Greenbone Security Assistant
The Greenbone Security Assistant is the web interface developed for the Greenbone Security Manager appliances.
It connects to the Greenbone Vulnerability Manager GVM to provide a full-featured user interface for vulnerability management.
Greenbone Security Assistant consists of
All release files are signed with
the Greenbone Community Feed integrity key.
This gpg key can be downloaded at https://www.greenbone.net/GBCommunitySigningKey.asc
and the fingerprint is
8AE4 BE42 9B60 A59B 311C 2E73 9823 FAA6 0ED1 E580.
This module can be configured, built and installed with following commands:
cmake . make install
For detailed installation requirements and instructions, please see the file INSTALL.md.
If you are not familiar or comfortable building from source code, we recommend that you use the Greenbone Security Manager TRIAL (GSM TRIAL), a prepared virtual machine with a readily available setup. Information regarding the virtual machine is available at https://www.greenbone.net/en/testnow.
In case everything was installed using the defaults, then starting the HTTP daemon of the Greenbone Security Assistant can be done with this simple command:
The daemon will listen on port 443, making the web interface
available in your network at
If port 443 was not available or the user has no root privileges,
gsad tries to serve at port 9392 as a fallback (
To see all available command line options of gsad, enter this command:
For any question on the usage of
gsa please use the Greenbone Community
Portal. If you found a problem with the
software, please create an issue on
GitHub. If you are a Greenbone customer you may alternatively or additionally
forward your issue to the Greenbone Support Portal.
This project is maintained by Greenbone Networks GmbH.
Copyright (C) 2009-2021 Greenbone Networks GmbH
Licensed under the GNU Affero General Public License v3.0 or later.