Download now Free registration required
This paper describes how to perform authenticated network scans with the Nessus Vulnerability Scanner. Authenticated network scans allow a remote network audit to obtain "Host-based" data such as missing patches and operating system settings. Host-based checks for UNIX versions of Nessus were introduced in 2004 and Windows support had existed before that. Nessus leverages the ability to log into remote UNIX hosts via Secure Shell. For Windows hosts, Nessus leverages a variety of Microsoft authentication technologies.
- Format: PDF
- Size: 396.4 KB