Example: Host Discovery

Knowing what hosts are on your network is the first step to any vulnerability assessment. Launch a host discovery scan to see what hosts are on your network, and associated information such as IP address, FQDN, operating systems, and open ports, if available. After you have a list of hosts, you can choose what hosts you want to target in a specific vulnerability scan.

Hosts discovered by a host discovery scan do not count towards your license limit, if applicable. For more information, see License Utilization.

The following overview describes a typical workflow of creating and launching a host discovery scan, then creating a follow-up scan that target-discovered hosts that you choose. In Tenable Nessus Essentials and Tenable Nessus Professional trials, a wizard walks you through a simplified version of this process. You can always manually launch a host discovery scan or follow-up scan using the workflow outlined in this overview.