Professional Documents
Culture Documents
NessusPro DS EN v8
NessusPro DS EN v8
Nessus Features
Scanning Capabilities
Reporting
Discovery: Accurate, high-speed asset discovery
Customize reports to sort by vulnerability or host, create an
Scanning: Vulnerability scanning (including
executive summary or compare scan results to highlight
IPv4/IPv6/hybrid networks)
changes
o Un-credentialed vulnerability discovery
o Native (XML), PDF (requires Java be installed on
Nessus server), HTML and CSV formats o Credentialed scanning for system hardening and
missing patches
Add your own name and/or logo to reports
o Meets PCI DSS requirements for internal
Targeted email notifications of scan results, remediation
vulnerability scanning
recommendations and scan configuration improvements
Coverage: Broad asset coverage and profiling
Automate report downloads using the API
o Network devices: firewalls/routers/switches
(Juniper, Check Point, Cisco, Palo Alto Networks),
printers, storage
o Offline configuration auditing of network devices
Virtualization VMware ESX, ESXi, vSphere, vCenter,
o
Microsoft, Hyper-V, Citrix Xen Server
Deployment and Management
o Operating systems: Windows, OS X, Linux, Solaris, Flexible deployment: software or virtual appliance deployed
FreeBSD, Cisco iOS, IBM iSeries on-premises or in a service provider’s cloud.
o Databases: Oracle, SQL Server, MySQL, DB2, Flexible licensing: Easily transfer a Nessus license across
Informix/DRDA, PostgreSQL, MongoDB multiple laptops to support pools of consultants and/or
laptops.
o Cloud: Scans the configuration of cloud
Scan options: Supports both non-credentialed, remote
applications like Salesforce and cloud instances
scans and credentialed, local scans for deeper, granular
like Amazon Web Services, Microsoft Azure
analysis of assets that are online as well as offline
and Rackspace
or remote.
o Compliance: Helps meet government, regulatory
and corporate scanning requirements Configuration/policies: Out-of-the-box policies and
configuration templates.
o Helps to enforce PCI DSS requirements for secure
configuration, system hardening, malware Risk scores: Vulnerability ranking based on CVSS, five
detection, and access controls severity levels (Critical, High, Medium, Low, Info),
customizable severity levels for recasting of risk.
Threats: Botnet/malicious, process/anti-virus auditing
Prioritization: Correlation with exploit frameworks
o Detect viruses, malware, backdoors, hosts (Metasploit, Core Impact, Canvas and ExploitHub) and
communicating with botnet-infected systems, filtering by exploitability and severity.
known/unknown processes, web services linking to
malicious content
o Compliance auditing: FFIEC, FISMA, CyberScope, Training
GLBA, HIPAA/ HITECH, NERC, SCAP, SOX
Tenable offers training for those who are new to using Nessus
o Configuration auditing: CERT, CIS, COBIT/ITIL, DISA and want the knowledge and skills to maximize use of the
STIGs, FDCC, ISO, NIST, NSA, PCI product, as well as focused topics like compliance auditing for
Control Systems Auditing: SCADA systems, embedded more advanced users. Courses are available on-demand via the
devices and ICS applications Tenable website.
Sensitive Content Auditing: PII (e.g., credit card
numbers, SSNs)