background image

46

Chapter 4

You’ll see many available options, all of which can be found in Nessus’s 

documentation.

1.

Enter a name for the scan, as shown in Figure 4-13. We will use the name 

The_Works 

in our example to have Nessus run all of its checks. Then 

click 

Next

.

2.

As with the NeXpose scan conducted earlier, we will configure this scan 
to use Windows login credentials to get a more complete picture of the 
vulnerabilities present on the target system. Enter the login credentials 
for your target system and click 

Next

.

Figure 4-13: The Nessus General settings

3.

On the Plugins page, you can choose from a large variety of Nessus plug-
ins for Windows, Linux, BSD, and more. If, during a scan, you know you 
are going to scan only Windows-based systems, for example, you could 
deselect many of these plug-ins for your first run-through; for now, click 

Enable All

 (shown in the lower-right corner of Figure 4-14) and then 

click 

Next

.

Figure 4-14: Selecting Nessus scan plug-ins