1. Select "New Scan"
2. Choose scan template:
- Basic Network Scan (general vulnerability scanning)
- Discovery Scan (host/port enumeration)
- Compliance Scan (standards checking)
3. Enter target information:
- Single IP: 192.168.1.1
- IP Range: 192.168.1.1-192.168.1.254
- CIDR: 192.168.1.0/24
2. Discovery Settings
Host Discovery:
- Disable "Scan Fragile Devices" for sensitive systems
- Port scan range options:
- Default
- All ports
- Custom (e.g., "1-1024,1433,3306,3389")
Service Discovery:
- Enable "Probe All Ports" for thorough scanning
- Enable SSL/TLS Checks for certificate validation
3. Assessment Configuration
Web Application Settings:
- Enable web scanning
- Configure user agents
- Add test URLs
Authentication:
- SSH (Linux):
- Username/Password
- Public Key
- Kerberos
- Windows:
- Domain/Username/Password
- NTLM hash
- Kerberos
Advanced Configuration
1. Custom Scan Policies
1. Navigate to "New Policy"
2. Select base template
3. Configure:
- Scanner settings
- Credentials
- Plugins
- Compliance checks
4. Save under "User Defined" templates
2. Plugin Management
Plugin Rules:
1. Access "Plugin Rules" in Resources
2. Define:
- Plugin ID
- Host/IP
- Action (Hide/Recast)
3. Performance Tuning
Network Settings:
- Max hosts per scan
- Max checks per host
- Network timeout
- Packet rate
Scan Timing:
- Scan window
- Delay between scans
- Timeout period
Scanning Best Practices
1. Pre-Scan Checklist
1. Verify target scope
2. Check network bandwidth
3. Confirm maintenance windows
4. Test credentials
5. Verify firewall rules
# Check Nessus service status
sudo systemctl status nessusd
# View Nessus logs
tail -f /opt/nessus/var/nessus/logs/nessusd.messages
# Test network connectivity
nc -vz target_ip port