Welcome to Tenable Nessus Network Monitor

Last Updated: June 12, 2024

This user guide describes the Tenable Nessus Network Monitor® (formerly known as NNM) 6.0.x (Patent 7,761,918 B2) architecture, installation, operation, and integration with Tenable Security Center and Tenable Vulnerability Management, and export of data to third parties. For assistance, contact Tenable Support.

Tip: If you are new to Tenable Nessus Network Monitor, see the Workflow.

Passive vulnerability scanning is the process of monitoring network traffic at the packet layer to determine topology, clients, applications, and related security issues. Tenable Nessus Network Monitor also profiles traffic and detects compromised systems.

Tenable Nessus Network Monitor can:

  • Detect when systems are compromised with application intrusion detection.

  • Highlight all interactive and encrypted network sessions.

  • Detect when new hosts are added to a network.

  • Track which systems are communicating on which ports.

  • Detect which ports are served and which are browsed by each system.

  • Detect the number of hops to each monitored host.

Note: For security purposes, Tenable® does not recommend configuring Tenable Nessus Network Monitor as internet facing software.