Automation scripts that streamline vulnerability scanning, report generation, and remediation tracking using the Nessus API for enhanced vulnerability management.
This repository contains automation scripts for managing vulnerabilities with Nessus. It automates vulnerability scans, report generation, and remediation tracking using the Nessus API, streamlining security processes and providing detailed insights for enhanced vulnerability management.
This tool is designed for security professionals and system administrators to automate vulnerability management workflows by provisioning Azure virtual machines, running Nessus scans (both basic and credentialed), and analyzing scan results for remediation. It facilitates continuous vulnerability assessment and tracking in cloud and virtualized environments.
Credentialed scans require enabling Remote Registry and disabling UAC prompts on the target VM, which may reduce security; these settings are not recommended for production environments. The tool is designed to be run from a Mac OS X host scanning a Windows VM in Azure. Firewall must be disabled on the VM to allow successful scanning.
Register for a Nessus Essentials account and obtain an activation code
Download Nessus version 8.15.6 for Windows x86_64 platform
Install Nessus on a Windows machine and launch the local host URL
Connect via SSL on the Nessus web interface and bypass security warnings
Enter the activation code and create a Nessus username and password
Wait for Nessus to complete installation and download necessary components
Create an Azure virtual machine with RDP traffic allowed
Login to the Azure VM using the downloaded RDP file
Disable Windows Firewall on the VM across all profiles (Domain, Private, Public)
Configure Remote Registry service on the VM to Automatic and start it
Create a new scan in Nessus Essentials > Basic Network Scan > Enter VM IP as target > Save > Run scan
Performs a basic network vulnerability scan against the specified Azure VM.
Enable Remote Registry service and set to Automatic on VM
Prepares the VM for credentialed scans by allowing Nessus to access the registry.
Change User Account Control settings to 'Never Notify' on VM
Reduces scan interference by disabling UAC prompts for credentialed scanning.
Ping VM public IP from host machine
Checks network connectivity between the host and the Azure VM before scanning.