ATM_ID: 0821E298-AF8A-11E8-B051-501DF1BA2977 ID: Pongo-Warhol/Basic_Connectivity/36211 TESTCASE_HEADLINE: Identify the vulnerabilities, policy-violating configurations and malware that attackers could use to penetrate your network through Nessus Vulnerability Scanner. GROUP: FEATURE: SUB_FEATURE: INPUT: This test case needs to be run in a wireless environment 1.Make sure the device has no jobs currently executing before this test case is executed. 2.Nessus Vulnerability Scanner should be installed , fully patched and updated successfully and its should be open properly from a client PC. OUTPUT: 1. Once the scan has been completed successfully , analyze the scan report for vulnerability. 2.Analyse all Critical , High , Medium and Information thoroughly for all the security issues. 2.If any other unwanted services shall be reflected in the report do a through analysis for port vulnerabilities. If required share this report to system security expert for complete analysis. PROCESS: PRIORITY: TEST_TYPE: LOE: RESOURCE_HW: RESOURCE_CONSUMEABLES: RESOURCE_MEDIA: SKILL_SET: TEST_CASE_TYPE: TESTCASE_SOURCE: SPEC_VERSION: SPEC_TAG: ATM_OWNER: ASSOCIATED_TESTCASES: TRAINING: TESTCASE_VERSION: TESTCASE_STATE: TESTCASE_PLATFORM: TESTCASE_PRODUCT: TESTCASE_APPROVALS: CDATE: 1535986801 MDATE: 1535986801 MUSER: w4y5hbch AUTHOR: w4y5hbch ATM_MCOMMENTS: Imported from spreadsheet HISTORY: ATM_LOCKED: ATM_REQLINK: ATM_REQCOUNT: 0 FILENAME: FILEDESC: FILES: QA_TEAM: APPROVE_QE: APPROVED_QE: APPROVE_SE: APPROVED_SE: APPROVE_SPAR: APPROVED_SPAR: MFF: PLANNEDTIMESTAFF: IMPLEMENTED: DATA_LOGIC: AUTOMATABLE_NOTAUTOMATABLE: TC_WEIGHTAGE: