Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Announcing Nessus UI 2.2: Multi-scanner Support and Simplified Scan Results View

Note:  Nessus Cloud is now a part of Tenable.io Vulnerability Management. To learn more about this application and its latest capabilities, visit the Tenable.io Vulnerability Management web page.


Tenable is excited to announce a new update to the Nessus vulnerability scanner user interface (UI) - version 2.2. The latest version of Nessus introduces multi-scanner support and the ability to control internal and external scans from the cloud, as well as several enhancements to the vulnerability output and more!

Controlling Multiple Nessus Scanners

Nessus UI 2.2 introduces the ability to delegate vulnerability scanning to multiple secondary servers. You can use your own Nessus server to act as the primary, or you can configure your Nessus Perimeter Service scanner in the cloud to be the primary.

[video: http://youtu.be/omz8ccEtevs]

This new feature is a game changer for many organizations. Users can now install a server within their organization's internal network. Then, a user can configure the Perimeter Service to designate scans to the internal network scanner, as well as perform external scans of your perimeter and achieve PCI compliance. The multi-scanner feature records all of your vulnerability scan results in one place, and allows you to schedule scans and email results to the responsible parties.

Scanner Roles

In the settings for Nessus, you will now see an option for "Multi Scanner". You can select which role the Nessus server will take from this menu, including primary scanner, secondary scanner, and Perimeter Service scanner.

 

Nessus multi-scanner
The drop-down list of available scanner roles.

 

  • Primary Scanner - One Nessus scanner is configured as the primary server. This scanner will communicate with multiple secondary Nessus scanners, delegating scans so they run on the agents.
  • Nessus primary scanner key
    A Nessus scanner can be designated as either a primary (control) or a secondary scanner, but not both. Communication is always from the secondary scanner to the primary scanner. A key is generated on the primary scanner and is used to configure the secondary scanner.
  • Secondary Scanner - An unlimited number of Nessus scanners can be designated as secondary scanners. They will initiate the communication to the primary server, carry out vulnerability scans, and send results back to the primary server.
  • Nessus secondary scanner
    Nessus agents will check in to the primary every 30 seconds and send all scan data to the primary server.
  • Perimeter Service Scanner - You can designate a Nessus instance to be a secondary scanner to Nessus Perimeter Service.

 

Nessus Perimeter Server
Using this drop-down menu item, users can enter a name for the secondary scanner and provide the username, password, and hostname of your Perimeter Service instance.

 

Scanner Selection and Scan Results

Delegation occurs on a per scan basis. When the user creates a new scan on the primary Nessus server, he then selects which Nessus agent to run the scan on.

Nessus Scan Settings

The results of scans being run on secondary servers are all displayed on the primary server. The server which ran the scan is designated in the results.

Nessus vulnerabilities by host

Report Output Enhancements

Each vulnerability finding contains a list of targets that were identified as vulnerable during the scan. A new layout has been implemented to more easily review these results:

Nessus scan results Nessus scan results

Additional Enhancements

  • Nessus now support exploits from D2 Elliot.
  • Users can more easily manage and rename custom folders.

Nessus folder management

Where To Get the New Features

As of February 2015, multi-scanner support is available with Nessus Manager and Nessus Cloud. In addition, the Nessus Perimeter Service is now included in the Nessus Cloud product.

Nessus users will receive the new UI update free of charge when their scanner's plugins are updated. Note: Nessus Home users will not receive the multi-scanner feature. Further information can be found in the Nessus 5.2 HTML5 User Guide.

Nessus and Nessus Perimeter Service customers: Please contact Tenable Support (support -at- tenable.com) with any questions regarding the user interface. Users may also visit the Tenable Discussions Forum for more information.

Resource

Subscribe to the Tenable Blog

Subscribe
Try for Free Buy Now

Try Tenable.io

FREE FOR 60 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

$2,275.00

Buy Now

Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save. Add Advanced Support for access to phone, email, community and chat support 24 hours a day, 365 days a year. Full details here.

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 60 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578.00

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 60 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.