Automated audit policy creation for UNIX Nessus compliance checks
February 27, 2007Many UNIX applications and system settings are contained in proprietary text configuration files. Auditing these for unauthorized changes or configurations can be very cumbersome and time consuming. N...
Enhanced Windows Compliance Auditing
February 24, 2007The Nessus 3 Direct Feed was updated today with enhanced functionality for Windows compliance checks. This blog entry discusses the new features and has example .audit text to illustrate them, includi...
Dragon Intrusion Defense System support for Nessus and the PVS
February 21, 2007Today Tenable announced a partnership with Enterasys Networks that enables customers of both companies to operate Nessus and/or the Passive Vulnerability Scanner (PVS) directly on the Dragon sensor. C...
Nessus 3.2 beta available for testing
February 21, 2007Nessus 3.1.2, the first public BETA of what will become Nessus 3.2, has been released for the Linux, FreeBSD and Solaris operating systems.  Download Nessus 3.1.2 There are many new featu...
Direct Sniffing or Netflow
February 19, 2007When deploying the Log Correlation Engine (LCE), Tenable's support group often is asked which is better for network monitoring: using netflow from a router or performing some sort of direct network mo...
Auditing Anti-Virus Products with Nessus
February 15, 2007For credentialed scans of Windows systems, Nessus can detect the presence of many leading anti-virus solutions. This blog entry will discuss what sort of information can be reported, how this is relev...
Finding Interactive and Encrypted Sessions with the Passive Vulnerability Scanner
February 12, 2007The Passive Vulnerability Scanner (PVS) has the ability to discover network services which have the characteristic of being "interactive" or being "encrypted". The PVS can analyze ...
Advanced Nessus 3 WMI Checks Against Windows Systems
February 7, 2007Tenable Network Security has recently added the ability to query remote Windows systems via the Windows Management Instrumentation (WMI) protocol. This allows a credentialed Nessus 3 scan to perform s...
Ron Gula interview at PaulDotCom
February 4, 2007I got the chance to virtually sit down with the folks at PaulDotCom for an interview. We discussed a variety of topics including vulnerability disclosure, Nessus usage, the early days of Dragon and Sn...
UDP Service and Vulnerability Enumeration
February 1, 2007The User Datagram Protocol (UDP) transfers data much differently than the Transmission Control Protocol (TCP). Services that run on UDP can make use of the client and server model that TCP uses, but i...
Optimizing Enterprise Nessus Scans for Speed
January 29, 2007Tenable often receives requests for advice and strategies to help very large organizations decrease their scanning time. Readers should keep in mind that from Tenable's point of view, a "large&qu...
Asking for Credentials from IT
January 23, 2007If you are not part of the IT group, you may have to ask someone for the right credentials to perform patch and configuration audits with Nessus. This blog entry will offer some advice and strategies ...