検出スキャン設定

注意: スキャンがポリシーに基づいている場合、スキャンの [Discovery] (検出) 設定はできません。これらの設定は、関連するポリシーでのみ変更できます。

注意: Tenable Nessus 特定のスキャンまたはポリシーに必要な設定が示されています。

The Discovery settings relate to discovery and port scanning, including port ranges and methods.

Certain Tenable-provided scanner templates include preconfigured discovery settings.

If you select the Custom preconfigured setting option, or if you are using a scanner template that does not include preconfigured discovery settings, you can manually configure Discovery settings in the following categories:

Note: The following tables include settings for the Advanced Scan template. Depending on the template you select, certain settings may not be available, and default values may vary.

Host Discovery (ホスト検出)

Tenable Nessus は、[Host Discovery] (ホスト検出) セクションのいくつかの設定をデフォルトで有効にします。[Host Discovery] (ホスト検出) セクションに初めてアクセスすると、[Ping the remote host] (リモートホストに Ping する) 項目が表示され、[On] (オン) に設定されています。

[Host Discovery] (ホスト検出) セクションには次の設定グループがあります。

設定 デフォルト値 [Description] (説明)
Ping the remote host (リモート ホストに ping) 日付を指定

If set to On, the scanner pings remote hosts on multiple ports to determine if they are alive. Additional options General Settings and Ping Methods appear.

If set to Off, the scanner does not ping remote hosts on multiple ports during the scan.

Note: To scan VMware guest systems, Ping the remote host must be set to Off.

Scan unresponsive hosts (応答しないホストのスキャン)

無効

Specifies whether the Nessus scanner scans hosts that do not respond to any ping methods. This option is only available for scans using the PCI Quarterly External Scan template.

全般設定
Test the local Nessus host (ローカルの Nessus ホストをテストする) Enabled (有効)

When enabled, includes the local Nessus host in the scan. This is used when the Nessus host falls within the target network range for the scan.

Use Fast Network Discovery (高速ネットワーク検出を使用)

無効

When disabled, if a host responds to ping, Tenable Nessus attempts to avoid false positives, performing additional tests to verify the response did not come from a proxy or load balancer. These checks can take some time, especially if the remote host is firewalled.

When enabled, Tenable Nessus does not perform these checks.

ping メソッド

ARP

Enabled (有効)

Ping a host using its hardware address via Address Resolution Protocol (ARP). This only works on a local network.

TCP

Enabled (有効)

Ping a host using TCP.

Destination ports (TCP) (デスティネーションポート (TCP))

ビルトイン

Destination ports can be configured to use specific ports for TCP ping. This specifies the list of ports that are checked via TCP ping.

Type one of the following: built-in, a single port, or a comma-separated list of ports.

For more information about which ports built-in specifies, see the knowledge base article.

ICMP

Enabled (有効)

Ping a host using the Internet Control Message Protocol (ICMP).

Assume ICMP unreachable from the gateway means the host is down (ゲートウェイから ICMP に到達できない場合にはホストがダウンしていると見なす) 無効

Assume ICMP unreachable from the gateway means the host is down. When a ping is sent to a host that is down, its gateway may return an ICMP unreachable message. When this option is enabled, when the scanner receives an ICMP Unreachable message, it considers the targeted host dead. This approach helps speed up discovery on some networks.

Note: Some firewalls and packet filters use this same behavior for hosts that are up, but connected to a port or protocol that is filtered. With this option enabled, this leads to the scan considering the host is down when it is indeed up.

Maximum number of retries (最大再試行回数) 2

Specifies the number of attempts to retry pinging the remote host.

UDP

無効

Ping a host using the User Datagram Protocol (UDP). UDP is a stateless protocol, meaning that communication is not performed with handshake dialogues. UDP-based communication is not always reliable, and because of the nature of UDP services and screening devices, they are not always remotely detectable.

Fragile Devices

ネットワークプリンターをスキャン

無効

When enabled, the scanner scans network printers.

Scan Novell Netware hosts (Novell Netware ホストをスキャン)

無効

When enabled, the scanner scans Novell NetWare hosts.

Scan Operational Technology devices (オペレーショナルテクノロジーデバイスをスキャン) 無効

When enabled, the scanner performs a full scan of Operational Technology (OT) devices such as programmable logic controllers (PLCs) and remote terminal units (RTUs) that monitor environmental factors and the activity and state of machinery.

When disabled, the scanner uses ICS/SCADA Smart Scanning to cautiously identify OT devices and stops scanning them once they are discovered.

ウェイクオン LAN

MAC アドレスの一覧

なし

The Wake-on-LAN (WOL) menu controls which hosts to send WOL magic packets to before performing a scan.

Hosts that you want to start prior to scanning are provided by uploading a text file that lists one MAC address per line.

For example:

33:24:4C:03:CC:C7

FF:5C:2C:71:57:79

Boot time wait (in minutes) (起動時の待ち時間 (分))

5

The amount of time to wait for hosts to start before performing the scan.

ポートスキャン

[Port Scanning] (ポートスキャン) セクションには、ポートスキャナーの動作とスキャンするポートを定義する設定があります。

[Port Scanning] (ポートスキャン) セクションには、次の設定のグループが含まれます。

設定 デフォルト値 説明
ポート
スキャンされていないポートを閉じていると見なす 無効

When enabled, if a port is not scanned with a selected port scanner (for example, the port falls outside of the specified range), the scanner considers it closed.

Port Scan Range (ポートのスキャン範囲) デフォルト

Specifies the range of ports to be scanned.

The supported ranges are:

  • default — Instructs the scanner to scan approximately 4,790 commonly used ports specified in the nessus-services file. You can also combine the default keyword with other ports and port ranges.

    Note: You can convert the nessus-services file to a custom list of ports by performing four consecutive regular expression (regex) replace-all operations in a text editor that supports such operations:

    • .*\s+(\d+)\/(tcp|udp)(\r\n|\r|\n) to $1\/$2,

    • (\d+)\/(tcp|udp) to $2:$1

    • tcp to T

    • udp to U

    You can find the nessus-services file in the following directories, depending on your operating system:

    • Linux — /opt/nessus/var/nessus/nessus-services

    • Windows — C:\ProgramData\Tenable\Nessus\nessus\nessus-services

    • macOS — /Library/Nessus/run/var/nessus/nessus-services

  • all — Instructs the scanner to scan all 65,536 ports, including port 0. You cannot combine the all keyword with other ranges.
  • A comma-separated list of ports (for example, 21,23,25,80,110), port ranges (for example, 1-1024,9000-9200 or 1-65535 to scan all ports but 0 and T:1-1024,U:300-500 or 1-1024,T:1024-65535,U:1025 to scan separate or overlapping TCP and UDP port ranges), or combinations thereof.

If you disable the UDP, SYN, or TCP port scanner settings in the scan policy Discovery settings, those ports are not scanned despite what range of ports you specify. The UDP and TCP port scanner settings are disabled by default; the SYN port scanner setting is enabled by default.

ローカルポートの列挙子
SSH (netstat) Enabled (有効)

When enabled, the scanner uses netstat to check for open ports from the local machine. It relies on the netstat command being available via an SSH connection to the target. This scan is intended for Linux-based systems and requires authentication credentials. To use this setting, you must first configure SSH Credentials.

WMI (netstat) Enabled (有効)

When enabled, the scanner uses netstat to determine open ports while performing a WMI-based scan.

In addition, the scanner:

  • Ignores any custom range specified in the Port Scan Range setting.
  • Continues to treat unscanned ports as closed if the Consider unscanned ports as closed setting is enabled.

If any port enumerator (netstat or SNMP) is successful, the port range becomes all. To use this setting, you must first configure Windows Credentials.

SNMP Enabled (有効)

When enabled, if the appropriate credentials are provided by the user, the scanner can better test the remote host and produce more detailed audit results. For example, there are many Cisco router checks that determine the vulnerabilities present by examining the version of the returned SNMP string. This information is necessary for these audits.

Only run network port scanners if local port enumeration failed (ローカルポートの列挙に失敗した場合にのみネットワークポートスキャナーを実行) Enabled (有効)

When this setting is enabled, the scanner relies on local port enumeration before relying on network port scans. If a local port enumerator runs, all network port scanners are disabled for the asset.

When this setting is disabled, the scanner performs network port scans regardless of the local port enumeration status.

Verify open TCP ports found by local port enumerators (ローカルポートの列挙子が検出した開いている TCP ポートを確認) 無効

When enabled, if a local port enumerator (for example, WMI or netstat) finds a port, the scanner also verifies that the port is open remotely. This approach helps determine if some form of access control is being used (for example, TCP wrappers or a firewall).

ネットワークポートスキャナー
TCP 無効

Use the built-in Tenable Nessus TCP scanner to identify open TCP ports on the targets, using a full TCP three-way handshake. If you enable this option, you can also set the Override Automatic Firewall Detection option.

SYN Enabled (有効)

Use the built-in Tenable Nessus SYN scanner to identify open TCP ports on the target hosts. SYN scans do not initiate a full TCP three-way handshake. The scanner sends a SYN packet to the port, waits for SYN-ACK reply, and determines the port state based on a response or lack of response.

If you enable this option, you can also set the Override Automatic Firewall Detection option.

Override automatic firewall detection (ファイヤーウォールの自動検出をオーバーライド) 無効

This setting can be enabled if you enable either the TCP or SYN option.

When enabled, this setting overrides automatic firewall detection.

This setting has three options:

  • Use aggressive detection attempts to run plugins even if the port appears to be closed. It is recommended that this option not be used on a production network.
  • Use soft detection disables the ability to monitor how often resets are set and to determine if there is a limitation configured by a downstream network device.

  • Disable detection disables the firewall detection feature.

UDP 無効

This option engages the built-in Tenable Nessus UDP scanner to identify open UDP ports on the targets.

Due to the nature of the protocol, it is generally not possible for a port scanner to tell the difference between open and filtered UDP ports. Enabling the UDP port scanner may dramatically increase the scan time and produce unreliable results. Consider using the netstat or SNMP port enumeration options instead if possible.

サービス検出

[Service Discovery] (サービス検出) セクションには、開いている各ポートにそのポートで実行されているサービスをマッピングしようとする設定があります。

[Service Discovery] (サービス検出) セクションには次の設定グループがあります。

設定

デフォルト値

説明
全般設定
Probe all ports to find services (すべてのポートをプローブしてサービスを見つける) Enabled (有効)

When enabled, the scanner attempts to map each open port with the service that is running on that port, as defined by the Port scan range option.

Caution: In some rare cases, probing might disrupt some services and cause unforeseen side effects.

Search for SSL based services (SSL ベースのサービスの検索) オン

Controls how the scanner tests SSL-based services.

Caution: Testing for SSL capability on all ports may be disruptive for the tested host.

SSL/TLS/DTLS サービスの検索 (有効)
Search for SSL/TLS on (SSL/TLS を検索) 既知の SSL/TLS ポート

Specifies which ports on target hosts the scanner searches for SSL/TLS services.

This setting has two options:

  • Known SSL/TLS ports
  • All TCP ports
Search for DTLS On なし

DTLS サービスの検索時に、スキャナーがターゲットとなるホストのどのポートを検索するかを指定します。

この設定には、次のオプションがあります。

  • なし

  • 既知の DTLS ポート

  • すべての UDP ポート

Identify Certificates Expiring Within x Days (x 日以内に期限切れになる証明書を特定) 60

When enabled, the scanner identifies SSL and TLS certificates that are within the specified number of days of expiring.

Enumerate All SSL Ciphers (SSL 暗号をすべて列挙) True

When enabled, the scanner ignores the list of ciphers advertised by SSL/TLS services and enumerates them by attempting to establish connections using all possible ciphers.

Enable CRL checking (connects to internet) (CRL チェックを有効化 (インターネットに接続)) False

When enabled, the scanner checks that none of the identified certificates have been revoked.

ID

ID セクションでは、Active Directory データの収集を有効または無効にできます。

注意: このセクションは、Tenable One Enterprise 環境にのみ適用されます。
設定

デフォルト値

説明
全般設定
Collect Identity Data from Active Directory (Active Directory から ID データを収集する) 無効

この設定を有効にすると、Tenable Nessus は Active Directory からユーザー、コンピューター、グループのオブジェクトを収集できるようになります。

この設定では、スキャン用の Active Directory ユーザーアカウントを指定する必要があります。また、スキャンの対象となっているドメインコントローラーで LDAPS を有効にする必要があります。