0% found this document useful (0 votes)
86 views8 pages

Step 1: Creating A Scan

Nessus is a vulnerability scanning tool that allows users to scan their network for security vulnerabilities. The summary outlines the 5 step process to use Nessus: 1) Create a scan, 2) Choose a scan template like Basic Network Scan, 3) Configure scan settings such as targets and credentials, 4) Launch and view results that include vulnerabilities and remediations, 5) Export results in a report format.

Uploaded by

panda ass
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
86 views8 pages

Step 1: Creating A Scan

Nessus is a vulnerability scanning tool that allows users to scan their network for security vulnerabilities. The summary outlines the 5 step process to use Nessus: 1) Create a scan, 2) Choose a scan template like Basic Network Scan, 3) Configure scan settings such as targets and credentials, 4) Launch and view results that include vulnerabilities and remediations, 5) Export results in a report format.

Uploaded by

panda ass
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

With Nessus, you can gain full visibility into your network by conducting a

vulnerability assessment. (If you have not yet installed Nessus, please
click here to see the installation guide.) 

Step 1: Creating a Scan


Once you have installed and launched Nessus, you’re ready to start scanning.
First, you have to create a scan. To create your scan:

 In the top navigation bar, click Scans.


 In the upper-right corner of the My Scans page, click the New Scan
button.

Step 2: Choose a Scan Template

Next, click the scan template you want to use. Scan templates simplify the
process by determining which settings are configurable and how they can be
set. For a detailed explanation of all the options available, refer to Scan and
Policy Settings in the Nessus User Guide.

A scan policy is a set of predefined configuration options related to


performing a scan. After you create a policy, you can select it as a template in
the User Defined tab when you create a scan. For more information, see Create
a Policy in the Nessus User Guide.

The Nessus interface provides brief explanations of each template in the


product. Some templates are only available when you purchase a fully licensed
copy of Nessus Professional.

To see a full list of the types of templates available in Nessus, see Scan and
Policy Templates. To quickly get started with Nessus, use the Basic Network
Scan template.

Step 3: Configure Scan Settings


Prepare your scan by configuring the settings available for your chosen
template. The Basic Network Scan template has several default settings
preconfigured, which allows you to quickly perform your first scan and view
results without a lot of effort. 

Follow these steps to run a basic scan:

1. Configure the settings in the Basic Settings section. 

The following are Basic settings:


Setting Description

Specifies the name of the scan or policy. This value is displayed on the Nessus
Name
interface.

Description (Optional) Specifies a description of the scan or policy.

Folder Specifies the folder where the scan appears after being saved.

Specifies one or more targets to be scanned. If you select a target group or upload a
Targets
targets file, you are not required to specify additional targets.

2. Configure remaining settings

Although you can leave the remaining settings at their pre-configured default,
Tenable recommends reviewing the Discovery, Assessment, Report and
Advanced settings to ensure they are appropriate for your environment. 

For more information, see the Scan Settings documentation in the Nessus User


Guide. 

3. Configure Credentials

Optionally, you can configure Credentials for a scan. This allows credentialed
scans to run, which can provide much more complete results and a more
thorough evaluation of the vulnerabilities in your environment. 
4. Launch Scan

After you have configured all your settings, you can either click the Save
button to launch the scan later, or launch the scan immediately. 

If you want to launch the scan immediately, click the   button, and then click
Launch. Launching the scan will also save it.

The time it takes to complete a scan involves many factors, such as network
speed and congestion, so the scan may take some time to run.

Step 4: Viewing Your Results


Viewing scan results can help you understand your organization’s security
posture and vulnerabilities. Color-coded indicators and customizable viewing
options allow you to tailor how you view your scan’s data.

You can view scan results in one of several views:


Page Description

Hosts Displays all scanned targets.

Vulnerabilitie
List of identified vulnerabilities, sorted by severity.
s

If the scan's results include remediation information, this list displays


Remediations
all remediation details, sorted by the number of vulnerabilities.

Notes Displays additional information about the scan and the scan’s results.

History Displays a list of scans: Start Time, End Time, and the Scan Statuses.

Viewing scan results by vulnerabilities gives you a view into potential risks on
your assets.
To view vulnerabilities:

1. In the top navigation bar, click Scans.


2. Click the scan for which you want to view results.
3. Do one of the following:
o Click a specific host to view vulnerabilities found on that host.
o Click the Vulnerabilities tab to view all vulnerabilities.
4. (Optional) To sort the vulnerabilities, click an attribute in the table
header row to sort by that attribute.
5. Clicking on the vulnerability row will open the vulnerability details page,
displaying plugin information and output for each instance on a host.

Step 5: Reporting Your Results


Chances are your job isn’t done yet. You need to report your findings to your
team.

Scan results can be exported in several file formats. Some of these report
formats are customizable, while others are designed to be imported into
another application or product, such as Microsoft Excel or Tenable.sc. For an
explanation of the various report formats and the purpose of each, see
the Nessus User Guide.

To Export a Scan Report:

1. Start from a scan's results page


2. In the upper-right corner, click Export.
3. From the drop-down box, select the format in which you want to export
the scan results.
4. Click Export to download the report.

Reference :

https://www.youtube.com/watch?v=xgSJ4ZcbxMY

You might also like