To configure the Nessus scanner, complete the following steps on the Nessus host system: 1.Ĭreate a directory (known as the Results Directory) in which Nessus will save your scan results in a. Configure the Nessus Vulnerability Scanner With the steps below, you can automate the process for importing vulnerability data from a Tenable Nessus vulnerability scanner. Otherwise, see Adding a Monitored Asset for a new Log Source. If you are performing initial configuration of your TLC environment Consists of all TLC software, Managers, Log Sources, Monitored Assets, Collectors, and data in your TLC installation., see Configuring your TLC Environment. Save the file to a directory accessible by TLC. In the Download Report dialog, select the. To select multiple reports, use the SHIFT key or CTRL key. nessus file, complete the following steps in the Nessus User Interface: 1. Although TLC supports multiple formats for this file, Tripwire recommends the. nessus file, and then save the file in a directory available to TLC. With the steps below, you first export the results of a Nessus report to a. Manually import the results of a single Nessus scan (see Manual Import of Nessus Scan Results), orĭefine a schedule for import of Nessus scan results (see Automating Import of Nessus Scan Results). data from a Tenable Nessus vulnerability scanner, you can either: Database, you can import or collect vulnerabilities detected by a scanner. An 'event message' collected from a Log Source. Normalized Messages), or an event or vulnerability imported from a scanner. Either a log message that a Manager has standardized (i.e. To collect vulnerability A potential security weakness identified by a vulnerability scanner A device that monitors systems in your TLC environment (for example, a vulnerability scanner). Configuring a Tenable Nessus Vulnerability Scanner Configuring a Tenable Nessus Vulnerability ScannerĬollector A TLC module that gathers or receives log messages from Log Sources.: File Collector A type of Collector that gathers log messages from Log Sources that store messages in an ASCII log file.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |