0% found this document useful (0 votes)
10 views42 pages

Vulnerability Management Scan Tuning Guide

The Tenable Vulnerability Management Scan Tuning Guide outlines how to configure and optimize vulnerability scans for efficiency and effectiveness. It covers aspects such as sensor selection, scan template options, and various settings that impact scan performance. The guide emphasizes the importance of understanding the variables that influence scan time and provides recommendations for using different scanning methods based on organizational needs.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views42 pages

Vulnerability Management Scan Tuning Guide

The Tenable Vulnerability Management Scan Tuning Guide outlines how to configure and optimize vulnerability scans for efficiency and effectiveness. It covers aspects such as sensor selection, scan template options, and various settings that impact scan performance. The guide emphasizes the importance of understanding the variables that influence scan time and provides recommendations for using different scanning methods based on organizational needs.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 42

Tenable Vulnerability Management

Scan Tuning Guide


Last Revised: December 23, 2024

Copyright © 2024 Tenable, Inc. All rights reserved. Tenable, Tenable Nessus, Tenable Lumin, Assure, and the Tenable logo are registered trademarks of Tenable, Inc. or its affiliates. All other
products or services are trademarks of their respective owners.
Table of Contents

Tenable Vulnerability Management Scan Tuning Guide 1

Introduction 3

Considerations 4

Sensor Selection 7

Scan Template Selection 9

Settings Configuration 12

Credentials Configuration 38

Compliance Configuration 39

Plugin Configuration 40

Scan Launch Types 41

Other Tips 42

-2-
Introduction
The following guide describes each aspect of a Tenable Vulnerability Management (formerly known
as Tenable.io) scan configuration, and how you can tune each aspect to make your scan faster or
more data-inclusive, depending on your desired outcome.

Note: Depending on the scan template you use, you may not be able to tune some of the settings
described. The Advanced Network Scan and Advanced Agent Scan templates allow you to adjust all the
described settings available to each assessment type.

Table of Contents
l Considerations

l Sensor Selection

l Scan Template Selection

l Settings Configuration

l Credentials Configuration

l Compliance Configuration

l Plugin Configuration

l Scan Launch Types

l Other Tips

Tip: The Tenable Vulnerability Management Scan Tuning Guide is available in English and Japanese.

-3-
Considerations
Although your scan configuration plays an important role in your Vulnerability Management scan
time and performance, other variables can affect the scan time and performance. The following
table describes each variable that you should consider when trying to improve your scan time and
performance:

Impact on
Variable Impact Description
Scan Time

Scan High Your scan configuration specifies the depth of your scan.
configuration In general, increasing the depth of your scan increases the
total scan time. Consider the following when planning your
scan depth:

l What type of port scanning is Tenable Vulnerability


Management performing?

l What ports are Tenable Vulnerability Management


scanning?

l What vulnerabilities are you scanning for?

l Are you running credentialed scans?

l Are you performing malware checks, filesystem


checks, or configuration audits?

You can use Tenable-provided templates to perform both


targeted and all-encompassing checks. You can create
custom policies to customize all possible policy settings.

Scanner High The number of IP addresses you can assess


resources simultaneously via a network scan largely depends on two
available things:

l The number of available Nessus scanners to the


scan job

l The resources available to your internal Nessus

-4-
scanners

Increasing one or both of these factors is the fastest way


to improve your rate of simultaneous assessment and
overall scan time. However, large enterprise networks
often have infrastructure or technology limitations that
prohibit increasing these resources beyond a certain
maximum. Your Nessus scanners should meet the
hardware requirements whenever possible, but exceeding
the minimum requirements lets your scanners assess
more targets faster.

Note: You cannot modify some cloud scanner settings.

Type of Medium You have various options available for assessing assets in
assessment your environment. While the correct scan configuration
can vary depending on your environment, you should build
the most efficient scan configuration for your
organization's assets or environment. For example:

l Use agents for remote systems that are not local to


your scanners

l Use native cloud assessment technologies for cloud-


provided virtual machines

Number of live Medium Scanning a dead host takes less time than scanning a live
hosts host. A distribution of IP addresses with a low number of
associated hosts takes less time to scan than a
distribution of IP addresses with a higher number of
hosts.

You can choose to scan an entire range of IPs, or target


specific ones, depending on the use case for that
particular scan job. For more information, see General.

Target Medium Scanning a locked-down system with few exposed


configurations network services takes less time than complicated target

-5-
configurations. For example, a Windows server with a web
server, database, and host intrusion prevention software
takes more time to scan than a Windows 11 workstation.

Scanner proximity Medium Tenable recommends placing your scanners close to your
to targets targets, connected with minimum latency (for more
information, see the following Tenable blog article).
Latency has an additive effect on every packet exchanged
between a scanner and its target. The largest impacts
tend to be network latency and simultaneous plugin
checks.

For example:

l Scanning through routers, VPNs, load balancers, and


firewalls can impact the fidelity of your scan results
by blocking ports that should be open or by auto-
responding to closed ports.

l Scanning numerous hosts behind a single piece of


network infrastructure can increase the load on your
equipment, given the large number of sessions
exchanged between scanner and host.

Time of day and Low In many environments, there are periods of time where
week infrastructure load is higher. Scheduling assessments
outside of these windows can improve scan performance.

Target resources Low The resources available to the scan target can impact
scan time as well. A public-facing system (a system with
load) takes longer to scan than an idle backup system.

-6-
Sensor Selection
Tenable Vulnerability Management allows you to scan with one of three sensor types: Tenable's
cloud scanners, Nessus scanners, or Nessus Agents.

If you need to scan assets that are external to your network, Tenable recommends using the cloud
scanners. The cloud scanners are managed by Tenable, and do not require any upkeep from your
organization. For more information, see Cloud Sensors.

To scan assets within your network, you can choose between scanning with Nessus scanners or
Tenable Nessus Agents. The following table describes the key differences between scanning with
Nessus scanners and Nessus Agents:

Nessus scanners

Pros Cons
l Tenable Nessus scanners can scan entire l Unlike Tenable Nessus Agents, you
networks, while Tenable Nessus Agents can have to update Nessus scanner
only scan the asset they are installed on. credentials manually. This can
cause permission and login issues
l Tenable Nessus scanners allow you to
if your organization does not
perform external and remote security checks.
actively update the credentials.
l Unlike Tenable Nessus Agents, Nessus
l Network scanning with Nessus
scanners provide an "outside view" of your
scanners usually takes longer than
network through features such as port
scanning individual assets with
scanning. Nessus scanners can also provide
Tenable Nessus Agents.
an "inside view" of your network if you
configure them with credentials.

Tenable Nessus Agents

Pros Cons
l Tenable Nessus Agents are installed directly l Tenable Nessus Agents are not
on the target assets, so unlike Tenable designed to perform network
Nessus scanners, they do not require checks, so certain plugin items
managed credentials. cannot be checked if you only run
agent scans.

-7-
l Unlike Nessus scanners, you do not have to l Tenable Nessus Agents cannot
worry about the geographical placement of perform security checks that
Tenable Nessus Agents. require remote connectivity, such
as logging into a DB server, trying
l Generally, scanning individual assets with
default credentials, or traffic-
Tenable Nessus Agents is much faster than
related enumeration.
scanning the entire network.
l Unlike Tenable Nessus scanners,
l Tenable Nessus Agents can collect and send
Tenable Nessus Agent scans
asset data to Tenable Vulnerability
cannot account for any assets that
Management as the agent has internet
do not have a Tenable Nessus
access. In other words, Tenable Nessus
Agent installed.
Agents allow you to scan assets that are not
connected to your corporate network.

Ultimately, Tenable recommends using whichever sensor best suits your environment and business
requirements. In many circumstances, you should use both agents and network assessments for
different types of systems and parts of your network. To learn more about the benefits and
limitations of agent scanning, see Benefits and Limitations in the Nessus Agent User Guide.

-8-
Scan Template Selection
Tenable Vulnerability Management provides various scanner and Nessus Agent scan templates that
meet different business needs. Tenable Vulnerability Management provides four categories of scan
templates: Vulnerability Scans, Configuration Scans, Tactical Scans, and Inventory Collection. You
can view Tenable Vulnerability Management's complete offering of scan templates when you Create
a Vulnerability Management Scan in the user interface.

Click the following scan template categories to view the descriptions. For information about
specific scan templates, see Scan Templates.

Note: You can configure the Nessus Scanner templates to use cloud scanners or your Nessus scanners.

Vulnerability Scans

Tenable recommends using vulnerability scan templates for most of your organization's standard,
day-to-day scanning needs. Some of Tenable Vulnerability Management's most notable vulnerability
scan templates are:

l Advanced Network/Agent Scan — The most configurable scan type that Tenable Vulnerability
Management offers. You can configure this scan template to match any policy or search any
asset or assets. These templates have the same default settings as the Basic Network/Agent
Scan, but they allow for additional configuration options.

Note: Advanced scan templates allow Tenable Vulnerability Management experts to scan more
deeply using custom configuration, such as faster or slower checks, but misconfigurations can
cause asset outages or network saturation. Use the advanced templates with caution.

l Basic Network/Agent Scan — Use this template to scan a system or systems with all of
Tenable Vulnerability Management's default plugins enabled. This scan provides a quick and
easy way to scan systems for vulnerabilities.

l Credentialed Patch Audit (Nessus Scanner only) — Use this template with credentials to give
the scanner direct access to the host, scan the target hosts, and enumerate missing patch
updates.

-9-
l Host Discovery (Nessus Scanner only) — Launch this scan to see what hosts are on your
network and associated information such as IP address, FQDN, operating systems, and open
ports, if available. After you have a list of hosts, you can choose what hosts you want to target
in a specific vulnerability scan.

Tenable recommends that organizations who do not have a passive network monitor, such as
Tenable Nessus Network Monitor, run this scan weekly to discover new assets on your
network.

Note: Assets identified by discovery scans do not count toward your license.

Configuration Scans

Tenable recommends using configuration scan templates to check whether host configurations are
compliant with various industry standards. Configuration scans are sometimes referred to as
compliance scans. For more information about the checks that compliance scans can perform, see
Compliance in Vulnerability Management Scans and SCAP Settings in Vulnerability Management
Scans.

Tactical Scans

Tenable recommends using the tactical scan templates to scan your network for a specific
vulnerability or group of vulnerabilities.

Tactical scans are lightweight, timely scan templates that you can use to scan your assets for a
particular vulnerability. Tenable frequently updates the Tenable Vulnerability Management Tactical
Scans library with templates that detect the latest vulnerabilities of public interest.

Inventory Collection (Nessus Agent only)

Unlike standard Tenable Nessus Agent vulnerability scans, the Collect Inventory template uses
Tenable's Frictionless Assessment technology to provide faster scan results and reduce the scan's
system footprint. Agent-based inventory scans gather basic information from a host and upload it
to Tenable Vulnerability Management. Then, Tenable Vulnerability Management analyzes the
information against missing patches and vulnerabilities as Tenable releases coverage. This reduces
the performance impact on the target host while also reducing the time it takes for an analyst to
see the impact of a recent patch. For more information, see Tenable-Provided Nessus Agent

- 10 -
Templates .

- 11 -
Settings Configuration
Once you select the scan template to use for your scan, there are several configurations that you can use to
tune the scan configuration's performance. The following topics describe each of the scan configuration
sections — Settings, Credentials, Compliance, and Plugins — and how you can configure each section to
maximize your scan's performance.

Note: Depending on what scan template you choose, you may not see some of the settings and sections
described. For example, most scan templates do not allow you to configure plugin families.

A scan configuration's settings greatly affect the scan's capabilities, performance, and scan time.
Use the settings to configure when and how often Tenable Vulnerability Management launches the
scan, discovery options, debugging capabilities, assessment methods, performance options, and
other scan behavior. Tenable Vulnerability Management divides the configuration Settings into five
categories: Basic, Discovery, Assessment, Report, and Advanced.

Some of the scan configuration settings are informational or do not affect scan performance (for
example, Name, Description, and Notification settings). This section describes all the settings that
do affect scan performance and how to tune them for better scan performance.

Click the following setting categories to learn more about them and how to tune them:

Basic

Use the Basic settings to choose which sensors perform the scan, what targets/assets the sensors
scan, and the schedule on which Tenable Vulnerability Management launches the scan. All three of
these aspects greatly impact the scope and performance of the scan.

Setting Description Tuning Tips

General (Nessus Scanner templates only)

Scanner Type Specifies whether a local, internal scanner or a Your internal Nessus
cloud-managed scanner performs the scan, and scanners always
determines whether the Scanner setting lists local have the potential to
or cloud-managed scanners to choose from. provide better
performance and
tuning capabilities

- 12 -
than Tenable's cloud
scanners.

Scanner Specifies the scanner that performs the scan. Targeting a scanner
group and using
Select a scanner based on the location of the
multiple scanners
targets you want to scan. For example:
provides faster
l Select a linked scanner to scan non-routable scans and the option
IP addresses. for scanners to
failover if a scanner
Note: Auto-select is not available for cloud
is unresponsive.
scanners.

l Select a scanner group if you want to:


o Improve scan speed by balancing the
scan load among multiple scanners.
o Rebuild scanners and link new scanners
in the future without having to update
scanner designations in scan
configurations.

l Select Auto-Select to enable scan routing for


the targets.

Network, The Network, Target Groups, Targets, Upload Targeting specific


Target Targets, and Tags options are all different methods assets provides
Groups, you can use to specify which hosts the scan runs faster scan results
Targets, against. than scans that
Upload target IP ranges or
Targets, and CIDR notation.
Tags

Scan Window Specifies the timeframe after which the scan The Scan Window
automatically stops. Use the drop-down box to can be useful to limit
select an interval of time or type a custom scan scans in specialized
window. environments or

- 13 -
Note: The scan window timeframe only applies to the during maintenance
scan job. After the scan job completes within the windows.
timeframe, or once the scan job stops due to the scan
window ending, Tenable Vulnerability Management
may still need to index the scan job for up to 24 hours.
This can cause the scan not to show as Completed
after the scan window is complete. Once Tenable
Vulnerability Management indexes the scan, it shows
as Completed.

Scan Type (Nessus Agent templates only)

Scan Type Specifies whether the agent scans occur based on a


scan window or triggers:

l Scan Window — Specifies the timeframe


during which agents must report to be used in
vulnerability reports.

You have to launch Window scans explicitly or


schedule them to launch at a particular time.

l Triggered Scan — Specifies the triggers that


cause agents to report in. Use the drop-down
boxes to select from the following trigger
types:

l Interval — The time interval (hours)


between each scan (for example, every
12 hours).

l File Name — The file name that triggers


the agent scan. The scan triggers when
Tenable Vulnerability Management
detects the file name in the trigger
directory.

Tip: You can set multiple triggers for a single

- 14 -
scan, and the scan searches for the triggers in
their listed order (in other words, if the scan is
not triggered by the first trigger, it searches for
the second trigger).

Note: Agents perform triggered scans


automatically, and do not require an admin to
launch or schedule them to launch at a
particular time. Triggered scans also do not
generate a scan DB or UUID.

Schedule

Frequency Specifies how often Tenable Vulnerability Tenable


Management launches the scan. recommends running
full vulnerability
l Once — Schedule the scan at a specific time.
scans against most
l Daily —Schedule the scan to occur every 1-20 types of assets at
days, at a specific time. least twice a week.
l Weekly — Schedule the scan to occur every 1-
20 weeks, by time and day or days of the
week.

l Monthly — Schedule the scan to occur every 1-


20 months, by:

l Day of Month — The scan repeats


monthly on a specific day of the month
at the selected time. For example, if you
select a start date of October 3, the scan
repeats on the 3rd of each subsequent
month at the selected time.

l Week of Month — The scan repeats


monthly on a specific day of the week.
For example, if you select a start date of
the first Monday of the month, the scan

- 15 -
runs on the first Monday of each
subsequent month at the selected time.

Note: If you schedule your scan to recur


monthly and by time and day of the month,
Tenable recommends setting a start date no
later than the 28th day. If you select a start date
that does not exist in some months (for
example, the 29th), Tenable Vulnerability
Management cannot run the scan on those
days.

l Yearly — Schedule the scan to occur every 1-


20 years, by time and date.

Starts Specifies the exact date and time when a scan


launches.

The starting date defaults to the date when you are


creating the scan. The starting time is the nearest
half-hour interval. For example, if you create your
scan on 09/31/2018 at 9:12 AM, Tenable Vulnerability
Management sets the default starting date and time
to 09/31/2018 and 09:30.

Time Zone Specifies the timezone of the value set for Starts.

For more information, see Basic Settings in Vulnerability Management Scans .

Discovery

The Discovery settings determine the scan configuration's discovery-related capabilities: host
discovery, port scanning, and service discovery.

Discovery settings are limited for Nessus Agent scan templates because agents cannot perform
remote checks or scan the network. You can only set the WMI and SSH settings for agent scans.

Setting Description Tuning Tips

- 16 -
Host Discovery

Ping the If set to On, the scanner pings remote hosts on multiple
remote host ports to determine if they are alive. Additional options
General Settings and Ping Methods appear.

If set to Off, the scanner does not ping remote hosts on


multiple ports during the scan.

Note: To scan VMware guest systems, Ping the remote


host must be set to Off.

Scan Specifies whether the Nessus scanner scans hosts that


Unresponsive do not respond to any ping methods. This option is only
Hosts available for scans using the PCI Quarterly External Scan
template.

Use fast When disabled, if a host responds to ping, Tenable This setting can
network Vulnerability Management attempts to avoid false increase scan
discovery positives, performing additional tests to verify the speeds, but it
(available if response did not come from a proxy or load balancer. may not be
Ping the These checks can take some time, especially if the appropriate in
remote host is remote host is firewalled. all
enabled) environments
When enabled, Tenable Vulnerability Management does
due to target
not perform these checks.
configurations.

Ping Methods Specifies the sensor's pinging method. In most


(available if environments,
Ping the Tenable
remote host is recommends
enabled) using the
default ping
methods.
Enabling UDP
can greatly

- 17 -
increase scan
times. For more
information,
see the Ping
Type
Order/Hierarchy
community
article.

Fragile Devices Determines which fragile devices the scanner or Tenable does
scanners detect. You can enable scanning for network not recommend
printers, Novell NetWare hosts, and Operational scanning fragile
Technology (OT) devices. devices in a
production
environment
because it may
cause an
operational
impact. If you
have a need to
assess OT
devices,
consider using
OT Security to
perform in-
depth
assessments.

Wake-on-LAN The Wake-on-LAN (WOL) menu controls which hosts to


send WOL magic packets to before performing a scan.
You can provide a list of hosts that you want to start
before scanning by uploading a text file that lists one
MAC address per line.

Port Scanning

- 18 -
Consider When enabled, if a port is not scanned with a selected
Unscanned port scanner (for example, the port falls outside of the
Ports as specified range), the scanner considers it closed.
Closed

Port Scan Specifies the range of ports to be scanned. If you have


Range insight into
The supported ranges are:
local cross-
l default — Instructs the scanner to scan traffic in your
approximately 4,790 commonly used ports network, you
specified in the nessus-services file. You can can refine this
also combine the default keyword with other setting to only
ports and port ranges. include the
active listening
Note: You can convert the nessus-services services on
file to a custom list of ports by performing four
your network,
consecutive regular expression (regex) replace-
all operations in a text editor that supports but this may
such operations: cause the scan
l .*\s+(\d+)\/(tcp|udp)(\r\n|\r|\n) to miss unused
to $1\/$2, services.

l (\d+)\/(tcp|udp) to $2:$1
l tcp to T
l udp to U

You can find the nessus-services file in the


following directories, depending on your
operating system:
l Linux — /opt/nessus/var/nessus/nessus-
services
l Windows —
C:\ProgramData\Tenable\Nessus\nessus
\nessus-services
l macOS —
/Library/Nessus/run/var/nessus/nessus-

- 19 -
services

l all — Instructs the scanner to scan all 65,536


ports, including port 0. You cannot combine the
all keyword with other ranges.

l A comma-separated list of ports (for example,


21,23,25,80,110), port ranges (for example, 1-
1024,9000-9200 or 1-65535 to scan all ports but 0
and T:1-1024,U:300-500 or 1-1024,T:1024-
65535,U:1025 to scan separate or overlapping TCP
and UDP port ranges), or combinations thereof.

If you disable the UDP, SYN, or TCP port scanner


settings in the scan policy Discovery settings, those
ports are not scanned despite what range of ports you
specify. The UDP and TCP port scanner settings are
disabled by default; the SYN port scanner setting is
enabled by default.

SSH (netstat) When enabled, the scanner uses netstat to determine


open ports while performing an authenticated SSH-
based scan.

In addition, the scanner:

l Ignores any custom range specified in the Port


Scan Range setting.

l Continues to treat unscanned ports as closed if


the Consider unscanned ports as closed setting is
enabled.

If any port enumerator (netstat or SNMP) is successful,


the port range becomes all.

WMI (netstat) When enabled, the scanner uses netstat to check for
open ports from the local machine. It relies on the

- 20 -
netstat command being available via a WMI connection
to the target.

SNMP When enabled, the scanner uses SNMP details to


determine open ports while performing a SNMP-based
scan.

Only run If a local port enumerator runs, all network port


network port scanners will be disabled for that asset.
scanners if
local port
enumeration
failed

Verify open When enabled, if a local port enumerator (for example, If enabled, this
TCP ports WMI or netstat) finds a port, the scanner also verifies setting will
found by local that the port is open remotely. This approach helps increase scan
port determine if some form of access control is being used duration.
enumerators (for example, TCP wrappers or a firewall).

TCP Use the built-in Tenable Nessus TCP scanner to identify


open TCP ports on the targets, using a full TCP three-
way handshake. If you enable this option, you can also
set the Override Automatic Firewall Detection option.

SYN Use the built-in Tenable Nessus SYN scanner to identify SYN scanning is
open TCP ports on the target hosts. SYN scans do not more efficient
initiate a full TCP three-way handshake. The scanner than TCP
sends a SYN packet to the port, waits for SYN-ACK scanning in
reply, and determines the port state based on a most
response or lack of response. circumstances
due to less
If you enable this option, you can also set the Override
network traffic.
Automatic Firewall Detection option.

Override This setting can be enabled if you enable either the TCP
automatic or SYN option.

- 21 -
firewall When enabled, this setting overrides automatic firewall
detection detection.

This setting has three options:

l Use aggressive detection attempts to run plugins


even if the port appears to be closed. It is
recommended that this option not be used on a
production network.

l Use soft detection disables the ability to monitor


how often resets are set and to determine if there
is a limitation configured by a downstream
network device.

l Disable detection disables the firewall detection


feature.

UDP This option engages the built-in Tenable Nessus UDP Enabling the
scanner to identify open UDP ports on the targets. UDP port
scanner may
Due to the nature of the protocol, it is generally not
dramatically
possible for a port scanner to tell the difference
increase the
between open and filtered UDP ports.
scan time and
produce
unreliable
results.
Consider using
the local port
enumeration
options instead
if possible.

Service Discovery

Probe all ports When enabled, the scanner attempts to map each open
to find port with the service that is running on that port, as

- 22 -
services defined by the Port scan range option.

Caution: In some rare cases, probing might disrupt some


services and cause unforeseen side effects.

Search for Specifies which ports on target hosts the scanner Enabling CRL
SSL/TLS/DTLS searches for SSL/TLS services. checking
services increases scan
This setting has two options:
times.
l Known SSL/TLS ports

l All TCP ports

For more information, see Discovery Settings in Vulnerability Management Scans. To learn more
about the preconfigured Discovery scan template settings, see Preconfigured Discovery Settings.

Assessment

The Assessment section allows you to configure how the scan identifies vulnerabilities and which
vulnerabilities the sensors identify. This includes identifying malware, assessing the vulnerability of
a system to brute force attacks, and the susceptibility of web applications.

Setting or
Description Tuning Tips
Settings Group

General

Override normal In some cases, Tenable Vulnerability


accuracy Management cannot remotely determine whether
a flaw is present or not. If report paranoia is set
to Show potential false alarms, a flaw is
reported every time, even when there is a doubt
about the remote host being affected.
Conversely, a paranoia setting of Avoid potential
false alarms causes Tenable Vulnerability
Management to not report any flaw whenever
there is a hint of uncertainty about the remote

- 23 -
host. As a middle ground between these two
settings, disable this setting.

Perform Causes various plugins to work harder. For Enabling this setting
thorough tests example, when looking through SMB file shares, a increases scan times.
(may disrupt plugin analyzes 3 directory levels deep instead of
your network or 1. This could cause much more network traffic
impact scan and analysis in some cases. By being more
speed) thorough, the scan is more intrusive and is more
likely to disrupt the network, while potentially
providing better audit results.

Antivirus Configure the delay of the Antivirus software


definition grace check for a set number of days (0-7). The
period (in days) Antivirus Software Check menu allows you to
direct Tenable to allow for a specific grace time
in reporting when antivirus signatures are out of
date. By default, Tenable considers signatures
out of date regardless of how long ago an update
became available (for example, a few hours ago).
You can configure this option to allow for up to 7
days before reporting them out of date.

SMTP (Nessus Scanner templates only) Allows you to


enable SMTP testing on the scan configuration.

Brute Force (Nessus Scanner templates only)

Only use In some cases, Tenable can test for default


credentials accounts and known default passwords. This can
provided by the cause the account to lock if too many
user consecutive invalid attempts trigger security
protocols on the operating system or application.
By default, this setting is enabled to prevent
Tenable from performing these tests.

Test default Test for known default accounts in Oracle

- 24 -
accounts (slow) software.

SCADA (Nessus Scanner templates only)

This is a legacy configuration and should not be altered in most environments. You can use
OT Security to assess SCADA systems.

Modbus/TCP Modbus uses a function code of 1 to read coils in


Coil Access a Modbus child. Coils represent binary output
settings and are mapped to actuators typically.
The ability to read coils may help an attacker
profile a system and identify ranges of registers
to alter via a write coil message.

ICCP/COTP The ICCP/COTP TSAP Addressing menu


TSAP determines a Connection-Oriented Transport
Addressing Protocol (COTP) Transport Service Access Points
Weakness (TSAP) value on an ICCP server by trying possible
values.

Web Applications (Nessus Scanner templates only)

Scan web If enabled, Nessus enables web application-level This setting can be
applications checks. useful for scanning
network services
running web
applications. To scan
for more generic web
application
vulnerabilities like
Cross Site Scripting
or SQL Injection,
Tenable recommends
using the Tenable
Web App Scanning
module. For more
information, see

- 25 -
Tenable Web App
Scanning Scanning
Overview.

Windows

Request If enabled, domain users are queried instead of


information local users.
about the SMB
Domain

User You can enable as many of the user enumeration


Enumeration methods as appropriate for user discovery.
Methods

Malware

Scan for Configures the policy to scan for malware on the


malware target hosts. Enable this setting to view the
remaining Malware options.

Disable DNS Checking this option prevents Tenable from


resolution using the cloud to compare scan findings against
known malware.

Custom Netstat A text file that contains a list of known bad IP


IP Threat List addresses that you want to detect.

Each line in the file must begin with an IPv4


address. Optionally, you can add a description by
adding a comma after the IP address, followed by
the description. You can also use hash-delimited
comments (e.g., #) in addition to comma-
delimited comments.

Note: Tenable does not detect private IP ranges in


the text file.

- 26 -
Provide your A text file with one MD5 hash per line that
own list of specifies more known bad MD5 hashes.
known bad MD5
Optionally, you can include a description for a
hashes
hash by adding a comma after the hash, followed
by the description. If the sensor finds any
matches when scanning a target, the description
appears in the scan results. You can also use
hash-delimited comments (for example, fop) in
addition to comma-separated comments.

Provide your A text file with one MD5 hash per line that
own list of specifies more known good MD5 hashes.
known good
Optionally, you can include a description for each
MD5 hashes
hash by adding a comma after the hash, followed
by the description. If the sensor finds any
matches when scanning a target, and you provide
a description for the hash, the description
appears in the scan results. You can also use
hash-delimited comments (for example, #) in
addition to comma-separated comments.

Hosts file allow Tenable checks system hosts files for signs of a
list compromise (for example, Plugin ID 23910 titled
Compromised Windows System (hosts File
Check)). This option allows you to upload a file
containing a list of IPs and hostnames you want
Tenable to ignore during a scan. Include one IP
and one hostname (formatted identically to your
hosts file on the target) per line in a regular text
file.

Yara Rules A .yar file containing the YARA rules to be applied Tenable supports all
in the scan. You can only upload one file per the YARA 3.4 built-in
scan, so include all rules in a single file. For more keywords including

- 27 -
information, see those defined in the
https://yara.readthedocs.io/en/latest/. PE and ELF sub-
modules, excluding
hash functionality.
Tenable products do
not support Yara
imphash checks.

Scan file system If enabled, Tenable can scan system directories Enabling this setting
and files on host computers. increases scan times.

Caution: Enabling this setting in scans targeting 10


or more hosts could result in performance
degradation.

Windows Enables file system scanning for certain


Directories Windows directories and user profiles.
(available with
Scan file system
enabled)

Linux Enables file system scanning for certain Linux


Directories directories.
(available with
Scan file system
enabled)

MacOS Enables file system scanning for certain macOS


Directories directories.
(available with
Scan file system
enabled)

Custom A custom file that lists directories to scan with


Directories malware file scanning. List each directory on one
(available with line. You cannot list root directories (for example,

- 28 -
Scan file system C://) and you cannot use variables (for example,
enabled) %Systemroot%).

Databases (Nessus Scanner templates only)

Use detected When enabled, if at least one host credential and


SIDs one Oracle database credential are configured,
the scanner authenticates to scan targets using
the host credentials, and then attempts to detect
Oracle System IDs (SIDs) locally. The scanner
then attempts to authenticate using the
specified Oracle database credentials and the
detected SIDs.

If the scanner cannot authenticate to scan


targets using host credentials or does not detect
any SIDs locally, the scanner authenticates to the
Oracle database using the manually specified
SIDs in the Oracle database credentials.

For more information, see Assessment Settings in Vulnerability Management Scans. To learn more
about the preconfigured Assessment scan template settings, see Preconfigured Assessment
Settings.

Report

The Report settings affect the verbosity and formatting of scan reports you can create for the scan
configuration. Report settings do not affect scan performance. However, Tenable recommends
reviewing and configuring them per your organization's needs. For more information, see Report
Settings in Vulnerability Management Scans.

Advanced

The Advanced section allows you to configure more general settings, performance options, and
debugging capabilities.

Setting Description Tuning Tips

- 29 -
General Settings (Nessus Scanner templates only)

Enable safe When enabled, disables all plugins that Tenable does not recommend
checks may have an adverse effect on the disabling this setting in
remote host. production environments; the
plugins could crash services or
targets. However, disabling
the setting may provide more
insight for systems likely to be
under attack (for example,
internet-facing systems).

Stop scanning When enabled, Tenable stops scanning


hosts that if it detects that the host has become
become unresponsive. This may occur if users
unresponsive turn off their PCs during a scan, a host
during the scan has stopped responding after a denial
of service plugin, or a security
mechanism (for example, an IDS) has
started to block traffic to a server.
Normally, continuing scans on these
machines sends unnecessary traffic
across the network and delay the scan.

Scan IP By default, Tenable scans a list of IP


addresses in a addresses in sequential order. When
random order you enable this option, Tenable scans
the list of hosts in a random order
within an IP address range. This
approach is typically useful in helping to
distribute the network traffic during
large scans.

Automatically When enabled, if a credentialed scan


accept detected tries to connect via SSH to a FortiOS
SSH disclaimer host that presents a disclaimer prompt,

- 30 -
prompts the scanner provides the necessary
text input to accept the disclaimer
prompt and continue the scan.

Scan targets When disabled, to avoid overwhelming a


with multiple host, Tenable prevents a single scanner
domain names in from simultaneously scanning multiple
parallel targets that resolve to a single IP
address. Instead, Tenable scanners
serialize attempts to scan the IP
address, whether it appears more than
once in the same scan task or in
multiple scan tasks on that scanner.
Scans may take longer to complete.

When enabled, a Tenable scanner can


simultaneously scan multiple targets
that resolve to a single IP address
within a single scan task or across
multiple scan tasks. Scans complete
more quickly, but hosts could
potentially become overwhelmed,
causing timeouts and incomplete
results.

Create unique When enabled, the scanner creates a


identifier on unique identifier for credentialed scans.
hosts scanned
using credentials

Trusted CAs Specifies CA certificates that the scan


considers as trusted. This allows you to
use self-signed certificates for SSL
authentication without triggering plugin
51192 as a vulnerability in your Tenable
Vulnerability Management environment.

- 31 -
Performance Options (Nessus Scanner templates only)

Slow down the When enabled, Tenable detects when it


scan when is sending too many packets and the
network network pipe is approaching capacity. If
congestion is network congestion is detected,
detected throttles the scan to accommodate and
alleviate the congestion. Once the
congestion has subsided, Tenable
automatically attempts to use the
available space within the network pipe
again.

Use Linux kernel When enabled, Tenable uses the Linux


congestion kernel to detect when it sends too
detection many packets and the network pipe
approaches capacity. If detected,
Tenable throttles the scan to
accommodate and alleviate the
congestion. Once the congestion
subsides, Tenable automatically
attempts to use the available space
within the network pipe again.

Network timeout Specifies the time that Tenable waits Be cautious when increasing
(in seconds) for a response from a host unless this setting as it impacts every
otherwise specified within a plugin. If check that relies on a timeout.
you are scanning over a slow It can increase scan times by
connection, you may want to set this to an order of magnitude.
a higher number of seconds.

Max Specifies the maximum number of Tenable recommends that you


simultaneous checks a Tenable scanner will perform monitor scan target
checks per host against a single host at one time. performance when adjusting
this setting.

- 32 -
Max Increasing this setting's value
simultaneous can decrease scan times, but
hosts per scan doing so increases the load on
your Nessus scanners. After a
certain point, dependent on
the available resources on the
Nessus scanner and the
number of systems being
scanned, increasing this
setting can make scans slower
as it tries to make the
scanners do more than they
are capable of.

Max number of Specifies the maximum number of


concurrent TCP established TCP sessions for a single
sessions per host.
host
This TCP throttling option also controls
the number of packets per second the
SYN scanner sends, which is 10 times
the number of TCP sessions. For
example, if this option is set to 15, the
SYN scanner sends 150 packets per
second at most.

Max number of Specifies the maximum number of


concurrent TCP established TCP sessions for each scan
sessions per task, regardless of the number of hosts
scan being scanned.

Note: The MAX NUMBER OF


CONCURRENT TCP SESSIONS PER SCAN
setting is not enforceable in a Discovery
scan. The global.max_simult_tcp_

- 33 -
sessions Nessus Engine setting (that
you set on each scanner) is an absolute
cap that applies across all running
scans on a scanner. (For example, if you
have four scanners and do not want
them to generate more than 10000
simultaneous TCP sessions in total at
any point in time, you can set that global
setting to 2500 for each individual
scanner.)

For scanners installed on any Windows


host, you must set this value to 19 or
less to get accurate results.

Unix find command Options

Exclude filepath A plain text file containing a list of


filepaths to exclude from all plugins
that search using the find command on
Unix systems.

In the file, enter one filepath per line,


formatted per patterns allowed by the
Unix find command -path argument. For
more information, see the find
command man page.

Exclude A plain text file containing a list of


filesystem filesystems to exclude from all plugins
that search using the find command on
Unix systems.

In the file, enter one filesystem per line,


using filesystem types supported by the
Unix find command -fstype argument.
For more information, see the find
command man page.

- 34 -
Include filepath A plain text file containing a list of
filepaths to include from all plugins that
search using the find command on
Unix systems.

In the file, enter one filepath per line,


formatted per patterns allowed by the
Unix find command -path argument.
For more information, see the find
command man page.

Including filepaths increases the


locations that are searched by plugins,
which extends the duration of the scan.
Make your inclusions as specific as
possible.

Tip: Avoid having the same filepaths in


Include Filepath and Exclude Filepath.
This conflict may result in the filepath
being excluded from the search, though
results may vary by operating system.

Debug Settings

Note: Tenable does not recommend enabling debug settings in production environments. Debug
settings generate a substantial amount of data, and can alter the overall scan time and performance.
Tenable only recommends the settings for specific debugging instances, and not for constant use.

Always report When enabled, Tenable generates a


SSH commands report of all the commands run over
SSH on the host in a machine-readable
format. You can view the reported
commands under plugin 168017.

Note: The setting does not function


correctly if you disable plugin 168017.

- 35 -
Enable plugin Attaches available debug logs from
debugging plugins to the vulnerability output of
this scan.

Debug Log Level Controls the verbosity and content of Unless Tenable Support
debug log statements. instructs your organization
otherwise, set Debug Log
Level to Level 3:.

Enumerate Shows a list of plugins that Tenable


launched plugins launched during the scan. You can view
the list in scan results under plugin
112154.

Note: The setting does not function


correctly if you disable plugin 112154.

Audit Trail Controls verbosity of the plugin audit


Verbosity trail.

Options include:

l No audit trail — (Default) Tenable


does not generate a plugin audit
trail.

l All audit trail data — The audit


trail includes the reason why
plugins were not included in the
scan.

l Only scan errors — The audit trail


includes only errors encountered
during the scan.

Stagger scan start (Nessus Agent templates only)

Maximum delay (Agents 8.2 and later) If set, each agent This setting is useful for
(minutes)

- 36 -
in the agent group delays starting the preventing resource overuse
scan for a random number of minutes, in shared infrastructure (for
up to the specified maximum. example, virtual hosts).
Staggered starts can reduce the impact
of agents that use a shared resource,
such as virtual machine CPU.

If the maximum delay you set exceeds


your scan window, Tenable shortens
your maximum delay to ensure that
agents begin scanning at least 30
minutes before the scan window
closes.

Compliance Output Settings

Maximum Controls the maximum output length


compliance for each individual compliance check
output length in value that the target returns. If a
KB compliance check value that is greater
than this setting's value, Tenable
Vulnerability Management truncates the
result.

Note: If you notice that your compliance


scan processing is slow, Tenable
recommends reducing this setting to
increase the processing speed.

For more information, see Advanced Settings in Vulnerability Management Scans. To learn more
about the preconfigured Advanced scan template settings, see Preconfigured Advanced Settings.

For more information about Vulnerability Management scan settings, see Scan Settings.

- 37 -
Credentials Configuration

Note: You do not need to configure credentials for Tenable Nessus Agent scans. Tenable Nessus Agents
already have the access needed for local security checks because they are installed directly on the asset.

The scan's Credentials configuration determines what credentials the Nessus scanners have for
scanning your organization's assets. Giving your Nessus scanners credentials (referred to as
credentialed scanning) allows you to scan a large network while also scanning for local exposures
that require further credentials to access. You can assign credentials to your scanners at three
different levels: individual scans, scan templates, and at the global Tenable Vulnerability
Management-level, known as managed credentials.

In general, giving your scanners more credentials allows them to authenticate more assets, but this
ultimately depends on the scan targets and your environment. However, the scan may take longer
to complete.

Fully credentialed scans may take longer to complete. However, this depends on other scan
configurations and the targets being assessed. In general, fully credentialed scans are preferred, as
they create less network overhead and up to ten times more information is returned to help with
risk identification and prioritization.

Credentials need to have proper privileges to work (for more information, see Nessus Credentialed
Checks in the Nessus User Guide). You may also want to provide additional security controls for
credential management (for more information, see the How to Protect Scanning Credentials:
Overview blog article).

For more information about scan credential settings, see Credentials in Vulnerability Management
Scans.

- 38 -
Compliance Configuration
The Compliance section allows you to add compliance checks (also known as audits) to your scan
configuration. Compliance checks allow the scan to discover how the host is configured and
whether it is compliant with various industry standards. You can use Tenable's preconfigured
compliance checks, or you can create and upload custom audits.

Similar to credentialed scans, adding compliance checks allows the scan to yield more data, but
doing so might also increase the overall scan time.

In general, most authority-based compliance checks (for example, baselines from CIS or DISA) do
not impact overall scan times significantly. However, audits that enable File Content checking
usually have a significant impact on scan time because they search the target file systems for the
noted patterns.

For more information about scan compliance settings, see Compliance in Vulnerability Management
Scans.

Note: The maximum number of audit files you can include in a single Policy Compliance Auditing scan is
limited by the total runtime and memory that the audit files require. Exceeding this limit may lead to
incomplete or failed scan results. To limit the possible impact, Tenable recommends that audit selection in
your scan policies be targeted and specific for the scan's scope and compliance requirements.

- 39 -
Plugin Configuration
The Plugins section allows you to enable or disable plugin families for the scan configuration.
Enabling and disabling plugin families determines what security checks the scan does and does not
perform. Your plugin configuration can noticeably affect how much data your scan returns and how
long it takes the scan to run. In general, a scan with more plugin families enabled takes longer to
complete but yields more scan data, and a scan with fewer plugin families enabled is faster but
yields less scan data.

Scanners automatically run the proper plugins and families against each target, and the proper
plugins are determined as each system is scanned. In general, Tenable does not recommend
disabling plugin families broadly or creating targeted scan policies with different plugin sets for
different devices as it is not necessary and can lead to misrepresentations of risk.

For more information about scan plugin settings, see Configure Plugins in Vulnerability Management
Scans.

- 40 -
Scan Launch Types
A common issue that causes unnecessary scan time is re-scanning targets unnecessarily. In
addition to a full, "standard" scan launch, Tenable Vulnerability Management provides two alternative
methods that allow you to use the same scan configuration to scan a smaller subset of targets:
custom start scans and rollover scans.

Scan Launch
Description
Type

Launch When you normally launch a scan, Tenable Vulnerability Management launches
(Standard) the scan configuration for the targets you configured in the scan settings.

For more information, see Launch a Vulnerability Management Scan.

Custom Start Instead of launching a scan against the targets configured in the scan
settings, you can select Custom Start to scan a single target or list of targets.
Tenable recommends using this option to test your scan configuration against
a smaller number of targets before launching a full scan.

For more information, see Launch a Vulnerability Management Scan.

Launch When you launch a rollover scan, the scan runs only against targets that
Rollover Tenable Vulnerability Management did not scan previously. This happens when
a scan ends before scanning all the assigned targets, which happens when:

l A user manually stops the scan

l The scan times out due to the Scan Window setting

l The scanner aborts scan tasks or does not initialize properly

Rollover scans allow you to achieve complete scan coverage for all your
assets, and you can use the rollover feature to split up large, network-
impacting scans.

For more information, see Launch a Rollover Scan.

- 41 -
Other Tips
l Avoid scan duplicates — Your organization may have multiple scan configurations that
unnecessarily scan the same host. Such scans can create duplicate scan and asset data
(sometimes referred to as scan duplicates). This often happens when an organization scans
hosts with separate credentialed and non-credentialed scan configurations to scan the same
asset (in this case, the organization can just scan the asset with the credentialed scan, which
yields the same data as the non-credentialed plus any of the data found using credentials).

Tenable recommends reviewing your scan configurations to ensure that you are not scanning
the same assets to discover the same vulnerability data with multiple scan configurations.

Note: In some circumstances, it may be advantageous to run agent and un-credentialed network
scans on the same target.

l Configure your scans for effective assessment based on your network configuration —
When exploring the most effective way to perform an assessment, scanning many systems
simultaneously isn’t always the best option. You need to consider various network factors to
determine your most effective assessment method. For more information, see the Tuning
Network Assessments for Performance and Resource Usage blog article.

- 42 -

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy