🚨 CMMC Phase One started November 10! Here's everything you need to know →

How to Configure Nessus to Fulfill NIST SP 800-171 REV.2 / CMMC 2.0 Level 2 - Control - RA.L2-3.11.2: Credentialed Scans, Plugins, and Scan Templates

Step-by-step guidance to configure Nessus credentialed scans, select plugins, and build scan templates to meet CMMC 2.0 / NIST SP 800-171 RA.L2-3.11.2 requirements while generating verifiable evidence.

•
April 05, 2026
•
4 min read

Share:

Schedule Your Free Compliance Consultation

Feeling overwhelmed by compliance requirements? Not sure where to start? Get expert guidance tailored to your specific needs in just 15 minutes.

Personalized Compliance Roadmap
Expert Answers to Your Questions
No Obligation, 100% Free

Limited spots available!

This post provides practical, step-by-step guidance for configuring Tenable Nessus to meet the Compliance Framework requirement RA.L2-3.11.2 (CMMC 2.0 Level 2 / NIST SP 800-171 Rev.2) by implementing credentialed scans, selecting the right plugins, and building repeatable scan templates that produce audit-ready evidence.

Prerequisites and planning for Compliance Framework scans

Before you start configuring Nessus, inventory the systems in-scope for the Compliance Framework assessment, subscribe or verify your Nessus plugin feed (Nessus Professional or Tenable.io/SC with active updates), and establish minimal-privilege service accounts for authenticated scanning. Plan network access (allow scanner IPs through host firewalls), ensure management protocols are available (SMB/445, WinRM 5985/5986, RPC/DCOM, SSH 22), and document which systems require domain vs local credentials. Capture evidence requirements—report formats, plugin IDs, timestamps, and the scope definition—so your scan configuration produces the artifacts auditors expect.

Configuring credentials in Nessus for authenticated scans

In a Nessus scan policy, navigate to the Credentials section and add accounts for each OS type: for Windows use either SMB (username/password, domain\user) and enable WMI or WinRM for more reliable checks; for Linux/BSD use SSH key-based authentication (private key with optional passphrase) or password-based SSH with sudo rights. Configure the Windows account with 'Logon as a service' if necessary, enable the Remote Registry service, and open RPC/ephemeral ports or configure WinRM to avoid DCOM issues. For sudo operations on Unix, create a dedicated scan account that can run only required commands without a password via a tightly scoped sudoers entry (e.g., /etc/sudoers.d/nessus-scan ALL=(ALL) NOPASSWD:/usr/bin/apt-get,/usr/bin/yum). For databases and network devices, supply appropriate DB credentials and SNMPv2/3 or SSH keys. Always store credentials in Nessus's secure credential store and document the account names and rotation schedule as Compliance Framework evidence.

Selecting plugins and tuning scan policies

Choose plugin families and individual plugins based on compliance objectives: enable Authenticated Checks, Patch Audit, Windows Local Security Checks, and Compliance Audit (SCAP) plugin families to validate configuration and patch status. Keep the plugin feed updated daily; patch-related plugins often carry the highest priority for RA.L2-3.11.2. Disable noisy unauthenticated destructive checks if scanning production systems (e.g., DoS-prone plugins). Use plugin filters to exclude irrelevant checks (legacy OSs not in scope) and tune severity thresholding so reports prioritize critical and high findings. Document the plugin set and versions as part of scan evidence for auditors—include plugin IDs, feed version, and the template used.

Building scan templates and scheduling for auditability

Create at least two scan templates: a credentialed "Authenticated Patch & Config Audit" (Advanced Scan with credentials, patch checks, and compliance audit) for in-depth verification, and a lighter "Discovery + Unauthenticated" template for asset discovery and external validation. Key template settings: set port scan to top 100/4096 depending on scope; increase Max Concurrent Checks Per Host for large hosts only after testing; tune SMB/SSH timeout and retries for slow networks; enable "Safe Checks" if you cannot tolerate intrusive tests. Schedule credentialed server scans at least weekly for servers and monthly for endpoints (or as required by your organization’s patch cycle), and keep a scan calendar and logs to demonstrate ongoing compliance to auditors.

Small-business real-world scenario

Example: a 50-endpoint small business with three domain-joined Windows servers. Create a domain service account 'svc_nessus' with read-only AD membership and local admin on the three servers via GPO for scanning only, enable WinRM via Group Policy, and deploy a Nessus scanner inside the LAN. Build two templates: "Workstation Weekly Auth" (SMB + WinRM, patch audit, exclude printers and BYOD VLAN) and "Server Daily Auth" (SMB + WinRM, patch audit, compliance checks, deeper credential scope). Run the server scan daily, set auto-updates for the plugin feed, and export signed PDF/CSV reports with plugin IDs and timestamps into your compliance evidence repository (documented in your Compliance Framework audit binder).

Failing to implement credentialed scanning leaves you blind to many critical vulnerabilities—missing installed packages, misconfigurations, local privilege escalation paths, and unpatched software—which increases the likelihood of breach, data exfiltration, and audit failures. Auditors expect authenticated results that demonstrate patch levels and configuration posture; unauthenticated scans alone often produce false positives and are insufficient to prove compliance with RA.L2-3.11.2.

Compliance tips and best practices: use a secrets manager (HashiCorp Vault, CyberArk, or Nessus secure storage) and integrate dynamic secrets where possible, rotate scan credentials on a scheduled basis, and limit credential scope to the minimum necessary. Maintain a change log for scan policies and templates (who changed what and why), attach remediation notes to each finding in your ticketing system, and correlate Nessus findings with your CMDB to avoid repeated scanning of decommissioned assets. For evidence, export scan details including scan policy name, plugin feed version, plugin IDs, and host-level authenticated results—these are the artifacts auditors typically request.

In summary, configuring Nessus to satisfy RA.L2-3.11.2 requires careful planning (service accounts, network access, and evidence requirements), precise credential configuration, selective plugin enabling, and repeatable scan templates with a documented schedule. For small businesses, start with a simple, documented credentialed policy for servers and workstations, automate plugin updates and scheduled scans, and preserve the exportable reports and logs as Compliance Framework evidence to show continuous monitoring and remediation efforts.

 

Quick & Simple

Discover Our Cybersecurity Compliance Solutions:

Whether you need to meet and maintain your compliance requirements, help your clients meet them, or verify supplier compliance we have the expertise and solution for you

 CMMC Level 1 Compliance App

CMMC Level 1 Compliance

Become compliant, provide compliance services, or verify partner compliance with CMMC Level 1 Basic Safeguarding of Covered Contractor Information Systems requirements.
 NIST SP 800-171 & CMMC Level 2 Compliance App

NIST SP 800-171 & CMMC Level 2 Compliance

Become compliant, provide compliance services, or verify partner compliance with NIST SP 800-171 and CMMC Level 2 requirements.
 HIPAA Compliance App

HIPAA Compliance

Become compliant, provide compliance services, or verify partner compliance with HIPAA security rule requirements.
 ISO 27001 Compliance App

ISO 27001 Compliance

Become compliant, provide compliance services, or verify partner compliance with ISO 27001 requirements.
 FAR 52.204-21 Compliance App

FAR 52.204-21 Compliance

Become compliant, provide compliance services, or verify partner compliance with FAR 52.204-21 Basic Safeguarding of Covered Contractor Information Systems requirements.
 
Hello! How can we help today? 😃

Chat with Lakeridge

We typically reply within minutes