Conclusion

After finishing this article, one should now be comfortable with the following tasks:

This document, long as it may seem, could have been much longer. The following offers some suggestions and tips as to what to explore next.

  • If you are running from a Live CD boot of the NST, you will likely have memory issues (especially if you plan on letting the system run for an extended period of time). Consider using the nsthdinstall script to install the NST to hard disk for a more permanent solution.

  • Recent versions of nessusd report the following message: "Nessus performance is abysmal when running under VMware". If you are running from the NST Virtual Machine, you may want to consider downloading the ISO version of the NST and perform a hard disk installation.

  • If you are setting up a system for a large organization, you may need to set up multiple NST probes (each running its own Nessus server), and a single NST probe to run the Inprotect front end. NOTE: You will need to configure Inprotect to make use of the additional Nessus servers.

  • Consider starting the NTP service on your NST system. Having a time synchronized system increases the value of time stamped data.

  • Consider registering yourself at the Nessus site. Registered users have access to a much larger rule set than non registered users (your network vulnerability scans will be much more thorough).

  • Explore the NST WUI interface with your web browser (there are numerous tools available).

  • Check the Network Security Toolkit site for more information about the toolkit. The Network Security Toolkit FAQ and Using the Network Security Toolkit can be particularily useful.

  • Check the Nessus site for more information about network vulnerability scanners.

  • Check the Insecure.Org site for more information about the nmap port scanning utility.

  • Check the Inprotect site for more information about Inprotect.