In the previous recipes, we have learned a great deal about the need for configuration audits and their contribution toward more secure networks. In this recipe, we will be looking at using the compliance scan feature of Nessus to perform a configuration audit of an operating system.
Performing an operating system audit
Getting ready
The Getting ready section for this recipe is same as the Getting ready section of the Selecting a compliance scan policy section. This recipe will also require you to have studied and practiced the previous recipes in this chapter.