Recently Viewed Topics
Welcome to Nessus Network Monitor
Last Updated: January 10, 2018
This user guide describes the Tenable Nessus Network Monitor™ 5.4 (Patent 7,761,918 B2) architecture, installation, operation, integration with SecurityCenter CV
Tip: If you are new to NNM, see the Workflow.
Passive vulnerability scanning is the process of monitoring network traffic at the packet layer to determine topology, clients, applications, and related security issues. NNM also profiles traffic and detects compromised systems.
Detect when systems are compromised with application intrusion detection.
Highlight all interactive and encrypted network sessions.
Detect when new hosts are added to a network.
Track which systems are communicating and on which ports.
Detect which ports are served and which are browsed by each system.
Detect the number of hops to each monitored host.
Tip: For security purposes, Tenable does not recommend configuring NNM as internet facing software.