Using Nexus For Organizational Security

Jun 21, 2024

Using Nexus Program to Find Vulnerabilities in Organization

Introduction

  • Finding vulnerabilities in an organization is crucial for maintaining security.
  • Introduction to Nexus program.
  • The program is user-friendly and suitable for organizations.

Steps to Install Nexus

Download

  • Visit the Nexus website.
  • Choose the desired version.
  • Download the installation file.

Install

  • Open the downloaded file.
  • Follow the installation steps.
  • Once installed, the program will automatically open in the web browser.

Using the Nexus Program

Initial Setup

  • Use port number 8834.
  • Accessible through the organization's network.
  • Fill in the basic information for usage.

Adding Target Machines

  • Select the server machines to scan.
  • Can choose the free version with limitations.
  • Or the pro version with full features, available for a 7-day trial.

Scanning Machines

  • Create a group to manage the machines to be scanned.
  • Define the name and type of scan.
  • Use Compliance Audit CIS scan type.

Linking with CIS Documents

  • Download the documents from the CIS website.
  • CIS documents are categorically and clearly detailed.
  • Used for referencing and improving security within the organization.

Conclusion

  • Using Nexus to find vulnerabilities helps enhance security in the organization.
  • Easy to install and use.
  • Can improve security according to CIS standards.