Download all the audit files that are shipped with Nessus and Tenable.IO in one zip file.
Audit policies that examine hosts to determine if Tenable software applications exist and notifies of the presence and state of these packages.
Audit policies designed to allow users to determine if an antivirus package is installed and set to a working state.
CIS certified configuration audit policies for Windows, Solaris, Red Hat, FreeBSD and many other operating systems.
Audit policies that look for Credit Cards, Social Security numbers and many other types of sensitive data.
Only Tenable Nessus subscribers and SecurityCenter customers have access to the database checks. This page contains Nessus .audit files that can be used to examine hosts to determine specific database configuration items. Database configuration checks utilize SQL 'select' statements as described in the Nessus Compliance Check documentation.
Audit policies based on CERT, DISA STIG, NSA, GLBA and HIPAA standards.
Audit policies developed by Tenable to test AIX, HP-UX, Linux, Solaris and Windows systems for minimum required PCI configuration settings.
Audit policies that Tenable's Research group has produced that scan for known trojans and rootkits.
Audits for Network Equipment (routers, switches, firewalls) and Virtualization infrastructure (VMware, Hyper-V, XenServer).
Audit policies based upon standard Microsoft security templates.
Audit policies that perform NIST FDCC/USGCB and DISA STIG SCAP configuration audits. These audit files test for the required settings specified by the DISA STIG SCAP and NIST FDCC/USGCB programs.