Scan Templates
Scan templates contain granular configuration settings for your scans. You can use Tenable's scan templates to create custom scan configurations for your organization. Then, you can run scans based on Tenable's scan templates or your custom configurations' settings.
When you create a scan configuration, the Select a Scan Template page appears. Tenable Vulnerability Management provides separate templates for Tenable Vulnerability Management and Tenable Web App Scanning. Within Tenable Vulnerability Management scanning, Tenable Vulnerability Management provides separate templates for scanners and agents, depending on which sensor you want to use for scanning:
If you have custom configurations, they appear in the User Defined tab. For more information about user-defined templates, see User-Defined Templates.
When you configure a Tenable-provided scan template, you can modify only the settings included for the scan template type. When you create a user-defined scan template, you can modify a custom set of settings for your scan.
For descriptions of all scan template settings, see Scan Settings.
Tenable-Provided Tenable Nessus Scanner Templates
There are three scanner template categories in Tenable Vulnerability Management:
-
Vulnerability Scans (Common) — Tenable recommends using vulnerability scan templates for most of your organization's standard, day-to-day scanning needs.
-
Configuration Scans — Tenable recommends using configuration scan templates to check whether host configurations are compliant with various industry standards. Configuration scans are sometimes referred to as compliance scans. For more information about the checks that compliance scans can perform, see Compliance in Tenable Vulnerability Management Scans and SCAP Settings in Tenable Vulnerability Management Scans.
-
Tactical Scans — Tenable recommends using the tactical scan templates to scan your network for a specific vulnerability or group of vulnerabilities. Tactical scans are lightweight, timely scan templates that you can use to scan your assets for a particular vulnerability. Tenable frequently updates the Tenable Vulnerability Management Tactical Scans library with templates that detect the latest vulnerabilities of public interest, such as Log4Shell.
The following table describes the available Tenable Nessus Scanner templates:
Template | Description |
---|---|
Vulnerability Scans (Common) | |
Advanced Network Scan |
The most configurable scan type. You can configure this scan template to match any policy. This template has the same default settings as the basic scan template, but it allows for additional configuration options. Note: Advanced scan templates allow Tenable Vulnerability Management experts to scan more deeply using custom configuration, such as faster or slower checks, but misconfigurations can cause asset outages or network saturation. Use the advanced templates with caution. Note: Tenable automatically updates this template with any newly-released plugin families in which plugins rely on network traffic for detection. |
Basic Network Scan |
Performs a full system scan that is suitable for any host. Use this template to scan an asset or assets with all of Nessus's plugins enabled. For example, you can perform an internal vulnerability scan on your organization's systems. |
Credentialed Patch Audit |
Authenticates hosts and enumerates missing updates. Use this template with credentials to give Tenable Vulnerability Management direct access to the host, scan the target hosts, and enumerate missing patch updates. |
Host Discovery |
Performs a simple scan to discover live hosts and open ports. Launch this scan to see what hosts are on your network and associated information such as IP address, FQDN, operating systems, and open ports, if available. After you have a list of hosts, you can choose what hosts you want to target in a specific vulnerability scan. Tenable recommends that organizations who do not have a passive network monitor, such as Tenable Nessus Network Monitor, run this scan weekly to discover new assets on your network. Note: Assets identified by discovery scans do not count toward your license. |
Internal PCI Network Scan |
Performs an internal PCI DSS (11.2.1) vulnerability scan. This template creates scans that you can use to satisfy internal (PCI DSS 11.2.1) scanning requirements for ongoing vulnerability management programs that satisfy PCI compliance requirements. You can use these scans for ongoing vulnerability management and to perform rescans until passing or clean results are achieved. You can provide credentials to enumerate missing patches and client-side vulnerabilities. Note: While the PCI DSS requires you to provide evidence of passing or "clean" scans on at least a quarterly basis, you must also perform scans after any significant changes to your network (PCI DSS 11.2.3). |
Legacy Web App Scan |
Uses a Tenable Nessus scanner to scan your web applications. Note: Unlike the Tenable Web App Scanning scanner, the Tenable Nessus scanner does not use a browser to scan your web applications. Therefore, a Legacy Web App Scan is not as comprehensive as Tenable Web App Scanning. |
Mobile Device Scan |
Assesses mobile devices via Microsoft Exchange or an MDM. |
PCI Quarterly External Scan |
Performs quarterly external scans as required by PCI. Note: Because the nature of a PCI ASV scan is more paranoid and may lead to false positives, the scan data is not included in the aggregate Tenable Vulnerability Management data. This is by design. |
Configuration Scans | |
Audit Cloud Infrastructure | Audits the configuration of third-party cloud services. You can use this template to scan the configuration of Amazon Web Service (AWS), Google Cloud Platform, Microsoft Azure, Rackspace, Salesforce.com, and Zoom, given that you provide credentials for the service you want to audit. |
MDM Config Audit | Audits the configuration of mobile device managers. The MDM Config Audit template reports on a variety of MDM vulnerabilities, such as password requirements, remote wipe settings, and the use of insecure features, such as tethering and Bluetooth. |
Offline Config Audit |
Audits the configuration of network devices. Offline configuration audits allow Tenable Vulnerability Management to scan hosts without the need to scan over the network or use credentials. Organizational policies may not allow you to scan devices or know credentials for devices on the network for security reasons. Offline configuration audits use host configuration files from hosts to scan instead. Through scanning these files, you can ensure that devices' settings comply with audits without the need to scan the host directly. Tenable recommends using offline configuration audits to scan devices that do not support secure remote access and devices that scanners cannot access. |
Policy Compliance Auditing |
Audits system configurations against a known baseline.
Note: The maximum number of audit files you can include in a single Policy Compliance Auditing scan is limited by the total runtime and memory that the audit files require. Exceeding this limit may lead to incomplete or failed scan results. To limit the possible impact, Tenable recommends that audit selection in your scan policies be targeted and specific for the scan's scope and compliance requirements. The compliance checks can audit against custom security policies, such as password complexity, system settings, or registry values on Windows operating systems. For Windows systems, the compliance audits can test for a large percentage of anything that can be described in a Windows policy file. For Unix systems, the compliance audits test for running processes, user security policy, and content of files. |
SCAP and OVAL Auditing |
Audits systems using SCAP and OVAL definitions. The National Institute of Standards and Technology (NIST) Security Content Automation Protocol (SCAP) is a set of policies for managing vulnerabilities and policy compliance in government agencies. It relies on multiple open standards and policies, including OVAL, CVE, CVSS, CPE, and FDCC policies.
|
Tactical Scans | |
Active Directory Identity | Use a Domain User account to query AD identity information. This policy enumerates Active Directory identity information via LDAPS. It requires Domain User credentials, LDAPS configuration, and an Active Directory Domain Controller as the scan target. |
Active Directory Starter Scan |
Scans for misconfigurations in Active Directory. Use this template to check Active Directory for Kerberoasting, Weak Kerberos encryption, Kerberos pre-authentication validation, non-expiring account passwords, unconstrained delegation, null sessions, Kerberos KRBTGT, dangerous trust relationships, Primary Group ID integrity, and blank passwords. |
Credential Validation |
A lightweight scan template used to verify that host credential pairs for Windows and Unix successfully authenticate to scan targets. Use this scan template to quickly diagnose credential pair issues in your network. |
Find AI | Scans for AI, LLM, and ML-related vulnerabilities. |
Malware Scan |
Scans for malware on Windows and Unix systems. |
Tenable-Provided Tenable Nessus Agent Templates
There are two agent template categories in Tenable Vulnerability Management:
-
Vulnerability Scans — Tenable recommends using vulnerability scan templates for most of your organization's standard, day-to-day scanning needs.
-
Inventory Collection — Unlike standard Tenable Nessus Agent vulnerability scans, the Collect Inventory template provides faster scan results and reduce the scan's system footprint. Agent-based inventory scans gather basic information from a host and upload it to Tenable Vulnerability Management. Then, Tenable Vulnerability Management analyzes the information against missing patches and vulnerabilities as Tenable releases coverage. This reduces the performance impact on the target host while also reducing the time it takes for an analyst to see the impact of a recent patch.
Note: If a plugin requires authentication or settings to communicate with another system, the plugin is not available on agents. This includes, but is not limited to:
-
Patch management
-
Mobile device management
-
Cloud infrastructure audit
-
Database checks that require authentication
The following table describes the available Tenable Nessus Agent templates:
Template |
Description |
---|---|
Vulnerability Scans | |
Advanced Agent Scan |
An agent scan without any recommendations, so that you can fully customize the scan settings. In Tenable Vulnerability Management, the Advanced Agent Scan template allows for two scanning methods:
Note: When you create an agent scan using the Advanced Agent Scan template, you must also select the plugins you want to use for the scan. |
Agent Log4Shell | Agent detection of Apache Log4j CVE-2021-44228. |
Basic Agent Scan |
Scans systems connected via Tenable Nessus Agents. |
Malware Scan |
Scans for malware on systems connected via Tenable Nessus Agents. Tenable Nessus Agent detects malware using a combined allow list and block list approach to monitor known good processes, alert on known bad processes, and identify coverage gaps between the two by flagging unknown processes for further inspection. |
Policy Compliance Auditing |
Audits system configurations against a known baseline for systems connected via Tenable Nessus Agents. The compliance checks can audit against custom security policies, such as password complexity, system settings, or registry values on Windows operating systems. For Windows systems, the compliance audits can test for a large percentage of anything that can be described in a Windows policy file. For Unix systems, the compliance audits test for running processes, user security policy, and content of files. |
SCAP and OVAL Agent Auditing |
Audits systems using SCAP and OVAL definitions for systems connected via Tenable Nessus Agents. The National Institute of Standards and Technology (NIST) Security Content Automation Protocol (SCAP) is a set of policies for managing vulnerabilities and policy compliance in government agencies. It relies on multiple open standards and policies, including OVAL, CVE, CVSS, CPE, and FDCC policies.
|
Inventory Collection | |
Collect Inventory |
Scans with a compiled, limited selection of software inventory plugins. This template provides faster scan results and a reduced system footprint because the agent only performs checks that collect asset information (for example, installed software and IP addresses). This scanning method is sometimes referred to as inventory scanning in the Tenable Vulnerability Management user interface and documentation. Collect Inventory scans provide coverage for:
Collect Inventory scans do not currently provide coverage for:
Note: An asset that Tenable Vulnerability Management has performed inventory scanning on continues to report vulnerabilities until the asset ages out, even if the asset is offline. |
Tenable-Provided Tenable Web App Scanning Templates
The following table describes the available Tenable Web App Scanning scan templates:
Template | Description |
---|---|
API |
A scan that checks an API for vulnerabilities. This scan analyzes RESTful APIs described via an OpenAPI (Swagger) specification file. File attachment size is limited to 1 MB.
Tip: If the API you want to scan requires keys or a token for authentication, you can add the expected custom headers in the Advanced settings in the HTTP Settings section.
Note: The API scan template is available as a public beta. Its functionality is subject to change as ongoing improvements are made throughout the beta period.
Note: API scans support only one target at a time.
|
Config Audit |
A high-level scan that analyzes HTTP security headers and other externally facing configurations on a web application to determine if the application is compliant with common security industry standards. If you create a scan using the Config Audit scan template, Tenable Web App Scanning analyzes your web application only for plugins related to security industry standards compliance. |
Log4Shell |
Detects the Log4Shell vulnerability (CVE-2021-44228) in Apache Log4j via local checks. |
Overview |
A high-level preliminary scan that determines which URLs in a web application Tenable Web App Scanning scans by default. The Overview scan template does not analyze the web application for active vulnerabilities. Therefore, this scan template does not offer as many plugin family options as the Scan template. |
PCI | A scan that assesses web applications for compliance with Payment Card Industry Data Security Standards (PCI DSS) for Tenable PCI ASV. |
Quick Scan |
A high-level scan similar to the Config Audit scan template that analyzes HTTP security headers and other externally facing configurations on a web application to determine if the application is compliant with common security industry standards. Does not include scheduling. If you create a scan using the Quick Scan scan template, Tenable Vulnerability Management analyzes your web application only for plugins related to security industry standards compliance. |
Scan |
A comprehensive scan that assesses web applications for a wide range of vulnerabilities. The Scan template provides plugin family options for all active web application plugins. If you create a scan using the Scan template, Tenable Web App Scanning analyzes your web application for all plugins that the scanner checks for when you create a scan using the Config Audit, Overview, or SSL TLS templates, as well as additional plugins to detect specific vulnerabilities. A scan run with this scan template provides a more detailed assessment of a web application and take longer to complete that other Tenable Web App Scanning scans. |
SSL TLS |
A scan to determine if a web application uses SSL/TLS public-key encryption and, if so, how the encryption is configured. When you create a scan using the SSL TLS template, Tenable Web App Scanning analyzes your web application only for plugins related to SSL/TLS implementation. The scanner does not crawl URLs or assess individual pages for vulnerabilities. |