Chapter 3 Security Evaluation 23 Copyright Goodheart-Willcox Co., Inc. May not be reproduced or posted to a publicly accessible website. Name ________________________________________________________________ 6. When the basic scan completes, review any vulnerabilities listed. Provide a screenshot of your result. 7. In the upper right-hand corner of the screen, choose New Scan. This lists additional scan options templates you can choose to deploy. The available templates are displayed. 8. Click the Advanced Scan button. Name the scan Baseline Advanced Scan. In the description, enter create a baseline of vulnerabilities. Leave the default folder. Add your IP or loopback address in the scan. View the options available in the other setting tabs. Under Reports, check the box to Designate hosts by their DNS name. Save your settings. 9. For this activity, you will run a credentialed scan. Click on the Credentials tab. Choose to run in Windows and provide your authentication information in the input screen. Click Save. 10. From the My Scans page, select Baseline Advanced Scan. Click the Play button to launch the scan. You can view the progress of the scan by clicking it as it is running. 11. Analyze the output from the advanced scan. How was the credentialed scan different from the basic scan? _ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ _________________________________________________________________________________________________________________ How many Critical results were discovered? How many High results? List both types of results and provide a screenshot of the graph detailing the vulnerabilities. _ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ _________________________________________________________________________________________________________________ 12. Creating a policy template is a useful strategy for scanning. From the menu on the left side of the page, select Resources Policies New policy. 13. You will create a policy that will be used to scan hosts on a network. Select Advanced Scan, and configure the following settings: BASIC Name: Monthly Network Vulnerability Scan Description: monthly scan of business computers DISCOVERY Check the box for Use fast network discovery Check the box for Scan Network Printers REPORT Designate hosts by their DNS name Display unreachable hosts ADVANCED Stop scanning hosts that become unresponsive during the scan Save your policy. Once saved, you can use this scan or export it to other Nessus installations. To locate your scan, select My Scans New Scan User Defined. Provide a screenshot of your custom scan. 14. Create and run a new scan using a template you have not yet used. Summarize the benefits of this template and provide a screenshot of your result. _ __________________________________________________________________________________________________________________ __________________________________________________________________________________________________________________ _________________________________________________________________________________________________________________
Previous Page Next Page