File and Process Allow List

If you use third-party endpoint security products such as anti-virus applications and host-based intrusion and prevention systems, you should add Tenable Nessus Network Monitor to the allow list.

The following table contains a list of Tenable Nessus Network Monitor folders, files, and processes that should be allowed.

Note: If your Windows installation uses a non-standard drive or folder structure, use the %PROGRAMFILES% and %PROGRAMDATA% environment variables.

Windows

Files

C:\Program Files\Tenable\NNM\*

C:\ProgramData\Tenable\NNM\*

Processes

C:\Program Files\Tenable\NNM\nnm.exe

C:\Program Files\Tenable\NNM\nnm-proxy.exe

C:\Program Files\Tenable\NNM\nnm-proxy-service.exe

Linux

Files (for RHEL 6/CentOS 6 and compatible distributions)

/opt/nnm/*

/etc/init.d/nnm

Files (for RHEL 7/CentOS 7 and later, and compatible distributions like Oracle Linux)

/opt/nnm/*

/usr/lib/systemd/system/nnm.service

/usr/lib/systemd/system/nnm-proxy.service

Processes

/opt/nnm/bin/nnm

/opt/nnm/bin/nnm-proxy

macOS

Files

/Library/NNM/*

Processes

/Library/NNM/bin/nnm

/Library/NNM/bin/nnm-proxy