![]() ![]() By tuning a scan that only discovers live hosts, you can check that your Nessus server is set up properly, collect a list of hosts to scan and stay within your vulnerability scanning policy guidelines. Your internal policies may provide specific time windows when vulnerability scanning can occur. By enumerating these hosts you can include them in the report to show that scans were attempted but did not find any results, then determine if this is normal behavior or not. Hosts that only respond to an ICMP ping will not show up in the default Nessus scan report. Systems protected by a network or host-based firewall may only respond on a single port or to an ICMP echo request. ![]() There are a few good reasons to run this type of scan: This is a very low impact scan that does not look for vulnerabilities or enumerate ports. A Nessus user recently contacted me about performing a scan that would simply discover hosts on the network.
0 Comments
Leave a Reply. |
Details
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |