Table of Contents
Scan a network
Nessus provides a set of ready-to-use templates. For general scans, the and would work. The differences are the supports the and which can be used to fine-tune the compliance checks (credentials are required) and plugins.
 
Advanced Scans
- 
Navigates to → → , insert the Name, Description, and Targets. The Schedule and Notifications options enable the scan to be performed at certain time and email the results to a list of recipients automatically.   
- 
Tune the rest of the settings:   
- 
Once all is set, save. The scan job will be listed in My Scans folder. 
Basic Network Scans
- 
Navigates to → → , insert the Name, Description and Targets, then save.   
Launch A Scan
- 
From the My Scans folder, select a task from the list to launch the scan.   
- 
Once the scan complete, the status bar will changed to checked.   
Results
- 
The scan results are grouped by host, and vulnerabilities (color-coded by severity). 
- 
To prepare both summary and technical reports to circulate among teams, use the → (or HTML, CSV, Nessus, Nessus DB) 
- 
Clicking the vulnerabilities bar will drill-down to the next-level of 192.168.1.1 vulnerabilities:   
- 
The next level of drill-down will display the list of vulnerabilities exposed by Nessus on target 192.168.1.1, and clicking the specific vulnerability will drill-down to the attack vectors info:   
- 
The description of the vulnerability, the recommended solution, and the payload used during the scan are documented: i. Description of the vulnerability and the attack vector. ii. The recommended solution. iii. The attack code/payload during the scan. iv. Network port used for this attack. v. A summarize of the risk factor information. vi. Vulnerability information on known exploit availability and publication date. vii. Reference information from the CVE (Common Vulnerabilities and Exposures) network.   
Exports
Executive Report
- 
To generate an executive report, choose :   
Technical Report
- 
To generate a technical report, choose , select to include the data, and group by .   
References: