Performing a Scan and Using the Reports
The Nessus scan is really the heart of Nessus as this process performs the vulnerability assessment against the machines you specified in your policy.
1) In Nessus, click the Scans tab and then click Add.
2) Give the scan a name and select the policy you set up earlier.
3) In the Scan targets box, enter the list of machines you wish to scan. You can also import a list using the Targets file box. Click Launch Scan to begin the scan.
4) Depending on how many devices you are scanning, Nessus may take a while. When the scan is complete click on the Reports tab.
5) You will see the name of the scan you just completed. Double click on the san name to drill into the report.
6) Once in the report, you will see a listing of each host scanned along with the total number of High, Medium, Low vulnerabilities found (Figure 6).
7) Double click on the host name to drill into a list of the vulnerabilities found. Drilling into each vulnerability and Plugin ID will give you a detailed description of the vulnerability found along with possible mitigation strategies (Figure 7).
That covers the basics of how to use Nessus. By frequently scanning your network for vulnerabilities, you'll go a long way in protecting your network.