File and Process Allow List
If you use third-party endpoint security products such as anti-virus applications and host-based intrusion and prevention systems, you should add Tenable Network Monitor to the allow list.
The following table contains a list of Tenable Network Monitor folders, files, and processes that should be allowed.
Note: If your Windows installation uses a non-standard drive or folder structure, use the %PROGRAMFILES% and %PROGRAMDATA% environment variables.
|
Windows |
|---|
|
Files |
|
C:\Program Files\Tenable\NNM\* |
|
C:\ProgramData\Tenable\NNM\* |
|
Processes |
|
C:\Program Files\Tenable\NNM\nnm.exe |
|
C:\Program Files\Tenable\NNM\nnm-proxy.exe |
|
C:\Program Files\Tenable\NNM\nnm-proxy-service.exe |
|
Linux |
|
Files (for RHEL 6/CentOS 6 and compatible distributions) |
|
/opt/nnm/* |
|
/etc/init.d/nnm |
|
Files (for RHEL 7/CentOS 7 and later, and compatible distributions like Oracle Linux) |
|
/opt/nnm/* |
|
/usr/lib/systemd/system/nnm.service |
|
/usr/lib/systemd/system/nnm-proxy.service |
|
Processes |
|
/opt/nnm/bin/nnm |
|
/opt/nnm/bin/nnm-proxy |
|
macOS |
|
Files |
|
/Library/NNM/* |
|
Processes |
|
/Library/NNM/bin/nnm |
|
/Library/NNM/bin/nnm-proxy |