Vulnerability Management Scan Tuning Guide
Vulnerability Management Scan Tuning Guide
Copyright © 2024 Tenable, Inc. All rights reserved. Tenable, Tenable Nessus, Tenable Lumin, Assure, and the Tenable logo are registered trademarks of Tenable, Inc. or its affiliates. All other
products or services are trademarks of their respective owners.
Table of Contents
Introduction 3
Considerations 4
Sensor Selection 7
Settings Configuration 12
Credentials Configuration 38
Compliance Configuration 39
Plugin Configuration 40
Other Tips 42
-2-
Introduction
The following guide describes each aspect of a Tenable Vulnerability Management (formerly known
as Tenable.io) scan configuration, and how you can tune each aspect to make your scan faster or
more data-inclusive, depending on your desired outcome.
Note: Depending on the scan template you use, you may not be able to tune some of the settings
described. The Advanced Network Scan and Advanced Agent Scan templates allow you to adjust all the
described settings available to each assessment type.
Table of Contents
l Considerations
l Sensor Selection
l Settings Configuration
l Credentials Configuration
l Compliance Configuration
l Plugin Configuration
l Other Tips
Tip: The Tenable Vulnerability Management Scan Tuning Guide is available in English and Japanese.
-3-
Considerations
Although your scan configuration plays an important role in your Vulnerability Management scan
time and performance, other variables can affect the scan time and performance. The following
table describes each variable that you should consider when trying to improve your scan time and
performance:
Impact on
Variable Impact Description
Scan Time
Scan High Your scan configuration specifies the depth of your scan.
configuration In general, increasing the depth of your scan increases the
total scan time. Consider the following when planning your
scan depth:
-4-
scanners
Type of Medium You have various options available for assessing assets in
assessment your environment. While the correct scan configuration
can vary depending on your environment, you should build
the most efficient scan configuration for your
organization's assets or environment. For example:
Number of live Medium Scanning a dead host takes less time than scanning a live
hosts host. A distribution of IP addresses with a low number of
associated hosts takes less time to scan than a
distribution of IP addresses with a higher number of
hosts.
-5-
configurations. For example, a Windows server with a web
server, database, and host intrusion prevention software
takes more time to scan than a Windows 11 workstation.
Scanner proximity Medium Tenable recommends placing your scanners close to your
to targets targets, connected with minimum latency (for more
information, see the following Tenable blog article).
Latency has an additive effect on every packet exchanged
between a scanner and its target. The largest impacts
tend to be network latency and simultaneous plugin
checks.
For example:
Time of day and Low In many environments, there are periods of time where
week infrastructure load is higher. Scheduling assessments
outside of these windows can improve scan performance.
Target resources Low The resources available to the scan target can impact
scan time as well. A public-facing system (a system with
load) takes longer to scan than an idle backup system.
-6-
Sensor Selection
Tenable Vulnerability Management allows you to scan with one of three sensor types: Tenable's
cloud scanners, Nessus scanners, or Nessus Agents.
If you need to scan assets that are external to your network, Tenable recommends using the cloud
scanners. The cloud scanners are managed by Tenable, and do not require any upkeep from your
organization. For more information, see Cloud Sensors.
To scan assets within your network, you can choose between scanning with Nessus scanners or
Tenable Nessus Agents. The following table describes the key differences between scanning with
Nessus scanners and Nessus Agents:
Nessus scanners
Pros Cons
l Tenable Nessus scanners can scan entire l Unlike Tenable Nessus Agents, you
networks, while Tenable Nessus Agents can have to update Nessus scanner
only scan the asset they are installed on. credentials manually. This can
cause permission and login issues
l Tenable Nessus scanners allow you to
if your organization does not
perform external and remote security checks.
actively update the credentials.
l Unlike Tenable Nessus Agents, Nessus
l Network scanning with Nessus
scanners provide an "outside view" of your
scanners usually takes longer than
network through features such as port
scanning individual assets with
scanning. Nessus scanners can also provide
Tenable Nessus Agents.
an "inside view" of your network if you
configure them with credentials.
Pros Cons
l Tenable Nessus Agents are installed directly l Tenable Nessus Agents are not
on the target assets, so unlike Tenable designed to perform network
Nessus scanners, they do not require checks, so certain plugin items
managed credentials. cannot be checked if you only run
agent scans.
-7-
l Unlike Nessus scanners, you do not have to l Tenable Nessus Agents cannot
worry about the geographical placement of perform security checks that
Tenable Nessus Agents. require remote connectivity, such
as logging into a DB server, trying
l Generally, scanning individual assets with
default credentials, or traffic-
Tenable Nessus Agents is much faster than
related enumeration.
scanning the entire network.
l Unlike Tenable Nessus scanners,
l Tenable Nessus Agents can collect and send
Tenable Nessus Agent scans
asset data to Tenable Vulnerability
cannot account for any assets that
Management as the agent has internet
do not have a Tenable Nessus
access. In other words, Tenable Nessus
Agent installed.
Agents allow you to scan assets that are not
connected to your corporate network.
Ultimately, Tenable recommends using whichever sensor best suits your environment and business
requirements. In many circumstances, you should use both agents and network assessments for
different types of systems and parts of your network. To learn more about the benefits and
limitations of agent scanning, see Benefits and Limitations in the Nessus Agent User Guide.
-8-
Scan Template Selection
Tenable Vulnerability Management provides various scanner and Nessus Agent scan templates that
meet different business needs. Tenable Vulnerability Management provides four categories of scan
templates: Vulnerability Scans, Configuration Scans, Tactical Scans, and Inventory Collection. You
can view Tenable Vulnerability Management's complete offering of scan templates when you Create
a Vulnerability Management Scan in the user interface.
Click the following scan template categories to view the descriptions. For information about
specific scan templates, see Scan Templates.
Note: You can configure the Nessus Scanner templates to use cloud scanners or your Nessus scanners.
Vulnerability Scans
Tenable recommends using vulnerability scan templates for most of your organization's standard,
day-to-day scanning needs. Some of Tenable Vulnerability Management's most notable vulnerability
scan templates are:
l Advanced Network/Agent Scan — The most configurable scan type that Tenable Vulnerability
Management offers. You can configure this scan template to match any policy or search any
asset or assets. These templates have the same default settings as the Basic Network/Agent
Scan, but they allow for additional configuration options.
Note: Advanced scan templates allow Tenable Vulnerability Management experts to scan more
deeply using custom configuration, such as faster or slower checks, but misconfigurations can
cause asset outages or network saturation. Use the advanced templates with caution.
l Basic Network/Agent Scan — Use this template to scan a system or systems with all of
Tenable Vulnerability Management's default plugins enabled. This scan provides a quick and
easy way to scan systems for vulnerabilities.
l Credentialed Patch Audit (Nessus Scanner only) — Use this template with credentials to give
the scanner direct access to the host, scan the target hosts, and enumerate missing patch
updates.
-9-
l Host Discovery (Nessus Scanner only) — Launch this scan to see what hosts are on your
network and associated information such as IP address, FQDN, operating systems, and open
ports, if available. After you have a list of hosts, you can choose what hosts you want to target
in a specific vulnerability scan.
Tenable recommends that organizations who do not have a passive network monitor, such as
Tenable Nessus Network Monitor, run this scan weekly to discover new assets on your
network.
Note: Assets identified by discovery scans do not count toward your license.
Configuration Scans
Tenable recommends using configuration scan templates to check whether host configurations are
compliant with various industry standards. Configuration scans are sometimes referred to as
compliance scans. For more information about the checks that compliance scans can perform, see
Compliance in Vulnerability Management Scans and SCAP Settings in Vulnerability Management
Scans.
Tactical Scans
Tenable recommends using the tactical scan templates to scan your network for a specific
vulnerability or group of vulnerabilities.
Tactical scans are lightweight, timely scan templates that you can use to scan your assets for a
particular vulnerability. Tenable frequently updates the Tenable Vulnerability Management Tactical
Scans library with templates that detect the latest vulnerabilities of public interest.
Unlike standard Tenable Nessus Agent vulnerability scans, the Collect Inventory template uses
Tenable's Frictionless Assessment technology to provide faster scan results and reduce the scan's
system footprint. Agent-based inventory scans gather basic information from a host and upload it
to Tenable Vulnerability Management. Then, Tenable Vulnerability Management analyzes the
information against missing patches and vulnerabilities as Tenable releases coverage. This reduces
the performance impact on the target host while also reducing the time it takes for an analyst to
see the impact of a recent patch. For more information, see Tenable-Provided Nessus Agent
- 10 -
Templates .
- 11 -
Settings Configuration
Once you select the scan template to use for your scan, there are several configurations that you can use to
tune the scan configuration's performance. The following topics describe each of the scan configuration
sections — Settings, Credentials, Compliance, and Plugins — and how you can configure each section to
maximize your scan's performance.
Note: Depending on what scan template you choose, you may not see some of the settings and sections
described. For example, most scan templates do not allow you to configure plugin families.
A scan configuration's settings greatly affect the scan's capabilities, performance, and scan time.
Use the settings to configure when and how often Tenable Vulnerability Management launches the
scan, discovery options, debugging capabilities, assessment methods, performance options, and
other scan behavior. Tenable Vulnerability Management divides the configuration Settings into five
categories: Basic, Discovery, Assessment, Report, and Advanced.
Some of the scan configuration settings are informational or do not affect scan performance (for
example, Name, Description, and Notification settings). This section describes all the settings that
do affect scan performance and how to tune them for better scan performance.
Click the following setting categories to learn more about them and how to tune them:
Basic
Use the Basic settings to choose which sensors perform the scan, what targets/assets the sensors
scan, and the schedule on which Tenable Vulnerability Management launches the scan. All three of
these aspects greatly impact the scope and performance of the scan.
Scanner Type Specifies whether a local, internal scanner or a Your internal Nessus
cloud-managed scanner performs the scan, and scanners always
determines whether the Scanner setting lists local have the potential to
or cloud-managed scanners to choose from. provide better
performance and
tuning capabilities
- 12 -
than Tenable's cloud
scanners.
Scanner Specifies the scanner that performs the scan. Targeting a scanner
group and using
Select a scanner based on the location of the
multiple scanners
targets you want to scan. For example:
provides faster
l Select a linked scanner to scan non-routable scans and the option
IP addresses. for scanners to
failover if a scanner
Note: Auto-select is not available for cloud
is unresponsive.
scanners.
Scan Window Specifies the timeframe after which the scan The Scan Window
automatically stops. Use the drop-down box to can be useful to limit
select an interval of time or type a custom scan scans in specialized
window. environments or
- 13 -
Note: The scan window timeframe only applies to the during maintenance
scan job. After the scan job completes within the windows.
timeframe, or once the scan job stops due to the scan
window ending, Tenable Vulnerability Management
may still need to index the scan job for up to 24 hours.
This can cause the scan not to show as Completed
after the scan window is complete. Once Tenable
Vulnerability Management indexes the scan, it shows
as Completed.
- 14 -
scan, and the scan searches for the triggers in
their listed order (in other words, if the scan is
not triggered by the first trigger, it searches for
the second trigger).
Schedule
- 15 -
runs on the first Monday of each
subsequent month at the selected time.
Time Zone Specifies the timezone of the value set for Starts.
Discovery
The Discovery settings determine the scan configuration's discovery-related capabilities: host
discovery, port scanning, and service discovery.
Discovery settings are limited for Nessus Agent scan templates because agents cannot perform
remote checks or scan the network. You can only set the WMI and SSH settings for agent scans.
- 16 -
Host Discovery
Ping the If set to On, the scanner pings remote hosts on multiple
remote host ports to determine if they are alive. Additional options
General Settings and Ping Methods appear.
Use fast When disabled, if a host responds to ping, Tenable This setting can
network Vulnerability Management attempts to avoid false increase scan
discovery positives, performing additional tests to verify the speeds, but it
(available if response did not come from a proxy or load balancer. may not be
Ping the These checks can take some time, especially if the appropriate in
remote host is remote host is firewalled. all
enabled) environments
When enabled, Tenable Vulnerability Management does
due to target
not perform these checks.
configurations.
- 17 -
increase scan
times. For more
information,
see the Ping
Type
Order/Hierarchy
community
article.
Fragile Devices Determines which fragile devices the scanner or Tenable does
scanners detect. You can enable scanning for network not recommend
printers, Novell NetWare hosts, and Operational scanning fragile
Technology (OT) devices. devices in a
production
environment
because it may
cause an
operational
impact. If you
have a need to
assess OT
devices,
consider using
OT Security to
perform in-
depth
assessments.
Port Scanning
- 18 -
Consider When enabled, if a port is not scanned with a selected
Unscanned port scanner (for example, the port falls outside of the
Ports as specified range), the scanner considers it closed.
Closed
l (\d+)\/(tcp|udp) to $2:$1
l tcp to T
l udp to U
- 19 -
services
WMI (netstat) When enabled, the scanner uses netstat to check for
open ports from the local machine. It relies on the
- 20 -
netstat command being available via a WMI connection
to the target.
Verify open When enabled, if a local port enumerator (for example, If enabled, this
TCP ports WMI or netstat) finds a port, the scanner also verifies setting will
found by local that the port is open remotely. This approach helps increase scan
port determine if some form of access control is being used duration.
enumerators (for example, TCP wrappers or a firewall).
SYN Use the built-in Tenable Nessus SYN scanner to identify SYN scanning is
open TCP ports on the target hosts. SYN scans do not more efficient
initiate a full TCP three-way handshake. The scanner than TCP
sends a SYN packet to the port, waits for SYN-ACK scanning in
reply, and determines the port state based on a most
response or lack of response. circumstances
due to less
If you enable this option, you can also set the Override
network traffic.
Automatic Firewall Detection option.
Override This setting can be enabled if you enable either the TCP
automatic or SYN option.
- 21 -
firewall When enabled, this setting overrides automatic firewall
detection detection.
UDP This option engages the built-in Tenable Nessus UDP Enabling the
scanner to identify open UDP ports on the targets. UDP port
scanner may
Due to the nature of the protocol, it is generally not
dramatically
possible for a port scanner to tell the difference
increase the
between open and filtered UDP ports.
scan time and
produce
unreliable
results.
Consider using
the local port
enumeration
options instead
if possible.
Service Discovery
Probe all ports When enabled, the scanner attempts to map each open
to find port with the service that is running on that port, as
- 22 -
services defined by the Port scan range option.
Search for Specifies which ports on target hosts the scanner Enabling CRL
SSL/TLS/DTLS searches for SSL/TLS services. checking
services increases scan
This setting has two options:
times.
l Known SSL/TLS ports
For more information, see Discovery Settings in Vulnerability Management Scans. To learn more
about the preconfigured Discovery scan template settings, see Preconfigured Discovery Settings.
Assessment
The Assessment section allows you to configure how the scan identifies vulnerabilities and which
vulnerabilities the sensors identify. This includes identifying malware, assessing the vulnerability of
a system to brute force attacks, and the susceptibility of web applications.
Setting or
Description Tuning Tips
Settings Group
General
- 23 -
host. As a middle ground between these two
settings, disable this setting.
Perform Causes various plugins to work harder. For Enabling this setting
thorough tests example, when looking through SMB file shares, a increases scan times.
(may disrupt plugin analyzes 3 directory levels deep instead of
your network or 1. This could cause much more network traffic
impact scan and analysis in some cases. By being more
speed) thorough, the scan is more intrusive and is more
likely to disrupt the network, while potentially
providing better audit results.
- 24 -
accounts (slow) software.
This is a legacy configuration and should not be altered in most environments. You can use
OT Security to assess SCADA systems.
Scan web If enabled, Nessus enables web application-level This setting can be
applications checks. useful for scanning
network services
running web
applications. To scan
for more generic web
application
vulnerabilities like
Cross Site Scripting
or SQL Injection,
Tenable recommends
using the Tenable
Web App Scanning
module. For more
information, see
- 25 -
Tenable Web App
Scanning Scanning
Overview.
Windows
Malware
- 26 -
Provide your A text file with one MD5 hash per line that
own list of specifies more known bad MD5 hashes.
known bad MD5
Optionally, you can include a description for a
hashes
hash by adding a comma after the hash, followed
by the description. If the sensor finds any
matches when scanning a target, the description
appears in the scan results. You can also use
hash-delimited comments (for example, fop) in
addition to comma-separated comments.
Provide your A text file with one MD5 hash per line that
own list of specifies more known good MD5 hashes.
known good
Optionally, you can include a description for each
MD5 hashes
hash by adding a comma after the hash, followed
by the description. If the sensor finds any
matches when scanning a target, and you provide
a description for the hash, the description
appears in the scan results. You can also use
hash-delimited comments (for example, #) in
addition to comma-separated comments.
Hosts file allow Tenable checks system hosts files for signs of a
list compromise (for example, Plugin ID 23910 titled
Compromised Windows System (hosts File
Check)). This option allows you to upload a file
containing a list of IPs and hostnames you want
Tenable to ignore during a scan. Include one IP
and one hostname (formatted identically to your
hosts file on the target) per line in a regular text
file.
Yara Rules A .yar file containing the YARA rules to be applied Tenable supports all
in the scan. You can only upload one file per the YARA 3.4 built-in
scan, so include all rules in a single file. For more keywords including
- 27 -
information, see those defined in the
https://yara.readthedocs.io/en/latest/. PE and ELF sub-
modules, excluding
hash functionality.
Tenable products do
not support Yara
imphash checks.
Scan file system If enabled, Tenable can scan system directories Enabling this setting
and files on host computers. increases scan times.
- 28 -
Scan file system C://) and you cannot use variables (for example,
enabled) %Systemroot%).
For more information, see Assessment Settings in Vulnerability Management Scans. To learn more
about the preconfigured Assessment scan template settings, see Preconfigured Assessment
Settings.
Report
The Report settings affect the verbosity and formatting of scan reports you can create for the scan
configuration. Report settings do not affect scan performance. However, Tenable recommends
reviewing and configuring them per your organization's needs. For more information, see Report
Settings in Vulnerability Management Scans.
Advanced
The Advanced section allows you to configure more general settings, performance options, and
debugging capabilities.
- 29 -
General Settings (Nessus Scanner templates only)
Enable safe When enabled, disables all plugins that Tenable does not recommend
checks may have an adverse effect on the disabling this setting in
remote host. production environments; the
plugins could crash services or
targets. However, disabling
the setting may provide more
insight for systems likely to be
under attack (for example,
internet-facing systems).
- 30 -
prompts the scanner provides the necessary
text input to accept the disclaimer
prompt and continue the scan.
- 31 -
Performance Options (Nessus Scanner templates only)
Network timeout Specifies the time that Tenable waits Be cautious when increasing
(in seconds) for a response from a host unless this setting as it impacts every
otherwise specified within a plugin. If check that relies on a timeout.
you are scanning over a slow It can increase scan times by
connection, you may want to set this to an order of magnitude.
a higher number of seconds.
- 32 -
Max Increasing this setting's value
simultaneous can decrease scan times, but
hosts per scan doing so increases the load on
your Nessus scanners. After a
certain point, dependent on
the available resources on the
Nessus scanner and the
number of systems being
scanned, increasing this
setting can make scans slower
as it tries to make the
scanners do more than they
are capable of.
- 33 -
sessions Nessus Engine setting (that
you set on each scanner) is an absolute
cap that applies across all running
scans on a scanner. (For example, if you
have four scanners and do not want
them to generate more than 10000
simultaneous TCP sessions in total at
any point in time, you can set that global
setting to 2500 for each individual
scanner.)
- 34 -
Include filepath A plain text file containing a list of
filepaths to include from all plugins that
search using the find command on
Unix systems.
Debug Settings
Note: Tenable does not recommend enabling debug settings in production environments. Debug
settings generate a substantial amount of data, and can alter the overall scan time and performance.
Tenable only recommends the settings for specific debugging instances, and not for constant use.
- 35 -
Enable plugin Attaches available debug logs from
debugging plugins to the vulnerability output of
this scan.
Debug Log Level Controls the verbosity and content of Unless Tenable Support
debug log statements. instructs your organization
otherwise, set Debug Log
Level to Level 3:.
Options include:
Maximum delay (Agents 8.2 and later) If set, each agent This setting is useful for
(minutes)
- 36 -
in the agent group delays starting the preventing resource overuse
scan for a random number of minutes, in shared infrastructure (for
up to the specified maximum. example, virtual hosts).
Staggered starts can reduce the impact
of agents that use a shared resource,
such as virtual machine CPU.
For more information, see Advanced Settings in Vulnerability Management Scans. To learn more
about the preconfigured Advanced scan template settings, see Preconfigured Advanced Settings.
For more information about Vulnerability Management scan settings, see Scan Settings.
- 37 -
Credentials Configuration
Note: You do not need to configure credentials for Tenable Nessus Agent scans. Tenable Nessus Agents
already have the access needed for local security checks because they are installed directly on the asset.
The scan's Credentials configuration determines what credentials the Nessus scanners have for
scanning your organization's assets. Giving your Nessus scanners credentials (referred to as
credentialed scanning) allows you to scan a large network while also scanning for local exposures
that require further credentials to access. You can assign credentials to your scanners at three
different levels: individual scans, scan templates, and at the global Tenable Vulnerability
Management-level, known as managed credentials.
In general, giving your scanners more credentials allows them to authenticate more assets, but this
ultimately depends on the scan targets and your environment. However, the scan may take longer
to complete.
Fully credentialed scans may take longer to complete. However, this depends on other scan
configurations and the targets being assessed. In general, fully credentialed scans are preferred, as
they create less network overhead and up to ten times more information is returned to help with
risk identification and prioritization.
Credentials need to have proper privileges to work (for more information, see Nessus Credentialed
Checks in the Nessus User Guide). You may also want to provide additional security controls for
credential management (for more information, see the How to Protect Scanning Credentials:
Overview blog article).
For more information about scan credential settings, see Credentials in Vulnerability Management
Scans.
- 38 -
Compliance Configuration
The Compliance section allows you to add compliance checks (also known as audits) to your scan
configuration. Compliance checks allow the scan to discover how the host is configured and
whether it is compliant with various industry standards. You can use Tenable's preconfigured
compliance checks, or you can create and upload custom audits.
Similar to credentialed scans, adding compliance checks allows the scan to yield more data, but
doing so might also increase the overall scan time.
In general, most authority-based compliance checks (for example, baselines from CIS or DISA) do
not impact overall scan times significantly. However, audits that enable File Content checking
usually have a significant impact on scan time because they search the target file systems for the
noted patterns.
For more information about scan compliance settings, see Compliance in Vulnerability Management
Scans.
Note: The maximum number of audit files you can include in a single Policy Compliance Auditing scan is
limited by the total runtime and memory that the audit files require. Exceeding this limit may lead to
incomplete or failed scan results. To limit the possible impact, Tenable recommends that audit selection in
your scan policies be targeted and specific for the scan's scope and compliance requirements.
- 39 -
Plugin Configuration
The Plugins section allows you to enable or disable plugin families for the scan configuration.
Enabling and disabling plugin families determines what security checks the scan does and does not
perform. Your plugin configuration can noticeably affect how much data your scan returns and how
long it takes the scan to run. In general, a scan with more plugin families enabled takes longer to
complete but yields more scan data, and a scan with fewer plugin families enabled is faster but
yields less scan data.
Scanners automatically run the proper plugins and families against each target, and the proper
plugins are determined as each system is scanned. In general, Tenable does not recommend
disabling plugin families broadly or creating targeted scan policies with different plugin sets for
different devices as it is not necessary and can lead to misrepresentations of risk.
For more information about scan plugin settings, see Configure Plugins in Vulnerability Management
Scans.
- 40 -
Scan Launch Types
A common issue that causes unnecessary scan time is re-scanning targets unnecessarily. In
addition to a full, "standard" scan launch, Tenable Vulnerability Management provides two alternative
methods that allow you to use the same scan configuration to scan a smaller subset of targets:
custom start scans and rollover scans.
Scan Launch
Description
Type
Launch When you normally launch a scan, Tenable Vulnerability Management launches
(Standard) the scan configuration for the targets you configured in the scan settings.
Custom Start Instead of launching a scan against the targets configured in the scan
settings, you can select Custom Start to scan a single target or list of targets.
Tenable recommends using this option to test your scan configuration against
a smaller number of targets before launching a full scan.
Launch When you launch a rollover scan, the scan runs only against targets that
Rollover Tenable Vulnerability Management did not scan previously. This happens when
a scan ends before scanning all the assigned targets, which happens when:
Rollover scans allow you to achieve complete scan coverage for all your
assets, and you can use the rollover feature to split up large, network-
impacting scans.
- 41 -
Other Tips
l Avoid scan duplicates — Your organization may have multiple scan configurations that
unnecessarily scan the same host. Such scans can create duplicate scan and asset data
(sometimes referred to as scan duplicates). This often happens when an organization scans
hosts with separate credentialed and non-credentialed scan configurations to scan the same
asset (in this case, the organization can just scan the asset with the credentialed scan, which
yields the same data as the non-credentialed plus any of the data found using credentials).
Tenable recommends reviewing your scan configurations to ensure that you are not scanning
the same assets to discover the same vulnerability data with multiple scan configurations.
Note: In some circumstances, it may be advantageous to run agent and un-credentialed network
scans on the same target.
l Configure your scans for effective assessment based on your network configuration —
When exploring the most effective way to perform an assessment, scanning many systems
simultaneously isn’t always the best option. You need to consider various network factors to
determine your most effective assessment method. For more information, see the Tuning
Network Assessments for Performance and Resource Usage blog article.
- 42 -