Passive Vulnerability Scanner 4.0.1 Release Notes - 1/29/2014
Note: Passive Vulnerability Scanner (PVS) is now known as Nessus Network Monitor (NNM).
The document describes the changes that are introduced in PVS 4.0.1, as well as significant issues that have been resolved and notes for upgrading. A PDF file of these release notes is also available here.
- PVS 4.0 will automatically import configuration from pvs.conf and pvs-proxy.conf into a database. More details are available in the PVS 4.0 User Guide.
- Copy the existing PVS license key file from the existing PVS to the workstation the initial setup will be completed from as the key will be requested during completion of the setup wizard
- PVS 4.0 is compatible with SecurityCenter 4.6 and later.
Stop the PVS daemon before performing the upgrade:
# /etc/init.d/pvs stop
The command syntax for an RPM upgrade is as follows:
# rpm -Uvh [RPM Package File Name]
Support is available for the following platforms:
- Red Hat Linux ES 5 / CentOS 5 32/64-bit
- Red Hat Linux ES 6 / CentOS 6 32/64-bit
- Mac OS X 10.8 and 10.9 64-bit
- Microsoft Windows Vista, 7, 8, Server 2008, and Server 2012 32/64-bit
The Microsoft Visual C++ Redistributable package is a prerequisite which needs to be installed on Windows before installing PVS. Refer to the documentation for more information.
File Names & MD5 Checksums
- License Change: Removed the 16 IP limit for evaluation and now provide a full product evaluation for 30-days
- Added new OS platform support for Mac OS X 10.8 and 10.9
- Added new result filtering options for CPE, IAVM, and STIG Severity
- Added reporting of the confidence level and detection method to OS Fingerprinting plugin output
- Logs failed / successful login attempts to the admin log
- Changed the syslog format for Encrypted/Interactive sessions to match the other internally generated events
- Adds a connection count to the plugin output for internal client/server connection summary
- Improved resource utilization
- Expanded the size of the input field for monitored networks
- Added plugin output to real-time PASL syslog
- Fixed an issue when monitoring inactive interfaces that stopped monitoring
- Fixed an issue that generated a malformed report which would fail to import into SecurityCenter
- Fixed an issue on upgrades that did not import the syslog host and vlan settings correctly
PVS Web Server / Client UI Changes
These are not specific to 4.0.1:
- Added a link in the application and operating system tabs to enable pivoting back to a list of vulnerabilities for a given host
- Changed to reflect the new Nessus severity color scheme
- Added support for UI classification banners