Authors: Varun Deshmukh, Ananya Paul, Jatin Mehta, Swati Tripathi

Abstract: In today's evolving digital ecosystem, ensuring the security of Unix-based servers is vital for the integrity of enterprise infrastructures. Vulnerability mapping serves as a crucial technique to identify, assess, and mitigate potential security risks before they can be exploited. This paper provides a comprehensive review of vulnerability mapping approaches in Unix environments, focusing on the integration of Tenable’s vulnerability scanning tools—particularly Nessus—and log correlation methods. By leveraging automated scanning and advanced log analytics, organizations can proactively detect known vulnerabilities, monitor suspicious activity, and respond effectively to threats. The study emphasizes the value of combining these technologies to create a robust and responsive security posture for Unix systems.

DOI: https://doi.org/10.5281/zenodo.16261000