Monitor Managed Scanners Migration

In Tenable Nessus Manager, as part of Extended Migration, managed scanners are automatically relinked from Tenable Nessus to Tenable Vulnerability Management. You can monitor the progress of the migration and manually retry any failed scanners.

Considerations

  • There may be complications with migrating linked Nessus Professional scanners and managed Tenable Security Center scanners, which are not supported scenarios.
  • Managed scanners in Tenable Nessus Manager remain as managed scanners in Tenable Vulnerability Management.
  • A scanner must be version 8.2.0 or later to be migrated to Tenable Vulnerability Management.
  • If a scanner is on a lower version than 8.2.0, Tenable Nessus automatically updates a scanner to the latest version before it can be linked. If software updates are disabled, Tenable Nessus temporarily overrides those settings to update the scanner.
  • Scans that are configured to use a scanner that is in the process of being migrated do not run until the scanner has successfully relinked to Tenable Vulnerability Management.

Before You Begin

To monitor scanner migration progress:

  1. In Tenable Nessus, in the top navigation bar, click Settings.

  2. In the left navigation bar, click Extended Migration.

    The Extended Migration to Tenable Vulnerability Management page appears.

  3. Click the Scanners tab.

    Tenable Nessus displays the list of scanners to be upgraded to Tenable Vulnerability Management and their status. It may take several minutes for Tenable Nessus to complete upgrading your scanners to Tenable Vulnerability Management.

    If the scanner needs a software update, it may take longer, depending on the interval the scanner checks for software updates. If a scanner is offline, it does not attempt to check in or relink until it is back online.

  4. If a scanner failed to link to Tenable Vulnerability Management, in the scanner row, click to retry linking.

    Tenable Nessus retries linking the scanner as a managed scanner to Tenable Vulnerability Management.

What to Do Next