TOC & Recently Viewed

Recently Viewed Topics

Passive Vulnerability Scanner 4.0 Release Notes - 9/12/2013

Note: Passive Vulnerability Scanner (PVS) is now known as Nessus Network Monitor (NNM).

The document describes the changes that are introduced in PVS 4.0, as well as significant issues that have been resolved and notes for upgrading. A PDF file of these release notes is also available here.

Upgrade Notes

  • PVS 4.0 will automatically import configuration from pvs.conf and pvs-proxy.conf into a database. More details are available in the PVS 4.0 User Guide.
  • Copy the existing PVS license key file from the existing PVS to the workstation the initial setup will be completed from as the key will be requested during completion of the setup wizard
  • PVS 4.0 is compatible with SecurityCenter 4.6 and later.

Stop the PVS daemon before performing the upgrade:
# /etc/init.d/pvs stop

The command syntax for an RPM upgrade is as follows:
# rpm -Uvh [RPM Package File Name]

Supported Platforms

Support is available for the following platforms:

  • Red Hat Linux ES 5 / CentOS 5 32/64-bit
  • Red Hat Linux ES 6 / CentOS 6 32/64-bit
  • Microsoft Windows Vista, 7, 8, Server 2008, and Server 2012 32/64-bit

The Microsoft Visual C++ Redistributable package is a prerequisite which needs to be installed on Windows before installing PVS. Refer to the documentation for more information.

File Names & MD5 Checksums

File MD5
pvs-4.0.0-es5.i386.rpm 369f5228cbc3d100ca6b6c3a2eee86fc
pvs-4.0.0-es5.x86_64.rpm d1be1bc30b4cdff12cb0bae9b4ed0c16
pvs-4.0.0-es6.i386.rpm 030fb600692a2c25b6c5b4bef91dba31
pvs-4.0.0-es6.x86_64.rpm f9e35cc308330ad411419e1f96f45a04
pvs-4.0.0-i386.exe f2ec2b9623ab7a79b312ccb9799afa75
pvs-4.0.0-x64.exe 2e61da2ad0e5b6e0ecf7a1ced3fdb49e

What's New

  • New User Interface - a new HTML5 web based interface, similar to the Nessus HTML front-end, for configuration, management, and reporting allows PVS to be utilized in a stand-alone mode
  • Simplified installation - After installation point your web browser to https://[ip address]:8835 to perform the initial configuration through a quick setup wizard. Then explore the new interface and complete further configuration options as needed.
  • Reporting on live monitored traffic - Easy and detailed visibility into discovered hosts, vulnerabilities, applications, connections, and operating systems in real-time
  • Web-based data export - multiple file formats (.csv, .nessus, .html) supported
  • Automatic snapshots - network discovery and vulnerability data provides visibility into changes over time

Additional Improvements

  • PVS now ciphers all of the report and configuration data
  • The use of pvs.conf and pvs-proxy.conf is now deprecated in favor of a sqlite-based database (config.db).
  • Support for plugin feed activation codes allows for new annual subscription based license options
  • Support for automatic updates of PVS Web Server and PVS HTML Client in stand-alone mode.
  • Uses Nessus (NASL) web server and similar RESTful API. The list of web API calls will be added to the documentation in the near future.
  • Ability to upload and browse reports from PVS 3.6 and later
  • Command line options to register and configure PVS, and update plugins
  • Added support for vulnerabilities with a critical severity
  • Reduced memory footprint
  • Added complexity checks for passwords
  • Added support for Windows 8 and Windows Server 2012
  • Upgraded libpcap to 1.4.0 for Linux versions and WinPcap to 4.1.3 for Windows versions

Copyright 2017 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc.  Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc.  All other products or services are trademarks of their respective owners.