Which protocol does tenable recommend using to perform credentialed scans of UNIX hosts?

Nessus uses SSH to connect to the target system to complete its credentialed scans.

What is a Nessus credentialed scan?

By using secured credentials, the Nessus scanner can be granted local access to scan the target system without requiring an agent. … This can facilitate scanning of a very large network to determine local exposures or compliance violations.

Can Nessus scan Linux?

Nessus provides a comprehensive view of your Linux and UNIX patch status. It allows you to dig deeply into your systems to identify remote vulnerabilities, find missing local patches, and pare down your results to prioritize patching.

What protocols does Nessus use?

Nessus leverages the ability to log into remote Linux hosts via Secure Shell (SSH); and with Windows hosts, Nessus leverages a variety of Microsoft authentication technologies. Note that Nessus also uses the Simple Network Management Protocol (SNMP) to make version and information queries to routers and switches.

How do I enable local security on Linux?

You can enable local security checks using an SSH private/public key pair or user credentials and sudo or su access. Note: See the Credentialed Scanning of Linux and Unix video for an overview of requirements for this process.

What is intrusive scan?

Intrusive scans attempt to exploit a vulnerability when it is found. This can highlight the likely risk and impact of a vulnerability, but may also disrupt your operational systems and processes, and cause issues for your employees and customers — so use intrusive scanning with caution.

What is the difference between authenticated scan and unauthenticated scan?

An authenticated scan reports weaknesses exposed to the authenticated users of the system, as all the hosted services can be accessed with a right set of credentials. An unauthenticated scan reports weaknesses from a public viewpoint (this is what the system looks like to the unauthenticated users) of the system. …

What is Nessus compliance?

You can use Nessus to perform vulnerability scans and compliance audits to obtain all of this data at one time. … If you know how a server is configured, how it is patched, and what vulnerabilities are present, you can determine measures to mitigate risk.

What devices can Nessus scan?

Nessus is supported on a variety of operating systems and platforms, including:

  • Debian / Kali Linux.
  • Fedora.
  • FreeBSD.
  • Mac OS X.
  • Red Hat / CentOS / Oracle Linux.
  • SUSE Linux.
  • Ubuntu.
  • Windows Server 2008 and Windows Server 2012.

How long do Nessus scans take?

In summary there are 1700 targets to scan. And the scan should be done in less than 50 hours (weekend). Just for a little pre check i scanned 12 targets and the scan took 4 hours. This is way to long for our szenario.

Like this post? Please share to your friends:
OS Today