Our ISSO wants to do nessus scanning for vulnerabilities even though we already have the compliance blade. Is there any reason not to? Has anyone run into issues with creating a user for nessus & letting it scan the firewall? Is anyone else scanning their firewalls with Nessus?
I've requested in the past that CP adds CVE to the compliance blade. It seems like it would be an easy and very helpful addition. I know we have the web page that show the CVEs but this way we would also know which ones we've patched.
message from ISSO
Show me a report showing vulnerabilities report. However, all I’ve seen are compliance reports. Those are like CIS reports, not vulnerability reports. Very different. However, both are important.
I’m looking for something that shows the current vulnerabilities (CVE’s) on the system.
If you can produce that from the firewall not from a checkpoint list I’ll let it go. If not, I really want a verified scan of the Firewall’s OS from Nessus.