TOC & Recently Viewed

Recently Viewed Topics

Configure PVS

Steps

  1. In a web browser, navigate to https://<ip address or hostname>:8835. The default username and password are both admin. Enter these credentials and click the Sign In To Continue button.

  2. The Change Default Password screen of the Quick Setup window appears, where you can change the default password. The new password must meet the following minimum requirements:

    • Minimum 5 characters long
    • One capital letter
    • One lowercase letter
    • One numeric digit
    • One special character from the following list: !@#$%^&*().
  3. Click the Next Step button.

    The Set Activation Code screen appears.

  4. In the Activation Code box, enter the appropriate text based on your setup:

    • If PVS is acting as a standalone device, enter an Activation Code.
    • If PVS is managed by SecurityCenter CV, enter the text SecurityCenter.

    -or-

    If PVS is registered offline, select the Register Offline check box and follow the Register PVS Offline instructions.

  5. Click the Next Step button.

    The Monitoring Configuration screen appears.

    • The Monitored Network Interfaces box displays those monitored interfaces PVS has identified. You can select one or more of the defined interfaces. The caret icon displays additional information about each interface.

    • The Monitored Network IP Addresses and Ranges box displays the IP address ranges PVS monitors.

    • The Excluded Network IP Addresses and Ranges box displays the IP address ranges PVS does not monitor.

      The Monitored Network IP Addresses and Ranges and Excluded Network IP Addresses and Ranges boxes accept both IPv4 and IPv6 CIDR address definitions. When multiple addresses are used, separate the entries using commas or new lines.

  6. Click the Finish button.

    The Monitoring page appears. Once PVS has started monitoring traffic, the page displays various high-level charts about the vulnerabilities, assets, connections, and bandwidth usage that PVS has detected, as well as real-time events that PVS has triggered.

Copyright © 2017. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.