Worked like a charm, thanks guys!

Chris Clements
[EMAIL PROTECTED]



On Oct 1, 2008, at 12:10 PM, Ron Gula wrote:

> Chris Clements wrote:
>> Sorry if this has been asked before, but is there a way in the 3.2
>> client that I can filter my reports to exclude hosts with no open  
>> ports?
>
> Hi Chris,
>
> Negative filtering (show me everything that does not match this  
> thing) wasn't
> something we were shooting for in the Nessus Client. The filtering  
> is vulnerability
> based, not IP/scanned-system based so you can't really turn off an  
> IP if a certain
> parameter is or isn't there.
>
> Having said that, if you look for the charcater "(" in your port  
> name fields,
> this will match on the text like like "microsoft-ds (445/tcp)". Keep  
> in mind
> if you have some generic "general/tcp" or "general/udp" vulns, these  
> will be
> filtered out in your report. However, the report will contain all  
> systems which
> have open ports.
>
> In the Security Center, there is report filtering, but what is more  
> interesting
> is the ability to use the results of any Nessus scan (or passively  
> obtained with
> the Passive Vulnerability Scanner) to dynamically create lists of IP  
> addresses
> that can then be used for reporting, filtering and even access  
> control.
>
> Ron Gula
> Tenable Network Security
>
> _______________________________________________
> Nessus mailing list
> [email protected]
> http://mail.nessus.org/mailman/listinfo/nessus
>

_______________________________________________
Nessus mailing list
[email protected]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to