Recently Viewed Topics
Passive Vulnerability Scanner 4.0 Release Notes - 9/12/2013
Note: Passive Vulnerability Scanner (PVS) is now known as Nessus Network Monitor (NNM).
The document describes the changes that are introduced in PVS 4.0, as well as significant issues that have been resolved and notes for upgrading. A PDF file of these release notes is also available here.
- PVS 4.0 will automatically import configuration from pvs.conf and pvs-proxy.conf into a database. More details are available in the PVS 4.0 User Guide.
- Copy the existing PVS license key file from the existing PVS to the workstation the initial setup will be completed from as the key will be requested during completion of the setup wizard
- PVS 4.0 is compatible with SecurityCenter 4.6 and later.
Stop the PVS daemon before performing the upgrade:
# /etc/init.d/pvs stop
The command syntax for an RPM upgrade is as follows:
# rpm -Uvh [RPM Package File Name]
Support is available for the following platforms:
- Red Hat Linux ES 5 / CentOS 5 32/64-bit
- Red Hat Linux ES 6 / CentOS 6 32/64-bit
- Microsoft Windows Vista, 7, 8, Server 2008, and Server 2012 32/64-bit
The Microsoft Visual C++ Redistributable package is a prerequisite which needs to be installed on Windows before installing PVS. Refer to the documentation for more information.
File Names & MD5 Checksums
- New User Interface - a new HTML5 web based interface, similar to the Nessus HTML front-end, for configuration, management, and reporting allows PVS to be utilized in a stand-alone mode
- Simplified installation - After installation point your web browser to https://[ip address]:8835 to perform the initial configuration through a quick setup wizard. Then explore the new interface and complete further configuration options as needed.
- Reporting on live monitored traffic - Easy and detailed visibility into discovered hosts, vulnerabilities, applications, connections, and operating systems in real-time
- Web-based data export - multiple file formats (.csv, .nessus, .html) supported
- Automatic snapshots - network discovery and vulnerability data provides visibility into changes over time
- PVS now ciphers all of the report and configuration data
- The use of pvs.conf and pvs-proxy.conf is now deprecated in favor of a sqlite-based database (config.db).
- Support for plugin feed activation codes allows for new annual subscription based license options
- Support for automatic updates of PVS Web Server and PVS HTML Client in stand-alone mode.
- Uses Nessus (NASL) web server and similar RESTful API. The list of web API calls will be added to the documentation in the near future.
- Ability to upload and browse reports from PVS 3.6 and later
- Command line options to register and configure PVS, and update plugins
- Added support for vulnerabilities with a critical severity
- Reduced memory footprint
- Added complexity checks for passwords
- Added support for Windows 8 and Windows Server 2012
- Upgraded libpcap to 1.4.0 for Linux versions and WinPcap to 4.1.3 for Windows versions