Nessus
Vulnerability Assessment and Management
Authenticated/Credentialed Scan
Enable Administrative Shares
When credentials are provided in the form of username and password, Nessus uses SMB anonymous $IPC login to check if SMB is running on the target, and then uses the credentials on IPC$ and ADMIN$ shares to verify the credentials and scans the file system for vulnerabilities.
Note: The credentials provided to Nessus must be a local administrator on the target machine.
Enable RemoteRegistry Service
Nessus scans through the registry remotely to find deprecated software information. Enable the RemoteRegistry service such that Nessus can trigger it and start and stop for the scan.
Enable "File & Printer Sharing"
Set the firewall rules to allow Nessus IP only to connect to the target machine.
References
Last updated