How to configure the Nessus Vulnerability Scanner

How to configure the Nessus Vulnerability Scanner

HomeMrTurveyHow to configure the Nessus Vulnerability Scanner
How to configure the Nessus Vulnerability Scanner
ChannelPublish DateThumbnail & View CountDownload Video
Channel Avatar MrTurvey2020-10-17 15:11:55 Thumbnail
20,662 Views
Many settings in the Tenable Nessus vulnerability scanner are commonly misconfigured. Many of these are set by default and prevent you from getting accurate results. In this video, you'll learn how to configure Nessus to ensure you're performing thorough vulnerability assessments on all your Windows and Linux hosts.

Want to stay up to date on all things infosec? Check out the Pentest List, a compilation of the latest, top-rated tools and content in the infosec space: https://pentestlist.com

This is an instructional video. Get permission from the target owners before trying anything from this tutorial. If you don't, you risk punishment under the Computer Misuse Act or any equivalent law in your country.

0:00 Nessus Introduction
1:00 Nessus policy configuration
7:55 Nessus login scan
9:10 Nessus Compliance Checks
10:43 Example of a Nessus report

Nessus – https://www.tenable.com/products/nessus

Don’t forget to subscribe and like the video to keep seeing cybersecurity news!

Twitter: https://twitter.com/TurvSec

Please take the opportunity to connect with your friends and family and share this video with them if you find it useful.