
Scan options: Nessus offers agent-based and Agentless scanning options for easy deployment and maintenance.

#How to use nessus and metasploit pdf
Flexible reporting: You can customize reports to sort by vulnerability, create an executive summary, or compare scan results to highlight changes – Native (XML), PDF (requires Oracle Java to be installed on Nessus server), HTML as well as CSV formats.It takes less time and effort to assess, prioritize as well as remediate issues. With features such as pre-built policies and templates, customizable reporting, group “snooze” functionality, and real-time updates, it makes vulnerability assessment simple, easy, and intuitive. It supports more technologies than others like scanning operating systems, network devices, hypervisors, databases, tablets, phones, web servers, and critical infrastructure for vulnerabilities, threats, and compliance violations. With the world’s largest constantly updated library of vulnerability and configuration checks, and the support of Tenable’s expert vulnerability research team, this tool sets the standard for speed and accuracy. Nessus features include high-speed asset discovery, target profiling, configuration auditing, malware detection, sensitive data discovery, and vulnerability analysis. It is industry’s most widely deployed vulnerability scanner that helps you reduce your organization’s attack surface and ensure compliance in physical, virtual, mobile, and cloud environments.
