Hello All,

I'm scanning my employer's network with the hopes of limitting viral outbreaks
by identifying vulnerable Ms.Windows machines, and denying them dhcp
service.

My problem is that my employer's network also has *BSD, MacOS, and Linux
machines, but I don't want to deny those machines dhcp service, even if
they have vulnerabilities, because I'm not worried about them spreading
virii.

If I limit the plugins used in my scans to the 'Windows' family, then I
miss some plugins that I would like to use against Ms.Windows machines,
such as 11412, which is titled 'IIS : WebDAV Overflow (MS03-007)', and
which belongs to the 'Gain root remotely' family.  But, if I enable the
'Gain root remotely' family, then I also enable plugins that would be
applicable to those o.s.'s that I don't want to scan.

So, is there a way to instruct nessus to only 'attack' hosts which it
believes are 'Ms.Win*' hosts?  Or at least, to not 'attack' hosts which
it believes are not Ms.Win* hosts?

Thanks
-- 
Happy Landings,

Jon Detert
IT Systems Administrator, Milwaukee School of Engineering
1025 N. Broadway, Milwaukee, Wisconsin 53202
_______________________________________________
Nessus mailing list
[EMAIL PROTECTED]
http://mail.nessus.org/mailman/listinfo/nessus

Reply via email to