Get a Pentest and security assessment of your IT network.

Cyber Security

Automated Vulnerability Scanning

TL;DR

Automatically check your systems for known vulnerabilities using free tools and scheduled scans. This guide shows you how to set up regular vulnerability checks without needing a lot of technical knowledge.

Setting Up Automated Vulnerability Scanning

  1. Choose a Scanner: Several free scanners are available. Here are two popular options:

    For this guide, we’ll focus on Nessus Essentials as it is easier for beginners.

  2. Install Nessus Essentials:
    • Download the installer from the Tenable website (link above).
    • Run the installer. The installation process is straightforward; follow the on-screen instructions.
    • After installation, open Nessus in your web browser. It will take some time to download plugins and updates – this can take 30 minutes or more.
  3. Configure Your Scan:
    • Log into the Nessus web interface (usually https://localhost:8834).
    • Click “New Scan”.
    • Choose a template. “Basic Network Scan” is a good starting point.
    • Give your scan a name (e.g., “Weekly Internal Scan”).
    • Enter the target IP addresses or network range you want to scan. For example, 192.168.1.0/24 will scan all IPs from 192.168.1.1 to 192.168.1.254.
    • Click “Save”.
  4. Schedule the Scan:
    • Edit your scan (find it in the main Nessus interface).
    • Go to the “Scheduling” tab.
    • Enable scheduling by checking the “Enabled” box.
    • Choose a schedule that suits you – for example, weekly on Sunday at 2:00 AM.
    • Click “Save”.
  5. Review Scan Results:
    • After the scan completes, review the results in the Nessus interface.
    • Nessus will categorize vulnerabilities by severity (Critical, High, Medium, Low).
    • Focus on addressing Critical and High severity vulnerabilities first.
    • Click on a vulnerability to see details, including recommended remediation steps.
  6. Update Nessus Regularly:
    • Nessus plugins are updated frequently to detect new vulnerabilities. Ensure your Nessus installation is automatically updating its plugin database (this usually happens by default). You can check the update status in the “Settings” section of the web interface.

Using Command Line Tools (Advanced)

For more advanced users, you can use command-line tools like nmap with vulnerability scripts.

nmap -sV --script vuln 

This will perform a version detection scan and run common vulnerability scripts against the specified target IP. However, this requires more technical knowledge to interpret the results effectively.

Important Considerations

  • Scanning External IPs: Be very careful when scanning external IP addresses that you do not own or have permission to scan. This could be considered illegal.
  • Network Impact: Vulnerability scans can generate significant network traffic. Schedule scans during off-peak hours to minimize impact on performance.
  • False Positives: Scanners may sometimes report false positives (vulnerabilities that don’t actually exist). Always verify results before taking action.
  • cyber security Best Practices: Vulnerability scanning is just one part of a comprehensive cyber security strategy. You should also implement firewalls, intrusion detection systems, and other security measures.
Related posts
Cyber Security

Zip Codes & PII: Are They Personal Data?

Cyber Security

Zero-Day Vulnerabilities: User Defence Guide

Cyber Security

Zero Knowledge Voting with Trusted Server

Cyber Security

ZeroNet: 51% Attack Risks & Mitigation