Specifications
Copyright © 2015. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc. 
83 
For Further Information 
Tenable has produced a variety of documents detailing Nessus’ installation, deployment, configuration, user operation, 
and overall testing: 
  Nessus 6.1 Installation and Configuration Guide – step by step walk through of installation and configuration 
  Nessus 6.1 User Guide – how to configure and operate the Nessus User Interface 
  Nessus Enterprise 6.1 User Guide – how to configure and operate the Nessus User Interface for Nessus 
Enterprise 
  Nessus Enterprise Cloud User Guide – describes use of Nessus Enterprise Cloud and includes subscription 
and activation, vulnerability scanning, compliance reporting, and Nessus Enterprise Cloud support 
  Nessus v6 Command Line Reference – describes the command line tools of Nessus 
  Nessus Credentialed Checks for Unix and Windows – information on how to perform authenticated network 
scans with the Nessus vulnerability scanner 
  Nessus Compliance Checks – high-level guide to understanding and running compliance checks using Nessus 
and SecurityCenter 
  Nessus Compliance Checks Reference – comprehensive guide to Nessus Compliance Check syntax 
  Nessus v2 File Format – describes the structure for the .nessus file format, which was introduced with Nessus 
3.2 and NessusClient 3.2 
  Nessus 5.0 REST Protocol Specification – describes the REST protocol and interface in Nessus 
  Nessus and Antivirus – outlines how several popular security software packages interact with Nessus, and 
provides tips or workarounds to allow the software to better co-exist without compromising your security or 
hindering your vulnerability scanning efforts 
  Nessus and Mobile Device Scanning – describes how Nessus integrates with Microsoft Active Directory and 
mobile device management servers to identify mobile devices in use on the network 
  Nessus and Scanning Virtual Machines – describes how Tenable Network Security's Nessus vulnerability 
scanner can be used to audit the configuration of virtual platforms as well as the software that is running on them 
  Strategic Anti-malware Monitoring with Nessus, PVS, and LCE – describes how Tenable's USM platform can 
detect a variety of malicious software and identify and determine the extent of malware infections 
  Patch Management Integration – document describes how Nessus and SecurityCenter can leverage credentials 
on the Red Hat Network Satellite, IBM TEM, Dell KACE 1000, and Microsoft WSUS and SCCM patch management 
systems to perform patch auditing on systems for which credentials may not be available to the Nessus scanner 
  Real-Time Compliance Monitoring – outlines how Tenable’s solutions can be used to assist in meeting many 
different types of government and financial regulations 
  Tenable Products Plugin Families – provides a description and summary of the plugin families for Nessus, Log 
Correlation Engine, and the Passive Vulnerability Scanner 
  SecurityCenter Administration Guide 










