Formation Nessus
Formation Nessus
Formation Nessus
x User Guide
Last Updated: December 11, 2021
Table of Contents
Navigate Nessus 19
System Requirements 20
Hardware Requirements 21
Software Requirements 25
Licensing Requirements 30
Deployment Considerations 31
Host-Based Firewalls 32
IPv6 Support 33
Virtual Machines 34
Antivirus Software 35
Security Warnings 36
Trust a Custom CA 45
Install Nessus 52
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Download Nessus 53
Install Nessus 55
Upgrade Nessus 88
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Link to Tenable.io 107
Remove Nessus 145
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Uninstall Nessus on Windows 148
Scans 156
Credentials 242
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Database Credentials Authentication Types 254
Host 268
SNMPv3 269
SSH 271
Windows 285
Miscellaneous 299
Mobile 304
Compliance 321
Plugins 326
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Stop a Running Scan 345
Severity 348
Dashboard 367
Vulnerabilities 369
Live Results 378
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Customize Report Title and Logo 387
Policies 396
Sensors 414
Agents 415
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Export Agents 422
Clustering 439
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Cluster Groups 456
Scanners 468
Settings 475
About 476
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Proxy Server 525
Custom CA 532
Notifications 541
Accounts 544
My Account 545
Users 548
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Additional Resources 554
Nessus-Service 563
Nessuscli 566
Prerequisites 607
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Prerequisites 613
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Welcome to Nessus 10.0.x
If you are new to Nessus®, see Get Started with Nessus.
Nessus Solutions
Tenable.io
Tenable.io is a subscription based license and is available at the Tenable Store.
Tenable.io enables security and audit teams to share multiple Nessus scanners, scan schedules, scan
policies and most importantly scan results among an unlimited set of users or groups.
By making different resources available for sharing among users and groups, Tenable.io allows for end-
less possibilities for creating highly customized work flows for your vulnerability management pro-
gram, regardless of locations, complexity, or any of the numerous regulatory or compliance drivers
that demand keeping your business secure.
In addition, Tenable.io can control multiple Nessus scanners, schedule scans, push policies and view
scan findings—all from the cloud, enabling the deployment of Nessus scanners throughout your net-
work to multiple physical locations, or even public or private clouds.
l Up to 2 quarterly report submissions for PCI ASV validation through Tenable, Inc..
l 24/7 access to the Tenable Community site for Nessus knowledge base and support ticket cre-
ation
Nessus® Professional
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Nessus Professional, the industry’s most widely deployed vulnerability assessment solution helps you
reduce your organization’s attack surface and ensure compliance. Nessus features high-speed asset
discovery, configuration auditing, target profiling, malware detection, sensitive data discovery, and
more.
Nessus supports more technologies than competitive solutions, scanning operating systems, network
devices, hypervisors, databases, web servers, and critical infrastructure for vulnerabilities, threats, and
compliance violations.
With the world’s largest continuously-updated library of vulnerability and configuration checks, and
the support of Tenable, Inc.’s expert vulnerability research team, Nessus sets the standard for vul-
nerability scanning speed and accuracy.
Nessus® Manager
Note: Nessus Manager is no longer sold as of February 1, 2018. For existing standalone Nessus Manager cus-
tomers, service will continue to be provided through the duration of your contract. Nessus Manager will continue
to be supported and provisioned for the purposes of managing agents.
Nessus Manager combines the powerful detection, scanning, and auditing features of Nessus, the
world’s most widely deployed vulnerability scanner, with extensive management and collaboration
functions to reduce your attack surface.
Nessus Manager enables the sharing of resources including Nessus scanners, scan schedules, policies,
and scan results among multiple users or groups. Users can engage and share resources and respons-
ibilities with their co-workers; system owners, internal auditors, risk and compliance personnel, IT
administrators, network admins and security analysts. These collaborative features reduce the time
and cost of security scanning and compliance auditing by streamlining scanning, malware and mis-
configuration discovery, and remediation.
Nessus Manager protects physical, virtual, mobile and cloud environments. Nessus Manager is avail-
able for on-premises deployment or from the cloud, as Tenable.io. Nessus Manager supports the
widest range of systems, devices and assets, and with both agent-less and Nessus Agent deployment
options, easily extends to mobile, transient and other hard-to-reach environments.
Nessus® Agent
For Nessus Agent documentation, see the Nessus Agent User Guide.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Nessus Agents, available with Tenable.io and Nessus Manager, increase scan flexibility by making it
easy to scan assets without needing ongoing host credentials or assets that are offline, as well as
enable large-scale concurrent scanning with little network impact.
Nessus Agents are lightweight, low-footprint programs that you install locally on hosts to supplement
traditional network-based scanning or to provide visibility into gaps that are missed by traditional
scanning. Nessus Agents collect vulnerability, compliance, and system data, and report that inform-
ation back to a manager for analysis. With Nessus Agents, you extend scan flexibility and coverage.
You can scan hosts without using credentials, as well as offline assets and endpoints that inter-
mittently connect to the internet. You can also run large-scale concurrent agent scans with little net-
work impact.
Nessus Agents help you address the challenges of traditional network-based scanning, specifically for
the assets where it's impossible or nearly impossible to consistently collect information about your
organization's security posture. Traditional scanning typically occurs at selected intervals or during
designated windows and requires systems to be accessible when a scan is executed. If laptops or
other transient devices are not accessible when a scan is executed, they are excluded from the scan,
leaving you blind to vulnerabilities on those devices. Nessus Agents help reduce your organization’s
attack surface by scanning assets that are off the network or powered-down during scheduled assess-
ments or by scanning other difficult-to-scan assets.
Once installed on servers, portable devices, or other assets found in today’s complex IT environments,
Nessus Agents identify vulnerabilities, policy violations, misconfigurations, and malware on the hosts
where they are installed and report results back to the managing product. You can manage Nessus
Agents with Nessus Manager or Tenable.io.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Get Started with Nessus
Prepare
l Ensure that your setup meets the minimum system requirements:
l Hardware Requirements
l Software Requirements
2. Create a scan.
When you configure a Tenable-provided scan template, you can modify only the settings
included for the scan template type. When you create a user-defined scan template, you can
modify a custom set of settings for your scan. A user-defined template is also known as a policy.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
4. Configure the scan:
l (Optional) If you are running a compliance scan, select the compliance audits your scan
includes.
l (Optional) If you are using an advanced scan template, select what plugins your scan
includes.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Navigate Nessus
The top navigation bar displays links to the two main pages: Scans and Settings. You can perform all
Nessus primary tasks using these two pages. Click a page name to open the corresponding page.
Item Description
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
System Requirements
You can run Nessus in the following environments.
Tenable Core Virtual VMware Requirements in the Tenable Core User Guide
Microsoft
Hyper-V
Hardware
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Hardware Requirements
Enterprise networks can vary in performance, capacity, protocols, and overall activity. Resource
requirements to consider for Nessus deployments include raw network speed, the size of the network
being monitored, and the configuration of Nessus.
Note: The following recommendations are guidelines for the minimum hardware allocations. Certain types of
scans are more resource intensive. If you run complex scans, especially those with credentials, you may require
additional disk space, memory, and processing power.
Tip: For information about Tenable Core + Nessus, see Requirements in the Tenable Core User Guide.
Storage Requirements
You must install Nessus on direct-attached storage (DAS) devices. Nessus does not support storage
area networks (SANs) or network-attached storage (NAS) configurations.
Tenable recommends a minimum of 1,000 MB of temporary space for the Nessus scanner to run prop-
erly.
NIC Requirements
Tenable recommends you configure the following, at minimum, to ensure network interface controller
(NIC) compatibility with Nessus:
l Avoid deploying Nessus in a Docker container that shares a NIC with another Docker container.
For assistance confirming if other aspects of your NIC configuration are compatible with Nessus, con-
tact Tenable Support.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Scenario Minimum Recommended Hardware
Disk space: 30 GB, not including space used by the host operating
system
Note: Your usage (e.g., scan results, plugin updates, and logs) increases
the amount of disk space needed over time.
Disk space: 30 GB, not including space used by the host operating
system
Note: Your usage (e.g., scan results, plugin updates, and logs) increases
the amount of disk space needed over time.
Nessus Manager
The following table lists the hardware requirements for Nessus Manager.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Scenario Minimum Recommended Hardware
Virtual Machine
Nessus can be installed on a Virtual Machine that meets the same requirements. If your virtual
machine is using Network Address Translation (NAT) to reach the network, many of the Nessus vul-
nerability checks, host enumeration, and operating system identification are negatively affected.
Nessus Agents
Nessus Agents are designed to be lightweight and to use only minimal system resources. Generally, a
Nessus Agent uses 40 MB of RAM (all pageable). A Nessus Agent uses almost no CPU while idle, but is
designed to use up to 100% of CPU when available during jobs.
For more information on Nessus Agent resource usage, see Agent Software Footprint and Agent Host
System Utilization.
The following table outlines the minimum recommended hardware for operating a Nessus Agent. Nes-
sus Agents can be installed on a virtual machine that meets the same requirements specified.
RAM > 1 GB
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Hardware Minimum Requirement
Note: You can control the priority of the Nessus Agent relative to the priority of other tasks running on the sys-
tem. For more information see Agent CPU Resource Control in the Nessus Agent Deployment and User Guide.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Software Requirements
Nessus supports Mac, Linux, and Windows operating systems.
Tip: For information about Tenable Core + Nessus, see System Requirements in the Tenable Core User Guide.
Operating
Supported Versions
System
64-bit Linux l Amazon Linux 2015.03, Amazon Linux 2015.09, Amazon Linux 2017.09,
Amazon Linux 2018.03, and Amazon Linux 2
l Debian 9 and 10 / Kali Linux 2017.1, 2018, 2019, 2020, and Rolling
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Operating
Supported Versions
System
64-bit Win- l Windows Server 2008 R2 SP1, Windows Server 2012, Windows Server 2012
dows R2, Windows Server 2016, Windows Server 2019
Note: For Nessus 8.8 and later, you must install Visual C++ Redistributable
for Visual Studio 2015 on the host operating system.
The redistributable package requires the following service packs to be
installed on the following Windows versions: Windows Server 2008 requires
Service Pack 2, Windows Server 2008 R2 requires Service Pack 1, and Win-
dows 7 requires Service Pack 1.
Tip: Windows Server 2008 R2’s bundled version of Microsoft IE does not inter-
face with a Java installation properly. This causes Nessus to not perform as
expected in some situations: Microsoft’s policy recommends not using MSIE
on server operating systems.
For increased performance and scan reliability when installing on a Windows
platform, Tenable highly recommends that Nessus be installed on a server
product from the Microsoft Windows family such as Windows Server 2008
R2.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Operating
Supported Versions
System
Nessus Agents
For Nessus Agent software requirements, see the Agent Software Requirements in the Nessus
Agent User Guide.
SELinux Requirements
Nessus supports disabled, permissive, and enforcing mode Security-Enhanced Linux (SELinux) policy
configurations.
l Disabled and permissive mode policies typically do not require customization to interact withNes-
sus.
l Enforcing mode policies require customization to interact with Nessus. For more information,
see Customize SELinux Enforcing Mode Policies.
Note:Tenable recommends testing your SELinux configurations before deploying on a live network.
PDF Report Requirements
The Nessus .pdf report generation feature requires the latest version of Oracle Java or OpenJDK.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Note: If you install Oracle Java or OpenJDK after you install Nessus, you must reinstall Nessus to enable PDF
report generation.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Customize SELinux Enforcing Mode Policies
Security-Enhanced Linux (SELinux) enforcing mode policies require customization to interact with Nes-
sus.
Tenable Support does not assist with customizing SELinux policies, but Tenable recommends mon-
itoring your SELinux logs to identify errors and solutions for your policy configuration.
1. Run the sealert tool, where /var/log/audit/audit.log is the location of your SELinux
audit log:
sealert -a /var/log/audit/audit.log
The tool runs and generates a summary of error alerts and solutions. For example:
3. Restart Nessus.
4. Run the sealert tool again to confirm you resolved the error alerts.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Licensing Requirements
Nessus is available to operate either as a subscription or managed by Tenable.sc. Nessus requires a
plugin feed Activation Code to operate in subscription mode. This code identifies which version of Nes-
sus you are licensed to install and use, and if applicable, how many IP addresses can be scanned, how
many remote scanners can be linked to Nessus, and how many Nessus Agents can be linked to Nessus
Manager. Nessus Manager licenses are specific to your deployment size, especially for large deploy-
ments or deployments with multiple Nessus Manager instances. Discuss your requirements with your
Tenable Customer Success Manager.
It is recommended that you obtain the Activation Code before starting the installation process, as it is
required before you can set up Nessus.
l is a one-time code, unless your license or subscription changes, at which point a new activation
code will be issued to you.
Note: For more information about managing Nessus offline, refer to the Nessus User Guide.
You may purchase a Nessus subscription through the Tenable, Inc. online store at https://store.ten-
able.com/ or via a purchase order through Authorized Nessus Partners. You will then receive an Activ-
ation Code from Tenable, Inc.. This code will be used when configuring your copy of Nessus for
updates.
If you are using Tenable.sc to manage your Nessus scanners, the Activation Code and plugin updates
are managed from Tenable.sc. You must start Nessus before it communicates with Tenable.sc, which
it normally does not do without a valid Activation Code and plugins. To have Nessus ignore this require-
ment and start (so that it can get the information from Tenable.sc), when you register your scanner,
select Managed by SecurityCenter.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Deployment Considerations
When deploying Nessus, knowledge of routing, filters, and firewall policies is often helpful. Deploying
behind a NAT device is not desirable unless it is scanning the internal network. Any time a vulnerability
scan flows through a NAT device or application proxy of some sort, the check can be distorted and a
false positive or negative can result.
In addition, if the system running Nessus has personal or desktop firewalls in place, these tools can
drastically limit the effectiveness of a remote vulnerability scan. Host-based firewalls can interfere
with network vulnerability scanning. Depending on your firewall’s configuration, it may prevent, distort,
or hide the probes of a Nessus scan.
Certain network devices that perform stateful inspection, such as firewalls, load balancers, and Intru-
sion Detection/Prevention Systems, may react negatively when a scan is conducted through them. Nes-
sus has a number of tuning options that can help reduce the impact of scanning through such devices,
but the best method to avoid the problems inherent in scanning through such network devices is to
perform a credentialed scan.
If you configure Nessus Manager for agent management, Tenable does not recommend using Nessus
Manager as a local scanner. For example, do not configure Tenable.sc scan zones to include Nessus
Manager and avoid running network-based scans directly from Nessus Manager. These configurations
can negatively impact agent scan performance.
l Host-Based Firewalls
l IPv6 Support
l Virtual Machines
l Antivirus Software
l Security Warnings
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Host-Based Firewalls
Port 8834
The Nessus user interface uses port 8834. If not already open, open port 8834 by consulting your fire-
wall vendor's documentation for configuration instructions.
Allow Connections
If your Nessus server is configured on a host with 3rd-party firewall such as ZoneAlarm or Windows
firewall, you must configure it to allow connections from the IP addresses of the clients using Nessus.
To open the ports required for Nessus, use the following commands:
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
IPv6 Support
Nessus supports scanning of IPv6 based resources. Many operating systems and devices ship with
IPv6 support enabled by default. To perform scans against IPv6 resources, at least one IPv6 interface
must be configured on the host where Nessus is installed, and Nessus must be on an IPv6 capable net-
work (Nessus cannot scan IPv6 resources over IPv4, but it can enumerate IPv6 interfaces via cre-
dentialed scans over IPv4). Both full and compressed IPv6 notation is supported when initiating scans.
Scanning IPv6 Global Unicast IP address ranges is not supported unless the IPs are entered separately
(i.e., list format). Nessus does not support ranges expressed as hyphenated ranges or CIDR addresses.
Nessus supports Link-local ranges with the link6 directive as the scan target or local link with eth0.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Virtual Machines
If your virtual machine uses Network Address Translation (NAT) to reach the network, many of Nessus
vulnerability checks, host enumeration, and operating system identification are negatively affected.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Antivirus Software
Due to the large number of TCP connections generated during a scan, some anti-virus software pack-
ages may classify Nessus as a worm or a form of malware.
If your anti-virus software gives a warning, select Allow to let Nessus continue scanning.
If your anti-virus package has an option to add processes to an exception list, add nessusd.exe,
nessus-service.exe, and nessuscli.exe.
For more information about whitelisting Nessus folders, files, and processes in security products, see
File and Process Whitelist.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Security Warnings
By default, Nessus is installed and managed using HTTPS and SSL uses port 8834. The default install-
ation of Nessus uses a self-signed SSL certificate.
During the web-based portion of the Nessus installation, the following message regarding SSL
appears:
You are likely to get a security alert from your web browser saying that the SSL certificate is
invalid. You may either choose to temporarily accept the risk, or you can obtain a valid SSL
certificate from a registrar.
This information refers to a security related message you encounter when accessing the Nessus UI
(https://[server IP]:8834).
l an untrusted site
l an unsecure connection
Because Nessus is providing a self-signed SSL certificate, this is expected and normal behavior.
Bypassing SSL warnings
Based on the browser you are using, use the steps below to proceed to the Nessus login page.
Browser Instructions
Mozilla Firefox Select I Understand the Risks, and then select Add Exception.
Next select Get Certificate, and finally select Confirm Security Exception.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Certificates and Certificate Authorities
Nessus includes the following defaults:
l The default Nessus SSL certificate and key, which is made up of two files: servercert.pem and
serverkey.pem.
l A Nessus certificate authority (CA), which signs the default Nessus SSL certificate. The CA is
made up of two files: cacert.pem and cakey.pem.
However, you may want to upload your own certificates or CAs for advanced configurations or to
resolve scanning issues. For more information, see:
l Custom SSL Server Certificates — View an overview of Nessus SSL server certificates and
troubleshoot common certificate problems.
l Create a New Server Certificate and CA Certificate — If you do not have your own custom
CA and server certificate, you can use Nessus to create a new server certificate and CA cer-
tificate.
l Upload a Custom Server Certificate and CA Certificate — Replace the default certificate
that ships with Nessus.
l Create SSL Client Certificates for Login — Create an SSL client certificate to log in to Nessus
instead of using a username and password.
l Trust a Custom CA — Add a custom root CA to the list of CAs that are trusted by Nessus.
l Nessus Manager Certificates and Nessus Agent — Understand the certificate chain between Nes-
sus Manager and Nessus Agents and troubleshoot issues.
Linux /opt/nessus/com/nessus/CA/servercert.pem
/opt/nessus/var/nessus/CA/serverkey.pem
/opt/nessus/com/nessus/CA/cacert.pem
/opt/nessus/var/nessus/CA/cacert.key
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Operating System Directory
FreeBSD /usr/local/nessus/com/nessus/CA/servercert.pem
/usr/local/nessus/var/nessus/CA/serverkey.pem
/usr/local/nessus/com/nessus/CA/cacert.pem
/usr/local/nessus/var/nessus/CA/cacert.key
Windows C:\ProgramData\Tenable\Nessus\nessus\CA\servercert.pem
C:\ProgramData\Tenable\Nessus\nessus\CA\serverkey.pem
C:\ProgramData\Tenable\Nessus\nessus\CA\cacert.pem
C:\ProgramData\Tenable\Nessus\nessus\CA\cacert.key
/Library/Nessus/run/var/nessus/CA/serverkey.pem
/Library/Nessus/run/com/nessus/CA/cacert.pem
/Library/Nessus/run/var/nessus/CA/cacert.key
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Custom SSL Server Certificates
By default, Nessus uses an SSL certificate signed by the Nessus certifciate authority (CA), Nessus Cer-
tification Authority. During installation, Nessus creates two files that make up the certificate: server-
cert.pem and serverkey.pem. This certificate allows you to access Nessus over HTTPS through port
8834.
Because Nessus Certification Authority is not a trusted valid certificate authority, the certificate is
untrusted, which can result in the following:
l Your browser may produce a warning regarding an unsafe connection when you access Nessus
via HTTPS through port 8834.
l Plugin 51192 may report a vulnerability when scanning the Nessus scanner host.
To resolve these issues, you can use a custom SSL certificate generated by your organization or a trus-
ted CA.
l Create a New Server Certificate and CA Certificate. — If your organization does not have a cus-
tom SSL certificate, create your own using the built-in Nessus mkcert utility.
l Upload a Custom Server Certificate and CA Certificate — Replace the default certificate that
ships with Nessus.
l Trust a Custom CA — Add a custom CA to the list of CAs that are trusted by Nessus.
Troubleshooting
For common problems with SSL certificates, see the following table.
Problem Solution
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
browsers. Go to the following address in your
browser: https://[IP address]:8834/getcert.
Plugin 51192 reports that an Add your custom root CA to the list of CAs that Nessus trusts,
unknown CA was found at the top as described in Trust a Custom CA.
of the certificate chain.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Create a New Server Certificate and CA Certificate
If you do not have your own custom certificate authority (CA) and server certificate (for example, a trus-
ted certificate that your organization uses), you can use Nessus to create a new server certificate and
CA certificate.
This server certificate is signed by the Nessus CA, which means your browser may report that the
server certificate is untrusted.
1. Access the Nessus CLI as an administrator user or a user with equivalent privileges.
Linux:
# /opt/nessus/sbin/nessuscli mkcert
macOS
# /Library/Nessus/run/sbin/nessuscli mkcert
Windows
C:\Program Files\Tenable\Nessus\nessuscli.exe mkcert
3. When prompted for the hostname, enter the DNS name or IP address of the Nessus server in the
browser such as https://hostname:8834/ or https://ipaddress:8834/. The default certificate uses
the hostname.
What to do next:
l Because Nessus Certification Authority is not a trusted valid certificate authority, the certificate
is untrusted, which can result in the following:
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
l Your browser may produce a warning regarding an unsafe connection when you access
Nessus via HTTPS through port 8834.
l Plugin 51192 may report a vulnerability when scanning the Nessus scanner host.
To resolve either of those issues, Trust a Custom CA. For more information about how Nessus
uses custom SSL server certificates and CAs, see Custom SSL Server Certificates.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Upload a Custom Server Certificate and CA Certificate
These steps describe how to upload a custom server certificate and certificate authority
(CA) certificate to the Nessus web server through the command line.
You can use the nessuscli import-certs command to validate the server key, server certificate,
and CA certificate, check that they match, and copy the files to the correct locations. Alternatively, you
can also manually copy the files.
2. Type the following, replacing the server key, server certificate, and CA certificate with the appro-
priate path and filenames for each file.
Nessus validates the files, checks that they match, and copies the files to the correct locations.
To manually upload a custom server certificate and CA certificate using the CLI:
For the location of the default certificate files for your operating system, see Upload a Custom
Server Certificate and CA Certificate.
Linux example:
cp /opt/nessus/com/nessus/CA/cacert.pem /opt/nessus/com/nessus/CA/cacert.pem.orig
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
cp /opt/nessus/com/nessus/CA/servercert.pem
/opt/nessus/com/nessus/CA/servercert.pem.orig
cp /opt/nessus/var/nessus/CA/serverkey.pem
/opt/nessus/var/nessus/CA/serverkey.pem.orig
Note: The certificates must be unencrypted, and must be named servercert.pem and serverkey.pem.
Note: If your certificate does not link directly to the root certificate, add an intermediate certificate chain,
a file named serverchain.pem, in the same directory as the servercert.pem file. This file contains the
1-n intermediate certificates (concatenated public certificates) necessary to construct the full certificate
chain from the Nessus server to its ultimate root certificate (one trusted by the user’s browser).
Linux example:
cp customCA.pem /opt/nessus/com/nessus/CA/cacert.pem
cp servercert.pem /opt/nessus/com/nessus/CA/servercert.pem
cp serverkey.pem /opt/nessus/var/nessus/CA/serverkey.pem
6. In a browser, log in to the Nessus user interface as a user with administrator permissions.
Subsequent connections should not display a warning if the certificate was generated by a trus-
ted CA.
What to do next:
l If the CA is not already trusted by Nessus, configure Nessus to Trust a Custom CA.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Trust a Custom CA
By default, Nessus trusts certificate authorities (CAs) based on root certificates in the Mozilla Included
CA Certificate list. These trusted CAs are listed in the known_CA.inc file in the Nessus plugins dir-
ectory. Tenable updates known_CA.inc when updating plugins.
If you have a custom root CA that is not included in the known CAs, you can configure Nessus to trust
the custom CA to use for certificate authentication.
You can use either the Nessus user interface or the command line interface (CLI).
Note: Include the beginning text -----BEGIN CERTIFICATE----- and ending text -----
END CERTIFICATE-----.
Tip: You can save more than one certificate in a single text file, including the beginning and ending text
for each one.
4. Click Save .
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
1. Save your PEM-formatted CA as a text file.
Note: Include the beginning text -----BEGIN CERTIFICATE----- and ending text -----
END CERTIFICATE-----.
Tip: You can save more than one certificate in a single text file, including the beginning and ending text
for each one.
Linux
/opt/nessus/lib/nessus/plugins
Windows
C:\ProgramData\Tenable\Nessus\nessus\plugins
Mac OS X
/Library/Nessus/run/lib/nessus/plugins
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Create SSL Client Certificates for Login
You can configure Nessus to use SSL client certificate authentication for users to log in to Nessus
when accessing Nessus on port 8834. After certificate authentication is enabled, you can no longer log
in using a username and password.
Caution: Nessus does not support connecting Agents, Remote Scanners, or Managed Scanners after SSL client
certificate authentication is enabled. Configure an alternate port to enable supporting remote agents and scan-
ners using the advanced setting remote_listen_port. For more information, see Advanced Settings.
l smart cards
1. Access the Nessus CLI as an administrator user or a user with equivalent privileges.
Linux
# /opt/nessus/sbin/nessuscli fix --set force_pubkey_auth=yes
macOS
# /Library/Nessus/run/sbin/nessuscli fix --set force_pubkey_auth=yes
Windows
C:\Program Files\Tenable\Nessus\nessuscli.exe fix --set force_pubkey_auth-
h=yes
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
3. Create a client certificate for each user you want to be able to log in to Nessus via
SSL authentication.
Linux:
# /opt/nessus/sbin/nessuscli mkcert-client
macOS
# /Library/Nessus/run/sbin/nessuscli mkcert-client
Windows
C:\Program Files\Tenable\Nessus\nessuscli.exe mkcert-client
Note: The answers you provided in the initial prompts remain as defaults if you create subsequent
client certificates during the same session. However, you can change the values for each client cer-
tificate you create.
The client certificates are created and placed in the Nessus temporary directory:
l Linux: /opt/nessus/var/nessus/tmp/
l macOS: /Library/Nessus/run/var/nessus/tmp/
l Windows: C:\ProgramData\Tenable\Nessus\tmp
c. Combine the two files (the certificate and the key) and export them into a format that can
be imported into the browser, such as .pfx.
In the previous example, the two files were key_sylvester.pem and cert_sylvester-
.pem.
For example, you can combine the two files by using the openssl program and the fol-
lowing command:
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
# openssl pkcs12 -export -out combined_sylvester.pfx -inkey key_sylvester.pem
-in cert_sylvester.pem -chain -CAfile /opt/nessus/com/nessus/CA/cacert.pem -
passout 'pass:password' -name 'Nessus User Certificate for: sylvester'
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Nessus Manager Certificates and Nessus Agent
When you link an agent to Nessus Manager, you can optionally specify the certificate that the agent
should use when it links with Nessus Manager. This allows the agent to verify the server certificate
from Nessus Manager when the agent links with Nessus Manager, and secures subsequent com-
munication between the agent and Nessus Manager. For more information on linking Nessus Agent,
see Nessuscli.
If you do not specify the certificate authority (CA) certificate at link time, the agent receives and trusts
the CA certificate from the linked Nessus Manager. This ensures that subsequent communication
between the agent and Nessus Manager is secure.
The CA certificate the agent receives at linking time is stored in the following location:
l
Linux
/opt/nessus_agent/var/nessus/users/nessus_ms_agent/ms_cert.pem
l
Windows
C:\ProgramData\Tenable\Nessus Agent\nessus\users\nessus_ms_agent\ms_cer-
t.pem
l
Mac OS X
/Library/NessusAgent/run/lib/nessus/users/nessus_ms_agent/ms_cert.pem
Troubleshooting
If the agent cannot follow the complete certificate chain, an error occurs and the agent stops con-
necting with the manager. An example of this event can be seen in the following sensor logs:
l nessusd.messages - Example: Server certificate validation failed: unable to get local issuer cer-
tificate
l backend.log - Example: [error] [msmanager] SSL error encountered when negotiating with
<Manager_IP>:<PORT>. Code 336134278, unable to get local issuer certificate,
error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
A common reason your certificate chain may be broken is if you change the server certificate on Nes-
sus Manager but do not update the CA certificate. The agent is then unable to communicate to the man-
ager upon restart. To resolve this issue, do one of the following:
l Unlink and relink the agent to Nessus Manager, which resets the certificate so the agent gets the
correct CA certificate from Nessus Manager.
l Manually upload the correct cacert.pem file from Nessus Manager into the custom_CA.inc file
in the agent plugin directory:
l
Linux
/opt/nessus_agent/lib/nessus/plugins
l
Windows
C:\ProgramData\Tenable\Nessus Agent\nessus\plugins
l
Mac OS X
/Library/NessusAgent/run/lib/nessus/plugins
l Generate a new server certificate on Nessus Manager using the CA for which the agent already
has the CA certificate, so that the certificate chain is still valid.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Install Nessus
This section includes information and steps required for installing Nessus on all supported operating
systems.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Download Nessus
You can download Nessus from the Tenable Downloads site.
When you download Nessus, ensure the package selected is specific to your operating system and pro-
cessor.
There is a single Nessus package per operating system and processor. Nessus Manager and Nessus
Professional do not have different packages; your activation code determines which Nessus product
will be installed.
Nessus-<version number>- Nessus <version number> for Windows Server 2008, Server 2008
x64.msi R2*, Server 2012, Server 2012 R2, 7, 8, and 10 - x86-64
Nessus-<version number>- Nessus <version number> for Debian 6 and 7 / Kali Linux - AMD64
debian6_amd64.deb
Nessus-<version num- Nessus <version number> for Mac OS X 10.8, 10.9, and 10.10 - x86-
ber>.dmg 64
Nessus-<version number>- Nessus <version number> for Red Hat ES 6 / CentOS 6 / Oracle
es6.i386.rpm Linux 6 (including Unbreakable Enterprise Kernel) - i386
Nessus-<version number>- Nessus <version number> for SUSE 10.0 Enterprise - x86_64
suse10.x86_64.rpm
Nessus-<version number>- Nessus <version number> for Ubuntu 11.10, 12.04, 12.10, 13.04, 13.10,
ubuntu1110_amd64.deb and 14.04 - AMD64
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Nessus Agent Packages Nessus Agent Package Descriptions
NessusAgent-<version num- Nessus Agent <version number> for Windows Server 2008, Server
ber>-x64.msi 2008 R2*, Server 2012, Server 2012 R2, 7, 8, and 10 - x86-64
NessusAgent-<version num- Nessus Agent <version number> for Amazon Linux 2015.03,
ber>-amzn.x86_64.rpm 2015.09 - x86-64
NessusAgent-<version num- Nessus Agent <version number> for Debian 6 and 7 / Kali Linux -
ber>-debian6_i386.deb i386
NessusAgent-<version num- Nessus Agent <version number> for Mac OS X 10.8, 10.9, and 10.10 -
ber>.dmg x86-64
NessusAgent-<version num- Nessus Agent <version number> for Red Hat ES 6 / CentOS 6 /
ber>-es6.x86_64.rpm Oracle Linux 6 (including Unbreakable Enterprise Kernel) - x86_64
NessusAgent-<version num- Nessus Agent <version number> for Fedora 20 and 21 - x86_64
ber>-fc20.x86_64.rpm
NessusAgent-<version num- Nessus Agent <version number> for Ubuntu 11.10, 12.04, 12.10, 13.04,
ber>-ubuntu1110_ 13.10, and 14.04 - AMD64
amd64.deb
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Install Nessus
This section describes how to install Nessus Manager and Nessus Professional on the following oper-
ating systems:
l Linux
l Windows
l Mac OS X
l Raspberry Pi
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Install Nessus on Linux
Caution: If you install a Nessus Agent, Manager, or Scanner on a system with an existing Nessus Agent, Manager,
or Scanner running nessusd, the installation process will kill all other nessusd processes. You may lose scan
data as a result.
Note: Nessus does not support using symbolic links for /opt/nessus/.
Debian version 6
# dpkg -i Nessus-<version number>-debian6_amd64.deb
FreeBSD version 10
# pkg add Nessus-<version number>-fbsd10-amd64.txz
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
# /etc/init.d/nessusd start
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Install Nessus on Windows
Caution: If you install a Nessus Agent, Manager, or Scanner on a system with an existing Nessus Agent, Manager,
or Scanner running nessusd, the installation process will kill all other nessusd processes. You may lose scan
data as a result.
Note: Nessus does not support using symbolic links for /opt/nessus/.
2. On the License Agreement screen, read the terms of the Tenable, Inc. Nessus software license
and subscription agreement.
3. Select the I accept the terms of the license agreement option, and then click Next.
4. On the Destination Folder screen, select the Next button to accept the default installation folder.
Otherwise, select the Change button to install Nessus to a different folder.
5. On the Ready to Install the Program screen, select the Install button.
The Installing Tenable, Inc. Nessus screen will be displayed and a Status indication bar will illustrate
the installation progress. The process may take several minutes.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
As part of the Nessus installation process, WinPcap needs to be installed. If WinPcap was previously
installed as part of another network application, the following steps will not appear, and you will con-
tinue with the installation of Nessus.
1. On the Welcome to the WinPcap Setup Wizard screen, select the Next button.
2. On the WinPcap License Agreement screen, read the terms of the license agreement, and then
select the I Agree button to continue.
3. On the WinPcap Installation options screen, ensure that the Automatically start the WinPcap
driver at boot time option is checked, and then select the Install button.
4. On the Completing the WinPcap Setup Wizard screen, select the Finish button.
TheTenable Nessus InstallShield Wizard Completed screen appears.
After the InstallShield Wizard completes, the Welcome to Nessus page loads in your default browser.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Install Nessus on Mac OS X
Caution: If you install a Nessus Agent, Manager, or Scanner on a system with an existing Nessus Agent, Manager,
or Scanner running nessusd, the installation process will kill all other nessusd processes. You may lose scan
data as a result.
Note: Nessus does not support using symbolic links for /opt/nessus/.
Introduction
The Welcome to the Tenable, Inc. Nessus Server Installer window provides general information
about the Nessus installation.
License
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
1. On the Software License Agreement screen, read the terms of the Tenable, Inc. Nessus soft-
ware license and subscription agreement.
4. To continue installing Nessus, select the Agree button, otherwise, select the Disagree button to
quit and exit.
Installation Type
On the Standard Install on <DriveName> screen, choose one of the following options:
l Select the Install button to continue using the default installation location.
Installation
When the Preparing for installation screen appears, you will be prompted for a username and pass-
word.
1. Enter the Name and Password of an administrator account or the root user account.
2. On the Ready to Install the Program screen, select the Install button.
Next, the Installing Tenable, Inc. Nessus screen will be displayed and a Status indication bar will illus-
trate the remaining installation progress. The process may take several minutes.
Summary
When the installation is complete, you will see the The installation was successful screen.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
a. sudo hdiutil attach Nessus-<Nessus_Version>.dmg
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Install Nessus on Raspberry Pi
Nessus 10.0.0 and later supports scanning on the Raspberry Pi 4 Model B with a minimum of 8GB
memory.
1. Download the Nessus package file. For details, see Download Nessus.
2. From a command prompt or terminal window, run the Nessus installation command:
dpkg -i Nessus-10.0.0-raspberrypios_armhf.deb
3. From a command prompt or terminal window, start the nessusd daemon by running the fol-
lowing command:
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Deploy Nessus as a Docker Image
You can deploy a managed Nessus scanner or an instance of Nessus Professional as a Docker image
to run on a container. The base image is a CentOS 8 instance of Nessus. You can configure the Nessus
instance with environment variables to automatically configure the image with the settings you con-
figure.
Tenable does not recommend deploying Nessus in a Docker container that shares a network interface
controller (NIC) with another Docker container.
1. In your terminal, use the docker pull command to get the image.
l Use the operators with the appropriate options for your deployment, as described in Oper-
ators.
Note: Tenable recommends you use environment variables to configure your instance of Nessus
when you run the image. If you do not include environment variables such as an activation code,
username, password, or linking key (if creating a managed Nessus scanner), you must configure
those items later.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
3. If you did not include environment variables, complete any remaining configuration steps in the
command line interface or Nessus configuration wizard.
What to do next:
l To stop and remove the container, see Remove Nessus as a Docker Container.
Operators
Operator Description
-p Publishes to the specified port in the format host port:container port. By default,
the port is 8834:8834.
If you have several Nessus containers running, use a different host port. The con-
tainer port must be 8834 because Nessus listens on port 8834.
Environment Variables
Variable Required? Description
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Linking Options
MANAGER_PORT Yes if linking to The port of the manager. By default, the port is 8834.
manager
For Nessus Manager, use 8834.
Proxy Options
Nessus Settings
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Usage Examples
Nessus Professional
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Install Nessus Agents
This section describes how to install a Nessus Agent on the following operating systems:
l Linux
l Windows
l Mac OS X
Once installed, Nessus Agents are linked to Nessus Manager or Tenable.io. Linked agents automatically
download plugins from the manager upon connection; this process can take several minutes and is
required before an agent can return scan results.
Once installed, an agent links to Nessus Manager or Tenable.io after a random delay ranging from zero
to five minutes. Enforcing a delay reduces network traffic when deploying or restarting large amounts
of agents, and reduces the load on Nessus Manageror Tenable.io. Agents automatically download plu-
gins from the manager upon linking; this process can take several minutes and is required before an
agent can return scan results.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Retrieve the Linking Key
Before you begin the Nessus Agents installation process, you must retrieve the Nessus Agent Linking
Key from Nessus Manager.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
2. (Optional) To modify the Linking Key, click the button next to the linking key.
l You regenerated your linking key and want to revert to a previous linking key.
l You have a mass deployment script where you want to predefine your linking key.
What to do next:
l Install Nessus Agent.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Install a Nessus Agent on Linux
Caution: If you install a Nessus Agent on a system where an existing Nessus Agent, Nessus Manager, or Nessus
scanner is running nessusd, the installation process kills all other nessusd processes. You may lose scan data
as a result.
l If you previously had the Nessus Agent installed on your system, see the knowledge base article
on how to avoid linking errors.
NessusAgent-<version number>-es6.i386.rpm
NessusAgent-<version number>-es7.x86_64.rpm
NessusAgent-<version number>-ubuntu1110_i386.deb
NessusAgent-<version number>-ubuntu910_amd64.deb
NessusAgent-<version number>-ubuntu910_i386.deb
NessusAgent-<version number>-debian6_i386.deb
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Note: The following procedure requires root privileges.
Fedora
# rpm -ivh NessusAgent-<version number>-fc20.x86_64.rpm
Ubuntu
# dpkg -i NessusAgent-<version number>-ubuntu1110_i386.deb
Debian
# dpkg -i NessusAgent-<version number>-debian6_amd64.deb
You can install a full plugins set before linking for the purpose of reducing the bandwidth impact dur-
ing a mass installation. This is accomplished via the nessuscli agent update command with the -
-file parameter specifying the location the plugins set. This must be done prior to starting the Nes-
sus Agent. For example:
The plugins set must be less than five days old. A stale plugins set older than five days will force a full
plugins download to occur. You can download a recent plugins set from the Nessus Agents download
page.
Note: After installing a Nessus Agent, you must manually start the service using the command /sbin/service
nessusagent start.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
/opt/nessus_agent/sbin/nessuscli agent link
--key=00abcd00000efgh11111i0k222lmopq3333st4455u66v777777w88xy9999zabc00
--name=MyOSXAgent --groups="All" --host=yourcompany.com --port=8834
--host yes
--port yes
--name no Specify a name for your agent. If you do not specify a name
for your agent, the name defaults to the name of the computer
where you are installing the agent.
--groups no Specify existing agent group or groups where you want to add
the agent. If you do not specify an agent group during the
install process, you can add your linked agent to an agent
group later in Nessus Manager or Tenable.io.
--offline- no For Nessus Agents 7.0.3 or later, you can install the Nessus
install Agent on a system even if it is offline. Add the command line
option offline-install="yes" to the command line input.
The Nessus Agent will periodically attempt to link itself to
either Tenable.io or Nessus Manager.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
=cloud.tenable.com --port=443 for agents 8.0.x and
earlier).
If the information that you provide is incorrect, a "Failed to link agent" error appears.
Note: If you attempt to clone an agent and link it to Nessus Manager or Tenable.io, a 409 error may appear. This
error appears because another machine has been linked with the same uuid value in the /etc/machine_id or
/etc/tenable_tag file. To resolve this issue, replace the value in the /etc/tenable_tag file with a valid
UUIDv4 value. If the /etc/machine_id file does not exist, you can delete /etc/tenable_tag to generate a new
value.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Install a Nessus Agent on Windows
Caution: If you install a Nessus Agent on a system where an existing Nessus Agent, Nessus Manager, or Nessus
scanner is running nessusd, the installation process kills all other nessusd processes. You may lose scan data
as a result.
Note: This procedure describes deploying Nessus Agents via the command line. You can also deploy Nessus
Agents with a standard Windows service such as Active Directory (AD), Systems Management Server (SMS), or
other software delivery system for MSI packages. For more information on deploying via these methods, see the
appropriate vendor's documentation.
l If you previously had the Nessus Agent installed on your system, see the knowledge base article
on how to avoid linking errors.
l Consider the following if you are reinstalling Nessus Agent after uninstalling it:
l If you previously had the Nessus Agent installed on your system, see the knowledge base
article on how to avoid linking errors.
l On Windows, the Nessus Agent uninstall process automatically creates a backup file in the
%TEMP% directory. If you reinstall Nessus Agent within 24 hours, Nessus Agent uses that
backup file to restore the installation. If you want to reinstall Nessus Agent within 24 hours
without using the backup, manually delete the backup file in the %TEMP% directory before-
hand.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
KEY=00abcd00000efgh11111i0k222lmopq3333st4455u66v777777w88xy9999zabc00 /qn
Parameter Description
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
linked agent to an agent group later in Nessus Man-
ager or Tenable.io.
NESSUS_NAME Specify the name for your agent. If you do not spe-
cify a name for your agent, the name defaults to the
name of the computer where you are installing the
agent.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Download Nessus Agent
On the Nessus Agents Download Page, download the package specific to your operating system.
2. Next, double-click the file name to start the installation process. The Welcome to the
InstallShield Wizard for Nessus Agent window appears.
Note: If you want to include the system tray application in your installation, see Configure and View the Sys-
tem Tray Application in the Nessus Agent Deployment and User Guide.
1. In the Welcome to the InstallShield Wizard for Nessus Agent window, click Next to continue.
2. In the License Agreement window, read the terms of the Tenable, Inc. Nessus software license
and subscription agreement.
4. Click Next.
5. In the Destination Folder window, click Next to accept the default installation folder.
-or-
Click Change to browse and select a different folder where you want to install Nessus Agents.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Field Value
Groups Specify existing agent groups(s) where you want to add the agent.
If you do not specify an agent group during the installation process, you can
later add your linked agent to an agent group.
Note: The agent name defaults to the name of the computer where you are installing the agent.
7. Click Next.
9. If presented with a User Account Control message, click Yes to allow the Nessus Agent to
install.
Note: If you attempt to clone an Agent and link it to Nessus Manager or Tenable.io, a 409 error may appear. This
error appears because another machine has been linked with the same uuid value in the
HKLM/Software/Tenable/TAG file. To resolve this issue, replace the value in the
HKLM/Software/Tenable/TAG file with a valid UUIDv4 value.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
2. In the left navigation bar, click Agents.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Install a Nessus Agent on Mac OS X
Caution: If you install a Nessus Agent on a system where an existing Nessus Agent, Nessus Manager, or Nessus
scanner is running nessusd, the installation process kills all other nessusd processes. You may lose scan data
as a result.
l If you previously had the Nessus Agent installed on your system, see the knowledge base article
on how to avoid linking errors.
To install the Nessus Agent, you can use either the GUI installation wizard or the command line.
GUI Installation:
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Note: The .NessusAgent.pkg file is normally invisible in macOS Finder.
2. Open Terminal.
You can install a full plugins set before linking for the purpose of reducing the bandwidth impact dur-
ing a mass installation. This is accomplished via the nessuscli agent update command with the -
-file parameter specifying the location the plugins set. This must be done prior to starting the Nes-
sus Agent. For example:
The plugins set must be less than five days old. A stale plugins set older than five days will force a full
plugins download to occur. You can download a recent plugins set from the Nessus Agents download
page.
1. Open Terminal.
2. From the command line, use the nessuscli agent link command.
For example:
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
--key yes Use the values you from the manager.
--host yes
--port yes
--offline- no For Nessus Agents 7.0.3 or later, you can install the Nes-
install sus Agent on a system even if it is offline. Add the com-
mand line option NESSUS_OFFLINE_INSTALL="yes" to
the command line input. The Nessus Agent will peri-
odically attempt to link itself to either Tenable.io or Nes-
sus Manager.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Note: If you attempt to clone an agent and link it to Nessus Manager or Tenable.io, a 409 error may appear. This
error appears because another machine has been linked with the same uuid value in the
/private/etc/tenable_tag file. To resolve this issue, replace the value in the /private/etc/tenable_tag
file with a valid UUIDv4 value.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Link an Agent to Nessus Manager
After you install Nessus Agent, link the agent to Nessus Manager.
2. At the agent command prompt, use the command nessuscli agent link using the supported
arguments.
For example:
Linux:
Mac OS X:
Windows:
The following table lists the supported arguments for nessuscli agent link:
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Argument Required Value
--key yes The linking key that you from the manager.
--host yes The static IP address or hostname you set during the Nessus
Manager installation.
--name no A name for your agent. If you do not specify a name for your
agent, the name defaults to the name of the computer where
you are installing the agent.
--groups no One or more existing agent groups where you want to add the
agent. If you do not specify an agent group during the install
process, you can add your linked agent to an agent group later
in Nessus Manager.
--offline- no When enabled (set to "yes"), installs Nessus Agent on the sys-
install tem, even if it is offline. Nessus Agent periodically attempts to
link itself to its manager.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
--proxy-port no The port number of the proxy server.
--proxy-pass- no The password of the user account that you specified as the
word username.
--proxy-user- no The name of a user account that has permissions to access and
name use the proxy server.
--proxy- no The user agent name, if your proxy requires a preset user
agent agent.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Upgrade Nessus and Nessus Agents
This section included information for upgrading Nessus and Nessus Agents on all supported operating
systems.
l Upgrade Nessus
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Upgrade Nessus
This section includes information for upgrading Nessus.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Upgrade from Evaluation
If you used an evaluation version of Nessus and are now upgrading to a full-licensed version of Nes-
sus, you simply need to type your full-version Activation Code on the Settings page, on the About tab.
4. Click Activate.
Nessus downloads and install the Nessus engine and the latest Nessus plugins, and then
restarts.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Update Nessus Software
Note: For information about upgrading an offline Nessus Manager that manages Nessus scanners, see Update
Nessus Manager Manually on an Offline System.
As an administrator user, you can configure how Nessus updates software components and plugins.
3. (Nessus Professional and Nessus Manager only) In the Automatic Updates section, select one of
the following options:
l Update all components: Nessus automatically updates its software and engine and down-
loads the latest plugin set.
In Nessus Professional and managed Nessus scanners, Nessus updates the software ver-
sion according to your Nessus Update Plan setting.
4. (Nessus Professional only) If you enabled automatic updates, in the Update Frequency section,
do one of the following:
l If you want to set a standard update interval, from the drop-down box, select Daily,
Weekly, or Monthly.
l If you want to set a custom update frequency in hours, click the button, then type the
number of hours.
5. (Nessus Professional and Tenable.io-managed Nessus scanners only) Set the Nessus Update
Plan to determine what version Nessus automatically updates to:
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Note: If you change your update plan and have automatic updates enabled, Nessus may immediately
update to align with the version represented by your selected plan. Nessus may either upgrade or down-
grade versions.
Option Description
Update to the latest Automatically updates to the latest Nessus version when it is
GA release made generally available (GA).
(Default) Note: For Nessus Professional, this date is the same day the
version is made generally available. For Tenable.io-linked Nes-
sus scanners, this date is usually one week after the version is
made generally available. For versions that address critical
security issues, Tenable may make the version available imme-
diately.
Delay updates, stay- Does not automatically update to the latest Nessus version.
ing on an older Remains on an earlier version of Nessus set by Tenable, usually
release one release older than the current generally available version, but
no earlier than 8.10.0. When Nessus releases a new version, your
Nessus instance updates software versions, but stays on a version
prior to the latest release.
6. (Optional) Only if instructed to by Tenable Support, in the Update Server box, type the server
from which you want Nessus to download plugins.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
1. In the top navigation bar, click Settings.
A window appears.
l Update all components: Nessus updates Nessus software and engine and downloads the
latest plugin set.
In Nessus Professional, Nessus updates the software version according to your Nessus
Update Plan setting.
Note: If you change your update plan, Nessus may immediately update to align with the version rep-
resented by your selected plan. Nessus may either upgrade or downgrade versions.
l Upload your own plugin archive: Nessus downloads plugins from a file that you upload.
5. If you selected Upload your own plugin archive, browse for your file and select it.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Upgrade Nessus on Linux
Download Nessus
From the Tenable Downloads Page, download the latest, full-license version of Nessus.
Note: Nessus automatically stops nessusd when you run the upgrade command.
SUSE version 11
# rpm -Uvh Nessus-<version number>-suse11.i586.rpm
Fedora version 20
# rpm -Uvh Nessus-<version number>-fc20.x86_64.rpm
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Upgrade Nessus on Windows
Download Nessus
From the Tenable Downloads Page, download the latest, full-license version of Nessus. The download
package is specific the Nessus build version, your platform, your platform version, and your CPU.
Nessus-<version number>-x64.msi
2. On the License Agreement screen, read the terms of the Tenable, Inc. Nessus software license
and subscription agreement.
3. Select the I accept the terms of the license agreement option, and then select the Next button.
4. On the Destination Folder screen, select the Next button to accept the default installation folder.
Otherwise, select the Change button to install Nessus to a different folder.
5. On the Ready to Install the Program screen, select the Install button.
The Installing Tenable, Inc. Nessus screen will appear and a Status indication bar will display
the upgrade progress.
6. On the Tenable Nessus InstallShield Wizard Completed screen, select the Finish button.
Nessus will load in your default browser, where you can log in.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Upgrade Nessus on Mac OS X
The process of upgrading Nessus on a Mac using the Nessus installation GUI is the same process as a
new Mac Install.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Upgrade a Nessus Agent
After you install an agent, its manager (either Tenable.io or Nessus Manager) automatically updates the
agent software.
To set the agent update plan for Tenable.io-linked agents from the Linked Agents tab:
The Sensors page appears. By default, Nessus Scanners is selected in the left navigation menu
and the Cloud Scanners tab is active.
The Agents page appears and the Linked Agents tab is active.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Value Description
Note: For Nessus Professional, this date is the same day the ver-
sion is made generally available. For Tenable.io-linked Nessus
scanners, this date is usually one week after the version is made
generally available. For versions that address critical security
issues, Tenable may make the version available immediately.
stable Does not automatically update to the latest Nessus version. Remains
on an earlier version of Nessus set by Tenable, usually one release
older than the current generally available version, but no earlier than
8.10.0. When Nessus releases a new version, your Nessus instance
updates software versions, but stays on a version prior to the latest
release.
c. Click Save.
Tenable.io saves your settings, and the changes take effect the next time the agent checks
in. For online agents, this can take up to 45 minutes.
l In the agents table, select the check box next to each agent you want to edit.
l In the table header, select the check box to select the entire page.
The action bar appears at the bottom of the pagetop of the table.
Tip: In the action bar, select Select All Pages to select all linked agents.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
b. In the action bar, click the button.
Value Description
Note: For Nessus Professional, this date is the same day the ver-
sion is made generally available. For Tenable.io-linked Nessus
scanners, this date is usually one week after the version is made
generally available. For versions that address critical security
issues, Tenable may make the version available immediately.
stable Does not automatically update to the latest Nessus version. Remains
on an earlier version of Nessus set by Tenable, usually one release
older than the current generally available version, but no earlier than
8.10.0. When Nessus releases a new version, your Nessus instance
updates software versions, but stays on a version prior to the latest
release.
d. Click Save.
Tenable.io saves your settings, and the changes take effect the next time the agent checks
in. For online agents, this can take up to 45 minutes.
To set the agent update plan for Tenable.io-linked agents from a command terminal:
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Use one of the following values:
Value Description
Note: For Nessus Professional, this date is the same day the version is
made generally available. For Tenable.io-linked Nessus scanners, this
date is usually one week after the version is made generally available.
For versions that address critical security issues, Tenable may make the
version available immediately.
stable Does not automatically update to the latest Nessus version. Remains on an
earlier version of Nessus set by Tenable, usually one release older than the
current generally available version, but no earlier than 8.10.0. When Nessus
releases a new version, your Nessus instance updates software versions, but
stays on a version prior to the latest release.
Manual Updates
In certain cases, such as air-gapped or Internet restricted networks, you may want to download applic-
ation updates manually.
Caution: When manually updating an agent, you must update to a newer version than your current version. If you
want to downgrade to a previous version, you must first delete the destination folder where Nessus Agent was
installed, then install the new package. Downgrading directly to a previous version is not supported.
Note: By default, Tenable.io-linked agents update to the generally available (GA) version one week after the ver-
sion is GA. Therefore, if you manually update a Tenable.io-linked agents to the latest version prior to that date,
you should either disable automatic updates or set your update plan to opt in to Early Access releases. This
ensures that the agent does not automatically downgrade to the previous version (GA).
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
1. Visit the Tenable Downloads page.
4. Click I Agree.
Windows
Note: Administrator-level priveleges are required.
l Double-click the .msi file you downloaded and follow the on-screen instructions.
l In the command line interface, enter the following command, using the location and file name of
the package you downloaded:
Linux
l In the command line interface, enter the following command, using the location and file name of
the package you downloaded:
or
# dpkg -i <path-to>/NessusAgent-<version>.deb
MacOS
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
a. Mount the .dmg file you downloaded:
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Downgrade Nessus Software
Nessus 8.10.0 and later supports the ability to downgrade Nessus to a previous version of Nessus. You
cannot downgrade to a version prior to 8.10.0.
The following examples describe two scenarios: one scenario where you manually downgrade Nessus
software, and one scenario where Nessus automatically downgrades depending on your settings.
You are currently running an Early Access release, 8.10.1, and now want to downgrade to the previous
version, 8.10.0.
Solution:
l Change your Nessus software update plan as described in Update Nessus Software, set
Automatic Updates to Disabled.
However, you change your Nessus Update Plan setting to Delay updates, staying on an older
release.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Result: According to your new Nessus update plan, your Nessus version should be an older release
than the latest GA version (which you are currently on). Therefore, to align your Nessus version with
this setting, Nessus must automatically update to be on an older version, which requires downgrading.
Nessus automatically downgrades to 8.10.0, one release prior to the latest GA version.
Encryption Password
If Nessus has an encryption password, you cannot downgrade by changing the Nessus update plan.
Instead, first remove the encryption password from Nessus before you downgrade, then set the encryp-
tion password again after the downgrade is complete.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Configure Nessus
When you access Nessus in a web browser, a warning appears regarding a connection privacy prob-
lem, an untrusted site, an unsecure connection, or a related security certificate issue. This is expected
and normal behavior. Nessus provides a self-signed SSL certificate.
Refer to the Security Warnings section for steps necessary to bypass the SSL warnings.
Note: Depending on your environment, plugin configuration and initialization can take several minutes.
To configure Nessus:
1. On the Welcome to Nessus screen, select how you want to deploy Nessus.
l Managed by Tenable.sc
l Offline
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Install Nessus Essentials, Professional, or Manager
This option installs a standalone versions of Nessus Essentials, Nessus Professional, or Nessus Man-
ager. During installation, you will be prompted to enter your Nessus Activation Code; this Activation
Code determines which product will be installed.
l Nessus Essentials — The free version of Nessus for educators, students, and hobbyists.
l Nessus Manager — The enterprise solution for managing Nessus Agents at scale.
2. Click Continue.
If you selected Nessus Professional or Nessus Manager, the Register Nessus screen appears.
If you selected Nessus Essentials, the Get an activation code screen appears.
a. On the Get an activation code screen, type your name and email address.
b. Click Email.
The Activation Code is the code you obtained from your activation email or from the Tenable
Downloads Page.
5. Click Continue.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
6. Create a Nessus administrator user account that you use to log in to Nessus:
7. Click Submit.
Nessus finishes the configuration process, which may take several minutes.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Link to Tenable.io
During initial installation, you can install Nessus as a remote scanner linked to Tenable.io. If you
choose not to link the scanner during initial installation, you can link your Nessus scanner later.
Note: If you use domain allow lists for firewalls, Tenable recommends adding *.cloud.tenable.com (with the wild-
card character) to the allow list. This ensures communication with sensor.cloud.tenable.com, which the scanner
uses to communicate with Tenable.io.
Note: Once you link Nessus to Tenable.io, it remains linked until you unlink it.
2. Click Continue.
4. In the Linking Key box, type the linking key of your Tenable.io instance.
6. (Optional) To configure advanced settings such as proxy, plugin feed, and encryption password,
click Settings.
a. In the Host box, type the hostname or IP address of your proxy server.
b. In the Port box, type the port number of the proxy server.
c. In the Username box, type the name of a user account that has permissions to
access and use the proxy server.
d. In the Password box, type the password of the user account that you specified in the
previous step.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
e. In the Auth Method drop-down box, select an authentication method to use for the
proxy. If you do not know, select AUTO DETECT.
f. If your proxy requires a preset user agent, in the User-Agent box, type the user
agent name; otherwise, leave it blank.
g. Click Save.
a. In the Custom Host box, type the hostname or IP address of a custom plugin feed.
b. Click Save.
If you set an encryption password, Nessus encrypts all policies, scans results, and
scan configurations. You must enter the password when Nessus restarts.
b. Click Save.
7. Click Continue.
8. Create a Nessus administrator user account that you use to log in to Nessus:
9. Click Submit.
Nessus finishes the configuration process, which may take several minutes.
10. Using the administrator user account you created, Sign In to Nessus.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
If Nessus has been previously registered or linked, you'll need to completely reset Nessus prior to link-
ing to Tenable.io.
Run the commands listed below to reset Nessus and link to Tenable.io based on your operating sys-
tem. To retrieve the linking key needed in the commands below, see Link a Sensor in the Tenable.io
user guide.
Note: The --reset-all command used in the steps below removes any existing users, data, settings, and con-
figurations. Tenable recommends exporting scan data and creating a backup prior to resetting. For more inform-
ation, see Backing Up Nessus.
Note: When running the adduser command in the steps below, create the user as a full administrator/system
administrator when prompted.
Linux:
Note: You must have root permissions or greater to successfully run the link commands.
# cd /opt/nessus/sbin
# ./nessuscli adduser
Windows:
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Note: You must have admin permissions to successfully run the link commands.
macOS:
Note: You must have root permissions or greater to successfully run the link commands.
1. Open Terminal.
# /Library/Nessus/run/sbin/nessuscli adduser
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
# /Library/Nessus/run/sbin/nessuscli managed link --key=<LINKING KEY> --
cloud
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Link to Nessus Manager
Note: When deployed for Nessus Agent management in Tenable.sc, Nessus Manager does not support linking
Nessus scanners.
During initial installation, you can install Nessus as a remote scanner linked to Nessus Manager. If you
choose not to link the scanner during initial installation, you can link your Nessus scanner later.
Note: Once you link Nessus to Nessus Manager, it remains linked until you unlink it.
2. Click Continue.
6. In the Linking Key box, type the linking key from Nessus Manager.
8. (Optional) To configure advanced settings such as proxy, plugin feed, and encryption password,
click Settings.
a. In the Host box, type the hostname or IP address of your proxy server.
b. In the Port box, type the port number of the proxy server.
c. In the Username box, type the name of a user account that has permissions to
access and use the proxy server.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
d. In the Password box, type the password of the user account that you specified in the
previous step.
e. In the Auth Method drop-down box, select an authentication method to use for the
proxy. If you do not know, select AUTO DETECT.
f. If your proxy requires a preset user agent, in the User-Agent box, type the user
agent name; otherwise, leave it blank.
g. Click Save.
a. In the Custom Host box, type the hostname or IP address of a custom plugin feed.
b. Click Save.
If you set an encryption password, Nessus encrypts all policies, scans results, and
scan configurations. You must enter the password when Nessus restarts.
b. Click Save.
9. Click Continue.
10. Create a Nessus administrator user account, which you use to log in to Nessus:
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Nessus finishes the configuration process, which may take several minutes.
12. Using the administrator user account you created, Sign In to Nessus.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Managed by Tenable.sc
During initial installation, you can install Nessus as a remote scanner linked to Tenable.sc. If you
choose not to link the scanner during initial installation, you can link your Nessus scanner later.
Note: Once you link Nessus to Tenable.sc, it remains linked until you unlink it.
2. Click Continue.
4. (Optional) To configure advanced settings such as proxy, plugin feed, and encryption password,
click Settings.
a. In the Host box, type the hostname or IP address of your proxy server.
b. In the Port box, type the port number of the proxy server.
c. In the Username box, type the name of a user account that has permissions to
access and use the proxy server.
d. In the Password box, type the password of the user account that you specified in the
previous step.
e. In the Auth Method drop-down box, select an authentication method to use for the
proxy. If you do not know, select AUTO DETECT.
f. If your proxy requires a preset user agent, in the User-Agent box, type the user
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
agent name; otherwise, leave it blank.
g. Click Save.
a. In the Custom Host box, type the hostname or IP address of a custom plugin feed.
b. Click Save.
If you set an encryption password, Nessus encrypts all policies, scans results, and
scan configurations. You must enter the password when Nessus restarts.
b. Click Save.
5. Click Continue.
6. Create a Nessus administrator user account, which you use to log in to Nessus:
7. Click Submit.
Nessus finishes the configuration process, which may take several minutes.
What to do next:
l Add the Nessus scanner to Tenable.sc as described in Add a Nessus Scanner in the Tenable.sc
User Guide.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Manage Activation Code
To manage your activation code, use the following topics:
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
View Activation Code
View in Nessus
1. Log in to Nessus.
Platform Command
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Reset Activation Code
In Nessus Manager and Nessus Professional legacy versions, if you uninstall and reinstall Nessus, you
need to reset your activation code.
l Reset your activation code on the Tenable Community site, as described in the Tenable Com-
munity Guide.
Note: Reset codes have a 10 day waiting period before you can reset your code again.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Update Activation Code
In the event that you receive a new license with a corresponding activation code, you must register the
new activation code in Nessus.
Note: If you are working with Nessus offline, see Manage Nessus Offline.
User Interface
1. In Nessus, in the top navigation bar, click Settings.
2. In the Overview tab, click the button next to the activation code.
2. Run the nessuscli fetch --register <Activation Code> command specific to your
operating system.
Platform Command
Nessus downloads and installs the Nessus engine and the latest Nessus plugins, and then
restarts.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Note: To register Nessus without automatically downloading and installing the latest updates, use the com-
mand nessuscli fetch --register-only.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Transfer Activation Code
In Nessus Professional 7.0 or later, you can use an activation code on multiple systems. This allows
you to easily transfer a Nessus license from one system to another without resetting your activation
code each time.
When you transfer the activation code to a system, it becomes the active instance of Nessus for that
license. Only the most recently activated system can receive plugin updates. All previous instances of
Nessus with that activation code still function, but cannot receive plugin updates. On inactive
instances, the following error message appears: Access to the feed has been denied, likely due to
an invalid or transferred license code.
To transfer an activation code, use one of the following procedures on the system that you want to
make the active instance of Nessus.
4. Click Continue.
5. In the Register your scanner window, in the Scanner Type drop-down box, select Nessus
Essentials, Professional, or Manager.
7. Click Continue.
Nessus finishes the installation process, which may take several minutes. Once installation is
complete, the license is active on this instance of Nessus.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
1. Access the system on which you want to activate Nessus.
3. In the Overview tab, click the button next to the activation code.
1. On the system on which you want to activate Nessus, open a command prompt.
2. Run the nessuscli fetch --register <Activation Code> command specific to your
operating system.
Platform Command
Nessus downloads and installs the Nessus engine and the latest Nessus plugins, and then
restarts.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Manage Nessus Offline
To manage Nessus offline, you need two computers: the Nessus server, which is not connected to the
internet, and another computer that is connected to the internet.
Caution: Tenable recommends saving the custom offline plugin download URL described in step 5 before con-
tinuing to step 6. The URL is only shown once after registration. If you close the registration window and forget
the URL, you will have to restart the registration process to generate a new URL.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
1. Use the Custom URL that you saved and copied during your first offline Download and Copy Plu-
gins operation.
Computer A Computer B
Operation
(Offline Nessus) (Online Computer)
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Install Nessus Offline
A Nessus Offline registration is suitable for computers that will be running Nessus, but are not con-
nected to the internet. To ensure that Nessus has the most up-to-date plugins, Nessus servers not con-
nected to the internet must perform these specific steps to register Nessus.
This process requires the use of two computers: the computer where you are installing Nessus, which
is not connected to the internet, and another computer that is connected to the internet.
For the instructions below, we'll use computers A (offline Nessus server) and B (online computer) as
examples.
1. During the browser portion of the Nessus installation, in the Registration drop-down, select Off-
line.
2. Once Offline is selected, the page displays a unique Challenge Code. In the example below, the
challenge code is: aaaaaa11b2222cc33d44e5f6666a777b8cc99999.
2. In the top field, type the challenge code that was displayed on the Nessus Product Registration
screen.
The Offline Update Page Details displays and includes the following elements:
l Custom URL: The custom URL displayed downloads a compressed plugins file. This file is
used by Nessus to obtain plugin information. This URL is specific to your Nessus license
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
and must be saved and used each time plugins need to be updated.
l nessus.license file: At the bottom of the web page, there is an embedded file that includes
the license text-string.
Tip: This custom URL is specific to your Nessus license and must be saved and used each time plugins
need to be updated.
2. Copy the compressed TAR file to the Nessus offline (A) system.
Platform Command
Linux # /opt/nessus/sbin/
FreeBSD # /usr/local/nessus/sbin/
Mac OS X # /Library/Nessus/run/sbin/
2. On the computer where you are installing Nessus (A), on the Nessus Product Registration
screen, paste the complete text-string starting with -----BEGIN Tenable, Inc. LICENSE-----
and ends with -----END Tenable, Inc. LICENSE-----.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
3. Select Continue.
Nessus will finish the installation process; this may take several minutes.
4. Using the System Administrator account you created during setup, Sign In to Nessus.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Generate Challenge Code
Before performing offline update operations, you may need to generate a unique identifier on the Nes-
sus server. This identifier is called a challenge code.
Whereas an activation code is used when performing Nessus operations when connected to the inter-
net, a license is used when performing offline operations; the generated challenge code enables you to
view and use your license for offline operations.
Steps
1. On the offline system running Nessus (A), open a command prompt.
2. Use the nessuscli fetch --challenge command specific to your operating system.
Platform Command
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Generate Your License
By default, when Nessus is installed, your license is hidden, and is automatically registered. This
license is not viewable.
However, in the event that your Nessus Server is not connected to the internet (i.e., is offline) a license
must be generated. This license is unique to your Nessus product and cannot be shared.
Your license is a text-based file that contains a string of alphanumeric characters. The license is cre-
ated and based on your unique generated challenge code.
1. On a system with internet access (B), navigate to the Nessus Offline Registration Page.
4. Select Submit.
At the bottom of the resulting web page, there is an embedded nessus.license file that
includes the license text string displayed.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Download and Copy License File (nessus.license)
After you have generated your Nessus license, you now need to download and then copy the license to
the offline system (A) running Nessus.
1. At the Nessus Offline Registration Page, while still using the computer with internet access (B),
select the on-screen nessus.license link.
The link will download the nessus.license file.
2. Copy the nessus.license file to the offline system (A) running Nessus 6.3 and newer.
Platform Directory
Linux # /opt/nessus/etc/nessus/
FreeBSD # /usr/local/nessus/etc/nessus
Windows C:\ProgramData\Tenable\Nessus\conf
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Register Your License with Nessus
In the event that you receive a new license and Activation Code, the license must be re-registered with
Nessus.
When your Nessus server is offline, you must generate a license, download the license, and then
register your license with Nessus.
Once downloaded and copied to your offline Nessus server, use the nessuscli fetch -- register com-
mand that corresponds to your operating system.
2. Use the nessuscli fetch --register-offline command specific to your operating system.
Platform Command
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Download and Copy Plugins
After submitting the required information on the Offline Update Page Details, download the Nessus Plu-
gins compressed TAR file.
Download Plugins
1. Using the computer with internet access (B), copy and save the on-screen custom URL link.
Note: This custom URL is specific to your Nessus license and must be used each time plugins need to be
downloaded and updated again.
Caution: Tenable recommends saving the custom URL before continuing. The URL is only shown once
after registration. If you close the registration window and forget the URL, you will have to restart the regis-
tration process to generate a new URL.
Platform Directory
Linux # /opt/nessus/sbin/
FreeBSD # /usr/local/nessus/sbin/
4. Next, on the offline (A) system running Nessus, Install Plugins Manually.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Install Plugins Manually
You can manually update Nessus plugins in two ways: the user interface or the command line inter-
face.
4. In the Manual Software Update dialog box, select Upload your own plugin archive, and then
click Continue.
5. Navigate to the compressed TAR file you downloaded, select it, then click Open.
2. Use the nessuscli update <tar.gz filename> command specific to your operating sys-
tem.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Platform Command
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Update the Audit Warehouse Manually
The audit warehouse containing all currently published audits updates automatically when you upgrade
to a new version of Nessus. You can perform an offline update to manually update the audit ware-
house without upgrading to a new version of Nessus.
To update the audit warehouse manually using the Nessus user interface:
4. In the Manual Software Update dialog box, select Upload your own plugin archive, and then
click Continue.
5. Navigate to the compressed TAR file you downloaded, select it, then click Open.
To update the audit warehouse manually using the command line interface:
2. Use the nessuscli update <tar.gz filename> command specific to your operating sys-
tem.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Platform Command
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Update Nessus Manager Manually on an Offline System
Note: The following steps should only be used to upgrade an offline Nessus Manager that manages Nessus scan-
ners. When upgrading other forms of Nessus offline (for example, Nessus Professional, a Nessus Manager not
managing Nessus scanners, or Nessus scanners managed by Tenable.sc), use the steps described in Update Nes-
sus Software.
On Nessus Manager, you can manually update software on an offline system in two ways.
l Option 1: Use the Manual Software Update feature in the Nessus user interface.
l Option 2: Use the command line interface and the nessuscli update command.
2. On the offline system running Nessus (A), in the top navigation bar, select Settings.
5. In the Manual Software Update dialog box, select Upload your own plugin archive, and then
select Continue.
6. Navigate to the directory where you downloaded the compressed TAR file.
3. Use the nessuscli update <tar.gz filename> command specific to your operating sys-
tem.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Platform Command
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Offline Update Page Details
When you are working with Nessus offline, use the https://plugins.nessus.org/v2/offline.php page.
Based on the steps you are using to Manage Nessus Offline, the resulting web page displayed includes
the following elements:
l Custom URL: The custom URL displayed downloads a compressed plugins file. This file is used
by Nessus to obtain plugin information. This URL is specific to your Nessus license and must be
saved and used each time plugins need to be updated.
l License: The complete text-string starting with -----BEGIN Tenable, Inc. LICENSE----- and
ends with -----END Tenable, Inc. LICENSE----- is your Nessus product license information.
Tenable uses this text-string to confirm your product license and registration.
l nessus.license file: At the bottom of the web page, there is an embedded file that includes the
license text-string.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Back Up Nessus
Using the Nessus CLI, you can back up your Nessus to restore it later on any system, even if it is a dif-
ferent operating system. When you back up Nessus, your license information and settings are pre-
served. Nessus does not back up scan results.
Note: If you perform a cross-platform backup and restore between Linux and Windows systems, after you
restore Nessus, you must reconfigure any Nessus configurations that use schedules (for example, scan sched-
ules). Schedules do not transfer correctly across these platforms because the operating systems use different
timezone names.
To back up Nessus:
l Linux: /opt/nessus/var/nessus
l Windows: C:\ProgramData\Tenable\Nessus\nessus
l Mac: /Library/Nessus/run/var/nessus
What to do next:
l Restore Nessus
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Restore Nessus
Using the Nessus CLI, you can use a previous backup of Nessus to restore later on any system, even if
it is a different operating system. When you back up Nessus, your license information and settings are
preserved. Nessus does not restore scan results.
On Nessus 8.11.1 and later, you can restore a backup even if it was created on an earlier version of Nes-
sus. For example, if you are on Nessus 8.11.1, you can restore a backup from Nessus 8.10.0.
Note: If you perform a cross-platform backup and restore between Linux and Windows systems, after you
restore Nessus, you must reconfigure any Nessus configurations that use schedules (for example, scan sched-
ules). Schedules do not transfer correctly across these platforms because the operating systems use different
timezone names.
To restore Nessus:
For example:
For example:
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
# /sbin/service nessusd stop
# /sbin/service nessusd start
Nessus begins initializing and uses the license information and settings from the backup.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Remove Nessus and Nessus Agents
This section includes information for removing Nessus and Nessus Agents.
l Remove Nessus
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Remove Nessus
This section includes information for uninstalling and removing Nessus.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Uninstall Nessus on Linux
3. In the upper right corner, select the Export button, and then choose the Nessus DB option.
SUSE
# /etc/rc.d/nessusd stop
FreeBSD
# service nessusd stop
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Debian/Kali and Ubuntu
# dpkg -l | grep Nessus
FreeBSD
# pkg_info | grep Nessus
Remove Nessus
1. Using the package name identified, use the remove command specific to your Linux-style oper-
ating system.
FreeBSD
# pkg delete <package name>
2. Using the command specific to your Linux-style operating system, remove remaining files that
were not part of the original installation.
Linux
# rm -rf /opt/nessus
FreeBSD
# rm -rf /usr/local/nessus/bin
This completes the process of uninstalling the Nessus on the Linux operating systems.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Uninstall Nessus on Windows
1. Navigate to the portion of Windows that allows you to Add or Remove Programs or Uninstall or
change a program.
3. Click Uninstall.
4. Click Yes.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Uninstall Nessus on Mac OS X
Stop Nessus
1. In System Preferences, select the Nessus button.
/Library/Nessus
/Library/LaunchDaemons/com.tenablesecurity.nessusd.plist
/Library/PreferencePanes/Nessus Preferences.prefPane
/Applications/Nessus
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Remove Nessus as a Docker Container
When you remove Nessus running as a Docker container, no data is retained.
1. In your terminal, stop the container from running using the docker stop command.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Remove Nessus Agent
This section includes information for uninstalling a Nessus Agent from hosts.
Note: For instructions on how to remove an agent from a manager while leaving the agent installed on the host,
see Unlink an Agent.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Uninstall a Nessus Agent on Linux
FreeBSD
# pkg_info | grep -i NessusAgent
2. Using the package name identified, type the remove command specific to your Linux-style oper-
ating system.
FreeBSD
# pkg delete <Agent package name>
What to do next:
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
l If you plan on reinstalling the Nessus Agent on the system, see the knowledge base article on
how to avoid linking errors.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Uninstall a Nessus Agent on Windows
1. Navigate to the portion of Windows where you can Add or Remove Programs or Uninstall or
change a program.
3. Click Uninstall.
A dialog box appears, prompting you to confirm your selection to remove Nessus Agent.
4. Click Yes.
Note: On Windows, the Nessus Agent uninstall process automatically creates a backup file in the
%TEMP% directory. If you reinstall Nessus Agent within 24 hours, Nessus Agent uses that backup file to
restore the installation. If you want to reinstall Nessus Agent within 24 hours without using the backup,
manually delete the backup file in the %TEMP% directory beforehand.
What to do next:
l If you plan on reinstalling the Nessus Agent on the system, see the knowledge base article on
how to avoid linking errors.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Uninstall a Nessus Agent on Mac OS X
1. Remove the Nessus directories. From a command prompt, type the following commands:
l $ sudo rm /Library/LaunchDaemons/com.tenablesecurity.nessusagent.plist
What to do next:
l If you plan on reinstalling the Nessus Agent on the system, see the knowledge base article on
how to avoid linking errors.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Scans
On the Scans page, you can create, view, and manage scans and resources. To access the Scans page,
in the top navigation bar, click Scans. The left navigation bar displays the Folders and Resources sec-
tions.
l Scan Results
l Scan Folders
l Policies
l Plugins
l Customized Reports
l Scanners
l Agents
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Scan and Policy Templates
Templates facilitate the creation of scans and policies.
When you first create a scan or policy, the Scan Templates section or Policy Templates section
appears, respectively. Templates are provided for scanners and agents. If you create custom policies,
they appear in the User Defined tab.
Note: If a plugin requires authentication or settings to communicate with another system, the plu-
gin is not available on agents. This includes, but is not limited to:
l Patch management.
l Mobile device management.
l Cloud infrastructure audit.
l Database checks that require authentication.
For information on agent templates, see Agent Scan and Policy Templates.
When you configure a Tenable-provided scan template, you can modify only the settings included for
the scan template type. When you create a user-defined scan template, you can modify a custom set
of settings for your scan.
Scanner Templates
Scanner templates fall into three categories: Discovery, Vulnerabilities, and Compliance.
Tip: In the Nessus user interface, use the search box to quickly find a template.
Template Description
Discovery
Host Discovery Performs a simple scan to discover live hosts and open ports.
Vulnerabilities
Basic Network Performs a full system scan that is suitable for any host. For example, you
Scan could use this template to perform an internal vulnerability scan on your
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
organization's systems.
Advanced Scan An scan without any recommendations, so that you can fully customize the
scan settings.
Advanced Dynamic An advanced scan without any recommendations, where you can configure
Scan dynamic plugin filters instead of manually selecting plugin families or indi-
vidual plugins. As Tenable, Inc. releases new plugins, any plugins that
match your filters are automatically added to the scan or policy. This allows
you to tailor your scans for specific vulnerabilities while ensuring that the
scan stays up to date as new plugins are released. See Configure Dynamic
Plugins.
Mobile Device Scan Assesses mobile devices via Microsoft Exchange or an MDM.
Intel AMT Security Performs remote and local checks for CVE-2017-5689.
Bypass
Spectre and Melt- Performs remote and local checks for CVE-2017-5753, CVE-2017-5715, and
down CVE-2017-5754.
Ripple20 Remote Detects hosts running the Treck stack in the network, which may be
Scan affected by Ripple20 vulnerabilities.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
2020 Threat Land- Detects vulnerabilities featured in Tenable's 2020 Threat Landscape Ret-
scape Restro- rospective report.
spective (TLR)
ProxyLogon: Performs remote and local checks to detect Microsoft Exchange Server vul-
MS Exchange nerabilities related to CVE-2021-26855, CVE-2021-26857, CVE-2021-26858,
and CVE-2021-27065.
Compliance
Internal PCI Net- Performs an internal PCI DSS (11.2.1) vulnerability scan.
work Scan
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Agent Templates
You can use templates to create an agent scan or policy.
In both Nessus Manager and Tenable.io, default templates for agent scans appear in the Agent tab.
The manager interface provides brief explanations of each default template.
Note: If you create custom policies for agent scans, those templates appear in the User Defined tab.
The table below briefly describes the settings for the default agent scan templates. You may also have
access to special templates.
Agent Templates
Agent templates fall into two categories: Vulnerabilities and Compliance.
Template Description
Vulnerabilities
Advanced An agent scan without any recommendations, so that you can fully customize
Agent Scan the scan settings.
Note: When you create an agent scan using the Advanced Agent Scan template, you
must also select the plugins you want to use for the scan.
Malware Scan Scans for malware on systems connected via Nessus Agents.
Compliance
Policy Com- Audits system configurations against a known baseline for systems connected
pliance Auditing via Nessus Agents.
SCAP and OVAL Audits systems using SCAP and OVAL definitions for systems connected via
Auditing Nessus Agents.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Scan and Policy Settings
Scan settings enable you to refine parameters in scans to meet your specific network security needs.
The scan settings you can configure vary depending on the Tenable-provided template on which a
scan or policy is based.
You can configure these settings in individual scans or in policy from which you create individual
scans.
l Discovery Settings
l Assessment Settings
l Report Settings
l Advanced Settings
Settings in Policies
When configuring settings for policies, note the following:
l If you configure a setting in a policy, that setting applies to any scans you create based on that
policy.
l You base a policy on a Tenable-provided template. Most of the settings are identical to the set-
tings you can configure in an individual scan that uses the same Tenable-provided template.
However, certain Basic settings are unique to creating a policy, and do not appear when con-
figuring an individual scan. For more information, see Basic Settings for Policies.
l You can configure certain settings in a policy, but cannot modify those settings in an individual
scan based on a policy. These settings include Discovery, Assessment, Report, Advanced, Com-
pliance, SCAP, and Plugins. If you want to modify these settings for individual scans, create indi-
vidual scans based on a Tenable-provided template instead.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
l If you configure Credentials in a policy, other users can override these settings by adding scan-
specific or managed credentials to scans based on the policy.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Basic Settings for Scans
Note: This topic describes Basic settings you can set in scans. For Basic settings in policies, see Basic Set-
tings for Policies.
The Basic scan settings are used to specify certain organizational and security-related aspects of the
scan, including the name of the scan, its targets, whether the scan is scheduled, and who has access
to the scan, among other settings.
Configuration items that are required by a particular scan are indicated in the Nessus interface.
l General
l Schedule
l Notifications
l Permissions
General
Default
Setting Description
Value
Name None Specifies the name of the scan. This value is displayed on the
Nessus interface.
Folder My Scans Specifies the folder where the scan appears after being saved.
Agent Groups None (Agent scans only) Specifies the agent group or groups you
want the scan to target. Select an existing agent group from
the drop-down box, or create a new agent group. For more
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
information, see Create a New Agent Group.
Scan Window 1 hour (Agent scans only) (Required) Specifies the time frame during
which agents must report in order to be included and visible in
vulnerability reports. Use the drop-down box to select an inter-
val of time, or click to type a custom scan window.
Scanner Auto-Select (Nessus Manager only) Specifies the scanner that performs the
scan.
The scanners you can select for this parameter depend on the
scanners and scanner groups configured for your Tenable.io
instance, as well as your permissions for those scanners or
groups.
Policy None This setting appears only when the scan owner edits an exist-
ing scan that is based on a policy.
In most cases, you set the policy at scan creation, then keep
the same policy each time you run the scan. However, you may
want to change the policy when troubleshooting or debugging
a scan. For example, changing the policy makes it easy to
enable or disable different plugin families, change per-
formance settings, or apply dedicated debugging policies with
more verbose logging.
When you change the policy for a scan, the scan history retains
the results of scans run under the previously-assigned policy.
Targets None Specifies one or more targets to be scanned. If you select a tar-
get group or upload a targets file, you are not required to spe-
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
cify additional targets.
Tip: You can force Nessus to use a given host name for a server dur-
ing a scan by using the hostname[ip] syntax (e.g.,
www.example.com[192.168.1.1]).
Schedule
By default, scans are not scheduled. When you first access the Schedule section, the Enable Schedule
setting appears, set to Off. To modify the settings listed on the following table, click the Off button. The
rest of the settings appear.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
months.
Starts Varies Specifies the exact date and time when a scan launches.
The starting date defaults to the date when you are cre-
ating the scan. The starting time is the nearest half-hour
interval. For example, if you create your scan on
09/31/2018 at 9:12 AM, the default starting date and time is
set to 09/31/2018 and 09:30.
Timezone America/New Specifies the timezone of the value set for Starts.
York
Repeat Every Varies Specifies the interval at which a scan is relaunched. The
default value of this item varies based on the frequency
you choose.
Repeat On Varies Specifies what day of the week a scan repeats. This item
appears only if you specify Weekly for Frequency.
Repeat By Day of the Month Specifies when a monthly scan is relaunched. This item
appears only if you specify Monthly for Frequency.
Summary N/A Provides a summary of the schedule for your scan based
on the values you have specified for the available settings.
Notifications
Setting Default Description
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Value
Email Recip- None Specifies zero or more email addresses, separated by commas,
ient(s) that are alerted when a scan completes and the results are avail-
able.
Attach Report Off (Nessus Professional only) Specifies whether you want to attach
a report to each email notification. This option toggles the
Report Type and Max Attachment Size settings.
Report Type Nessus (Nessus Professional only) Specifies the report type (CSV, Nes-
sus, or PDF) that you want to attach to the email.
Max Attach- 25 (Nessus Professional only) Specifies the maximum size, in mega-
ment Size bytes (MB), of any report attachment. If the report exceeds the
maximum size, then it is not attached to the email. Nessus does
not support report attachments larger than 50 MB.
Permissions
Using settings in the Permissions section, you can assign various permissions to groups and indi-
vidual users. When you assign a permission to a group, that permission applies to all users within the
group. The following table describes the permissions that can be assigned.
Tip: Tenable recommends assigning permissions to user groups, rather than individual users, to minimize main-
tenance as individual users leave or join your organization.
Permission Description
No Access Groups and users set to No Access cannot interact with the scan in any way.
When you create a scan, by default no other users or groups have access to it.
Can View Groups and users set to Can View can view the results of the scan.
Can Control Groups and users set to Can Control can launch, pause, and stop a scan, as
well as view its results.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Permission Description
Can Configure Groups and users set to Can Configure can modify the configuration of the
scan in addition to all other permissions.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Scan Targets
You can specify the targets of a scan using a number of different formats. The following table explains
target types, examples, and a short explanation of what occurs when that target type is scanned.
Target Descrip-
Example Explanation
tion
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Target Descrip-
Example Explanation
tion
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Target Descrip-
Example Explanation
tion
Some text with "Test Host 1[10.0.1.1]" or "Test Host 2 The IPv4 or IPv6 address within
either a single [2001:db8::abcd]" the brackets is scanned like a nor-
IPv4 or IPv6 mal single target.
address within
square brack-
ets
Tip: Hostname targets that look like either a link6 target (start with the text "link6") or like one of the two IPv6
range forms can be forcibly processed as a hostname by putting single quotes around the target.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Basic Settings for Policies
Note: This topic describes Basic settings you can set in policies. For Basic settings in individual scans, see
Basic Settings for Scans.
You can use Basic settings to specify basic aspects of a policy, including who has access to the policy.
l General
l Permissions
General
The general settings for a policy.
Permissions
You can share the policy with other users by setting permissions for users or groups. When you assign
a permission to a group, that permission applies to all users within the group.
Permission Description
No Access (Default user only) Groups and users set to this permission cannot interact with
the policy in any way.
Can Use Groups and users with this permission can view the policy configuration and
use the policy to create scans.
Can Edit In addition to viewing the policy and using the policy to create scans, groups
and users with this permission can modify any policy settings except user per-
missions. However, they cannot export or delete the policy.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Note: Only the policy owner can export or delete a policy.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Discovery Scan Settings
Note: If a scan is based on a policy, you cannot configure Discovery settings in the scan. You can only modify
these settings in the related policy.
Note: Settings that are required by a particular scan or policy are indicated in the Nessus interface.
The Discovery settings relate to discovery and port scanning, including port ranges and methods.
If you select the Custom preconfigured setting option, or if you are using a scanner template that does
not include preconfigured discovery settings, you can manually configure Discovery settings in the fol-
lowing categories:
l Host Discovery
l Port Scanning
l Service Discovery
Note: The following tables include settings for the Advanced Scan template. Depending on the template you
select, certain settings may not be available, and default values may vary.
Host Discovery
By default, some settings in the Host Discovery section are enabled. When you first access the Host
Discovery section, the Ping the remote host item appears and is set to On.
l General Settings
l Ping Methods
l Fragile Devices
l Wake-on-LAN
Default
Setting Description
Value
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Ping the remote On If set to On, the scanner pings remote hosts on multiple
host ports to determine if they are alive. Additional options Gen-
eral Settings and Ping Methods appear.
Scan unresponsive Disabled Specifies whether the Nessus scanner scans hosts that do
hosts not respond to any ping methods. This option is only avail-
able for scans using the PCI Quarterly External Scan tem-
plate.
General Settings
Test the local Nes- Enabled When enabled, includes the local Nessus host in the scan.
sus host This is used when the Nessus host falls within the target
network range for the scan.
Use Fast Network Disabled When disabled, if a host responds to ping, Nessus attempts
Discovery to avoid false positives, performing additional tests to
verify the response did not come from a proxy or load bal-
ancer. These checks can take some time, especially if the
remote host is firewalled.
Ping Methods
ARP Enabled Ping a host using its hardware address via Address Res-
olution Protocol (ARP). This only works on a local network.
Destination ports built-in Destination ports can be configured to use specific ports
(TCP) for TCP ping. This specifies the list of ports that are
checked via TCP ping.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Type one of the following: built-in, a single port, or a
comma-separated list of ports.
ICMP Enabled Ping a host using the Internet Control Message Protocol
(ICMP).
Assume ICMP Disabled Assume ICMP unreachable from the gateway means the
unreachable from host is down. When a ping is sent to a host that is down, its
the gateway gateway may return an ICMP unreachable message. When
means the host is this option is enabled, when the scanner receives an ICMP
down Unreachable message, it considers the targeted host dead.
This approach helps speed up discovery on some net-
works.
Note: Some firewalls and packet filters use this same behavior
for hosts that are up, but connected to a port or protocol that is
filtered. With this option enabled, this leads to the scan con-
sidering the host is down when it is indeed up.
UDP Disabled Ping a host using the User Datagram Protocol (UDP). UDP
is a stateless protocol, meaning that communication is not
performed with handshake dialogues. UDP-based com-
munication is not always reliable, and because of the
nature of UDP services and screening devices, they are not
always remotely detectable.
Fragile Devices
Scan Network Disabled When enabled, the scanner scans network printers.
Printers
Scan Novell Net- Disabled When enabled, the scanner scans Novell NetWare hosts.
ware hosts
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Scan Operational Disabled When enabled, the scanner performs a full scan of Oper-
Technology ational Technology (OT) devices such as programmable
devices logic controllers (PLCs) and remote terminal units (RTUs)
that monitor environmental factors and the activity and
state of machinery.
Wake-on-LAN
For example:
33:24:4C:03:CC:C7
FF:5C:2C:71:57:79
Boot time wait (in 5 The amount of time to wait for hosts to start before per-
minutes) forming the scan.
Port Scanning
The Port Scanning section includes settings that define how the port scanner behaves and which
ports to scan.
l Ports
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Default
Setting Description
Value
Ports
Consider Disabled When enabled, if a port is not scanned with a selected port
Unscanned scanner (for example, the port falls outside of the specified
Ports as Closed range), the scanner considers it closed.
If scanning both TCP and UDP, you can specify a split range
specific to each protocol. For example, if you want to scan a
different range of ports for TCP and UDP in the same policy,
you would type T:1-1024,U:300-500.
You can also specify a set of ports to scan for both protocols,
as well as individual ranges for each separate protocol. For
example, 1-1024,T:1024-65535,U:1025.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Default
Setting Description
Value
SSH (netstat) Enabled When enabled, the scanner uses netstat to check for open
ports from the local machine. It relies on the netstat com-
mand being available via an SSH connection to the target.
This scan is intended for Linux-based systems and requires
authentication credentials.
WMI (netstat) Enabled When enabled, the scanner uses netstat to determine open
ports while performing a WMI-based scan.
Only run net- Enabled When enabled, the scanner relies on local port enumeration
work port scan- first before relying on network port scans.
ners if local port
enumeration
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Default
Setting Description
Value
failed
Verify open TCP Disabled When enabled, if a local port enumerator (for example, WMI or
ports found by netstat) finds a port, the scanner also verifies that the port is
local port enu- open remotely. This approach helps determine if some form
merators of access control is being used (for example, TCP wrappers or
a firewall).
TCP Disabled Use the built-in Nessus TCP scanner to identify open TCP
ports on the targets, using a full TCP three-way handshake.
TCP scans are only possible if you are using Linux or
FreeBSD. On Windows or Mac OS X, the scanner does not do a
TCP scan and instead uses the SYN scanner to avoid per-
formance issues native to those operating systems.
If you enable this option, you can also set the Override Auto-
matic Firewall Detection option.
SYN Enabled Use the built-in Nessus SYN scanner to identify open TCP
ports on the target hosts. SYN scans do not initiate a full TCP
three-way handshake. The scanner sends a SYN packet to
the port, waits for SYN-ACK reply, and determines the port
state based on a response or lack of response.
If you enable this option, you can also set the Override Auto-
matic Firewall Detection option.
Override auto- Disabled This setting can be enabled if you enable either the TCP or
matic firewall SYN option.
detection
When enabled, this setting overrides automatic firewall detec-
tion.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Default
Setting Description
Value
UDP Disabled This option engages the built-in Nessus UDP scanner to
identify open UDP ports on the targets.
Service Discovery
The Service Discovery section includes settings that attempt to map each open port with the service
that is running on that port.
l General Settings
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Default
Setting Description
Value
General Settings
Probe all ports Enabled When enabled, the scanner attempts to map each open port
to find services with the service that is running on that port.
Search for SSL On Controls how the scanner tests SSL-based services.
based services
Caution: Testing for SSL capability on all ports may be disruptive
for the tested host.
Search for Known Specifies which ports on target hosts the scanner searches for
SSL/TLS on SSL/TLS SSL/TLS services.
ports
This setting has two options:
Identify cer- 60 When enabled, the scanner identifies SSL and TLS certificates
tificates expir- that are within the specified number of days of expiring.
ing within x
days
Enumerate all True When enabled, the scanner ignores the list of ciphers advert-
SSL ciphers ised by SSL/TLS services and enumerates them by attempting
to establish connections using all possible ciphers.
Enable CRL False When enabled, the scanner checks that none of the identified
checking (con- certificates have been revoked.
nects to inter-
net)
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Preconfigured Discovery Scan Settings
Certain Tenable-provided scanner templates include preconfigured discovery settings, described in
the following table. The preconfigured discovery settings are determined by both the template and the
Scan Type that you select.
Discovery
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
o Use fast network discovery
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Custom All defaults
Vulnerabilities
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
sary
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
o ICMP (2 retries)
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
l Port Scanner Settings:
o Scan all ports (1-65535)
o Use netstat if credentials
are provided
o Use SYN scanner if neces-
sary
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Port scan (all ports) l General Settings:
o Always test the local Nes-
sus host
o Use fast network discovery
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Quick l General Settings:
o Ping the remote host
o Always test the local Nes-
sus host
o Use fast network discovery
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
o Use fast network discovery
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
o Always test the local Nes-
sus host
o Use fast network discovery
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
o Use fast network discovery
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
o Detect SSL/TLS on ports
where it is commonly used
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
sus host
o Use fast network discovery
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
o Ping the remote host
o Always test the local Nes-
sus host
o Use fast network discovery
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
o Scan the default Nessus
port range
o Detect SSL/TLS on ports
where it is commonly used
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
o Ping the remote host
o Always test the local Nes-
sus host
o Use fast network discovery
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
o Scan all TCP ports
o Detect SSL on all open
ports
Compliance
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
l Port Scanner Settings:
o Scan all ports (1-65535)
o Use netstat if credentials
are provided
o Use SYN scanner if neces-
sary
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
o Always test the local Nes-
sus host
o Use fast network discovery
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Assessment Scan Settings
Note: If a scan is based on a policy, you cannot configure Assessment settings in the scan. You can only modify
these settings in the related policy.
You can use Assessment settings to configure how a scan identifies vulnerabilities, as well as what vul-
nerabilities are identified. This includes identifying malware, assessing the vulnerability of a system to
brute force attacks, and the susceptibility of web applications.
If you select the Custom preconfigured setting option, or if you are using a scanner template that does
not include preconfigured assessment settings, you can manually configure Assessment settings in
the following categories:
l General
l Brute Force
l SCADA
l Web Applications
l Windows
l Malware
l Databases
Note: The following tables include settings for the Advanced Scan template. Depending on the template you
select, certain settings may not be available, and default values may vary.
General
The General section includes the following groups of settings:
l Accuracy
l Antivirus
l SMTP
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Setting Default Value Description
Accuracy
Override nor- Disabled In some cases, Nessus cannot remotely determine whether a
mal Accur- flaw is present or not. If report paranoia is set to Show poten-
acy tial false alarms, a flaw is reported every time, even when
there is a doubt about the remote host being affected. Con-
versely, a paranoia setting of Avoid potential false alarms
causes Nessus to not report any flaw whenever there is a hint
of uncertainty about the remote host. As a middle ground
between these two settings, disable this setting.
Perform thor- Disabled Causes various plugins to work harder. For example, when
ough tests looking through SMB file shares, a plugin can analyze 3 dir-
(may disrupt ectory levels deep instead of 1. This could cause much more
your network network traffic and analysis in some cases. By being more
or impact thorough, the scan is more intrusive and is more likely to dis-
scan speed) rupt the network, while potentially providing better audit res-
ults.
Antivirus
Antivirus 0 Configure the delay of the Antivirus software check for a set
definition number of days (0-7). The Antivirus Software Check menu
grace period allows you to direct Nessus to allow for a specific grace time
(in days) in reporting when antivirus signatures are considered out of
date. By default, Nessus considers signatures out of date
regardless of how long ago an update was available (e.g., a
few hours ago). This can be configured to allow for up to 7
days before reporting them out of date.
SMTP
Third party Nessus attempts to send spam through each SMTP device to the address listed in
domain this field. This third party domain address must be outside the range of the site
being scanned or the site performing the scan. Otherwise, the test may be abor-
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
ted by the SMTP server.
From The test messages sent to the SMTP server(s) appear as if they originated from
address the address specified in this field.
To address Nessus attempts to send messages addressed to the mail recipient listed in this
field. The postmaster address is the default value since it is a valid address on
most mail servers.
Brute Force
The Brute Force section includes the following groups of settings:
l General Settings
l Oracle Database
l Hydra
Default
Setting Description
Value
General Settings
Only use cre- Enabled In some cases, Nessus can test default accounts and known
dentials default passwords. This can cause the account to be locked
provided by out if too many consecutive invalid attempts trigger security
the user protocols on the operating system or application. By default,
this setting is enabled to prevent Nessus from performing
these tests.
Oracle Database
Test default Disabled Test for known default accounts in Oracle software.
accounts (slow)
Hydra
Hydra options only appear when Hydra is installed on the same computer as the scanner or agent executing
the scan.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Always enable Disabled Enables Hydra whenever the scan is performed.
Hydra (slow)
Logins file A file that contains user names that Hydra uses during the
scan.
Passwords file A file that contains passwords for user accounts that Hydra
uses during the scan.
Number of par- 16 The number of simultaneous Hydra tests that you want to
allel tasks execute. By default, this value is 16.
Try empty pass- Enabled If enabled, Hydra tries user names without using a password.
words
Try login as Enabled If enabled, Hydra tries a user name as the corresponding pass-
password word.
Stop brute for- Disabled If enabled, Hydra stops brute forcing user accounts after the
cing after the first time an account is successfully accessed.
first success
Add accounts Enabled If disabled, only the user names specified in the logins file are
found by other used for the scan. Otherwise, additional user names dis-
plugins to the covered by other plugins are added to the logins file and used
login file for the scan.
SAP R/3 Client The ID of the SAP R/3 client that you want Hydra to test.
ID (0 - 99)
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Interpret pass- Disabled If enabled, Hydra interprets passwords as NTLM hashes.
words as NTLM
hashes
Cisco login This password is used to log in to a Cisco system before brute
password forcing enable passwords. If no password is provided here,
Hydra attempts to log in using credentials that were suc-
cessfully brute forced earlier in the scan.
Web page to Enter a web page that is protected by HTTP basic or digest
brute force authentication. If a web page is not provided here, Hydra
attempts to brute force a page discovered by the Nessus web
crawler that requires HTTP authentication.
SCADA
Default
Setting Description
Value
Modbus/TCP Coil Access Modbus uses a function code of 1 to read coils in a Modbus server.
Coils represent binary output settings and are typically mapped to
actuators. The ability to read coils may help an attacker profile a
system and identify ranges of registers to alter via a write coil mes-
sage.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Default
Setting Description
Value
Modbus/TCP Coil Access Modbus uses a function code of 1 to read coils in a Modbus server.
Coils represent binary output settings and are typically mapped to
actuators. The ability to read coils may help an attacker profile a
system and identify ranges of registers to alter via a write coil mes-
sage.
ICCP/COTP TSAP Address- The ICCP/COTP TSAP Addressing menu determines a Connection
ing Weakness Oriented Transport Protocol (COTP) Transport Service Access
Points (TSAP) value on an ICCP server by trying possible values.
Stop COTP 8 Specifies the ending TSAP value to try. All values between the Start
TSAP and Stop values are tried.
Web Applications
By default, web applications are not scanned. When you first access the Web Application section, the
Scan Web Applications setting appears and is set to Off. To modify the Web Application settings lis-
ted on the following table, click the Off button. The rest of the settings appear.
l General Settings
l Web Crawler
General Settings
Use a custom Mozilla/4.0 (compatible; MSIE Specifies which type of web browser Nessus
User-Agent 8.0; Windows NT 5.1; impersonates while scanning.
Trident/4.0)
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Setting Default Value Description
Web Crawler
Excluded /server_privileges\.php <> log Specifies portions of the web site to exclude
pages (regex) out from being crawled. For example, to exclude
the /manual directory and all Perl CGI, set
this field to: (^/manual) <> (\.pl(\?.*)?$).
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Setting Default Value Description
Try all HTTP Disabled This option instructs Nessus to also use
methods POST requests for enhanced web form test-
ing. By default, the web application tests only
use GET requests, unless this option is
enabled. Generally, more complex applic-
ations use the POST method when a user sub-
mits data to the application. This setting
provides more thorough testing, but may con-
siderably increase the time required. When
selected, Nessus tests each script or variable
with both GET and POST requests. This set-
ting provides more thorough testing, but may
considerably increase the time required.
Test embed- Disabled Embedded web servers are often static and
ded web serv- contain no customizable CGI scripts. In addi-
ers tion, embedded web servers may be prone to
crash or become non-responsive when
scanned. Tenable recommends scanning
embedded web servers separately from
other web servers using this option.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Setting Default Value Description
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Setting Default Value Description
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Setting Default Value Description
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Setting Default Value Description
Windows
The Windows section contains the following groups of settings:
l General Settings
Default
Setting Description
Value
General Settings
Request inform- Disabled If enabled, domain users are queried instead of local users.
ation about the
SMB Domain
You can enable as many of the user enumeration methods as appropriate for user discovery.
SAM Registry Enabled Nessus enumerates users via the Security Account Manager
(SAM) registry.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
ADSI Query Enabled Nessus enumerates users via Active Directory Service Inter-
faces (ADSI). To use ADSI, you must configure credentials
under Credentials > Miscellaneous > ADSI.
RID Brute For- Disabled Nessus enumerates users via relative identifier (RID) brute for-
cing cing. Enabling this setting enables the Enumerate Domain
Users and Enumerate Local User settings.
Start UID 1000 The beginning of a range of IDs where Nessus attempts to
enumerate domain users.
End UID 1200 The end of a range of IDs where Nessus attempts to enu-
merate domain users.
Start UID 1000 The beginning of a range of IDs where Nessus attempts to
enumerate local users.
End UID 1200 The end of a range of IDs where Nessus attempts to enu-
merate local users.
Malware
The Malware section contains the following groups of settings:
l General Settings
Default
Setting Description
Value
General Settings
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Disable DNS res- Disabled Checking this option prevents Nessus from using the
olution cloud to compare scan findings against known malware.
Custom Netstat IP None A text file that contains a list of known bad IP addresses
Threat List that you want to detect.
Provide your own None Additional known bad MD5 hashes can be uploaded via a
list of known bad text file that contains one MD5 hash per line. Optionally,
MD5 hashes you can include a description for a hash by adding a
comma after the hash, followed by the description. If any
matches are found when scanning a target, the descrip-
tion appears in the scan results. Hash-delimited com-
ments (e.g., #) can also be used in addition to the
comma-delimited ones.
Provide your own None Additional known good MD5 hashes can be uploaded via a
list of known good text file that contains one MD5 hash per line. It is possible
MD5 hashes to (optionally) add a description for each hash in the
uploaded file. This is done by adding a comma after the
hash, followed by the description. If any matches are
found when scanning a target, and a description was
provided for the hash, the description appears in the scan
results. Standard hash-delimited comments (e.g., # ) can
optionally be used in addition to the comma-delimited
ones.
Hosts file whitelist None Nessus checks system hosts files for signs of a com-
promise (e.g., Plugin ID 23910 titled Compromised Win-
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
dows System (hosts File Check)). This option allows you
to upload a file containing a list of IPs and hostnames to
be ignored by Nessus during a scan. Include one IP and
one hostname (formatted identically to your hosts file on
the target) per line in a regular text file.
Yara Rules
Yara Rules None A .yar file containing the YARA rules to be applied in the
scan. You can only upload one file per scan, so include all
rules in a single file. For more information, see
yara.readthedocs.io.
Scan file system Off Enabling this option allows you to scan system dir-
ectories and files on host computers.
Windows Directories
Scan User Profiles Off Enables file system scanning to scan user profiles.
Linux Directories
Scan $PATH Off Enable file system scanning to scan for $PATH locations.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Scan /home Off Enable file system scanning to scan /home.
MacOS Directories
Scan $PATH Off Enable file system scanning to scan $PATH locations.
Custom Directories
Custom Filescan Dir- None A custom file that lists directories to be scanned by mal-
ectories ware file scanning. In the file, list each directory on a new
line. Root directories such as 'C:\' or '/' are not accepted,
nor are variables such as %Systemroot%.
Databases
Default
Setting Description
Value
Oracle Database
Use Disabled When enabled, if at least one host credential and one Oracle
detected SIDs database credential are configured, the scanner authen-
ticates to scan targets using the host credentials, and then
attempts to detect Oracle System IDs (SIDs) locally. The scan-
ner then attempts to authenticate using the specified Oracle
database credentials and the detected SIDs.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Preconfigured Assessment Scan Settings
Certain Tenable-provided scanner templates include preconfigured assessment settings, described in
the following table. The preconfigured assessment settings are determined by both the template and
the Scan Type that you select.
Discovery
Host Discovery – –
Vulnerabilities
l Web Applications:
o Disable web application scan-
ning
l Web Applications:
o Start crawling from "/"
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
o Test for known vulnerabilities
in commonly used web applic-
ations
o Generic web application tests
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
disabled
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Scan for all web vul- l General Settings:
nerabilities (quick) o Avoid potential false alarms
o Enable CGI scanning
l Web Applications:
o Start crawling from "/"
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
o Test for known vulnerabilities
in commonly used web applic-
ations
o Perform each generic web
app test for 5 minutes (max)
l Web Applications:
o Start crawling from "/"
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
o Test for known vulnerabilities
in commonly used web applic-
ations
o Perform each generic web
app test for 10 minutes (max)
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
o Try all HTTP methods
o Attempt HTTP Parameter Pol-
lution
Advanced Scan – –
Advanced – –
Dynamic Scan
Mobile Device – –
Scan
l Web Applications:
o Start crawling from "/"
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
o Test for known vulnerabilities
in commonly used web applic-
ations
o Generic web application tests
disabled
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
l Web Applications:
o Start crawling from "/"
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
o Test for known vulnerabilities
in commonly used web applic-
ations
o Perform each generic web
app test for 5 minutes (max)
l Web Applications:
o Start crawling from "/"
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
o Test for known vulnerabilities
in commonly used web applic-
ations
o Perform each generic web
app test for 10 minutes (max)
o Try all HTTP methods
o Attempt HTTP Parameter Pol-
lution
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Custom All defaults
Badlock Detec- – –
tion
DROWN Detec- – –
tion
l Web Applications
o Disable web application scan-
ning
Shadow Brokers – –
Scan
WannaCry – –
Ransomware
Compliance
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Internal PCI Net- Default l General Settings:
work Scan o Avoid false alarms
o Disable CGI scanning
l Web Applications:
o Disable web application scan-
ning
l Web Applications:
o Start crawling from "/"
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
o Test for known vulnerabilities
in commonly used web applic-
ations
o Generic web application tests
disabled
l Web Applications:
o Start crawling from "/"
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
o Test for known vulnerabilities
in commonly used web applic-
ations
o Perform each generic web
app test for 5 minutes (max)
l Web Applications:
o Start crawling from "/"
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
o Test for known vulnerabilities
in commonly used web applic-
ations
o Perform each generic web
app test for 10 minutes (max)
o Try all HTTP methods
o Attempt HTTP Parameter Pol-
lution
Offline Config – –
Audit
PCI Quarterly – –
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
External Scan
Policy Com- – –
pliance Auditing
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Report Scan Settings
The Report scan settings include the following groups of settings:
l Processing
l Output
Default
Setting Description
Value
Processing
Override normal Disabled When disabled, provides the standard level of plugin activity
verbosity in the report. The output does not include the informational
plugins 56310, 64582, and 58651.
Show missing Enabled When enabled, includes superseded patch information in the
patches that scan report.
have been
superseded
Hide results Enabled When enabled, the list of dependencies is not included in the
from plugins ini- report. If you want to include the list of dependencies in the
tiated as a report, disable this setting.
dependency
Output
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Default
Setting Description
Value
Allow users to Enabled When enabled, allows users to delete items from the report.
edit scan res- When performing a scan for regulatory compliance or other
ults types of audits, disable the setting to show that the scan was
not tampered with.
Designate hosts Disabled Uses the host name rather than IP address for report output.
by their DNS
name
Display unreach- Disabled When enabled, hosts that did not reply to the ping request are
able hosts included in the security report as dead hosts. Do not enable
this option for large IP blocks.
Display Unicode Disabled When enabled, Unicode characters appear in plugin output
characters such as usernames, installed application names, and SSL cer-
tificate information.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Advanced Scan Settings
Note: If a scan is based on a policy, you cannot configure Advanced settings in the scan. You can only modify
these settings in the related policy.
The Advanced settings provide increased control over scan efficiency and the operations of a scan, as
well as the ability to enable plugin debugging.
If you select the Custom preconfigured setting option, or if you are using a scanner template that does
not include preconfigured advanced settings, you can manually configure Advanced settings in the fol-
lowing categories:
l General Settings
l Performance
l Debug Settings
Note: The following tables include settings for the Advanced Scan template. Depending on the template you
select, certain settings may not be available, and default values may vary.
General Settings
Enable Safe Enabled When enabled, disables all plugins that may have an
Checks adverse effect on the remote host.
Stop scanning Disabled When enabled, Nessus stops scanning if it detects that
hosts that become the host has become unresponsive. This may occur if
unresponsive dur- users turn off their PCs during a scan, a host has stopped
ing the scan responding after a denial of service plugin, or a security
mechanism (for example, an IDS) has started to block
traffic to a server. Normally, continuing scans on these
machines sends unnecessary traffic across the network
and delay the scan.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Setting Default Value Description
in a random order tial order. When this option is enabled, Nessus scans the
list of hosts in a random order within an IP address
range. This approach is typically useful in helping to dis-
tribute the network traffic during large scans.
Scan targets with Disabled When disabled, to avoid overwhelming a host, Nessus pre-
multiple domain vents against simultaneously scanning multiple targets
names in parallel that resolve to a single IP address. Instead, Nessus scan-
ners serialize attempts to scan the IP address, whether it
appears more than once in the same scan task or in mul-
tiple scan tasks on that scanner. Scans may take longer
to complete.
Performance
Slow down the Disabled When enabled, Nessus detects when it is sending too
scan when net- many packets and the network pipe is approaching capa-
work congestion is city. If network congestion is detected, Nessus throttles
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Setting Default Value Description
Network timeout 5 Specifies the time that Nessus waits for a response from
(in seconds) a host unless otherwise specified within a plugin. If you
are scanning over a slow connection, you may want to set
this to a higher number of seconds.
Max simultaneous 30, or the Nes- Specifies the maximum number of hosts that a Nessus
hosts per scan sus scanner scanner will scan at the same time.
advanced set-
ting max_
hosts,
whichever is
smaller.
Max number of none Specifies the maximum number of established TCP ses-
concurrent TCP sions for a single host.
sessions per host
This TCP throttling option also controls the number of
packets per second the SYN scanner sends, which is 10
times the number of TCP sessions. For example, if this
option is set to 15, the SYN scanner sends 150 packets per
second at most.
Max number of none Specifies the maximum number of established TCP ses-
concurrent TCP sions for the entire scan, regardless of the number of
sessions per scan hosts being scanned.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Setting Default Value Description
Exclude Filepath none A plain text file containing a list of filepaths to exclude
from all plugins that search using the find command on
Unix systems.
In the file, enter one filepath per line, formatted per pat-
terns allowed by the Unix find command -path argu-
ment. For more information, see the find command man
page.
Exclude Filesys- none A plain text file containing a list of filesystems to exclude
tem from all plugins that search using the find command on
Unix systems.
Include Filepath none A plain text file containing a list of filepaths to include
from all plugins that search using the find command on
Unix systems.
In the file, enter one filepath per line, formatted per pat-
terns allowed by the Unix find command -path argu-
ment. For more information, see the find command man
page.
Debug Settings
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Setting Default Value Description
Log scan details Disabled Logs the start and finish time for each plugin used during
a scan to nessusd.messages.
Enable plugin Disabled Attaches available debug logs from plugins to the vul-
debugging nerability output of this scan.
Audit Trail Verb- Default Controls verbosity of the plugin audit trail. All audit trail
osity data includes the reason why plugins were not included
in the scan.
Include the KB Default Controls whether to include the scan KB, which includes
additional debugging data, in the scan results.
Enumerate Disabled Displays a list of plugins that were launched during the
launched plugins scan. You can view the list in scan results under plugin
112154.
Maximum delay 0 (Agent scans only) (Agents 8.2 and later) If set, each agent
(minutes) in the agent group delays starting the scan for a random
number of minutes, up to the specified maximum.
Staggered starts can reduce the impact of agents that
use a shared resource, such as virtual machine CPU.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Setting Default Value Description
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Preconfigured Advanced Scan Settings
Certain Tenable-provided scanner templates include preconfigured advanced settings, described in
the following table. The preconfigured advanced settings are determined by both the template and the
Scan Type that you select.
Discovery
Vulnerabilities
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Advanced Scan – All defaults
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
o 5 second network read
timeout
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
o Slow down the scan
when network con-
gestion is detected
Compliance
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
per host (max)
o 15 second network read
timeout
o Slow down the scan
when network con-
gestion is detected
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Custom All defaults
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
width links o 2 simultaneous hosts
(max)
o 2 simultaneous checks
per host (max)
o 15 second network read
timeout
o Slow down the scan
when network con-
gestion is detected
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Credentials
When you configure a scan or policy's Credentials, the Nessus scanner can be granted local access to
scan the target system without requiring an agent. This can facilitate scanning of a very large network
to determine local exposures or compliance violations. As noted, some steps of policy creation may be
optional. Once created, the policy is saved with recommended settings.
Nessus leverages the ability to log into remote Linux hosts via Secure Shell (SSH); and with Windows
hosts, Nessus leverages a variety of Microsoft authentication technologies. Note that Nessus also uses
the Simple Network Management Protocol (SNMP) to make version and information queries to routers
and switches.
The scan or policy’s Credentials page allows you to configure the Nessus scanner to use authen-
tication credentials during scanning. Configuring credentials allows Nessus to perform a wider variety
of checks that result in more accurate scan results.
There are several forms of authentication supported including but not limited to databases, SSH, Win-
dows, network devices, patch management servers, and various plaintext authentication protocols.
In addition to operating system credentials, Nessus supports other forms of local authentication.
The following types of credentials are managed in the Credentials section of the scan or policy:
l Cloud Services
l Database, which includes MongoDB, Oracle, MySQL, DB2, PostgreSQL, and SQL Server
l Miscellaneous services, which include VMware, Red Hat Enterprise Virtualization (RHEV), IBM iSer-
ies, Palo Alto Networks PAN-OS, and directory services (ADSI and X.509)
l Plaintext authentication mechanisms including FTP, HTTP, POP3, and other services
Credentialed scans can perform any operation that a local user can perform. The level of scanning is
dependent on the privileges granted to the user account. The more privileges the scanner has via the
login account (e.g., root or administrator access), the more thorough the scan results.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Note: Nessus opens several concurrent authenticated connections. Ensure that the host being audited does not
have a strict account lockout policy based on concurrent sessions.
If a scan contains multiple instances of one type of credential, Nessus tries the credentials on each
scan target in the order you added the credentials to the scan.
Note: Nessus uses the first credential that allows successful login to perform credentialed checks on the target.
After a credential allows a successful login, Nessus does not try any of the other credentials in the list, even if a
different credential has greater privileges.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Cloud Services
Nessus supports Amazon Web Services (AWS), Microsoft Azure, Rackspace, and Salesforce.com.
AWS
Users can select Amazon AWS from the Credentials menu and enter credentials for compliance audit-
ing an account in AWS.
Option Description
AWS Secret Key AWS secret key that provides the authentication for AWS Access Key ID.
Regions to Rest of the In order for Nessus to audit an AWS account, you must define
access World the regions you want to scan. Per Amazon policy, you need dif-
ferent credentials to audit account configuration for the China
region than you need for the Rest of the World. Choosing the
Rest of the World opens the following choices:
l us-east-1
l us-east-2
l us-west-1
l us-west-2
l ca-central-1
l eu-west-1
l eu-west-2
l eu-central-1
l ap-northeast-1
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
l ap-northeast-2
l ap-southeast-1
l ap-southeast-2
l sa-east-1
l us-gov-west-1
Verify SSL Enabled Verify the validity of the SSL digital certificate.
Certificate
Microsoft Azure
There are two authentication methods for Microsoft Azure.
Client Secret The secret key for your registered application. Yes
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Client ID The application ID (also known as client ID) for your Yes
registered application.
Rackspace
Option Description
Salesforce.com
Users can select Salesforce.com from the Credentials menu. This allows Nessus to log in to Sales-
force.com as the specified user to perform compliance audits.
Option Description
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Database Credentials
The following are available Database credentials:
l DB2
l MySQL
l Oracle
l PostgreSQL
l SQL Server
l Sybase ASE
l MongoDB
l Cassandra
DB2
The following table describes the additional options to configure for IBM DB2 credentials.
Options Description
Auth Type The authentication method for providing the required credentials.
l Password
l Import
l CyberArk
l Lieberman
l Hashicorp Vault
For descriptions of the options for your selected authentication type, see Data-
base Credentials Authentication Types.
Database Port The TCP port that the IBM DB2 database instance listens on for com-
munications from Nessus Manager. The default is port 50000.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Options Description
Database The name for your database (not the name of your instance).
Name
Options Description
Port The TCP port that the Informix/DRDA database instance listens on for com-
munications from Tenable.sc. The default is port 1526.
MySQL
The following table describes the additional options to configure for MySQL credentials.
Options Description
Auth Type The authentication method for providing the required credentials.
l Password
l Import
l CyberArk
l Lieberman
l Hashicorp Vault
For descriptions of the options for your selected authentication type, see Data-
base Credentials Authentication Types.
Database Port The TCP port that the MySQL database instance listens on for com-
munications from Nessus Manager. The default is port 3306.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Oracle
The following table describes the additional options to configure for Oracle credentials.
Options Description
Auth Type The authentication method for providing the required credentials.
l Password
l Import
l CyberArk
l Lieberman
l Hashicorp Vault
For descriptions of the options for your selected authentication type, see
Database Credentials Authentication Types.
Database Port The TCP port that the Oracle database instance listens on for com-
munications from Nessus Manager. The default is port 1521.
Auth Type The type of account you want Nessus Manager to use to access the data-
base instance:
l Normal
l System Operator
l System Database Administrator
l SYSDBA
l SYSOPER
l NORMAL
Service Type The Oracle parameter you want to use to specify the database instance:
SID or Service NameSERVICE_NAME.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Options Description
The Service value you enter must match your parameter selection for the
Service Type option.
PostgreSQL
The following table describes the additional options to configure for PostgreSQL credentials.
Options Description
Auth Type The authentication method for providing the required credentials.
l Password
l Client Certificate
l CyberArk
l Lieberman
l Hashicorp Vault
For descriptions of the options for your selected authentication type, see Data-
base Credentials Authentication Types.
Database Port The TCP port that the PostgreSQL database instance listens on for com-
munications from Nessus Manager. The default is port 5432.
SQL Server
The following table describes the additional options to configure for SQL Server credentials.
Options Description
Auth Type The authentication method for providing the required credentials.
l Password
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Options Description
l Import
l CyberArk
l Lieberman
l Hashicorp Vault
For descriptions of the options for your selected authentication type, see Data-
base Credentials Authentication Types.
Database Port The TCP port that the SQL Server database instance listens on for com-
munications from Nessus Manager. The default is port 1433.
AuthType The type of account you want Nessus Manager to use to access the database
instance: SQL or Windows.
Sybase ASE
The following table describes the additional options to configure for Sybase ASE credentials.
Options Description
Auth Type The authentication method for providing the required credentials.
l Password
l CyberArk
l Lieberman
l Hashicorp Vault
For descriptions of the options for your selected authentication type, see Data-
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Options Description
Database Port The TCP port that the Sybase ASE database instance listens on for com-
munications from Nessus Manager. The default is port 3638.
Auth Type The type of authentication used by the Sybase ASE database: RSA or Plain
Text.
Cassandra
Option Description
l CyberArk
l Lieberman
l Hashicorp Vault
For descriptions of the options for your selected authentication type, see Database
Credentials Authentication Types.
Port The port the database listens on. The default is port 9042.
MongoDB
Option Description
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Option Description
Port (Required) The TCP port that the MongoDB database instance listens on for com-
munications from Nessus Manager.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Database Credentials Authentication Types
Depending on the authentication type you select for your database credentials, you must configure the
following options.
l Client Certificate
l Password
l Import
l CyberArk
l HashiCorp Vault
l Lieberman
Client Certificate
The Client Certificate authentication type is supported for PostgreSQL databases only.
Client Certificate The file that contains the PEM certificate for the yes
database.
Client CA Certificate The file that contains the PEM certificate for the yes
database.
Client Certificate Priv- The file that contains the PEM private key for the yes
ate Key client certificate.
Client Certificate Priv- The passphrase for the private key, if required in no
ate Key Passphrase your authentication implementation.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Password
Option Database Types Description Required
l SYSDBA
l SYSOPER
l NORMAL
l RSA
l Plain Text
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Option Database Types Description Required
l SID
l SERVICE_NAME
Import
Upload a .csv file with the credentials entered in the specified format. For descriptions of valid values
to use for each item, see Database Credentials.
You must configure either CyberArk or HashiCorp credentials for a database credential in the same
scan so that Nessus can retrieve the credentials.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Note: Include the required data in the specified order, with commas between each value, without spaces. For
example, for Oracle with CyberArk: 192.0.2.255,1521,SID,service_id,username,SYSDBA,Cy-
berArk,Database-Oracle-SYS.
CyberArk
CyberArk is a popular enterprise password vault that helps you manage privileged credentials. Ten-
able.io can get credentials from CyberArk to use in a scan.
CyberArk Host The IP address or FQDN name for the CyberArk AIM yes
Web Service.
Client Certificate The file that contains the PEM certificate used to no
communicate with the CyberArk host.
Client Certificate Priv- The file that contains the PEM private key for the cli- no
ate Key ent certificate.
Client Certificate Priv- The passphrase for the private key, if required. yes, if private
ate Key Passphrase key requires
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Option Description Required
Use SSL If enabled, the scanner uses SSL through IIS for no
secure communications. Enable this option if Cyber-
Ark is configured to support SSL through IIS.
Verify SSL Certificate If enabled, the scanner validates the SSL cer- no
tificate. Enable this option if CyberArk is configured
to support SSL through IIS and you want to validate
the certificate.
CyberArk (Legacy)
CyberArk is a popular enterprise password vault that helps you manage privileged credentials. Ten-
able.io can get credentials from CyberArk to use in a scan.
Database
Option Description Required
Types
Central Cre- All The port on which the CyberArk Central yes
dential Pro- Credential Provider is listening.
vider Port
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Database
Option Description Required
Types
CyberArk Cli- All The file that contains the PEM certificate no
ent Certificate used to communicate with the CyberArk
host.
CyberArk Cli- All The file that contains the PEM private key no
ent Certificate for the client certificate.
Private Key
CyberArk Cli- All The passphrase for the private key, if your no
ent Certificate authentication implementation requires it.
Private Key
Passphrase
CyberArk All The AppId that has been allocated per- yes
AppId missions on the CyberArk Central Cre-
dential Provider to retrieve the target
password.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Database
Option Description Required
Types
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Database
Option Description Required
Types
l Normal
l System Operator
l System Database Administrator
l SYSDBA
l SYSOPER
l NORMAL
l RSA
l Plain Text
l SID
l SERVICE_NAME
HashiCorp Vault
HashiCorp Vault is a popular enterprise password vault that helps you manage privileged credentials.
Nessus can get credentials from HashiCorp Vault to use in a scan.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Option Database Types Description Required
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Authentication URL All The URL Nessus Manager yes
uses to access Hashicorp
Vault.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
with the database.
l SYSDBA
l SYSOPER
l NORMAL
l SID
l SERVICE_NAME
Lieberman
Lieberman is a popular enterprise password vault that helps you manage privileged credentials. Ten-
able.io can get credentials from Lieberman to use in a scan.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Option Database Type Description Required
Lieberman user All The Lieberman explicit user for authen- yes
ticating to the Lieberman API.
Lieberman pass- All The password for the Lieberman expli- yes
word cit user.
Lieberman Client All The file that contains the PEM cer- no
Certificate tificate used to communicate with the
Lieberman host.
Lieberman Client All The file that contains the PEM private no
Certificate Priv- key for the client certificate.
ate Key
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Option Database Type Description Required
l SQL
l SYSDBA
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Option Database Type Description Required
l SYSOPER
l NORMAL
l RSA
l Plain Text
l SID
l SERVICE_NAME
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Host
Nessus supports the following forms of host authentication:
l SNMPv3
l Windows
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
SNMPv3
Users can select SNMPv3 settings from the Credentials menu and enter credentials for scanning sys-
tems using an encrypted network management protocol.
These credentials are used to obtain local information from remote systems, including network
devices, for patch auditing or compliance checks.
There is a field for entering the SNMPv3 user name for the account that will perform the checks on the
target system, along with the SNMPv3 port, security level, authentication algorithm and password, and
privacy algorithm and password.
If Nessus is unable to determine the community string or password, it may not perform a full audit of
the service.
Privacy algorithm The encryption algorithm to use for SNMP traffic: AES
AES or DES.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Option Description Default
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
SSH
Use SSH credentials for host-based checks on Unix systems and supported network devices. Nessus
uses these credentials to obtain local information from remote Unix systems for patch auditing or com-
pliance checks. Nessus uses Secure Shell (SSH) protocol version 2 based programs (e.g., OpenSSH,
Solaris SSH, etc.) for host-based checks.
Nessus encrypts the data to protect it from being viewed by sniffer programs.
Note: Non-privileged users with local access on Linux systems can determine basic security issues, such as
patch levels or entries in the /etc/passwd file. For more comprehensive information, such as system con-
figuration data or file permissions across the entire system, an account with root privileges is required.
Note: You can add up to 1000 SSH credentials in a single scan. For best performance, Tenable recommends
adding no more than 10 SSH credentials per scan.
Preferred port 22 This option can be set to direct Nessus to connect to SSH
if it is running on a port other than 22.
Client version OpenSSH_5.0 Specifies which type of SSH client Nessus will imper-
sonate while scanning.
Attempt least priv- Cleared Enables or disables dynamic privilege escalation. When
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Option Default Value Description
ilege (exper- enabled, Nessus attempts to run the scan with an account
imental) with lesser privileges, even if the Elevate privileges with
option is enabled. If a command fails, Nessus will escalate
privileges. Plugins 102095 and 102094 report which plu-
gins ran with or without escalated privileges.
Public Key
Public Key Encryption, also referred to as asymmetric key encryption, provides a more secure authen-
tication mechanism by the use of a public and private key pair. In asymmetric cryptography, the public
key is used to encrypt data and the private key is used to decrypt it. The use of public and private keys
is a more secure and flexible method for SSH authentication. Nessus supports both DSA and RSA key
formats.
Like Public Key Encryption, Nessus supports RSA and DSA OpenSSH certificates. Nessus also requires
the user certificate, which is signed by a Certificate Authority (CA), and the user’s private key.
Note: Nessus supports the openssh SSH public key format (pre-7.8 OpenSSH). Nessus does not support the new
OPENSSH format (OpenSSH versions 7.8+). To check which version you have, check your private key contents.
openssh shows -----BEGIN RSA PRIVATE KEY----- or -----BEGIN DSA PRIVATE KEY-----, and the new,
incompatible OPENSSH shows -----BEGIN OPENSSH PRIVATE KEY-----. Non-openssh formats, including
PuTTY and SSH Communications Security, must be converted to the openssh public key format.
The most effective credentialed scans are when the supplied credentials have root privileges. Since
many sites do not permit a remote login as root, Nessus can invoke su, sudo, su+sudo, dzdo, .k5login,
or pbrun with a separate password for an account that has been set up to have su or sudo privileges.
In addition, Nessus can escalate privileges on Cisco devices by selecting Cisco ‘enable’ or .k5login for
Kerberos logins.
Note: Nessus supports the blowfish-cbc, aes-cbc, and aes-ctr cipher algorithms. Some commercial variants of
SSH do not have support for the blowfish algorithm, possibly for export reasons. It is also possible to configure an
SSH server to only accept certain types of encryption. Check your SSH server to ensure the correct algorithm is
supported.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Nessus encrypts all passwords stored in policies. However, the use of SSH keys for authentication
rather than SSH passwords is recommended. This helps ensure that the same username and password
you are using to audit your known SSH servers is not used to attempt a log in to a system that may not
be under your control.
Note: For supported network devices, Nessus will only support the network device’s username and password for
SSH connections.
If an account other than root must be used for privilege escalation, it can be specified under the Escal-
ation account with the Escalation password.
Option Description
Username Username of the account which is being used for authentication on the
host system.
Certificate
Option Description
Username Username of the account which is being used for authentication on the
host system.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
CyberArk (Nessus Manager only)
CyberArk is a popular enterprise password vault that helps you manage privileged credentials. Nessus
Manager can get credentials from CyberArk to use in a scan.
CyberArk Host The IP address or FQDN name for the CyberArk AIM yes
Web Service.
Client Certificate The file that contains the PEM certificate used to no
communicate with the CyberArk host.
Client Certificate Priv- The file that contains the PEM private key for the cli- no
ate Key ent certificate.
Client Certificate Priv- The passphrase for the private key, if required. yes, if private
ate Key Passphrase key requires
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Option Description Required
Use SSL If enabled, the scanner uses SSL through IIS for no
secure communications. Enable this option if Cyber-
Ark is configured to support SSL through IIS.
Verify SSL Certificate If enabled, the scanner validates the SSL cer- no
tificate. Enable this option if CyberArk is configured
to support SSL through IIS and you want to validate
the certificate.
Option Description
CyberArk AIM The URL of the AIM service. By default, this field uses
Service URL /AIMWebservice/v1.1/AIM.asmx.
Central Cre- The port on which the CyberArk Central Credential Provider is listening.
dential Provider
Port
Central Cre- If the CyberArk Central Credential Provider is configured to use basic authen-
dential Provider tication, you can fill in this field for authentication.
Username
Central Cre- If the CyberArk Central Credential Provider is configured to use basic authen-
dential Provider tication, you can fill in this field for authentication.
Password
Safe The safe on the CyberArk Central Credential Provider server that contained
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Option Description
CyberArk Client The file that contains the PEM certificate used to communicate with the Cyber-
Certificate Ark host.
CyberArk Client The file that contains the PEM private key for the client certificate.
Certificate Priv-
ate Key
CyberArk Client (Optional) The passphrase for the private key, if required.
Certificate Priv-
ate Key Pass-
phrase
AppId The AppId that has been allocated permissions on the CyberArk Central Cre-
dential Provider to retrieve the target password.
Folder The folder on the CyberArk Central Credential Provider server that contains
the authentication information you would like to retrieve.
PolicyId The PolicyID assigned to the credentials you would like to retrieve from the
CyberArk Central Credential Provider.
Use SSL If CyberArk Central Credential Provider is configured to support SSL through
IIS check for secure communication.
Verify SSL Cer- If CyberArk Central Credential Provider is configured to support SSL through
tificate IIS and you want to validate the certificate check this. Refer to the custom_
CA.inc documentation for how to use self-signed certificates.
CyberArk The unique name of the credential you want to retrieve from CyberArk.
Account Details
Name
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Option Description
CyberArk Elev- The privilege escalation method you want to use to increase the user's priv-
ate Privileges ileges after initial authentication. Your selection determines the specific
With options you must configure.
Kerberos
Kerberos, developed by MIT’s Project Athena, is a client/server application that uses a symmetric key
encryption protocol. In symmetric encryption, the key used to encrypt the data is the same as the key
used to decrypt the data. Organizations deploy a KDC (Key Distribution Center) that contains all users
and services that require Kerberos authentication. Users authenticate to Kerberos by requesting a TGT
(Ticket Granting Ticket). Once a user is granted a TGT, it can be used to request service tickets from
the KDC to be able to utilize other Kerberos based services. Kerberos uses the CBC (Cipher Block
Chain) DES encryption protocol to encrypt all communications.
Note: You must already have a Kerberos environment established to use this method of authentication.
The Nessus implementation of Linux-based Kerberos authentication for SSH supports the aes-cbc and
aes-ctr encryption algorithms. An overview of how Nessus interacts with Kerberos is as follows:
l nessusd is logged in
In both Windows and SSH credentials settings, you can specify credentials using Kerberos keys from a
remote system. Note that there are differences in the configurations for Windows and SSH.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Option Description
Key Dis- This host supplies the session tickets for the user.
tribution
Center (KDC)
KDC Port This option can be set to direct Nessus to connect to the KDC if it is running on
a port other than 88.
KDC Transport The KDC uses TCP by default in Linux implementations. For UDP, change this
option. Note that if you need to change the KDC Transport value, you may also
need to change the port as the KDC UDP uses either port 88 or 750 by default,
depending on the implementation.
Realm The Realm is the authentication domain, usually noted as the domain name of
the target (e.g., example.com).
If Kerberos is used, sshd must be configured with Kerberos support to verify the ticket with the KDC.
Reverse DNS lookups must be properly configured for this to work. The Kerberos interaction method
must be gssapi-with-mic.
Password
Option Description
Custom pass- The password prompt used by the target host. Only use this setting when an
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Option Description
word prompt interactive SSH session fails due to Tenable.io receiving an unrecognized pass-
word prompt on the target host's interactive SSH shell.
Username The username that is used to authenticate via ssh to the system.
(required)
Domain Set the domain the username is part of if using Windows credentials.
Thycotic Secret This is the value that the secret is stored as on the Thycotic server. It is
Name (required) referred to as the “Secret Name” on the Thycotic server.
Thycotic Secret This is used to set the transfer method, target , and target directory for the
Server URL scanner. The value can be found in Admin > Configuration > Application Set-
(required) tings > Secret Server URL on the Thycotic server. For example consider the
following address https://pw.mydomain.com/SecretServer/. We will parse
this to know that https defines it is a ssl connection, pw.mydomain.com is the
target address, /SecretServer/ is the root directory.
Thycotic Pass- The password associated with the Thycotic Login Name.
word (required)
Thycotic Organ- This value is used in cloud instances of Thycotic to define which organization
ization your query should hit.
(required)
Thycotic This is an optional value set if the domain value is set for the Thycotic server.
Domain
(optional)
Private Key Use key based authentication for SSH connections instead of password.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
(optional)
Verify SSL Cer- Verify if the SSL Certificate on the server is signed by a trusted CA.
tificate
Thycotic elevate The privilege escalation method you want to use to increase the user's priv-
privileges with ileges after initial authentication. Multiple options for privilege escalation are
supported, including su, su+sudo and sudo. Your selection determines the spe-
cific options you must configure.
Checkout dur- (Required) The length of time, in minutes, that you want to keep credentials
ation checked out in BeyondTrust. Configure the Checkout duration to exceed the
typical duration of your Nessus scans. If a password from a previous scan is
still checked out when a new scan begins, the new scan fails.
Use SSL If enabled, Nessus uses SSL through IIS for secure communications. You must
configure SSL through IIS in BeyondTrust before enabling this option.
Verify SSL cer- If enabled, Nessus validates the SSL certificate. You must configure SSL
tificate through IIS in BeyondTrust before enabling this option.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Use private key If enabled, Nessus uses private key-based authentication for SSH connections
instead of password authentication. If it fails, the password will be requested.
Use privilege If enabled, BeyondTrust uses the configured privilege escalation command. If
escalation it returns something, it will use it for the scan.
Lieberman user The Lieberman explicit user for authenticating to the Lieber- yes
man RED API.
Lieberman pass- The password for the Lieberman explicit user. yes
word
Lieberman Client The file that contains the PEM certificate used to com- no
Certificate municate with the Lieberman host.
Note: If you use this option, you do not have to enter inform-
ation in the Lieberman user, Lieberman password, and Lieber-
man Authenticator fields.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Option Description Required
Lieberman Client The file that contains the PEM private key for the client cer- no
Certificate Priv- tificate.
ate Key
Verify SSL Cer- If Lieberman is configured to support SSL through IIS and no
tificate you want to validate the certificate, check this option. Refer
to Custom CA documentation for how to use self-signed cer-
tificates.
System Name In the rare case your organization uses one default Lieber- no
man entry for all managed systems, enter the default entry
name.
Custom pass- The password prompt used by the target host. Only use this no
word prompt setting when an interactive SSH session fails due to Nessus
receiving an unrecognized password prompt on the target
host's interactive SSH shell.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Arcon port The port on which Arcon listens.
Password Engine URL The URL Nessus Manager uses to access the passwords in
Arcon.
Checkout Duration (Required) The length of time, in hours, that you want to keep
credentials checked out in Arcon.
Use SSL When enabled, Nessus Manager uses SSL through IIS for
secure communications. You must configure SSL through IIS
in Arcon before enabling this option.
Verify SSL When enabled, Nessus Manager validates the SSL certificate.
You must configure SSL through IIS in Arcon before enabling
this option.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Note: If your Centrify installation is in a subdirectory, you must include the sub-
directory path. For example, type IP address or hostname/subdirectory
path.
Username (Required) The username to log in to the hosts you want to scan.
Checkout Duration The length of time, in minutes, that you want to keep credentials checked
out in Centrify.
Configure the Checkout Duration to exceed the typical duration of your Nes-
sus Manager scans. If a password from a previous scan is still checked out
when a new scan begins, the new scan fails.
Use SSL When enabled, Nessus Manager uses SSL through IIS for secure com-
munications. You must configure SSL through IIS in Centrify before enabling
this option.
Verify SSL When enabled, Nessus Manager validates the SSL certificate. You must con-
figure SSL through IIS in Centrify before enabling this option.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Windows
The Windows credentials menu item has settings to provide Nessus with information such as SMB
account name, password, and domain name. By default, you can specify a username, password, and
domain with which to log in to Windows hosts. Additionally, Nessus supports several different types of
authentication methods for Windows-based systems: CyberArk, Kerberos, LM Hash, NTLM Hash, and
Thycotic Secret Server.
l The Lanman authentication method was prevalent on Windows NT and early Windows 2000
server deployments. It is retained for backward compatibility.
l The NTLM authentication method, introduced with Windows NT, provided improved security over
Lanman authentication. The enhanced version, NTLMv2, is cryptographically more secure than
NTLM and is the default authentication method chosen by Nessus when attempting to log into a
Windows server. NTLMv2 can make use of SMB Signing.
l SMB signing is a cryptographic checksum applied to all SMB traffic to and from a Windows
server. Many system administrators enable this feature on their servers to ensure that remote
users are 100% authenticated and part of a domain. In addition, make sure you enforce a policy
that mandates the use of strong passwords that cannot be easily broken via dictionary attacks
from tools like John the Ripper and L0phtCrack. It is automatically used by Nessus if it is
required by the remote Windows server. Note that there have been many different types of
attacks against Windows security to illicit hashes from computers for re-use in attacking serv-
ers. SMB Signing adds a layer of security to prevent these man-in-the-middle attacks.
l The SPNEGO (Simple and Protected Negotiate) protocol provides Single Sign On (SSO) capability
from a Windows client to a variety of protected resources via the users’ Windows login cre-
dentials. Nessus supports use of SPNEGO Scans and Policies: Scans 54 of 151 with either
NTLMSSP with LMv2 authentication or Kerberos and RC4 encryption. SPNEGO authentication hap-
pens through NTLM or Kerberos authentication; nothing needs to be configured in the Nessus
policy.
l If an extended security scheme (such as Kerberos or SPNEGO) is not supported or fails, Nessus
will attempt to log in via NTLMSSP/LMv2 authentication. If that fails, Nessus will then attempt to
log in using NTLM authentication.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
l Nessus also supports the use of Kerberos authentication in a Windows domain. To configure
this, the IP address of the Kerberos Domain Controller (actually, the IP address of the Windows
Active Directory Server) must be provided.
Server Message Block (SMB) is a file-sharing protocol that allows computers to share information
across the network. Providing this information to Nessus will allow it to find local information from a
remote Windows host. For example, using credentials enables Nessus to determine if important secur-
ity patches have been applied. It is not necessary to modify other SMB parameters from default set-
tings.
The SMB domain field is optional and Nessus will be able to log on with domain credentials without this
field. The username, password, and optional domain refer to an account that the target machine is
aware of. For example, given a username of joesmith and a password of my4x4mpl3, a Windows server
first looks for this username in the local system’s list of users, and then determines if it is part of a
domain.
Regardless of credentials used, Nessus always attempts to log into a Windows server with the fol-
lowing combinations:
The actual domain name is only required if an account name is different on the domain from that on
the computer. It is entirely possible to have an Administrator account on a Windows server and within
the domain. In this case, to log onto the local server, the username of Administrator is used with the
password of that account. To log onto the domain, the Administrator username would also be used, but
with the domain password and the name of the domain.
When multiple SMB accounts are configured, Nessus will try to log in with the supplied credentials
sequentially. Once Nessus is able to authenticate with a set of credentials, it will check subsequent cre-
dentials supplied, but only use them if administrative privileges are granted when previous accounts
provided user access.
Some versions of Windows allow you to create a new account and designate it as an administrator.
These accounts are not always suitable for performing credentialed scans. Tenable recommends that
the original administrative account, named Administrator be used for credentialed scanning to ensure
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
full access is permitted. On some versions of Windows, this account may be hidden. The real admin-
istrator account can be unhidden by running a DOS prompt with administrative privileges and typing
the following command:
If an SMB account is created with limited administrator privileges, Nessus can easily and securely scan
multiple domains. Tenable recommends that network administrators consider creating specific
domain accounts to facilitate testing. Nessus includes a variety of security checks for Windows Vista,
Windows 7, Windows 8, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and
Windows Server 2012 R2 that are more accurate if a domain account is provided. Nessus does attempt
to try several checks in most cases if no account is provided.
Note: The Windows Remote Registry service allows remote computers with credentials to access
the registry of the computer being audited. If the service is not running, reading keys and values
from the registry will not be possible, even with full credentials. This service must be started for a
Nessus credentialed scan to fully audit a system using credentials.
For more information, see the Tenable blog post.
Credentialed scans on Windows systems require that a full administrator level account be used.
Several bulletins and software updates by Microsoft have made reading the registry to determine soft-
ware patch level unreliable without administrator privileges, but not all of them. Nessus plugins will
check that the provided credentials have full administrative access to ensure they execute properly.
For example, full administrative access is required to perform direct reading of the file system. This
allows Nessus to attach to a computer and perform direct file analysis to determine the true patch
level of the systems being evaluated.
Never send cre- Enabled For security reasons, Windows credentials are not sent in
dentials in the the clear by default.
clear
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Option Default Description
Start the Remote Disabled This option tells Nessus to start the Remote Registry service
Registry service on computers being scanned if it is not running. This ser-
during the scan vice must be running in order for Nessus to execute some
Windows local check plugins.
Enable admin- Disabled This option will allow Nessus to access certain registry
istrative shares entries that can be read with administrator privileges.
during the scan
Start the Server Disabled When enabled, the scanner temporarily enables the Win-
service during the dows Server service, which allows the computer to share
scan files and other devices on a network. The service is disabled
after the scan completes.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
CyberArk is a popular enterprise password vault that helps you manage privileged credentials. Nessus
Manager can get credentials from CyberArk to use in a scan.
CyberArk Host The IP address or FQDN name for the CyberArk AIM yes
Web Service.
Client Certificate The file that contains the PEM certificate used to no
communicate with the CyberArk host.
Client Certificate Priv- The file that contains the PEM private key for the cli- no
ate Key ent certificate.
Client Certificate Priv- The passphrase for the private key, if required. yes, if private
ate Key Passphrase key requires
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Option Description Required
Use SSL If enabled, the scanner uses SSL through IIS for no
secure communications. Enable this option if Cyber-
Ark is configured to support SSL through IIS.
Verify SSL Certificate If enabled, the scanner validates the SSL cer- no
tificate. Enable this option if CyberArk is configured
to support SSL through IIS and you want to validate
the certificate.
Option Description
CyberArk AIM The URL of the AIM service. By default, this field uses
Service URL /AIMWebservice/v1.1/AIM.asmx.
Central Cre- The port on which the CyberArk Central Credential Provider is listening.
dential Provider
Port
Central Cre- If the CyberArk Central Credential Provider is configured to use basic authen-
dential Provider tication, you can fill in this field for authentication.
Username
Central Cre- If the CyberArk Central Credential Provider is configured to use basic authen-
dential Provider tication, you can fill in this field for authentication.
Password
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Option Description
Safe The safe on the CyberArk Central Credential Provider server that contained
the authentication information you would like to retrieve.
CyberArk Client The file that contains the PEM certificate used to communicate with the
Certificate CyberArk host.
CyberArk Client The file that contains the PEM private key for the client certificate.
Certificate Priv-
ate Key
AppId The AppId that has been allocated permissions on the CyberArk Central Cre-
dential Provider to retrieve the target password.
Folder The folder on the CyberArk Central Credential Provider server that contains
the authentication information you would like to retrieve.
PolicyId The PolicyID assigned to the credentials you would like to retrieve from the
CyberArk Central Credential Provider.
Use SSL If CyberArk Central Credential Provider is configured to support SSL through
IIS check for secure communication.
Verify SSL Cer- If CyberArk Central Credential Provider is configured to support SSL through
tificate IIS and you want to validate the certificate check this. Refer to custom_CA.inc
documentation for how to use self-signed certificates.
CyberArk The unique name of the credential you want to retrieve from CyberArk.
Account Details
Name
Kerberos
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Option Default Description
Password none Like with other credentials methods, this is the user password
on the target system. This is a required field.
Key Dis- none This host supplies the session tickets for the user. This is a
tribution required field.
Center (KDC)
KDC Port 88 This option can be set to direct Nessus to connect to the KDC if
it is running on a port other than 88.
KDC Transport TCP Note that if you need to change the KDC Transport value, you
may also need to change the port as the KDC UDP uses either
port 88 or 750 by default, depending on the implementation.
Domain none The Windows domain that the KDC administers. This is a
required field.
LM Hash
Option Description
NTLM Hash
Option Description
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Option Default Value
Thycotic Secret (Required) The Secret Name value on the Thycotic server.
Name
Thycotic Secret (Required) The value you want Nessus to use when setting the transfer
Server URL method, target, and target directory for the scanner. Find the value on the Thy-
cotic server, in Admin > Configuration > Application Settings > Secret
Server URL.
Thycotic Login (Required) The username for a user on the Thycotic server.
Name
Thycotic Pass- (Required) The password associated with the Thycotic Login Name you
word provided.
Thycotic Organ- In cloud instances of Thycotic, the value that identifies which organization the
ization Nessus query should target.
Private Key If enabled, Nessus uses key-based authentication for SSH connections instead
of password authentication.
Verify SSL Cer- If enabled, Nessus verifies the SSL Certificate on the Thycotic server.
tificate
For more information about using self-signed certificates, see Custom SSL
Server Certificates.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Username (Required) The username to log in to the hosts you want to scan.
Checkout dur- (Required) The length of time, in minutes, that you want to keep credentials
ation checked out in BeyondTrust. Configure the Checkout duration to exceed the
typical duration of your Nessus scans. If a password from a previous scan is
still checked out when a new scan begins, the new scan fails.
Use SSL If enabled, Nessus uses SSL through IIS for secure communications. You must
configure SSL through IIS in BeyondTrust before enabling this option.
Verify SSL cer- If enabled, Nessus validates the SSL certificate. You must configure SSL
tificate through IIS in BeyondTrust before enabling this option.
Use private key If enabled, Nessus uses private key-based authentication for SSH connections
instead of password authentication. If it fails, the password will be requested.
Use privilege If enabled, BeyondTrust uses the configured privilege escalation command. If
escalation it returns something, it will use it for the scan.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Option Description Required
domain.
Lieberman password The password for the Lieberman explicit user. yes
Lieberman Client Certificate The file that contains the PEM certificate used no
to communicate with the Lieberman host.
Lieberman Client Certificate The file that contains the PEM private key for no
Private Key the client certificate.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Option Description Required
Password Engine URL The URL Nessus Manager uses to access the passwords in
Arcon.
Checkout Duration (Required) The length of time, in hours, that you want to keep
credentials checked out in Arcon.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Configure the Checkout Duration to exceed the typical dur-
ation of your Tenable.io scans. If a password from a previous
scan is still checked out when a new scan begins, the new
scan fails.
Use SSL When enabled, Nessus Manager uses SSL through IIS for
secure communications. You must configure SSL through IIS
in Arcon before enabling this option.
Verify SSL When enabled, Nessus Manager validates the SSL certificate.
You must configure SSL through IIS in Arcon before enabling
this option.
Note: If your Centrify installation is in a subdirectory, you must include the sub-
directory path. For example, type IP address or hostname/subdirectory
path.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Username (Required) The username to log in to the hosts you want to scan.
Checkout Duration The length of time, in minutes, that you want to keep credentials checked
out in Centrify.
Configure the Checkout Duration to exceed the typical duration of your Nes-
sus Manager scans. If a password from a previous scan is still checked out
when a new scan begins, the new scan fails.
Use SSL When enabled, Nessus Manager uses SSL through IIS for secure com-
munications. You must configure SSL through IIS in Centrify before enabling
this option.
Verify SSL When enabled, Nessus Manager validates the SSL certificate. You must con-
figure SSL through IIS in Centrify before enabling this option.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Miscellaneous
This section includes information and settings for credentials in the Miscellaneous section.
ADSI
ADSI requires the domain controller information, domain, and domain admin and password.
ADSI allows Nessus to query an ActiveSync server to determine if any Android or iOS-based devices
are connected. Using the credentials and server information, Nessus authenticates to the domain con-
troller (not the Exchange server) to directly query it for device information. These settings are required
for mobile device scanning and Active Directory Starter Scans.
Nessus supports obtaining the mobile information from Exchange Server 2010 and 2013 only.
Nessus supports obtaining the mobile information from Exchange Server 2010 and 2013 only; Nessus
cannot retrieve information from Exchange Server 2007.
F5
Username (Required) The username for the scanning F5 account that Nes- -
sus uses to perform checks on the target system.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
When disabled, Nessus connects using standard HTTP.
Verify SSL When enabled, Nessus verifies that the SSL certificate on the enabled
Certificate server is signed by a trusted CA.
IBM iSeries
Username (Required) The username for the IBM iSeries account that Nessus -
uses to perform checks on the target system.
Netapp API
Username (Required) The username for the Netapp API account with HTTPS -
access that Nessus uses to perform checks on the target system.
To limit the audit to a single vFiler, type the name of the vFiler.
Port (Required) The TCP port that Netapp API listens on for com- 443
munications from Nessus.
OpenStack
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Nessus uses to perform checks on the target system.
Tenant Name for (Required) The name of the specific tenant the scan uses to admin
Authentication authenticate.
Verify SSL Cer- When enabled, Nessus verifies that the SSL certificate on enabled
tificate the server is signed by a trusted CA.
Username (Required) The username for the PAN-OS account that Nessus -
uses to perform checks on the target system.
Port (Required) The TCP port that PAN-OS listens on for com- 443
munications from Nessus.
Verify SSL When enabled, Nessus verifies that the SSL certificate on the enabled
Certificate server is signed by a trusted CA.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Tip: If you are using a self-signed certificate, disable this setting.
Port (Required) The TCP port that the RHEV server listens on for com- 443
munications from Nessus.
Verify SSL When enabled, Nessus verifies that the SSL certificate on the enabled
Certificate server is signed by a trusted CA.
For more information on configuring VMWare ESX SOAP API, see Configure vSphere Scanning.
Nessus can access VMware servers through the native VMware SOAP API.
Username (Required) The username for the ESXi server account that Nes- -
sus uses to perform checks on the target system.
Do not verify Do not validate the SSL certificate for the ESXi server. disabled
SSL Certificate
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
For more information on configuring VMWare vCenter SOAP API, see Configure vSphere Scanning.
Nessus can access vCenter through the native VMware vCenter SOAP API. If available, Nessus uses the
vCenter REST API to collect data in addition to the SOAP API.
Note: You must use a vCenter admin account with read and write permissions.
vCenter Port (Required) The TCP port that vCenter listens on for com- 443
munications from Nessus.
Verify SSL When enabled, Nessus verifies that the SSL certificate on the enabled
Certificate server is signed by a trusted CA.
X.509
Password for key (Required) The passphrase for the client private key. -
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Mobile
AirWatch
Option Description
AirWatch Environment API URL The URL of the SOAP or REST API
(required)
API Keys (required) The API Key for the Airwatch REST API
Verify SSL Certificate Verify if the SSL Certificate on the server is signed by a
trusted CA.
Option Description
Server (required) The server URL to authenticate with Apple Profile Manager
Port Set to use a different port to authenticate with Apple Profile Man-
ager
Verify SSL Certificate Verify if the SSL Certificate on the server is signed by a trusted CA.
Force device updates Force devices to update with Apple Profile Manager immediately
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Device update timeout Number of minutes to wait for devices to reconnect with Apple Pro-
(minutes) file Manager
Good MDM
Option Description
Port (required) Set the port to use to authenticate with Good MDM
Verify SSL Certificate Verify if the SSL Certificate on the server is signed by a trusted CA.
MaaS360
Option Description
App access key (required) The App Access Key provided for MaaS360
MobileIron
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Option Description
VSP Admin The server URL Nessus uses to authenticate to the MobileIron administrator
Portal URL portal.
Username The username for the account you want Nessus to use to authenticate to
MobileIron.
Password The password for the account you want Nessus to use to authenticate to
MobileIron.
Verify SSL Cer- When enabled, Nessus verifies that the SSL Certificate on the server is signed
tificate by a trusted CA.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Patch Management
Nessus can leverage credentials for patch management systems to perform patch auditing on systems
for which credentials may not be available to the Nessus scanner. Nessus supports:
l HCL BigFix
l Symantec Altiris
You can configure patch management options in the Credentials section while creating a scan, as
described in Create a Scan.
IT administrators are expected to manage the patch monitoring software and install any agents
required by the patch management system on their systems.
Note: If the credential check sees a system but it is unable to authenticate against the system, it uses the data
obtained from the patch management system to perform the check. If Nessus is able to connect to the target sys-
tem, it performs checks on that system and ignores the patch management system output.
Note: The data returned to Nessus by the patch management system is only as current as the most recent data
that the patch management system has obtained from its managed hosts.
If you provide credentials for a host and for one or more patch management systems, Nessus com-
pares the findings between all methods and report on conflicts or provide a satisfied finding. Use the
Patch Management Windows Auditing Conflicts plugins to highlight patch data differences between
the host and a patch management system.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
KACE K1000 is available from Dell to manage the distribution of updates and hotfixes for Linux, Win-
dows, and Mac OS X systems. Nessus can query KACE K1000 to verify whether or not patches are
installed on systems managed by KACE K1000 and display the patch information through the Nessus
user interface.
KACE K1000 scanning uses the following Tenable plugins: 76867, 76868, 76866, and 76869.
Database Port (Required) The TCP port that KACE K1000 listens on for com- 3306
munications from Nessus.
Organization (Required) The name of the organization component for the ORG1
Database Name KACE K1000 database (e.g., ORG1).
Database User- (Required) The username for the KACE K1000 account that Nes- R1
name sus uses to perform checks on the target system.
Package reporting is supported by RPM-based and Debian-based distributions that IBM BigFix offi-
cially supports. This includes Red Hat derivatives such as RHEL, CentOS, Scientific Linux, and Oracle
Linux, as well as Debian and Ubuntu. Other distributions may also work, but unless IBM BigFix officially
supports them, there is no support available.
For local check plugins to trigger, only RHEL, CentOS, Scientific Linux, Oracle Linux, Debian, Ubuntu,
and Solaris are supported. Plugin 65703 must be enabled.
Nessus supports IBM BigFix 9.5 and later and 10.x and later.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
IBM BigFix scanning uses the following Tenable plugins: 62558, 62559, 62561, 62560, and 65703.
Web Reports (Required) The TCP port that the IBM BigFix Web Reports server -
Port listens on for communications from Nessus.
Web Reports (Required) The username for the IBM BigFix Web Reports admin- -
Username istrator account that Nessus uses to perform checks on the tar-
get system.
Web Reports (Required) The password for the IBM BigFix Web Reports admin- -
Password istrator user.
Verify SSL When enabled, Nessus verifies that the SSL certificate on the Enabled
certificate server is signed by a trusted CA.
From the HCL BigFix Console application, import the following .bes files.
BES file:
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
<Title>Tenable</Title>
<Description>This analysis provides SecurityCenter with the data it needs for vulnerability reporting. <
<Relevance>true</Relevance>
<Source>Internal</Source>
<SourceReleaseDate>2013-01-31</SourceReleaseDate>
<MIMEField>
<Name>x-fixlet-modification-time</Name>
<Value>Thu, 13 May 2021 21:43:29 +0000</Value>
</MIMEField>
<Domain>BESC</Domain>
<Property Name="Packages - With Versions (Tenable)" ID="74"><![CDATA[if (exists true whose (if true then
repository) else false)) then unique values of (lpp_name of it & "|" & version of it as string & "|" & "fileset"
tecture of operating system) of filesets of products of object repository else if (exists true whose (if true th
anpackage) else false)) then unique values of (name of it & "|" & version of it as string & "|" & "deb" & "|" &
it & "|" & architecture of operating system) of packages whose (exists version of it) of debianpackages else if
whose (if true then (exists rpm) else false)) then unique values of (name of it & "|" & version of it as string
"|" & architecture of it & "|" & architecture of operating system) of packages of rpm else if (exists true whose
(exists ips image) else false)) then unique values of (full name of it & "|" & version of it as string & "|" & "
architecture of operating system) of latest installed packages of ips image else if (exists true whose (if true
pkgdb) else false)) then unique values of(pkginst of it & "|" & version of it & "|" & "pkg10") of pkginfos of pk
"<unsupported>"]]></Property>
<Property Name="Tenable AIX Technology Level" ID="76">current technology level of operating system</Prop
<Property Name="Tenable Solaris - Showrev -a" ID="77"><![CDATA[if ((operating system as string as lowerc
"SunOS 5.10" as lowercase) AND (exists file "/var/opt/BESClient/showrev_patches.b64")) then lines of file "/var/
opt/BESClient/showrev_patches.b64" else "<unsupported>"]]></Property>
</Analysis>
</BES>
BES File:
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
<DefaultAction ID="Action1">
<Description>
<PreLink>Click </PreLink>
<Link>here</Link>
<PostLink> to deploy this action.</PostLink>
</Description>
<ActionScript MIMEType="application/x-sh"><![CDATA[#!/bin/sh
/usr/bin/showrev -a > /var/opt/BESClient/showrev_patches
/usr/sfw/bin/openssl base64 -in /var/opt/BESClient/showrev_patches -out /var/opt/BESClient/showrev_
patches.b64
]]></ActionScript>
</DefaultAction>
</Task>
</BES>
Nessus connects to the server that is running the SCCM site (e.g., credentials must be valid for the
SCCM service, so the selected user must have privileges to query all the data in the SCCM MMC). This
server may also run the SQL database, or the database and the SCCM repository can be on separate
servers. When leveraging this audit, Nessus must connect to the SCCM server via WMI and HTTPS.
SCCM scanning uses the following Tenable plugins: 57029, 57030, 73636, and 58186.
Note: SCCM patch management plugins support SCCM 2007, SCCM 2012, SCCM 2016, and SCCM 2019.
Username (Required) The username for the SCCM user account that Nessus -
uses to perform checks on the target system. The user account
must have privileges to query all data in the SCCM MMC.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Windows Server Update Services (WSUS)
Windows Server Update Services (WSUS) is available from Microsoft to manage the distribution of
updates and hotfixes for Microsoft products. Nessus can query WSUS to verify whether or not patches
are installed on systems managed by WSUS and display the patch information through the Nessus
user interface.
WSUS scanning uses the following Tenable plugins: 57031, 57032, and 58133.
Port (Required) The TCP port that Microsoft WSUS listens on for 8530
communications from Nessus.
Although not supported by Tenable, the Red Hat Satellite plugin also works with Spacewalk Server, the
Open Source Upstream Version of Red Hat Satellite. Spacewalk can manage distributions based on
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Red Hat (RHEL, CentOS, Fedora) and SUSE. Tenable supports the Satellite server for Red Hat Enterprise
Linux.
Satellite scanning uses the following Tenable plugins: 84236, 84235, 84234, 84237, and 84238.
Port (Required) The TCP port that Red Hat Satellite listens on for com- 443
munications from Nessus.
Username (Required) The username for the Red Hat Satellite account that -
Nessus uses to perform checks on the target system.
Verify SSL When enabled, Nessus verifies that the SSL certificate on the Enabled
Certificate server is signed by a trusted CA.
Although not supported by Tenable, the Red Hat Satellite 6 plugin also works with Spacewalk Server,
the Open Source Upstream Version of Red Hat Satellite. Spacewalk can manage distributions based on
Red Hat (RHEL, CentOS, Fedora) and SUSE. Tenable supports the Satellite server for Red Hat Enterprise
Linux.
Red Hat Satellite 6 scanning uses the following Tenable plugins: 84236, 84235, 84234, 84237, 84238,
84231, 84232, and 84233.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Option Description Default
name.
Symantec Altris
Altiris is available from Symantec to manage the distribution of updates and hotfixes for Linux, Win-
dows, and Mac OS X systems. Nessus has the ability to use the Altiris API to verify whether or not
patches are installed on systems managed by Altiris and display the patch information through the
Nessus user interface.
Nessus connects to the Microsoft SQL server that is running on the Altiris host. When leveraging this
audit, if the MSSQL database and Altiris server are on separate hosts, Nessus must connect to the
MSSQL database, not the Altiris server.
Altiris scanning uses the following Tenable plugins: 78013, 78012, 78011, and 78014.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Credential Description Default
Database Port (Required) The TCP port that Altiris listens on for com- 5690
munications from Nessus.
Database Name (Required) The name of the MSSQL database that man- Symantec_
ages Altiris patch information. CMDB
Use Windows When enabled, use NTLMSSP for compatibility with older Disabled
Authentication Windows Servers.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Plaintext Authentication
Caution: Using plaintext credentials is not recommended. Use encrypted authentication methods when possible.
If a secure method of performing credentialed checks is not available, users can force Nessus to try to
perform checks over unsecure protocols; use the Plaintext Authentication options.
This menu allows the Nessus scanner to use credentials when testing HTTP, NNTP, FTP, POP2, POP3,
IMAP, IPMI, telnet/rsh/rexec, and SNMPv1/v2c.
By supplying credentials, Nessus may have the ability to do more extensive checks to determine vul-
nerabilities. HTTP credentials supplied will be used for Basic and Digest authentication only.
Credentials for FTP, IPMI, NNTP, POP2, and POP3 require only a username and password.
HTTP
There are four different types of HTTP Authentication methods: Automatic
authentication, Basic/Digest authentication, HTTP login form, and HTTP cookies import.
Login method POST Specify if the login action is performed via a GET or POST
request.
Follow 30x redir- 0 If a 30x redirect code is received from a web server, this dir-
ections ects Nessus to follow the link provided or not.
(# of levels)
Invert authen- Disabled A regex pattern to look for on the login page, that if found,
ticated regex tells Nessus authentication was not successful (e.g.,
Authentication failed!).
Use authen- Disabled Rather than search the body of a response, Nessus can
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Option Default Description
ticated regex on search the HTTP response headers for a given regex pattern
HTTP headers to better determine authentication state.
Use authen- Disabled The regex searches are case sensitive by default. This
ticated regex on instructs Nessus to ignore case.
HTTP headers
Authentication methods
Automatic authentication
Username and Password Required
Basic/Digest authentication
Username and Password Required
Option Description
Login page The absolute path to the login page of the application, e.g., /login.html.
Login submission The action parameter for the form method. For example, the login form for
page <form method="POST" name="auth_form" action="/login.php"> would be /lo-
gin.php.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Option Description
figurations drop-down box. This field can be used to provide more than two
parameters if required (e.g., a group name or some other piece of inform-
ation is required for the authentication process).
Check authen- The absolute path of a protected web page that requires authentication, to
tication on page better assist Nessus in determining authentication status, e.g., /admin.html.
Regex to verify A regex pattern to look for on the login page. Simply receiving a 200
successful authen- response code is not always sufficient to determine session state. Nessus
tication can attempt to match a given string such as Authentication successful!
NNTP
Username (Required) The username for the NNTP account that Nessus uses -
to perform checks on the target system.
FTP
Username (Required) The username for the FTP account that Nessus uses -
to perform checks on the target system.
POP2
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Setting Description Default
Username (Required) The username for the POP2 account that Nessus uses -
to perform checks on the target system.
POP3
Username (Required) The username for the POP3 account that Nessus uses -
to perform checks on the target system.
IMAP
Username (Required) The username for the IMAP account that Nessus uses -
to perform checks on the target system.
IPMI
Username (Required) The username for the IMPI account that Nessus uses -
to perform checks on the target system.
telnet/rsh/rexec
The telnet/rsh/rexec authentication section is also username and password, but there are additional
Global Settings for this section that can allow you to perform patch audits using any of these three pro-
tocols.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
SNMPv1/v2c
SNMPv1/v2c configuration allows you to use community strings for authentication to network devices.
You can configure up to four SNMP community strings.
UDP Port (Required) The TCP ports that SNMPv1/v2c listens on for com- 161
munications from Nessus.
Additional
UDP port #1
Additional UDP
port #2
Additional UDP
port #3
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Compliance
Note: If a scan is based on a user-defined policy, you cannot configure Compliance settings in the scan. You can
only modify these settings in the related user-defined policy.
Nessus can perform vulnerability scans of network services as well as log in to servers to discover any
missing patches.
However, a lack of vulnerabilities does not mean the servers are configured correctly or are “com-
pliant” with a particular standard.
You can use Nessus to perform vulnerability scans and compliance audits to obtain all of this data at
one time. If you know how a server is configured, how it is patched, and what vulnerabilities are
present, you can determine measures to mitigate risk.
At a higher level, if this information is aggregated for an entire network or asset class, security and risk
can be analyzed globally. This allows auditors and network managers to spot trends in non-compliant
systems and adjust controls to fix these on a larger scale.
When configuring a scan or policy, you can include one or more compliance checks, also known as
audits. Each compliance check requires specific credentials.
Some compliance checks are preconfigured by Tenable, but you can also create and upload custom
audits.
For more information on compliance checks and creating custom audits, see the Compliance Checks
Reference.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Check Point GAiA SSH
Database Database
F5 F5
FireEye SSH
HP ProCurve SSH
MongoDB MongoDB
OpenStack OpenStack
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Palo Alto Networks PAN-OS PAN-OS
Rackspace Rackspace
RHEV RHEV
Unix SSH
VMware vCenter/vSphere VMware ESX SOAP API or VMware vCenter SOAP API
WatchGuard SSH
Windows Windows
ZTE ROSNG SSH
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
SCAP Settings
Security Content Automation Protocol (SCAP) is an open standard that enables automated man-
agement of vulnerabilities and policy compliance for an organization. It relies on multiple open stand-
ards and policies, including OVAL, CVE, CVSS, CPE, and FDCC policies.
When you select the SCAP and OVAL Auditing template, you can modify SCAP settings.
You can select Linux (SCAP), Linux (OVAL), Windows (SCAP), or Windows (OVAL). The settings for
each option are described in the following table.
SCAP File None A valid zip file that contains full SCAP content
(XCCDF, OVAL, and CPE for versions 1.0 and 1.1;
DataStream for version 1.2).
SCAP Version 1.2 The SCAP version that is appropriate for the con-
tent in the uploaded SCAP file.
SCAP Data Stream ID None (SCAP Version 1.2 only) The Data Stream ID that
you copied from the SCAP XML file.
Example:
<data-stream id="scap_gov.nist_
datastream_USGCB-Windows-7-
1.2.3.1.zip">
Example:
<xccdf:Benchmark id="xccdf_gov.nist_
benchmark_USGCB-Windows-7">
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
SCAP Profile ID None The Profile ID that you copied from the
SCAP XML file.
Example:
<xccdf:Profile id="xccdf_gov.nist_
profile_united_states_government_
configuration_baseline_version_
1.2.3.1">
OVAL Result Type Full results w/ sys- The information you want the results file to
tem char- include.
acteristics
The results file can be one of the following types:
full results with system characteristics, full results
without system characteristics, or thin results.
OVAL definitions file None A valid zip file that contains OVAL standalone con-
tent.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Plugins
The Advanced Scan templates include Plugin options.
Plugins options enables you to select security checks by Plugin Family or individual plugins checks.
For more information on specific plugins, see the Tenable plugins site. For more information on plugin
families, see About Plugin Families on the Tenable plugins site.
Clicking on the Plugin Family allows you to enable (green) or disable (gray) the entire family. Selecting
a family displays the list of its plugins. Individual plugins can be enabled or disabled to create very spe-
cific scans.
A family with some plugins disabled is blue and displays Mixed to indicate only some plugins are
enabled. Clicking on the plugin family loads the complete list of plugins, and allow for granular selec-
tion based on your scanning preferences.
Selecting a specific Plugin Name displays the plugin output that would be seen in a report.
The plugin details include a Synopsis, Description, Solution, Plugin Information, and Risk Inform-
ation.
When a scan or policy is created and saved, it records all of the plugins that are initially selected.
When new plugins are received via a plugin update, they are automatically enabled if the family they
are associated with is enabled. If the family has been disabled or partially enabled, new plugins in that
family are also automatically disabled.
Caution: The Denial of Service family contains some plugins that could cause outages on a network if the Safe
Checks option is not enabled, in addition to some useful checks that will not cause any harm. The Denial of Ser-
vice family can be used in conjunction with Safe Checks to ensure that any potentially dangerous plugins are not
run. However, it is recommended that the Denial of Service family not be used on a production network unless
scheduled during a maintenance window and with staff ready to respond to any issues.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Configure Dynamic Plugins
With the Advanced Dynamic Scan template, you can create a scan or policy with dynamic plugin fil-
ters instead of manually selecting plugin families or individual plugins. As Tenable releases new plu-
gins, any plugins that match your filters are automatically added to the scan or policy. This allows you
to tailor your scans for specific vulnerabilities while ensuring that the scan stays up to date as new plu-
gins are released.
For more information on specific plugins, see the Tenable plugins site. For more information on plugin
families, see About Plugin Families on the Tenable plugins site.
l Create a Scan.
l Create a Policy.
l Match Any or Match All: If you select All, only results that match all filters appear. If you
select Any, results that match any one of the filters appear.
l Plugin attribute: See the Plugin Attributes table for plugin attribute descriptions.
l Filter argument: Select is equal to, is not equal to, contains, does not contain, greater
than, or less than to specify how the filter should match for the selected plugin attribute.
l Value: Depending on the plugin attribute you selected, enter a value or select a value from
the drop-down menu.
7. Click Save.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Nessus creates the scan or policy, which automatically updates when Tenable adds new plugins
that match the dynamic plugin filters.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Special Use Templates
Note: For more information about performing custom audits with Nessus, see the Custom Auditing video.
Compliance
Nessus compliance auditing can be configured using one or more of the following Scanner and Agent
templates.
Mobile Device
With Nessus Manager, the Nessus Mobile Devices plugin family provides the ability to obtain inform-
ation from devices registered in a Mobile Device Manager (MDM) and from Active Directory servers that
contain information from Microsoft Exchange Servers.
l To query for information, the Nessus scanner must be able to reach the Mobile Device Man-
agement servers. You must ensure no screening devices block traffic to these systems from the
Nessus scanner. In addition, Nessus must be given administrative credentials (e.g., domain
administrator) to the Active Directory servers.
l To scan for mobile devices, Nessus must be configured with authentication information for the
management server and the mobile plugins. Since Nessus authenticates directly to the man-
agement servers, a scan policy does not need to be configured to scan specific hosts.
l For ActiveSync scans that access data from Microsoft Exchange servers, Nessus will retrieve
information from phones that have been updated in the last 365 days.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Tenable offers two Payment Card Industry Data Security Standard (PCI DSS) templates: one for test-
ing internal systems (11.2.1) and one for Internet facing systems (11.2.2). Also, these scan templates may
also be used to complete scans after significant changes to your network, as required by PCI DSS
11.2.3.
PCI Quarterly Tenable.io Only The PCI Quarterly External Scan template is only available in
External Scan Tenable.io. Using this template, Tenable.io tests for all PCI
DSS external scanning requirements, including web applic-
ations.
PCI Quarterly Nessus Man- For Nessus Manager and Nessus Professional versions, Ten-
External Scan ager able provides the PCI Quarterly External Scan (Unofficial)
(Unofficial) template.
Nessus Pro- This template can be used to simulate an external scan (PCI
fessional DSS 11.2.2) to meet PCI DSS quarterly scanning require-
ments. However, the scan results from the Unofficial tem-
plate cannot be submitted to Tenable, Inc. for PCI
Validation.
PCI Quarterly Nessus Man- The Internal PCI Network Scan template can be used to
External Scan ager meet PCI DSS Internal scanning requirement (11.2.1).
(Unofficial)
Nessus Pro-
fessional
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
SCAP and OVAL
The National Institute of Standards and Technology (NIST) Security Content Automation Protocol
(SCAP) is a set of policies for managing vulnerabilities and policy compliance in government agencies.
It relies on multiple open standards and policies, including OVAL, CVE, CVSS, CPE, and FDCC policies.
l Systems running security software (e.g., McAfee Host Intrusion Prevention), may block or quar-
antine the executable required for auditing. For those systems, an exception must be made for
the either the host or the executable sent.
l When using the SCAP and OVAL Auditing template, you can perform Linux and Windows SCAP
CHECKS to test compliance standards as specified in NIST’s Special Publication 800-126.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Unofficial PCI ASV Validation Scan
Approved Scanning Vendors (ASVs) are organizations that validate adherence to certain Data Security
Standards (DSS) requirements by performing vulnerability scans of internet facing environments of
merchants and service providers.
Tenable, Inc. is a Payment Card Industry (PCI) ASV, and is certified to validate vulnerability scans of
internet-facing systems for adherence to certain aspects of the PCI DSS and Tenable.io is a validated
ASV solution.
Nessus Professional and Nessus Manager features two PCI-related scan templates: Internal
PCI Network Scan and Unofficial PCI Quarterly External Scan.
Note: While the PCI DSS requires you to provide evidence of passing or "clean" scans on at least a quarterly
basis, you are also required to perform scans after any significant changes to your network (PCI DSS 11.2.3).
For more information on performing and submitting an official PCI Quarterly External Scan, see the
Tenable.io User Guide.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Submit Scan Results
Only Tenable.io customers have the option to submit their PCI scan results to Tenable, Inc. for PCI ASV
validation.
When submitted, scan results are uploaded and the scan results can be reviewed from a PCI DSS per-
spective.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Create and Manage Scans
This section contains the following tasks available on the Scans page.
l Create a Scan
l Import a Scan
l Delete a Scan
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Example: Host Discovery
Knowing what hosts are on your network is the first step to any vulnerability assessment. Launch a
host discovery scan to see what hosts are on your network, and associated information such as IP
address, FQDN, operating systems, and open ports, if available. After you have a list of hosts, you can
choose what hosts you want to target in a specific vulnerability scan.
The following overview describes a typical workflow of creating and launching a host discovery scan,
then creating a follow-up scan that target discovered hosts that you choose.
Tip: For IP addresses, you can use CIDR notation (e.g., 192.168.0.0/24), a range (e.g., 192.168.0.1-
192.168.0.255), or a comma-separated list (e.g., 192.168.0.0,192.168.0.1). For more information, see
Scan Targets.
5. To launch the scan immediately, click the button, and then click Launch.
Nessus runs the host discovery scan, and the My Scans page appears.
6. In the scans table, click the row of a completed host discovery scan.
7. In the Hosts tab, view the hosts that Nessus discovered, and any available associated inform-
ation, such as IP address, FQDN, operating system, and open ports.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Create and launch a scan on one or more discovered hosts:
1. In the top navigation bar, click Scans.
2. In the scans table, click the row of your completed host discovery scan.
4. Select the check box next to each host you want to scan in your new scan.
Nessus automatically populates the Targets list with the hosts you previously selected.
8. Configure the rest of the scan settings, as described in Scan and Policy Settings.
9. To launch the scan immediately, click the button, and then click Launch.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Create a Scan
1. In the top navigation bar, click Scans.
l To launch the scan immediately, click the button, and then click Launch.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Import a Scan
You can import a scan that was exported in Nessus (.nessus) or Nessus DB (.db) format. With an
imported scan, you can view scan results, export new reports for the scan, rename the scan, and
update the description. You cannot launch imported scans or update policy settings.
You can also import .nessus files as policies. For more information, see Import a Policy.
To import a scan:
3. Browse to and select the scan file that you want to import.
Note: Supported file types are exported Nessus (.nessus) and Nessus DB (.db) files.
5. Click Upload.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Create an Agent Scan
Tip: Use the search box in the top navigation bar to filter templates on the tab currently in view.
l If you want to launch the scan later, click the Save button.
b. Click Launch.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Modify Scan Settings
This procedure can be performed by a standard user or administrator.
3. In the scans table, select the check box on the row corresponding to the scan that you want to
configure.
5. Click Configure.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Configure vSphere Scanning
You can configure a scan to scan the following virtual environments:
l Virtual machines
1. Create a scan.
2. In the Basic scan settings, in the Targets section, type the IP address(es) of the ESXi host(s).
6. In the Username box, type the username associated with the local ESXi account.
7. In the Password box, type the password associated with the local ESXi account.
8. If your vCenter host includes an SSL certificate (not a self-signed certificate), deselect the Do
not verify SSL Certificate check box. Otherwise, select the check box.
9. Click Save.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
1. Create a scan.
2. In the Basic scan settings, in the Targets section, type the IP addresses of:
6. In the vCenter Host box, type the IP address of the vCenter host.
7. In the vCenter Port box, type the port for the vCenter host. By default, this value is 443.
8. In the Username box, type the username associated with the local ESXi account.
9. In the Password box, type the password associated with the local ESXi account.
10. If the vCenter host is SSL enabled, enable the HTTPS toggle.
11. If your vCenter host includes an SSL certificate (not a self-signed certificate), select the Verify
SSL Certificate check box. Otherwise, deselect the check box.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Configure an Audit Trail
This procedure can be performed by a standard user or administrator.
3. On the scans table, click the scan for which you want to configure an audit trail.
5. In the Plugin ID box, type the plugin ID used by one or more scans.
and/or
A list appears, which displays the results that match the criteria that you entered in one or both
boxes.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Launch a Scan
In addition to configuring Schedule settings for a scan, you can manually start a scan run.
To launch a scan:
2. In the scans table, in the row of the scan you want to launch, click the button.
What to do next:
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Stop a Running Scan
When you stop a scan, Nessus terminates all tasks for the scan and categorizes the scan as canceled.
The Nessus scan results associated with the scan reflect only the completed tasks. You cannot stop
individual tasks, only the scan as a whole.
For local scans (i.e., not a scan run by Nessus Agent or a linked scanner in Nessus Manager), you can
force stop the scan to quickly stop the scan and terminate all in-progress plugins. Nessus may not get
results from any plugins that were running when you force stopped the scan.
2. In the scans table, in the row of the scan you want to stop, click the button.
4. (Optional) For local scans, to force stop the scan, click the button.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Delete a Scan
This procedure can be performed by a standard user or administrator.
3. On the scans table, on the row corresponding to the scan that you want to delete, click the but-
ton.
4. To permanently delete the scan, in the left navigation bar, click the Trash folder.
5. On the scans table, on the row corresponding to the scan that you want to permanently delete,
click the button.
Tip: On the Trash page, in the upper right corner, click the Empty Trash button to permanently delete all scans
in the Trash folder.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Scan Results
You can view scan results to help you understand your organization’s security posture and vul-
nerabilities. Color-coded indicators and customizable viewing options allow you to customize how you
view your scan’s data.
Page Description
Dashboard In Nessus Manager, the default scan results page displays the Dashboard
view.
Compliance If the scan includes compliance checks, this list displays counts and details
sorted by vulnerability severity.
If the scan is configured for compliance scanning, the button allows you
to navigate between the Compliance and Vulnerability results.
Remediations If the scan's results include Remediation information, this list displays sug-
gested remediations that address the highest number of vulnerabilities.
Notes The Notes page displays additional information about the scan and the
scan’s results.
History The History displays a listing of scans: Start Time, End Time, and the Scan
Statuses.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Severity
Severity is a categorization of the risk and urgency of a vulnerability.
CVSS-Based Severity
When you view vulnerabilities in scan results, Nessus displays severity based on CVSSv2 scores or
CVSSv3 scores, depending on your configuration.
l You can choose whether Nessus calculates the severity of vulnerabilities using CVSSv2 or
CVSSv3 scores by configuring your default severity base setting. For more information, see Con-
figure Your Default Severity Base.
l You can also configure individual scans to use a particular severity base, which overrides the
default severity base for those scan results. For more information, see Configure Severity Base
for an Individual Scan.
VPR
You can also view the top 10 vulnerabilities by VPR threat. For more information, see View VPR Top
Threats.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
CVSS Scores vs. VPR
Tenable uses CVSS scores and a dynamic Tenable-calculated Vulnerability Priority Rating (VPR) to
quantify the risk and urgency of a vulnerability.
CVSS
Tenable uses and displays third-party Common Vulnerability Scoring System (CVSS) values retrieved
from the National Vulnerability Database (NVD) to describe risk associated with vulnerabilities. CVSS
scores power a vulnerability's Severity and Risk Factor values.
Tip: Risk Factor and Severity values are unrelated; they are calculated separately.
CVSS-Based Severity
Tenable assigns all vulnerabilities a severity (Info, Low, Medium, High, or Critical) based on the vul-
nerability's static CVSSv2 or CVSSv3 score, depending on your configuration. For more information,
see Configure Default Severity.
Nessus analysis pages provide summary information about vulnerabilities using the following CVSS cat-
egories.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
- or - - or -
The plugin does not search for vul- The plugin does not search for vul-
nerabilities. nerabilities.
Tip: Info plugins receive a risk factor of None. Other plugins without associated CVSSv2 scores receive a custom
risk factor based on information provided in related security advisories.
Note: Vulnerabilities without CVEs in the National Vulnerability Database (NVD) (e.g., many vulnerabilities with
the Info severity) do not receive a VPR. Tenable recommends remediating these vulnerabilities according to their
CVSS-based severity.
Nessus provides a VPR value the first time you scan a vulnerability on your network.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Tenable recommends resolving vulnerabilities with the highest VPRs first. You can view VPR scores
and summary data in:
l The VPR Top Threats for an individual scan, as described in View VPR Top Threats.
l The Top 10 Vulnerabilities report for an individual scan. For information on creating the report,
see Create a Scan Report.
You can view the following key drivers to explain a vulnerability's VPR.
Note: Tenable does not customize these values for your organization; VPR key drivers reflect a vulnerability's
global threat landscape.
Age of Vuln The number of days since the National Vulnerability Database (NVD) published
the vulnerability.
CVSSv3 The NVD-provided CVSSv3 impact score for the vulnerability. If the NVD did not
Impact provide a score, Nessus displays a Tenable-predicted score.
Score
Exploit Code The relative maturity of a possible exploit for the vulnerability based on the exist-
Maturity ence, sophistication, and prevalence of exploit intelligence from internal and
external sources (e.g., Reversinglabs, Exploit-db, Metasploit, etc.). The possible
values (High, Functional, PoC, or Unproven) parallel the CVSS Exploit Code Matur-
ity categories.
Product The relative number of unique products affected by the vulnerability: Low,
Coverage Medium, High, or Very High.
Threat A list of all sources (e.g., social media channels, the dark web, etc.) where threat
Sources events related to this vulnerability occurred. If the system did not observe a
related threat event in the past 28 days, the system displays No recorded
events.
Threat The relative intensity based on the number and frequency of recently observed
Intensity threat events related to this vulnerability: Very Low, Low, Medium, High, or Very
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
High.
Threat The number of days (0-730) since a threat event occurred for the vulnerability.
Recency
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Configure Your Default Severity Base
Note: By default, new installations of Nessus use CVSSv3 scores (when available) to calculate sever-
ity for vulnerabilities. Preexisting, upgraded installations retain the previous default of CVSSv2
scores.
In Nessus scanners and Nessus Professional, you can choose whether Nessus calculates the severity
of vulnerabilities using CVSSv2 or CVSSv3 scores (when available) by configuring your default severity
base setting. When you change the default severity base, the change applies to all existing scans that
are configured with the default severity base. Future scans also use the default severity base.
You can also configure individual scans to use a particular severity base, which overrides the default
severity base for that scan, as described in Configure Severity Base for an Individual Scan.
For more information about CVSS scores and severity ranges, see CVSS Scores vs. VPR.
4. In the table, click the row for the System Default Severity Basis setting.
Tip: Use the search bar to search for any part of the setting name.
5. In the Value drop-down box, select CVSS v2.0 or CVSS v3.0 for your default severity base.
6. Click Save.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Nessus updates the default severity base for your instance. Existing scans with the default sever-
ity base update to reflect the new default. Individual scans with overriden severity bases do not
change.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Configure Severity Base for an Individual Scan
Note: By default, new installations of Nessus use CVSSv3 scores (when available) to calculate sever-
ity for vulnerabilities. Preexisting, upgraded installations retain the previous default of CVSSv2
scores.
You can configure individual scans to use a particular severity base, which overrides the default sever-
ity base for that scan. If you change the default severity base, scans with overriden severity bases do
not change.
To change the default severity base across the Nessus instance, see Configure Your Default Severity
Base.
For more information about CVSS scores and severity ranges, see CVSS Scores vs. VPR.
2. In the scans table, click the scan for which you want to change the severity base.
The scan page appears. The Scan Details, including the scan's current severity base, appear on
the right side of the page.
3. Under Scan Details, next to the current Severity Base, click the button.
4. From the Severity Rating Base drop-down box, select one of the following:
l CVSS v2.0 — The severity for vulnerabilities found by the scan is based on CVSSv2 scores.
This setting overrides the default severity base set on the Nessus instance.
l CVSS v3.0 — The severity for vulnerabilities found by the scan is based on CVSSv3 scores.
This setting overrides the default severity base set on the Nessus instance.
l Default — The severity for vulnerabilities found by the scan use the Nessus default severity
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
base, which appears in parentheses. If you change the default severity base later, the scan
automatically uses the new default severity base.
5. Click Save.
Nessus updates the severity base for your scan. The scan results update to reflect the updated
severity.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Create a New Scan from Scan Results
When you view scan results, you can select scanned hosts that you want to target in a new scan. When
you create a new scan, Nessus automatically populates the targets with the hosts that you selected.
4. Select the check box next to each host you want to scan in your new scan.
Nessus automatically populates the Targets list with the hosts you previously selected.
8. Configure the rest of the scan settings, as described in Scan and Policy Settings.
l To launch the scan immediately, click the button, and then click Launch.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
l To launch the scan later, click the Save button.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Search and Filter Results
You can search or use filters to view specific scan results. You can filter hosts and vulnerabilities, and
you can create detailed and customized scan result views by using multiple filters.
2. In the Search Hosts box above the hosts table, type text to filter for matches in host names.
As you type, Nessus automatically filters the results based on your text.
l In scan results, in the Hosts tab, click a specific host to view its vulnerabilities.
2. In the Search Vulnerabilities box above the vulnerabilities table, type text to filter for matches in
vulnerability titles.
As you type, Nessus automatically filters the results based on your text.
To create a filter:
1. Do one of the following:
l In scan results, in the Hosts tab, click a specific host to view its vulnerabilities.
l Match Any or Match All: If you select All, only results that match all filters appear. If you
select Any, results that match any one of the filters appear.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
l Plugin attribute: See the Plugin Attributes table for plugin attribute descriptions.
l Filter argument: Select is equal to, is not equal to, contains, or does not contain to spe-
cify how the filter should match for the selected plugin attribute.
l Value: Depending on the plugin attribute you selected, enter a value or select a value from
the drop-down menu.
5. Click Apply.
Your filter is applied and the table displays vulnerabilities that match your filters.
To remove filters:
1. Click Filter next to the search box.
The filters are removed from the vulnerabilities displayed in the table.
Plugin Attributes
The following table lists plugins attributes you can use to filter results.
Option Description
Bugtraq ID Filter results based on if a Bugtraq ID is equal to, is not equal to, contains, or
does not contain a given string (e.g., 51300).
CANVAS Exploit Filter results based on if the presence of an exploit in the CANVAS exploit
Framework framework is equal to or is not equal to true or false.
CANVAS Pack- Filter results based on which CANVAS exploit framework package an exploit
age exists for. Options include CANVAS, D2ExploitPack, or White_Phosphorus.
CERT Advisory Filter results based on if a CERT Advisory ID (now called Technical Cyber
ID Security Alert) is equal to, is not equal to, contains, or does not contain a given
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
string (e.g., TA12-010A).
CORE Exploit Filter results based on if the presence of an exploit in the CORE exploit frame-
Framework work is equal to or is not equal to true or false.
CPE Filter results based on if the Common Platform Enumeration (CPE) is equal to,
is not equal to, contains, or does not contain a given string (e.g., Solaris).
CVSS Base Filter results based on if a Common Vulnerability Scoring System (CVSS) v2.0
Score base score is less than, is more than, is equal to, is not equal to, contains, or
does not contain a string (e.g., 5).
This filter can be used to select by risk level. The severity ratings are derived
from the associated CVSS score, where 0 is Info, less than 4 is Low, less than
7 is Medium, less than 10 is High, and a CVSS score of 10 will be flagged Crit-
ical.
CVSS Temporal Filter results based on if a CVSS v2.0 temporal score is less than, is more
Score than, is equal to, is not equal to, contains, or does not contain a string (e.g.,
3.3).
CVSS Temporal Filter results based on if a CVSS v2.0 temporal vector is equal to, is not equal
Vector to, contains, or does not contain a given string (e.g., E:F).
CVSS Vector Filter results based on if a CVSS v2.0 vector is equal to, is not equal to, con-
tains, or does not contain a given string (e.g., AV:N).
CVSS 3.0 Base Filter results based on if a Common Vulnerability Scoring System (CVSS) v3.0
Score base score is less than, is more than, is equal to, is not equal to, contains, or
does not contain a string (e.g., 5).
This filter can be used to select by risk level. The severity ratings are derived
from the associated CVSS score, where 0 is Info, less than 4 is Low, less than
7 is Medium, less than 10 is High, and a CVSS score of 10 will be flagged Crit-
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
ical.
CVSS 3.0 Tem- Filter results based on if a CVSS v3.0 temporal score is less than, is more
poral Score than, is equal to, is not equal to, contains, or does not contain a string (e.g.,
3.3).
CVSS 3.0 Tem- Filter results based on if a CVSS v3.0 temporal vector is equal to, is not equal
poral Vector to, contains, or does not contain a given string (e.g., E:F).
CVSS 3.0 Vector Filter results based on if a CVSS v3.0 vector is equal to, is not equal to, con-
tains, or does not contain a given string (e.g., AV:N).
CWE Filter results based on Common Weakness Enumeration (CWE) if a CVSS vec-
tor is equal to, is not equal to, contains, or does not contain a CWE reference
number (e.g., 200).
Exploit Available Filter results based on the vulnerability having a known public exploit.
Exploit Database Filter results based on if an Exploit Database ID (EBD-ID) reference is equal to,
ID is not equal to, contains, or does not contain a given string (e.g., 18380).
Exploitability Filter results based on if the exploitability ease is equal to or is not equal to
Ease the following values: Exploits are available, No exploit is required, or No
known exploits are available.
Exploited by Mal- Filter results based on if the presence of a vulnerability is exploitable by mal-
ware ware is equal to or is not equal to true or false.
Exploited by Nes- Filter results based on whether a plugin performs an actual exploit, usually an
sus ACT_ATTACK plugin.
Hostname Filter results if the host is equal to, is not equal to, contains, or does not con-
tain a given string (e.g., 192.168 or lab). For agents, you can search by the
agent target name. For other targets, you can search by the target's IP
address or DNS name, depending on how the scan was configured.
IAVA Filter results based on if an IAVA reference is equal to, is not equal to, con-
tains, or does not contain a given string (e.g., 2012-A-0008).
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
IAVB Filter results based on if an IAVB reference is equal to, is not equal to, con-
tains, or does not contain a given string (e.g., 2012-A-0008).
IAVM Severity Filter results based on the IAVM severity level (e.g., IV).
In The News Filter results based on whether the vulnerability covered by a plugin has had
coverage in the news.
Malware Filter results based on whether the plugin detects malware; usually ACT_
GATHER_INFO plugins.
Metasploit Name Filter results based on if a Metasploit name is equal to, is not equal to, con-
tains, or does not contain a given string (e.g., xslt_password_reset).
Microsoft Bul- Filter results based on Microsoft security bulletins like MS17-09, which have
letin the format MSXX-XXX , where X is a number.
Microsoft KB Filter results based on Microsoft knowledge base articles and security advisor-
ies.
Patch Public- Filter results based on if a vulnerability patch publication date is less than, is
ation Date more than, is equal to, is not equal to, contains, or does not contain a string
(e.g., 12/01/2011).
Plugin Descrip- Filter results if Plugin Description contains, or does not contain a given string
tion (e.g., remote).
Plugin Family Filter results if Plugin Name is equal to or is not equal to one of the des-
ignated Nessus plugin families. The possible matches are provided via a
drop-down menu.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Plugin ID Filter results if plugin ID is equal to, is not equal to, contains, or does not con-
tain a given string (e.g., 42111).
Plugin Modi- Filter results based on if a Nessus plugin modification date is less than, is
fication Date more than, is equal to, is not equal to, contains, or does not contain a string
(e.g., 02/14/2010).
Plugin Name Filter results if Plugin Name is equal to, is not equal to, contains, or does not
contain a given string (e.g., windows).
Plugin Output Filter results if Plugin Description is equal to, is not equal to, contains, or does
not contain a given string (e.g., PHP)
Plugin Public- Filter results based on if a Nessus plugin publication date is less than, is more
ation Date than, is equal to, is not equal to, contains, or does not contain a string (e.g.,
06/03/2011).
Plugin Type Filter results if Plugin Type is equal to or is not equal to one of the two types
of plugins: local or remote.
Port Filter results based on if a port is equal to, is not equal to, contains, or does
not contain a given string (e.g., 80).
Protocol Filter results if a protocol is equal to or is not equal to a given string (e.g.,
http).
Risk Factor Filter results based on the risk factor of the vulnerability (e.g., Low, Medium,
High, Critical).
Secunia ID Filter results based on if a Secunia ID is equal to, is not equal to, contains, or
does not contain a given string (e.g., 47650).
See Also Filter results based on if a Nessus plugin see also reference is equal to, is not
equal to, contains, or does not contain a given string (e.g., seclists.org).
Solution Filter results if the plugin slution contains or does not contain a given string
(e.g., upgrade).
Synopsis Filter results if the plugin solution contains or does not contain a given string
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
(e.g., PHP).
Vulnerability Filter results based on if a vulnerability publication date earlier than, later
Publication Date than, on, not on, contains, or does not contain a string (e.g., 01/01/2012).
Note: Pressing the button next to the date will bring up a calendar interface for
easier date selection.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Compare Scan Results
You can compare two scan results to see differences between them. The comparison shows what is
new since the baseline (i.e., the primary result selected), not a differential of the two results. You can-
not compare imported scans or more than two scans.
Comparing scan results helps you see how a given system or network has changed over time. This
information is useful for compliance analysis by showing how vulnerabilities are being remediated, if
systems are patched as new vulnerabilities are found, or how two scans may not be targeting the same
hosts.
2. Click a scan.
4. In the row of both scan results you want to compare, select the check box.
6. In the drop-down box, select a scan baseline for the comparison, then click Continue.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Dashboard
In Nessus Manager, you can configure a scan to display the scan’s results in an interactive dashboard
view.
Based on the type of scan performed and the type of data collected, the dashboard displays key values
and trending indicators.
Dashboard View
Based on the type of scan performed and the type of data collected, the dashboard displays key values
and a trending indicator.
Dashboard Details
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Name Description
Vulnerability Com- The percentage of all vulnerabilities identified by the scan, by severity.
parison
Host Count Com- The percentage of hosts scanned by credentialed and non-credentialed
parison authorization types: without authorization, new without authorization, with
authorization, and new with authorization.
Vulnerabilities Vulnerabilities found over a period of time. At least 2 scans must be com-
Over Time pleted for this chart to appear.
Top Hosts Top 8 hosts that had the highest number of vulnerabilities found in the scan.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Vulnerabilities
Vulnerabilities are instances of a potential security issue found by a plugin. In your scan results, you
can choose to view all vulnerabilities found by the scan, or vulnerabilities found on a specific host.
All vulnerabilities detected by a scan Scans > [scan name] > Vulnerabilities
Vulnerabilities detected by a scan on a specific host Scans > Hosts > [scan name]
l View Vulnerabilities
l Modify a Vulnerability
l Group Vulnerabilities
l Snooze a Vulnerability
l Live Results
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
View Vulnerabilities
You can view all vulnerabilities found by a scan, or vulnerabilities found on a specific host by a scan.
When you drill down on a vulnerability, you can view information such as plugin details, description,
solution, output, risk information, vulnerability information, and reference information.
To view vulnerabilities:
4. (Optional) To sort the vulnerabilities, click an attribute in the table header row to sort by that
attribute.
The vulnerability details page appears, displaying plugin information and output for each
instance on a host.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Modify a Vulnerability
You can modify a vulnerability to change its severity level or hide it. This allows you to re-prioritize the
severity of results to better account for your organization’s security posture and response plan. When
you modify a vulnerability from the scan results page, the change only applies to that vulnerability
instance for that scan unless you indicate that the change should apply to all future scans. To modify
severity levels for all vulnerabilities, use Plugin Rules.
To modify a vulnerability:
5. In the Severity drop-down box, select a severity level or Hide this result.
Note: If you hide a vulnerability, it cannot be recovered and you accept its associated risks. To temporarily
hide a vulnerability, use Vulnerability Snoozing.
If you select this option, Nessus modifies this vulnerability for all future scans. Nessus does not
modify vulnerabilities found in past scans.
7. Click Save.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Group Vulnerabilities
When you group vulnerabilities, plugins with common attributes such as Common Platform
Enumeration (CPE), service, application, and protocol nest under a single row in scan results. Grouping
vulnerabilities gives you a shorter list of results, and shows you related vulnerabilities together.
When groups are enabled, the number of vulnerabilities in the group appears next to the severity indic-
ator, and the group name says (Multiple Issues).
The severity indicator for a group is based on the vulnerabilities in the group. If all the vulnerabilities in
a group have the same severity, Nessus displays that severity level. If the vulnerabilities in a group
have differing severities, Nessus displays the Mixed severity level.
To group vulnerabilities:
1. In the top navigation bar, click Scans.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
l Click a specific host to view vulnerabilities found on that host.
-or-
To ungroup vulnerabilities:
1. In the header row of the vulnerabilities table, click .
A new vulnerabilities table appears and displays the vulnerabilities in the group.
To set group severity types to the highest severity within the group:
By default, groups that contain vulnerabilities with different vulnerabilities display the severity type
Mixed. You can change this setting to display the highest severity of any vulnerability in the group.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Snooze a Vulnerability
When you snooze a vulnerability, it does not appear in the default view of your scan results. You
choose a period of time for which the vulnerability is snoozed – once the snooze period expires, the vul-
nerability awakes and appears in your list of scan results. You can also manually wake a vulnerability
or choose to display snoozed vulnerabilities. Snoozing affects all instances of the vulnerability in a
given scan, so you cannot snooze vulnerabilities only on a specific host.
To snooze a vulnerability:
-or-
-or-
l Click Custom.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
l If you selected a preset snooze period, click Snooze to confirm your selection.
l If you selected a custom snooze period, select the date you want the vulnerability to
snooze until, then click Snooze.
The vulnerability is snoozed for the selected period of time and does not appear in the default
view of scan results.
2. Click Wake.
The vulnerability is no longer snoozed, and appears in the default list of scan results.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
View VPR Top Threats
In Nessus scan results, VPR Top Threats represent a scan's top 10 vulnerabilities with the highest VPR
scores. For information about VPR, see CVSS Scores vs. VPR.
Although you may have more than 10 vulnerabilities found by a scan, VPR top threats display the 10
most severe vulnerabilities as determined by their VPR score. To view all vulnerabilities by their static
CVSS score, see View Vulnerabilities.
Note: To ensure VPR data is available for your scans, enable plugin updates.
Tip: VPR is a dynamic score that changes over time to reflect the current threat landscape. However, the VPR
top threats reflect the VPR score for the vulnerability at the time the scan was run. To get updated VPR scores,
re-run the scan.
2. In the scans table, click the scan for which you want to view the top VPR threats.
The VPR Top Threats page appears. On this page, you can view:
Section Description
VPR Severity The severity for the vulnerability, based on VPR score. This severity
may differ from the CVSS-based severity. For more information, see
CVSS Scores vs. VPR.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Name The name of the vulnerability.
VPR Score The Vulnerability Priority Rating score for the vulnerability.
Hosts The number of affected hosts where the vulnerability was found.
4. (Optional) To view details for a specific vulnerability, click the row in the table.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Live Results
Nessus is automatically updated with new plugins, which allows you to assess your assets for new vul-
nerabilities. However, if your scan is on an infrequent schedule, the scan may not run new plugins until
several days after the plugin update. This gap could leave your assets exposed to vulnerabilities that
you are not aware of.
In Nessus Professional, you can use live results to view scan results for new plugins based on a scan's
most recently collected data, without running a new scan. Live results allow you to see potential new
threats and determine if you need to manually launch a scan to confirm the findings. Live results are
not results from an active scan; they are an assessment based on already-collected data. Live results
don't produce results for new plugins that require active detection, like an exploit, or that require data
that was not previously collected.
Live results appear with striped coloring in scan results. In the Vulnerabilities tab, the severity indic-
ator is striped, and the Live icon appears next to the plugin name.
The results page displays a note indicating that the results include live results. Tenable recommends
that you manually launch a scan to confirm the findings. The longer you wait between active scans, the
more outdated the data may be, which lessens the effectiveness of live results.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
l Enable or Disable Live Results
l Remove Live Results
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Enable or Disable Live Results
The first time you enable live results on a scan, the scan results update to include findings for plugins
that were enabled since the last scan. The scan then updates with live results whenever there is a new
plugin update. live results are not results from an active scan; they are an assessment based on a
scan's most recently collected data. Live results don't produce results for new plugins that require act-
ive detection, like an exploit, or that require data that was not previously collected. To learn more, see
Live Results.
4. Click Save.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Remove Live Results
In Nessus Professional, if a scan includes live results, Nessus displays the following notice on the scan
results page.
If you remove live results, they no longer appear on the scan results page. However, live results will re-
appear the next time the plugins are updated unless you disable the feature for the scan.
Tip: To launch the scan and confirm the live results findings, click Launch in the notice before you remove the
findings.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Scan Exports and Reports
Scans can be exported as a Nessus file or a Nessus DB file, as described in Export a Scan. These files
can then be imported as a scan or policy, as described in Import a Scan and Import a Policy.
You can also create a scan report in several different formats. For more information, see Create a Scan
Report.
Report templates are used to define the content of a report, based on chapter selection and ordering.
Once custom templates are defined, you can use them to generate HTML or PDF reports for scan res-
ults. In addition to custom templates, some system templates are predefined and provided with Nes-
sus. To view custom and system report templates, see Customized Reports. For more information on
the system templates provided by Tenable, see https://www.tenable.com/nessus-reports.
Format Description
Exports
Nessus A .nessus file in XML format that contains the list of targets, policies defined by the
user, and scan results. Password credentials are stripped so they are not exported
as plain text in the XML. If you import a .nessus file as a policy, you must re-apply
your passwords to any credentials.
Nessus DB A proprietary encrypted database format that contains all the information in a scan,
including the audit trails and results. When you export in this format, you must
enter a password to encrypt the results of the scan.
Reports
PDF A report generated in PDF format. Depending on the size of the report, PDF gen-
eration may take several minutes. Either Oracle Java or OpenJDK is required for
PDF reports.
HTML A report generated using standard HTML output. This report opens in a new tab in
your browser.
CSV A comma-separated values (CSV) export that can be used to import into many
external programs such as databases, spreadsheets, and more.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Export a Scan
You can export a scan from one Nessus scanner and import it to a different Nessus scanner. This
helps you manage your scan results, compare reports, back up reports, and facilitates communication
between groups within an organization. For more information, see Import a Scan and Import a Policy.
You can export scan results as a Nessus file or as a Nessus DB file. For more information, see Scan
Exports and Reports.
For Nessus files, if you modified scan results using plugin rules or by modifying a vulnerability (for
example, you hid or changed the severity of a plugin), the exported scan does not reflect these modi-
fications.
To export a scan:
2. Click a scan.
4. From the drop-down box, select the format in which you want to export the scan results.
l If you select Nessus DB format, the Export as Nessus DB dialog box appears.
When you import the Nessus DB file to another scanner, you are prompted for this
password.
b. Click Export.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Customized Reports
On the Customized Reports page in Nessus, you can view report templates, create custom report tem-
plates, and customize the title and logo that appear on each report.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Create a Scan Report
You can create a scan report to help you analyze the vulnerabilities and remediations on affected
hosts. You can create a scan report in PDF, HTML, or CSV format, and customize it to contain only cer-
tain information.
When you create a scan report, it includes the results that are currently visible on your scan results
page. You can also select certain hosts or vulnerabilities to specify your report.
2. Click a scan.
3. (Optional) To create a scan report that includes specific scan results, do the following:
l In the Hosts tab, select the check box in each row of a host you want to include in the scan
report.
l In the Vulnerabilities tab, select the check box in each row of each vulnerability or vul-
nerability group that you want to include in the scan report.
Note: You can make selections in either Hosts or Vulnerabilities, but not across both tabs.
5. From the drop-down box, select the format in which you want to export the scan results.
PDF or HTML
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
a. Click the Report Template you want to use.
A description of the report template and a list of the template's applied filters appear.
Tip: Select Hide system templates to only view a list of your custom report templates.
b. (Optional) To save the selected report template as the default for PDF or HTML reports
(depending on which format you selected), select the Save as default check box.
CSV
a. Select the check boxes for the columns you want to appear in the CSV report.
Tip: To select all columns, click Select All. To clear all columns, click Clear. To reset columns to the
system default, click System.
b. (Optional) To save your current configuration as the default for CSV reports, select the Save
as default check box.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Customize Report Title and Logo
In Nessus, you can customize the title and logo that appear on each report. This allows you to prepare
reports for different stakeholders.
4. In the Custom Name box, type the name that you want to appear on the report.
Your custom title and logo are saved and will appear on all future reports.
What to do next:
l Create a Scan Report
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Create a Custom Report Template
Note: This feature is only available for Nessus Manager and Nessus Professional.
Nessus allows you to create custom report templates on the Customized Reports page in addition to
the standard system report templates.
6. Add report Chapters to the template. Chapters determine what information and statistics appear
on the report.
b. Click the chapter you want to add to the template. A description of the chapter appears
below the chapter list.
The Add a Report Chapter window closes, and the new chapter is added to the Chapters
section. Repeat steps a-c to add another chapter.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
l Depending on the chapters selected, edit the chapter details. This may involve selecting or
clearing check boxes or changing values.
8. Click Save. Nessus saves your report template. You can select and edit the template from the
Report Templates tab (see Edit a Custom Report Template for more information).
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Edit a Custom Report Template
Note: This feature is only available for Nessus Manager and Nessus Professional.
Nessus allows you to edit custom report templates on the Customized Reports page.
3. Click the row for the custom template you want to edit.
4. Edit the Name, Description, and Chapters as needed (see Create a Custom Report Template for
more information).
5. Click Save.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Delete a Custom Report Template
Note: This feature is only available for Nessus Manager and Nessus Professional.
3. In the report template table, in the row for the custom template you want to delete, click the
button.
4. Click Delete.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Scan Folders
On the Scans page, the left navigation bar is divided into the Folders and Resources sections. The
Folders section always includes the following default folders that cannot be removed:
l My Scans
l All Scans
l Trash
When you access the Scans page, the My Scans folder appears. When you create a scan, it appears by
default in the My Scans folder.
The All Scans folder displays all scans you have created as well as any scans with which you have per-
mission to interact. You can click on a scan in a folder to view scan results.
The Trash folder displays scans that you have deleted. In the Trash folder, you can permanently
remove scans from your Nessus instance, or restore the scans to a selected folder. If you delete a
folder that contains scans, all scans in that folder are moved to the Trash folder. Scans stored in the
Trash folder are automatically deleted after 30 days.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Manage Scan Folders
These procedures can be performed by a standard user or administrator.
Create a Folder
1. In the top navigation bar, click Scans.
2. If the scan you want to move is not in the My Scans folder, on the left navigation bar, click the
folder that contains the scan you want to move.
3. On the scans table, select the check box on the row corresponding to the scan that you want to
configure.
4. Click More. Point to Move To, and click the folder that you want to move the scan to.
Rename a Folder
1. In the top navigation bar, click Scans.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
2. In the left navigation bar, next to the folder that you want to rename, click the button, and
then click Rename.
Delete a Folder
1. In the top navigation bar, click Scans.
2. In the left navigation bar, next to the folder that you want to rename, click the button, and
then click Delete.
The folder is deleted. If the folder contained scans, those scans are moved to the Trash folder.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Policies
A policy is a set of predefined configuration options related to performing a scan. After you create a
policy, you can select it as a template when you create a scan.
Note: For information about default policy templates and settings, see the Scan and Policy Templates topic.
Policy Characteristics
l Parameters that control technical aspects of the scan such as timeouts, number of hosts, type of
port scanner, and more.
l Credentials for local scans (e.g., Windows, SSH), authenticated Oracle database scans, HTTP,
FTP, POP, IMAP, or Kerberos based authentication.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
l Database compliance policy checks, report verbosity, service detection scan settings, Unix com-
pliance checks, and more.
l Offline configuration audits for network devices, allowing safe checking of network devices
without needing to scan the device directly.
l Windows malware scans which compare the MD5 checksums of files, both known good and mali-
cious files.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Create a Policy
1. In the top navigation bar, click Scans.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Import a Policy
You can import a scan or policy that was exported as a Nessus file (.nessus) and import it as a policy.
You can then view and modify the configuration settings for the imported policy. You cannot import a
Nessus DB file as a policy.
To import a policy:
4. Browse to and select the scan file that you want to import.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Modify Policy Settings
This procedure can be performed by a standard user or administrator.
3. In the policies table, select the check box on the row corresponding to the policy that you want to
configure.
5. Click Configure.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Delete a Policy
This procedure can be performed by a standard user or administrator.
3. On the policies table, on the row corresponding to the policy that you want to delete, click the
button.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
About Nessus Plugins
As information about new vulnerabilities are discovered and released into the general public domain,
Tenable, Inc. research staff designs programs to enable Nessus to detect them.
These programs are named plugins, and are written in the Nessus proprietary scripting language,
called Nessus Attack Scripting Language (NASL).
Plugins contain vulnerability information, a generic set of remediation actions, and the algorithm to
test for the presence of the security issue.
Nessus supports the Common Vulnerability Scoring System (CVSS) and supports both v2 and v3 values
simultaneously. If both CVSS2 and CVSS3 attributes are present, both scores are calculated. However
in determining the Risk Factor attribute, currently the CVSS2 scores take precedence.
Plugins also are utilized to obtain configuration information from authenticated hosts to leverage for
configuration audit purposes against security best practices.
To view plugin information, see a list of newest plugins, view all Nessus plugins, and search for specific
plugins, see the Nessus Plugins home page.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
By default, plugins are set for automatic updates and Nessus checks for updated components and plu-
gins every 24 hours.
During the Product Registration portion of the Browser Portion of the Nessus install, Nessus down-
loads all plugins and compiles them into an internal database.
You can also use the nessuscli fetch —register command to manually download plugins. For
more details, see the Command Line section of this guide.
Optionally, during the Registration portion of the Browser Portion of the Nessus install, you can
choose the Custom Settings link and provide a hostname or IP address to a server which hosts your
custom plugin feed.
You can also use the nessuscli update --plugins-only command to manually update plugins.
For more details, see the Command Line section of this guide.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Create a Limited Plugin Policy
1. In the top navigation bar, click Scans.
The list of plugin families appears, and by default, all of the plugin families are enabled.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
All the plugin families are disabled.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
8. For each plugin that you want to enable, click the Disabled button.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Tip: You can search for plugins and plugin families using the Search Plugin Families box in the upper
right corner.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Install Plugins Manually
You can manually update plugins on an offline Nessus system in two ways: the user interface or the
command line interface.
1. On the offline system running Nessus (A), in the top navigation bar, click Settings.
4. In the Manual Software Update dialog box, select Upload your own plugin archive, and then
select Continue.
5. Navigate to the compressed TAR file you downloaded, select it, then click Open.
2. Use the nessuscli update <tar.gz filename> command specific to your operating sys-
tem.
Platform Command
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Platform Command
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Plugin Rules
Plugin Rules allow you to hide or change the severity of any given plugin. In addition, rules can be lim-
ited to a specific host or specific time frame. From this page you can view, create, edit, and delete
your rules.
The Plugin Rules option provides a facility to create a set of rules that dictate the behavior of certain
plugins related to any scan performed. A rule can be based on the Host (or all hosts), Plugin ID, an
optional Expiration Date, and manipulation of Severity.
This allows you to re-prioritize the severity of plugin results to better account for your organization’s
security posture and response plan.
Severity: Low
This rule is created for scans performed on IP address 192.168.0.6. Once saved, this Plugin Rule
changes the default severity of plugin ID 79877 (CentOS 7 : rpm (CESA-2014:1976) to a severity of low
until 12/31/2016. After 12/31/2016, the results of plugin ID 79877 will return to its critical severity.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Create a Plugin Rule
1. In the top navigation bar, click Scans.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Modify a Plugin Rule
This procedure can be performed by a standard user or administrator.
3. On the plugin rules table, select the plugin rule that you want to modify.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Delete a Plugin Rule
This procedure can be performed by a standard user or administrator.
3. On the plugin rules table, in the row for the plugin that you want to modify, click the button.
A dialog box appears, confirming your selection to delete the plugin rule.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Sensors
In Nessus Manager, you can manage linked agents and scanners from the Sensors page.
l Filter Agents
l Export Agents
l Unlink an Agent
l Manage Clustering
l Link Nessus Scanner
l Unlink Nessus Scanner
l Remove a Scanner
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Agents
Agents increase scan flexibility by making it easy to scan assets without needing ongoing host cre-
dentials or assets that are offline. Additionally, agents enable large-scale concurrent scanning with
little network impact.
Once linked, an agent must be added to an agent group for use when configuring scans. Linked agents
will automatically download plugins from the manager upon connection. Agents are automatically
unlinked after a period of inactivity.
Note: Agents can take several minutes to download plugins, but it is required before an agent returns scan res-
ults.
l Filter Agents
l Export Agents
l Unlink an Agent
Agent Groups
Agent groups are used to organize and manage the agents linked to your scanner. Each agent can be
added to any number of groups and scans can be configured to use these groups as targets.
Note: Agent group names are case sensitive. When you link agents using System Center Configuration Manager
(SCCM) or the command line, you must use the correct case.
Freeze Windows
freeze windows allow you to schedule times where certain agent activities are suspended for all linked
agents.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Agent Clustering
With Nessus Manager clustering, you can deploy and manage large numbers of agents from a single
Nessus Manager instance.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Modify Agent Settings
Use this procedure to modify agent settings in Nessus Manager.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
c. Click Save.
l To modify agent freeze window settings, see Modify Freeze Window Settings.
4. Click Save.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
System-wide Agent Settings
On your agent's manager, you can configure system-wide agent settings to specify agent settings for
all your linked agents.
Option Description
Manage Agents
Track unlinked agents When this setting is enabled, agents that are unlinked are
preserved in the manager along with the corresponding
agent data. This option can also be set using the
nessuscli utility.
Unlink inactive agents after X days Specifies the number of days an agent can be inactive
before the manager unlinks the agent.
Remove agents that have been Specifies the number of days an agent can be inactive
inactive for X days before the manager removes the agent.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Modify Remote Agent Settings
All agent advanced settings can be set via the agent's command line interface, as described in
Advanced Settings in the Nessus Agent Deployment and User Guide. However, some settings can be
modified remotely via the agent's manager.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
2. In the linked agents table, click the row for the agent you want to modify.
4. In the settings table, click the remote setting you want to modify.
For setting and value descriptions, see Advanced Settings in the Nessus Agent Deployment and
User Guide.
l To save and immediately apply the setting to the agent, click Save and Apply.
Note: For some settings, applying the setting requires an agent soft (backend) restart or full service
restart.
l To save the setting but not yet apply settings to the agent, click the Save button.
Note: For the setting to take effect on the agent, you must apply the setting. In the banner that
appears, click Apply all changes now. For some settings, applying the setting requires an agent
soft (backend) restart or full service restart.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Filter Agents
Use this procedure to filter agents in Nessus Manager.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
3. Configure the filters as necessary. For more information, see Agent Filters.
4. Click Apply.
Nessus Manager filters the list of agents to include only those that match your configured
options.
Agent Filters
Parameter Operator Expression
IP Address is equal to In the text box, type the IPv4 or IPv6 addresses on which you
want to filter.
is not equal
to
contains
Last Con- earlier than In the text box, type the date on which you want to filter.
nection
later than
Last Plugin
on
Update
not on
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Parameter Operator Expression
Last Scanned
Member of is equal to From the drop-down list, select from your existing agent
Group groups.
is not equal
to
Name is equal to In the text box, type the agent name on which you want to fil-
ter.
is not equal
to
contains
Platform contains In the text box, type the platform name on which you want to
filter.
does not con-
tain
Status is equal to In the drop-down list, select an agent status. For more inform-
ation, see Agent Status in the Nessus Agent Deployment and
is not equal
User Guide.
to
Version is equal to In the text box, type the version you want to filter.
is not equal
to
contains
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Export Agents
3. (Optional) Click the Filter button to apply a filter to the agents list.
4. In the upper right corner, click Export. If a drop-down appears, click CSV.
The agents.csv file exported from Nessus Manager contains the following data:
Field Description
Status The status of the agent at the time of export. Possible values are unlinked,
online, or offline.
Last Plugin The date (in ISO-8601 format) the agent's plugin set was last updated.
Update
Last Scanned The date (in ISO-8601 format) the agent last performed a scan of the host.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Download Linked Agent Logs
As an administrator inNessus Manager, you can request and download a log file containing logs and
system configuration data from any of your managed scanners and agents. This information can help
you troubleshoot system problems, and also provides an easy way to gather data to submit to Tenable
Support.
You can store a maximum of five log files from each agent in Nessus Manager. Once the limit is
reached, you must remove an old log file to download a new one.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
2. In the agents table, click the agent for which you want to download logs.
Note: If you have reached the maximum of five log files, the Request Logs button is disabled. Remove an
existing log before downloading a new one.
Nessus Manager requests the logs from the agent the next time it checks in, which may take sev-
eral minutes. You can view the status of the request in the user interface until the download is
complete.
l In the row of the log you want to remove, click the button.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
l In the row of the pending or failed log download that you want to cancel, click the button.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Unlink an Agent
When you manually unlink an agent, the agent disappears from the Agents page, but the system
retains related data for the period of time specified in agent settings. When you manually unlink an
agent, the agent does not automatically relink to Nessus Manager.
Tip: You can configure agents to automatically unlink if they are inactive for a certain number of days, as
described in agent settings.
a. In the agents table, in the row for the agent that you want to unlink, click the but-
ton.
Note: For Nessus Manager 7.1.0 and earlier, in the row for the agent that you want to unlink,
click the button.
a. In the agents table, select the check box in each row for each agent you want to
unlink.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
To manually unlink agents in Tenable.io:
The Sensors page appears. By default, Nessus Scanners is selected in the left navigation menu
and the Cloud Scanners tab is active.
The Agents page appears and the Linked Agents tab is active.
5.
l In the agents table, select the check box next to each agent you want to restart.
l In the table header, select the check box to select the entire page.
Tip: In the action bar, select Select All Pages to select all linked agents.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Agent Groups
You can use agent groups to organize and manage the agents linked to your Nessus Manager. You can
add an agent to more than one group, and configure scans to use these groups as targets.
Tenable recommends that you size agent groups appropriately, particularly if you are managing scans
in Nessus Manager and then importing the scan data into Tenable.sc. You can size agent groups when
you manage agents in Nessus Manager.
The more agents that you scan and include in a single agent group, the more data that the manager
must process in a single batch. The size of the agent group determines the size of the .nessus file
that must be imported into Tenable.sc. The .nessus file size affects hard drive space and bandwidth.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Create a New Agent Group
You can use agent groups to organize and manage the agents linked to your account. You can add an
agent to more than one group, and configure scans to use these groups as targets.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
4. In the Name box, type a name for the new agent group.
5. Click Add.
Nessus Manager adds the agent group and it appears in the table.
What to do next:
l Configure user permissions for the agent group.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Configure User Permissions for an Agent Group
You can share an agent group with other users or user groups in your organization.
l No access — (Default user only) The user or user group cannot add the agent group to an agent
scan. If a user or user group with this permission attempts to launch an existing scan that uses
the agent group, the scan fails.
l Can use — The user or user group can add the agent group to an agent scan and can launch
existing scans that use the agent group.
Use this procedure to configure permissions for an agent group in Nessus Manager.
2. In the agent groups table, click the agent group for which you want to configure permissions.
Tip: Tenable recommends assigning permissions to user groups, rather than individual users, to minimize
maintenance as individual users leave or join your organization.
l
Add permissions for a new user or user group:
a. In the Add users or groups box, type the name of a user or group.
Tenable.io adds the user to the permissions list, with a default permission of Can
Use.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
l
Change the permissions for an existing user or user group:
Note: The Default user represents any users who have not been specifically added to the agent
group.
a. Next to the permission drop-down for the Default user, click the button.
c. Click Save.
l
Remove permissions for a user or user group:
l For the Default user, set the permissions to No Access.
l For any other user or user group, click the button next to the user or user group
for which you want to remove permissions.
5. Click Save.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Modify an Agent Group
Use this procedure to modify an agent group in Nessus Manager.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
l
Modify the group name.
a. In the row for the agent group that you want to modify, click the button.
b. In the Name box, type a new name for the agent group.
c. Click Save.
l
Add agents to the agent group.
a. In the agent groups table, click the agent group you want to modify.
b. In the upper-right corner of the page, click the Add Agents button.
The Add Agents window appears. This window contains a table of available agents.
c. (Optional) In the Search box, type the name of an agent, then click Enter.
The table of agents refreshes to display the agents that match your search criteria.
d. Click the check box next to each agent you want to add to the group.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
e. Click Add.
l
Remove agents from the agent group.
a. In the agent groups table, click the agent group you want to modify.
The agent group details page appears. By default, the Group Details tab is active.
l For multiple agents, select the check box next to each, then click the Remove
button in the upper-right corner of the page.
l
Modify the user permissions for the agent group.
a. In the agent groups table, click the agent group you want to modify.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Delete an Agent Group
Use this procedure to delete an agent group in Nessus Manager.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
3. In the row for the agent group that you want to delete, click the button.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Freeze Windows
Freeze windows allow you to schedule times where certain agent activities are suspended for all linked
agents. This activity includes:
You can configure a permanent freeze window and global settings for how freeze windows work for
linked agents. To configure global freeze window settings, see Modify Freeze Window Settings.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Create a Freeze Window
Freeze windows allow you to schedule times where certain agent activities are suspended for all
linked agents. This activity includes:
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
5. Click Save.
The freeze window goes into effect and appears on the Freeze Windows tab.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Modify a Freeze Window
Use this procedure to modify a freeze window in Nessus Manager.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
3. In the freeze windows table, click the freeze window you want to modify.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Delete a Freeze Window
Use this procedure to delete a freeze window in Nessus Manager.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
3. In the freeze window table, in the row for the freeze window that you want to delete, click the
button.
A dialog box appears, confirming your selection to delete the freeze window.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Modify Global Freeze Window Settings
In Nessus Manager, you can configure a permanent freeze window and global settings for how freeze
windows work on linked agents.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
Freeze Windows
Enforce a per- When enabled, Nessus Manager prevents agents from updating soft-
manent freeze win- ware. The following freeze window settings also apply during this
dow schedule window.
Prevent software When enabled, agents do not receive software updates during
updates scheduled freeze windows.
Prevent plugin When enabled, agents do not receive plugin updates during sched-
updates uled freeze windows.
Prevent agent scans When enabled, the system does not run agent scans during sched-
uled freeze windows.
5. Click Save.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Clustering
With Nessus Manager clustering, you can deploy and manage large numbers of agents from a single
Nessus Manager instance. For Tenable.sc users with over 10,000 agents and up to 200,000 agents, you
can manage your agent scans from a single Nessus Manager, rather than needing to link multiple
instances of Nessus Manager to Tenable.sc.
A Nessus Manager instance with clustering enabled acts as a parent node to child nodes, each of which
manage a smaller number of agents. Once a Nessus Manager instance becomes a parent node, it no
longer manages agents directly. Instead, it acts as a single point of access where you can manage
scan policies and schedules for all the agents across the child nodes. With clustering, you can scale
your deployment size more easily than if you had to manage several different Nessus Manager
instances separately.
You are a Tenable.sc user who wants to deploy 100,000 agents, managed by Nessus Manager.
Without clustering, you deploy 10 Nessus Manager instances, each supporting 10,000 agents. You must
manually manage each Nessus Manager instance separately, such as setting agent scan policies and
schedules, and updating your software versions. You must separately link each Nessus Manager
instance to Tenable.sc.
With clustering, you use one Nessus Manager instance to manage 100,000 agents. You enable clus-
tering on Nessus Manager, which turns it into a parent node, a management point for child nodes. You
link 10 child nodes, each of which manages around 10,000 agents. You can either link new agents or
migrate existing agents to the cluster. The child nodes receive agent scan policy, schedule, and plugin
and software updates from the parent node. You link only the Nessus Manager parent node to Ten-
able.sc.
Definitions
Parent node — The Nessus Manager instance with clustering enabled, which child nodes link to.
Child node — A Nessus instance that acts as a node that Nessus Agents connect to.
Nessus Manager cluster — A parent node, its child nodes, and associated agents.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
l Clustering System Requirements
l Enable Clustering
l Link a Node
l Rebalance Nodes
l Delete a Node
l Cluster Groups
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Clustering System Requirements
The following are system requirements for the parent node and child nodes. These estimations
assume that the KB and audit trail settings are disabled. If those settings are enabled, the size required
can significantly increase.
l Disk: Estimated minimum of 5 GB per 5000 agents per scan per day
l CPU: 2 cores
l RAM: 8 GB
l CPU: 2 cores
l RAM: 8 GB
l CPU: 4 cores
l RAM: 16 GB
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Agents
l Linked agents must be on software version 7.4.0 or later.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Enable Clustering
When you enable clustering on Nessus Manager it becomes a parent node. You can then link child
nodes, each of which manages Nessus Agents. Once you enable clustering on a parent node, you can-
not undo the action and turn Nessus Manager into a regular scanner or Nessus Agent manager.
Note: To enable Nessus Manager clustering in Nessus 8.5.x or 8.6.x, you must contact your Tenable rep-
resentative. In Nessus Manager 8.7.x and later, you can enable clustering using the following procedure.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
The Cluster Setup page appears and displays the Settings tab.
Caution: Once you enable clustering on a parent node, you cannot undo the action and turn Nessus Man-
ager into a regular scanner or Nessus Agent manager.
4. Click Save.
What to do next:
l Link child nodes to the parent node.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Migrate Agents to a Cluster
If you have a non-clustered instance of Nessus Manager with linked agents, you can migrate the linked
agents to an existing cluster. After the agents successfully migrate to the cluster, the agents are then
unlinked from their original Nessus Manager. Any agents that did not successfully migrate remain
linked to the original Nessus Manager. The original Nessus Manager remains as a Nessus Manager
instance and does not become part of the cluster.
l Get the linking key from the Nessus Manager parent node for the cluster you want the agents to
migrate to.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
The Cluster Setup page appears and displays the Settings tab.
l Parent Node Hostname — Type the hostname or IP address of the Nessus Manager parent
node of the cluster to which you are migrating.
l Parent Node Port — Type the port for the specified parent node host. The default is 8834.
l Parent Node Linking Key — Paste or type the linking key that you copied from the Nessus
Manager parent node, as described in Get Linking Key from Parent Node.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
l Enable Agent Migration — Select this check box to migrate agents to the cluster. Disable
the check box to stop migrating agents, if agents are currently in the process of migrating.
6. Click Save.
Nessus Manager begins or stops migrating agents to the cluster, depending on whether you have
selected Enable Agent Migration.
What to do next:
l Log in to the Nessus Manager parent node to manage linked Nessus Agents.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Manage Nodes
To manage cluster nodes, see the following:
l Link a Node
l Rebalance Nodes
l Delete a Node
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Get Linking Key from Parent Node
You need the linking key from the cluster parent node to link child nodes or migrate agents to the
cluster.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
What to do next:
l Link a child node to the cluster.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Link a Node
To link a child node to a cluster, you install an instance of Nessus as a cluster child node, then con-
figure the node to link to the parent node of the cluster.
Note: If cluster child nodes have automatic software updates disabled, you must manually update them to Nes-
sus 8.12 in order to use agent cluster groups. If cluster child nodes have automatic software updates enabled,
nodes can take up to 24 hours to update. To ensure correct linking and configuration, wait for all child nodes to
update to Nessus 8.12 prior to configuring custom cluster groups.
1. Install Nessus as described in the appropriate Install Nessus procedure for your operating sys-
tem.
3. Click Continue.
4. From the Managed by drop-down box, select Nessus Manager (Cluster Node).
5. Click Continue.
6. Create a Nessus administrator user account, which you use to log in to Nessus:
7. Click Submit.
Nessus finishes the configuration process, which may take several minutes.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
1. In the Nessus child node, use the administrator user account you created during initial con-
figuration to sign in to Nessus.
The Agents page appears. By default, the Node Settings tab is open.
l Node Name — Type a unique name that is used to identify this Nessus child node on the
parent node.
l (Optional) Node Host — Type the hostname or IP address that Nessus Agents should use to
access the child node.
l Cluster Linking Key — Paste or type the linking key that you copied from the Nessus Man-
ager parent node.
l Parent Node Host — Type the hostname or IP address of the Nessus Manager parent node
to which you are linking.
l Parent Node Port — Type the port for the specified host. The default is 8834.
l (Optional) Use Proxy — Select the check box if you want to connect to the parent node via
the proxy settings set in Proxy Server.
5. Click Save.
The Nessus child node links to the parent node. Nessus logs you out of the user interface and the
user interface is disabled.
What to do next:
l Log in to the Nessus Manager parent node to manage linked Nessus Agents and nodes.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
l On the Nessus Manager parent node, manage cluster groups to organize your nodes into groups
that conform to your network topology. By default, the node is assigned to the default cluster
group.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
View or Edit a Node
On Nessus Manager with clustering enabled, you can view the list of child nodes currently linked to the
parent node. These child nodes are assigned to cluster groups. You can view details for a specific
node, such as its status, IP address, number of linked agents, software information, and plugin set. If
agents on the node are currently running a scan, a scan progress bar appears.
You can edit a node's name or the maximum number of agents that can be linked to the child node.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
3. In the cluster groups table, click the row of a cluster group that contains child nodes.
5. In the Node Details tab, view detailed information for the selected node.
c. Click Save.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
l Node Name — Type a unique name to identify the node.
l Max Agents — Type the maximum number of agents that can be linked to the child node.
The default value is 10000 and the maximum value is 20000.
9. Click Save.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Enable or Disable a Node
If you disable a child node, its linked Nessus Agents relink to another available child node in the same
cluster group. If you re-enable a child node, Nessus Agents may become unevenly distributed, at which
point you can choose to Rebalance Nodes.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
3. In the cluster groups table, click the row of a cluster group that contains child nodes.
l To disable a node:
l To enable a node:
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Rebalance Nodes
Nessus Agents may become unevenly distributed across child nodes for a number of reasons. For
example, when a child node is temporarily unavailable, was disabled, was deleted, or was recently
added. When the imbalance passes a certain threshold, Nessus Manager gives you the option to rebal-
ance child nodes.
When you rebalance child nodes, Nessus Agents get redistributed more evenly across child nodes
within a cluster group. Nessus Agents unlink from an overloaded child node and relink to a child node
with more availability.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
Nessus Manager rebalances the Nessus Agent distribution across child nodes.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Delete a Node
When you delete a child node, linked Nessus Agents eventually relink to another available child node in
the same cluster group. The agents may take longer to relink if you delete a node compared to if you
disable the node instead.
If the node you want to delete is the last node in a cluster group with linked agents, you must first
move those agents to a different cluster group. If you only want to temporarily disable a child node,
see Enable or Disable a Node.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
3. In the cluster groups table, click the row of a cluster group that contains child nodes.
4. In the row of the child node you want to delete, click the button.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Cluster Groups
Clusters are divided into cluster groups that allow you to deploy and link agents in a way that conforms
to your network topology. For example, you could create cluster groups for different regions of where
your nodes and agents are physically located, which could minimize network traffic and control where
your agents' connections occur.
Cluster child nodes must belong to a cluster group, and can only belong to one cluster group at a time.
Agents in each cluster group only link to nodes in the same cluster group.
A cluster group is different from an agent group, which is a group of agents that you designate to scan
a target. Cluster groups are used to manage the nodes that agents link to within a cluster.
Note: If cluster child nodes have automatic software updates disabled, you must manually update them to Nes-
sus 8.12 in order to use agent cluster groups. If cluster child nodes have automatic software updates enabled,
nodes can take up to 24 hours to update. To ensure correct linking and configuration, wait for all child nodes to
update to Nessus 8.12 prior to configuring custom cluster groups.
To manage your cluster groups and their assigned nodes and agents, see the following:
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Create a Cluster Group
By default, new nodes and agents are assigned to the default cluster group. You can create cluster
groups that conform to your network topology. For example, you could create cluster groups for dif-
ferent regions of where your nodes and agents are physically located, which could minimize network
traffic and control where your agents' connections occur.
A cluster group is different from an agent group, which is a group of agents that you designate to scan
a target. Cluster groups are used to manage the nodes that agents link to within a cluster.
Note: If cluster child nodes have automatic software updates disabled, you must manually update them to Nes-
sus 8.12 in order to use agent cluster groups. If cluster child nodes have automatic software updates enabled,
nodes can take up to 24 hours to update. To ensure correct linking and configuration, wait for all child nodes to
update to Nessus 8.12 prior to configuring custom cluster groups.
5. Click Add.
What to do next:
l Add a Node to a Cluster Group
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Add a Node to a Cluster Group
By default, new linked nodes are assigned to the default cluster group. You can manually add a node to
a different cluster group; for example, you could add nodes that are in a similar location to the same
cluster group. A node can only belong to one cluster group at a time.
When you move a node that belonged to another cluster group, any agents that were linked to that
node remain in their original cluster group and relink to another node in the original cluster group.
Note: If cluster child nodes have automatic software updates disabled, you must manually update them to Nes-
sus 8.12 in order to use agent cluster groups. If cluster child nodes have automatic software updates enabled,
nodes can take up to 24 hours to update. To ensure correct linking and configuration, wait for all child nodes to
update to Nessus 8.12 prior to configuring custom cluster groups.
l If you want to add a node to a cluster group other than the default cluster group, first Create a
Cluster Group.
3. In the cluster groups table, click the row of the cluster group to which you want to add a node.
The cluster group details page appears and displays the Cluster Nodes tab by default.
The Add Nodes window appears and displays available nodes to be added.
6. In the nodes table, select the check box next to each node you want to add.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Note: A node can only belong to one cluster group at a time. When you move a node that belonged to
another cluster group, any agents that were linked to that node remain in their original cluster group and
relink to another node in the original cluster group.
7. Click Add.
What to do next:
l Add an Agent to a Cluster Group
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Add an Agent to a Cluster Group
By default, new agents are assigned to the default cluster group. You can manually add agents to a dif-
ferent cluster group; for example, you could add agents that are in a similar location to the same
cluster group. An agent can only belong to one cluster group at a time.
When you add an agent to a cluster group, the agent relinks to an available node in the cluster group.
l Ensure the cluster group you want to add an agent to has at least one node, as described in Add
a Node to a Cluster Group.
3. In the cluster groups table, click the row of the cluster group to which you want to add an agent.
The cluster group details page appears and displays the Cluster Nodes tab by default.
The Add Agents window appears and displays available agents to be added.
7. In the agents table, select the check box next to each agent you want to add.
Note: Agents can only belong to one cluster group at a time. If you move the agent to a different group, it
relinks to an available node in the new cluster group.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
8. Click Add.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Move an Agent to a Cluster Group
By default, new agents are assigned to the default cluster group. You can manually add agents to a dif-
ferent cluster group; for example, you could add agents that are in a similar location to the same
cluster group. An agent can only belong to one cluster group at a time.
When you move an agent to a cluster group, the agent relinks to an available node in the cluster group.
There may be a mismatch in the number of agents listed for the cluster group and actual usage when
an agent is moving or relinking.
l Ensure the cluster group you want to add an agent to has at least one node, as described in Add
a Node to a Cluster Group.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
4. In the cluster groups table, click the row of the cluster group that contains the agent you want to
move.
The cluster group details page appears and displays the Cluster Nodes tab by default.
6. In the agents table, select the check box for each agent that you want to move to a different
cluster group.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
7. In the upper-right corner, click Move.
8. In the drop-down box, select the cluster group to which you want to move the agent.
Note: Agents can only belong to one cluster group at a time. If you move the agent to a different group, it
relinks to an available node in the new cluster group.
9. Click Move.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Move a Node to a Cluster Group
By default, new linked nodes are assigned to the default cluster group. You can manually add a node to
a different cluster group; for example, you could add nodes that are in a similar location to the same
cluster group. A node can only belong to one cluster group at a time.
When you move a node that belonged to another cluster group, any agents that were linked to that
node remain in their original cluster group and relink to another node in the original cluster group.
l If you want to move a node to a cluster group other than the default cluster group, first Create a
Cluster Group.
3. In the cluster groups table, click the row of the cluster group that contains the agent you want to
move.
The cluster group details page appears and displays the Cluster Nodes tab by default.
4. In the cluster nodes table, select the check box for each node that you want to move to a dif-
ferent cluster group.
Note: If there are agents assigned to the cluster group, you must leave at least one node in the cluster
group.
6. In the drop-down box, select the cluster group to which you want to move the node.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Note: A node can only belong to one cluster group at a time. When you move a node that belonged to
another cluster group, any agents that were linked to that node remain in their original cluster group and
relink to another node in the original cluster group.
7. Click Move.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Modify a Cluster Group
You can edit a cluster group name or set a cluster group as the default cluster group. New linked
nodes are automatically assigned to the default cluster group.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
4. In the cluster groups table, in the row of the cluster group you want to modify, click the button.
l Set as Default — To set this cluster group as the default cluster group that new linked
nodes are added to, select the check box.
6. Click Save.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Delete a Cluster Group
You can delete a cluster group that does not have any assigned nodes or agents. You cannot delete the
default cluster group. To change the default cluster group, see Modify a Cluster Group.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
4. In the cluster groups table, in the row of the cluster group you want to delete, click the button.
5. To confirm that you want to delete the cluster group, click Delete.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Scanners
In Nessus Manager, you can view the instance's linking key and a list of linked remote scanners. You
can click on a linked scanner to view details about that scanner.
Scanners are identified by scanner type and indicate if the scanner has Shared permissions.
Remote scanners can be linked to Nessus Manager with the Linking Key or valid account credentials.
Once linked, scanners can be managed locally and selected when configuring scans.
l Link Nessus Scanner
l Unlink Nessus Scanner
l Remove a Scanner
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Link Nessus Scanner
To link your Nessus scanner during initial installation, see Configure Nessus.
If you choose not to link the scanner during initial installation, you can link Nessus scanner later. You
can link a Nessus scanner to a manager such as Nessus Manager or Tenable.io.
Note: You cannot link to Tenable.sc from the user interface after initial installation. If your scanner is already
linked to Tenable.sc, you can unlink and then link the scanner to Tenable.io or Nessus Manager, but you cannot
relink to Tenable.sc from the interface.
1. In the user interface of the manager you want to link to, copy the Linking Key, found on the fol-
lowing page:
2. In the Nessus scanner you want to link, in the top navigation bar, click Settings.
4. Fill out the linking settings for your manager as described in Remote Link.
5. Click Save.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Unlink Nessus Scanner
You can unlink your Nessus scanner from a manager so that you can relink it to another manager.
Note: You cannot link to Tenable.sc from the user interface after initial installation. If your scanner is already
linked to Tenable.sc, you can unlink and then link the scanner to Tenable.io or Nessus Manager, but you cannot
relink to Tenable.sc from the interface.
1. In the Nessus scanner you want to unlink, in the top navigation bar, click Settings.
4. Click Save.
What to do next
l If you unlinked Nessus from Tenable.sc, delete the scanner from Tenable.sc.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Enable or Disable a Scanner
This procedure can be performed by a standard user or administrator in Nessus Manager.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
3. In the scanners table, in the row for the scanner that you want to enable, hover over the but-
ton, which becomes .
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
3. In the scanners table, in the row for the scanner that you want to disable, hover over the but-
ton, which becomes .
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Remove a Scanner
This procedure can be performed by an administrator in Nessus Manager.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
l In the scanners table, in the row for the scanner that you want to remove, click the
button.
a. In the scanners table, select the check box in the row for each scanner that you want
to remove.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Download Managed Scanner Logs
As an administrator in Nessus Manager, you can request and download a log file containing logs and
system configuration data from any of your managed scanners and Nessus Agents. This information
can help you troubleshoot system problems, and also provides an easy way to gather data to submit to
Tenable Support.
You can store a maximum of five log files from each managed scanner in Nessus Manager. Once the
limit is reached, you must remove an old log file to download a new one.
Note: You can only request logs from Nessus scanners running 8.1 and later.
The Linked Agents page appears. By default, Linked Agents is selected in the left navigation
menu and the Linked Agents tab is active.
The Scanners page appears and displays the linked scanners table.
3. In the linked scanners table, click the scanner for which you want to download logs.
Note: If you have reached the maximum of five log files, the Request Logs button is disabled. Remove an
existing log before downloading a new one.
Nessus Manager requests the logs from the managed scanner the next time it checks in, which
may take several minutes. You can view the status of the request in the user interface until the
download is complete.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
l In the row of the log you want to remove, click the button.
l In the row of the pending or failed log download that you want to cancel, click the button.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Settings
l About
l Advanced
l Proxy Server
l Remote Link
l SMTP Server
l Custom CA
l My Account
l Users
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
About
The About page displays an overview of Nessus licensing and plugin information. When you access
the product settings, the About page appears. By default, Nessus displays the Overview tab, which
contains information about your Nessus instance, as described in the Overview table.
On the Software Update tab, you can set your automatic software update preferences or manually
update Nessus software.
Basic users cannot view the Software Update or Encryption Password tabs. Standard users can only
view the product version and basic information about the current plugin set.
To download logs, click the Download Logs button in the upper-right corner of the page. For more
information, see Download Logs.
Overview
Value Description
Nessus Professional
Last Updated The date on which the plugin set was last refreshed.
Note: For Nessus Professional 8.5 and later, you cannot run scans or download new plu-
gins after your license expires. You can still access your system and scan reports for 30
days after expiration.
Policy Tem- The ID of the current version of the policy template set.
plate Version
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Value Description
Nessus Manager
Licensed The number of hosts you can scan, depending on your license.
Hosts
Licensed The number of scanners that you have licensed that are currently in use.
Scanners
Licensed The number of agents that you have licensed that are currently in use.
Agents
Last Updated The date on which the plugin set was last refreshed.
Policy Tem- The ID of the current version of the policy template set.
plate Version
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Set an Encryption Password
If you set an encryption password, Nessus encrypts all policies, scans results, and scan configurations.
You must enter the password when Nessus restarts.
Caution: If you lose your encryption password, it cannot be recovered by an administrator or Tenable Support.
l Linux:
/opt/nessus/sbin/nessusd --set-encryption-passwd
l Windows:
l macOS:
/Library/Nessus/run/sbin/nessusd --set-encryption-passwd
3.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
4. When prompted, type a new password.
/opt/nessus/sbin/nessusd --set-encryption-passwd
New password :
Again :
New password is set
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Advanced Debugging - Packet Capture
When working with Tenable Nessus to understand scanner results, it may be necessary to understand
the communications between a scanner and the host that was scanned. When this occurs, Tenable
support may request a capture of network traffic between the scanner and the target host. Nessus
now supports the ability to generate and download such a capture through the Nessus user interface.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
5. Click General.
6. Scroll to the bottom of the General settings window and set Packet Capture to ON.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
7. In the Target to capture field, enter the IP address or hostname of a single host.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
9. Click the Save button.
After the scan is complete, a compressed archive containing the packet capture will be available for
download.
The Debug Logs window will show a list of packet captures. For example, pcap_SCANNAME_
SCANID.tar.gz.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Advanced Settings
The Advanced Settings page allows you to manually configure Nessus. You can configure advanced
settings from the Nessus user interface, or from the command line interface. Nessus validates your
input values to ensure only valid configurations are allowed.
l User Interface
l Scanning
l Logging
l Performance
l Security
l Cluster
l Miscellaneous
l Custom
Details
l Advanced settings apply globally across your Nessus instance.
l To configure advanced settings, you must use a Nessus administrator user account.
l Not all advanced settings are automatically populated in the Nessus interface.
l Settings that require restarting Nessus for the change to apply are indicated by the icon in
the user interface.
User Interface
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Setting Identifier Description Default Valid Values
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Setting Identifier Description Default Valid Values
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Setting Identifier Description Default Valid Values
nerabilities in a
group have the
same severity.
When disabled,
Nessus displays
the highest sever-
ity indicator of a
vulnerability in a
group
Scanning
Valid
Setting Identifier Description Default
Values
Audit audit_ Controls verbosity of the plugin audit trail. Full full full,
Trail Verb- trail audit trails include the reason why plugins par-
osity were not included in the scan. tial,
none
Auto auto_ Automatically activates the plugins that are yes yes or
Enable enable_ depended on. If disabled, not all plugins may no
Plugin depend- run despite being selected in a scan policy.
Depend- encies
encies
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Valid
Setting Identifier Description Default
Values
CGI Paths cgi_path A colon-delimited list of CGI paths to use for /cgi- String
for Web web server scans. bin:/scr-
Scans ipts
Max Plu- plugin_ The maximum size, in kilobytes (KB), of plugin 1000 Integer-
gin Out- output_ output to be included in exported scan results s.
put Size max_ with the .nessus format. If the output
If set to
size_kb exceeds the maximum size, it is truncated in
0, no
the report.
limit is
enforc-
ed.
Nessus rules Location of the Nessus rules file (nes- Nessus String
Rules File susd.rules). config
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Valid
Setting Identifier Description Default
Values
Location The following are the defaults for each oper- dir-
ating system: ectory
for your
Linux:
oper-
/opt/nessus/etc/nessus/nessusd.rules ating
Mac OS X: system
/Library/Nes-
sus/run-
/var/nessus/conf/nessusd.rules
Windows:
C:\Pro-
gramData\Ten-
able\Nes-
sus\nessus\conf\nessusd.rules
Non-Sim- non_sim- Specifies ports against which two plugins can- 139, 445, String
ultaneous ult_ports not not be run simultaneously. 3389
Ports
PCAP pcap.sna- The snapshot size used for packet capture; the 0 Integer-
Snapshot plen maximum size of a captured network packet. s 0-
Length Typically, this value is automatically set based 262144
on the scanner's NIC. However, depending on
your network configuration, packets may be
truncated, resulting in the following message
in your scan report: "The current snapshot
length of ### for interface X is too small." You
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Valid
Setting Identifier Description Default
Values
Port port_ The default range of ports that the scanner plu- defaul- defau-
Range range gins probe. t lt,
all, a
range
of
ports, a
comm-
a-sep-
arated
list of
ports
and/or
port
ranges.
Specify
UDP
and
TCP
ports
by pre-
fixing
each
range
by T:
or U:.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Valid
Setting Identifier Description Default
Values
Safe safe_ When enabled, Nessus uses safe checks, yes yes or
Checks checks which use banner grabbing rather than active no
testing for a vulnerability.
Silent Plu- silent_ When enabled, the list of plugin dependencies yes yes or
gin depend- and their output are not included in the report. no
Depend- encies A plugin may be selected as part of a policy
encies that depends on other plugins to run. By
default, Nessus runs those plugin depend-
encies, but does not include their output in the
report. When disabled, Nessus includes both
the selected plugin and any plugin depend-
encies in the report.
Slice Net- slice_net- If this option is set, Nessus does not scan a no yes or
work work_ network incrementally (10.0.0.1, then 10.0.0.2, no
Addresse- addresse- then 10.0.0.3, and so on) but attempts to slice
s s the workload throughout the whole network
(e.g., it scans 10.0.0.1, then 10.0.0.127, then
10.0.0.2, then 10.0.0.128, and so on).
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Valid
Setting Identifier Description Default
Values
Logging
Defau- Valid Val-
Setting Identifier Description
lt ues
Log log_ When enabled, scan logs include the user no yes or no
Addi- details name, scan name, and current plugin name in
tional addition to the base information. You may not
Scan see these additional details unless log_
Details whole_attack is also enabled.
Log log_ Logs verbose details of the scan. Helpful for no yes or no
Verbose whole_ debugging issues with the scan, but this may
Scan attack be disk intensive. To add additional details,
Details enable log_details.
/op- oper-
t/nes- ating
sus/var/nessus/logs/nessusd.dump sys-
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Defau- Valid Val-
Setting Identifier Description
lt ues
Mac OS X: tem
/Library/Nes-
sus/run-
/var/nessus/logs/nessusd.dump
Windows:
C:\Pro-
gramData\Ten-
able\Nes-
sus\nessus\logs\nessusd.dump
Nessus nasl_log_ The type of NASL engine output in nes- nor- normal,
Dump type susd.dump. mal none,
File Log trace, or
Level full.
Nessus dumpfile_ The maximum size of the nessusd.dump files 512 Integers 1-
Dump max_size in megabytes. If file size exceeds the max- 2048
File imum size, a new dump file is created.
Max
Size
Nessus backend_ The logging level of the backend.log log file, nor- l nor-
Log log_level as indicated by a set of log tags that determ- mal mal
Level ine what information to include in the log. —
sets
If you manually edited log.json to set a cus-
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Defau- Valid Val-
Setting Identifier Description
lt ues
debu-
g—
sets
log
tags
to
"lo-
g",
"inf-
o",
"war-
n",
"err-
or",
"tra-
ce",
"deb-
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Defau- Valid Val-
Setting Identifier Description
lt ues
ug"
l verb-
ose
—
sets
log
tags
to
"lo-
g",
"inf-
o",
"war-
n",
"err-
or",
"tra-
ce",
"deb-
ug",
"ver-
bos-
e"
Nessus logfile Location where the Nessus scanner log file is Nes- String
Scan- stored. sus
ner Log log dir-
The following are the defaults for each oper-
Loca- ectory
ating system:
tion for
Linux: your
/op- oper-
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Defau- Valid Val-
Setting Identifier Description
lt ues
t/nes- ating
sus/var/- sys-
nessus/logs/nessusd.messages tem
Mac OS X:
/Library/Nes-
sus/run-
/var/nessus/logs/nessusd.messages
Windows:
C:\Pro-
gramData\Ten-
able\Nes-
sus\nessus\logs\nessusd.messages
Note:
Includ-
ing plu-
gin
metrics
greatly
increase-
s the
size of
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Defau- Valid Val-
Setting Identifier Description
lt ues
the log
file. Nes-
sus does
not auto-
mat-
ically
clean up
log files.
Log File logfile_rot If set to daily or time, indicates that Nessus None daily or
Rota- logs are rotated daily. When left undefined, time
tion log rotation is based upon size.
Performance
Valid Val-
Setting Identifier Description Default
ues
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Valid Val-
Setting Identifier Description Default
ues
NORMAL is faster,
with some risk of
data loss during
unexpected system
shutdowns (for
example, during a
power outage or
crash).
Engine Thread Pool thread_pool_size The size of the pool 200 Integers 0-
Size of threads avail- 500
able for use by the
scan engine. Asyn-
chronous tasks can
be deferred to
these threads, and
this value controls
the maximum num-
ber of threads to
be created.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Valid Val-
Setting Identifier Description Default
ues
50000 for
other oper-
ating
systems
(e.g., Win-
dows
Server
2016).
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Valid Val-
Setting Identifier Description Default
ues
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Valid Val-
Setting Identifier Description Default
ues
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Valid Val-
Setting Identifier Description Default
ues
being scanned.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Valid Val-
Setting Identifier Description Default
ues
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Valid Val-
Setting Identifier Description Default
ues
ning on a ded-
icated server, set-
ting this to high
uses more memory
to increase per-
formance. If Nes-
sus is running on a
shared machine,
settings this to low
uses considerably
less memory, but
has a moderate per-
formance impact.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Valid Val-
Setting Identifier Description Default
ues
Security
Setting Identifer Description Default Valid Values
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Setting Identifer Description Default Valid Values
l modern - A list of
the latest and
most secure
ciphers. May not
be compatible
with older
browsers, such as
Internet Explorer
11.
l custom - A cus-
tom OpenSSL
cipher list. For
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Setting Identifer Description Default Valid Values
more information
on valid cipher
list formats, see
the OpenSSL doc-
umentation.
l niap - A list of
ciphers that con-
forms to NIAP
standards.
ECDHE-RSA-
AES128-
SHA256:ECDH-
E-RSA-
AES128-GCM-
SHA256:ECDH-
E-RSA-
AES256-
SHA384:ECDH-
E-RSA-
AES256-GCM-
SHA384
l tls_1_1 - TLS
v1.1+.
l tls_1_2 - TLS
v1.2+.
l niap - TLS v1.2
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Agents & Scanners
Note: The following settings are only available in Nessus Manager.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Name Setting Description Default Valid Values
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Name Setting Description Default Valid Values
If this setting is
set to false, the
Audit Trail Verb-
osity setting in
an individual
scan or policy
defaults to No
audit trail.
If this setting is
set to false, the
Include the KB
setting in an indi-
vidual scan or
policy defaults to
Exclude KB.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Name Setting Description Default Valid Values
on the envir-
onment, this can
somewhat
improve pro-
cessing per-
formance, but
also introduces a
small risk of a
corrupted scan
result in the
event of a crash.
For more details,
refer to the sql-
ite3 doc-
umentation.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Name Setting Description Default Valid Values
Cluster
Note: The following settings are only available in Nessus Manager with clustering enabled.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Setting Identifier Description Default Valid Values
an existing agent in a
cluster.
Agent Clus- agent_ Scans will be aborted after 3600 Integers > 299
tering Scan cluster_ running this many seconds
Cutoff scan_cutoff without a child node
update.
Miscellaneous
Valid Val-
Setting Identifier Description Default
ues
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Valid Val-
Setting Identifier Description Default
ues
Nessus dbg_port The port on which nessusd listens for None String in
Debug ndbg client connections. If left empty, no one of the
Port debug port is established. following
formats:
port or loc-
alhost:port
or ip:port
Nessus config_ Location of the configuration file that con- Nessus String
Prefer- file tains the engine preference settings. data-
ences base dir-
The following are the defaults for each
Database ectory
operating system:
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Valid Val-
Setting Identifier Description Default
ues
/Library/Nes-
sus/run-
/etc/nessus/conf/nessusd.db
Windows:
C:\Pro-
gramData\Ten-
able\Nessus\conf\nessusd.db
Non-User report_ The age threshold (in days) for removing 30 Integers >
Scan Res- cleanup_ old system-user scan reports. 0
ult threshol-
Cleanup d_days
Threshold
Path to path_to_ Custom path to Java for PDF exports. If None String
Java java not set, Nessus uses the system path.
Must be an
absolute
file path.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Valid Val-
Setting Identifier Description Default
ues
Scan source_ Source IPs to use when running on a multi- None IP address
Source IP ip homed host. If multiple IPs are provided, or
(s) Nessus will cycle through them whenever it comma-
performs a new connection. separated
list of
IP address-
es.
Send Tele- send_ When enabled, Nessus periodically and yes yes or no
metry telemetry securely sends non-confidential product
usage data to Tenable.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Valid Val-
Setting Identifier Description Default
ues
User Scan scan_his- The number of days after which scan his- 0 0 or
Result tory_ tory and data for completed scans is per- integers
Deletion expir- manently deleted. larger than
Threshold ation_ or equal to
days 3.
If set to 0,
all history
is
retained.
Custom
Not all advanced settings are populated in the Nessus user interface, but some settings can be set in
the command line interface. If you create a custom setting, it appears in the Custom tab.
The following table lists available advanced settings that are not listed by default in the Nessus user
interface but can still be configured.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Identifier Description Default Valid Values
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Identifier Description Default Valid Values
timeout.<plugin ID> Enter the plugin ID in place of <plu- None Integers 0-86400
gin ID>. The maximum time, in
seconds, that plugin <pluginID> is
permitted to run before Nessus
stops it. If set for a plugin, this value
supersedes plugins_timeout.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Create a New Setting
1. In Nessus, in the top navigation bar, click Settings.
4. In the Name box, type the key for the new setting.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Modify a Setting
1. In the top navigation bar, click Settings.
3. In the settings table, click the row for the setting you want to modify.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Delete a Setting
1. In Nessus, in the top navigation bar, click Settings.
3. In the settings table, in the row for the setting you want to delete, click the button.
4. Click Delete.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
LDAP Server
In Nessus Manager, the LDAP Server page displays options that allow you to configure a Lightweight
Directory Access Protocol (LDAP) server to import users from your directory.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Configure an LDAP Server
1. In Nessus Manager, in the top navigation bar, click Settings.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Proxy Server
The Proxy Server page displays options that allow you to configure a proxy server. If the proxy you
use filters specific HTTP user agents, you can type a custom user-agent string in the User-Agent box.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Configure a Proxy Server
1. In Nessus, in the top navigation bar, click Settings.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Remote Link
The Remote Link page displays options that allow you to link your Nessus scanner to a licensed Nes-
sus Manager or Tenable.io.
Note: You cannot link to Tenable.sc from the user interface after initial installation. If your scanner is already
linked to Tenable.sc, you can unlink and then link the scanner to Tenable.io or Nessus Manager, but you cannot
relink to Tenable.sc from the interface.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Option Set To
Scanner The name you want to use for this Nessus scanner.
Name
Manager The static IP address or hostname of the Nessus Manager instance you want to
Host link to.
Use Proxy Select or deselect the check box depending on your proxy settings. If you
select Use Proxy, you must also configure:
Link to Tenable.io
Scanner cloud.tenable.com
Name
Linking Key The key specific to your instance of Tenable.io. The key looks something like
the following string:
2d38435603c5b59a4526d39640655c3288b00324097a08f7a93e5480940d1cae
Use Proxy Select or deselect the check box depending on your proxy settings. If you
select Use Proxy, you must also configure:
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Option Set To
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
SMTP Server
The SMTP Server page displays options that allow you to configure a Simple Mail Transfer Protocol
(SMTP) server. When you configure an SMTP server, Nessus emails scan results to the list of recipients
that you specify.
Note: To configure an SMTP server for Nessus, you must have an HTML compatible email client.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Configure an SMTP Server
1. In Nessus, in the top navigation bar, click Settings.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Custom CA
The Custom CA page displays a text box that you can use to upload a custom certificate authority (CA)
in Nessus. For more information, see Certificates and Certificate Authorities.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Upgrade Assistant
You can upgrade data from Nessus to Tenable.io via the Upgrade Assistant tool.
For more information, please refer to the Upgrade Assistant documentation: https://-
docs.tenable.com/upgradeassistant/nessus
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Password Management
The Password Management page, available in Nessus 7.1, displays settings that allow you to set para-
meters for passwords, login notifications, and the session timeout.
Session Timeout 30 The web session timeout in minutes. Users are logged out
(mins) automatically if their session is idle for longer than this
timeout value.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Setting Default Description
Min Password 8 This setting defines the minimum number of characters for
Length passwords of accounts.
Login Noti- Off Login notifications allow the user to see the last successful
fications login and failed login attempts (date, time, and IP), and if
any failed login attempts have occurred since the last suc-
cessful login.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Configure Password Management
1. In Nessus, in the top navigation bar, click Settings.
Note: Changes to the Session Timeout and Max Login Attempts settings require a restart to take effect.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Scanner Health
The Scanner Health page provides you with information about the performance of your Nessus scan-
ner. You can monitor real-time health and performance data to help troubleshoot scanner issues. Scan-
ner alerts provide information about system errors that may cause your scanner to malfunction.
Information is updated every 30 seconds.
l Overview
l Network
l Alerts
Overview
Widget Description Actions
Scanner Alerts about areas where your Nessus scanner Click an alert to see more
Alerts performance may be suffering. Alerts can have a details.
severity level of Info, Low, Medium, or High.
If there are more than five
alerts, click More Alerts
to see the full list of
alerts.
Nessus Data Chart displaying the percentage of free and used None
Disk Space disk space on the disk where Nessus's data dir-
ectory is installed.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Memory Graph displaying how many MB of memory Nes- Hover over a point on the
Usage History sus used over time. graph to see detailed
data.
CPU Usage Graph displaying the percentage of CPU load Nes- Hover over a point on the
History sus used over time. graph to see detailed
data.
Scanning His- Graph displaying the number of scans Nessus Hover over a point on the
tory ran and active targets Nessus scanned over graph to see detailed
time. data.
Network
Widget Description Actions
Scanning His- Graph displaying the number of scans Nessus Hover over a point on
tory ran and active targets Nessus scanned over the graph to see detailed
time. data.
Network Con- Graph displaying the number of TCP sessions Hover over a point on
nections Nessus creates during scans over time. the graph to see detailed
data.
Network Traffic Graph displaying how much traffic Nessus is Hover over a point on
sending and receiving over the network over the graph to see detailed
time. data.
Number of Graph displaying how many reverse DNS Hover over a point on
DNS Lookups (rDNS) and DNS lookups Nessus performs over the graph to see detailed
time. data.
DNS Lookup Graph displaying the average time that Nessus Hover over a point on
Time takes to perform rDNS and DNS lookups over the graph to see detailed
time. data.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Alerts
Widget Description Actions
Scanner List of alerts about areas where your Nessus scanner per- Click an alert
Alerts formance may be suffering. Alerts can have a severity level of to see more
Info, Low, Medium, or High. details.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Monitor Scanner Health
The Scanner Health page provides you with information about the performance of your Nessus scan-
ner. For more information about performance data, see Scanner Health.
3. (Optional) To adjust the time scale on a graph, on the Overview tab, from the drop-down box,
select a time period.
The graphs on both the Overview and Network tabs reflect the selected time period.
4. (Optional) To hide an item from a time graph, click the item in the legend.
Tip: Hiding items automatically adjusts the scale to the visible items and allows you to clearly view one
data set at a time.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Notifications
Nessus may periodically display notifications such as login attempts, errors, system information, and
license expiration information. These notifications appear after you log in, and you can choose to
acknowledge or dismiss each notification. For more information, see Acknowledge Notifications.
The following table describes the two ways you can view notifications:
Current notifications The bell icon in the top Displays notifications that appeared during
this session.
navigation bar ( )
When you acknowledge a notification, it no
longer appears in your current notification
session, but continues to be listed in the
notification history.
Notification history Settings > Noti- Displays all notifications from the past 90
fications days.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Acknowledge Notifications
When you acknowledge a notification, it no longer appears in your current notification session, but con-
tinues to be listed in the notification history. You cannot acknowledge notifications from the noti-
fication history view. For more information on viewing notification history, see View Notifications.
If you choose not to acknowledge a notification, it appears the next time you log in. You cannot
acknowledge some notifications – instead, you must take the recommended action.
To acknowledge a notification:
l For a notification window, click Acknowledge.
Note: Clearing notifications does not acknowledge notifications; it removes them from your current noti-
fications. You can still view cleared notifications in notification history.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
View Notifications
You can view outstanding notifications from your current session, and you can also view a history of
notifications from the past 90 days. For information on managing notifications, see Acknowledge Noti-
fications.
l
In the top navigation bar, click .
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Accounts
This section contains the following tasks available in the Accounts section of the Settings page.
l Generate an API Key
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
My Account
The Account Settings page displays settings for the current authenticated user.
API Keys
An API Key consists of an Access Key and a Secret Key. API Keys authenticate with the Nessus REST
API (version 6.4 or greater) and pass with requests using the X-ApiKeys HTTP header.
Note:
l API Keys are only presented upon initial generation. Store API keys in a safe location.
l API Keys cannot be retrieved by Nessus. If you lose your API Key, you must generate a new API Key.
l Regenerating an API Key will immediately deauthorize any applications currently using the key.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Modify Your User Account
1. In the top navigation bar, click Settings.
4. Click Save.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Generate an API Key
Caution: Generating a new API key will replace any existing keys and deauthorize any linked applications.
Note: Customers may not directly access Nessus scanning APIs to configure or launch scans, except as per-
mitted as part of the Tenable.sc and Tenable.io enterprise solutions.
4. Click Generate.
5. Click Generate.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Users
The User Profile page displays a table of all Nessus user accounts. This documentation refers to that
table as the users table. Each row of the users table includes the user name, the date of the last login,
and the role assigned to the account.
User accounts are assigned roles that dictate the level of access a user has in Nessus. You can change
the role of a user account at any time, as well as disable the account. The following table describes the
roles that can be assigned to users:
Name Description
Administrator Administrators have the same privileges as Standard users, but can also man-
age users, user groups, and scanners. In Nessus Manager, administrators can
view scans that are shared by users.
System Admin- System Administrators have the same privileges as Administrators, but can
istrator also manage and modify system configuration settings.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Create a User Account
This procedure can be performed by an administrator in Nessus Manager or Nessus Professional with
legacy features. Multiple users are not available in Nessus Professional 7.0 and later.
4. Type in the settings as necessary, and select a role for the user.
5. Click Save.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Modify a User Account
This procedure can be performed by an administrator in Nessus Manager or Nessus Professional with
legacy features. Multiple users are not available in Nessus Professional 7.0 and later.
3. In the users table, click the user whose account you want to modify.
The <Username> page appears, where <Username> is the name of the selected user.
5. Click Save.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Delete a User Account
This procedure can be performed by an administrator in Nessus Manager.
3. In the users table, in the row for the user that you want to delete, click the button.
4. Click Delete.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Transfer User Data
In instances of Nessus with multiple users, such as Nessus Manager, you can transfer a user's data to a
system administrator. When you transfer user data, you transfer ownership of all policies, scans, scan
results, and plugin rules to a system administrator account. Transferring user data is useful if you need
to remove a user account but do not want to lose their associated data in Nessus.
1. Log in to Nessus with the system administrator account to which you want to transfer user data.
4. In the users table, select the check box for each user whose data you want to transfer to your
account.
Note: Once you transfer user data, you cannot undo the action.
Nessus transfers ownership of the selected user's policies, scans, scan results, and plugin rules
to the administrator account.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Download Logs
As an administrator, you can download a log file containing local logs and system configuration data
for the instance of Nessus you are currently logged into. This information can help you troubleshoot
system problems, and also provides an easy way to gather data to submit to Tenable Support.
You can choose to download two types of log files: Basic or Extended. The Basic option contains
recent Nessus log data as well as system information, including operating system version, CPU stat-
istics, available memory and disk space, and other data that can help you troubleshoot. The Extended
option also includes recent Nessus webserver log records, system log data, and network configuration
information.
For information on managing individual Nessus log files, see Manage Logs.
To download logs:
l Extended: All information in the Basic option, Nessus webserver log data, and additional
system logs.
4. (Optional) Select Sanitize IPs to hide the first two octets of IPv4 addresses in the logs.
5. Click Download.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Additional Resources
This section contains the following resources:
l Manage Logs
l Scan Targets
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Agent Software Footprint
Note: Performance varies by environment and you may or may not see similar results.
**Used nethogs program to collect network usage (sent/received) of nessusd. After a single scan
that detected 66 vulnerabilities on the agent host, 0.855 MB was sent and received (breakdown: .771
MB sent, .084 MB received). After two total scans, 1.551 MB was sent and 0.204 MB was received. Set to
> 1 MB day as the polling for jobs adds up (~0.008 MB per poll).
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Agent Host System Utilization
Note: Performance varies by environment and you may or may not see similar results.
Generally, a Nessus Agent uses 40 MB of RAM (all pageable). A Nessus Agent uses almost no CPU while
idle, but is designed to use up to 100% of CPU when available during jobs.
To measure network utilization when uploading results, Tenable monitored Agent uploads intoTen-
able.io over a 7 day period. Of over 36,000 uploads observed:
l Plugins consume approximately 300 MB of disk space (varies based on operating system).
However, under certain conditions, disk usage can spike up to 1GB.
l Scan results from Nessus Agents to Nessus Manager and Tenable.io range between 2-3 MB.
l Check-in frequency starts at 30 seconds and is adjusted by Nessus Manager orTenable.io based
on the management system load (number of agents).
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Amazon Web Services
For information on integrating Nessus with Amazon Web Services, see the following:
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Command Line Operations
This section includes command line operations for Nessus and Nessus Agents.
Tip: During command line operations, prompts for sensitive information, such as a password, do not show char-
acters as you type. However, the data is recorded and is accepted when you press the Enter key.
l Nessus-Service
l Nessuscli
l Nessuscli Agent
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Start or Stop Nessus
The following represent best practices for starting and stopping Nessus.
Mac OS X
1. Navigate to System Preferences.
-or-
Start or
Mac OS X Command Line Operation
Stop
Windows
1. Navigate to Services.
3. To stop the Nessus service, right-click Tenable Nessus, and then click Stop.
-or-
To restart the Nessus service, right-click Tenable Nessus, and then click Start.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Start or Stop Windows Command Line Operation
Linux
Use the following commands:
SUSE
FreeBSD
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Start or Stop a Nessus Agent
The following represent best practices for starting and stopping a Nessus Agent on a host.
Mac OS X
1. Navigate to System Preferences.
-or-
Start or
Mac OS X Command Line Operation
Stop
Windows
1. Navigate to Services.
3. To stop the service, right-click Tenable Nessus Agent, and then click Stop.
-or-
To restart the Nessus Agent service, right-click Tenable Nessus Agent, and then click Start.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Start or Stop Windows Command Line Operation
Linux
Use the following commands:
SUSE
FreeBSD
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Nessus-Service
Unless otherwise specified, nessus-service server commands are interchangable with
nessusd commands.
If necessary, whenever possible, Nessus services should be started and stopped using Nessus service
controls in the operating system’s interface.
However, there are many nessus-service functions that can be performed through a command line
interface.
The # killall nessusd command is used to stop all Nessus services and in-process scans.
Nessus-Service Syntax
Operating
Command
System
Linux
# /opt/nessus/sbin/nessus-service -q -D
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Nessus-Service or Nessusd Commands
Option Description
-c <config-file> When starting the nessusd server, this option is used to specify the server-side
nessusd configuration file to use. It allows for the use of an alternate con-
figuration file instead of the standard db.
-S <ip[,ip2,…]> When starting the nessusd server, force the source IP of the connections estab-
lished by Nessus during scanning to <ip>. This option is only useful if you have
a multihomed machine with multiple public IP addresses that you would like to
use instead of the default one. For this setup to work, the host running nessusd
must have multiple NICs with these IP addresses set.
-D When starting the nessusd server, this option forces the server to run in the
background (daemon mode).
-t Check the time stamp of each plugin when starting up to only compile newly
updated plugins.
or --set- If you set an encryption password, Nessus encrypts all policies, scans results,
encryption- and scan configurations. You must enter the password when Nessus restarts.
passwd
Caution: If you lose your encryption password, it cannot be recovered by an admin-
istrator or Tenable Support.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Notes
If you are running nessusd on a gateway and if you do not want people on the outside to connect to
your nessusd, set your listen_address advanced setting.
This setting tells the server to only listen to connections on the address <address> that is an IP
address, not a machine name.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Nessuscli
Some Nessus functions can be administered through a command line interface using the nessuscli
utility.
This allows the user to manage user accounts, modify advanced settings, manage digital certificates,
report bugs, update Nessus, and fetch necessary license information.
Nessuscli Syntax
Operating Sys-
Command
tem
Nessuscli Commands
Command Description
Help Commands
nessuscli <cmd> help Displays additional help for specific commands identified in
the nessuscli help output.
Backup Commands
nessuscli backup -- Creates a backup of your Nessus instance, which includes your
create <backup_file- license and settings. Does not back up scan results.
name>
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Command Description
The bug reporting commands create an archive that can be sent to Tenable, Inc. to help diagnose
issues. By default, the script runs in interactive mode.
--quiet: run the bug report generator without prompting user for
feedback.
User Commands
nessuscli chpasswd Allows you to change a user’s password. You are prompted to enter
<username> the Nessus user’s name. Passwords are not echoed on the screen.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Command Description
Fetch Commands
nessuscli fetch -- Uses your Activation Code to register Nessus online, but does not
register-only automatically download plugin or core updates.
<Activation Code>
Example:
nessuscli fetch -- Registers Nessus 6.3 and newer with the nessus.license file obtained
register-offline from https://plugins.nessus.org/v2/offline.php.
nessus.license
Note: If you are using a version of Nessus 6.2 or earlier, you must use the
information and instructions displayed on https://plu-
gins.nessus.org/offline.php. In Nessus 6.2 and earlier, the license is contained
in the fc.file.
nessuscli fetch -- Displays whether Nessus is properly registered and is able to receive
check updates.
nessuscli fetch -- Displays the Nessus Activation Code being used by Nessus.
code-in-use
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Command Description
security-center
Fix Commands
nessuscli fix Reset registration, display network interfaces, and list advanced set-
tings that you have set.
nessuscli fix [--
secure] --list Using the --secure option acts on the encrypted preferences,
which contain information about registration.
nessuscli fix [--
secure] --set <set- --list, --set, --get, and --delete can be used to modify or
ting=value> view preferences.
nessuscli fix --set Tell the server to only listen to connections on the address
listen_address- <address> that is an IP, not a machine name. This option is useful if
s=<address> you are running nessusd on a gateway and if you do not want people
on the outside to connect to your nessusd.
nessuscli fix --show List all advanced settings, including those you have not set. If you
have not set an advanced setting, the default value is listed.
nessuscli fix -- This command deletes all your registration information and pref-
reset erences, causing Nessus to run in a non-registered state. Nessus
Manager retains the same linking key after resetting.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Command Description
nessuscli fix -- This command resets Nessus to a fresh state, deleting all regis-
reset-all tration information, settings, data, and users.
Certificate Commands
nessuscli import- Validates the server key, server certificate, and CA certificate and
certs -- checks that they match. Then, copies the files to the correct loc-
serverkey=<server ations.
key path> server-
cert=<server cer-
tificate path> --
cacert=
<CA certificate
path>
nessuscli update By default, this tool updates based on the software update options
selected through the Nessus user interface.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Command Description
nessuscli update Updates Nessus plugins by using a TAR file instead of getting the
<tar.gz filename> updates from the plugin feed. The TAR file is obtained when you Man-
age Nessus Offline - Download and Copy Plugins steps.
Note: If you change your update plan and have automatic updates
enabled, Nessus may immediately update to align with the version rep-
resented by your selected plan. Nessus may either upgrade or downgrade
versions.
Values:
Manager Commands
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Command Description
Used for generating plugin updates for your managed scanners and agents connected to a man-
ager.
nessuscli manager Downloads core component updates for remotely managed agents
download-core and scanners.
nessuscli manager Generates plugins archives for remotely managed agents and scan-
generate-plugins ners.
Used for linking, unlinking and viewing the status of remote managed scanners.
Note: The scanner group name is case-sensitive and must match exactly.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Command Description
Dump Command
nessuscli dump -- Adds a plugins.xml file in the sbin directory. For example, run-
plugins ning the /opt/nessus/sbin/nessuscli dump --plugins on
Linux adds a plugins.xml file to the /op-
t/nessus/sbin/plugins directory.
Node Commands
nessuscli node link Links the child node to the parent node in a clustering environment.
--key=<key> --
For more information on key, host, and port, see Link a Node.
host=<host> --
port=<port>
nessuscli node Unlinks the child node from the parent node.
unlink
nessuscli node Shows whether the child node is linked to parent node and the num-
status ber of agents that are linked.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Nessuscli Agent
Use the Agent nessuscli utility to perform some Nessus Agent functions through a command line
interface.
Note: You must run all Agent nessuscli commands as a user with administrative privileges.
Nessuscli Syntax
Operating Sys-
Command
tem
Nessuscli Commands
Command Description
Informational Commands
Optional arguments:
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Command Description
l --scrub — The bug report generator sanitizes the last two octets
of the IPv4 address.
l Deletes any host tag on the agent. For example, the registry key on
Windows or tenable_tag on Unix.
l Deletes master.key.
Optional arguments:
# nessuscli agent Using the Nessus Agent Linking Key, this command links the agent to
link --key=<key> the Nessus Manager or Tenable.io.
--host=<host> --
Required arguments:
port=<port>
l --key — The linking key that you retrievedretrieved from the man-
ager.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Command Description
Optional arguments:
l --name — A name for your agent. If you do not specify a name for
your agent, the name defaults to the name of the computer where
you are installing the agent.
Note: The agent group name is case-sensitive and must match exactly.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Command Description
l Scan description
l Scan triggers
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Command Description
# nessuscli agent Displays the status of the agent, rule-based scanning information, jobs
status pending, and whether the agent is linked or not linked to server.
Optional arguments:
Update Commands
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Command Description
update --file-
e=<plugins_
set.tgz>
Values:
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Command Description
Fix Commands
Note: Restart the agent service for the change to take effect in Nessus Man-
ager.
# nessuscli fix - Tracks unique agent assets by MAC address to prevent duplicates and
-set track_ outdated agents from appearing in Nessus Manager if a system is rein-
unique_ stalled.
agents="<value>"
The track_unique_agent parameter is available in Nessus 7.1.1 and
can be set to yes or no. By default, this preference is enabled.
# nessuscli fix - Sets the maximum number of times an agent should retry in the event of
-set max_ a failure when executing the agent link, agent status, or agent
retries="<value>" unlink commands. The commands retry, the specified number of
times, consecutively, sleeping increasing increments of time set by
retry_sleep_milliseconds between attempts. The default value for
max_retries is 0.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Command Description
Note: This setting does not affect offline updates or the agent's normal 24
hour check-in after it is linked.
# nessuscli fix - Sets the number of milliseconds that an agent sleeps for between retries
-set retry_sleep_ in event of a failure when executing the agent link, agent status, or
milliseconds=" agent unlink commands. The default is 1500 milliseconds (1.5
<value>" seconds).
For a list of supported secure settings, see Advanced Settings in the Nes-
sus Agent User Guide.
Resource Control
Commands
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Update Nessus Software
When updating Nessus components, you can use the nessuscli update commands, also found in the
command line section.
Note: If you are working with Nessus offline, see Manage Nessus Offline.
nessuscli update By default, this tool respects the software update options selected
through the Nessus user interface.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Default Data Directories
The default Nessus data directory contains logs, certificates, temporary files, database backups, plu-
gins databases, and other automatically generated files.
Refer to the following table to determine the default data directory for your operating system.
Linux /opt/nessus/var/nessus
Windows C:\ProgramData\Tenable\Nessus\nessus
Note: Nessus does not support using symbolic links for /opt/nessus/.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Encryption Strength
Nessus uses the following default encryption for storage and communications.
Storing user account passwords SHA-512 and the PBKDF2 function with a 512-bit key
Communications between Nessus TLS 1.3 (fallback to TLS 1.2 or earlier, as configured) with the
and clients (GUI/API users) strongest encryption method supported by Nessus and your
browser or API program
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
File and Process Whitelist
Nessus should be whitelisted in third-party endpoint security products such as anti-virus applications
and host-based intrusion and prevention systems.
Note: If your Windows installation uses a non-standard drive or folder structure, use the %PROGRAMFILES% and
%PROGRAMDATA% environment variables.
The table below contains a list of Nessus folders, files, and processes that should be whitelisted. For
information about whitelisting Nessus Agent processes, see File and Process Whitelist in the Nessus
Agent User Guide.
Windows
Files
C:\Program Files\Tenable\Nessus\*
C:\ProgramData\Tenable\Nessus\*
Processes
C:\Program Files\Tenable\Nessus\nessuscli.exe
C:\Program Files\Tenable\Nessus\nessusd.exe
C:\Program Files\Tenable\Nessus\nasl.exe
C:\Program Files\Tenable\Nessus\nessus-service.exe
Linux
Files
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
/opt/nessus/sbin/*
/opt/nessus/bin/*
/opt/nessus_agent/lib/nessus/*
Processes
/opt/nessus/bin/nasl
/opt/nessus/sbin/nessusd
/opt/nessus/sbin/nessuscli
/opt/nessus/sbin/nessus-service
macOS
Files
/Library/Nessus/run/sbin/*
/Library/Nessus/run/bin/*
Processes
/Library/Nessus/run/bin/nasl
/Library/Nessus/run/sbin/nessus-service
/Library/Nessus/run/sbin/nessuscli
/Library/Nessus/run/sbin/nessusd
/Library/Nessus/run/sbin/nessusmgt
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Manage Logs
Nessus has the following default log files:
l Linux — /opt/nessus/var/nessus/logs/<filename>
l Mac OS X — /Library/Nessus/run/var/nessus/logs/<filename>
l Windows — C:\ProgramData\Tenable\Nessus\nessus\logs\<filename>
You can customize log file locations when you modify log settings.
Modify log.json
You can configure log locations and rotation strategies for www_server.log and backend.log by
editing the log.json file. You can also configure custom logs by creating a new reporters[x].re-
porter section and creating a custom file name.
Note: You cannot configure nessusd.dump or nessusd.messages settings using log.json. Configure those
log settings using logfile_rot in advanced settings.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
To modify log settings using log.json:
1. Using a text editor, open the log.json file, located in the corresponding directory:
l Linux — /opt/nessus/var/nessus/log.json
l Mac OS X /Library/Nessus/run/var/nessus/log.json
l Windows — C:\ProgramData\Tenable\Nessus\nessus\log.json
2. For each log file, edit or create a reporters[x].reporter section, and add or modify the para-
meters described in log.json Format.
log.json Format
The following describe parameters in the log.json file, and whether Tenable recommends that you
modify the parameter. Some parameters are advanced and usually do not need to be modified. If you
are an advanced user who wants to configure a custom log file with advanced parameters, see the
knowledge base article for more information.
l info — inform-
ational logs for a
specific task
l warn — warning
logs for a specific
task
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
l error — error logs
for a specific task
l debug — debugging
output
l verbose — debug-
ging output with
more information
than debug
Valid values:
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
max_size Nessus: 536870912 yes Rotation size in bytes.
(512 MB)
Only used if rotation_
Agent: 10485760 (10 strategy is size.
MB)
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
web server logs.
l system — presents
output in the
default operating
system log format.
Linux example
{
"reporters": [
{
"tags": [
"response"
],
"reporter": {
"type": "file",
"rotation_strategy": "daily",
"rotation_time": "86400",
"max_size": "536870912",
"max_files": "1024",
"file": "/opt/nessus/var/nessus/logs/www_server.log"
},
"format": "combined"
},
{
"tags": [
"log",
"info",
"warn",
"error",
"trace"
],
"reporter": {
"type": "file",
"file": "/opt/nessus/var/nessus/logs/backend.log"
},
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
"context": true,
"format": "system"
}
]
}
{
"reporters": [
{
"tags": [
"response"
],
"reporter": {
"type": "file",
"rotation_strategy": "daily",
"rotation_time": "86400",
"max_size": "536870912",
"max_files": "1024",
"file": "/Library/Nessus/run/var/nessus/logs/www_server.log"
},
"format": "combined"
},
{
"tags": [
"log",
"info",
"warn",
"error",
"trace"
],
"reporter": {
"type": "file",
"file": /Library/Nessus/run/var/nessus/logs/backend.log"
},
"context": true,
"format": "system"
}
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
]
}
Windows example
Note: The backslash (\) is a special character in JSON. To enter a backslash in a path string, you must escape
the first backslash with a second backslash so the path parses correctly.
{
"reporters": [
{
"tags": [
"response"
],
"reporter": {
"type": "file",
"rotation_strategy": "daily",
"rotation_time": "86400",
"max_size": "536870912",
"max_files": "1024",
"file": "C:\\ProgramData\\Tenable\\Nessus\\nessus\\logs\\www_server.log"
},
"format": "combined"
},
{
"tags": [
"log",
"info",
"warn",
"error",
"trace"
],
"reporter": {
"type": "file",
"file": "C:\\ProgramData\\Tenable\\Nessus\\nessus\\logs\\backend.log"
},
"context": true,
"format": "system"
}
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
]
}
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Mass Deployment Support
You can automatically configure and deploy Nessus scanners using environment variables or a con-
figuration JSON file. This allows you to streamline a mass deployment.
When you first launch Nessus after installation, Nessus first checks for the presence of environment
variables, then checks for the config.json file. When Nessus launches for the first time, Nessus
uses that information to link the scanner to a manager, set preferences, and create a user.
Note: If you have information in both environment variables and config.json, Nessus uses both sources of
information. If there is conflicting information (for example, environment variables and config.json contain a
different linking key), Nessus uses the information from the environment variables.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Nessus Environment Variables
If you want to configure Nessus based on environment variables, you can set the following envir-
onment variables in the shell environment that Nessus is running in.
When you first launch Nessus after installation, Nessus first checks for the presence of environment
variables, then checks for the config.json file. When Nessus launches for the first time, Nessus
uses that information to link the scanner to a manager, set preferences, and create a user.
User configuration
Note: If you create a user but leave the NCONF_USER_PASSWORD value empty, Nessus automatically gen-
erates a password. To log in as the user, use nessuscli to change the user's password first.
Linking configuration
l NCONF_LINK_HOST - The hostname or IP address of the manager you want to link to. To link to
Tenable.io, use cloud.tenable.com.
l NCONF_LINK_GROUPS - (Optional) One or more existing scanner groups where you want to add
the scanner. List multiple groups in a comma-separated list. If any group names have spaces,
use quotes around the whole list. For example: "Atlanta,Global Headquarters"
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Deploy Nessus using JSON
You can automatically configure and deploy Nessus scanners using a JSON file, config.json. To
determine the location of this file on your operating system, see Default Data Directories.
When you first launch Nessus after installation, Nessus first checks for the presence of environment
variables, then checks for the config.json file. When Nessus launches for the first time, Nessus
uses that information to link the scanner to a manager, set preferences, and create a user.
l Linux: /opt/nessus/var/nessus/config.json
l Windows: C:\ProgramData\Tenable\Nessus\nessus\config.json
{
"link": {
"name": "sensor name",
"host": "hostname or IP address",
"port": 443,
"key": "abcdefghijklmnopqrstuvwxyz",
"ms_cert": "CA certificate for linking",
"retry": 1,
"groups": ["group 1", "group 2"],
"proxy": {
"proxy": "proxyhostname",
"proxy_port": 443,
"proxy_username": "proxyusername",
"proxy_password": "proxypassword",
"user_agent": "proxyagent",
"proxy_auth": "NONE"
}
},
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
"preferences": {
"global.max_hosts": "500"
},
"user": {
"username": "admin",
"password": "password",
"role": "system_administrator",
"type": "local"
}
}
config.json Details
The following describes the format of the different settings in each section of config.json.
Note: All sections are optional; if you do not include a section, it is not configured when you first launch Nessus.
You can manually configure the settings later.
Linking
Setting Description
name (Optional)
host The hostname or IP address of the manager you want to link to.
port The port for the manager you want to link to.
key The linking key that you retrieved from the manager.
ms_cert (Optional)
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
A custom CA certificate to use to validate the manager's server cer-
tificate.
groups (Optional)
One or more existing scanner groups where you want to add the
scanner. List multiple groups in a comma-separated list. If any
group names have spaces, use quotes around the whole list.
proxy (Optional)
Preferences
The preferences section configures any advanced settings. For more information, see Advanced Set-
tings.
User
Setting Description
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
password (Optional but recommended)
If you create a user but leave the password value empty, Nessus automatically
generates a password. To log in as the user, use nessuscli to change the
user's password first.
role The role for the user. Set to disabled, basic, standard, administrator, or
system_administrator. For more information, see Users.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Nessus Credentialed Checks
In addition to remote scanning, Nessus can be used to scan for local exposures. For information about
configuring credentialed checks, see Credentialed Checks on Windows and Credentialed Checks on
Linux.
Purpose
External network vulnerability scanning is useful to obtain a snapshot in time of the network services
offered and the vulnerabilities they may contain. However, it is only an external perspective. It is
important to determine what local services are running and to identify security exposures from local
attacks or configuration settings that could expose the system to external attacks that may not be
detected from an external scan.
In a typical network vulnerability assessment, a remote scan is performed against the external points
of presence and an on-site scan is performed from within the network. Neither of these scans can
determine local exposures on the target system. Some of the information gained relies on the banner
information displayed, which may be inconclusive or incorrect. By using secured credentials, the Nes-
sus scanner can be granted local access to scan the target system without requiring an agent. This
can facilitate scanning of a very large network to determine local exposures or compliance violations.
The most common security problem in an organization is that security patches are not applied in a
timely manner. A Nessus credentialed scan can quickly determine which systems are out of date on
patch installation. This is especially important when a new vulnerability is made public and executive
management wants a quick answer regarding the impact to the organization.
Another major concern for organizations is to determine compliance with site policy, industry stand-
ards (such as the Center for Internet Security (CIS) benchmarks) or legislation (such as Sarbanes-Oxley,
Gramm-Leach-Bliley or HIPAA). Organizations that accept credit card information must demonstrate
compliance with the Payment Card Industry (PCI) standards. There have been quite a few well-pub-
licized cases where the credit card information for millions of customers was breached. This rep-
resents a significant financial loss to the banks responsible for covering the payments and heavy fines
or loss of credit card acceptance capabilities by the breached merchant or processor.
Access Level
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Credentialed scans can perform any operation that a local user can perform. The level of scanning is
dependent on the privileges granted to the user account that Nessus is configured to use.
Non-privileged users with local access on Linux systems can determine basic security issues, such as
patch levels or entries in the /etc/passwd file. For more comprehensive information, such as system
configuration data or file permissions across the entire system, an account with “root” privileges is
required.
Credentialed scans on Windows systems require that an administrator level account be used. Several
bulletins and software updates by Microsoft have made reading the registry to determine software
patch level unreliable without administrator privileges. Administrative access is required to perform
direct reading of the file system. This allows Nessus to attach to a computer and perform direct file
analysis to determine the true patch level of the systems being evaluated. On Windows XP Pro, this file
access will only work with a local administrator account if the “Network access: Sharing and security
model for local accounts” policy is changed to “Classic – local users authenticate as themselves”.
This plugin detects if either SSH or Windows credentials did not allow the scan to log into the remote
host. When a login is successful, this plugin does not produce a result.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Credentialed Checks on Windows
The process described in this section enables you to perform local security checks on Windows sys-
tems. Only Domain Administrator accounts can be used to scan Domain Controllers.
Before you begin this process, ensure that there are no security policies in place that block cre-
dentialed checks on Windows, such as:
l Local computer policies (e.g. Deny access to this computer from the network, Access this com-
puter from the network)
l IPS/IDS
3. Name the group Nessus Local Access. Set Scope to Global and Type to Security.
4. Add the account you will use to perform Nessus Windows Authenticated Scans to the Nessus
Local Access group.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Add the Nessus Local Access group to the Nessus Scan GPO
1. Right-click Nessus Scan GPO Policy, then select Edit.
2. Expand Computer configuration > Policies > Windows Settings > Security Settings > Restric-
ted Groups.
3. In the left navigation bar on Restricted Groups, right-click and select Add Group.
4. In the Add Group dialog box, select browse and enter Nessus Local Access.
9. Select OK twice.
Nessus uses Server Message Block (SMB) and Windows Management Instrumentation (WMI). You must
ensure Windows Firewall allows access to the system.
2. Expand Computer configuration > Policies > Windows Settings > Security Settings > Windows
Firewall with Advanced Security > Windows Firewall with Advanced Security > Inbound
Rules.
4. Choose the Predefined option, and select Windows Management Instrumentation (WMI) from
the drop-down box.
5. Select Next.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
6. Select the check boxes for:
7. Select Next.
8. Select Finish.
Tip: Later, you can edit the predefined rule created and limit the connection to the ports by IP Address and
Domain User to reduce any risk for abuse of WMI.
Configure Windows
1. Under Windows Firewall > Windows Firewall Settings, enable File and Printer Sharing.
2. Using the gpedit.msc tool (via the Run prompt), invoke the Group Policy Object Editor. Navigate
to Local Computer Policy > Administrative Templates > Network > Network Connections >
Windows Firewall > Standard Profile > Windows Firewall : Allow inbound file and printer
exception, and enable it.
3. (Windows 8 and earlier only) While in the Group Policy Object Editor, navigate to Local Computer
Policy > Administrative Templates > Network > Network Connections > Prohibit use of Inter-
net connection firewall on your DNS domain and ensure it is set to either Disabled or Not Con-
figured.
4. Enable the Remote Registry service (it is disabled by default). If the service is set to manual
(rather than enabled), plugin IDs 42897 and 42898 will only enable the registry for the duration of
the scan.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Note: Enabling this option configures Nessus to attempt to start the remote registry service
prior to starting the scan.
The Windows credentials provided in the Nessus scan policy must have administrative per-
missions to start the Remote Registry service on the host being scanned.
5. Open TCP ports 139 and 445 between Nessus and the target.
l IPC$
l ADMIN$
Note: Windowsd 10 disables ADMIN$ by default. For all other operating systems, the three shares
are enabled by default and can cause other issues if disabled by default. For more information, see
http://support.microsoft.com/kb/842715/en-us.
l C$
Caution: While not recommended, Windows User Account Control (UAC) can be disabled.
Tip: To turn off UAC completely, open the Control Panel, select User Accounts, and then set Turn
User Account Control to off. Alternatively, you can add a new registry key named LocalAc-
countTokenFilterPolicy and set its value to 1.
This key must be created in the registry at the following location: HKLM\SOFTWARE\Microsoft\
Windows\CurrentVersion\Policies\system\LocalAccountTokenFilterPolicy.
For more information on this registry setting, consult the MSDN 766945 KB. In Windows 7 and 8, if
UAC is disabled, then EnableLUA must be set to 0 in HKEY_LOCAL_MACHINE\Soft-
ware\Microsoft\Windows\CurrentVersion\Policies\System as well.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Prerequisites
A very common mistake is to create a local account that does not have enough privileges to log on
remotely and do anything useful. By default, Windows will assign new local accounts Guest privileges if
they are logged into remotely. This prevents remote vulnerability audits from succeeding. Another com-
mon mistake is to increase the amount of access that the Guest users obtain. This reduces the security
of your Windows server.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Enable Windows Logins for Local and Remote Audits
The most important aspect about Windows credentials is that the account used to perform the checks
should have privileges to access all required files and registry entries, which in many cases means
administrative privileges. If Nessus is not provided the credentials for an administrative account, at
best it can be used to perform registry checks for the patches. While this is still a valid method to
determine if a patch is installed, it is incompatible with some third party patch management tools that
may neglect to set the key in the policy. If Nessus has administrative privileges, then it will actually
check the version of the dynamic-link library (.dll) on the remote host, which is considerably more
accurate.
Make sure that the configuration of this account is not set with a typical default of Guest only: local
users authenticate as guest. Instead, switch this to Classic: local users authenticate as
themselves.
To configure the server to allow logins from a domain account, use the Classic security model. To do
this, follow these steps:
3. Select Computer Configuration > Windows Settings > Security Settings > Local Policies >
Security Options.
4. In the list, select Network access: Sharing and security model for local accounts.
The Network access: Sharing and security model for local accounts window appears.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
5. In the Local Security Setting section, in the drop-down box, select Classic - local users authen-
ticate as themselves.
6. Click OK.
This will cause users local to the domain to authenticate as themselves, even though they are not phys-
ically local on the particular server. Without doing this, all remote users, even real users in the domain,
will authenticate as a guest and will likely not have enough credentials to perform a remote audit.
Configuring Windows XP
When performing authenticated scans against Windows XP systems, there are several configuration
options that must be enabled:
l File & Printer Sharing must be enabled in the target’s network configuration.
l Ports 139 and 445 must be open between the Nessus scanner and the target.
l An SMB account must be used that has local administrator rights on the target.
You may be required to change the Windows local security policies or they could block access or inher-
ent permissions. A common policy that will affect credentialed scans is found under:
Administrative Tools > Local Security Policy > Security Settings > Local Policies > Security Options
> Network access: Sharing and security model for local accounts.
If this local security policy is set to something other than Classic - local users authenticate as them-
selves, a compliance scan will not run successfully.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
l Under Windows Firewall > Windows Firewall Settings, enable File and Printer Sharing.
l Using the Run prompt, run gpedit.msc and enable Group Policy Object Editor. Navigate to
Local Computer Policy > Administrative Templates > Network > Network Connections > Win-
dows Firewall > Standard Profile > Windows Firewall : Allow inbound file and printer excep-
tion and enable it.
l While in the Group Policy Object Editor, navigate to Local Computer Policy > Administrative
Templates > Network > Network Connections > Prohibit use of Internet connection firewall
on your DNS domain. This option must be set to either Disabled or Not Configured.
l Windows User Account Control (UAC) must be disabled, or a specific registry setting must be
changed to allow Nessus audits. To turn off UAC completely, open the Control Panel, select User
Accounts and then set Turn User Account Control to Off. Alternatively, you can add a new
registry DWORD named LocalAccountTokenFilterPolicy and set its value to “1”. This key must be
created in the registry at the following location: HKLM\SOFTWARE\Mi-
crosoft\Win-
dows\CurrentVersion\Policies\system\LocalAccountTokenFilterPolicy. For more
information on this registry setting, consult the MSDN 766945 KB.
l The Remote Registry service must be enabled (it is disabled by default). It can be enabled for a
one-time audit, or left enabled permanently if frequent audits are performed.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Configure Nessus for Windows Logins
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Credentialed Checks on Linux
The process described in this section enables you to perform local security checks on Linux based sys-
tems. The SSH daemon used in this example is OpenSSH. If you have a commercial variant of SSH,
your procedure may be slightly different.
You can enable local security checks using an SSH private/public key pair or user credentials and sudo
or su access.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Prerequisites
Some commercial variants of SSH do not have support for the blowfish cipher, possibly for export reas-
ons. It is also possible to configure an SSH server to only accept certain types of encryption. Check
that your SSH server supports the correct algorithm.
User Privileges
For maximum effectiveness, the SSH user must have the ability to run any command on the system.
On Linux systems, this is known as root privileges. While it is possible to run some checks (such as
patch levels) with non-privileged access, full compliance checks that audit system configuration and
file permissions require root access. For this reason, it is strongly recommended that SSH keys be
used instead of credentials when possible.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Enable SSH Local Security Checks
This section is intended to provide a high-level procedure for enabling SSH between the systems
involved in the Nessus credential checks. It is not intended to be an in-depth tutorial on SSH. It is
assumed the reader has the prerequisite knowledge of Linux system commands.
To generate the key pair, use ssh-keygen and save the key in a safe place. In the following example
the keys are generated on a Red Hat ES 3 installation.
# ssh-keygen -t dsa
Generating public/private dsa key pair.
Enter file in which to save the key (/Users/test/.ssh/id_dsa):
/home/test/Nessus/ssh_key
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in
/home/test/Nessus/ssh_key.
Your public key has been saved in
/home/test/Nessus/ssh_key.pub.
The key fingerprint is:
06:4a:fd:76:ee:0f:d4:e6:4b:74:84:9a:99:e6:12:ea
#
Do not transfer the private key to any system other than the one running the Nessus server. When
ssh-keygen asks you for a passphrase, enter a strong passphrase or press the Return key twice (i.e.,
do not set any passphrase). If a passphrase is specified, it must be specified in Policies > Credentials
> SSH settings in order for Nessus to use key-based authentication.
Nessus Windows users may wish to copy both keys to the main Nessus application directory on the
system running Nessus (C:\Program Files\Tenable\Nessus by default), and then copy the public
key to the target systems as needed. This makes it easier to manage the public and private key files.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
On every target system to be scanned using local security checks, create a new user account ded-
icated to Nessus. This user account must have exactly the same name on all systems. For this doc-
ument, we will call the user nessus, but you can use any name.
Once the account is created for the user, make sure that the account has no valid password set. On
Linux systems, new user accounts are locked by default, unless an initial password was explicitly set. If
you are using an account where a password had been set, use the passwd –l command to lock the
account.
You must also create the directory under this new account’s home directory to hold the public key. For
this exercise, the directory will be /home/nessus/.ssh. An example for Linux systems is provided
below:
# passwd –l nessus
# cd /home/nessus
# mkdir .ssh
#
For Solaris 10 systems, Sun has enhanced the passwd(1) command to distinguish between locked
and non-login accounts. This is to ensure that a user account that has been locked may not be used to
execute commands (e.g., cron jobs). Non-login accounts are used only to execute commands and do
not support an interactive login session. These accounts have the “NP” token in the password field of
/etc/shadow. To set a non-login account and create the SSH public key directory in Solaris 10, run
the following commands:
# passwd –N nessus
# grep nessus /etc/shadow
nessus:NP:13579::::::
# cd /export/home/nessus
# mkdir .ssh
#
Now that the user account is created, you must transfer the key to the system, place it in the appro-
priate directory and set the correct permissions.
Example
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
From the system containing the keys, secure copy the public key to system that will be scanned for
host checks as shown below. 192.1.1.44 is an example remote system that will be tested with the host-
based checks.
You can also copy the file from the system on which Nessus is installed using the secure ftp command,
sftp. Note that the file on the target system must be named authorized_keys.
Repeat this process on all systems that will be tested for SSH checks (starting at “Creating a User
Account and Setting up the SSH Key” above).
Test to make sure that the accounts and networks are configured correctly. Using the simple Linux
command id, from the Nessus scanner, run the following command:
If it successfully returns information about the Nessus user, the key exchange was successful.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Configure Nessus for SSH Host-Based Checks
If you have not already done so, secure copy the private and public key files to the system that you will
use to access the Nessus scanner, as described in Enable SSH Local Security Checks.
3. Select SSH.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Run Nessus as Non-Privileged User
Nessus 6.7 and later has the ability to run as a non-privileged user.
Limitations
l When scanning localhost, Nessus plugins assume that they are running as root. Therefore, cer-
tain types of scans may fail. For example, because Nessus is now running as a non-privileged
user, file content Compliance Audits may fail or return erroneous results since the plugins are
not able to access all directories.
l nessuscli does not have a --no-root mode. Running commands with nessuscli as root
could potentially create files in the Nessus install directory owned by root, which can prohibit
Nessus from accessing them successfully. Use care when running nessuscli, and potentially
fix permissions with chown after using it.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Run Nessus on Linux with Systemd as a Non-Privileged User
Limitations
l For use with Nessus 6.7 or later.
l When scanning localhost, Nessus plugins assume that they are running as root. Therefore, cer-
tain types of scans may fail. For example, because Nessus is now running as a non-privileged
user, file content Compliance Audits may fail or return erroneous results since the plugins are
not able to access all directories.
l nessuscli does not have a --no-root mode. Running commands with nessuscli as root
could potentially create files in the Nessus install directory owned by root, which can prohibit
Nessus from accessing them successfully. Use care when running nessuscli, and potentially
fix permissions with chown after using it.
Steps
1. If you have not already, install Nessus.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
If this is only a manager, and you do not want this instance of Nessus to perform scans, you need
to provide it only with the capability to change its resource limits.
If you want this instance of Nessus to perform scans, you need to add additional permissions to
allow packet forgery and enabling promiscuous mode on the interface.
l Remove: ExecStart=/opt/nessus/sbin/nessus-service -q
l Add: User=nonprivuser
[Service]
Type=simple
PIDFile=/opt/nessus/var/nessus/nessus-service.pid
ExecStart=/opt/nessus/sbin/nessus-service -q --no-root
Restart=on-abort
ExecReload=/usr/bin/pkill nessusd
EnvironmentFile=-/etc/sysconfig/nessusd
User=nonprivuser
[Install]
WantedBy=multi-user.target
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
In this step, Nessus restarts as root, but systemd starts it as nonprivuser.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Run Nessus on Linux with init.d Script as a Non-Privileged User
Limitations
These steps are for use with Nessus 6.7 or later.
When scanning localhost, Nessus plugins assume that they are running as root. Therefore, certain
types of scans may fail. For example, because Nessus is now running as a non-privileged user, file con-
tent Compliance Audits may fail or return erroneous results since the plugins are not able to access all
directories.
Because nessuscli does not have a --no-root mode, running commands with nessuscli as root
could potentially create files in the Nessus install directory owned by root, which can prohibit Nessus
from accessing them successfully. Use care when running nessuscli, and potentially fix permissions
with chown after using it.
Steps
1. If you have not already, install Nessus.
Tip:
cap_net_admin is used to put the interface in promiscuous mode.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
cap_net_raw is used to create raw sockets for packet forgery.
cap_sys_resource is used to set resource limits.
If this is only a manager, and you do not want this instance of Nessus install to perform scans,
you need to provide it only with the capability to change its resource limits.
If you want this instance of Nessus to perform scans, you need to add additional permissions to
allow packet forgery and enabling promiscuous mode on the interface.
CentOS
daemon --user=nonprivuser /opt/nessus/sbin/nessus-service -q -D --no-root
Debian
start-stop-daemon --start --oknodo --user nonprivuser --name nessus --
pidfile --chuid nonprivuser --startas /opt/nessus/sbin/nessus-service -- -q
-D --no-root
Depending on your operating system, the resulting script should appear as follows:
CentOS
start() {
KIND="$NESSUS_NAME"
echo -n $"Starting $NESSUS_NAME : "
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
daemon --user=nonprivuser /opt/nessus/sbin/nessus-service -q -D --no-root
echo "."
return 0
}
Debian
start() {
KIND="$NESSUS_NAME"
echo -n $"Starting $NESSUS_NAME : "
start-stop-daemon --start --oknodo --user nonprivuser --name nessus --pidfile
--chuid nonprivuser --startas /opt/nessus/sbin/nessus-service -- -q -D --no-root
echo "."
return 0
}
7. Start nessusd.
Note: If you are running Nessus on Debian, after starting Nessus, run the chown -R
nonprivuser:nonprivuser /opt/nessus command to regain ownership of directories created at
runtime.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Run Nessus on Mac OS X as a Non-Privileged User
Limitations
l For use with Nessus 6.7 or later.
l When scanning localhost, Nessus plugins assume that they are running as root. Therefore, cer-
tain types of scans may fail. For example, because Nessus is now running as a non-privileged
user, file content Compliance Audits may fail or return erroneous results since the plugins are
not able to access all directories.
l nessuscli does not have a --no-root mode. Running commands with nessuscli as root
could potentially create files in the Nessus install directory owned by root, which could cause
Nessus to be unable to access them appropriately. Use care when running nessuscli, and
potentially fix permissions with chown after using it.
Steps
1. If you have not already done so, Install Nessus on MacOSX.
3. On the Mac, in System Preferences > Users & Groups, create a new Group.
4. Next, in System Preferences > Users & Groups, create the new Standard User. This user will be
configured to run as the Nessus non-privileged account.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
5. Add the new user to the group you created in Step 1.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
6. Remove 'world' permissions on Nessus binaries in the /sbin directory.
7. Change ownership of /Library/Nessus/run directory to the non-root (Standard) user you cre-
ated in Step 2.
8. Give that user read/write permissions to the /dev/bpf* devices. A simple way to do this is to
install Wireshark, which creates a group called access_bpf, as well as a corresponding launch
daemon to set appropriate permissions on /dev/bpf* at startup. In this case, you can simply
assign the nonpriv user to be in the access_bpf group. Otherwise, you will need to create a
launch daemon giving the "nonpriv" user, or a group that it is a part of, read/write permissions to
all /dev/bpf*.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
10. Using a text editor, modify the Nessus /Library/LaunchDae-
mons/com.tenablesecurity.nessusd.plist file and add the following lines. Do not modify any of
the existing lines.
<string>--no-root</string>
<key>UserName</key>
<string>nonprivuser</string>
11. Using sysctl, verify the following parameters have the minimum values:
$ sysctl debug.bpf_maxdevices
debug.bpf_maxdevices: 16384
$ sysctl kern.maxfiles
kern.maxfiles: 12288
$ sysctl kern.maxfilesperproc
kern.maxfilesperproc: 12288
$ sysctl kern.maxproc
kern.maxproc: 1064
$ sysctl kern.maxprocperuid
kern.maxprocperuid: 1064
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
12. If any of the values in Step 9. do not meet the minimum requirements, take the following steps to
modify values.
Example:
$ cat /etc/sysctl.conf
kern.maxfilesperproc=12288
kern.maxproc=1064
kern.maxprocperuid=1064
13. Next, using the launchctl limit command, verify your OS default values.
$ launchctl limit
cpu unlimited unlimited
filesize unlimited unlimited
data unlimited unlimited
stack 8388608 67104768
core 0 unlimited
rss unlimited unlimited
memlock unlimited unlimited
maxproc 709 1064
maxfiles 256 unlimited
14. If any of the values in Step 11. are not set to the default OSX values above, take the following
steps to modify values.
Using the a text editor, edit the launchd.conf file with the correct, default values as shown in
Step 11.
Example:
$ cat /etc/launchd.conf
limit maxproc 709 1064
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Note: Some older versions of OSX have smaller limits for maxproc. If your version of OSX supports
increasing the limits through /etc/launchctl.conf, increase the value.
15. For all changes to take effect either reboot your system or reload the launch daemon.
Limitations
l For use with Nessus 6.7 or later.
l When scanning localhost, Nessus plugins assume that they are running as root. Therefore, cer-
tain types of scans may fail. For example, because Nessus is now running as a non-privileged
user, file content Compliance Audits may fail or return erroneous results since the plugins are
not able to access all directories.
l nessuscli does not have a --no-root mode. Running commands with nessuscli as root
could potentially create files in the Nessus install directory owned by root, which could cause
Nessus to be unable to access them appropriately. Use care when running nessuscli, and poten-
tially fix permissions with chown after using it.
Note: Unless otherwise noted, execute the following commands in a root login shell.
# adduser
Username: nonprivuser
Full name: NonPrivUser
Uid (Leave empty for default):
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Login group [nonprivuser]:
Login group is nonprivuser. Invite nonprivuser into other groups? []:
Login class [default]:
Shell (sh csh tcsh bash rbash nologin) [sh]:
Home directory [/home/nonprivuser]:
Home directory permissions (Leave empty for default):
Use password-based authentication? [yes]:
Use an empty password? (yes/no) [no]:
Use a random password? (yes/no) [no]:
Enter password:
Enter password again:
Lock out the account after creation? [no]:
Username : nonprivuser
Password : *****
Full Name : NonPrivUser
Uid : 1003
Class :
Groups : nonprivuser
Home : /home/nonprivuser
Home Mode :
Shell : /bin/sh
Locked : no
OK? (yes/no): yes
adduser: INFO: Successfully added (nonprivuser) to the user database.
Add another user? (yes/no): no
Goodbye!
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
4. Change ownership of /opt/nessus to the non-root user.
5. Create a group to give the non-root user access to the /dev/bpf device and allow them to use
raw sockets.
pw groupadd access_bpf
pw groupmod access_bpf -m nonprivuser
# pw groupshow access_bpf
access_bpf:*:1003:nonprivuser
# ulimit -a
cpu time (seconds, -t) unlimited
file size (512-blocks, -f) unlimited
data seg size (kbytes, -d) 33554432
stack size (kbytes, -s) 524288
core file size (512-blocks, -c) unlimited
max memory size (kbytes, -m) unlimited
locked memory (kbytes, -l) unlimited
max user processes (-u) 6670
open files (-n) 58329
virtual mem size (kbytes, -v) unlimited
swap limit (kbytes, -w) unlimited
sbsize (bytes, -b) unlimited
pseudo-terminals (-p) unlimited
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
8. If any of the values in Step 6. do not meet the minimum requirements, take the following steps to
modify values.
9. Next, using a text editor, modify the /usr/local/etc/rc.d/nessusd service script to remove
and add the following lines:
Remove: /usr/local/nessus/sbin/nessus-service -D -q
Add: chown root:access_bpf /dev/bpf
Add: chmod 660 /dev/bpf
Add: daemon -u nonprivuser /usr/local/nessus/sbin/nessus-service -D -q --
no-root
nessusd_start() {
echo 'Starting Nessus...'
chown root:access_bpf /dev/bpf
chmod 660 /dev/bpf
daemon -u nonprivuser /usr/local/nessus/sbin/nessus-service -D -q --no-root
}
nessusd_stop() {
test -f /usr/local/nessus/var/nessus/nessus-service.pid && kill `cat
/usr/local/nessus/var/nessus/nessus-service.pid` && echo 'Stopping Nessus...' &&
sleep 3
}
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.
Upgrade Assistant
You can upgrade data from Nessus to Tenable.io via the Upgrade Assistant tool.
For more information, please refer to the Upgrade Assistant documentation: https://-
docs.tenable.com/upgradeassistant/nessus
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of
Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.