NuHarbor Security
  • Solutions
    Solutions
    Custom cybersecurity solutions that meet you where you are.
    • Overview
    • Our Approach
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • By Business Need
      • Identify Gaps in My Cybersecurity Plan
      • Detect and Respond to Threats in My Environment
      • Fulfill Compliance Assessments and Requirements
      • Verify Security With Expert-Led Testing
      • Manage Complex Cybersecurity Technologies
      • Security Monitoring With Splunk
    • By Industry
      • State & Local Government
      • Higher Education
      • Federal
      • Finance
      • Healthcare
      • Insurance
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Services
    Services
    Outcomes you want from a team of experts you can trust.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Security Testing
      • Penetration Testing
      • Application Penetration Testing
      • Vulnerability Scanning
      • Wireless Penetration Testing
      • Internal Penetration Testing
      • External Penetration Testing
    • Assessment & Compliance
      • CMMC Compliance
      • NIST 800-53
      • HIPAA Security Standards
      • ISO 27001
      • MARS-E Security Standards
      • New York Cybersecurity (23 NYCRR 500)
      • Payment Card Industry (PCI)
    • Advisory & Planning
      • Security Strategy
      • Incident Response Planning
      • Security Program Reviews
      • Security Risk Assessments
      • Virtual CISO
      • Policy Review
    • Managed Services
      • Curated Threat Intelligence
      • Managed Detection and Response (MDR)
      • Sentinel Managed Extended Detection and Response (MXDR)
      • SOC as a Service
      • Splunk Managed Services
      • Tenable Managed Services
      • Vendor Security Assessments
      • Vulnerability Management
      • Zscaler Support Services
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Partners
  • Resources
    Resources
    Explore reports, webinars, case studies, and more.
    • Browse Resources
    • Consultation Icon Consult with an expert
    • Blog icon Blog
    • Podcast icon Podcast
    • Annual SLED CPR icon Annual SLED CPR
    • Downloadable Assets icon Downloadable Assets
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Company
    Company
    We do cybersecurity differently – the right way.
    • Overview
    • Data Icon Resources
    • Consultation Icon Consult with an expert
    • Leadership
    • News
    • Careers
    • Contact
    Report 2023-2024 SLED Cybersecurity Priorities Report
    2023-2024 SLED Cybersecurity Priorities Report
    Read Report
  • Consult with an expert
  • Client support
  • Careers
  • Contact
1.800.917.5719
NuHarbor Security Blog
    • Compliance
    • Cybersecurity Technology
    • Security Operations
    • Industry Insights
    • Security Testing
    • Advisory and Planning
    • Application Security
    • Managed Detection and Response
    • Threat Intelligence
    • NuHarbor
    • Managed Services
    • Cyber Talent
April 22, 2019

Tenable Vulnerability Management: Sensor Deployment Best Practices

Justin Fimlaid Justin Fimlaid

Every organization has different needs related to their vulnerability management program based on the scanner used (i.e., cloud or on-premises), the places where sensors are deployed, the technology environment, and desired outcomes. But the following deployment best practices apply to most everyone.

Additional Scanners Required

Conducting actor scans through a firewall or other network devices can impact scan results or the network device itself. It’s best to deploy additional Nessus scanners in hard-to-reach places, like portions that are segregated behind firewalls. Because the scanners reside on the same network segment as their target, they can access systems without network topology issues interfering with their operation.

Scaling Your Tenable Vulnerability Management Scan

For scaling purposes, Tenable recommends deploying an additional scanner for at least every 1,000 intended scan targets. For large-scale scans, customers should assign scanners to scanner groups to enable load share. Users should then place passive network monitor listeners in each network segment for full network coverage. Passive network scanners are placed on a span port, virtual span port, or network tap. This allows Tenable to see all network traffic in all directions (i.e., inbound, outbound, and host to host) as long as it traverses the network device from which Nessus network monitor is receiving data. Network admins can also place a listener at the ingress and egress points to audit communications into and out of the environment.

Perimeter

Each sensor should have at least two network interfaces rated for a maximum of 1GB of traffic: one for management and one for listening. With the special license and specific hardware traffic, you can monitor up to 10GB. Deploying Nessus agents on a per-host basis can help overcome obstacles like systems with uncertain connectivity (i.e., remote offices and mobile laptops). Agents can conduct local vulnerability, configuration, and compliance assessments. Agents are ideal for deploying with a standard system image to ensure greater asset coverage. A best practice is to have all new agents join the default group for easy new agent identification and later sorting. You can automate this process during installation or by using the built-in command line tool.

Tenable Vulnerability Management Distributed Network

Tenable Vulnerability Management includes access to Tenable’s distributed network of cloud scanners for scanning public-facing assets. These don’t require deployment efforts and are maintained by Tenable. Tenable also provides Nessus as a preauthorized scanning solution in the AWS marketplace for Amazon Elastic Compute Cloud (Amazon EC2). It can also scan AWS EC2 assets. As it uses a pre-built integration, identifying assets to be scanned in real time is an automatic process. Tenable also offers third-party connectors for AWS and Qualys. AWS Cloud Trail must be configured and an IAM permissions policy created prior to creating the AWS connector.

If you need assistance with Tenable Vulnerability Management, advice on deployment practices, or turnkey vulnerability management support, contact NuHarbor today!

Included Topics

  • Cybersecurity Technology
Justin Fimlaid
Justin Fimlaid

Justin (he/him) is the founder and CEO of NuHarbor Security, where he continues to advance modern integrated cybersecurity services. He has over 20 years of cybersecurity experience, much of it earned while leading security efforts for multinational corporations, most recently serving as global CISO at Keurig Green Mountain Coffee. Justin serves multiple local organizations in the public interest, including his board membership at Champlain College.

Related Posts

Industry Insights 4 min read
CISO Security Metrics: Proving Business Value Read More
Compliance 1 min read
MARS-E 2.0: Key Dates for Compliance Read More
Compliance 3 min read
Do I Need a SOC2 Report? Read More

Subscribe via Email

Subscribe to our blog to get insights sent directly to your inbox.

Subscribe Here!

Latest Pwned episodes

Episode 200 - Reflections of Pwned...Until Next Time
April 03, 2024
Episode 200 - Reflections of Pwned...Until Next Time
Listen Now
Episode 199 - When a BlackCat Crosses Your Path...
March 21, 2024
Episode 199 - When a BlackCat Crosses Your Path...
Listen Now
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
March 08, 2024
Episode 198 - Heard it Through the Grapevine - Beyond the Beltway, 2024
Listen Now
NuHarbor Security logo
NuHarbor Security

553 Roosevelt Highway
Colchester, VT 05446

1.800.917.5719

  • Solutions
  • Services
  • Partners
  • Resources
  • Company
  • Contact
  • Privacy Policy
Connect
  • Twitter
  • Linkedin
  • YouTube
©2025 NuHarbor Security. All rights reserved.