Vigyata.AI
Is this your channel?

Conducting Nessus Vulnerability Scan Results Analysis in 5 Minutes Using Pivot Table (Hands-on)

436 views· 22 likes· 12:25· Sep 3, 2025

🛍️ Products Mentioned (8)

In this video we discussed Nessus Vulnerability Scan Analysis, based on popular request by my subscribers. I demonstrated the scan analysis using excel spreadsheet PIVOT Table. Computer Security Resource Center https://csrc.nist.gov/publications The free way to help the channel grow is by subscribing using the link below: https://www.youtube.com/c/KamilSec?su... *************Patreon & Channel Support******************* https://www.patreon.com/kamilSec?fan_landing=true​ ********Order your KamilSec (KS) Designs Merch:********** https://kamilsec.creator-spring.com/ ************************************************************** Buy me a coffee if you appreciate my work https://buymeacoffee.com/kamilsec CashApp: $Kamilzak Zelle: kaamilzak@gmail.com Paypal: https://paypal.me/MZakari Thank You!!! ************************************************************* ***You can download copies of the vulnerability scans from my Patreon page, link below*** https://www.patreon.com/kamilSec?fan_landing=true Udemy Affliate link: https://track.flexlinkspro.com/g.ashx?foid=1.39197.1000020157&trid=1257621.161087&foc=11&fot=9999&fos=2&fobs=380496&fobs3=1.39197.1000020157 VeeFLY Referral Link: https://veefly.com?referrer=318243 Connect with me on Social Media: Twitter: https://twitter.com/Kamilzak_1​ Instagram: @Kamilzak1 E-Mail: Kaamilzak@gmail.com

About This Video

Hi everyone—this is a quick, hands-on walkthrough I put together because a lot of you asked the same question: how do you analyze a large Nessus vulnerability scan export without doing the painful manual process. In this video I show you how to do it in five minutes (or less) using an Excel PivotTable, so you can quickly break down what you actually have: criticals, highs, mediums, lows, and what’s just noise. I start with a sample Nessus spreadsheet and the first thing I do is clean it up by filtering out “None” severity items. Those are informational findings—useful for context sometimes, but they’re not actual vulnerabilities, and they’ll throw off your analysis if you leave them in. Once those rows are removed, I insert a PivotTable and build a view that’s actually useful for reporting: Plugin ID, Host/IP, Name, Synopsis, and Solution. Then I use Severity as a filter so I can flip between Critical/High/Medium/Low and quickly count how many plugin findings I have in each bucket. The final takeaway is simple: even if you have a huge spreadsheet, PivotTables make scan analysis fast and repeatable. I also show a practical reporting trick—duplicate the PivotTable sheet and create separate tabs for Critical, High, and Medium so anyone reviewing the results can navigate straight to what they need.

Frequently Asked Questions

🎬 More from KamilSec