tailieunhanh - Nessus Credential Checks for Unix and Windows

As networks grow in size and complexity, the requirement for centralized security policy management tools that can administer security elements is paramount. Sophisticated tools that can specify, manage, and audit the state of security policy through browser-based user interfaces enhance the usability and effectiveness of network security solutions. Cisco provides a centralized, policy-based, securitymanagement approach for the enterprise. Cisco Secure PolicyManager (CSPM) supports Cisco security elements in enterprise networks, ensuring a comprehensive, consistent implementation of security policy. Using CSPM, customers can define, distribute, enforce, and audit security policies for hundreds of Cisco Secure PIX firewalls, IDS sensors, and Cisco IOS firewalls from a central location. CSPM. | Nessus Credential Checks for Unix and Windows March 21 2012 Revision 27 Copyright 2002-2012 Tenable Network Security Inc. Tenable Network Security Nessus and ProfessionalFeed are registered trademarks of Tenable Network Security Inc. Tenable the Tenable logo the Nessus logo and or other Tenable products referenced herein are trademarks of Tenable Network Security Inc. and may be registered in certain jurisdictions. All other product names company names marks logos and symbols may be the trademarks of their respective owners. Tenable Network Security Inc. 7063 Columbia Gateway Drive Suite 100 Columbia MD 21046 sales@ Table of Contents Standards and Overview of Nessus Credential Access Technologies Unix Windows Credential Checks on Unix-BASED Configuration Requirements for User Configuration Requirements for Enabling SSH Local Security Checks on Generating SSH Public and Private Creating a User Account and Setting up the SSH Example. 10 Configuring Nessus for SSH Host-Based Nessus User Nessus Unix Command Using .nessus Using .nessusrc Using SSH Credentials with the Tenable Credential Checks on Windows User Enabling Windows Logins for Local and Remote Configuring a Local Configuring a Domain Account for Local Configuring Windows XP and Configuring Windows 2008 Vista and Configuring Nessus for Windows Nessus User Nessus Unix Command Using .nessus Using .nessusrc Detecting when Credentials Securing Your Why should I secure my scanner .22 What does it mean to lock down a scanner .22 Secure Implementation of Unix SSH Copyright