Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Auditing Network Devices Without Scanning

The title of this post might seem a bit odd, but it is true. Nessus is now able to audit network devices without scanning the devices.

Network device auditing can be difficult for several reasons.

Scan doc to devices

  • The network department may be very protective of the organization’s network infrastructure equipment and the credentials to those systems. Rightfully so as those devices are the foundation of the network. This underscores the importance of the security of these devices as well, including patch and configuration management.
  • The devices do not support secure remote access.
  • The devices may be in locations which simply aren’t accessible from the scanners.
  • Pagination issues or improper implementation of SSH RFC.

The problem has been that the security team needs the credentials and access to the network systems to perform audits, but Nessus now solves this problem. Nessus can now perform configuration auditing against device configuration files, rather than the systems themselves. This means you can request the configuration files from your network administrators and test the configurations for security. A very powerful benefit of this feature is that users can now make proposed changes in the configurations and test the security of the changes before they go into production, making it easier to test and deploy securely configured devices throughout the network.

Making this new feature even more powerful is the option to upload a zip file with one or more configuration files and audit the individual configuration files, reporting on each device’s configuration separately. The plugin reports file-name as hostname/IP address of the network device and the results appear the same as if Nessus had performed a credentialed scan of the devices(s).

Nessus policy wizards

Where to Get the New Offline Configuration Audit

This new functionality is now available to Nessus users and currently supports Brocade, Cisco, FireEye, FortiGate, HP, Junos, and NetApp plugins, with more product support to come. Note that more than one configuration can be uploaded in a single policy. For example, you can upload Cisco, HP, and Junos configurations all in a single policy by uploading them to their respective sections, and you do not have to create separate policies for each device type.

For More Information

Special thanks to Mehul Revankar for his contribution to this post.

Related Posts

Subscribe to the Tenable Blog

Subscribe
Try for Free Buy Now

Try Tenable.io

FREE FOR 60 DAYS

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Sign up now.

Buy Tenable.io

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

65 assets

$2,275.00

Buy Now

Try for Free Buy Now

Try Nessus Professional Free

FREE FOR 7 DAYS

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy Nessus Professional

Nessus® is the most comprehensive vulnerability scanner on the market today. Nessus Professional will help automate the vulnerability scanning process, save time in your compliance cycles and allow you to engage your IT team.

Buy a multi-year license and save

Try for Free Buy Now

Try Tenable.io Web Application Scanning

FREE FOR 60 DAYS

Enjoy full access to our latest web application scanning offering designed for modern applications as part of the Tenable.io platform. Safely scan your entire online portfolio for vulnerabilities with a high degree of accuracy without heavy manual effort or disruption to critical web applications. Sign up now.

Buy Tenable.io Web Application Scanning

Enjoy full access to a modern, cloud-based vulnerability management platform that enables you to see and track all of your assets with unmatched accuracy. Purchase your annual subscription today.

5 FQDNs

$3,578.00

Buy Now

Try for Free Contact Sales

Try Tenable.io Container Security

FREE FOR 60 DAYS

Enjoy full access to the only container security offering integrated into a vulnerability management platform. Monitor container images for vulnerabilities, malware and policy violations. Integrate with continuous integration and continuous deployment (CI/CD) systems to support DevOps practices, strengthen security and support enterprise policy compliance.

Buy Tenable.io Container Security

Tenable.io Container Security seamlessly and securely enables DevOps processes by providing visibility into the security of container images – including vulnerabilities, malware and policy violations – through integration with the build process.

Learn More about Industrial Security

Get a Demo of Tenable.sc

Please fill out the form below with your contact information and a sales representative will contact you shortly to schedule a demo. You may also include a short comment (limited to 255 characters). Please note that fields with asterisks (*) are mandatory.