
This will open the Config window.The left pane contains a hierarchy of configuration options. If you want to scan a different host, navigate to Config | Scan Parameter. To perform a scan of the local host, you can simply click the green “play” triangle, or navigate to File | Start. They often occur when certain tests rely on version information reported from the service, which does not always tell you whether patches have been applied. False positives are very common in vulnerability scanners. Therefore, it is necessary to examine the results to determine whether a discovered vulnerability actually exists. While Nessus can be very effective at identifying vulnerabilities in systems, it sometimes produces false positives. There is also a plugin for updating Nessus, which checks for new plugins over the Internet. Nessus allows you to configure which plugins are enabled for a particular scan, which allows you to perform a light scan that is less likely to break services and hosts, or a thorough scan that checks for every applicable vulnerability in Nessus’ database of plugins. The actual testing is performed by individual plugins that are written in the Nessus Attack Scripting Language (NASL). Next, Nessus determines what service is running on each discovered open port so that it can test the service against a database of vulnerabilities. A typical scan starts with a port scan of the target using either nmap or Nessus’ built-in port scanner.


Nessus consists of a server that performs scanning and a client that configures and controls the server.

According to, Nessus is “the world’s most popular vulnerability scanner.” The Nessus scanner is available for free from the Web site however, the licensing changed between versions 2.0 and 3.0 from General Public License (GPL) to a closed-source license.
