TOC & Recently Viewed

Recently Viewed Topics

Security Considerations

When deploying the Tenable Appliance in an internal, external, or untrusted environment, it is strongly recommended that additional security precautions be taken to protect the device from attack and illicit use. Consider implementing the following recommendations:

  • Use a signed SSL Certificate from a trusted and reliable Certificate Authority.
  • Configure user rules that restrict scanning to IP addresses they are permitted to scan. Adopt a “default deny” policy for user roles and scanning activity.
  • When configuring the device via the web interface, avoid using a web proxy or other device that may assist a third party in obtaining sensitive information.

Copyright © 2017. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.