TOC & Recently Viewed

Recently Viewed Topics

Example: Host Discovery

Knowing what hosts are on your network is the first step to any vulnerability assessment. Launch a host discovery scan to see what hosts are on your network, and associated information such as IP address, FQDN, operating systems, and open ports, if available. After you have a list of hosts, you can choose what hosts you want to target in a specific vulnerability scan.

Hosts discovered by a host discovery scan do not count towards your license limit, if applicable. For more information, see License Utilization.

The following overview describes a typical workflow of creating and launching a host discovery scan, then creating a follow-up scan that target discovered hosts that you choose. In Nessus Essentials and Nessus Professional trials, a wizard walks you through a simplified version of this process. You can always manually launch a host discovery scan or follow-up scan using the workflow outlined in this overview.

Copyright © 2019 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc.. Tenable.sc, Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.