Nessus 6.9 User Guide

Sept. 10, 2017 1 comment Pen Testing & Audits firewall

When deploying Nessus, knowledge of routing, filters, and firewall policies is often helpful. Deploying behind a NAT device is not desirable unless it is scanning the internal network. Any time a vulnerability scan flows through a NAT device or application proxy of some sort, the check can be distorted and a false positive or negative can result. In addition, if the system running Nessus has personal or desktop firewalls in place, these tools can drastically limit the effectiveness of a remote vulnerability scan.

negrii_irina88 8 months ago

i couldn't agree more with you..before using it you need to reach as many information you can in order to understand better and to adapt it to your needs