![]() ![]() Instead, for larger networks, break up the scans into multiple parts. Once you have run the scans on the smaller range, go through and see if you can understand how to validate those vulnerabilities discovered to gain some knowledge on how to explain remediation (or if you're doing it yourself you can take a look under the hood a bit).Īs a note for Nessus in general, depending on the size of your office, I would not scan more than 150 IPs at one time as it will take a very long time to process (150 typically takes us about 1.5-2 hours to scan completely). This will not only give you some practice, but potentially show the importance of authenticated vs. This command irreversibly changes the Nessus scanner or Manager to a Tenable.sc-managed scanner, resulting in a number of user interface changes. Do not use this command if you do not want to switch your Nessus instance to Tenable.sc. Conduct an unauthenticated scan, and work with your network folks to run an authenticated scan on just that test range. To register a Nessus scanner with Tenable.sc, use the following command: nessuscli fetch -security-center. Set up a range of about 10 IPs to run scans on as a 'test' range. I would suggest a few things in your situation: ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |