Management daemon shipped with GVM 10 and later. Abbreviation for Greenbone Vulnerability Manager Daemon.


Scanner daemon used by GVM 10 and before. It listens for incoming connections and starts scan processes to run the actual vulnerability tests. It collects the results and reports them to the management daemon. With the GVM 11 release, it has been converted to the openvas application by removing the daemon and replacing the communication protocol. Abbreviation for OpenVAS Scanner Daemon.


Scanner application executable to run vulnerability tests against targets and to store scan results into a Redis database. Used in GVM 11 and later. It has originated from the openvassd.


A framework for several scanner daemons speaking the Open Scanner Protocol (OSP).


A OSP scanner daemon managing the openvas executable for reporting scan results to the management daemon gvmd. Used in GVM 11 and later.


Greenbone Operating System, the operating system of the GSM appliances. It provides the commercial version of the GVM framework with enterprise support and features.


The commercial product line Greenbone Security Manager available as hardware or virtual appliances.


The Greenbone Management Protocol, an XML-based communication protocol provided by gvmd.


The Open Scanner Protocol, an XML-based communication protocol provided by OSPd-based scanners.


The Greenbone Vulnerability Management (GVM) is a framework of several services. It is developed as part of the commercial product line Greenbone Security Manager. Formerly known as OpenVAS.


The Greenbone Source Edition (GSE) covers the actual source codes of the Greenbone application stack for vulnerability scanning and vulnerability management GVM. The source edition is adopted by external third parties, e.g., if the GVM stack is provided by a Linux distribution, it is build from the Greenbone Source Edition.


The Greenbone Professional Edition (GPE) is the Greenbone product line for on-premises solutions. Included are virtual or hardware Greenbone Security Manager (GSM) appliances with the Greenbone Operating System (GOS), the Greenbone Vulnerability Management (GVM) framework, and the Greenbone Security Feed (GSF).


The Greenbone Community Feed (GCF) is the freely available feed for vulnerability information licensed as Open Source. It contains basic scan configurations, report formats, port lists and the most important vulnerability tests. The provided data is updated on a daily basis with no warranty or promises for fixes or completeness.


The Greenbone Security Feed (GSF) is the commercial feed provided by Greenbone Networks containing additional enterprise features like policy and compliance checks, extensive reports formats and special scan configurations. The feed comes with a service-level agreement ensuring support, quality assurance and availability.


Vulnerability Tests (VTs), also known as Network Vulnerability Tests (NVTs), are scripts written in the NASL programming language to detect vulnerabilities at remote hosts.