Nexpose is a unified vulnerability detection and management solution that scans networks to identify the devices running on them and to probe these devices for vulnerabilities. It analyzes the scan data and processes it for reports. You can use these reports to help you assess your network security at various levels of detail and re-mediate any vulnerabilities quickly. The vulnerability checks identify security weaknesses in all layers of a network computing environment, including operating systems, databases, applications, and files. The application can detect malicious programs and worms, identify areas in your infrastructure that may be at risk for an attack, and verify patch updates and security compliance measures.
Components of the Virtual Appliance The Nexpose application consists of two main components:
• Scan Engines perform asset discovery and vulnerability detection operations. You can deploy them outside your firewall, within your secure network perimeter, or inside your DMZ to scan any network asset.
• The Security Console communicates with Scan Engines to start scans and retrieve scan information. All exchanges between it and Scan Engines occur through encrypted SSL sessions over a dedicated TCP port that you can select. For better security and performance, Scan Engines do not communicate with each other; they only communicate with the Security Console. When an asset is scanned for the first time, the Security Console creates a repository of information about that asset in its database. With each ensuing scan of the asset, the console updates the information in the repository.
The Security Console includes a Web-based interface for configuring and using the application. An authorized user can log on to this interface securely using HTTPS to perform any task that his or her role permits. When you deploy the Virtual Appliance, you will operate a Security Console with a local Scan Engine.
Troubleshooting: If for some reason your Nexpose installation malfunctions, you may want to try running the service manually by invoking the nsc.sh file, e.g.: $ /opt/rapid7/nexpose/nsc/nsc.sh
When in the nsc directory, you may need to invoke: sudo ./nsc.sh
Before running, make sure all existing Nexpose processes are shut-down (you can verify this with top or ps aux).