PDF4PRO ⚡AMP

Modern search engine that looking for books and documents around the web

Example: stock market

Auditing System Configurations and Content

Nessus Compliance Checks Auditing System Configurations and Content January 25, 2017 Copyright 2016. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc. 2 Table of Contents Introduction .. 5 Prerequisites .. 5 Nessus and SecurityCenter Customers .. 5 Standards and Conventions .. 5 Compliance Standards .. 6 configuration Audits, Data Leakage, and Compliance .. 6 What is an audit? .. 6 Audit vs. Vulnerability Scan .. 7 Example Audit Items .. 7 Windows .. 7 Unix .. 8 Cisco .. 8 Huawei .. 8 Palo Alto Firewall .. 9 IBM iSeries .. 9 NetApp Data ONTAP .. 9 Salesforce .. 10 Databases .. 10 Audit Reports .. 11 Credentialed Scanning and Privileged Account Use.

This document describes how Nessus 5.x can be used to audit the configuration of Unix, Windows, database, SCADA, IBM iSeries, and Cisco systems against a compliance policy as well as search the contents of various systems for sensitive content.

Tags:

  Configuration, System, Sensus

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Spam in document Broken preview Other abuse

Transcription of Auditing System Configurations and Content

Related search queries