Assessment Settings in Tenable Vulnerability Management Scans
Note: If a scan is based on a user-defined template, you cannot configure Assessment settings in the scan. You can only modify these settings in the related user-defined template.
You can use Assessment settings to configure how a scan identifies vulnerabilities, as well as what vulnerabilities are identified. This includes identifying malware, assessing the vulnerability of a system to brute force attacks, and the susceptibility of web applications.
Certain Tenable-provided scanner templates include
If you select the Custom preconfigured setting option, or if you are using a scanner template that does not include preconfigured assessment settings, you can manually configure Assessment settings in the following categories:
Note: The following tables include settings for the Advanced
General
The General section includes the following groups of settings:
Brute Force
The Brute Force section includes the following groups of settings:
Setting | Default Value | Description |
---|---|---|
ICCP/COTP TSAP Addressing Weakness |
The ICCP/COTP TSAP Addressing menu determines a Connection Oriented Transport Protocol (COTP) Transport Service Access Points (TSAP) value on an ICCP server by trying possible values. |
The Web Applications section includes the following groups of settings:
Windows
The Windows section contains the following groups of settings:
Malware
The Malware section contains the following groups of settings:
Setting | Default Value | Description |
---|---|---|
Hash and Allow List Files | ||
Custom Netstat IP Threat List | None |
A text file that contains a list of known bad IP addresses that you want to detect. Each line in the file must begin with an IPv4 address. Optionally, you can add a description by adding a comma after the IP address, followed by the description. You can also use hash-delimited comments (e.g., #) in addition to comma-delimited comments. Note: Tenable does not detect private IP ranges in the text file. |
Provide your own list of known bad MD5 hashes | None |
A text file with one MD5 hash per line that specifies additional known bad MD5 hashes. Optionally, you can include a description for a hash by adding a comma after the hash, followed by the description. If any matches are found when scanning a target, the description appears in the scan results. You can also use hash-delimited comments (for example, fop) in addition to comma-delimited comments. |
Provide your own list of known good MD5 hashes | None |
A text file with one MD5 hash per line that specifies additional known good MD5 hashes. Optionally, you can include a description for each hash by adding a comma after the hash, followed by the description. If any matches are found when scanning a target, and a description was provided for the hash, the description appears in the scan results. You can also use hash-delimited comments (for example, #) in addition to comma-delimited comments. |
Hosts file allow list | None |
Tenable Vulnerability Management checks system hosts files for signs of a compromise (for example, Plugin ID 23910 titled Compromised Windows System (hosts File Check)). This option allows you to upload a file containing a list of IPs and hostnames you want Tenable Vulnerability Management to ignore during a scan. Include one IP and one hostname (formatted identically to your hosts file on the target) per line in a regular text file. |
Yara Rules | ||
Yara Rules | None |
A .yar file containing the YARA rules to be applied in the scan. You can only upload one file per scan, so include all rules in a single file. For more information, see yara.readthedocs.io. |
File System Scanning | ||
Scan file system | Disabled |
If enabled, Tenable Vulnerability Management can scan system directories and files on host computers. Caution: Enabling this setting in scans targeting 10 or more hosts could result in performance degradation. |
Windows Directories (available if Scan file system is enabled) | ||
Scan %Systemroot% | Disabled | Enables file system scanning to scan %Systemroot%. |
Scan %ProgramFiles% | Disabled | Enables file system scanning to scan %ProgramFiles%. |
Scan %ProgramFiles(x86)% | Disabled | Enables file system scanning to scan %ProgramFiles(x86)%. |
Scan %ProgramData% | Disabled | Enables file system scanning to scan %ProgramData%. |
Scan User Profiles | Disabled | Enables file system scanning to scan user profiles. |
Custom Filescan Directories | None | A custom file that lists directories to be scanned by malware file scanning. List each directory on one line. |
Linux Directories | ||
Scan $PATH | Disabled | Enables file system scanning to scan $PATH. |
Scan /home | Disabled | Enables file system scanning to scan /home. |
MacOS Directories | ||
Scan $PATH | Disabled | Enables file system scanning to scan $PATH. |
Scan /Users | Disabled | Enables file system scanning to scan /Users. |
Scan /Applications | Disabled | Enables file system scanning to scan /Applications. |
Scan /Library | Disabled | Enables file system scanning to scan /Library. |
Setting | Default Value | Description |
---|---|---|
Oracle Database | ||
Use detected SIDs | Disabled |
When enabled, if at least one host credential and one Oracle database credential are configured, the scanner authenticates to scan targets using the host credentials, and then attempts to detect Oracle System IDs (SIDs) locally. The scanner then attempts to authenticate using the specified Oracle database credentials and the detected SIDs. If the scanner cannot authenticate to scan targets using host credentials or does not detect any SIDs locally, the scanner authenticates to the Oracle database using the manually specified SIDs in the Oracle database credentials. |