Solved

ACAS / Nessus

Posted on 2016-07-24
2
137 Views
Last Modified: 2016-08-02
Hi,

I have ACAS and Nessus Scan.  I am learning this, and I am trying to try a new scan.  WOuld I do this from the Nessus Scanner or ACAS?

Thansk
0
Comment
Question by:Eric Donaldson
2 Comments
 
LVL 62

Expert Comment

by:gheist
ID: 41727395
What is ACAS?
0
 
LVL 62

Accepted Solution

by:
btan earned 500 total points
ID: 41727586
I believe ACAS is  Assured Compliance Assessment Solution (ACAS). Solution that is ACAS awarded by DISA means this
The award provided a mechanism to enable the assessment of U.S. Department of Defense (DoD) enterprise networks and connected IT systems against DoD standards, as well as to identify any known system vulnerabilities.
http://ask-acas.info/faq/

For Nessus scan, I suggest you see Tenable info and in short, you can do from scanner or PVS as per required by ACAS
•SecurityCenter: Offering a centralized view for all network activity including asset discovery, vulnerability detection, configuration and compliance auditing, and event management for large, complex networks.


•Nessus Vulnerability Scanner: Performing network scanning, patch auditing and configuration testing. Nessus is the world's most widely-deployed vulnerability scanner, with more than five million downloads to-date.

•Passive Vulnerability Scanner (PVS): Providing continuous network monitoring and assessment with real-time visibility into all network activity. Tenable's PVS determines server and client-side application vulnerabilities and sends this data to the SecurityCenter in real time. It also uses advanced protocol analysis to log all file sharing, SQL, HTTP, and other types of protocols for analysis.
https://www.tenable.com/press-releases/tenable-network-security-named-assured-compliance-assessment-solution-for-the-defense
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

This article outlines the process to identify and resolve account lockout in an Active Directory environment.
In this increasingly digital world, security hacks are no longer just a threat, but a reality. As we've witnessed with Target's big identity hack 2013, Heartbleed in 2015, and now Cloudbleed, companies and their leaders need to prepare for the unthi…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

821 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question