Frequently Asked Questions - Nessus Network Vulnerability Scanning

What is the source network for security scans conducted by ISO?

All Information Security Office network vulnerability scanning is initiated from the following network subnets:

IPv4:

128.32.30.64/27

IPv6:

2607:f140:1:14::/64

If you detect scanning activity and are unsure if an ISO scanner is the source, please contact security@berkeley.edu for verification.

How do I run a credentialed Nessus scan of a Windows computer?

Credentialed scans are scans in which the scanning computer has an account on the computer being scanned that allows the scanner to do a more thorough check looking for problems that can not be seen from the network. Examples of the sorts of checks that a credentialed scan can do include checks to see if the system is running insecure versions of Adobe Acrobat or Java or if there are poor security permissions governing a service. Information Security Office (ISO) runs Nessus scanners that are capable of running these credentialed scans; however, without accounts on the local machines, we...