Time
47 minutes
Difficulty
Beginner
CEU/CPE
3

Video Description

The industry standard for vulnerability, configuration and compliance assessments used by more than one million users across the globe. Nessus prevents network attacks by identifying the vulnerabilities and configuration issues that hackers use to penetrate your network. Download Nessus from Tenable to follow along the with the course! Click below to download your free trial of Learn more about Tenable on their Cybrary channel. Click below to follow for all the latest updates:

Video Transcription

00:00
this demonstration Cover scanning operations with nests
00:07
necessary allows you to create scans that can be launched on demand or scheduled to run automatically after you log into the interface. The scans page ludes
00:19
it displays scheduled, completed and currently running scans. To create a new scheduled scan, click the new skin, but
00:29
you can use a scan template or create a scan from an existing policy. To create a scan from a previously saved policy, navigate to the user Created Policies section.
00:42
Choose your desired scan policy.
00:45
Define the parameters of the new scan, including a name description and the desired scan targets
00:52
to set scheduling options. For this scan, click on schedule
00:57
by default. The scan will launch immediately after you saved, but you may change this behavior.
01:03
Enable the schedule to view available options.
01:07
Here you can define your launch frequency, date and time and time zone.
01:12
Ness's provides an easily readable summary of your chosen options to email users. Upon scan completion, click on email notifications.
01:23
Enter the email recipients to receive the report and add any desired result filters. Please note that the necessary administrative user must first define a valid mail server
01:37
when complete save your scan
01:40
to create a new scan without using a previously saved scan policy. Click the new scan, but
01:48
choose the type of scan you wish to run.
01:52
Define the scan settings such as name description, scan targets and scheduling.
01:57
You may also define further policy related settings based on the scan type you have chosen.
02:05
When finished, click the Save, but
02:07
this creates a new on demand scan schedule. Please note that this method combines the scan policy and scan schedule. A separate scan policy is not needed to launch a scan. Manually click the launch icon.
02:23
You can view the results as they were discovered by clicking on the name of the scan. In addition to examining the results as the scan runs, you have the options to pause or stop the scan or move it to a folder. To edit an existing scan, click on the scan name.
02:43
You can reconfigure the scan settings or launch the scan manually.
02:47
Choosing default launches the scan against all hosts defined during the initial scan creation.
02:55
Choosing custom allows you to launch the scan against a different set of hosts
03:04
to move or copy a scan to a folder for organization purposes, you must first create the folder,
03:10
click on new folder,
03:14
enter a folder name and click the Save, but
03:17
the folder appears under the My Scans heading.
03:22
Check the box next to the scan. You wish to move or copy
03:27
then from the more drop down menu that appears select, Move to or copy, too, and the newly created folder
03:40
You can click on the folder name to view the scan.
03:45
You can also rename or delete boulders by clicking the drop down arrow next to the folder name.

Up Next

Nessus Fundamentals

The industry standard for vulnerability, configuration and compliance assessments used by more than one million users across the globe.

Instructed By

Instructor Profile Image
Dean Pompilio
CEO of SteppingStone Solutions
Instructor