[snip]
        My research indicated that the threat was greatest from
insiders, so my suggested approach was to require that the scans be ran
from inside the network ( specifically behind the firewall.)

        Other will argue that the scans should be ran from outside the
firewall since the threats are mainly external.
[snip]

I agree with most of the thoughts on this thread, but thus far the replies have all missed a very critical point. When considering external or internal scanning, the real answer is BOTH.

A network device (router, IDS, whatever), or even the target host, may react very differently depending on the source of the scan and the architecture of the network between the scanner and the target. It is very possible to scan the same target from both the inside and the outside, and get two very different results.

~Jay

--
..
..  Jay Jacobson
..  Edgeos, Inc. - 480.961.5996 - http://www.edgeos.com
..
..  Private-Labeled Managed Vulnerability Assessment Services
..

_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to