TOC & Recently Viewed

Recently Viewed Topics

Passive Vulnerability Scanner 3.4.0 Release Notes

Note: Passive Vulnerability Scanner (PVS) is now known as Nessus Network Monitor (NNM).

The following list describes many of the changes that are included in PVS version 3.4.0, the significant issues that have been resolved and notes for upgrading. A PDF file of these release notes is also available here.

Upgrade Notes

General Notes

As with any application, it is always advisable to perform a backup of the installation before upgrading.

Supported Platforms

Support is available for Red Hat ES 4, ES 5 and CentOS 5 64-bit.

Upgrading from 3.2.x

The command syntax for an RPM upgrade is as follows:

# rpm -Uvh [RPM Package File Name]

File Names & MD5 Checksums

File MD5
pvs-3.4.0-es4.i386.rpm e2d348b708c2efeb59129dd85c783395
pvs-3.4.0-es5.i386.rpm c748adda6fe52af06c70dcae91de92e5
pvs-3.4.0-es5.x86_64.rpm 6a8bf20e5d5f67a82c1c28a6d8d04d96
PVS-3.4.0-Dragon-skw.i386.tgz 0bd34aa2e5518f042cd15acb45945ea3

Application Notes

New Features

  • New "exploitability" features for PVS. To maintain consistency with Nessus, PVS also provides new tags in vulnerability reports including: "core", "metasploit", "canvas" and "cvsstemporal" fields
  • Added PVS watchdog capability to PVS Proxy


  • Port scan detection has been removed as part of PVS 3.4's performance enhancements
  • Replaced socket select with active packet wait
  • Reworked encryption detection mechanism
  • Replaced PVS packet filtering with BPF

Copyright © 2019 Tenable, Inc. All rights reserved. Tenable,, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc.., Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.