Specifications

Copyright © 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
83
For Further Information
Tenable has produced a variety of documents detailing Nessus’ installation, deployment, configuration, user operation,
and overall testing:
Nessus 6.1 Installation and Configuration Guide step by step walk through of installation and configuration
Nessus 6.1 User Guide how to configure and operate the Nessus User Interface
Nessus Enterprise 6.1 User Guide how to configure and operate the Nessus User Interface for Nessus
Enterprise
Nessus Enterprise Cloud User Guide describes use of Nessus Enterprise Cloud and includes subscription
and activation, vulnerability scanning, compliance reporting, and Nessus Enterprise Cloud support
Nessus v6 Command Line Reference describes the command line tools of Nessus
Nessus Credentialed Checks for Unix and Windows information on how to perform authenticated network
scans with the Nessus vulnerability scanner
Nessus Compliance Checks high-level guide to understanding and running compliance checks using Nessus
and SecurityCenter
Nessus Compliance Checks Reference comprehensive guide to Nessus Compliance Check syntax
Nessus v2 File Format describes the structure for the .nessus file format, which was introduced with Nessus
3.2 and NessusClient 3.2
Nessus 5.0 REST Protocol Specification describes the REST protocol and interface in Nessus
Nessus and Antivirus outlines how several popular security software packages interact with Nessus, and
provides tips or workarounds to allow the software to better co-exist without compromising your security or
hindering your vulnerability scanning efforts
Nessus and Mobile Device Scanning describes how Nessus integrates with Microsoft Active Directory and
mobile device management servers to identify mobile devices in use on the network
Nessus and Scanning Virtual Machines describes how Tenable Network Security's Nessus vulnerability
scanner can be used to audit the configuration of virtual platforms as well as the software that is running on them
Strategic Anti-malware Monitoring with Nessus, PVS, and LCE describes how Tenable's USM platform can
detect a variety of malicious software and identify and determine the extent of malware infections
Patch Management Integration document describes how Nessus and SecurityCenter can leverage credentials
on the Red Hat Network Satellite, IBM TEM, Dell KACE 1000, and Microsoft WSUS and SCCM patch management
systems to perform patch auditing on systems for which credentials may not be available to the Nessus scanner
Real-Time Compliance Monitoring outlines how Tenable’s solutions can be used to assist in meeting many
different types of government and financial regulations
Tenable Products Plugin Families provides a description and summary of the plugin families for Nessus, Log
Correlation Engine, and the Passive Vulnerability Scanner
SecurityCenter Administration Guide