File and Process Allow List
If you use third-party endpoint security products such as anti-virus applications and host-based intrusion and prevention systems, you should add Tenable Nessus Network Monitor to the allow list.
The following table contains a list of Tenable Nessus Network Monitor folders, files, and processes that should be allowed.
Note: If your Windows installation uses a non-standard drive or folder structure, use the %PROGRAMFILES% and %PROGRAMDATA% environment variables.
Windows |
---|
Files |
C:\Program Files\Tenable\NNM\* |
C:\ProgramData\Tenable\NNM\* |
Processes |
C:\Program Files\Tenable\NNM\nnm.exe |
C:\Program Files\Tenable\NNM\nnm-proxy.exe |
C:\Program Files\Tenable\NNM\nnm-proxy-service.exe |
Linux |
Files (for RHEL 6/CentOS 6 and compatible distributions) |
/opt/nnm/* |
/etc/init.d/nnm |
Files (for RHEL 7/CentOS 7 and later, and compatible distributions like Oracle Linux) |
/opt/nnm/* |
/usr/lib/systemd/system/nnm.service |
/usr/lib/systemd/system/nnm-proxy.service |
Processes |
/opt/nnm/bin/nnm |
/opt/nnm/bin/nnm-proxy |
macOS |
Files |
/Library/NNM/* |
Processes |
/Library/NNM/bin/nnm |
/Library/NNM/bin/nnm-proxy |