Performing an operating system audit
In the previous recipes, we have learned a great deal about the need for configuration audits and their contribution toward more secure networks. In this recipe, we will be looking at using the compliance scan feature of Nessus to perform a configuration audit of an operating system.
Getting ready
The Getting ready section for this recipe is same as the Getting ready section of the Selecting a compliance scan policy section. This recipe will also require you to have studied and practiced the previous recipes in this chapter.
How do it…
Perform the following steps:
- Open the Nessus Web Client.
- Log in to the Nessus Web Client with the user details created during installation.
- Follow the steps from the Selecting a compliance scan policy recipe.
- Navigate to the
Credentials
tab and selectSSH
credentials to be entered, as it is a Ubuntu test system. Select password-based authentication and fill in theUsername
andPassword (unsafe!)
fields, as shown here:
If you have...