Nessus 6.9 User Guide

Sept. 10, 2017 via docs.tenable.com

When deploying Nessus, knowledge of routing, filters, and firewall policies is often helpful. Deploying behind a NAT device is not desirable unless it is scanning the internal network. Any time a vulnerability scan flows through a NAT device or application proxy of some sort, the check can be distorted and a false positive or negative can result. In addition, if the system running Nessus has personal or desktop firewalls in place, these tools can drastically limit the effectiveness of a remote vulnerability scan.

https://docs.tenable.com/nessus/6_9/content/resources/pdf/nessus_6_9.pdf

Avatar
negrii_irina88 4 weeks ago

i couldn't agree more with you..before using it you need to reach as many information you can in order to understand better and to adapt it to your needs

Reply