Nessus Basics Notes
Nessus Basics Notes
Nessus Basics Notes
Deepak Rawat
March/2024
Nessus is a renowned vulnerability scanner developed by Tenable, Inc. It plays a crucial role
in identifying security weaknesses within IT infrastructures. Here are the key points to get
you started:
Installation:
Install Tenable Nessus on Linux
Caution: If you install a Nessus Agent, Manager, or Scanner on a system with an existing
Nessus Agent, Manager, or Scanner running nessusd, the installation process will kill all
other nessusd processes. You may lose scan data as a result.
Note: Tenable Nessus does not support using symbolic links for /opt/nessus/.
2. From the command line, run the Tenable Nessus installation command specific to
your operating system.
CentOS, Debian/Kali, Fedora, Oracle Linux, Red Hat, SUSE, and Ubuntu
# systemctl start nessusd
FreeBSD
# service nessusd start
2. On the License Agreement screen, read the terms of the Tenable, Inc. Nessus software
license and subscription agreement.
3. Select the I accept the terms of the license agreement option, and then click Next.
4. On the Destination Folder screen, select the Next button to accept the default installation
folder. Otherwise, select the Change button to install Nessus to a different folder.
5. On the Ready to Install the Program screen, select the Install button.
The Installing Tenable, Inc. Nessus screen appears and a Status indication bar shows the
installation progress. The process may take several minutes.
After the InstallShield Wizard completes, the Welcome to Nessus page loads in your
default browser.
If the page does not load, do one of the following steps to open Tenable Nessus in your
browser.
Cau on: If you install a Nessus Agent, Manager, or Scanner on a system with an exis ng
Nessus Agent, Manager, or Scanner running nessusd, the installa on process will kill all
other nessusd processes. You may lose scan data as a result.
Note: Tenable Nessus does not support using symbolic links for /opt/nessus/.
Introduction
The Welcome to the Tenable, Inc. Nessus Server Installer window provides general
information about the Nessus installation.
License
1. On the Software License Agreement screen, read the terms of the Tenable, Inc. Nessus
software license and subscription agreement.
4. To continue installing Nessus, select the Agree button, otherwise, select the Disagree button
to quit and exit.
Installation Type
On the Standard Install on <DriveName> screen, choose one of the following options:
Select the Install button to continue using the default installation location.
Installation
When the Preparing for installation screen appears, you are prompted for a username and
password.
1. Enter the Name and Password of an administrator account or the root user account.
2. On the Ready to Install the Program screen, select the Install button.
Next, the Installing Tenable, Inc. Nessus screen appears and shows a Status indication bar
for the remaining installation progress. The process may take several minutes.
Summary
1. When the installation is complete, the The installation was successful screen
appears. After the installation completes, select Close.
1. Open Terminal.
Tenable Nessus 10.0.0 and later supports scanning on the Raspberry Pi 4 Model B with a
minimum of 8GB memory.
2. From a command prompt or terminal window, run the Tenable Nessus installation
command:
dpkg -i Nessus-<version>-raspberrypios_armhf.deb
3. From a command prompt or terminal window, start the nessusd daemon by running
the following command:
You can deploy a managed Tenable Nessus scanner or an instance of Tenable Nessus
Professional as a Docker image to run on a container. Tenable provides two base Tenable
Nessus images: Oracle Linux 8 and Ubuntu. You can configure the Tenable Nessus instance
with environment variables to configure the image with the settings you configure
automatically. Using operators and variables, you can deploy the Tenable Nessus image as
linked to Tenable Vulnerability Management or Tenable Security Center.
Tenable does not recommend deploying Tenable Nessus in a Docker container that shares a
network interface controller (NIC) with another Docker container.
Note: Tenable Nessus does not support storage volumes. Therefore, if you deploy a
new Tenable Nessus image, you will lose your data and need to reconfigure Tenable Nessus.
However, while deploying the new image, you can configure any ini al user and linking
informa on with environment variables, as described in step 2 of the following procedure.
1. In your terminal, use the docker pull command to get the image.
For the <version-OS> tag, you must specify the Tenable Nessus version and whether
you are pulling Oracle Linux 8 or Ubuntu. You can use the latest tag in place of a
specific Tenable Nessus version (for example, latest-ubuntu).
Use the operators with the appropriate options for your deployment, as
described in Operators.
3. If you did not include environment variables, complete any remaining configuration
steps in the command-line interface or Tenable Nessus configuration wizard .
To stop and remove the container, see Remove Tenable Nessus as a Docker
Container.
Once you have installed and launched Nessus, you’re ready to start scanning. First, you have
to create a scan. To create your scan:
Next, click the scan template you want to use. Scan templates simplify the process by
determining which settings are configurable and how they can be set. For a detailed
explanation of all the options available, refer to Scan and Policy Settings in the Nessus User
Guide.
A scan policy is a set of predefined configuration options related to performing a scan. After
you create a policy, you can select it as a template in the User Defined tab when you create a
scan. For more information, see Create a Policy in the Nessus User Guide.
The Nessus interface provides brief explanations of each template in the product. Some
templates are only available when you purchase a fully licensed copy of Nessus Professional.
To see a full list of the types of templates available in Nessus, see Scan and Policy
Templates. To quickly get started with Nessus, use the Basic Network Scan template.
Prepare your scan by configuring the settings available for your chosen template. The Basic
Network Scan template has several default settings preconfigured, which allows you to
quickly perform your first scan and view results without a lot of effort.
Se ng Descrip on
Name Specifies the name of the scan or policy. This value is displayed on the Nessus interface.
Folder Specifies the folder where the scan appears a er being saved.
Specifies one or more targets to be scanned. If you select a target group or upload a
Targets
targets file, you are not required to specify addi onal targets.
2. Configure remaining se ngs
Although you can leave the remaining settings at their pre-configured default, Tenable
recommends reviewing the Discovery, Assessment, Report and Advanced settings to ensure
they are appropriate for your environment.
For more information, see the Scan Settings documentation in the Nessus User Guide.
Optionally, you can configure Credentials for a scan. This allows credentialed scans to run,
which can provide much more complete results and a more thorough evaluation of the
vulnerabilities in your environment.
4. Launch Scan
After you have configured all your settings, you can either click the Save button to launch the
scan later, or launch the scan immediately.
If you want to launch the scan immediately, click the button, and then click Launch.
Launching the scan will also save it.
The time it takes to complete a scan involves many factors, such as network speed and
congestion, so the scan may take some time to run.
Viewing scan results can help you understand your organization’s security posture and
vulnerabilities. Color-coded indicators and customizable viewing options allow you to tailor
how you view your scan’s data.
You can view scan results in one of several views:
Page Descrip on
If the scan's results include remedia on informa on, this list displays all remedia on
Remedia ons
details, sorted by the number of vulnerabili es.
Notes Displays addi onal informa on about the scan and the scan’s results.
History Displays a list of scans: Start Time, End Time, and the Scan Statuses.
Viewing scan results by vulnerabilities gives you a view into potential risks on your assets.
To view vulnerabilities:
Chances are your job isn’t done yet. You need to report your findings to your team.
Scan results can be exported in several file formats. Some of these report formats are
customizable, while others are designed to be imported into another application or product,
such as Microsoft Excel or Tenable.sc. For an explanation of the various report formats and
the purpose of each, see the Nessus User Guide.