TOC & Recently Viewed

Recently Viewed Topics

Create a Scan

This procedure can be performed by a standard user or administrator.

  1. On the top navigation bar, click the Scans button.

    The My Scans page appears.

  2. In the upper-right corner, click the New Scan button.

    The Scan Templates page appears.

  3. Select the template you want to use for your scan:

    Note: The Advanced Network Scan template is used to configure a scan without any recommendations.

    Note: The Audit Cloud Infrastructure template is used to audit the configuration of third-party cloud services.

    Note: The Badlock Detection template is used for remote and local checks for CVE-2016-2118 and CVE-2016-0128.

    Note: The Bash Shellshock Detection template is used for remote and local checks for CVE-2014-6271 and CVE-2014-7169.

    Note: The Basic Network Scan template is used for a full system scan that is suitable for any host. For example, you could use this template to perform an internal vulnerability scan on your organization's systems.

    Note: The Basic Web App Scan template is used to scan web applications with a Nessus scanner.

    Note: The Credentialed Patch Audit template is used to authenticate hosts and enumerate missing updates.

    Note: The DROWN Detection template is used for remote checks for CVE-2016-0800.

    Note: The Host Discovery template is used for a simple scan to discover live hosts and open ports.

    Note: The Internal PCI Network Scan is used to perform an internal PCI DSS (11.2.1) vulnerability scan.

    Note: The Malware Scan template is used to scan for malware on Windows and Unix systems.

    Note: The MDM Config Audit template is used to audit the configuration of mobile device managers.

    Note: The Mobile Device Scan template is used to assess mobile devices via Microsoft Exchange or an MDM.

    Note: The Offline Config Audit template is used to audit the configuration of network devices.

    Note: The PCI Quarterly External Scan template is approved for quarterly external scanning as required by PCI.

    Note: The Policy Compliance Auditing template is used to audit system configurations against a known baseline.

    Note: The SCAP and OVAL Auditing template is used to audit systems using SCAP and OVAL definitions.

  4. Configure the scan:

    1. In the Name box, type a name for the scan.
    2. In the Targets box, type an IP address, hostname, or range of IP addresses.
    3. Click the Scanner box. Select the scanner or scanner group that you want to perform the scan.
    4. If desired, modify the following settings. Otherwise, leave the scan's default settings.

      Settings
      All Settings

      All Basic Settings

      Report: Output

      Basic: General, Permissions

      Discovery: Port Scanning

      Assessment: General, Windows, Malware

      All Report groups

      Advanced: Debug Settings

      All Basic Settings

      Discovery: Scan Type

      Assessment: Web Applications

      Report: Output

      All Advanced Settings

      All Basic Settings

      Discovery: Scan Type

      Assessment: General, Brute Force, Web Applications, Windows

      All Report groups

      Advanced: Scan Type

      All Basic Settings

      Discovery: Scan Type

      Assessment: General, Web Applications

      All Report groups

      Advanced: Scan Type

      All Basic Settings

      Discovery: Scan Type

      Assessment: Brute Force, Windows, Malware

      All Report groups

      Advanced: Scan Type

      All Basic Settings

      Discovery: Scan Type

      Report: Output

      Advanced: General, Performance, Debug

      All Basic Settings

      Discovery: Scan Type

      Report: Output

      All Basic Settings

      Discovery: Scan Type

      Assessment: General, Brute Force, Web Applications, Windows

      All Report groups

      Advanced: Scan Type

      All Basic Settings

      Discovery: Scan Type

      Assessment: Malware

      Report: Output

      Advanced: Scan Type

      All Basic Settings

      Report: Output

      All Basic Settings

      All Report groups

      Advanced: Debug

      All Basic Settings

      Report: Output

      Advanced: Debug

      All Basic Settings

      Discovery: Host Discovery

      Advanced: Scan Type

      All Basic Settings

      Discovery: Scan Type

      Report: Output

      Advanced: Scan Type

      All Basic Settings

      Discovery: Host Discovery

      All Report groups

      Advanced: Scan Type

    5. If you want to perform a credentialed scan, click the Credentials tab. Specify the credentials that you want to use for the scan.

      Credentials
      All Credentials
      Cloud Services

      SSH

      Windows

      Database

      Host

      Miscellaneous

      Patch Management

      Plaintext Authentication

      Database

      Host

      Miscellaneous

      Patch Management

      Plaintext Authentication

      HTTP

      SSH

      Windows

      None
      None
      SSH

      Windows

      Patch Management

      SSH

      Windows

      Mobile

      Miscellaneous

      Mobile

      None
      None

      Database

      SSH

      Windows

      Miscellaneous

      Mobile

      SSH

      Windows

    6. If you want to use the scan to audit compliance, click the Compliance tab, and then specify which of the following platforms you want to audit. Tenable Network Security provides best practice audits for each platform. Additionally, you can upload a custom audit file.

      Compliance/SCAP Required Credentials
      All Any credentials corresponding to the selected audits.

      AWS

      Microsoft Azure

      Rackspace

      Salesforce.com

      The corresponding Cloud Services credentials.

      None

      None

      None None
      None None
      None None
      None None
      None None
      None None
      None None
      None None
      Mobile Device Manager The corresponding AirWatch, Apple Profile Manager, or MobileIron credentials.
      None None

      Adtran AOS

      Bluecoat ProxySG

      Brocade Fabricos

      Check Point Gaia

      Cisco IOS

      Dell Force10 FTOS

      Extreme ExtremeXOS

      FireEye

      Fortigate Fortios

      HP Procurve

      Huawei VRP

      Juniper Junos

      Netapp Data Ontap

      SonicWALL SonicOs

      WatchGuard

      SSH
      None None
      All Any credentials corresponding to the selected audits.

      Linux (SCAP)

      Linux (OVAL)

      Windows (SCAP)

      Windows (OVAL)

      None
  5. If you wish to save the scan to launch at a later date, click Save.

    The scan saves.

    -or-

    If you want to launch the scan immediately, click the down button, and then click Launch.

    The scan saves and launches.

Copyright © 2017. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.