Transcription of Auditing System Configurations and Content
{{id}} {{{paragraph}}}
Nessus compliance Checks Auditing System Configurations and Content January 25, 2017 Copyright 2016. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc. 2 Table of Contents Introduction .. 5 Prerequisites .. 5 Nessus and SecurityCenter Customers .. 5 Standards and Conventions .. 5 compliance Standards .. 6 Configuration Audits, Data Leakage, and compliance .. 6 What is an audit? .. 6 Audit vs. Vulnerability Scan .. 7 Example Audit Items .. 7 Windows .. 7 Unix .. 8 Cisco .. 8 Huawei .. 8 Palo Alto Firewall .. 9 IBM iSeries .. 9 NetApp Data ONTAP.
These compliance checks also address real-time monitoring such as performing intrusion detection and access control. For a more in depth look at how Tenable’s configuration auditing, vulnerability management, data leakage, log analysis, and
Domain:
Source:
Link to this page:
Please notify us if you found a problem with this document:
{{id}} {{{paragraph}}}