Đang chuẩn bị liên kết để tải về tài liệu:
Nessus Credential Checks for Unix and Windows

Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ

As networks grow in size and complexity, the requirement for centralized security policy management tools that can administer security elements is paramount. Sophisticated tools that can specify, manage, and audit the state of security policy through browser-based user interfaces enhance the usability and effectiveness of network security solutions. Cisco provides a centralized, policy-based, securitymanagement approach for the enterprise. Cisco Secure PolicyManager (CSPM) supports Cisco security elements in enterprise networks, ensuring a comprehensive, consistent implementation of security policy. Using CSPM, customers can define, distribute, enforce, and audit security policies for hundreds of Cisco Secure PIX firewalls, IDS sensors, and Cisco IOS firewalls from a central location. CSPM. | Nessus Credential Checks for Unix and Windows March 21 2012 Revision 27 Copyright 2002-2012 Tenable Network Security Inc. Tenable Network Security Nessus and ProfessionalFeed are registered trademarks of Tenable Network Security Inc. Tenable the Tenable logo the Nessus logo and or other Tenable products referenced herein are trademarks of Tenable Network Security Inc. and may be registered in certain jurisdictions. All other product names company names marks logos and symbols may be the trademarks of their respective owners. Tenable Network Security Inc. 7063 Columbia Gateway Drive Suite 100 Columbia MD 21046 410.872.0555 sales@tenable.com www.tenable.com Table of Contents Introduction.4 Standards and Conventions.4 Overview of Nessus Credential Checks.4 Purpose.4 Access Level.5 Technologies Used.5 Unix Systems.6 Windows Systems.6 Credential Checks on Unix-BASED Platforms.8 Prerequisites.8 Configuration Requirements for SSH.8 User Privileges.8 Configuration Requirements for Kerberos.8 Enabling SSH Local Security Checks on Unix.8 Generating SSH Public and Private Keys.8 Creating a User Account and Setting up the SSH Key.9 Example. 10 Configuring Nessus for SSH Host-Based Checks.10 Nessus User Interface.11 Nessus Unix Command Line.13 Using .nessus Files.14 Using .nessusrc Files.14 Using SSH Credentials with the Tenable SecurityCenter.14 Credential Checks on Windows Platforms.15 Prerequisites.15 User Privileges.15 Enabling Windows Logins for Local and Remote Audits.15 Configuring a Local Account.16 Configuring a Domain Account for Local Audits.16 Configuring Windows XP and 2003.16 Configuring Windows 2008 Vista and 7.17 Configuring Nessus for Windows Logins.18 Nessus User Interface.18 Nessus Unix Command Line.19 Using .nessus Files.19 Using .nessusrc Files.19 Detecting when Credentials Fail.20 Troubleshooting.20 Securing Your Scanner.22 Why should I secure my scanner .22 What does it mean to lock down a scanner .22 Secure Implementation of Unix SSH Audits.22 Copyright