Note: Passive Vulnerability Scanner (PVS) is now known as Nessus Network Monitor (NNM).
This document describes the new features and improvements that are introduced in PVS 4.4.0. A PDF file of these release notes is also available here.
- Refer to the PVS 4.4 User Guide for details on upgrading to PVS 4.4.0.
- PVS 4.4.0 is compatible with SecurityCenter 4.7.x and later.
- The HTML5 User Interface is automatically updated to version 1.4.0 via a plugin update.
Support is available for the following platforms:
- Red Hat Linux ES 5 / CentOS 5 64-bit
- Red Hat Linux ES 6 / CentOS 6 64-bit
- Red Hat Linux ES 7 / CentOS 7 64-bit
- Mac OS X 10.8 and 10.9 64-bit
- Microsoft Windows Vista, 7, 8, Server 2008, and Server 2012 64-bit
The Microsoft Visual C++ 2010 Redistributable Package is a prerequisite that needs to be installed on Windows before installing PVS. Refer to the documentation for more information.
File Names & MD5 Checksums
- Support for launching basic network Nessus scan - PVS 4.4.0 provides the ability to launch an active basic network Nessus scan on hosts monitored by PVS. This feature integrates with Nessus 6.4 or above, as it requires API keys.
- New results views and charts for Mobile devices - New Mobile results views have been added to the user interface that provide visibility into mobile devices discovered and their attributes such as device model and operating system, their vulnerabilities and applications discovered running on them. A few distribution charts by device model, operating system and mobile applications have also been added.
- Support for email notifications containing a summary of monitored results - Email notifications can be configured and sent that contain summarized reports of discovered hosts, vulnerabilities, applications and operating systems.
- Red Hat 7 support for High Performance mode (10 Gbps) - High Performance mode PVS is now supported on RHEL 7.
- Support for CVSS v3.0 - PVS supports the new vectors and scores introduced in CVSS v3.0.
- Support for DNS hostnames and NETBIOS name reporting - PVS can now use reverse DNS lookups to determine the hostname for monitored hosts. The DNS lookups are enabled by default and can be disabled by setting the "DNS Queries Per Interval" parameter to 0. The DNS hostnames and NETBIOS names are reported in .nessus reports. The ability to view the hostname in the user interface will be available in a future release.
- Added the ability to switch the performance mode from the user interface.
- Improved the realtime events view in the user interface.
- Lock user interface user accounts only if the maximum number of failed login attempts has been exceeded over a 24-hour period.
- Fixed an issue where SecurityCenter would continually report PVS status as "Updating Plugins".
- Upgraded SQLite to 188.8.131.52.
- Upgraded OpenSSL to 1.0.2d.