PRE-REQUISITES Server Configuration Review: Remote access to the jump system [preferably Windows OS] in your network to perform the vulnerability scans using Nessus vulnerability scanner. Reachability to all the scoped IPs and services from the jump system. Minimum of 60-80 GB of Free Space on the HDD and minimum 8GB RAM for the jump system. Internet connectivity to the jump system to install and update Nessus scanner plugins. If any active protection system is running, please whitelist or disable it until the activity is completed. Windows credentialed scans: To scan all the scoped IPs for windows, we need credentials with Admin rights WMI is to be enabled Ports 139 and 445 are both be open between scanner and target File & print sharing enabled Remote registry service enabled Default admin shares enabled ($ADMIN, $IPC…) If any active protection system is running, please whitelist or disable it until the activity is completed. The following registry key might need to be added for windows 10, server 2012 or newer to perform credential scan HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system\LocalAccountTokenFilterP olicy to 1 (dword). Symantec Antivirus has to be uninstalled or required Nessus files have to be whitelisted. Linux hosts and Network devices: To scan all the scoped IPs for Linux/Debian OS, we need credentials with root privilege. Port 22 is open You can ssh into the scan target The account has enough privileges to perform all checks. The account can do privileges escalation via: su, sudo su, cisco enable etc.