In our previous post, we showed you how to install and start using Nessus to find vulnerabilities in the devices of your network. In the example we run