![]() ![]() Specifies one or more targets to be scanned. Specifies the folder where the scan appears after being saved. ![]() (Optional) Specifies a description of the scan or policy. This value is displayed on the Nessus interface. ![]() Specifies the name of the scan or policy. The following are Basic settings: Setting Configure the settings in the Basic Settings section. The Basic Network Scan template has several default settings preconfigured, which allows you to quickly perform your first scan and view results without a lot of effort.įollow these steps to run a basic scan: 1. Prepare your scan by configuring the settings available for your chosen template. To quickly get started with Nessus, use the Basic Network Scan template. To see a full list of the types of templates available in Nessus, see Scan and Policy Templates. Some templates are only available when you purchase a fully licensed copy of Nessus Professional. The Nessus interface provides brief explanations of each template in the product. For more information, see Create a Policy in the Nessus User Guide. After you create a policy, you can select it as a template in the User Defined tab when you create a scan. For a detailed explanation of all the options available, refer to Scan and Policy Settings in the Nessus User Guide.Ī scan policy is a set of predefined configuration options related to performing a scan. Scan templates simplify the process by determining which settings are configurable and how they can be set. Next, click the scan template you want to use. In the upper-right corner of the My Scans page, click the New Scan button.In the top navigation bar, click Scans.Once you have installed and launched Nessus, you’re ready to start scanning. (If you have not yet installed Nessus, please click here to see the installation guide.) Step 1: Creating a Scan Read on as we guide you through the five steps to run your first Nessus scan. With Nessus, you can gain full visibility into your network by conducting a vulnerability assessment. Get your Nessus vulnerability assessment tool up and running with these five easy steps.
0 Comments
Leave a Reply. |