TOC & Recently Viewed

Passive Vulnerability Scanner 4.0.2 Release Notes - 4/2/2014

Note: Passive Vulnerability Scanner (PVS) is now known as Nessus Network Monitor (NNM).

The document describes the changes that are introduced in PVS 4.0.2, as well as significant issues that have been resolved and notes for upgrading. A PDF file of these release notes is also available here.

Upgrade Notes

  • PVS 4.0 will automatically import configuration from pvs.conf and pvs-proxy.conf into a database. More details are available in the PVS 4.0 User Guide.
  • Copy the existing PVS license key file from the existing PVS to the workstation the initial setup will be completed from as the key will be requested during completion of the setup wizard
  • PVS 4.0 is compatible with SecurityCenter 4.6 and later.

Stop the PVS daemon before performing the upgrade:
# /etc/init.d/pvs stop

The command syntax for an RPM upgrade is as follows:
# rpm -Uvh [RPM Package File Name]

Supported Platforms

Support is available for the following platforms:

  • Red Hat Linux ES 5 / CentOS 5 32/64-bit
  • Red Hat Linux ES 6 / CentOS 6 32/64-bit
  • Mac OS X 10.8 and 10.9 64-bit
  • Microsoft Windows Vista, 7, 8, Server 2008, and Server 2012 32/64-bit

The Microsoft Visual C++ Redistributable package is a prerequisite that needs to be installed on Windows before installing PVS. Refer to the documentation for more information.

File Names & MD5 Checksums

File MD5
pvs-4.0.2-es5.i386.rpm 6be15eeb78655386f493925418407921
pvs-4.0.2-es5.x86_64.rpm 04d3e7af265d7d8deba25894ca3077c5
pvs-4.0.2-es6.i386.rpm 8ca438db87f220d5dddd70224bf5998a
pvs-4.0.2-es6.x86_64.rpm 1a0748c1954805a2b346ceaeb90e5535
pvs-4.0.2-i386.exe b077b071906c4b8472544699a4f0765a
pvs-4.0.2-x64.exe 05e3a78a0ce2d4dae39afc4ffe0e2aba
pvs-4.0.2-osx.dmg 411fbf1dff9145f9f607e6837c4219c6

What's New

Includes the following improvements and bug fixes:

  • Expired PVS licenses or activation codes now returns the user to the Quick-Setup wizard to allow a new license to be entered
  • The "External Access" tag was missing from hosts with Internet facing vulnerabilities. This has been added into the plugin output
  • Relaxed the Password complexity requirements on the Web Proxy Password setting
  • Relaxed the port setting restrictions for "Web Proxy Port" to allow ports below 1024 to be specified
  • Fixed a filtering issue on the "Affected Host List"
  • Fixed a dependency issue that caused some PASL script false positives
  • Made multiple improvements to the plugin evaluation logic
  • Removed non-printable characters from the data provided from some PASL scripts

Copyright 2017. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.