want to configure an audit trail.
5. In the Plugin ID box, type the plugin ID used by one or more scans.
and/ or
A list appears and shows the results that match the criteria that you entered in one or both
boxes.
- 400 -
Launch a Scan
In addition to configuring Schedule settings for a scan, you can manually start a scan run.
To launch a scan:
2. In the scans table, in the row of the scan you want to launch, click the button.
What to do next:
- 401-
Stop a Running Scan
When you stop a scan, Tenable Nessus terminates all tasks for the scan and categorizes the scan as
canceled. The Tenable Nessus scan results associated with the scan reflect only the completed
tasks. You cannot stop individual tasks, only the scan as a whole.
For local scans (that is, not a scan run by Tenable Nessus Agent or a linked scanner in Tenable Nes-
sus Manager), you can force stop the scan to stop the scan quickly and terminate all in-progress plu-
gins. Tenable Nessus may not get results from any plugins that were running when you force
stopped the scan.
2. In the scans table, in the row of the scan you want to stop, click the button.
4. (Optional) For local scans, to force stop the scan, click the button.
- 402 -
Delete a Scan
A standard user or administrator can perform this procedure.
Note: Moving and deleting scans are tag-based, user-specific actions. For example, when one user deletes
a scan, it will only move to the trash folder for that user. For other users, the scan remains in the original
folder and is updated with a trash tag. For more information, see Scan Folders.
3. On the scans table, on the row corresponding to the scan that you want to delete, click the
button.
4. To delete the scan permanently, in the left navigation bar, click the Trash folder.
5. On the scans table, on the row corresponding to the scan that you want to delete per-
manently, click the button.
Tip: On the Trash page, in the upper right corner, click the Empty Trash button to delete all scans in the
Trash folder permanently.
- 403 -
Scan Folders
On the Scans page, the left navigation bar is divided into the Folders and Resources sections. The
Folders section always includes the following default folders that you cannot remove:
l My Scans
l All Scans
l Trash
Note: All scan folders and related actions (for example, moving and deleting scans) are user-specific and
tag-based. For example, when one user deletes a scan, it only moves to the trash folder for that user. For
other users, the scan remains in the original folder and Tenable Nessus updates it with a trash tag.
When you access the Scans page, the My Scans folder appears. When you create a scan, it appears
by default in the My Scans folder.
The All Scans folder shows all scans you have created as well as any scans with which you have per-
mission to interact. You can click on a scan in a folder to view scan results.
The Trash folder shows scans that you have deleted. In the Trash folder, you can permanently
remove scans from your Tenable Nessus instance, or restore the scans to a selected folder. If you
delete a folder that contains scans, Tenable Nessus moves all scans in that folder to the Trash
folder. Tenable Nessus deletes the scans stored in the Trash folder automatically after 30 days.
- 404 -
- 405 -
Manage Scan Folders
A standard user or administrator can complete the following procedures.
Note: Moving and deleting scans are tag-based, user-specific actions. For example, when one user deletes
a scan, it will only move to the trash folder for that user. For other users, the scan remains in the original
folder and is updated with a trash tag. For more information, see Scan Folders.
Create a folder:
Tenable Nessus creates the folder and shows it in the left navigation bar.
2. If the scan you want to move is not in the My Scans folder, on the left navigation bar, click the
folder that contains the scan you want to move.
3. On the scans table, select the check box on the row corresponding to the scan that you want
to configure.
4. Click More. Point to Move To, and click the folder that you want to move the scan to.
Rename a folder:
- 406 -
1. In the top navigation bar, click Scans.
2. In the left navigation bar, next to the folder that you want to rename, click the button, and
then click Rename.
Delete a folder:
2. In the left navigation bar, next to the folder that you want to rename, click the button, and
then click Delete.
Tenable Nessus deletes the folder. If the folder contained scans, Tenable Nessus moves those
scans to the Trash folder.
- 407 -
Scan Results
You can view scan results to help you understand your organization’s security posture and vul-
nerabilities. Color-coded indicators and customizable viewing options allow you to customize how
you view your scan’s data.
Page Description
Dashboard In Tenable Nessus Manager, the default scan results page shows the Dash-
board view.
Tip: To view vulnerabilities by VPR, click in the table header, click Disable
Groups, and sort the table by VPR Score.
Compliance If the scan includes compliance checks, this list shows counts and details
sorted by vulnerability severity.
If you configure the scan for compliance scanning, the button allows
you to navigate between the Compliance and Vulnerability results.
Remediations If the scan's results include Remediation information, this list shows sug-
gested remediations that address the highest number of vulnerabilities.
Notes The Notes page shows additional information about the scan and the
scan’s results.
History The History shows a listing of scans: Start Time, End Time, and the Scan
Statuses.
Summary (Attack View a summary of your attack surface discovery scan configuration. The
Surface Dis- summary table shows a row for each scanned domain with the following
covery scan tem- details:
plate only)
l Domain —The scanned domain name.
- 408 -
Page Description
l First Complete Pull —The date and time the scanned domain data
was, or will be, available.
l Data Refreshed —The date and time that the domain data Tenable
Nessus pulls was updated in Bit Discovery. Bit Discovery refreshes
the data that Tenable Nessus pulls every 90 days.
l Next Data Refresh —The date and time of the next refresh of this
domain's data in Bit Discovery. Bit Discovery refreshes the data that
Tenable Nessus pulls every 90 days.
l Ages Out from License —The data and time the domain ages out
from your Tenable Nessus license.
Records (Attack View a list of the DNS records identified during the last attack surface dis-
Surface Dis- covery scan. The list only shows a maximum of 2,500 records across all
covery scan tem- scanned domains, but you can filter the table and only view certain record
plate only) types or records from a specific domain. Tenable Nessus provides the fol-
lowing information for each record:
l Type —The DNS record type. Some of the most common record
types are:
l A —Host address
l MX —Mail exchange
l NS —Name server
- 409 -
Page Description
l PTR —Pointer
l TXT —Text
The Records page also shows details about the latest attack surface dis-
covery scan:
l Policy —The scan policy used for the scan (Domain Discovery).
l Severity Base —The severity base used in the scan (for example,
CVSS v2.0).
l Elapsed —The time elapsed between the Start and End times.
- 410 -
Severity
Severity is a categorization of the risk and urgency of a vulnerability.
CVSS-Based Severity
When you view vulnerabilities in scan results, Tenable Nessus shows severity based on CVSSv2
scores or CVSSv3 scores, depending on your configuration.
l You can choose whether Tenable Nessus calculates the severity of vulnerabilities using
CVSSv2 or CVSSv3 scores by configuring your default severity base setting. For more inform-
ation, see Configure Your Default Severity Base.
l You can also configure individual scans to use a particular severity base, which overrides the
default severity base for those scan results. For more information, see Configure Severity
Base for an Individual Scan.
VPR
You can also view the top 10 vulnerabilities by VPR threat. For more information, see View VPR Top
Threats.
- 411-
CVSS
Tenable uses and displays third-party Common Vulnerability Scoring System (CVSS) values retrieved
from the National Vulnerability Database (NVD) to describe risk associated with vulnerabilities. CVSS
scores power a vulnerability's Severity and Risk Factor values.
Tip: Risk Factor and Severity values are unrelated; they are calculated separately.
- 412 -
CVSS-Based Severity
Tenable assigns all vulnerabilities a severity (Info, Low, Medium, High, or Critical) based on the vul-
nerability's static CVSSv2 or CVSSv3 score, depending on your configuration. For more information,
see Configure Default Severity.
Tenable Nessus analysis pages provide summary information about vulnerabilities using the fol-
lowing CVSS categories.
- or - - or -
The plugin does not search for vul- The plugin does not search for vul-
nerabilities. nerabilities.
- 413 -
CVSS-Based Risk Factor
For each plugin, Tenable interprets the CVSSv2 or CVSSv3 scores for the vulnerabilities associated
with the plugin and assigns an overall risk factor (Low, Medium, High, or Critical) to the plugin. The
Vulnerability Details page shows the highest risk factor value for all the plugins associated with a
vulnerability.
Note: Detection (non-vulnerability) plugins and some automated vulnerability plugins do not receive CVSS
scores. In these cases, Tenable determines the risk factor based on vendor advisories.
Tip: Info plugins receive a risk factor of None. Other plugins without associated CVSS scores receive a cus-
tom risk factor based on information provided in related security advisories.
- 414 -
Vulnerability Priority Rating
Tenable calculates a dynamic VPR for most vulnerabilities. The VPR is a dynamic companion to the
data provided by the vulnerability's CVSS score, since Tenable updates the VPR to reflect the cur-
rent threat landscape. VPR values range from 0.1-10.0, with a higher value representing a higher like-
lihood of exploit.
Note: Vulnerabilities without CVEs in the National Vulnerability Database (NVD) (for example, many vul-
nerabilities with the Info severity) do not receive a VPR. Tenable recommends remediating these vul-
nerabilities according to their CVSS-based severity.
Note: VPR scores shown in Nessus are static and do not update dynamically. You have to rescan to view
the latest and most accurate VPR scores.
Tenable Nessus provides a VPR value the first time you scan a vulnerability on your network.
Tenable recommends resolving vulnerabilities with the highest VPRs first. You can view VPR scores
and summary data in:
l The VPR Top Threats for an individual scan, as described in View VPR Top Threats.
l The Top 10 Vulnerabilities report for an individual scan. For information on creating the report,
see Create a Scan Report.
- 415 -
VPR Key Drivers
You can view the following key drivers to explain a vulnerability's VPR.
Note: Tenable does not customize these values for your organization; VPR key drivers reflect a vul-
nerability's global threat landscape.
Age of Vuln The number of days since the National Vulnerability Database (NVD) published
the vulnerability.
CVSSv3 The NVD-provided CVSSv3 impact score for the vulnerability. If the NVD did
Impact not provide a score, Tenable Nessus displays a Tenable-predicted score.
Score
Exploit Code The relative maturity of a possible exploit for the vulnerability based on the
Maturity existence, sophistication, and prevalence of exploit intelligence from internal
and external sources (e.g., Reversinglabs, Exploit-db, Metasploit, etc.). The pos-
sible values (High, Functional, PoC, or Unproven) parallel the CVSS Exploit Code
Maturity categories.
Product The relative number of unique products affected by the vulnerability: Low,
Coverage Medium, High, or Very High.
Threat A list of all sources (e.g., social media channels, the dark web, etc.) where
Sources threat events related to this vulnerability occurred. If the system did not
observe a related threat event in the past 28 days, the system displays No
recorded events.
Threat The relative intensity based on the number and frequency of recently observed
Intensity threat events related to this vulnerability: Very Low, Low, Medium, High, or
Very High.
Threat The number of days (0-180) since a threat event occurred for the vulnerability.
Recency
- 416 -
Common threat events include:
- 417 -
Configure Your Default Severity Base
Note: By default, new installations of Tenable Nessus use CVSSv3 scores (when available) to cal-
culate severity for vulnerabilities. Preexisting, upgraded installations retain the previous default
of CVSSv2 scores.
In Tenable Nessus scanners and Tenable Nessus Professional, you can choose whether Tenable Nes-
sus calculates the severity of vulnerabilities using CVSSv2 or CVSSv3 scores (when available) by con-
figuring your default severity base setting. When you change the default severity base, the change
applies to all existing scans that are configured with the default severity base. Future scans also
use the default severity base.
You can also configure individual scans to use a particular severity base, which overrides the
default severity base for that scan, as described in Configure Severity Base for an Individual Scan.
For more information about CVSS scores and severity ranges, see CVSS Scores vs. VPR.
Note: You cannot configure the default severity base in Tenable Nessus Manager.
4. In the table, click the row for the System Default Severity Basis setting.
Tip: Use the search bar to search for any part of the setting name.
5. In the Value drop-down box, select CVSS v2.0 or CVSS v3.0 for your default severity base.
6. Click Save.
- 418 -
Tenable Nessus updates the default severity base for your instance. Existing scans with the
default severity base update to reflect the new default. Individual scans with overridden sever-
ity bases do not change.
- 419 -
Configure Severity Base for an Individual Scan
Note: By default, new installations of Tenable Nessus use CVSSv3 scores (when available) to cal-
culate severity for vulnerabilities. Preexisting, upgraded installations retain the previous default
of CVSSv2 scores.
You can configure individual scans to use a particular severity base, which overrides the default
severity base for that scan. If you change the default severity base, scans with overridden severity
bases do not change.
To change the default severity base across the Tenable Nessus instance, see Configure Your
Default Severity Base.
For more information about CVSS scores and severity ranges, see CVSS Scores vs. VPR.
2. In the scans table, click the scan for which you want to change the severity base.
The scan page appears. The Scan Details, including the scan's current severity base, appear
on the right side of the page.
3. Under Scan Details, next to the current Severity Base, click the button.
4. From the Severity Rating Base drop-down box, select one of the following:
l CVSS v2.0 —The severity for vulnerabilities found by the scan is based on CVSSv2
scores. This setting overrides the default severity base set on the Tenable Nessus
instance.
l CVSS v3.0 —The severity for vulnerabilities found by the scan is based on CVSSv3
scores. This setting overrides the default severity base set on the Tenable Nessus
instance.
- 420 -
l Default —The severity for vulnerabilities found by the scan use the Tenable Nessus
default severity base, which appears in parentheses. If you change the default severity
base later, the scan automatically uses the new default severity base.
5. Click Save.
Tenable Nessus updates the severity base for your scan. The scan results update to reflect
the updated severity.
- 421-
Create a New Scan from Scan Results
When you view scan results, you can select scanned hosts that you want to target in a new scan.
When you create a new scan, Tenable Nessus automatically populates the targets with the hosts
that you selected.
4. Select the check box next to each host you want to scan in your new scan.
Tenable Nessus automatically populates the Targets list with the hosts you previously selec-
ted.
8. Configure the rest of the scan settings, as described in Scan and Policy Settings.
l To launch the scan immediately, click the button, and then click Launch.
- 422 -
l To launch the scan later, click the Save button.
- 423 -
Search and Filter Results
You can search or use filters to view specific scan results. You can filter hosts and vulnerabilities,
and you can create detailed and customized scan result views by using multiple filters.
If you are working with an attack surface discovery scan, click the Records tab.
2. In the Search Hosts box above the hosts table, type text to filter for matches in hostnames.
As you type, Nessus automatically filters the results based on your text.
l In scan results, in the Hosts tab, click a specific host to view its vulnerabilities.
2. In the Search Vulnerabilities box above the vulnerabilities table, type text to filter for matches
in vulnerability titles.
As you type, Nessus automatically filters the results based on your text.
To create a filter:
l In scan results, in the Hosts tab, click a specific host to view its vulnerabilities.
- 424 -
l Match Any or Match All: If you select All, only results that match all filters appear. If you
select Any, results that match any one of the filters appear.
l Plugin attribute: See the Plugin Attributes table for plugin attribute descriptions.
l Filter argument: Select is equal to, is not equal to, contains, or does not contain to spe-
cify how the filter should match for the selected plugin attribute.
l Value: Depending on the plugin attribute you selected, enter a value or select a value
from the drop-down menu.
5. Click Apply.
Tenable Nessus applies your filters and the table shows vulnerabilities or records that match
your filters.
Tenable Nessus removes the filters from the vulnerabilities shown in the table.
Plugin Attributes
The following table lists plugins attributes you can use to filter results.
Option Description
Bugtraq ID Filter results based on if a Bugtraq ID is equal to, is not equal to, contains,
or does not contain a given string (for example, 51300).
CANVAS Exploit Filter results based on if the presence of an exploit in the CANVAS exploit
Framework framework is equal to or is not equal to true or false.
CANVAS Pack- Filter results based on which CANVAS exploit framework package an
- 425 -
Option Description
CERT Advisory Filter results based on if a CERT Advisory ID (now called Technical Cyber
ID Security Alert) is equal to, is not equal to, contains, or does not contain a
given string (for example, TA12-010A).
CORE Exploit Filter results based on if the presence of an exploit in the CORE exploit
Framework framework is equal to or is not equal to true or false.
CPE Filter results based on if the Common Platform Enumeration (CPE) is equal
to, is not equal to, contains, or does not contain a given string (for example,
Solaris).
CVSS Base Filter results based on if a Common Vulnerability Scoring System (CVSS)
Score v2.0 base score is less than, is more than, is equal to, is not equal to, con-
tains, or does not contain a string (for example, 5).
You can use this filter to select by risk level. The severity ratings are
derived from the associated CVSS score, where 0 is Info, less than 4 is
Low, less than 7 is Medium, less than 10 is High, and a CVSS score of 10 is
Critical.
CVSS Temporal Filter results based on if a CVSS v2.0 temporal score is less than, is more
Score than, is equal to, is not equal to, contains, or does not contain a string (for
example, 3.3).
CVSS Temporal Filter results based on if a CVSS v2.0 temporal vector is equal to, is not
Vector equal to, contains, or does not contain a given string (for example, E:F).
CVSS Vector Filter results based on if a CVSS v2.0 vector is equal to, is not equal to, con-
tains, or does not contain a given string (for example, AV:N).
CVSS 3.0 Base Filter results based on if a Common Vulnerability Scoring System (CVSS)
- 426 -
Option Description
Score v3.0 base score is less than, is more than, is equal to, is not equal to, con-
tains, or does not contain a string (for example, 5).
You can use this filter to select by risk level. The severity ratings are
derived from the associated CVSS score, where 0 is Info, less than 4 is
Low, less than 7 is Medium, less than 10 is High, and a CVSS score of 10 is
Critical.
CVSS 3.0 Tem- Filter results based on if a CVSS v3.0 temporal score is less than, is more
poral Score than, is equal to, is not equal to, contains, or does not contain a string (for
example, 3.3).
CVSS 3.0 Tem- Filter results based on if a CVSS v3.0 temporal vector is equal to, is not
poral Vector equal to, contains, or does not contain a given string (for example, E:F).
CVSS 3.0 Vector Filter results based on if a CVSS v3.0 vector is equal to, is not equal to, con-
tains, or does not contain a given string (for example, AV:N).
Exploit Available Filter results based on the vulnerability having a known public exploit.
Exploit Data- Filter results based on if an Exploit Database ID (EBD-ID) reference is equal
base ID to, is not equal to, contains, or does not contain a given string (for example,
18380).
Exploitability Filter results based on if the exploitability ease is equal to or is not equal to
Ease the following values: Exploits are available, No exploit is required, or No
known exploits are available.
Exploited by Filter results based on whether a plugin performs an actual exploit, usually
Nessus an ACT_ATTACK plugin.
- 427 -
Option Description
Hostname Filter results if the host is equal to, is not equal to, contains, or does not
contain a given string (for example, 192.168 or lab). For agents, you can
search by the agent target name. For other targets, you can search by the
target's IP address or DNS name, depending on how you configured the
scan.
IAVA Filter results based on if an IAVA reference is equal to, is not equal to, con-
tains, or does not contain a given string (for example, 2012-A-0008).
IAVB Filter results based on if an IAVB reference is equal to, is not equal to, con-
tains, or does not contain a given string (for example, 2012-A-0008).
IAVM Severity Filter results based on the IAVM severity level (for example, IV).
In The News Filter results based on whether the vulnerability covered by a plugin has
had coverage in the news.
Malware Filter results based on whether the plugin detects malware; usually ACT_
GATHER_INFOplugins.
Metasploit Filter results based on if a Metasploit name is equal to, is not equal to, con-
Name tains, or does not contain a given string (for example, xslt_password_
reset).
Microsoft Bul- Filter results based on Microsoft security bulletins like MS17-09, which have
letin the format MSXX-XXX , where X is a number.
Microsoft KB Filter results based on Microsoft knowledge base articles and security
advisories.
- 428 -
Option Description
Patch Public- Filter results based on if a vulnerability patch publication date is less than,
ation Date is more than, is equal to, is not equal to, contains, or does not contain a
string (for example, 12/ 01/ 2011).
Plugin Descrip- Filter results if Plugin Description contains, or does not contain a given
tion string (for example, remote).
Plugin Family Filter results if Plugin Name is equal to or is not equal to one of the des-
ignated Nessus plugin families. Tenable Nessus provides the possible
matches via a drop-down menu.
Plugin ID Filter results if plugin ID is equal to, is not equal to, contains, or does not
contain a given string (for example, 42111).
Plugin Modi- Filter results based on if a Nessus plugin modification date is less than, is
fication Date more than, is equal to, is not equal to, contains, or does not contain a
string (for example, 02/ 14/ 2010).
Plugin Name Filter results if Plugin Name is equal to, is not equal to, contains, or does
not contain a given string (for example, windows).
Plugin Output Filter results if Plugin Description is equal to, is not equal to, contains, or
does not contain a given string (for example, PHP)
Plugin Public- Filter results based on if a Nessus plugin publication date is less than, is
ation Date more than, is equal to, is not equal to, contains, or does not contain a
string (for example, 06/ 03/ 2011).
Plugin Type Filter results if Plugin Type is equal to or is not equal to one of the two
types of plugins: local or remote.
Port Filter results based on if a port is equal to, is not equal to, contains, or does
not contain a given string (for example, 80).
Protocol Filter results if a protocol is equal to or is not equal to a given string (for
example, HTTP).
Risk Factor Filter results based on the risk factor of the vulnerability (for example, Low,
- 429 -
Option Description
Secunia ID Filter results based on if a Secunia ID is equal to, is not equal to, contains,
or does not contain a given string (for example, 47650).
See Also Filter results based on if a Nessus plugin see also reference is equal to, is
not equal to, contains, or does not contain a given string (for example,
seclists.org).
Solution Filter results if the plugin solution contains or does not contain a given
string (for example, upgrade).
Synopsis Filter results if the plugin solution contains or does not contain a given
string (for example, PHP).
Vulnerability Filter results based on if a vulnerability publication date earlier than, later
Publication Date than, on, not on, contains, or does not contain a string (for example,
01/ 01/ 2012).
Note: Pressing the button next to the date brings up a calendar interface for
easier date selection.
- 430 -
Compare Scan Results
You can compare two scan results to see differences between them. This comparison is not a true
differential of the two results; it shows the new vulnerabilities that Tenable Nessus detected
between the older baseline scan and the newer scan.
Comparing scan results helps you see how a given system or network has changed over time. This
information is useful for compliance analysis by showing how vulnerabilities are being remediated,
if systems are patched as Tenable Nessus finds new vulnerabilities, or how two scans may not be
targeting the same hosts.
Note: You cannot compare imported scans or more than two scans.
2. Click a scan.
4. In the row of both scan results you want to compare, select the check box.
6. In the drop-down box, select which of the scan results is the primary result.
The primary result is your differential baseline. The scan differential shows the vulnerabilities
that Tenable Nessus detected in the non-baseline scan.
Tip: To see a true differential of the two scan results, Tenable recommends generating the dif-
ferential twice: once using the older scan result as the baseline, and once using the newer scan res-
ult as the baseline. Doing so allows you to see the vulnerabilities that were only detected in one of
the scan results.
7. Click Continue.
- 431-
The scan differential appears. The differential shows the hosts on which the non-baseline
scan detected vulnerabilities since the baseline scan under the Hosts tab and a list of the vul-
nerabilities detected under the Vulnerabilities tab. The differential also shows which of those
new vulnerabilities are VPR Top Threats under the VPR Top Threats tab.
You can generate a report of the scan differential. For more information, see step four of
Create a Scan Report.
- 432 -
Dashboard
In Tenable Nessus Manager, you can configure a scan to show the scan’s results in an interactive
dashboard view.
Based on the type of scan performed and the type of data collected, the dashboard shows key val-
ues and trending indicators.
Dashboard View
Based on the type of scan performed and the type of data collected, the dashboard shows key val-
ues and a trending indicator.
Dashboard Details
- 433 -
Name Description
Vulnerability Com- The percentage of all vulnerabilities identified by the scan, by severity.
parison
Host Count Com- The percentage of hosts scanned by credentialed and non-credentialed
parison authorization types: without authorization, new without authorization,
with authorization, and new with authorization.
Vulnerabilities Vulnerabilities found over a period of time. You must complete at least
Over Time two scans for this chart to appear.
Top Hosts Top 8 hosts that had the highest number of vulnerabilities found in the
scan.
- 434 -
Vulnerabilities
Vulnerabilities are instances of a potential security issue found by a plugin. In your scan results, you
can choose to view all vulnerabilities found by the scan, or vulnerabilities found on a specific host.
All vulnerabilities detected by a scan Scans > [ scan name] > Vulnerabilities
Vulnerabilities detected by a scan on a specific host Scans > Hosts > [ scan name]
l View Vulnerabilities
l Modify a Vulnerability
l Group Vulnerabilities
l Snooze a Vulnerability
l Live Results
- 435 -
View Vulnerabilities
You can view all vulnerabilities found by a scan, or vulnerabilities found on a specific host by a scan.
When you drill down on a vulnerability, you can view information such as plugin details, description,
solution, output, risk information, vulnerability information, and reference information.
Tip: To view vulnerabilities by VPR, click in the table header, click Disable Groups, and sort the table by
VPR Score.
To view vulnerabilities:
4. (Optional) To sort the vulnerabilities, click an attribute in the table header row to sort by that
attribute.
The vulnerability details page appears and shows plugin information and output for each
instance on a host.
- 436 -
Modify a Vulnerability
You can modify a vulnerability to change its severity level or hide it. This allows you to re-prioritize
the severity of results to better account for your organization’s security posture and response plan.
When you modify a vulnerability from the scan results page, the change only applies to that vul-
nerability instance for that scan unless you indicate that the change should apply to all future
scans. To modify severity levels for all vulnerabilities, use Plugin Rules.
To modify a vulnerability:
5. In the Severity drop-down box, select a severity level or Hide this result.
Note: If you hide a vulnerability, you cannot recover it and you accept its associated risks. To hide a
vulnerability temporarily, use Vulnerability Snoozing.
If you select this option, Tenable Nessus modifies this vulnerability for all future scans. Ten-
able Nessus does not modify vulnerabilities found in past scans.
7. Click Save.
- 437 -
Group Vulnerabilities
When you group vulnerabilities, plugins with common attributes such as Common Platform
Enumeration (CPE), service, application, and protocol nest under a single row in scan results. Group-
ing vulnerabilities gives you a shorter list of results, and shows your related vulnerabilities together.
When you enable groups, the number of vulnerabilities in the group appears next to the severity
indicator, and the group name says (Multiple Issues).
The severity indicator for a group is based on the vulnerabilities in the group. If all the vul-
nerabilities in a group have the same severity, Tenable Nessus shows that severity level. If the vul-
nerabilities in a group have differing severities, Nessus shows the Mixed severity level.
To group vulnerabilities:
- 438 -
l Click a specific host to view vulnerabilities found on that host.
-or-
To ungroup vulnerabilities:
A new vulnerabilities table appears and shows the vulnerabilities in the group.
To set group severity types to the highest severity within the group:
- 439 -
Snooze a Vulnerability
When you snooze a vulnerability, it does not appear in the default view of your scan results. You
choose a period of time for which the vulnerability is snoozed – once the snooze period age outs,
the vulnerability awakes and appears in your list of scan results. You can also manually wake a vul-
nerability or choose to show snoozed vulnerabilities. Snoozing affects all instances of the vul-
nerability in a given scan, so you cannot snooze vulnerabilities only on a specific host.
When you snooze a vulnerability, you only snooze the vulnerability for the scan result that you are
working in. The vulnerability still appears in other existing scan results, and in future scan results.
To snooze a vulnerability:
-or-
-or-
l Click Custom.
- 440 -
6. In the Snooze Vulnerability window:
l If you selected a preset snooze period, click Snooze to confirm your selection.
l If you selected a custom snooze period, select the date you want the vulnerability to
snooze until, then click Snooze.
Tenable Nessus snoozes the vulnerability for the selected period of time and does not appear
in the default view of scan results.
2. Click Wake.
The vulnerability is no longer snoozed, and appears in the default list of scan results.
- 441-
View VPR Top Threats
In Tenable Nessus scan results, VPR Top Threats represent a scan's top 10 vulnerabilities with the
highest VPR scores. For information about VPR, see CVSS Scores vs. VPR.
Although you may have more than 10 vulnerabilities found by a scan, VPR top threats show the 10
most severe vulnerabilities as determined by their VPR score. To view all vulnerabilities by their
static CVSS score, see View Vulnerabilities.
Note: To ensure VPR data is available for your scans, enable plugin updates.
Tip: VPR is a dynamic score that changes over time to reflect the current threat landscape. However, the
VPR top threats reflect the VPR score for the vulnerability at the time Tenable Nessus ran the scan. To get
updated VPR scores, re-run the scan.
2. In the scans table, click the scan for which you want to view the top VPR threats.
The VPR Top Threats page appears. On this page, you can view:
Section Description
VPR Severity The severity for the vulnerability, based on VPR score. This severity
may differ from the CVSS-based severity. For more information, see
CVSS Scores vs. VPR.
- 442 -
Name The name of the vulnerability.
VPR Score The Vulnerability Priority Rating score for the vulnerability.
Hosts The number of affected hosts where Tenable Nessus found the vul-
nerability.
4. (Optional) To view details for a specific vulnerability, click the row in the table.
- 443 -
Live Results
Nessus updates with new plugins automatically, which allows you to assess your assets for new vul-
nerabilities. However, if your scan is on an infrequent schedule, the scan may not run new plugins
until several days after the plugin update. This gap could leave your assets exposed to vul-
nerabilities that you are not aware of.
In Nessus Professional and Nessus Expert, you can use live results to view scan results for new plu-
gins based on a scan's most recently collected data, without running a new scan. Live results allow
you to see potential new threats and determine if you need to launch a scan manually to confirm the
findings. Live results are not results from an active scan; they are an assessment based on already-
collected data. Live results don't produce results for new plugins that require active detection, like
an exploit, or that require data that was not previously collected.
Live results appear with striped coloring in scan results. In the Vulnerabilities tab, the severity indic-
ator is striped, and the Live icon appears next to the plugin name.
The results page shows a note indicating that the results include live results. Tenable recommends
that you manually launch a scan to confirm the findings. The longer you wait between active scans,
the more outdated the data may be, which lessens the effectiveness of live results.
- 444 -
l Enable or Disable Live Results
- 445 -
Enable or Disable Live Results
The first time you enable live results on a scan, the scan results update to include findings for plu-
gins that were enabled since the last scan. The scan then updates with live results whenever there
is a new plugin update. Live results are not results from an active scan; they are an assessment
based on a scan's most recently collected data. Live results do not produce results for new plugins
that require active detection, like an exploit, or that require data that was not previously collected.
To learn more, see Live Results.
1. In Tenable Nessus Professional or Tenable Nessus Expert, create a new scan or edit an exist-
ing scan.
4. Click Save.
- 446 -
Remove Live Results
In Nessus Professional and Nessus Expert, if a scan includes live results, Tenable Nessus shows the
following notice on the scan results page.
If you remove live results, they no longer appear on the scan results page. However, live results will
re-appear the next time Nessus updates the plugins (unless you disable the feature for the scan).
Tip: To launch the scan and confirm the live results findings, click Launch in the notice before you remove
the findings.
- 447 -
Scan Exports and Reports
You can export scans as a Tenable Nessus file or a Tenable Nessus DB file, as described in Export a
Scan. You can then import these files as a scan or policy, as described in Import a Scan and Import
a Policy.
You can also create a scan report in several different formats. For all formats, you can configure a
report to include all scan information or specify a custom set of information. For an HTML or
PDF report, you can also use a Tenable-provided report with preconfigured filters. For more inform-
ation, see Create a Scan Report.
Allows Cus-
Format Description
tomization?
Exports
Nessus A .nessus file in XML format that contains the list of tar- No
gets, policies defined by the user, and scan results. Nes-
sus strips the password credentials so they are not
exported as plain text in the XML. If you import a .nessus
file as a policy, you must re-apply your passwords to any
credentials.
Reports
CSV A CSV export that you can use to import into many Yes
external programs such as databases, spreadsheets, and
more.
- 448 -
Export a Scan
You can export a scan from one Tenable Nessus scanner and import it to a different Tenable Nes-
sus scanner. This helps you manage your scan results, compare reports, back up reports, and facil-
itates communication between groups within an organization. For more information, see Import a
Scan and Import a Policy.
You can export scan results as a Tenable Nessus file or as a Tenable Nessus DB file. For more
information, see Scan Exports and Reports.
For Tenable Nessus files, if you modified scan results using plugin rules or by modifying a vul-
nerability (for example, you hid or changed the severity of a plugin), the exported scan does not
reflect these modifications.
To export a scan:
2. Click a scan.
4. From the drop-down box, select the format in which you want to export the scan results.
l If you select Tenable Nessus, Tenable Nessus exports the .nessus XML file.
l If you select Tenable Nessus DB, the Export as Tenable Nessus DB dialog box appears.
When you import the Tenable Nessus DB file to another scanner, you must enter
this password.
b. Click Export.
l If you select Policy, Tenable Nessus exports an informational JSON file that contains the
scan policy details.
- 449 -
l If you select Timing Data, Tenable Nessus exports an information CSV file that contains
the scan hostname, IP, FQDN, scan start and end times, and the scan duration in
seconds.
- 450 -
Create a Scan Report
You can create a scan report to help you analyze the vulnerabilities and remediations on affected
hosts. You can create a scan report in PDF, HTML, or CSV format, and customize it to contain only
certain information.
When you create a scan report, it includes the results that are currently visible on your scan results
page. You can also select certain hosts or vulnerabilities to specify your report.
2. Click a scan.
3. (Optional) To create a scan report that includes specific scan results, do the following:
l In the Hosts tab, select the check box in each row of a host you want to include in the
scan report.
l In the Vulnerabilities tab, select the check box in each row of each vulnerability or vul-
nerability group that you want to include in the scan report.
Note: You can make selections in either Hosts or Vulnerabilities, but not across both tabs.
5. From the drop-down box, select the format in which you want to export the scan results.
CSV
- 451-
a. Select the check boxes for the columns you want to appear in the CSV report.
Tip: To select all columns, click Select All. To clear all columns, click Clear. To reset columns
to the system default, click System.
b. (Optional) To save your current configuration as the default for CSV reports, select the
Save as default check box.
a. Select Custom.
l Data —Select the scan result sections you want Tenable Nessus to include in
the report: Vulnerabilities, Remediations, and Compliance (only for scans
with compliance scans).
- 452 -
l Group Vulnerabilities By —From the drop-down box, select whether the
report groups vulnerabilities by Host or Plugin.
HTML
a. Select Custom.
- 453 -
l Data —Select the scan result sections you want Tenable Nessus to include in
the report: Vulnerabilities, Remediations, and Compliance (only for scans
with compliance scans).
- 454 -
Customize Report Title and Logo
In Tenable Nessus, you can customize the title and logo that appear on each report. This allows you
to prepare reports for different stakeholders.
3. In the Custom Name box, type the name that you want to appear on the report.
What to do next:
l Create a Scan Report
- 455 -
Policies
A policy is a set of predefined configuration options related to performing a scan. After you create a
policy, you can select it as a template when you create a scan.
Note: For information about default policy templates and settings, see Scan Templates.
Policy Characteristics
l Parameters that control technical aspects of the scan such as timeouts, number of hosts,
type of port scanner, and more.
l Credentials for local scans (for example, Windows, SSH), authenticated Oracle database
scans, HTTP, FTP, POP, IMAP, or Kerberos based authentication.
- 456 -
l Database compliance policy checks, report verbosity, service detection scan settings, Unix
compliance checks, and more.
l Offline configuration audits for network devices, allowing safe checking of network devices
without needing to scan the device directly.
l Windows malware scans which compare the MD5 checksums of files, both known good and
malicious files.
- 457 -
Create a Policy
1. In the top navigation bar, click Scans.
- 458 -
Import a Policy
You can import an exported Tenable Nessus (.nessus) scan or policy and import it as a policy. You
can then view and modify the configuration settings for the imported policy. You cannot import a
Nessus DB file as a policy.
To import a policy:
4. Browse to and select the scan file that you want to import.
- 459 -
Modify Policy Settings
A standard user or administrator can perform this procedure.
3. In the policies table, select the check box on the row corresponding to the policy that you
want to configure.
5. Click Configure.
- 460 -
Delete a Policy
This procedure can be performed by a standard user or administrator.
3. On the policies table, on the row corresponding to the policy that you want to delete, click the
button.
These programs are called plugins. Tenable writes plugins in the Tenable Nessus proprietary script-
ing language called Tenable Nessus Attack Scripting Language (NASL).
Plugins contain vulnerability information, a generic set of remediation actions, and the algorithm to
test for the presence of the security issue.
Tenable Nessus supports the Common Vulnerability Scoring System (CVSS) and supports both v2
and v3 values simultaneously. If both CVSS2 and CVSS3 attributes are present, Tenable Nessus cal-
culates both scores. However in determining the Risk Factor attribute, currently the CVSS2 scores
take precedence.
Tenable Nessus also uses plugins to obtain configuration information from authenticated hosts,
which Tenable Nessus uses for configuration audit purposes against security best practices.
To view plugin information, see a list of newest plugins, view all Tenable Nessus plugins, and search
for specific plugins, see the Tenable Nessus Plugins home page.
- 461-
Example plugin information
- 462 -
How do I get Tenable Nessus plugins?
By default, Tenable Nessus automatically updates plugins and checks for updated components and
plugins every 24 hours.
During the Product Registration portion of the Browser Portion of the Tenable Nessus install, Ten-
able Nessus downloads all plugins and compiles them into an internal database.
You can also use the nessuscli fetch —register command to download plugins manually. For
more details, see the Command Line section of this guide.
Optionally, during the Registration portion of the Browser Portion of the Tenable Nessus install, you
can choose the Custom Settings link and provide a hostname or IP address to a server which hosts
your custom plugin feed.
- 463 -
How do I update Tenable Nessus plugins?
By default, Tenable Nessus checks for updated components and plugins every 24 hours. Altern-
atively, you can update plugins manually from the Scanner Settings Page in the user interface.
You can also use the nessuscli update --plugins-only command to update plugins manually.
For more details, see the Command Line section of this guide.
- 464 -
Create a Limited Plugin Policy
1. In the top navigation bar, click Scans.
The list of plugin families appears, and by default, Tenable Nessus enables all the plugin fam-
ilies.
- 465 -
Tenable Nessus disables all the plugin families.
Tip: To enable or disable all plugins quickly, click the Enable All and Disable All buttons in the upper
right corner. If you only need to enable one or a few individual plugins, Tenable recommends dis-
abling all plugins. Then, you can select individual plugins as described in step 8.
- 466 -
8. For each plugin that you want to enable, click the Disabled button.
- 467 -
Tip: You can search for plugins and plugin families using the Filter option in the upper right corner.
This can help you search fro individual plugins in large plugin families more quickly. For example, if
you need to find an individual plugin, set the filter to Match All of the following: Plugin ID
is equal to <plugin ID>. For more information, see Search and Filter Results.
- 468 -
Install Plugins Manually
You can manually update plugins on an offline Tenable Nessus system in two ways: the user inter-
face or the command-line interface.
Note: You cannot use this procedure to update Tenable Vulnerability Management or Tenable Security
Center-managed scanners.
1. On the offline system running Nessus (A), in the top navigation bar, click Settings.
4. In the Manual Software Update dialog box, select Upload your own plugin archive, and then
select Continue.
5. Navigate to the compressed TAR file you downloaded, select it, then click Open.
2. Use the nessuscli update <tar.gz filename> command specific to your operating sys-
tem.
Platform Command
- 469 -
Platform Command
name>
- 470 -
Plugin Rules
Plugin rules allow you to re-prioritize the severity of plugin results to better account for your organ-
ization’s security posture and response plan.
The Plugin Rules page allows you to hide or change the severity of any given plugin. In addition, you
can limit rules to a specific host or specific timeframe. From this page you can view, create, edit,
and delete your rules.
Option Description
Host The host that the plugin rule applies to. You can enter a single IP address or
DNS address, or you can leave the box blank to apply the rule to all hosts.
The Host option must follow the same formatting as the Designate hosts by
their DNS name setting. In other words, if you disabled the setting, enter an IP
address for Host. If you have the setting enabled, enter a DNS address for
Host.
Note: If the plugin is enabled in two different scan configurations that have con-
flicting Designate hosts by their DNS name settings, Tenable recommends creating
two separate plugin rules for the plugin: one rule for the IP address, and one rule
for the DNS address.
Expiration (Optional) The date on which the plugin rule ages out.
Date
Severity The severity that Nessus assigns the plugin while the plugin rule is active.
- 471-
Expiration Date: 12/ 31/ 2022
Severity: Low
This example rule applies to scans performed on IP address 192.168.0.6. Once saved, this plugin rule
changes the default severity of plugin ID 79877 (CentOS 7: rpm (CESA-2014:1976) to a severity of low
until 12/ 31/ 2022. After 12/ 31/ 2022, the results of plugin ID 79877 returns to its critical severity.
- 472 -
Create a Plugin Rule
1. In the top navigation bar, click Scans.
- 473 -
Modify a Plugin Rule
A standard user or administrator can perform this procedure.
3. On the plugin rules table, select the plugin rule that you want to modify.
- 474 -
Delete a Plugin Rule
A standard user or administrator can perform this procedure.
3. On the plugin rules table, in the row for the plugin that you want to modify, click the button.
A dialog box appears, confirming your selection to delete the plugin rule.
- 475 -
Sensors (Tenable Nessus Manager)
In Tenable Nessus Manager, you can manage linked agents and scanners from the Sensors page.
l Filter Agents
l Export Agents
l Unlink an Agent
l Manage Clustering
l Remove a Scanner
Agents
Agents increase scan flexibility by making it easy to scan assets without needing ongoing host cre-
dentials or assets that are offline. Additionally, agents enable large-scale concurrent scanning with
little network impact.
Once linked, you must add an agent to an agent group to use when configuring scans. Linked agents
automatically download plugins from the manager upon connection. Agents are automatically
unlinked after a period of inactivity.
- 476 -
Note: Agents must download plugins before they return scan results. This process can take several
minutes.
l Filter Agents
l Export Agents
l Unlink an Agent
- 477 -
Agent groups
You can use agent groups to organize and manage the agents linked to your scanner. You can add
each agent to any number of groups and you can configured scans to use these groups as targets.
Note: Agent group names are case-sensitive. When you link agents using System Center Configuration Man-
ager (SCCM) or the command line, you must use the correct case.
- 478 -
Freeze windows
Freeze windows allow you to schedule times where Tenable Nessus suspends certain activities for
all linked agents.
- 479 -
Agent clustering
With Tenable Nessus Manager clustering, you can deploy and manage large numbers of agents from
a single Tenable Nessus Manager instance.
- 480 -
Modify Agent Settings
In Tenable Nessus Manager, you can configure global agent settings to specify agent settings for all
your linked agents. You can configure advanced settings for individual agents remotely. You can
also set up agent freeze windows.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
c. Click Save.
l To modify agent freeze window settings, see Modify Global Freeze Window Settings.
- 481-
Global Agent Settings
The following table describes the global agent settings you can configure in Tenable Nessus Man-
ager:
Option Description
Manage Agents
Track unlinked agents When this setting is enabled, agents that are unlinked
without manual intervention (due to an inactivity timeout)
are preserved in the manager along with the cor-
responding agent data. This option can also be set using
the nessuscli utility.
Unlink inactive agents after X Specifies the number of days an agent can be inactive
days before the manager unlinks the agent.
Remove agents that have been Specifies the number of days an agent can be inactive
inactive for X days before the manager removes the agent.
Remove bad agents When this setting is enabled, agents with one or more of
the following criteria are removed from Tenable Nessus
Manager:
- 482 -
Option Description
Freeze Windows
- 483 -
Remote Agent Settings
All agent advanced settings can be set via the agent's command line interface, as described in
Advanced Settings in the Tenable Nessus Agent Deployment and User Guide. However, you can
modify some settings remotely via Tenable Nessus Manager.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
2. In the linked agents table, click the row for the agent you want to modify.
4. In the settings table, click the remote setting you want to modify.
For setting and value descriptions, see Advanced Settings in the Tenable Nessus Agent
Deployment and User Guide.
l To save and immediately apply the setting, click Save and Apply.
Note: For some settings, applying the setting requires an agent soft (backend) restart or full
service restart.
l To save the setting but not yet apply settings, click the Save button.
Note: For the setting to take effect on the agent, you must apply the setting. In the banner
that appears, click Apply all changes now. For some settings, applying the setting requires an
agent soft (backend) restart or full service restart.
- 484 -
Filter Agents
Use this procedure to filter agents in Tenable Nessus Manager.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
3. Configure the filters as necessary. For more information, see Agent Filters.
4. Click Apply.
Tenable Nessus Manager filters the list of agents to include only those that match your con-
figured options.
Agent Filters
Parameter Operator Expression
IP Address is equal to In the text box, type the IPv4 or IPv6 addresses on which you
want to filter.
is not equal
to
contains
does not
contain
Last Con- earlier than In the text box, type the date on which you want to filter.
nection
later than
Last Plugin
on
Update
not on
Last Scanned
- 485 -
Parameter Operator Expression
Member of is equal to From the drop-down list, select from your existing agent
Group groups.
is not equal
to
Name is equal to In the text box, type the agent name on which you want to fil-
ter.
is not equal
to
contains
does not
contain
Platform contains In the text box, type the platform name on which you want to
filter.
does not
contain
Status is equal to In the drop-down list, select an agent status. For more
information, see Agent Status in the Tenable Nessus Agent
is not equal
Deployment and User Guide.
to
Version is equal to In the text box, type the version you want to filter.
is not equal
to
contains
does not
contain
- 486 -
Export Agents
2. (Optional) Click the Filter button to apply a filter to the agents list.
3. In the upper right corner, click Export. If a drop-down appears, click CSV.
The agents.csv file exported from Tenable Nessus Manager contains the following data:
Field Description
Status The status of the agent at the time of export. Possible values are unlinked,
online, or offline.
Last Plugin The date (in ISO-8601format) the agent's plugin set was last updated.
Update
Last Scanned The date (in ISO-8601format) the agent last performed a scan of the host.
- 487 -
Download Linked Agent Logs
As an administrator in Tenable Nessus Manager, you can request and download a log file containing
logs and system configuration data from any of your managed scanners and agents. This inform-
ation can help you troubleshoot system problems, and also provides an easy way to gather data to
submit to Tenable Support.
You can store a maximum of five log files from each agent in Tenable Nessus Manager. Once the
limit is reached, you must remove an old log file to download a new one.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
2. In the agents table, click the agent for which you want to download logs.
Note: If you have reached the maximum of five log files, the Request Logs button is disabled.
Remove an existing log before downloading a new one.
Tenable Nessus Manager requests the logs from the agent the next time it checks in, which
may take several minutes. You can view the status of the request in the user interface until
the download is complete.
l In the row of the log you want to remove, click the button.
- 488 -
l In the row of the pending or failed log download that you want to cancel, click the button.
- 489 -
Unlink an Agent
When you unlink an agent manually, the agent disappears from the Tenable Nessus Agents page,
but the system retains related data for the period of time specified in agent settings. When you
unlink an agent manually, the agent does not automatically relink to Tenable Nessus Manager.
Tip: You can configure agents to unlink automatically if they are inactive for some days, as described in
agent settings.
a. In the agents table, in the row for the agent that you want to unlink, click the button.
a. In the agents table, select the check box in each row for each agent you want to unlink.
Note: The Unlink button does not show in the drop down menu if none of the agents you selec-
ted are linked.
- 490 -
4. Click the Unlink button.
- 491-
Agent Groups
You can use agent groups to organize and manage the agents linked to Tenable Nessus Manager.
You can add an agent to more than one group, and configure scans to use these groups as targets.
Tenable recommends that you size agent groups appropriately, particularly if you are managing
scans in Tenable Nessus Manager and then importing the scan data into Tenable Security Center.
You can size agent groups when you manage agents in Tenable Nessus Manager.
The more agents that you scan and include in a single agent group, the more data that the manager
must process in a single batch. The size of the agent group determines the size of the .nessus file
that you must import into Tenable Security Center. The .nessus file size affects hard drive space
and bandwidth.
- 492 -
Create a New Agent Group
You can use agent groups to organize and manage the agents linked to your account. You can add
an agent to more than one group, and configure scans to use these groups as targets.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
4. In the Name box, type a name for the new agent group.
5. Click Add.
Tenable Nessus Manager adds the agent group and it appears in the table.
What to do next:
l Configure user permissions for the agent group.
- 493 -
Configure User Permissions for an Agent Group
You can share an agent group with other users or user groups in your organization.
l No access —(Default user only) The user or user group cannot add the agent group to an
agent scan. If a user or user group with this permission attempts to launch an existing scan
that uses the agent group, the scan fails.
l Can use —The user or user group can add the agent group to an agent scan and can launch
existing scans that use the agent group.
Use this procedure to configure permissions for an agent group in Tenable Nessus Manager.
2. In the agent groups table, click the agent group for which you want to configure permissions.
Tip: Tenable recommends assigning permissions to user groups, rather than individual users, to min-
imize maintenance as individual users leave or join your organization.
l
Add permissions for a new user or user group:
a. In the Add users or groups box, type the name of a user or group.
Tenable Vulnerability Management adds the user to the permissions list, with a
default permission of Can Use.
- 494 -
l
Change the permissions for an existing user or user group:
Note: The Default user represents any users who have not been specifically added to the
agent group.
a. Next to the permission drop-down for the Default user, click the button.
c. Click Save.
l
Remove permissions for a user or user group:
l For the Default user, set the permissions to No Access.
l For any other user or user group, click the button next to the user or user group
for which you want to remove permissions.
5. Click Save.
Tenable Vulnerability Management saves the changes you made to the agent group.
- 495 -
Modify an Agent Group
Use this procedure to modify an agent group in Tenable Nessus Manager.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
a. In the row for the agent group that you want to modify, click the button.
b. In the Name box, type a new name for the agent group.
c. Click Save.
a. In the agent groups table, click the agent group you want to modify.
b. In the upper-right corner of the page, click the Add Agents button.
The Add Agents window appears. This window contains a table of available agents.
c. (Optional) In the Search box, type the name of an agent, then click Enter.
The table of agents refreshes to display the agents that match your search cri-
teria.
- 496 -
d. Click the check box next to each agent you want to add to the group.
e. Click Add.
a. In the agent groups table, click the agent group you want to modify.
The agent group details page appears. By default, the Group Details tab is active.
l For multiple agents, select the check box next to each, then click the
Remove button in the upper-right corner of the page.
a. In the agent groups table, click the agent group you want to modify.
- 497 -
Delete an Agent Group
Use this procedure to delete an agent group in Tenable Nessus Manager.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
3. In the row for the agent group that you want to delete, click the button.
- 498 -
Freeze Windows
Freeze windows allow you to schedule times when Tenable Nessus Manager suspends certain agent
activities for all linked agents. This activity includes:
- 499 -
Create a Freeze Window
Freeze windows allow you to schedule times where certain agent activities are suspended for all
linked agents. This activity includes:
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
5. Click Save.
The freeze window goes into effect and appears on the Freeze Windows tab.
- 500 -
Modify a Freeze Window
Use this procedure to modify a freeze window in Tenable Nessus Manager.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
3. In the freeze windows table, click the freeze window you want to modify.
- 501-
Delete a Freeze Window
Use this procedure to delete a freeze window in Tenable Nessus Manager.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
3. In the freeze window table, in the row for the freeze window that you want to delete, click the
button.
A dialog box appears, confirming your selection to delete the freeze window.
- 502 -
Modify Global Freeze Window Settings
In Tenable Nessus Manager, you can configure a permanent freeze window and global settings for
how freeze windows work on linked agents.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
Freeze Windows
Enforce a per- When enabled, Tenable Nessus Manager creates a permanent freeze
manent freeze window that prevents agents from updating software. The permanent
window sched- freeze window takes effect immediately after you save the settings
ule (step 5), and it overrides any other existing freeze windows.
Note: Disabling this setting is the only way to end the permanent freeze win-
dow.
The following freeze window settings also apply during the permanent
freeze window.
Prevent soft- When enabled, agents do not receive software updates during sched-
ware updates uled freeze windows.
Prevent plugin When enabled, agents do not receive plugin updates during scheduled
updates freeze windows.
Prevent agent When enabled, the system does not run agent scans during scheduled
scans freeze windows.
- 503 -
5. Click Save.
- 504 -
Clustering
With Tenable Nessus Manager clustering, you can deploy and manage large numbers of agents from
a single Tenable Nessus Manager instance. For Tenable Security Center users with over 10,000
agents and up to 200,000 agents, you can manage your agent scans from a single Tenable Nessus
Manager, rather than needing to link multiple instances of Tenable Nessus Manager to Tenable
Security Center.
A Tenable Nessus Manager instance with clustering enabled acts as a parent node to child nodes,
each of which manage a smaller number of agents. Once a Tenable Nessus Manager instance
becomes a parent node, it no longer manages agents directly. Instead, it acts as a single point of
access where you can manage scan policies and schedules for all the agents across the child
nodes. With clustering, you can scale your deployment size more easily than if you had to manage
several different Tenable Nessus Manager instances separately.
You are a Tenable Security Center user who wants to deploy 100,000 agents, managed by Tenable
Nessus Manager.
Without clustering, you deploy 10 Tenable Nessus Manager instances, each supporting 10,000
agents. You must manually manage each Tenable Nessus Manager instance separately, such as set-
ting agent scan policies and schedules, and updating your software versions. You must separately
link each Tenable Nessus Manager instance to Tenable Security Center.
With clustering, you use one Tenable Nessus Manager instance to manage 100,000 agents. You
enable clustering on Tenable Nessus Manager, which turns it into a parent node, a management
point for child nodes. You link 10 child nodes, each of which manages around 10,000 agents. You
can either link new agents or migrate existing agents to the cluster. The child nodes receive agent
scan policy, schedule, and plugin and software updates from the parent node. You link only the Ten-
able Nessus Manager parent node to Tenable Security Center.
Note: All Tenable Nessus nodes in a cluster must be on the same version (for example, using the clustering
example above, the Tenable Nessus Manager parent node and 10 children nodes need be on the same Ten-
able Nessus version). Otherwise, the cluster deployment is unsupported.
Definitions
- 505 -
Parent node —The Tenable Nessus Manager instance with clustering enabled, which child nodes
link to.
Child node —A Tenable Nessus instance that acts as a node that Tenable Nessus Agents connect
to.
Tenable Nessus Manager cluster —A parent node, its child nodes, and associated agents.
l Enable Clustering
l Link a Node
l Rebalance Nodes
l Delete a Node
l Cluster Groups
Note: All Tenable Nessus nodes in a cluster must be on the same Tenable Nessus version. Otherwise, the
cluster deployment is unsupported.
- 506 -
Parent Node (Tenable Nessus Manager with Clustering Enabled)
Note: The amount of disk space needed depends on how many agent scan results you keep and for how
long. For example, if you run a single 5,000 agent scan result once per day and keep scan results for seven
days, the estimated disk space used is 35 GB. The disk space required per scan result varies based on the
consistency, number, and types of vulnerabilities detected.
l Disk: Estimated minimum of 5 GB per 5000 agents per scan per day
l CPU: 8 core minimum for all implementations, with an additional 8 cores for every three child
nodes
l RAM: 16 GB minimum for all implementations, with an additional 4 GB for every additional child
node
- 507 -
Child Node (Tenable Nessus Scanner Managed by Tenable Nessus
Manager Parent Node)
Note: Disk space is used to store agent scan results temporarily, both individual and combined, before
uploading the results to the parent node.
l CPU: 4 cores
l RAM: 16 GB
l CPU: 8 cores
l RAM: 32 GB
- 508 -
Agents
Linked agents must be on a supported Tenable Nessus Agent version.
- 509 -
Enable Clustering
When you enable clustering on Tenable Nessus Manager it becomes a parent node. You can then
link child nodes, each of which manages Tenable Nessus Agents. Once you enable clustering on a
parent node, you cannot undo the action and turn Tenable Nessus Manager into a regular scanner or
Tenable Nessus Agent manager.
Note: To enable Tenable Nessus Manager clustering in Tenable Nessus 8.5.x or 8.6.x, you must contact
your Tenable representative. In Tenable Nessus Manager 8.7.x and later, you can enable clustering using
the following procedure.
Note: All Tenable Nessus nodes in a cluster must be on the same version. Otherwise, the cluster deploy-
ment is unsupported.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
The Cluster Setup page appears and displays the Settings tab.
Caution: Once you enable clustering on a parent node, you cannot undo the action and turn Tenable
Nessus Manager into a regular scanner or Tenable Nessus Agent manager.
4. Click Save.
What to do next:
l Link child nodes to the parent node.
- 510 -
Migrate Agents to a Cluster
If you have a non-clustered instance of Tenable Nessus Manager with linked agents, you can
migrate the linked agents to an existing cluster. After the agents successfully migrate to the
cluster, the agents are then unlinked from their original Tenable Nessus Manager. Any agents that
did not successfully migrate remain linked to the original Tenable Nessus Manager. The original Ten-
able Nessus Manager remains as a Tenable Nessus Manager instance and does not become part of
the cluster.
l Get the linking key from the Tenable Nessus Manager parent node for the cluster you want the
agents to migrate to.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
The Cluster Setup page appears and displays the Settings tab.
l Parent Node Hostname —Type the hostname or IP address of the Tenable Nessus Man-
ager parent node of the cluster to which you are migrating.
l Parent Node Port —Type the port for the specified parent node host. The default is
8834.
- 511-
l Parent Node Linking Key —Paste or type the linking key that you copied from the Ten-
able Nessus Manager parent node, as described in Get Linking Key from Node.
l Enable Agent Migration —Select this check box to migrate agents to the cluster. Disable
the check box to stop migrating agents, if agents are currently in the process of migrat-
ing.
6. Click Save.
Tenable Nessus Manager begins or stops migrating agents to the cluster, depending on
whether you have selected Enable Agent Migration.
What to do next:
Log in to the Tenable Nessus Manager parent node to manage linked Tenable Nessus Agents.
- 512 -
Link Agents to a Cluster
Depending on your cluster group configuration, you can link an agent to a parent node or a child
node. Usually, Tenable recommends linking to a parent node. However, linking to a child node may
be helpful if you have geographically distributed cluster groups and want to ensure that an agent is
linked to a particular cluster group.
In this scenario, the agent links to the cluster's parent node, receives a list of child nodes, and
attempts to connect to a child node within the cluster.
2. At the agent command prompt, use the command nessuscli agent link with the sup-
ported arguments to link to the parent node.
For example:
Linux:
macOS:
- 513 -
Windows:
To view a list of the supported agent-linking arguments, see Nessus CLI Agent Commands
In this scenario, the agent links to a child node in a specific cluster group and receives a list of all
the child nodes within that cluster group. The agent then attempts to connect to a child node within
the cluster group.
2. At the agent command prompt, use the command nessuscli agent link with the sup-
ported arguments to link to the child node.
For example:
Linux:
macOS:
Windows:
- 514 -
--name=WindowsAgent --groups=All --host=yourcompany.com --port=8834
To view a list of the supported agent-linking arguments, see Nessus CLI Agent Commands
- 515 -
Manage Nodes
To manage cluster nodes, see the following:
l Link a Node
l Rebalance Nodes
l Delete a Node
- 516 -
Get Linking Key from Node
You need the linking key from the cluster parent node to link child nodes or migrate agents to the
cluster. Similarly, you need the linking key from the cluster child node to link an agent to the child
node directly.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
What to do next:
l Link a child node to the cluster.
- 517 -
Link a Node
To link a child node to a cluster, you install an instance of Tenable Nessus as a cluster child node,
then configure the node to link to the parent node of the cluster.
Note: If cluster child nodes have automatic software updates disabled, you must manually update them to
Nessus 8.12 or later to use agent cluster groups. If cluster child nodes have automatic software updates
enabled, nodes can take up to 24 hours to update. To ensure correct linking and configuration, wait for all
child nodes to update to a supported Nessus version before configuring custom cluster groups. All child
nodes must be on the same Nessus version and operating system.
1. Install Tenable Nessus as described in the appropriate Install Tenable Nessus procedure for
your operating system.
3. Click Continue.
4. From the Managed by drop-down box, select Nessus Manager (Cluster Node).
5. Click Continue.
6. Create a Tenable Nessus administrator user account, which you use to log in to Tenable Nes-
sus:
7. Click Submit.
Tenable Nessus finishes the configuration process, which may take several minutes.
- 518 -
1. In the Tenable Nessus child node, use the administrator user account you created during ini-
tial configuration to sign in to Tenable Nessus.
The Agents page appears. By default, the Node Settings tab is open.
l Node Name —Type a unique name that identifies this Tenable Nessus child node on the
parent node.
l (Optional) Node Host —Type the hostname or IP address that Tenable Nessus Agents
should use to access the child node. If you do not provide a host node, Tenable Nessus
Agent uses the system hostname. If Tenable Nessus Agent cannot detect the hostname,
the link fails.
l (Optional) Node Port —Type the port for the specified host.
l Cluster Linking Key —Paste or type the linking key that you copied from the Tenable Nes-
sus Manager parent node.
l Parent Node Host —Type the hostname or IP address of the Tenable Nessus Manager
parent node to which you are linking.
l Parent Node Port —Type the port for the specified host. The default is 8834.
l (Optional) Use Proxy —Select the check box if you want to connect to the parent node
via the proxy settings set in Proxy Server.
5. Click Save.
The Tenable Nessus child node links to the parent node. Tenable Nessus logs you out of the
user interface and disables the user interface.
What to do next:
- 519 -
l Log in to the Tenable Nessus Manager parent node to manage linked Tenable Nessus Agents
and nodes.
l On the Tenable Nessus Manager parent node, manage cluster groups to organize your nodes
into groups that conform to your network topology. You must segment your network with
cluster groups when certain agents only have access to certain child nodes. By default, Nes-
sus assigns the node to the default cluster group.
- 520 -
View or Edit a Node
On Tenable Nessus Manager with clustering enabled, you can view the list of child nodes currently
linked to the parent node. Tenable Nessus assigns these child nodes to cluster groups. You can
view details for a specific node, such as its status, IP address, number of linked agents, software
information, and plugin set. If agents on the node are currently running a scan, a scan progress bar
appears.
You can edit a node's name or the maximum number of agents that can be linked to the child node.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
3. In the cluster groups table, click the row of a cluster group that contains child nodes.
5. In the Node Details tab, view detailed information for the selected node.
c. Click Save.
- 521-
l Node Name —Type a unique name to identify the node.
l Max Agents —Type the maximum number of agents that can be linked to the child node.
The default value is 10000 and the maximum value is 20000.
9. Click Save.
- 522 -
Enable or Disable a Node
If you disable a child node, its linked Tenable Nessus Agents relink to another available child node in
the same cluster group. If you re-enable a child node, Tenable Nessus Agents may become unevenly
distributed, at which point you can choose to Rebalance Nodes.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
3. In the cluster groups table, click the row of a cluster group that contains child nodes.
l To disable a node:
l To enable a node:
- 523 -
Rebalance Nodes
Tenable Nessus Agents may become unevenly distributed across child nodes for various reasons: a
child node or multiple child nodes may be temporarily unavailable, disabled, deleted, or recently
added. Events such as these negatively impact the cluster's performance. When the imbalance
passes a certain threshold, Tenable Nessus Manager gives you the option to rebalance child nodes.
This threshold is passed when one or both of the following criteria are met:
l 10% of your agents are not ideally distributed, based on your nodes' ideal capacity.
l A single node has at least 5% more agents than the node's ideal capacity.
Example:
Your organization has four nodes and 100 linked agents. To evenly distribute linked agents
across four nodes, Tenable Nessus Manager should assign each node 25% of the total linked
agents which, in this case, would be 25 linked agents per node.
Tenable Nessus Manager gives you the option to rebalance child nodes if either:
l Tenable Nessus Manager can redistribute 10% or more of your linked agents (in this
example, 10 linked agents or more) for better results. For example, if two of your nodes
have 20 linked agents and two of your nodes have 30 linked agents, Tenable Nessus Man-
ager would allow you to rebalance the nodes to reach the ideal 25-25-25-25 distribution.
l One of your nodes reaches 30% of its capacity (in this example, ~33 linked agents)
When you rebalance child nodes, Tenable Nessus Agents get redistributed more evenly across child
nodes within a cluster group. Tenable Nessus Agents unlink from an overloaded child node and
relink to a child node with more availability.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
- 524 -
3. In the cluster groups table, click the row of a cluster group.
Tenable Nessus Manager rebalances the Tenable Nessus Agent distribution across child
nodes.
- 525 -
Delete a Node
When you delete a child node, linked Tenable Nessus Agents eventually relink to another available
child node in the same cluster group. The agents may take longer to relink if you delete a node com-
pared to if you disable the node instead.
If the node you want to delete is the last node in a cluster group with linked agents, you must first
move those agents to a different cluster group. If you only want to disable a child node temporarily,
see Enable or Disable a Node.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
3. In the cluster groups table, click the row of a cluster group that contains child nodes.
4. In the row of the child node you want to delete, click the button.
- 526 -
Cluster Groups
Clusters are divided into cluster groups that allow you to deploy and link agents in a way that con-
forms to your network topology. For example, you could create cluster groups for different regions
of where your nodes and agents are physically located, which could minimize network traffic and
control where your agents' connections occur.
Cluster child nodes must belong to a cluster group, and can only belong to one cluster group at a
time. Agents in each cluster group only link to nodes in the same cluster group.
A cluster group is different from an agent group, which is a group of agents that you designate to
scan a target. You use cluster groups to manage the nodes that agents link to within a cluster.
To manage your cluster groups and their assigned nodes and agents, see the following:
- 527 -
Create a Cluster Group
By default, Tenable Nessus assigns new nodes and agents to the default cluster group. You can cre-
ate cluster groups that conform to your network topology. For example, you could create cluster
groups for different regions of where your nodes and agents are physically located, which could min-
imize network traffic and control where your agents' connections occur.
A cluster group is different from an agent group, which is a group of agents that you designate to
scan a target. You can use cluster groups to manage the nodes that agents link to within a cluster.
Note: If cluster child nodes have automatic software updates disabled, you must manually update them to
Nessus 8.12 or later to use agent cluster groups. If cluster child nodes have automatic software updates
enabled, nodes can take up to 24 hours to update. To ensure correct linking and configuration, wait for all
child nodes to update to a supported Nessus version before configuring custom cluster groups. All child
nodes must be on the same Nessus version and operating system.
5. Click Add.
What to do next:
l Add a Node to a Cluster Group
- 528 -
Add a Node to a Cluster Group
By default, Tenable Nessus assigns new linked nodes to the default cluster group. You can also add
a node to a different cluster group manually; for example, you could add nodes that are in a similar
location to the same cluster group. A node can only belong to one cluster group at a time.
When you move a node that belonged to another cluster group, any agents that were linked to that
node remain in their original cluster group and relink to another node in the original cluster group.
Note: If cluster child nodes have automatic software updates disabled, you must manually update them to
Nessus 8.12 or later to use agent cluster groups. If cluster child nodes have automatic software updates
enabled, nodes can take up to 24 hours to update. To ensure correct linking and configuration, wait for all
child nodes to update to a supported Nessus version before configuring custom cluster groups. All child
nodes must be on the same Nessus version and operating system.
l If you want to add a node to a cluster group other than the default cluster group, first Create a
Cluster Group.
3. In the cluster groups table, click the row of the cluster group to which you want to add a node.
The cluster group details page appears and shows the Cluster Nodes tab by default.
The Add Nodes window appears and shows the available nodes.
6. In the nodes table, select the check box next to each node you want to add.
- 529 -
Note: A node can only belong to one cluster group at a time. When you move a node that belonged
to another cluster group, any agents that were linked to that node remain in their original cluster
group and relink to another node in the original cluster group.
7. Click Add.
What to do next:
l Add an Agent to a Cluster Group
- 530 -
Add an Agent to a Cluster Group
By default, Tenable Nessus assigns new agents to the default cluster group. You can also add
agents to a different cluster group manually; for example, you could add agents that are in a similar
location to the same cluster group. An agent can only belong to one cluster group at a time.
When you add an agent to a cluster group, the agent relinks to an available node in the cluster
group.
l Ensure the cluster group you want to add an agent to has at least one node, as described in
Add a Node to a Cluster Group.
3. In the cluster groups table, click the row of the cluster group to which you want to add an
agent.
The cluster group details page appears and shows the Cluster Nodes tab by default.
7. In the agents table, select the check box next to each agent you want to add.
Note: Agents can only belong to one cluster group at a time. If you move the agent to a different
group, it relinks to an available node in the new cluster group.
- 531-
8. Click Add.
- 532 -
Move an Agent to a Cluster Group
By default, Tenable Nessus assigns new agents to the default cluster group. You can manually add
agents to a different cluster group; for example, you could add agents that are in a similar location
to the same cluster group. An agent can only belong to one cluster group at a time.
When you move an agent to a cluster group, the agent relinks to an available node in the cluster
group. There may be a mismatch in the number of agents listed for the cluster group and actual
usage when an agent is moving or relinking.
l Ensure the cluster group you want to add an agent to has at least one node, as described in
Add a Node to a Cluster Group.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
4. In the cluster groups table, click the row of the cluster group that contains the agent you want
to move.
The cluster group details page appears and shows the Cluster Nodes tab by default.
6. In the agents table, select the check box for each agent that you want to move to a different
cluster group.
- 533 -
The Move Agent window appears.
8. In the drop-down box, select the cluster group to which you want to move the agent.
Note: Agents can only belong to one cluster group at a time. If you move the agent to a different
group, it relinks to an available node in the new cluster group.
9. Click Move.
- 534 -
Move a Node to a Cluster Group
By default, Tenable Nessus assigns new linked nodes to the default cluster group. You can manually
add a node to a different cluster group; for example, you could add nodes that are in a similar loc-
ation to the same cluster group. A node can only belong to one cluster group at a time.
When you move a node that belonged to another cluster group, any agents that were linked to that
node remain in their original cluster group and relink to another node in the original cluster group.
l If you want to move a node to a cluster group other than the default cluster group, first Create
a Cluster Group.
3. In the cluster groups table, click the row of the cluster group that contains the agent you want
to move.
The cluster group details page appears and shows the Cluster Nodes tab by default.
4. In the cluster nodes table, select the check box for each node that you want to move to a dif-
ferent cluster group.
Note: If there are agents assigned to the cluster group, you must leave at least one node in the
cluster group.
6. In the drop-down box, select the cluster group to which you want to move the node.
- 535 -
Note: A node can only belong to one cluster group at a time. When you move a node that belonged
to another cluster group, any agents that were linked to that node remain in their original cluster
group and relink to another node in the original cluster group.
7. Click Move.
Tenable Nessus Manager moves the node to the selected cluster group.
- 536 -
Modify a Cluster Group
You can edit a cluster group name or set a cluster group as the default cluster group. Tenable Nes-
sus assigns the new linked nodes to the default cluster group.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
4. In the cluster groups table, in the row of the cluster group you want to modify, click the but-
ton.
l Set as Default —Select this check box to set this cluster group as the default cluster
group that Tenable Nessus adds new linked nodes to.
6. Click Save.
- 537 -
Delete a Cluster Group
You can delete a cluster group that does not have any assigned nodes or agents. You cannot delete
the default cluster group. To change the default cluster group, see Modify a Cluster Group.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
4. In the cluster groups table, in the row of the cluster group you want to delete, click the but-
ton.
5. To confirm that you want to delete the cluster group, click Delete.
- 538 -
Scanners
In Tenable Nessus Manager, you can view the instance's linking key and a list of linked remote scan-
ners. You can click on a linked scanner to view details about that scanner.
Scanners are identified by scanner type and indicate whether the scanner has Shared permissions.
You can link remote scanners to Nessus Manager with the Linking Key or valid account credentials.
Once linked, you can manage scanners locally and select them when configuring scans.
l Remove a Scanner
- 539 -
Link Nessus Scanner
To link your Tenable Nessus scanner during initial installation, see Configure Nessus.
If you choose not to link the scanner during initial installation, you can link Tenable Nessus scanner
later. You can link a Tenable Nessus scanner to a manager such as Tenable Nessus Manager or Ten-
able Vulnerability Management.
Note: You cannot link to Tenable Security Center from the user interface after initial installation. If your
scanner is already linked to Tenable Security Center, you can unlink and then link the scanner to Tenable
Vulnerability Management or Tenable Nessus Manager, but you cannot relink to Tenable Security Center
from the interface.
1. In the user interface of the manager you want to link to, copy the Linking Key, found on the fol-
lowing page:
l Tenable Vulnerability Management: Settings > Sensors > Linked Scanners > Add Nes-
sus Scanner
2. In the Tenable Nessus scanner you want to link, in the top navigation bar, click Settings.
4. Fill out the linking settings for your manager as described in Remote Link.
5. Click Save.
- 540 -
Unlink Nessus Scanner
You can unlink your Tenable Nessus scanner from a manager so that you can relink it to another
manager.
Note: You cannot link to Tenable Security Center from the user interface after initial installation. If your
scanner is already linked to Tenable Security Center, you can unlink and then link the scanner to Tenable
Vulnerability Management or Tenable Nessus Manager, but you cannot relink to Tenable Security Center
from the interface.
1. In the Tenable Nessus scanner you want to unlink, in the top navigation bar, click Settings.
4. Click Save.
What to do next
l If you unlinked Tenable Nessus from Tenable Security Center, delete the scanner from Ten-
able Security Center.
- 541-
Enable or Disable a Scanner
A standard user or administrator in Tenable Nessus Manager can perform this procedure.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
3. In the scanners table, in the row for the scanner that you want to enable, hover over the
button, which becomes .
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
3. In the scanners table, in the row for the scanner that you want to disable, hover over the
button, which becomes .
- 542 -
Remove a Scanner
An administrator can perform the following procedure in Tenable Nessus Manager.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
l In the scanners table, in the row for the scanner that you want to remove, click the
button.
a. In the scanners table, select the check box in the row for each scanner that you
want to remove.
- 543 -
Download Managed Scanner Logs
As an administrator in Tenable Nessus Manager, you can request and download a log file containing
logs and system configuration data from any of your managed scanners and Tenable Nessus
Agents. This information can help you troubleshoot system problems, and also provides an easy way
to gather data to submit to Tenable Support.
You can store a maximum of five log files from each managed scanner in Tenable Nessus Manager.
Once the limit is reached, you must remove an old log file to download a new one.
Note: You can only request logs from Nessus scanners running 8.1and later.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
The Scanners page appears and displays the linked scanners table.
3. In the linked scanners table, click the scanner for which you want to download logs.
Note: If you have reached the maximum of five log files, the Request Logs button is disabled.
Remove an existing log before downloading a new one.
Tenable Nessus Manager requests the logs from the managed scanner the next time it checks
in, which may take several minutes. You can view the status of the request in the user inter-
face until the download is complete.
- 544 -
l In the row of the log you want to remove, click the button.
l In the row of the pending or failed log download that you want to cancel, click the button.
- 545 -
Settings
l About
l Advanced
l Proxy Server
l Remote Link
l SMTP Server
l Custom CA
l My Account
l Users
- 546 -
About
The About page shows an overview of Tenable Nessus licensing and plugin information. When you
access the product settings, the About page appears. By default, Tenable Nessus shows the Over-
view tab, which contains information about your Tenable Nessus instance, as described in the Over-
view table.
On the Software Update tab, you can set your automatic software update preferences or manually
update Tenable Nessus software.
Basic users cannot view the Software Update or Encryption Password tabs. Standard users can only
view the product version and basic information about the current plugin set.
To download logs, click the Download Logs button in the upper-right corner of the page. For more
information, see Download Logs.
Overview
Value Description
Last Updated The date on which the plugin set was last refreshed.
Note: For Tenable Nessus Professional 8.5 and later, you cannot run scans or
download new plugins after your license age outs. You can still access your system
and scan reports for 30 days after expiration.
Policy Tem- The ID of the current version of the policy template set.
plate Version
- 547 -
Value Description
Nessus Manager
Licensed The number of hosts you can scan, depending on your license.
Hosts
Licensed The number of scanners that you have licensed that are currently in use.
Scanners
Licensed The number of agents that you have licensed that are currently in use.
Agents
Last Updated The date on which the plugin set was last refreshed.
Policy Tem- The ID of the current version of the policy template set.
plate Version
- 548 -
Download Logs
As an administrator, you can download a log file containing local logs and system configuration data
for Tenable Nessus instance you are currently logged into. This information can help you
troubleshoot system problems, and also provides an easy way to gather data to submit to Tenable
Support.
You can choose to download two types of log files: Basic or Extended. The Basic option contains
recent Tenable Nessus log data and system information, including operating system version, CPU
statistics, available memory and disk space, and other data that can help you troubleshoot. The
Extended option also includes recent Tenable Nessus web server log records, system log data, and
network configuration information.
For information on managing individual Tenable Nessus log files, see Manage Logs.
To download logs:
1. In the top navigation bar, click Settings.
l Basic: Standard Tenable Nessus log data and system configuration information.
l Extended: All information in the Basic option, Tenable Nessus web server log data, and
more system logs.
4. (Optional) Select Sanitize IPs to hide the first two octets of IPv4 addresses in the logs.
5. Click Download.
- 549 -
Set an Encryption Password
If you set an encryption password, Nessus encrypts all policies, scans results, and scan con-
figurations. You must enter the password when Tenable Nessus restarts.
Caution: If you lose your encryption password, it cannot be recovered by an administrator or Tenable Sup-
port.
l Linux:
/opt/nessus/sbin/nessusd --set-encryption-passwd
l Windows:
l macOS:
/Library/Nessus/run/sbin/nessusd --set-encryption-passwd
- 550 -
Note: The password does not appear when you are typing.
/opt/nessus/sbin/nessusd --set-encryption-passwd
New password :
Again :
New password is set
Advanced Settings
The Advanced Settings page allows you to configure Tenable Nessus manually. You can configure
advanced settings from the Tenable Nessus user interface, or from the command-line interface.
Tenable Nessus validates your input values to ensure only valid configurations.
Tenable Nessus groups the advanced settings into the following categories:
l User Interface
l Scanning
l Logging
l Performance
l Security
l Cluster
l Miscellaneous
l Custom
Details
l Advanced settings apply globally across your Tenable Nessus instance.
l To configure advanced settings, you must use a Tenable Nessus administrator user account.
- 551-
l Tenable Nessus does not automatically update all advanced settings.
l Tenable Nessus indicates the settings that require restarting for the change to apply with the
icon.
- 552 -
User Interface
- 553 -
Setting Identifier Description Default Valid Values
Nessus Web xmlrpc_listen_ The port that the Ten- 8834 Integers
Server Port port able Nessus web
server listens on.
- 554 -
Setting Identifier Description Default Valid Values
- 555 -
Scanning
Valid
Setting Identifier Description Default
Values
Audit audit_ Controls verbosity of the plugin audit trail. full full,
Trail Verb- trail Full audit trails include the reason why Ten- par-
osity able Nessus did not include certain plugins tial,
in the scan. none
Auto auto_ Automatically activates the plugins that are yes yes or
Enable enable_ depended on by other plugins. The setting no
Plugin depend- does not enable plugins that are depended
Depend- encies on by scan template settings.
encies
If disabled, not all plugins may run despite
being selected in a scan policy.
CGI Paths cgi_path A colon-delimited list of CGI paths to use for / cgi- String
for Web web server scans. bin:/ scr-
Scans ipts
Max Plu- plugin_ The maximum size, in KB, of plugin output 1000 Integer-
gin Out- output_ that Tenable Nessus includes in the expor- s.
put Size max_ ted scan results with the .nessus format. If
If set
size_kb the output exceeds the maximum size, Ten-
to 0,
able Nessus truncates the output in the
there
report.
is no
limit.
- 556 -
Valid
Setting Identifier Description Default
Values
Nessus rules Location of the Tenable Nessus rules file Nessus String
Rules File (nessusd.rules). config
Location dir-
The following are the defaults for each oper-
ectory
ating system:
for your
Linux: oper-
/op- ating
t/nessus/etc/nessus/nessusd.rules system
macOS:
/Library/Nes-
sus/run-
/var/nessus/conf/nessusd.rules
Windows:
C:\Pro-
gramData\Ten-
able\Nes-
sus\nessus\conf\nessusd.rules
- 557 -
Valid
Setting Identifier Description Default
Values
Non-Sim- non_sim- Specifies ports against which two plugins 139, String
ultaneous ult_ports you cannot run simultaneously. 445,
Ports 3389
PCAP pcap.sna- The snapshot size used for packet capture; 0 Integer-
Snapshot plen the maximum size of a captured network s 0-
Length packet. Typically, Tenable Nessus sets this 262144
value automatically based on the scanner's
NIC. However, depending on your network
configuration, Tenable Nessus may truncate
the packages, resulting in the following mes-
sage in your scan report: "The current snap-
shot length of # # # for interface X is too
small." You can increase the length to avoid
packet truncation.
Port port_ The default range of ports that the scanner defaul- defau-
Range range plugins probe. t lt,
all, a
range
of
ports,
a
comm-
a-sep-
arated
list of
ports
and/ or
port
- 558 -
Valid
Setting Identifier Description Default
Values
ranges.
Spe-
cify
UDP
and
TCP
ports
by pre-
fixing
each
range
by T:
or U:.
Safe safe_ When enabled, Tenable Nessus uses safe yes yes or
Checks checks checks, which use banner grabbing rather no
than active testing for a vulnerability.
Silent Plu- silent_ When enabled, Tenable Nessus does not yes yes or
gin depend- include the list of plugin dependencies and no
Depend- encies their output in the report. You can select a
encies plugin as part of a policy that depends on
other plugins to run. By default, Tenable Nes-
sus runs those plugin dependencies, but
does not include their output in the report.
When disabled, Tenable Nessus includes
both the selected plugin and any plugin
- 559 -
Valid
Setting Identifier Description Default
Values
Slice Net- slice_net- If you set this option, Tenable Nessus does no yes or
work work_ not scan a network incrementally (10.0.0.1, no
Addresse- addresse- then 10.0.0.2, then 10.0.0.3, and so on) but
s s attempts to slice the workload throughout
the whole network (for example, it scans
10.0.0.1, then 10.0.0.127, then 10.0.0.2, then
10.0.0.128, and so on).
- 560 -
Logging
Log log_details When enabled, scan logs include the user- no yes or no
Addi- name, scan name, and current plugin name in
tional addition to the base information. You may
Scan not see these additional details unless you
Details also enable log_whole_attack.
Log log_ Logs verbose details of the scan. Helpful for no yes or no
Verbose whole_ debugging issues with the scan, but this may
Scan attack be disk intensive. To add more details,
Details enable log_details.
/op- oper-
t/nes- ating
sus/var/nessus/logs/nessusd.dump sys-
tem
macOS:
/Library/Nes-
sus/run/var/nessus/logs/nessusd.dump
Windows:
C:\Pro-
gramData\Ten-
able\Nessus\nessus\logs\nessusd.dump
Nessus nasl_log_ The type of NASL engine output in nes- nor- normal,
- 561-
Defaul- Valid Val-
Setting Identifier Description
t ues
Nessus backend_ The logging level of the backend.log log nor- l nor-
Log log_level file, as indicated by a set of log tags that mal mal
Level determine what information to include in the —
log. set-
s
If you manually edited log.json to set a cus-
log
tom set of log tags for backend.log, this
tag-
setting overwrites that content.
s to
For more information, see log.json Format.
lo-
g,
inf-
o,
war-
n,
err-
or,
tra-
ce
- 562 -
Defaul- Valid Val-
Setting Identifier Description
t ues
l deb-
ug
—
set-
s
log
tag-
s to
lo-
g,
inf-
o,
war-
n,
err-
or,
tra-
ce,
deb-
ug
l ver-
bos-
e—
set-
s
log
tag-
s to
lo-
g,
inf-
- 563 -
Defaul- Valid Val-
Setting Identifier Description
t ues
o,
war-
n,
err-
or,
tra-
ce,
deb-
ug,
ver-
bos-
e
Nessus logfile Location where Tenable Nessus stores its Nes- String
Scanner scanner log file. sus
Log log dir-
The following are the defaults for each oper-
Loca- ectory
ating system:
tion for
Linux: your
/op- oper-
t/nes- ating
sus/var/nessus/logs/nessusd.messages sys-
tem
macOS:
/Library/Nes-
sus/run-
/var/nessus/logs/nessusd.messages
Windows:
C:\Pro-
gramData\Ten-
able\Nes-
sus\nessus\logs\nessusd.messages
- 564 -
Defaul- Valid Val-
Setting Identifier Description
t ues
Log File logfile_rot Determines whether Tenable Nessus rotates size size —
Rota- messages log files based on maximum rota- Tenable
tion tion size or rotation time. Nessus
rotates
log files
based on
size, as
specified
in log-
file_
max_
size.
time —
Tenable
Nessus
rotates
log files
based on
time, as
specified
in log-
file_
rota-
tion_
time.
- 565 -
Defaul- Valid Val-
Setting Identifier Description
t ues
0x7f (full
data
including
plugin
metrics)
Note:
Includ-
ing plu-
gin
met-
rics
greatl-
y
increa-
ses
the
size of
the
log
file.
Ten-
able
Nes-
sus
does
not
auto-
mat-
ically
clean
up log
files.
- 566 -
Performance
Valid Val-
Setting Identifier Description Default
ues
NORMAL is faster,
with some risk of
data loss during
unexpected sys-
tem shutdowns
(for example, dur-
ing a power outage
or crash).
- 567 -
Valid Val-
Setting Identifier Description Default
ues
defer asyn-
chronous tasks to
these threads, and
this value controls
the maximum num-
ber of threads.
50000 for
other oper-
ating
systems
(for
example,
Windows
Server
- 568 -
Valid Val-
Setting Identifier Description Default
ues
2016).
- 569 -
Valid Val-
Setting Identifier Description Default
ues
engine.max_
hosts).
- 570 -
Valid Val-
Setting Identifier Description Default
ues
- 571-
Valid Val-
Setting Identifier Description Default
ues
- 572 -
Valid Val-
Setting Identifier Description Default
ues
- 573 -
Valid Val-
Setting Identifier Description Default
ues
running on a
shared machine,
setting this to low
uses considerably
less memory, but
has a moderate
performance
impact.
- 574 -
Valid Val-
Setting Identifier Description Default
ues
- 575 -
Security
- 576 -
Setting Identifier Description Default Valid Values
l modern - A list
of the latest and
most secure
ciphers. May not
be compatible
with older
browsers, such
as Internet
Explorer 11.
l custom - A cus-
tom OpenSSL
cipher list. For
more information
on valid cipher
list formats, see
the OpenSSL doc-
umentation.
l niap - A list of
ciphers that con-
forms to NIAP
standards.
- 577 -
Setting Identifier Description Default Valid Values
ECDHE-RSA-
AES128-
SHA256:ECDH-
E-RSA-
AES128-GCM-
SHA256:ECDH-
E-RSA-
AES256-
SHA384:ECDH-
E-RSA-
AES256-GCM-
SHA384
l tls_1_1 - TLS
v1.1+
l tls_1_2 - TLS
v1.2+
- 578 -
Agents & Scanners
Note: The following settings are only available in Tenable Nessus Manager.
- 579 -
Name Setting Description Default Valid Values
threshold.
Note: This
value must be
less than the
agent_auto_
delete_
threshold.
- 580 -
Name Setting Description Default Valid Values
scan is com-
plete.
If this setting is
set to false, the
Audit Trail Verb-
osity setting in
an individual
scan or policy
defaults to No
- 581-
Name Setting Description Default Valid Values
audit trail.
If this setting is
set to false, the
Include the KB
setting in an indi-
vidual scan or
policy defaults to
Exclude KB.
- 582 -
Name Setting Description Default Valid Values
corrupted scan
result in the
event of a crash.
For more details,
refer to the sql-
ite3 doc-
umentation.
- 583 -
Name Setting Description Default Valid Values
MAC addresses
of currently
linked agents
with the same
hostname, plat-
form, and distro.
Tenable Nessus
Manager deletes
duplicates that it
finds.
- 584 -
Cluster
Note: The following settings are only available in Tenable Nessus Manager with clustering enabled.
Agent Clus- agent_ Tenable Nessus aborts 3600 Integers > 299
tering Scan cluster_ scans after running this
Cutoff scan_cutoff many seconds without a
child node update.
- 585 -
Setting Identifier Description Default Valid Values
- 586 -
Miscellaneous
Valid Val-
Setting Identifier Description Default
ues
- 587 -
Valid Val-
Setting Identifier Description Default
ues
Child child_ Allows Tenable Nessus child nodes to none Any valid
Node Port node_ communicate to the parent node on a dif- port value
listen_ ferent port.
port
Java Heap java_ Determines Java heap size (the system auto auto or
Size heap_size memory used to store objects instan- Integers >
tiated by applications running on the 0
Java virtual machine) Tenable Nessus
uses when exporting PDF reports.
Nessus dbg_port The port on which nessusd listens for None String in
Debug ndbg client connections. If left empty, one of the
Port Tenable Nessus does not establish a following
debug port. formats:
port or loc-
alhost
:port or
ip:port
- 588 -
Valid Val-
Setting Identifier Description Default
ues
macOS: ating
system
/Library/Nes-
sus/run-
/etc/nessus/conf/nessusd.db
Windows:
C:\Pro-
gramData\Ten-
able\Nessus\conf\nessusd.db
Non-User report_ The age threshold (in days) for removing 30 Integers >
Scan Res- cleanup_ old system-user scan reports. 0
ult threshol-
Cleanup d_days
Threshold
Orphaned orphane- The number of days after which Tenable 30 Integers >
Scan His- d_scan_ Nessus removes orphaned scans. For 0
tory cleanup_ example, an orphaned scan could be a
Cleanup days scan executed via Tenable Security
Center that was not properly removed.
Packet packet_ The number of days after which Tenable 30 Integers >
Capture capture_ Nessus removes packet capture 0
Archive archive_ archives from the filesystem. If set to 0,
Cleanup cleanup_ Tenable Nessus does not perform a
- 589 -
Valid Val-
Setting Identifier Description Default
ues
days cleanup.
Send Tele- send_tele- When enabled, Tenable Nessus peri- yes yes or no
- 590 -
Valid Val-
Setting Identifier Description Default
ues
If set to 0,
Tenable
Nessus
retains
the his-
tory.
- 591-
Custom
Not all advanced settings are populated in the Tenable Nessus user interface, but you can set some
settings in the command-line interface. If you create a custom setting, it appears in the Custom
tab.
The following table lists the advanced settings that you can configure, even though Tenable Nessus
does not list them by default.
- 592 -
Identifier Description Default Valid Values
timeout.<plugin ID> Enter the plugin ID in place of <plu- None Integers 0-86400
gin ID>. The maximum time, in
- 593 -
Identifier Description Default Valid Values
- 594 -
Create a New Setting
1. In Tenable Nessus, in the top navigation bar, click Settings.
4. In the Name box, type the key for the new setting.
- 595 -
Modify a Setting
1. In the top navigation bar, click Settings.
3. In the settings table, click the row for the setting you want to modify.
- 596 -
Delete a Setting
1. In Tenable Nessus, in the top navigation bar, click Settings.
3. In the settings table, in the row for the setting you want to delete, click the button.
4. Click Delete.
- 597 -
LDAP Server (Tenable Nessus Manager)
In Tenable Nessus Manager, the LDAP Server page shows options that allow you to configure a
Lightweight Directory Access Protocol (LDAP) server to import users from your directory.
Setting Description
Port The LDAP server port. Confirm the selection with your LDAP server admin-
istrators.
Username The username for an account on the LDAP server with credentials to search
for user data.
Password The password for an account on the LDAP server with credentials to search
- 598 -
for user data.
Base DN The LDAP search base used as the starting point to search for the user data.
Show Click the Show advanced settings checkbox to show or hide the advanced
advanced set- LDAP settings.
tings
Username The attribute name on the LDAP server that contains the username for the
Attribute account. This is often specified by the string sAMAccountName in servers that
may be used by LDAP.
Email Attrib- The attribute name on the LDAP server that contains the email address for
ute the account. This is often specified by the string mail in servers that may be
used by LDAP.
Name Attrib- The attribute name on the LDAP server that contains the name associated
ute with the account. This is often specified by the string CN in servers that may
be used by LDAP.
CA (PEM The LDAP server's certificate authority (CA) certificate, if applicable. Enter the
Format) certificate in PEM format.
- 599 -
Configure an LDAP Server
1. In Tenable Nessus Manager, in the top navigation bar, click Settings.
Setting Description
Port The LDAP server port. Confirm the selection with your LDAP server
administrators.
Username The username for an account on the LDAP server with credentials to
search for user data.
Password The password for an account on the LDAP server with credentials to
search for user data.
Base DN The LDAP search base used as the starting point to search for the user
data.
Show Click the Show advanced settings checkbox to show or hide the
advanced set- advanced LDAP settings.
tings
Username The attribute name on the LDAP server that contains the username for
Attribute the account. This is often specified by the string sAMAccountName in
servers that may be used by LDAP.
- 600 -
Email Attrib- The attribute name on the LDAP server that contains the email address
ute for the account. This is often specified by the string mail in servers that
may be used by LDAP.
Name Attrib- The attribute name on the LDAP server that contains the name asso-
ute ciated with the account. This is often specified by the string CN in serv-
ers that may be used by LDAP.
4. (Optional) Click the Test LDAP Server button to verify the LDAP configuration you entered.
A message appears on the top-right corner of the page that confirms whether your LDAP con-
figuration is valid. If the configuration is not valid, review the settings and adjust them as
needed.
- 601-
Proxy Server
The Proxy Server page allows you to configure a proxy server. If the proxy you use filters specific
HTTP user agents, you can type a custom user-agent string in the User-Agent box. To configure a
proxy server, see Configure a Proxy Server.
Setting Description
Username The username for an account on the proxy server with credentials to search
for user data.
Password The password for an account on the proxy server with credentials to search
- 602 -
for user data.
Auth Method The authentication method Nessus uses to connect to the proxy server:
User-Agent The user agent for the proxy server, if your proxy requires a preset user agent.
- 603 -
Configure a Proxy Server
1. In Tenable Nessus, in the top navigation bar, click Settings.
Setting Description
Username The username for an account on the proxy server with credentials to
search for user data.
Password The password for an account on the proxy server with credentials to
search for user data.
Auth Method The authentication method Nessus uses to connect to the proxy server:
- 604 -
User-Agent The user agent for the proxy server, if your proxy requires a preset user
agent.
- 605 -
Remote Link
The Remote Link page allows you to link your Tenable Nessus scanner to a licensed Tenable Nessus
Manager or Tenable Vulnerability Management.
Note: You cannot link to Tenable Security Center from the user interface after initial installation. If your
scanner is already linked to Tenable Security Center, you can unlink and then link the scanner to Tenable
Vulnerability Management or Tenable Nessus Manager, but you cannot relink to Tenable Security Center
from the interface.
- 606 -
Option Set To
Scanner The name you want to use for this Tenable Nessus scanner.
Name
Manager The static IP address or hostname of the Tenable Nessus Manager instance
Host you want to link to.
Linking Key The key specific to your instance of Tenable Nessus Manager.
Use Proxy Select or deselect the check box depending on your proxy settings. If you
select Use Proxy, you must also configure:
Link to Tenable.io
Scanner cloud.tenable.com
Name
Linking Key The key specific to your instance of Tenable Vulnerability Management. The
key looks something like the following string:
2d38435603c5b59a4526d39640655c3288b00324097a08f7a93e5480940d1cae
Use Proxy Select or deselect the check box depending on your proxy settings. If you
select Use Proxy, you must also configure:
- 607 -
Option Set To
- 608 -
SMTP Server
The SMTP Server page allows you to configure a Simple Mail Transfer Protocol (SMTP) server. Once
you configure an SMTP server, Nessus can email HTML scan results to the list of recipients that you
specify in the scan settings.
Setting Description
From (sender The email address that shows as the sender in the scan results email.
email)
- 609 -
l Force SSL —Tenable Nessus forces SSL encryption for the email.
l Force TLS —Tenable Nessus forces TLS encryption for the email.
Hostname (for The hostname that shows for the sender host and port in the email.
email links)
Auth Method The authentication method Nessus uses to connect to the STMP server:
- 610 -
Configure an SMTP Server
1. In Tenable Nessus, in the top navigation bar, click Settings.
Setting Description
From (sender The email address that shows as the sender in the scan results
email) email.
Hostname (for The hostname that shows for the sender host and port in the email.
email links)
Auth Method The authentication method Nessus uses to connect to the STMP
server:
- 611-
l PLAIN —Tenable Nessus secures the connection with plain
(username/ password) authentication.
- 612 -
Custom CA
The Custom CA page shows a text box that you can use to upload a custom certificate authority
(CA) in Nessus. For more information, see Certificates and Certificate Authorities.
Note: Include the beginning text -----BEGIN CERTIFICATE----- and ending text -----END
CERTIFICATE-----.
Tip: You can save more than one certificate in a single text file, including the beginning and ending text for
each one.
- 613 -
Upgrade Assistant
The following feature is not supported in Federal Risk and Authorization Manage Program (FedRAMP) envir-
onments. For more information, see the FedRAMP Product Offering.
You can upgrade data from Tenable Nessus to Tenable Vulnerability Management via the Upgrade
Assistant tool.
For more information, see Nessus to Tenable Vulnerability Management Upgrade Assistant.
- 614 -
Password Management
The Password Management page allows you to set parameters for passwords, login notifications,
and the session timeout.
Session Timeout 30 The web session timeout in minutes. Tenable Nessus logs
(mins) users out automatically if their session is idle for longer
than this timeout value.
- 615 -
Setting Default Description
Login Noti- Off Login notifications allow the user to see the last suc-
fications cessful login and failed login attempts (date, time, and
IP), and if any failed login attempts have occurred since
the last successful login.
- 616 -
Configure Password Management
1. In Tenable Nessus, in the top navigation bar, click Settings.
Note: Changes to the Session Timeout and Max Login Attempts settings require a restart to take
effect.
Scanner Health
The Scanner Health page provides you with information about the performance of your Tenable Nes-
sus scanner. You can monitor real-time health and performance data to help troubleshoot scanner
issues. Scanner alerts provide information about system errors that may cause your scanner to mal-
function. Tenable Nessus updates the information every 30 seconds.
Tenable Nessus organizes the scanner health information into three categories: Overview, Network,
and Alerts.
- 617 -
Overview
Scanner Alerts Alerts about areas where your Tenable Nessus Click an alert to see
scanner performance may be suffering. Alerts more details.
can have a severity level of Info, Low, Medium, or
If there are more than
High.
five alerts, click More
Alerts to see the full list
of alerts.
Nessus Data Chart showing the percentage of free and used None
Disk Space disk space on the disk where you installed Ten-
able Nessus's data directory.
Memory Usage Graph showing how many MB of memory Tenable Hover over a point on
History Nessus used over time. the graph to see
detailed data.
CPU Usage Graph showing the percentage of CPU load Ten- Hover over a point on
History able Nessus used over time. the graph to see
detailed data.
Scanning His- Graph showing the number of scans Tenable Nes- Hover over a point on
tory sus ran and active targets Tenable Nessus the graph to see
scanned over time. detailed data.
- 618 -
Network
Scanning History Graph showing the number of scans Tenable Nes- Hover over a point on
sus ran and active targets Tenable Nessus the graph to see
scanned over time. detailed data.
Network Con- Graph showing the number of TCP sessions Ten- Hover over a point on
nections able Nessus creates during scans over time. the graph to see
detailed data.
Network Traffic Graph showing how much traffic Tenable Nessus Hover over a point on
is sending and receiving over the network over the graph to see
time. detailed data.
Number of Graph showing how many reverse DNS Hover over a point on
DNS Lookups (rDNS) and DNS lookups Tenable Nessus per- the graph to see
forms over time. detailed data.
DNS Lookup Graph showing the average time that Tenable Hover over a point on
Time Nessus takes to perform rDNS and DNS lookups the graph to see
over time. detailed data.
- 619 -
Alerts
Scanner List of alerts about areas where your Tenable Nessus scanner Click an
Alerts performance may be suffering. Alerts can have a severity level alert to see
of Info, Low, Medium, or High. more
details.
- 620 -
Monitor Scanner Health
The Scanner Health page provides you with information about the performance of your Tenable Nes-
sus scanner. For more information about performance data, see Scanner Health.
3. (Optional) To adjust the time scale on a graph, on the Overview tab, from the drop-down box,
select a time period.
The graphs on both the Overview and Network tabs reflect the selected time period.
4. (Optional) To hide an item from a time graph, click the item in the legend.
Tip: Hiding items automatically adjusts the scale to the visible items and allows you to view one data-
set at a time.
- 621-
Notifications
Tenable Nessus may periodically show notifications such as login attempts, errors, system inform-
ation, and license expiration information. These notifications appear after you log in, and you can
choose to acknowledge or dismiss each notification. For more information, see Acknowledge Noti-
fications.
The following table describes the two ways you can view notifications:
Current notifications The bell icon in the top Shows notifications that appeared during
this session.
navigation bar ( )
When you acknowledge a notification, it
no longer appears in your current noti-
fication session, but remains listed in the
notification history.
Notification history Settings > Noti- Shows all notifications from the past 90
fications days.
- 622 -
Acknowledge Notifications
When you acknowledge a notification, it no longer appears in your current notification session, but
remains listed in the notification history. You cannot acknowledge notifications from the noti-
fication history view. For more information on viewing notification history, see View Notifications.
If you choose not to acknowledge a notification, it appears the next time you log in. You cannot
acknowledge some notifications – instead, you must take the recommended action.
To acknowledge a notification:
l For a notification window, click Acknowledge.
Note: Clearing notifications does not acknowledge notifications; it removes them from your current
notifications. You can still view cleared notifications in notification history.
- 623 -
View Notifications
You can view outstanding notifications from your current session, and you can also view a history of
notifications from the past 90 days. For information on managing notifications, see Acknowledge
Notifications.
3. (Optional) Filter or search the notifications to narrow results in the notifications table.
- 624 -
Accounts
This section contains the following tasks available in the Accounts section of the Settings page.
- 625 -
My Account
The Account Settings page shows settings for the current authenticated user.
API Keys
An API Key consists of an access key and a secret key. API Keys authenticate with the Nessus REST
API (version 6.4 or greater) and pass with requests using the X-ApiKeys HTTP header.
Note:
l Nessus only presents API Keys upon initial generation. Store API keys in a safe location.
l Tenable Nessus cannot retrieve API Key. If you lose your API Key, you must generate a new API Key.
l Regenerating an API Key immediately deauthorizes any applications currently using the key.
- 626 -
Modify Your User Account
1. In the top navigation bar, click Settings.
Note: You cannot modify a username after you create the account.
4. Click Save.
- 627 -
Generate an API Key
In Tenable Nessus Manager, you can generate an API key from the API Keys tab in the Tenable Nes-
sus user interface. Generating an API key can help you automate various tasks and integrate Ten-
able Nessus with other security tools and systems within your organization.
Note: In addition to Tenable Nessus Manager, the API Keys tab may also be available in Tenable Nessus Pro-
fessional and Tenable Nessus Expert, depending on your license and configuration. For more information,
contact your Tenable Customer Success Manager.
Note: Customers may not directly access Tenable Nessus scanning APIs to configure or launch scans,
except as permitted as part of the Tenable Security Center and Tenable Vulnerability Management enter-
prise solutions.
Caution: Generating a new API key replaces any existing keys and deauthorizes any linked applications.
4. Click Generate.
A dialog box appears, confirming your selection to generate a new API key.
5. Click Generate.
- 628 -
Users
The Users page shows a table of all Tenable Nessus user accounts. This documentation refers to
that table as the users table. Each row of the users table includes the username, the date of the
last login, and the role assigned to the account.
User accounts are assigned roles that dictate the level of access a user has in Tenable Nessus. You
can disable or change the role of a user account at any time. The following table describes the roles
that you can assign to users:
Name Description
Note: This role is not available in Tenable Nessus Professional or Tenable Nes-
sus Expert.
Note: This role is not available in Tenable Nessus Professional or Tenable Nes-
sus Expert.
Administrator Administrators have the same privileges as Standard users, but can also
manage users, user groups, and scanners. In Nessus Manager, Admin-
istrators can view scans that are shared by users.
Tenable Nessus Professional and Tenable Nessus Expert users are Admin-
istrators by default.
System Admin- System Administrators have the same privileges as Administrators, but
istrator can also manage and modify system configuration settings.
Note: This role is not available in Tenable Nessus Professional or Tenable Nes-
sus Expert.
- 629 -
Name Description
- 630 -
Create a User Account
Note: You can only perform this procedure in Tenable Nessus Manager. You cannot have multiple user
accounts in Tenable Nessus Professional or Tenable Nessus Expert.
4. Type in the settings as necessary, and select a role for the user.
Note: You cannot modify a username after you save the account.
5. Click Save.
- 631-
Modify a User Account
Note: You can only perform this procedure in Tenable Nessus Manager. You cannot have multiple user
accounts in Tenable Nessus Professional or Tenable Nessus Expert.
3. In the users table, click the user whose account you want to modify.
The <Username> page appears, where <Username> is the name of the selected user.
Note: You cannot modify a username after you create the account.
5. Click Save.
- 632 -
Delete a User Account
Note: You can only perform this procedure in Tenable Nessus Manager. You cannot have multiple user
accounts in Tenable Nessus Professional or Tenable Nessus Expert.
3. In the users table, in the row for the user that you want to delete, click the button.
4. Click Delete.
- 633 -
Transfer User Data
In Tenable Nessus Manager, you can transfer a user's data to a system administrator. When you
transfer user data, you transfer ownership of all policies, scans, scan results, and plugin rules to a
system administrator account. Transferring user data is useful if you need to remove a user
account but do not want to lose their associated data in Tenable Nessus.
Note: You can only perform this procedure in Tenable Nessus Manager. You cannot have multiple user
accounts in Tenable Nessus Professional or Tenable Nessus Expert.
1. Log in to Tenable Nessus with the system administrator account to which you want to trans-
fer user data.
4. In the users table, select the check box for each user whose data you want to transfer to your
account.
Note: Once you transfer user data, you cannot undo the action.
Tenable Nessus transfers ownership of the selected user's policies, scans, scan results, and
plugin rules to the administrator account.
- 634 -
Command Line Operations
This section includes command line operations for Tenable Nessus and Tenable Nessus Agents.
Tip: During command line operations, prompts for sensitive information, such as a password, do not show
characters as you type. However, the command line records the data and accepts it when you press
the Enter key.
l Nessus-Service
l Nessuscli
l Nessuscli Agent
Note: This topic refers to starting or stopping the Nessus service that runs on host machines. To launch or
stop an individual scan, see Launch a Scan and Stop a Running Scan.
- 635 -
Windows
1. Navigate to Services.
l To stop the Nessus service, right-click Tenable Nessus, and then click Stop.
l To restart the Nessus service, right-click Tenable Nessus, and then click Start.
Note: You must have root permissions to run the start and stop commands.
- 636 -
Linux
Use the following commands:
SUSE
FreeBSD
Note: You must have root permissions to run the start and stop commands.
macOS
1. Navigate to System Preferences.
- 637 -
5. Do one of the following:
Note: You must have root permissions to run the start and stop commands.
Windows
1. Navigate to Services.
3. To stop the service, right-click Tenable Nessus Agent, and then click Stop.
-or-
To restart the Nessus Agent service, right-click Tenable Nessus Agent, and then click Start.
Linux
Use the following commands:
- 638 -
Start or Stop Linux Command Line Operation
SUSE
FreeBSD
macOS
1. Navigate to System Preferences.
5. To stop the Nessus Agent service, click the Stop Nessus Agent button.
-or-
To start the Nessus Agent service, click the Start Nessus Agent button.
- 639 -
Start or Stop macOS Command Line Operation
Nessus-Service
If necessary, whenever possible, you should start and stop Nessus services using Nessus service
controls in your operating system’s interface.
However, there are many nessus-service functions that you can perform through a command line
interface.
Unless otherwise specified, you can use the nessusd command interchangeably with nessus-
service server commands.
You can use the # killall nessusd command to stop all Nessus services and in-process scans.
Note: You must have administrative privileges to run the following commands.
- 640 -
Nessus-Service Syntax
Operating
Command
System
- 641-
Suppress Command Output Examples
You can suppress command output by using the -q option.
Linux
# /opt/nessus/sbin/nessus-service -q -D
FreeBSD
# /usr/local/nessus/sbin/nessus-service -q -D
- 642 -
Nessusd Commands
Option Description
-c <config- When starting the nessusd server, this option specifies the server-side nes-
file> susd configuration file to use. It allows for the use of an alternate configuration
file instead of the standard db.
-S <ip When starting the nessusd server, force the source IP of the connections estab-
[ ,ip2,…] > lished by Nessus during scanning to <ip>. This option is only useful if you have
a multihomed machine with multiple public IP addresses that you would like to
use instead of the default one. For this setup to work, the host running nes-
susd must have multiple NICs with these IP addresses set.
-D When starting the nessusd server, this option forces the server to run in the
background (daemon mode).
-t Check the time stamp of each plugin when starting up to only compile newly
updated plugins.
If you set a parent password, Nessus encrypts all policies and credentials con-
tained in the policy. When you set a password, the Nessus user interface
prompts you for the password.
Caution: If you set your parent password and lose it, neither your administrator nor
- 643 -
Option Description
- 644 -
Notes
If you are running nessusd on a gateway and if you do not want people on the outside to connect to
your nessusd, set your listen_address advanced setting.
This setting tells the server to only listen to connections on the address <address> that is an IP
address, not a machine name.
Nessuscli
You can administer some Tenable Nessus functions through a command-line interface (CLI) using
the nessuscli utility.
This allows the user to manage user accounts, modify advanced settings, manage digital cer-
tificates, report bugs, update Tenable Nessus, and fetch necessary license information.
- 645 -
Nessuscli Syntax
Operating Sys-
Command
tem
l Help Commands
l Backup Commands
l User Commands
l Fetch Commands
l Fix Commands
l Certificate Commands
l Manager Commands
l Dump Command
l Node Commands
- 646 -
Nessuscli Commands
Command Description
Help Commands
nessuscli <cmd> help Shows more help information for specific commands identified in
the nessuscli help output.
Backup Commands
nessuscli backup -- Creates a backup of your Tenable Nessus instance, which includes
create <backup_file- your license and settings. Does not back up scan results.
name>
For more information, see Back Up Tenable Nessus.
The bug reporting commands create an archive that you can send to Tenable, Inc. to help dia-
gnose issues. By default, the script runs in interactive mode.
--quiet: run the bug report generator without prompting user for
feedback.
- 647 -
Command Description
User Commands
nessuscli chpasswd Allows you to change a user’s password. The CLI prompts to enter
<username> the Tenable Nessus user’s name. The CLI does not echo passwords
on the screen.
Fetch Commands
nessuscli fetch -- Uses your Activation Code to register Tenable Nessus online.
register <Activation
Example:
Code>
# /opt/nessus/sbin/nessuscli fetch --register xxxx-
xxxx-xxxx-xxxx
nessuscli fetch -- Uses your Activation Code to register Tenable Nessus online, but
register-only does not automatically download plugin or core updates.
<Activation Code>
Example:
nessuscli fetch -- Registers Tenable Nessus with the nessus.license file obtained
register-offline from https:/ / plugins.nessus.org/ v2/ offline.php.
nessus.license
nessuscli fetch -- Shows whether Tenable Nessus is properly registered and is able
- 648 -
Command Description
nessuscli fetch -- Shows the Activation Code that Tenable Nessus is using.
code-in-use
nessuscli fetch -- Shows the challenge code needed to use when performing an off-
challenge line registration.
Example challenge code: aaaaaa11b2222c-
c33d44e5f6666a777b8cc99999
Caution: Do not use this command if you do not want to switch your
Tenable Nessus instance to Tenable Security Center. This command
irreversibly changes the Tenable Nessus scanner or Manager to a Ten-
able Security Center-managed scanner, resulting in several user inter-
face changes (for example, the site logo changes, and you do not have
access to the Sensors page).
Fix Commands
nessuscli fix Reset registration, show network interfaces, and list advanced set-
tings that you have set.
nessuscli fix [--
secure] --list Using the --secure option acts on the encrypted preferences,
which contain information about registration.
nessuscli fix [--
secure] --set <set- You can use --list, --set, --get, and --delete to modify or
ting=value> view preferences.
- 649 -
Command Description
nessuscli fix --set Tell the server to only listen to connections on the address
listen_address- <address> that is an IP, not a machine name. This option is useful
s=<address> if you are running nessusd on a gateway and if you do not want
people on the outside to connect to your nessusd.
nessuscli fix --show List all advanced settings, including those you have not set. If you
have not set an advanced setting, the CLI shows the default value.
Note: This command only lists settings that are shared by all Tenable
Nessus license types. In other words, the command does not list any
settings specific to Tenable Nessus Expert, Tenable Nessus Pro-
fessional, or Tenable Nessus Manager.
nessuscli fix -- This command deletes all your registration information and pref-
reset erences, causing Tenable Nessus to run in a non-registered state.
Tenable Nessus Manager retains the same linking key after reset-
ting.
nessuscli fix -- This command resets Tenable Nessus to a fresh state, deleting all
reset-all registration information, settings, data, and users.
Caution: You cannot undo this action. Contact Tenable Support before
performing a full reset.
Values:
- 650 -
Command Description
Note: For agents linked to Tenable Nessus Manager, you need to run
the agent_update_channel command from the Tenable Nessus Man-
ager nessuscli utility. For agents linked to Tenable Vulnerability Man-
agement, you need to run the agent_update_channel command
from the agent nessuscli utility.
nessuscli fix --set Enforces NIAP mode for Tenable Nessus. For more information
niap_mode=enforcing about NIAP mode, see Configure Tenable Nessus for
NIAP Compliance.
nessuscli fix --set Disables NIAP mode for Tenable Nessus. For more information
niap_mode=non-enfor- about NIAP mode, see Configure Tenable Nessus for
cing NIAP Compliance.
Certificate Commands
- 651-
Command Description
client
nessuscli import- Validates the server key, server certificate, and CA certificate and
certs -- checks that they match. Then, copies the files to the correct loc-
serverkey=<server ations.
key path> --server-
cert=<server cer-
tificate path> --
cacert=
<CA certificate
path>
nessuscli update By default, this tool updates based on the software update options
selected through the Tenable Nessus user interface.
Note: This command only works for standalone Tenable Nessus scan-
ners. The command does not work for scanners managed by Tenable
Vulnerability Management or Tenable Security Center.
nessuscli update Updates Tenable Nessus plugins by using a TAR file instead of get-
- 652 -
Command Description
<tar.gz filename> ting the updates from the plugin feed. You obtain the TAR file
when you Manage Tenable Nessus Offline - Download and Copy Plu-
gins steps.
nessuscli fix --set (Tenable Nessus Professional and Tenable Vulnerability Man-
scanner_update_chan- agement-managed scanners only)
nel=<value>
Sets the Tenable Nessus to determine what version Tenable Nes-
sus automatically updates to.
Note: If you change your update plan and have automatic updates
enabled, Tenable Nessus may immediately update to align with the ver-
sion represented by your selected plan. Tenable Nessus may either
upgrade or downgrade versions.
Values:
Manager Commands
Used for generating plugin updates for your managed scanners and agents connected to a man-
ager.
- 653 -
Command Description
nessuscli manager Downloads core component updates for remotely managed agents
download-core and scanners.
nessuscli manager Generates plugins archives for remotely managed agents and scan-
generate-plugins ners.
Used for linking, unlinking, and viewing the status of remote managed scanners.
- 654 -
Command Description
Dump Command
nessuscli dump -- Adds a plugins.xml file in the sbin directory. For example, run-
plugins ning the /opt/nessus/sbin/nessuscli dump --plugins on
Linux adds a plugins.xml file to the /op-
t/nessus/sbin/plugins directory.
Node Commands
nessuscli node link Links the child node to the parent node in a clustering envir-
--key=<key> -- onment.
host=<host> --
For more information on key, host, and port, see Link a Node.
port=<port>
nessuscli node Unlinks the child node from the parent node.
unlink
nessuscli node Shows whether the child node is linked to parent node and the
status number of agents that are linked.
- 655 -
Nessuscli Agent
Use the Agent nessuscli utility to perform some Tenable Nessus Agent functions through a com-
mand line interface.
Note: You must run all Agent nessuscli commands as a user with administrative privileges.
- 656 -
Nessuscli Syntax
Operating Sys-
Command
tem
- 657 -
Nessuscli Commands
Command Description
Informational Commands
Optional arguments:
l --scrub —The bug report generator sanitizes the last two oct-
ets of the IPv4 address.
l Deletes any host tag on the agent. For example, the registry key
on Windows or tenable_tag on Unix.
- 658 -
Command Description
l Deletes master.key.
Optional arguments:
# nessuscli agent Using the Tenable Nessus Agent Linking Key, this command links the
link --key=<key> agent to the Tenable Nessus Manager or Tenable Vulnerability Man-
--host=<host> -- agement.
port=<port>
Required arguments:
l --key —The linking key that you retrieved from the manager.
Optional arguments:
- 659 -
Command Description
for your agent, the name defaults to the name of the computer
where you are installing the agent.
- 660 -
Command Description
# nessuscli agent Unlinks agent from the Tenable Nessus Manager or Tenable Vul-
unlink nerability Management.
l Scan description
l Scan triggers
# nessuscli agent Displays the status of the agent, rule-based scanning information, jobs
status pending, and whether the agent is linked to the server.
Optional arguments:
- 661-
Command Description
# nessuscli plu- Lists details about the agent's full and inventory plugin sets:
gins --info
l Installed version
l Last downloaded
l Last needed
l Expires in —The plugin set's expiration time and date (that is,
when the plugin set is no longer needed).
Lists details and statistics about the agent's plugins, such as:
- 662 -
Command Description
# nessuscli plu- Deletes all plugins and plugin-related data off the disk. The agent is
gins --reset able to download plugins immediately after the deletion completes.
Note: This command only triggers if the agent has plugin data on its disk.
Update Commands
- 663 -
Command Description
Fix Commands
Note: Restart the agent service for the change to take effect in Tenable
Nessus Manager.
- 664 -
Command Description
# nessuscli fix - Sets the maximum number of times an agent should retry in the event
-set max_ of a failure when executing the agent link, agent status, or agent
retries="<value>" unlink commands. The commands retry, the specified number of
times, consecutively, sleeping increasing increments of time set by
retry_sleep_milliseconds between attempts. The default value
for max_retries is 0.
Note: This setting does not affect offline updates or the agent's normal 24
hour check-in after it is linked.
# nessuscli fix - Sets the number of milliseconds that an agent sleeps for between
-set retry_sleep_ retries in event of a failure when executing the agent link, agent
milliseconds=" status, or agent unlink commands. The default is 1500 mil-
<value>" liseconds (1.5 seconds).
# nessuscli fix - Enforces NIAP mode for Tenable Nessus Agent. For more information
-set niap_mod- about NIAP mode, see Configure Tenable Nessus Agent for NIAP Com-
e=enforcing pliance.
# nessuscli fix - Disables NIAP mode for Nessus Agent. For more information about
-set niap_mod- NIAP mode, see Configure Tenable Nessus Agent for NIAP Compliance.
e=non-enforcing
# nessuscli fix - Enforces the current validated FIPS module for Tenable Nessus Agent
-set fips_mod- communication and database encryption. The FIPS module does not
e=enforcing affect scanning encryption.
Note: Tenable Nessus Agent also enforces the FIPS module when you
enforce NIAP mode. For more information, see Configure Tenable Nessus
Agent for NIAP Compliance.
# nessuscli fix - Disables the FIPS module for Tenable Nessus Agent communication
- 665 -
Command Description
# nessuscli fix - (Nessus versions 10.4.0 and later only) Retrieve your unique agent link-
-secure --get ing key.
agent_linking_key
Note: You can only use this linking key to link an agent. You cannot use it
to link a scanner or a child node.
Resource Control
Commands
- 666 -
Update Tenable Nessus Software (CLI)
When updating Tenable Nessus components, you can use the nessuscli update commands, also
found in the command-line section.
Note: If you are working with Tenable Nessus offline, see Manage Tenable Nessus Offline.
Note: You must run the following commands with administrator privileges.
nessuscli update By default, this tool respects the software update options selected
through the Nessus user interface.
- 667 -
Additional Resources
This section contains the following resources:
l Manage Logs
l Scan Targets
- 668 -
Amazon Web Services
For information on integrating Tenable Nessus with Amazon Web Services, see the following:
- 669 -
Configure Tenable Nessus for NIAP Compliance
This version of Tenable Nessus is not NIAP-certified, but the niap_mode command still functions as expec-
ted.
If your organization requires that your instance of Tenable Nessus meets National Information
Assurance Partnership (NIAP) standards, you can configure Tenable Nessus so that relevant set-
tings are compliant with NIAP standards.
l Confirm you have enabled the full disk encryption capabilities provided by the operating sys-
tem on the host where you installed Tenable Nessus.
Linux example:
Note: When Tenable Nessus is in NIAP mode, Tenable Nessus overrides the following settings as
long as Tenable Nessus remains in NIAP mode. If you disable NIAP mode, Tenable Nessus reverts to
what you had set before.
- 670 -
l Overrides the SSL Mode (ssl_mode_preference) with the TLS 1.2 (niap) option.
l Overrides the SSL Cipher List (ssl_cipher_list) setting with the NIAP Approved
Ciphers (niap) setting, which sets the following ciphers:
l ECDHE-RSA-AES128-SHA256
l ECDHE-RSA-AES128-GCM-SHA256
l ECDHE-RSA-AES256-SHA384
l ECDHE-RSA-AES256-GCM-SHA384
l Checks the revocation status of a CA certificate using the Online Certificate Status
Protocol (OCSP). If the certificate is revoked, then Tenable Nessus marks the cer-
tificate as invalid. If there is no response, then Tenable Nessus does not mark the
certificate as invalid.
l Ensure that the certificate has a valid, trusted CA that is in known_CA.inc. CA Cer-
tificates for Tenable Vulnerability Management and plugins.nessus.org are already
in known_CA.inc in the plugins directory.
Database encryption
You can convert encrypted databases from the default format (OFB-128) to NIAP-compliant encryp-
tion (XTS-AES-128).
Tenable Nessus in NIAP mode can read databases with the default format (OFB-128).
- 671-
1. Stop Tenable Nessus.
- 672 -
Default Data Directories
The default Tenable Nessus data directory contains logs, certificates, temporary files, database
backups, plugins databases, and other automatically generated files.
Refer to the following table to determine the default data directory for your operating system.
Linux /opt/nessus/var/nessus
Windows C:\ProgramData\Tenable\Nessus\nessus
macOS /Library/Nessus/run/var/nessus
Note: Tenable Nessus does not support using symbolic links for /opt/nessus/.
- 673 -
Encryption Strength
Tenable Nessus uses the following default encryption for storage and communications.
Storing user account passwords SHA-512 and the PBKDF2 function with a 512-bit key
Communications between Ten- TLS 1.3 (fallback to TLS 1.2 or earlier, as configured) with
able Nessus and clients (GUI/ API the strongest encryption method supported by Tenable
users) Nessus and your browser or API program
- 674 -
File and Process Allowlist
You need to allow Tenable Nessus to access third-party endpoint security products such as anti-
virus applications and host-based intrusion and prevention systems.
Note: If your Windows installation uses a non-standard drive or folder structure, use the
%PROGRAMFILES% and %PROGRAMDATA% environment variables.
The table following contains a list of Tenable Nessus folders, files, and processes that you should
allow. For information about allowlisting Tenable Nessus Agent processes, see File and Process
Allowlist in the Tenable Nessus Agent User Guide.
Note: In addition to the files and processes listed below, Tenable recommends allowlisting certain Tenable
sites on your firewall. For more information, see the Which Tenable sites should I allow? KB article.
Windows
Files
Processes
- 675 -
C:\ Program Files (x86)\ Tenable\ Nessus\ nessus-service.exe
Linux
Files
Processes
macOS
Files
Processes
- 676 -
/ Library/ Nessus/ run/ sbin/ nessusmgt
Manage Logs
Tenable Nessus has the following default log files:
- 677 -
Default Log Locations
The following are the default log file locations for each operating system.
l Linux —/opt/nessus/var/nessus/logs/<filename>
l macOS —/Library/Nessus/run/var/nessus/logs/<filename>
l Windows —C:\ProgramData\Tenable\Nessus\nessus\logs\<filename>
You can customize log file locations when you modify log settings.
- 678 -
Modify Log Settings
To modify log settings, use one of the following methods, depending on the log file:
l To modify log settings for www_server.log, backend.log, nessusd.dump, and custom logs,
see Modify log.json.
l To modify log settings for nessusd.dump and nessusd.messages, see Modify advanced set-
tings.
- 679 -
Modify log.json
You can configure log locations and rotation strategies for www_server.log and backend.log by
editing the log.json file. You can also configure custom logs by creating a new reporters[x].re-
porter section and creating a custom file name.
Note: You cannot configure nessusd.dump or nessusd.messages settings using log.json. Configure
those log settings using logfile_rot in the advanced settings.
1. Using a text editor, open the log.json file, located in the corresponding directory:
l Linux —/opt/nessus/var/nessus/log.json
l macOS —/Library/Nessus/run/var/nessus/log.json
l Windows —C:\ProgramData\Tenable\Nessus\nessus\log.json
2. For each log file, edit or create a reporters[x].reporter section, and add or modify the
parameters described in log.json Format.
- 680 -
log.json Format
The following describe parameters in the log.json file, and whether Tenable recommends that you
modify the parameter. Some parameters are advanced and you do not need to modify them often. If
you are an advanced user who wants to configure a custom log file with advanced parameters, see
the knowledge base article for more information.
Note: response
is the only valid
tag for www_serv-
er.log.
l info —Inform-
ational logs for a
specific task
l warn —Warning
logs for a specific
task
l debug —Debugging
output
l verbose —Debug-
ging output with
more information
than debug
- 681-
Parameter Default value Can be modified? Description
Valid values:
- 682 -
Parameter Default value Can be modified? Description
tion.
l system —Presents
output in the
default operating
- 683 -
Parameter Default value Can be modified? Description
Linux example
{
"reporters": [
{
"tags": [
"response"
],
"reporter": {
"type": "file",
"rotation_strategy": "daily",
"rotation_time": "86400",
"max_size": "536870912",
"max_files": "1024",
"file": "/opt/nessus/var/nessus/logs/www_server.log"
},
"format": "combined"
},
{
"tags": [
"log",
"info",
"warn",
"error",
"trace"
],
"reporter": {
"type": "file",
"file": "/opt/nessus/var/nessus/logs/backend.log"
},
"context": true,
"format": "system"
}
]
- 684 -
}
Windows example
Note: The backslash (\) is a special character in JSON. To enter a backslash in a path string, you must
escape the first backslash with a second backslash so the path parses correctly.
{
"reporters": [
{
"tags": [
"response"
],
"reporter": {
"type": "file",
"rotation_strategy": "daily",
"rotation_time": "86400",
"max_size": "536870912",
"max_files": "1024",
"file": "C:\\ProgramData\\Tenable\\Nessus\\nessus\\logs\\www_server.log"
},
"format": "combined"
},
{
"tags": [
"log",
"info",
"warn",
"error",
"trace"
],
"reporter": {
"type": "file",
"file": "C:\\ProgramData\\Tenable\\Nessus\\nessus\\logs\\backend.log"
},
"context": true,
"format": "system"
}
- 685 -
]
}
macOS example
{
"reporters": [
{
"tags": [
"response"
],
"reporter": {
"type": "file",
"rotation_strategy": "daily",
"rotation_time": "86400",
"max_size": "536870912",
"max_files": "1024",
"file": "/Library/Nessus/run/var/nessus/logs/www_server.log"
},
"format": "combined"
},
{
"tags": [
"log",
"info",
"warn",
"error",
"trace"
],
"reporter": {
"type": "file",
"file": /Library/Nessus/run/var/nessus/logs/backend.log"
},
"context": true,
"format": "system"
}
]
}
- 686 -
Mass Deployment Support
You can automatically configure and deploy Tenable Nessus scanners using environment variables
or a configuration JSON file. This allows you to streamline a mass deployment.
When you first launch Tenable Nessus after installation, Tenable Nessus first checks for the pres-
ence of environment variables, then checks for the config.json file. When Tenable Nessus
launches for the first time, Tenable Nessus uses that information to link the scanner to a manager,
set preferences, and create a user.
Note: If you have information in both environment variables and config.json, Tenable Nessus uses both
sources of information. If there is conflicting information (for example, environment variables and con-
fig.json contain a different linking key), Tenable Nessus uses the information from the environment vari-
ables.
- 687 -
Tenable Nessus Environment Variables
If you want to configure Tenable Nessus based on environment variables, you can set the following
environment variables in the shell environment that Tenable Nessus is running in.
When you first launch Tenable Nessus after installation, Tenable Nessus first checks for the pres-
ence of environment variables, then checks for the config.json file. When Tenable Nessus
launches for the first time, Tenable Nessus uses that information to link the scanner to a manager,
set preferences, and create a user.
User Configuration
Use the following environment variables for initial user configuration:
Note: If you create a user but leave the NCONF_USER_PASSWORD value empty, Tenable Nessus auto-
matically generates a password. To log in as the user, use nessuscli to change the user's pass-
word first.
Linking Configuration
Use the following environment variables for linking configuration:
l NCONF_LINK_HOST - The hostname or IP address of the manager you want to link to. To link to
Tenable Vulnerability Management, use cloud.tenable.com.
- 688 -
l NCONF_LINK_GROUPS - (Optional) One or more existing scanner groups where you want to add
the scanner. List multiple groups in a comma-separated list. If any group names have spaces,
use quotes around the whole list. For example: "Atlanta,Global Headquarters"
When you first launch Tenable Nessus after installation, Tenable Nessus first checks for the pres-
ence of environment variables, then checks for the config.json file. When Tenable Nessus
launches for the first time, Tenable Nessus uses that information to link the scanner to a manager,
set preferences, and create a user.
Note: config.json must be in ASCII format. Some tools, such as PowerShell, create test files in other
formats by default.
- 689 -
Location of config.json File
Place the config.json file in the following location:
l Linux: /opt/nessus/var/nessus/config.json
l Windows: C:\ProgramData\Tenable\Nessus\nessus\config.json
- 690 -
Example Tenable Nessus File Format
{
"link": {
"name": "sensor name",
"host": "hostname or IP address",
"port": 443,
"key": "abcdefghijklmnopqrstuvwxyz",
"ms_cert": "CA certificate for linking",
"retry": 1,
"proxy": {
"proxy": "proxyhostname",
"proxy_port": 443,
"proxy_username": "proxyusername",
"proxy_password": "proxypassword",
"user_agent": "proxyagent",
"proxy_auth": "NONE"
}
},
"preferences": {
"global.max_hosts": "500"
},
"user": {
"username": "admin",
"password": "password",
"role": "system_administrator",
"type": "local"
}
}
- 691-
config.json Details
The following describes the format of the different settings in each section of config.json.
Note: All sections are optional; if you do not include a section, it is not configured when you first launch
Tenable Nessus. You can manually configure the settings later.
- 692 -
Linking
The link section sets preferences to link Tenable Nessus to a manager.
Setting Description
name (Optional)
host The hostname or IP address of the manager you want to link to.
port The port for the manager you want to link to.
key The linking key that you retrieved from the manager.
ms_cert (Optional)
proxy (Optional)
- 693 -
Preferences
The preferences section configures any advanced settings. For more information, see Advanced
Settings.
- 694 -
User
The user section creates a Tenable Nessus user.
Setting Description
If you create a user but leave the password value empty, Tenable Nessus auto-
matically generates a password. To log in as the user, use nessuscli to
change the user's password first.
role The role for the user. Set to disabled, basic, standard, administrator, or
system_administrator. For more information, see Users.
- 695 -
Purpose
External network vulnerability scanning is useful to obtain a snapshot in time of the network ser-
vices offered and the vulnerabilities they may contain. However, it is only an external perspective. It
is important to determine what local services are running and to identify security exposures from
local attacks or configuration settings that could expose the system to external attacks that an
external scan might not detect.
A typical network vulnerability assessment performs a remote scan against the external points of
presence and an on-site scan is performed from within the network. Neither of these scans can
determine local exposures on the target system. Some of the information gained relies on the ban-
ner information shown, which may be inconclusive or incorrect. By using secured credentials, you
can grant the Nessus scanner local access to scan the target system without requiring an agent.
This can facilitate scanning of a large network to determine local exposures or compliance viol-
ations.
The most common security problem in an organization is that security patches are not applied in a
timely manner. A Nessus credentialed scan can quickly determine which systems are out of date on
patch installation. This is especially important when a new vulnerability is made public and exec-
utive management wants a quick answer regarding the impact to the organization.
Another major concern for organizations is to determine compliance with site policy, industry stand-
ards (such as the Center for Internet Security (CIS) benchmarks) or legislation (such as Sarbanes-
Oxley, Gramm-Leach-Bliley, or HIPAA). Organizations that accept credit card information must
demonstrate compliance with the Payment Card Industry (PCI) standards. There have been quite a
few well-publicized cases where the credit card information for millions of customers was
breached. This represents a significant financial loss to the banks responsible for covering the pay-
ments and heavy fines or loss of credit card acceptance capabilities by the breached merchant or
processor.
- 696 -
Access Level
Credentialed scans can perform any operation that a local user can perform. The level of scanning
depends on the privileges granted to the user account that you configure Tenable Nessus to use.
Non-privileged users with local access on Linux systems can determine basic security issues, such
as patch levels or entries in the / etc/ passwd file. For more comprehensive information, such as sys-
tem configuration data or file permissions across the entire system, you need an account with
“root” privileges.
Tenable Nessus needs to use a local administrator account for credentialed scans on Windows sys-
tems. Several bulletins and software updates by Microsoft have made reading the registry to
determine software patch level unreliable without administrator privileges. Tenable Nessus needs
local administrative access to perform direct reading of the file system. This allows Nessus to
attach to a computer and perform direct file analysis to determine the true patch level of the sys-
tems that Tenable Nessus evaluates.
- 697 -
Detecting When Credentials Fail
If you are using Nessus to perform credentialed audits of Linux or Windows systems, analyzing the
results to determine if you had the correct passwords and SSH keys can be difficult. You can detect
if your credentials are not working using plugin 21745.
This plugin detects if either SSH or Windows credentials did not allow the scan to log into the
remote host. When a login is successful, this plugin does not produce a result.
Note: To run some local checks, Tenable Nessus requires that the host runs PowerShell 5.0 or newer.
Before you begin this process, ensure that there are no security policies in place that block cre-
dentialed checks on Windows, such as:
l Local computer policies (for example, Deny access to this computer from the network, Access
this computer from the network)
l IPS/ IDS
- 698 -
Configure a Domain Account for Authenticated Scanning
To create a domain account for remote host-based auditing of a Windows server, the server must
first be a supported version of Windows and be part of a domain.
- 699 -
Create a Security Group called "Nessus Local Access"
1. Log in to a Domain Controller and open Active Directory Users and Computers.
3. Name the group Nessus Local Access. Set Scope to Global and Type to Security.
4. Add the account you plan to use to perform Tenable Nessus Windows Authenticated Scans to
the Tenable Nessus Local Access group.
- 700 -
Create a Group Policy called "Local Admin GPO"
1. Open the Group Policy Management Console.
- 701-
Add the "Nessus Local Access"Group to the "Nessus Scan GPO
Policy"
1. Right-click Nessus Scan GPOPolicy, then select Edit.
2. Expand Computer configuration > Policies > Windows Settings > Security Settings > Restric-
ted Groups.
3. In the left navigation bar on Restricted Groups, right-click and select Add Group.
4. In the Add Group dialog box, select browse and enter Nessus Local Access.
9. Select OK twice.
Tenable Nessus uses Server Message Block (SMB) and Windows Management Instrumentation
(WMI). Ensure Windows Firewall allows access to the system.
- 702 -
Allow WMI on Windows
1. Right-click Nessus Scan GPOPolicy, then select Edit.
2. Expand Computer configuration > Policies > Windows Settings > Security Settings > Windows
Firewall with Advanced Security > Windows Firewall with Advanced Security > Inbound Rules.
4. Choose the Predefined option, and select Windows Management Instrumentation (WMI) from
the drop-down box.
5. Select Next.
7. Select Next.
8. Select Finish.
Tip: Later, you can edit the predefined rule created and limit the connection to the ports by IP Address and
Domain User to reduce any risk for abuse of WMI.
- 703 -
Link the GPO
1. In Group policy management console, right-click the domain or the OU and select Link an
Existing GPO.
- 704 -
Configure Windows
1. Under Windows Firewall > Windows Firewall Settings, enable File and Printer Sharing.
2. Using the gpedit.msc tool (via the Run prompt), invoke the Group Policy Object Editor. Nav-
igate to Local Computer Policy > Administrative Templates > Network > Network Connections
> Windows Firewall > Standard Profile > Windows Firewall : Allow inbound file and printer
exception, and enable it.
3. (Windows 8 and earlier only) While in the Group Policy Object Editor, navigate to Local Com-
puter Policy > Administrative Templates > Network > Network Connections > Prohibit use of
Internet connection firewall on your DNS domain and set it to either Disabled or Not Con-
figured.
4. Enable the Remote Registry service (it is disabled by default). If the service is set to manual
(rather than enabled), plugin IDs 42897 and 42898 only enable the registry during the scan.
Note: Enabling this option configures Tenable Nessus to attempt to start the remote
registry service before starting the scan.
The Windows credentials provided in the Tenable Nessus scan policy must have admin-
istrative permissions to start the Remote Registry service on the host being scanned.
5. Open TCP ports 139 and 445 between Tenable Nessus and the target.
l IPC$
l ADMIN$
Note: Windows 10 disables ADMIN$ by default. For all other operating systems, the three
shares are enabled by default and can cause other issues if disabled by default. For more
information, see http:/ / support.microsoft.com/ kb/ 842715/ en-us.
l C$
Caution: While not recommended, you can disable Windows User Account Control (UAC).
- 705 -
Tip: To turn off UAC completely, open the Control Panel, select User Accounts, and then set
Turn User Account Control to off. Alternatively, you can add a new registry key named LocalAc-
countTokenFilterPolicy and set its value to 1.
You must create this key in the registry at the following location: HKLM\SOFTWARE\Microsoft\
Windows\CurrentVersion\Policies\system\LocalAccountTokenFilterPolicy.
For more information on this registry setting, consult the MSDN 766945 KB. In Windows 7 and 8,
if you disable UAC, then you must set EnableLUA to 0 in HKEY_LOCAL_MACHINE\Soft-
ware\Microsoft\Windows\CurrentVersion\Policies\System as well.
What to do next:
l View the prerequisites for Windows credentialed checks.
- 706 -
Prerequisites
A common mistake is to create a local account that does not have enough privileges to log on
remotely and do anything useful. By default, Windows assigns new local accounts Guest privileges if
they are logged into remotely. This prevents remote vulnerability audits from succeeding. Another
common mistake is to increase the amount of access that the Guest users obtain. This reduces the
security of your Windows server.
- 707 -
Enable Windows Logins for Local and Remote Audits
The most important aspect of Windows credentials is that the account used to perform the checks
needs privileges to access all required files and registry entries which, often, means administrative
privileges. If you do not provide Tenable Nessus with credentials for an administrative account, at
best, you can use it to perform registry checks for the patches. While this is still a valid method to
find installed patches, it is incompatible with some third-party patch management tools that may
neglect to set the key in the policy. If Tenable Nessus has administrative privileges, it checks the
version of the dynamic-link library (.dll) on the remote host, which is considerably more accurate.
The following bullets describe how to configure a domain or local account to use for Windows cre-
dentialed checks, depending on your needs.
l
Use Case # 1: Configure a Domain Account for Local Audits
To create a domain account for remote, host-based auditing of a Windows server, the server
must be part of a domain. To configure the server to allow logins from a domain account, use
the Classic security model, as described in the following steps:
3. Select Computer Configuration > Windows Settings > Security Settings > Local Policies >
Security Options.
4. In the list, select Network access: Sharing and security model for local accounts.
The Network access: Sharing and security model for local accounts window appears.
5. In the Local Security Setting section, in the drop-down box, select Classic - local users
authenticate as themselves.
This allows local users of the domain to authenticate as themselves, even though they
are not physically local on the particular server. Without doing this, all remote users,
even real users in the domain, authenticate as guests and do not have enough cre-
- 708 -
dentials to perform a remote audit.
6. Click OK.
Note: To learn more about protecting scanning credentials, see 5 Ways to Protect Scanning Credentials
for Windows Hosts.
l
Use Case # 2: Configure a Local Account
To configure a standalone (in other words, not part of a domain) Windows server with cre-
dentials you plan to use for credentialed checks, create a unique account as the admin-
istrator.
Do not set the configuration of this account to the default of Guest only: local users authen-
ticate as guest. Instead, switch this to Classic: local users authenticate as themselves.
Configure Windows
Once you create an appropriate account for credentialed checks, there are several Windows con-
figuration options that you must enable or disable before scanning (for more information, see Cre-
dentialed Checks on Windows):
l
(Local accounts only) User Account Control (UAC)
Disable Windows User Account Control (UAC), or you must change a specific registry setting
allow Tenable Nessus audits. To disable UAC, open the Control Panel, select User Accounts,
and set Turn User Account Control to Off.
Alternatively, instead of disabling UAC, Tenable recommends adding a new registry DWORD
named LocalAccountTokenFilterPolicy and setting its value to 1. Create this key in the fol-
lowing registry: HKLM\SOFTWARE\Mi-
crosoft\Win-
dows\CurrentVersion\Policies\system\LocalAccountTokenFilterPolicy. For more
information on this registry setting, see the MSDN 766945 KB.
l
Host Firewall
- 709 -
l Using the Run prompt, run gpedit.msc and enable Group Policy Object Editor. Navigate
to Local Computer Policy > Administrative Templates > Network > Network Connections
> Windows Firewall > Standard Profile > Windows Firewall: Allow inbound file and printer
exception and enable it.
While in the Group Policy Object Editor, navigate to Local Computer Policy > Admin-
istrative Templates > Network > Network Connections > Prohibit use of Internet con-
nection firewall on your DNS domain. Set this option to either Disabled or Not
Configured.
l Open any host firewalls to allow connections from Tenable Nessus to File and Printer
Sharing on TCP ports 139 and 445.
l If you want Tenable Nessus to pick up any open ports or services on the host,
those ports also need to be accessible to the scanner.
l
Remote Registry
Enable the Remote Registry. You can enable it for a one-time audit, or leave it enabled per-
manently if you perform frequent audits.
Note: For information on enabling the Remote Registry during scans, see How to enable the "Start the
Remote Registry service during the scan" option in a scan policy.
l
Administrative Shares
Note: Windows 10 disables ADMIN$ by default. For all other operating systems, the three admin-
istrative shares are enabled by default and can cause other issues if disabled. For more information,
see http:/ / support.microsoft.com/ kb/ 842715/ en-us.
Note: To troubleshoot missing administrative shares, see the related Microsoft troubleshooting topic.
- 710 -
Configure a Tenable Nessus Scan for Windows Logins
Tenable Nessus allows you to configure your scan configurations with the credentials needed for
Windows logins. You can do so during the Create a Scan process, or you can add credentials to an
existing scan configuration.
4. Select an authentication method. Depending on the method, the remaining Windows settings
change.
5. Depending on the authentication method, specify the SMB account username, password or
hash, and domain.
- 711-
Credentialed Checks on Linux
The process described in this section enables you to perform local security checks on Linux based
systems. The SSH daemon used in this example is OpenSSH. If you have a commercial variant of
SSH, your procedure may be slightly different.
You can enable local security checks using an SSH private/ public key pair or user credentials and
sudo or su access.
What to do next:
l View the prerequisites for Linux credentialed checks.
- 712 -
Prerequisites
Some commercial variants of SSH do not have support for the blowfish cipher, possibly for export
reasons. It is also possible to configure an SSH server to only accept certain types of encryption.
Check that your SSH server supports the correct algorithm.
User Privileges
For maximum effectiveness, the SSH user must be able to run any command on the system. On
Linux systems, the SSH user must have root privileges. While it is possible to run some checks
(such as patch levels) with non-privileged access, full compliance checks that audit system con-
figuration and file permissions require root access. For this reason, Tenable recommends that you
use SSH keys instead of credentials when possible.
- 713 -
Generate SSH Public and Private Keys
The first step is to generate a private/ public key pair for the Tenable Nessus scanner to use. You
can generate this key pair from any of your Linux systems, using any user account. However, it is
important that the defined Tenable Nessus user owns the keys.
To generate the key pair, use ssh-keygen and save the key in a safe place (see the following Red
Hat ES 3 installation example).
# ssh-keygen -t dsa
Generating public/private dsa key pair.
Enter file in which to save the key (/Users/test/.ssh/id_dsa):
/home/test/Nessus/ssh_key
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in
/home/test/Nessus/ssh_key.
Your public key has been saved in
/home/test/Nessus/ssh_key.pub.
The key fingerprint is:
06:4a:fd:76:ee:0f:d4:e6:4b:74:84:9a:99:e6:12:ea
#
Do not transfer the private key to any system other than the one running the Tenable Nessus server.
When ssh-keygen asks you for a passphrase, enter a strong passphrase or press the Return key
twice (that is, do not set any passphrase). If you specify a passphrase, you must specify it in
Policies > Credentials > SSH settings for Tenable Nessus to use key-based authentication.
Tenable Nessus Windows users may wish to copy both keys to the main Tenable Nessus application
directory on the system running Tenable Nessus (C:\Program Files\Tenable\Nessus by
default), and then copy the public key to the target systems as needed. This makes it easier to man-
age the public and private key files.
- 714 -
Create a User Account and Set Up the SSH Key
On every target system that you want to scan using local security checks, create a new user
account dedicated to Tenable Nessus. This user account must have exactly the same name on all
systems. For this document, we call the user nessus, but you can use any name.
Once you create the user account, make sure that the account has no valid password set. On Linux
systems, new user accounts are locked by default, unless you explicitly set an initial password. If
you are using an account where someone had set a password, use the passwd –l command to lock
the account.
You must also create the directory under this new account’s home directory to hold the public key.
For this exercise, the directory is /home/nessus/.ssh. See the following Linux systems example:
# passwd –l nessus
# cd /home/nessus
# mkdir .ssh
#
For Solaris 10 systems, Sun has enhanced the passwd(1) command to distinguish between locked
and non-login accounts. This is to ensure that you cannot use a locked user account to execute
commands (for example, cron jobs). You only use non-login accounts to execute commands, and
they do not support an interactive login session. These accounts have the “NP” token in the pass-
word field of /etc/shadow. To set a non-login account and create the SSH public key directory in
Solaris 10, run the following commands:
# passwd –N nessus
# grep nessus /etc/shadow
nessus:NP:13579::::::
# cd /export/home/nessus
# mkdir .ssh
#
Now that you have created the user account, you must transfer the key to the system, place it in
the appropriate directory, and set the correct permissions.
- 715 -
Example
From the system containing the keys, secure copy the public key to system that you want to scan
for host checks as shown in the following example.
You can also copy the file from the system on which you installed Tenable Nessus using the secure
ftp command, sftp. You must name the file on the target system authorized_keys.
- 716 -
Return to the Public Key System
Set the permissions on both the /home/nessus/.ssh directory and the authorized_keys file.
Repeat this process on all systems that you want to test for SSH checks (starting at “Creating a
User Account and Setting up the SSH Key” above).
Test to make sure that the accounts and networks are configured correctly. Using the simple Linux
command id, from the Tenable Nessus scanner, run the following command:
If it successfully returns information about the Tenable Nessus user, the key exchange was suc-
cessful.
- 717 -
Configure Tenable Nessus for SSH Host-Based Checks
If you have not already done so, secure copy the private and public key files to the system that you
plan to use to access the Tenable Nessus scanner, as described in Enable SSH Local Security
Checks.
3. Select SSH.
- 718 -
Run Tenable Nessus as Non-Privileged User
Tenable Nessus can run as a non-privileged user.
Limitations
l When scanning localhost, Nessus plugins assume that they are running as root. Therefore, cer-
tain types of scans may fail. For example, because Nessus is now running as a non-privileged
user, file content Compliance Audits may fail or return erroneous results since the plugins are
not able to access all directories.
l nessuscli does not have a --no-root mode. Running commands with nessuscli as root
could potentially create files in the Nessus install directory owned by root, which can prohibit
Nessus from accessing them successfully. Use care when running nessuscli, and potentially
fix permissions with chown after using it.
- 719 -
Run Nessus on Linux with Systemd as a Non-Privileged User
Limitations
l When scanning localhost, Nessus plugins assume that they are running as root. Therefore, cer-
tain types of scans may fail. For example, because Nessus is now running as a non-privileged
user, file content Compliance Audits may fail or return erroneous results since the plugins are
not able to access all directories.
l nessuscli does not have a --no-root mode. Running commands with nessuscli as root
could potentially create files in the Nessus install directory owned by root, which can prohibit
Nessus from accessing them successfully. Use care when running nessuscli, and potentially
fix permissions with chown after using it.
Steps
1. Do one of the following:
l If you already installed Nessus and are running it, stop nessusd.
Note: You need to complete steps 3 and 4 every time Tenable Nessus is updated.
- 720 -
Tip: Use cap_net_admin to put interface in promiscuous mode.
Use cap_net_raw to create raw sockets for packet forgery.
Use cap_sys_resource to set resource limits.
If this is only a manager, and you do not want this instance of Nessus to perform scans, you
need to provide it only with the capability to change its resource limits.
If you want this instance of Nessus to perform scans, you need to add more permissions to
allow packet forgery and enabling promiscuous mode on the interface.
mkdir -p /etc/systemd/system/nessusd.service.d/
printf '[Service]\nExecStart=\nExecStart=/opt/nessus/sbin/nessus-service -q --no-
root\nUser=nonprivuser\n' > /etc/systemd/system/nessusd.service.d/override.conf
This file overrides the ExecStart and User options in the nessusd service unit file (/ us-
r/ lib/ systemd/ system/ nessusd.service) with the non-privileged settings.
7. Reload the systemd manager configuration to include the override configuration file by run-
ning the following command:
9. Verify Tenable Nessus is running as a non-privileged user by running the following command:
- 721-
service nessusd status
- 722 -
Run Nessus on Linux with init.d Script as a Non-Privileged User
Limitations
When scanning localhost, Nessus plugins assume that they are running as root. Therefore, certain
types of scans may fail. For example, because Nessus is now running as a non-privileged user, file
content Compliance Audits may fail or return erroneous results since the plugins are not able to
access all directories.
Because nessuscli does not have a --no-root mode, running commands with nessuscli as
root could potentially create files in the Nessus install directory owned by root, which can prohibit
Nessus from accessing them successfully. Use care when running nessuscli, and potentially fix
permissions with chown after using it.
Steps
1. If you have not already, install Nessus.
Tip:
Use cap_net_admin to put the interface in promiscuous mode.
Use cap_net_raw to create raw sockets for packet forgery.
- 723 -
Use cap_sys_resource to set resource limits.
If this is only a manager, and you do not want this instance of Nessus install to perform scans,
you need to provide it only with the capability to change its resource limits.
If you want this instance of Nessus to perform scans, you need to add extra permissions to
allow packet forgery and enabling promiscuous mode on the interface.
CentOS
Debian
Depending on your operating system, the resulting script should appear as follows:
CentOS
start() {
KIND="$NESSUS_NAME"
echo -n $"Starting $NESSUS_NAME : "
daemon --user=nonprivuser /opt/nessus/sbin/nessus-service -q -D --no-root
- 724 -
echo "."
return 0
}
Debian
start() {
KIND="$NESSUS_NAME"
echo -n $"Starting $NESSUS_NAME : "
start-stop-daemon --start --oknodo --user nonprivuser --name nessus --pidfile
--chuid nonprivuser --startas /opt/nessus/sbin/nessus-service -- -q -D --no-root
echo "."
return 0
}
7. Start nessusd.
Note: If you are running Nessus on Debian, after starting Nessus, run the chown -R
nonprivuser:nonprivuser /opt/nessus command to regain ownership of directories created at
runtime.
- 725 -
Run Nessus on macOS as a Non-Privileged User
Limitations
l When scanning localhost, Nessus plugins assume that they are running as root. Therefore, cer-
tain types of scans may fail. For example, because Nessus is now running as a non-privileged
user, file content Compliance Audits may fail or return erroneous results since the plugins are
not able to access all directories.
l nessuscli does not have a --no-root mode. Running commands with nessuscli as root
could potentially create files in the Nessus install directory owned by root, which could cause
Nessus to be unable to access them appropriately. Use care when running nessuscli, and
potentially fix permissions with chown after using it.
Steps
1. If you have not already done so, Install Nessus on MacOSX.
2. Since the Nessus service is running as root, you need to unload it.
3. On the Mac, in System Preferences > Users & Groups, create a new Group.
4. Next, in System Preferences > Users & Groups, create the new Standard User. Configure this
user to run as the Nessus non-privileged account.
- 726 -
5. Add the new user to the group you created in Step 1.
- 727 -
6. Remove 'world' permissions on Nessus binaries in the / sbin directory.
8. Give that user read/ write permissions to the /dev/bpf* devices. A simple way to do this is to
install Wireshark, which creates a group called access_bpf and a corresponding launch dae-
mon to set appropriate permissions on /dev/bpf* at startup. In this case, you can simply
assign the nonpriv user to be in the access_bpf group. Otherwise, you need to create a
launch daemon giving the "nonpriv" user, or a group that it is a part of, read/ write permissions
to all / dev/ bpf*.
- 728 -
10. Using a text editor, modify the Nessus / Library/ LaunchDae-
mons/ com.tenablesecurity.nessusd.plist file and add the following lines. Do not modify any of
the existing lines.
<string>--no-root</string>
<key>UserName</key>
<string>nonprivuser</string>
11. Using sysctl, verify the following parameters have the minimum values:
$ sysctl debug.bpf_maxdevices
debug.bpf_maxdevices: 16384
$ sysctl kern.maxfiles
kern.maxfiles: 12288
$ sysctl kern.maxfilesperproc
kern.maxfilesperproc: 12288
$ sysctl kern.maxproc
kern.maxproc: 1064
$ sysctl kern.maxprocperuid
kern.maxprocperuid: 1064
12. If any of the values in Step 9. do not meet the minimum requirements, take the following
steps to modify values.
- 729 -
Create a file called / etc/ sysctl.conf.
Using a text editor, edit the systctl.conf file with the correct values found in Step 9.
Example:
$ cat /etc/sysctl.conf
kern.maxfilesperproc=12288
kern.maxproc=1064
kern.maxprocperuid=1064
13. Next, using the launchctl limit command, verify your OS default values.
$ launchctl limit
cpu unlimited unlimited
filesize unlimited unlimited
data unlimited unlimited
stack 8388608 67104768
core 0 unlimited
rss unlimited unlimited
memlock unlimited unlimited
maxproc 709 1064
maxfiles 256 unlimited
14. If you do not set any of the values in Step 11to the default OSX values above, take the fol-
lowing steps to modify values.
Using a text editor, edit the launchd.conf file with the correct, default values as shown in Step
11.
Example:
$ cat /etc/launchd.conf
limit maxproc 709 1064
Note: Some older versions of OSX have smaller limits for maxproc. If your version of OSX supports
increasing the limits through / etc/ launchctl.conf, increase the value.
15. For all changes to take effect either reboot your system or reload the launch daemon.
- 730 -
sudo launchctl load /Library/LaunchDaemons/com.tenablesecurity.nessusd.plist
Limitations
l When scanning localhost, Nessus plugins assume that they are running as root. Therefore, cer-
tain types of scans may fail. For example, because Nessus is now running as a non-privileged
user, file content Compliance Audits may fail or return erroneous results since the plugins are
not able to access all directories.
l nessuscli does not have a --no-root mode. Running commands with nessuscli as root
could potentially create files in the Nessus install directory owned by root, which could cause
Nessus to be unable to access them appropriately. Use care when running nessuscli, and
potentially fix permissions with chown after using it.
Note: Unless otherwise noted, execute the following commands in a root login shell.
# adduser
Username: nonprivuser
Full name: NonPrivUser
Uid (Leave empty for default):
Login group [nonprivuser]:
Login group is nonprivuser. Invite nonprivuser into other groups? []:
Login class [default]:
Shell (sh csh tcsh bash rbash nologin) [sh]:
Home directory [/home/nonprivuser]:
Home directory permissions (Leave empty for default):
- 731-
Use password-based authentication? [yes]:
Use an empty password? (yes/no) [no]:
Use a random password? (yes/no) [no]:
Enter password:
Enter password again:
Lock out the account after creation? [no]:
Username : nonprivuser
Password : *****
Full Name : NonPrivUser
Uid : 1003
Class :
Groups : nonprivuser
Home : /home/nonprivuser
Home Mode :
Shell : /bin/sh
Locked : no
OK? (yes/no): yes
adduser: INFO: Successfully added (nonprivuser) to the user database.
Add another user? (yes/no): no
Goodbye!
5. Create a group to give the non-root user access to the /dev/bpf device and allow them to
use raw sockets.
pw groupadd access_bpf
pw groupmod access_bpf -m nonprivuser
- 732 -
6. Confirm that nonprivuser appears in the group.
# pw groupshow access_bpf
access_bpf:*:1003:nonprivuser
# ulimit -a
cpu time (seconds, -t) unlimited
file size (512-blocks, -f) unlimited
data seg size (kbytes, -d) 33554432
stack size (kbytes, -s) 524288
core file size (512-blocks, -c) unlimited
max memory size (kbytes, -m) unlimited
locked memory (kbytes, -l) unlimited
max user processes (-u) 6670
open files (-n) 58329
virtual mem size (kbytes, -v) unlimited
swap limit (kbytes, -w) unlimited
sbsize (bytes, -b) unlimited
pseudo-terminals (-p) unlimited
8. If any of the values in Step 6. do not meet the minimum requirements, take the following
steps to modify values.
- 733 -
9. Next, using a text editor, modify the /usr/local/etc/rc.d/nessusd service script to
remove and add the following lines:
Remove: /usr/local/nessus/sbin/nessus-service -D -q
Add: chown root:access_bpf /dev/bpf
Add: chmod 660 /dev/bpf
Add: daemon -u nonprivuser /usr/local/nessus/sbin/nessus-service -D -q --
no-root
nessusd_start() {
echo 'Starting Nessus...'
chown root:access_bpf /dev/bpf
chmod 660 /dev/bpf
daemon -u nonprivuser /usr/local/nessus/sbin/nessus-service -D -q --no-root
}
nessusd_stop() {
test -f /usr/local/nessus/var/nessus/nessus-service.pid && kill `cat
/usr/local/nessus/var/nessus/nessus-service.pid` && echo 'Stopping Nessus...' &&
sleep 3
}
- 734 -
Upgrade Assistant
The following feature is not supported in Federal Risk and Authorization Manage Program (FedRAMP) envir-
onments. For more information, see the FedRAMP Product Offering.
You can upgrade data from Tenable Nessus to Tenable Vulnerability Management via the Upgrade
Assistant tool.
For more information, see Nessus to Tenable Vulnerability Management Upgrade Assistant.
- 735 -