TOC & Recently Viewed

Recently Viewed Topics

Credentialed Checks on Unix

The process described in this section enables you to perform local security checks on Unix based systems. The SSH daemon used in this example is OpenSSH. If you have a commercial variant of SSH, your procedure may be slightly different.

To enable local security checks, there are two basic methods that can be used:

  1. Use of a SSH private/public key pair
  2. User credentials and sudo access or credentials for su access

Copyright © 2017. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.