Transcription of Auditing System Configurations and Content
{{id}} {{{paragraph}}}
Nessus Compliance Checks Auditing System Configurations and Content January 25, 2017 Copyright 2016. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc. 2 Table of Contents Introduction .. 5 Prerequisites .. 5 Nessus and SecurityCenter Customers .. 5 Standards and Conventions .. 5 Compliance Standards .. 6 configuration Audits, Data Leakage, and Compliance .. 6 What is an audit? .. 6 Audit vs. Vulnerability Scan .. 7 Example Audit Items .. 7 Windows .. 7 Unix .. 8 Cisco .. 8 Huawei .. 8 Palo Alto Firewall .. 9 IBM iSeries .. 9 NetApp Data ONTAP .. 9 Salesforce .. 10 Databases .. 10 Audit Reports .. 11 Credentialed Scanning and Privileged Account Use.
This document describes how Nessus 5.x can be used to audit the configuration of Unix, Windows, database, SCADA, IBM iSeries, and Cisco systems against a compliance policy as well as search the contents of various systems for sensitive content.
Domain:
Source:
Link to this page:
Please notify us if you found a problem with this document:
{{id}} {{{paragraph}}}