TOC & Recently Viewed

Recently Viewed Topics

Passive Vulnerability Scanner 4.0.1 Release Notes - 1/29/2014

Note: Passive Vulnerability Scanner (PVS) is now known as Nessus Network Monitor (NNM).

The document describes the changes that are introduced in PVS 4.0.1, as well as significant issues that have been resolved and notes for upgrading. A PDF file of these release notes is also available here.

Upgrade Notes

  • PVS 4.0 will automatically import configuration from pvs.conf and pvs-proxy.conf into a database. More details are available in the PVS 4.0 User Guide.
  • Copy the existing PVS license key file from the existing PVS to the workstation the initial setup will be completed from as the key will be requested during completion of the setup wizard
  • PVS 4.0 is compatible with SecurityCenter 4.6 and later.

Stop the PVS daemon before performing the upgrade:
# /etc/init.d/pvs stop

The command syntax for an RPM upgrade is as follows:
# rpm -Uvh [RPM Package File Name]

Supported Platforms

Support is available for the following platforms:

  • Red Hat Linux ES 5 / CentOS 5 32/64-bit
  • Red Hat Linux ES 6 / CentOS 6 32/64-bit
  • Mac OS X 10.8 and 10.9 64-bit
  • Microsoft Windows Vista, 7, 8, Server 2008, and Server 2012 32/64-bit

The Microsoft Visual C++ Redistributable package is a prerequisite which needs to be installed on Windows before installing PVS. Refer to the documentation for more information.

File Names & MD5 Checksums

File MD5
pvs-4.0.1-es5.i386.rpm dd6fa5b45f56672221eda1b3b53caaaa
pvs-4.0.1-es5.x86_64.rpm fda285ab12867be218b74697881f8de9
pvs-4.0.1-es6.i386.rpm f1c772ff26462d1cc7fa1375a63f40a5
pvs-4.0.1-es6.x86_64.rpm 512f8f7996a44682cb87228dbe3ed724
pvs-4.0.1-i386.exe d819de511ae4f35ccc5365edebb44f8c
pvs-4.0.1-x64.exe 78bb25ec014e1cc2ad028d5faf987a1d
pvs-4.0.1-osx.dmg 3cd910520a5d165b344e9b0690a47658

What's New

  • License Change: Removed the 16 IP limit for evaluation and now provide a full product evaluation for 30-days
  • Added new OS platform support for Mac OS X 10.8 and 10.9
  • Added new result filtering options for CPE, IAVM, and STIG Severity
  • Added reporting of the confidence level and detection method to OS Fingerprinting plugin output
  • Logs failed / successful login attempts to the admin log
  • Changed the syslog format for Encrypted/Interactive sessions to match the other internally generated events
  • Adds a connection count to the plugin output for internal client/server connection summary
  • Improved resource utilization
  • Expanded the size of the input field for monitored networks
  • Added plugin output to real-time PASL syslog
  • Fixed an issue when monitoring inactive interfaces that stopped monitoring
  • Fixed an issue that generated a malformed report which would fail to import into SecurityCenter
  • Fixed an issue on upgrades that did not import the syslog host and vlan settings correctly

PVS Web Server / Client UI Changes

These are not specific to 4.0.1:

  • Added a link in the application and operating system tabs to enable pivoting back to a list of vulnerabilities for a given host
  • Changed to reflect the new Nessus severity color scheme
  • Added support for UI classification banners

Copyright 2017 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc.  Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc.  All other products or services are trademarks of their respective owners.