Tenable and Splunk Integration Guide
Tenable and Splunk Integration Guide
Components 6
CIM Mapping 9
Installation Workflow 12
Splunk Environments 15
Installation 17
Configuration 19
Configure Tenable.ad 22
Configure Tenable.io 25
Configure Tenable.ot 33
Create an Input 45
Saved Searches 53
Adaptive Response 55
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Alert Action Configuration 60
Additional Information 61
Customized Actions 62
Tenable Macros 63
Troubleshooting 64
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Welcome to Tenable for Splunk
The Tenable for Splunk application performs data collection, normalization, and visualization. The
application is divided into two parts:
l Tenable Add-On for Splunk (TA-tenable) provides all data collection and normalization func-
tionality.
l Tenable App for Splunk (TenableAppforSplunk) provides a dashboard to view the Tenable data
in Splunk.
l Tenable Plugin for Splunk Mission Control provides vulnerability data and insights to the
Splunk Mission Control application.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Components
The Tenable Add-on has specific purposes for each Splunk component. The available components
are in the following list:
Heavy Forwarder
The Heavy Forwarder collects and forwards data for all events.
Note: Enable the key value store (KV) on the heavy forwarder.
Indexer
Note: Use a default index or create and set a custom index. This is required.
Search Head
The Search Head allows full functionality of the Tenable Add-on adaptive response actions.
Note: Configure the Search Head with the same configuration details you have on the Heavy Forwarder for
the adaptive response actions to work correctly.
Note: If you install the Tenable App for Splunk on the search head, you must also install the Tenable Add-
on.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Tenable Add-on (TA-tenable)
The Tenable Add-On for Splunk pulls data from Tenable platforms and normalizes it in Splunk.
Request Export
l GET /vulns/export
Asset Export
l POST /assets/export
l GET /assets/export/{id}/status
l GET /assets/export/{id}/chunks/{id}
Vulnerability Export
l POST /vulns/export
l GET /vulns/export/{id}/status
l GET /vulns/export/{id}/chunks/{id}
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Source and Source Types
The Tenable Add-on for Splunk stores data with the following sources and source types.
Tenable.sc
Tenable.io
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
CIM Mapping
This chart displays mapping for Tenable vulnerability findings to Splunk CIM.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Tenable Plugin for Splunk Mission Control
Tenable Plugin for Splunk Mission Control is an optional plugin for the Splunk application which
provides vulnerability data and insights to the Splunk Mission Control application. Splunk Mission
Control is a unified cloud-based security operations platform that provides security incident triage,
investigation, collaboration, and response functionality as a Software-as-a-Service (SaaS) solution.
l Splunk Enterprise Security generates notable events via correlation searches which it for-
wards to Mission Control using Splunk Connect for Mission Control App.
l Splunk Connect for Mission Control establishes connection between your on-premise, or
cloud, Splunk deployment & Mission Control.
l Tenable Plugin for Splunk Mission Control fetches data from your connected on-premise, or
cloud, deployment’s Splunk indexes.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Configuration
To configure Tenable Plugin for Mission Control, refer to Configure Tenable Plugin for Mission Con-
trol.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Installation Workflow
Complete the installation and configuration of the Tenable applications for Splunk according to the
following workflow.
2. Configure the desired Tenable application for Splunk: Tenable Plugin for Mission Control, Ten-
able.io, Tenable.sc Credentials, Tenable.sc Certificates, Tenable NNM, Tenable.ad, or Ten-
able.ot.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Upgrade the App from v1 to v4
Note: If you are upgrading from App v2 or v3 to v4, install the new version (v4) over your current version.
1. Delete the app and all app configuration files from all Splunk search heads and heavy for-
warders from the command line. For example:
rm -rf $SPLUNK_HOME/etc/apps/TA-tenable/
5. Create an Input.
l Synchronization of previously fixed vulnerabilities is optional during the input setup and dis-
abled by default. To enable the synchronization, see the Create an Input section.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
l When the initial import completes, you can run saved searches to create lookup tables and
build reports.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Splunk Environments
The installation process for the Tenable App for Splunk and Tenable Add-On for Splunk varies based
on your Splunk environment.
Deployment Types
Single-server, distributed deployment, and cloud instance options are available.
Single-Server Deployment
Distributed Deployment
In a distributed deployment, install Splunk on at least two instances. One node works as a search
head, while the other node works as an indexer for data collection.
The following table displays Tenable Add-On and Tenable App installation information in the dis-
tributed environment.
Cloud Instance
Note: The data collection can take place in an on-premise Splunk instance that works as a heavy for-
warder.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
You can install the application via a command line, or from the Splunk user interface.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Installation
For Tenable.io:
For Tenable.sc:
l You must have Splunk downloaded on your system with a Splunk basic login.
Note: See the Splunk Environments section for additional information about the different types of Splunk
deployments and their requirements.
Note: If you install the Tenable App for Splunk on the search head, you must also install the Tenable Add-
on.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
4. In the search bar, type Tenable.
5. Click Launch App for the Tenable application you want to install.
Note: Restart Splunk after installing the Tenable App or Tenable Add-On.
Note: You may need to update the Tenable Macro, get_tenable_index, for data to begin populating the applic-
ation dashboards.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Configuration
Tenable provides multiple application configuration options for the Tenable Add-On for Splunk.
l Tenable.ad
l Tenable.io
l Tenable NNM
l Tenable.ot
l Tenable.sc Credentials
l Tenable.sc Certificates
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Configure Tenable Plugin for Mission Control
l Tenable Add-On for Splunk (TA-tenable)provides all data collection and normalization
functionality.
l Tenable App for Splunk (TenableAppforSplunk) provides a dashboard to view the Tenable
data in Splunk.
l Ensure you have access to a Splunk Mission Control tenant. If you do not have a tenant
set up, contact your Splunk representative.
b. From the drop-down menu, navigate to Admin Settings > Product Settings > Splunk Con-
nect for Mission Control.
c. Confirm that the connection status shows Active.Log in and navigate to the Mission Con-
trol Home page.
2. In the upper-right corner, click the ellipses icon on the top right corner. A drop-down menu
appears.
3. From the drop-down menu, navigate to Product Settings > Splunk Connect for Mission Con-
trol. Select the instance configured with Mission Control. Save the deployment ID for future
use. This deployment ID is used as a default instance while populating the Tenable Vul-
nerability Center dashboard.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
4. Navigate to Product Settings > Plugin. If you do not see the Plugin page, contact your Splunk
representative.
5. Select Tenable Plugin for Mission Control. The setup page appears.
6. Enable the Tenable Plugin for Mission Control by clicking the toggle.
7. In the Default Connection ID box, enter the deployment ID that you previously took note of.
8. If you see, the message Subscription Successful - you have enabled the plugin. You will see
Tenable Vulnerability Center Dashboard under Managed Dashboards sections in Dashboards
drop-down.
9. Configure your notable events label to enable integration between the Tenable Plugin and Mis-
sion Control. The notable events label mcef_tenable_plugin_for_mission_control must be
applied for the integration to work.
a. In the Splunk Connect for Mission Control application, navigate to Settings > Searches,
reports, and alerts on Cloud/on-premise instance.
c. To configure the saved searches to forward notables with specific label values of plugin
Id, in the Mission Control - Forward Notable Events box enter the label mcef_tenable_
plugin_for_mission_control.
d. Click Save. Splunk Mission Control is configured to forward notable events with this
label to the Tenable Plugin for Mission Control dashboard.
Troubleshooting
If you are experiencing problems with setup or data retrieval with Tenable Plugin for Mission Con-
trol, refer to Troubleshooting.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Configure Tenable.ad
You can connect to Tenable.ad using a syslog input. Configure a default UDP/TCP data input of
Splunk with the following steps.
The Add Data page appears with the TCP/UDP option selected.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
4. Enter the port configuration information.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
12. Select an Index.
Note: If your configuration needs edits, click Back to update your settings.
1. In the Tenable.ad console, under Local Settings, go to the Servers > Syslog Servers screen.
3. In the Server Name field, enter a name for your Splunk system.
5. In the Port field, enter the port number on the Splunk system to which the events will be sent.
6. In the Transport field, select from the drop-down list the transport protocol in use. (Options
are TCP or UDP).
7. Click Send Test Message to send a test message to verify that the configuration was suc-
cessful, and check if the message has arrived. If the message did not arrive, then
troubleshoot to discover the cause of the problem and correct it.
8. Click Save.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Configure Tenable.io
To complete the installation process, you must complete the setup for the Tenable Add-on for
Splunk.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
3. Click the Configuration tab.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
5. Enter the necessary information for each field. The following table describes the available
options.
Account Name (Required) The unique name for each Tenable data
input.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
with the username you provided.
Next steps
l Create an Input for the Tenable Add-On for Splunk.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Configure Tenable Nessus Network Monitor
You can connect to Tenable Nessus Network Monitor (NNM) using a syslog input. Configure a default
UDP/TCP data input of Splunk with the following steps.
The Add Data page appears with the TCP/UDP option selected.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
5. At the top of the page, click Next.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
13. At the top of the page, click Review.
Note: If your configuration needs edits, click Back to update your settings.
1. Log in to NNM.
2. Go to > Configuration.
5. In the IP field, enter the IP address of the Splunk server you configured to accept syslog.
6. In the Port field, enter the port number you have Splunk set to listen to when syslog is on.
8. For Protocol, select the protocol you have set up to accept the syslog for Splunk.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Configure Tenable.ot
You can connect to Tenable.ot using a syslog input. Configure a default UDP/TCP data input of
Splunk with the following steps.
The Add Data page appears with the TCP/UDP option selected:
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
4. Enter the port configuration information.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
12. Select an Index.
Note: If your configuration needs edits, click Back to update your settings.
1. In the Tenable.ot console, under Local Settings, go to the Servers > Syslog Servers screen.
3. In the Server Name field, enter a name for your Splunk system.
5. In the Port field, enter the port number on the Splunk system to which the events will be sent.
6. In the Transport field, select from the drop-down list the transport protocol in use. (Options
are TCP or UDP).
7. Click Send Test Message to send a test message to verify that the configuration was suc-
cessful, and check if the message has arrived. If the message did not arrive, then
troubleshoot to discover the cause of the problem and correct it.
8. Click Save.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Configure Tenable.sc Credentials
To complete the installation process, you must complete the setup for the Tenable Add-on for
Splunk.
For Tenable.sc:
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
4. Click the Add button.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Note: Tenable.sc standard credential use is deprecated. Use Tenable.sc API keys for account authen-
tication. For more information on Tenable.sc API keys, see Generate API Keys.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
6. Enter the necessary information for each field. The following table describes the available
options.
Account Name (Required) The unique name for each Tenable data
input.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
with the username you provided.
Next steps
l Create an Input for the Tenable Add-On for Splunk.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Configure Tenable.sc Certificates
To complete the installation process, you must complete the setup for the Tenable Add-on for
Splunk. For additional information on Tenable.sc Certificates, see SSL Client Certificate Authentic-
ation.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
4. Click the Add button.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
5. In the Tenable Account Type box, select Tenable.sc Certificates.
6. Enter the necessary information for each field. The following table describes the available
options.
Note: The certificates you upload and configure must be associated with a specific user in Ten-
able.sc.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
tificate.
Key Password The password for the key file you uploaded.
Next steps
l Create an Input for the Tenable Add-On for Splunk.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Create an Input
After you complete the configuration for your Tenable Add-On for Splunk, you must create the
input.
To create an input:
1. In the Splunk interface, click the Inputs tab.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
4. Enter the necessary information for each field. The following table describes the available
options.
Note: If you don't use the default index, you must update the Tenable Macro.
Tenable.io
Name The unique name for each Tenable data input. yes
Global Account Splunk pulls data from this Tenable account. yes
Lowest Severity Score The lowest level of severity that is stored. yes
Tenable.sc Vulnerability
Name The unique name for each Tenable data input. yes
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Interval The interval parameter specifies when the yes
input restarts to perform the task again (in
seconds). The interval amount must be
between 300 and 86400.
Global Account Splunk pulls data from this Tenable account. yes
Sync Plugin Details If selected, plugin details are included for the yes
related tags in Tenable assets.
Tenable.sc Mobile
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
input.
Global Account Splunk pulls data from this Tenable account. yes
Note: Tenable recommends running the saved search every 24 hours. However, you can adjust as needed.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Tenable Data in Splunk Dashboard
The Tenable App for Splunk provides a single dashboard that displays all of your Tenable data.
Results appear.
4. Click get_tenable_index.
The INDEX_NAME should be the same name entered when you created the data input.
6. Click Save.
3. Select either Tenable IO Vuln Date - All Time or Tenable SC Vuln Data - All Time.
Splunk completes the query.
Displayed Components
l Total Vulnerabilities Today
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
l Fixed Vulnerabilities Today
l Total Vulnerabilities
l Active Vulnerabilities
l Fixed Vulnerabilities
l Top 10 Vulnerabilities
l Vulnerabilities by Severity
l New Vulnerabilities
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Tenable NNM Data in Splunk Dashboard
The Tenable App for Splunk provides a single dashboard showing all of your Tenable NNM data. Set
the following components:
Displayed Components
Dashboard
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
l Top 10 Events
l Top Source IP
Traffic Overview
l Top Destination IP
l Top Source IP
Traffic Map
l Source IP Map
l Destination IP Map
Events
l Top Events
l Events
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Saved Searches
The Saved Search option creates lookup tables. The lookup tables contain filtered data that auto-
matically removes duplicate information providing accurate, readable results.
io_vuln_data_lookup
Tenable.io asset data: Type the following command to view the KV store collection for Tenable.io
asset data.
io_asset_data_lookup
Tenable. io plugin data: Type the following command to view the KV store collection for Tenable.io
plugin data.
io_plugin_data_lookup
sc_vuln_data_lookup
Tenable.sc asset data: Type the following command to view the KV store collection for Tenable.sc
asset data.
sc_asset_data_lookup
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Tenable.sc plugin data: Type the following command to view the KV store collection for Tenable.sc
plugin data.
sc_plugin_data_lookup
nnm_vuln_data_lookup
NNM events over time, NNM Top 10 Events, NNM Top Destination by Country, NNM Top Source by
Country, Top Destination IP, Top Destination Port, Top NNM Plugin ID, Top Source IP, and Top
Source Port: Type the following command to view NNM events.
tenable:nnm:vuln
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Adaptive Response
You can create a correlation search and bind it to the adaptive response action when you save it.
This allows you to call actions automatically when you run a search.
Note: When you run the search, the actions are retrieved automatically
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
3. In the Enterprise Security top navigation bar, click Configure.
4. Click Content.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
5. Click Content Management.
8. Enter information for the correlation search. Refer to the Correlation Search section in the
Splunk user guide for additional information.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
11. Select the appropriate action for your search.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
13. Enter the required information in the fields of your added response action.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Alert Action Configuration
4. Click Save.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Additional Information
See the following pages for additional information:
l Troubleshooting
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Customized Actions
The Tenable Add-on for Splunk provides an option that allows you to call a customized action manu-
ally. You can call an action to make a REST API call for a specific action.
Next steps
l You can view the Alert Action status in the Adaptive Responses section to verify they were
executed successfully.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Tenable Macros
Results appear.
4. Click get_tenable_index.
5. In the Definition entry field, update the definition to index=INDEX_NAME. The INDEX_NAME
should be the same name entered when you created the data input.
6. Click Save.
2. Click get_tenable_sourcetype.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Troubleshooting
1. I am getting a Splunk error.
l Run an All Time saved search for Tenable.io or Tenable.sc. After running the All Time
saved search, turn on and schedule a saved search.
l Check the Tenable macro (get_tenable_index) and ensure the Tenable index is set cor-
rectly.
l The dashboard can take some time to populate when data collection is started. To
ensure you are receiving all available data, take the following steps:
l You should see the following source types: tenable:io:vuln, tenable:io:assets, ten-
able:sc:vuln"\, tenable:sc:plugin, tenable:sc:assets, tenable:sc:mobile:vuln, ten-
able:sc:mobile:assets, tenable:nnm:vuln.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
l The app only imports new information from Tenable.sc. So if you have not scanned
recently, there may not be any updates.
4. While running Tenable.io, I get the following error: ERROR pid=106020 tid=MainThread
file=io_connect.py:__checkResponse:83 | Tenable Error: response: Duplicate
export not allowed. Please modify request or wait until existing export is
complete.
l If you have an issue trying to establish connection with Mission Control, refer to Splunk
documentation for Splunk Connect for Mission Control.
l If you are unable to find the Tenable Vulnerability Center dashboard under Managed
Dashboards section in the Dashboards drop-down, make sure there are no trailing white
spaces for the connection ID fetched from Admin Settings. Refer to Tenable Plugin for
Splunk documentation.
l If you are not able to find data on Plugin Dashboards/ AQ tabs/ Investigation tabs:
1. Verify that you have an active connection between the On-premise instance and
Mission Control by navigating to Admin settings > Product Settings > Splunk Con-
nect for Mission Control. Check the connection status against the configured
instance.
3. If the status is Active, verify that the Tenable application’s look-up has data by
referring to Tenable App for Splunk documentation.
8. The Analyst Queue and Investigation tabs are not getting rendered for a particular Notable in
Splunk Mission Control.
l If you are not able to render Tenable Summary Analyst Queue tabs and Tenable Invest-
igation tabs, make sure the label for the given notable is mcef_tenable_plugin_for_
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
mission_control. If not, update the label for that notable manually with the edit option or
reconfigure the Notable Events step in the Tenable App for Splunk documentation with
the correct label.
Copyright © 2022 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective