TOC & Recently Viewed

Recently Viewed Topics

Linux Command Line Operations

You must run all commands with root privileges.

Start, Stop, or Restart Industrial Security

Action Command to Manage Industrial Security

Start

# service industrial-security start

then

# ps aux|grep industrial-security

Stop

# service industrial-security stop

Restart

# service industrial-security restart

File Locations

Industrial Security installs its files in the following locations:

Path

Purpose

/opt/industrial-security

Base directory.

/opt/industrial-security/bin

Location of the Industrial Security and Industrial Security Proxy executables, plus several helper tools for the Industrial Security Proxy daemon.

/opt/industrial-security/docs

Contains the software license agreement for Industrial Security.

/opt/industrial-security/var

Contains the folders for Industrial Security and the Industrial Security-Proxy.

/opt/industrial-security/var/industrial-security

Contains plugins, discovered vulnerabilities, log files, keys, and other miscellaneous items.

db

Contains the database files relating to the configuration, reports, and users for Industrial Security.

kb

Stores the Industrial Security knowledge base, if used.

logs

Contains Industrial Security logs.

plugins

Contains the Industrial Security plugins delivered via the Industrial Security Feed or updated via the command line or web interface if Industrial Security is running in Offline mode.

reports

Contains reports generated by Industrial Security. This folder contains the .nessus file generated by default.

scripts

Contains the files for the Industrial Security Web server.

ssl

Contains SSL certificates used by the proxy and web server for the SSL connection between itself and the web browser.

users

Contains folders for user files and reports.

www

Contains the files for the Industrial Security web front-end.

/opt/industrial-security/var/industrial-security-proxy

Parent folder for files used/created by the Industrial Security proxy.

logs

Contains the Industrial Security proxy and Industrial Security proxy service logs.

scans

 

Copyright 2017 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc.  Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc.  All other products or services are trademarks of their respective owners.