Install a Nessus Agent on macOS
Caution: If you install a Tenable Nessus Agent on a system where an existing Tenable Nessus Agent, Tenable Nessus Manager, or Tenable Nessus scanner is running nessusd
, the installation process kills all other nessusd
processes. You may lose scan data as a result.
Before You Begin
- Retrieve the Nessus Agents linking key. For more information, see the Tenable Nessus User Guide or the Tenable Vulnerability Management User Guide, depending on what manager you use.
- If you previously had the Tenable Nessus Agent installed on your system, see the knowledge base article on how to avoid linking errors.
Download Nessus Agent
From the Nessus Agents Download Page, download the package specific to your operating system.

NessusAgent-<version number>.dmg
Install Nessus Agent
Note: You need root privileges to perform the following steps.
To install the Tenable Nessus Agent, you can use either the GUI installation wizard or the command line.
GUI Installation:
- Double-click the Nessus Agent .dmg (macOS disk image) file.
- Double-click Install Nessus Agent.pkg.
- Complete the Nessus Agent Install Wizard.
Command Line Installation:
- Extract
Install Nessus Agent.pkg
and.NessusAgent.pkg
fromNessusAgent-<version number>.dmg
.Note: The .NessusAgent.pkg file is normally invisible in macOS Finder. - Open Terminal.
- From the command line, enter the following command:
You can install a full plugins set before linking to reduce the bandwidth impact during a mass installation. You can accomplish this by using the nessuscli agent update command with the --file parameter, which specifies the location the plugins set. You must do this before starting the Tenable Nessus Agent. For example:
The plugins set must be less than five days old. A stale plugin set older than five days forces a full plugins download to occur. You can download a recent plugin set from the Nessus Agents download page.
Link Agent Using Command Line Interface
To link an agent on macOS:
- Open Terminal.
-
From the command line, use the
nessuscli agent link
command.For example:
# sudo /Library/NessusAgent/run/sbin/nessuscli agent link
--key=00abcd00000efgh11111i0k222lmopq3333st4455u66v777777w88xy9999zabc00
--name=MyOSXAgent --groups=All --host=yourcompany.com --port=8834The supported arguments for this command are:
Argument Required? Value --key yes
Use the values you retrieved from the manager. --host yes --port yes --name
no Specify a name for your agent. If you do not specify a name for your agent, the name defaults to the name of the computer where you are installing the agent. --groups no Specify existing agent group or groups where you want to add the agent. If you do not specify an agent group during the install process, you can add your linked agent to an agent group later in Tenable Nessus Manager or Tenable Vulnerability Management.
Note: The agent group name is case-sensitive and must match exactly.
--offline-install no For Nessus Agents 7.0.3 or later, you can install the Tenable Nessus Agent on a system even if it is offline. Add the command line option NESSUS_OFFLINE_INSTALL="yes" to the command line input. The Tenable Nessus Agent periodically attempts to link itself to either Tenable Vulnerability Management or Tenable Nessus Manager.
If the agent cannot connect to the controller then it retries every hour, and if the agent can connect to the controller but the link fails then it retries every 24 hours.
--cloud no Specify the --cloud argument to link to Tenable Vulnerability Management.
The --cloud argument is a shortcut to specifying --host=cloud.tenable.com --port=443.
--network no For Tenable.io-linked agents, add the agent to a custom network. If you do not specify a network, the agent belongs to the default network.
Note: If you attempt to clone an agent and link it to Tenable Nessus Manager or Tenable Vulnerability Management, a 409 error may appear. This error appears because another machine was linked with the same UUID value in the /private/etc/tenable_tag
file. To resolve this issue, replace the value in the /private/etc/tenable_tag
file with a valid UUIDv4 value.
Note: For more information about linking agents to Tenable Vulnerability Management, see Link a Sensor in the Tenable.io User Guide.
Verify a Linked Agent
To verify a linked agent in Tenable Vulnerability Management:
-
In the upper-left corner, click the
button.
The left navigation plane appears.
-
In the left navigation plane, click Settings.
The Settings page appears.
-
Click the Sensors tile.
The Sensors page appears. By default, Nessus Scanners is selected in the left navigation menu and the Cloud Scanners tab is active.
-
In the left navigation menu, click Nessus Agents.
The Nessus Agents page appears and the Linked Agents tab is active.
-
Locate the new agent in the linked agents table.
To verify a linked agent in Tenable Nessus Manager:
-
In the top navigation bar, click Sensors.
The Linked Agents page appears.
-
Locate the new agent in the linked agents table.