TOC & Recently Viewed

Recently Viewed Topics

Welcome to PVS

Last Updated: June 14, 2017

This user guide describes the Tenable Network Security PVS 5.2 (Patent 7,761,918 B2) architecture, installation, operation, integration with SecurityCenter CV and, and export of data to third parties. Please email any comments and suggestions to

Tip: If you are new to PVS, see the PVS Workflow.

Passive vulnerability scanning is the process of monitoring network traffic at the packet layer to determine topology, clients, applications, and related security issues. PVS can also profile traffic and detect compromised systems.

PVS can:

  • Detect when systems are compromised with application intrusion detection.

  • Highlight all interactive and encrypted network sessions.

  • Detect when new hosts are added to a network.

  • Track which systems are communicating and on which ports.

  • Detect which ports are served and which are browsed by each system.

  • Detect the number of hops to each monitored host.

Tip: For security purposes, Tenable does not recommend configuring PVS as internet facing software.

Copyright © 2017. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.