Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Nessus Professional onboarding portal

Nessus Professional basics and getting started

Leverage these key resources and events to hit the ground running and stay informed of the latest product updates and releases.

Major onboarding steps

To get started with Nessus Professional, follow the steps below.

Ensure that your setup meets the minimum system requirements and obtain your activation code for Nessus Professional.

Resources:

Tenable Nessus can be installed on Windows, Linux, macOS, or Raspberry Pi. It can also be deployed as a Docker image. Follow the installation steps depending on your Tenable Nessus software and operating system, and perform the initial configuration steps.

Resources:

Run a host discovery scan to identify assets on your network. Then, create a vulnerability scan by selecting a scan template and configuring the scan to meet your needs. Finally, launch the scan.

Resources:

View and analyze scan results, manage vulnerabilities and scan folders, and create a scan report or export.

Resources:

Create a report and export findings

Resources:

Adjust scan settings to address warning messages and monitor scan health.

Resources:

Major Onboarding Steps

To get started with Tenable Nessus Expert, follow the steps below.

1 Prepare

Ensure that your setup meets the minimum system requirements and obtain your activation code for Tenable Nessus Professional.

Resources:

2 Install and configure Tenable Nessus Professional

Follow the installation steps depending on your Tenable Nessus software and operating system and perform the initial configuration steps.

Resources:

3 Create and configure scans

Run a host discovery scan to identify assets on your network. Then, create a scan by selecting a scan template and configuring the scan to meet your needs. Finally, launch the scan.

Resources:

4 View and analyze scan results
5 Refine Tenable Nessus settings

Adjust scan settings to address warning messages and monitor scan health.

Resources:

Best practices

Use these Best practices to get the most from your investment and set the foundation for becoming a power user:

  • Utilize the Tenable vulnerability priority rating (VPR) to prioritize the remediation of the highest risk vulnerabilities first.
  • The scan or policy’s Credentials page allows you to configure the Tenable Nessus scanner to use authentication credentials during scanning. Configuring credentials allows Tenable Nessus to perform a wider variety of checks that result in more accurate scan results.
  • You can compare two scan results to see differences between them. This comparison is not a true differential of the two results; it shows the new vulnerabilities that Tenable Nessus detected between the older baseline scan and the newer scan. Comparing scan results helps you see how a given system or network has changed over time. This information is useful for compliance analysis by showing how vulnerabilities are being remediated, if systems are patched as Tenable Nessus finds new vulnerabilities, or how two scans may not be targeting the same hosts.
  • Use the Live Results feature to view scan results for new plugins based on a scan's most recently collected data, without running a new scan. Live Results allow you to see potential new threats and determine if you need to launch a scan manually to confirm the findings.