Scan Policy Templates

Tenable.sc provides scan policy templates with pre-configured plugin settings and advanced directives for active scans. You can configure a Tenable-provided template or you can create a fully customized scan policy from all of the available scan policy options in Tenable.sc.

Each Tenable-provided scan policy template contains a different set of scan policy options. You can only modify the settings included for that scan policy template type.

Custom scan policies, such as Advanced Scan, contain all scan policy options. You can modify any scan policy options for custom scans.

For more information, see Scan Policies and Scan Policy Options.

Template Description
Common
Advanced Agent Scan

An agent scan without any recommendations, so that you can fully customize the scan settings. In Tenable.io, the Advanced Agent Scan template allows for two scanning methods:

  • Scan Window - Specify the timeframe during which the agent must report to be included and visible in vulnerability reports.

  • Triggered Scans - Provide the agent with specific criteria that indicates when to launch a scan. The agent launches the scan when one (or more) of the criteria are met. For more information, see Basic Settings in the Tenable.io User Guide.

Advanced Scan

An scan without any recommendations, so that you can fully customize the scan settings.

Basic Network Scan

Performs a full system scan that is suitable for any host. For example, you could use this template to perform an internal vulnerability scan on your organization's systems.

Credentialed Patch Audit

Authenticates hosts and enumerates missing updates.

Web Application Tests

Scan for published and unknown web vulnerabilities.

Compliance Configuration

Internal PCI Network Scan

Performs an internal PCI DSS (11.2.1) vulnerability scan.

PCI Quarterly External Scan

Performs quarterly external scans as required by PCI.

Policy Compliance Auditing

Audits system configurations against a known baseline.

SCAP and OVAL Auditing

Audits systems using SCAP and OVAL definitions.

Other
2021 Threat Landscape Restrospective (TLR)

Detects vulnerabilities featured in Tenable's 2021 Threat Landscape Retrospective report.

Active Directory Starter Scan

Scans for misconfigurations in Active Directory.

Note: Active Directory Starter Scans require ADSI credentials. For more information, see Miscellaneous.

CISA Alerts AA22-011A and AA22-047A

Performs remote and local checks for vulnerabilities from CISA alerts AA22-011A and AA22-047A.

ContiLeaks Performs remote and local checks for ContiLeaks vulnerabilities.

GHOST (glibc) Detection

Performs local checks to detect vulnerabilities related to CVE-2015-0235.

Host Discovery

Performs a simple scan to discover live hosts and open ports.

Intel AMT Security Bypass Detection

Performs remote and local checks for CVE-2017-5689.

Log4Shell

Detects the Log4Shell vulnerability (CVE-2021-44228) in Apache Log4j via local checks.

Log4Shell Remote Checks

Detects the Log4Shell vulnerability (CVE-2021-44228) in Apache Log4j via remote checks.

Log4Shell Vulnerability Ecosystem

Detects the Log4Shell vulnerability (CVE-2021-44228) in Apache Log4j via local and remote checks. This template is dynamic and is regularly updated with new plugins as third-party vendors patch their software.

Malware Scan

Scans for malware on Windows and Unix systems.

PrintNightmare

Performs local checks for CVE-2021-34527, the PrintNightmare Windows Print Spooler vulnerability.

ProxyLogon: MS Exchange

Performs remote and local checks to detect Microsoft Exchange Server vulnerabilities related to CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-27065.

Ransomware Ecosystem Performs local and remote checks for common ransomware vulnerabilities.
Solarigate

Detects SolarWinds Solorigate vulnerabilities using remote and local checks.

Spectre and Meltdown Detection

Performs remote and local checks for CVE-2017-5753, CVE-2017-5715, and CVE-2017-5754.

WannaCry Ransomeware Detection

Scans for the WannaCry ransomware (MS17-010).

Zerologon Remote Scan

Detects Microsoft Netlogon elevation of privilege vulnerability (Zerologon).