46
Chapter 4
You’ll see many available options, all of which can be found in Nessus’s
documentation.
1.
Enter a name for the scan, as shown in Figure 4-13. We will use the name
The_Works
in our example to have Nessus run all of its checks. Then
click
Next
.
2.
As with the NeXpose scan conducted earlier, we will configure this scan
to use Windows login credentials to get a more complete picture of the
vulnerabilities present on the target system. Enter the login credentials
for your target system and click
Next
.
Figure 4-13: The Nessus General settings
3.
On the Plugins page, you can choose from a large variety of Nessus plug-
ins for Windows, Linux, BSD, and more. If, during a scan, you know you
are going to scan only Windows-based systems, for example, you could
deselect many of these plug-ins for your first run-through; for now, click
Enable All
(shown in the lower-right corner of Figure 4-14) and then
click
Next
.
Figure 4-14: Selecting Nessus scan plug-ins