The product Tenable SecurityCenter is used to create and perform system vulnerability scans on Johns Hopkins servers and high value systems. (It is not intended for use to scan desktops or other systems.) We have multiple Nessus scanners located throughout the Johns Hopkins network to facilitate rapid scanning of these servers and systems.
SecurityCenter manages all of the JH Nessus scanners as well as performs daily downloads of vulnerability plugins from Tenable. As the new and updated plugins are available, they can be included in your scans.
You can request a SecurityCenter vulnerabilty scanning account by sending an email to firstname.lastname@example.org. Include your JHED ID and the list of FQDN or IP addresses that you need to scan.
SecurityCenter can be accessed at https://securitycenter.nts.jhu.edu
Setting Up your Systems for Scanning:
You must add the Nessus scanner IP addresses to the “allowed” list of IP addresses for your systems if you have host intrusion monitoring, system firewalls, IPTABLES, or other controls in place that limit access to the systems that will be scanned,
The IP addresses for the JH Enterprise Nessus Vulnerability scanners are:
Some of the new features in SecurityCenter version 5.1:
Using SecurityCenter – get started guide (pdf)
FREE On Demand Training – from Tenable, just register and get started
Tenable Blog (resources and articles written by Tenable staff)
Tenable Webcasts (upcoming and archived learning resources)
Tenable Videos (introductory training on SecurityCenter, Nessus, and other Tenable products)
Tenable User Discussion Forums (multiple discussion forums on Nessus, SecurityCenter and other Tenable products. Ron Gula, one of the founders of and current CEO/CTO at Tenable, is very active on these forums.
SecurityCenter is managed and operated by IT@JH Enterprise Technology Services Enterprise Management, Monitoring & Security. You can contact us by sending an email to email@example.com