SNOW UserGuide 4.x
SNOW UserGuide 4.x
x User
Guide
Application Dependencies 8
Install 10
Configure 17
Settings 49
General Settings 50
Assets Settings 51
VR Settings 52
ITSM Settings 54
Tenable Applications 56
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Tenable for Vulnerability Response (VR) 64
Tenable for VR 65
Available Data 67
Support 71
Troubleshooting 72
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Welcome to Tenable for ServiceNow 4.x.x
Tenable applications are designed to help customers who use ServiceNow with Tenable.io or Tenable.sc.
In the Tenable for ServiceNow 4.x.x, all configuration and import scheduling is done via the connectors.
Therefore, you must properly configure your connectors for the Assets, Vulnerability Response (VR), or
Information Technology Service Management (ITSM) applications to function properly.
The Tenable for Assets application integrates Tenable assets with the ServiceNow Configuration Man-
agement Database (CMDB) to use the ServiceNow Identification Reconciliation Engine (IRE). This applic-
ation, once configured, allows you to bring Tenable asset data into ServiceNow as CIs and to push
ServiceNow CIs to Tenable as assets.
The Tenable for Vulnerability Response application integrates Tenable vulnerability findings with the Ser-
viceNow Security Operations Vulnerability Response module. This application, once configured, syncs all
of Tenable vulnerability findings into ServiceNow Vulnerable Items (VI) and Tenable Plugin details into
ServiceNow Third Party Vulnerabilities.
The Tenable for ITSM application integrates Tenable high and critical vulnerability findings into a custom
table that can then be used to create incidents from the vulnerabilities. This application, once configured,
syncs all of Tenable vulnerability findings into a custom vulnerabilities table and Tenable Plugin details
into a second custom table.
l Tenable Connector
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Before You Begin
You must complete the following steps before you can use the Tenable for ServiceNow application.
l Install the applications on a test environment and promote those update set changes for quality
assurance in your test environment.
l Once approved in your test environment, install the Tenable applications on a production envir-
onment and apply the update sets.
l Ensure your system meets the MID server system requirements, as described in the MID Server
System requirements in the ServiceNow documentation.
l Ensure your system meets the MID Server memory requirements, as described in the Set the MID
Server JVM memory size section in the ServiceNow documentation.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Enabling the Application picker under the developer tab in the ServiceNow UI configuration menu sim-
plifies the Tenable for ServiceNow application configuration. For more information, see the System set-
tings for the user interface (UI) section in the ServiceNow documentation.
Examples:
l sn_dev
l sn_test
l sn_prod
By segmenting the users, you can also limit the amount of data used in your development and test envir-
onments.
In Tenable.io, you can set up an Access Group and limit the data to specific assets to simplify the import
and testing of data.
In Tenable.sc, you can create a query that limits the data presented to the development and test users. To
determine the best dataset to use for your development and test environments, speak with your Tenable
administrator. They can also help you ensure ServiceNow displays the best data by setting up appro-
priate scan cadences.
Note: You must create unique API keys for use with ServiceNow.
1. Log in to Tenable.io.
2. Create administrator accounts (e.g. development, test, production) dedicated for use with Ser-
viceNow. These accounts are used by ServiceNow to connect to Tenable.io to retrieve asset data.
3. Generate API keys and save them for use with ServiceNow.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
or custom-built application or integration. It must be unique for each installed instance of the integ-
ration.)
Note: You must create unique API users for use with ServiceNow.
1. Log in to Tenable.sc.
2. Create security manager accounts or Create security analyst accounts (e.g. development, test, pro-
duction) with full access dedicated for use with ServiceNow. These accounts are used by Ser-
viceNow to connect to Tenable.sc to retrieve data and kick off remediation scans.
3. Generate API keys and save them for use with ServiceNow.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Application Dependencies
The Tenable apps for ServiceNow have the following application dependencies:
l Tenable Connector (ServiceNow Application) - This application is a prerequisite for all other Ten-
able.io applications in the ServiceNow store
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Get Started with Tenable for ServiceNow
Use the following getting started sequence to configure your Tenable for ServiceNow integration.
Note: It is important to configure Tenable ServiceNow applications in the following order. You must install and con-
figure connectors before any other application. If the connectors are not properly installed, those errors will impact
all subsequent application installations and configurations.
Tip: Tenable recommends using the tabbed view in ServiceNow to easily navigate the Tenable applications. To use
this setting, go to Settings > Forms. Enable the Tabbed forms toggle.
3. Configure the Tenable for Assets application. You can schedule imports in this step.
Note: It is important to accurately configure the Tenable for Asset application. If this is not set up correctly,
the integration does not work properly.
4. (Optional) Configure the Tenable for VR application. You can schedule imports in this step.
5. (Optional) Configure the Tenable for ITSM application. You can schedule imports in this step.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Install
To download the Tenable applications, go to the ServiceNow App Store. For more information on how to
download applications from the App Store, see the ServiceNow documentation.
The following Tenable applications are available in the ServiceNow App Store:
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Upgrade to 4.x.x Tenable Applications
l All CIs that are in the Assets Pending Approval class are moved to one of the following new Ser-
viceNow classes:
o Unclassified Hardware
o Incomplete IP
This allows Tenable to utilize out-of-the-box CI classes and remove our custom CI classes in sub-
sequent versions of the application.
l The upgrade generates IRE payloads for every CI with Tenable asset attributes. This ensures that
any previous matches continue working as they did prior to the upgrade.
While IRE provides a standardized engine for bringing third-party asset data into ServiceNow, there are
some limitations in IRE. These limitations are not specific to Tenable or Tenable data, but rather are part
of the design/functionality of the IRE. You must extensively test and tune how Tenable assets are brought
in using IRE. If you have questions or need assistance with tuning IRE, please contact your ServiceNow
representative.
It is important that every unique Tenable asset translates to a unique CI in ServiceNow. Otherwise, you
are guaranteed to lose Tenable vulnerability data when it imports into ServiceNow.
Moving forward, be sure to follow the Asset application setup procedures. Fore more information, see the
IRE Rules instructions in the Assets Configuration section.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
1. Log in to ServiceNow.
6. Locate item in the list with a value in the Change skipped column.
Note: When opening a support case, you must provide proof that the above steps have been completed, as most
issues revolve around the incorrect completion of these steps.
Note: When opening a support case, you must provide the output of this script, as most issues revolve around the
incorrect completion of this step.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Upgrade the Tenable Applications
Upgrades are periodically made to the ServiceNow Tenable Applications. When these updates are made,
you must upgrade the platform to ensure the updates are applied to your system.
3. For each of the Tenable Applications you installed, complete the Upgrade the Tenable Applications
steps.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Upgrade the Tenable Applications
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
A list of installed Tenable applications appear.
6. Click Update.
1. Log in to ServiceNow.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
The Upgrade History page appears.
6. Locate item in the list with a value in the Change skipped column.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Configure
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Configure the Tenable Connector
The Tenable Connector provides all API interactions between your Tenable applications (Tenable.io or
Tenable.sc) and ServiceNow instance.
Note: In ServiceNow, you must have the x_tsirm_api_access admin role to perform the basic connector setup
process.
Note: The ServiceNow configuration only supports Tenable.sc versions 5.7 and later.
For Tenable.io:
For Tenable.sc:
1. Log in to ServiceNow.
3. Click New.
5. If you are in a domain separated environment, in the Domain box, type the domain into which to
bring connector data.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
7. In the Scheduled Job Run As box, type the username of the user with which you want to import
data.
Note: If you are in a domain separated environment, this field is required. The user must be part of the
domain specified in step 5.
For Tenable.io:
a. In the Address text box, type an IP address or DNS name for the connector.
b. In the Access Key text box, type the access key provided by your Tenable administrator.
c. In the Secret Key text box, type the secret key provided by your Tenable administrator.
For Tenable.sc:
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
a. Next to Address, click the lock button.
b. In the Address text box, type an IP address or DNS name for the connector.
d. In the MID Server text box, search for and select a MID server that can access your Ten-
able.sc server.
i. In the API Username text box, type the API username provided by your Tenable
administrator.
ii. In the API Password text box, type the API password provided by your Tenable
administrator.
i. In the Access Key text box, type the API access key provided by your Tenable
administrator.
ii. In the Secret Key text box, type the API secret key provided by your Tenable
administrator.
Tip: To save your selected configuration options without navigating away from the page:
1. Right click in the top menu that contains the Tenable Connector heading and menu.
A list of options appears.
2. Click Save.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
10. (Optional) In the General Settings section, you can specify your Max ECC Wait Time (in seconds)
and Request Timeout (in seconds) for each of your configured connectors.
11. In the Asset Settings section, you can set the Asset Logging Level, Asset Max Cumulative Log
Entries, and Asset Max Cumulative Log Sizes. The default setting for the logging levels is Errors
Only.
12. In the Additional Asset Settings section, you can set New Record Sync Frequency (in minutes),
Record Update Sync Frequency (in minutes), Asset Max Job Log (in days), and Asset Max Job
Wait (in days).
Note: You may have additional settings options on your connector page depending on the Tenable applications you
have installed, i.e., Tenable Assets (Assets Settings), Tenable VR (VR Settings), and Tenable ITSM (ITSM Set-
tings).
Note: For additional information about ServiceNow settings, see the ServiceNow documentation.
Note: If the connector test fails, check your username, password, and API Keys and retest the connector.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Disable or Enable Connectors
Disable Connector
Enable Connector
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
6. Click Update.
6. Click Update.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
The Tenable Connector is activated.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Assets Configuration and Schedule Import
Note: Tenable for Assets only supports Tenable.sc versions 5.7 and later.
The asset integration allows ServiceNow to retrieve and accurately match Tenable assets to your existing
CIs. Tenable for VR and ITSM both rely on this app for finding the correct asset related to vulnerabilities
from Tenable.
Note: It is extremely important that you completely setup and tune this integration to correctly match Tenable
Assets to ServiceNow CIs before moving on to Tenable for VR or Tenable for Assets.
The Tenable Scheduled Import page appears. By default, the Tenable Product and Connector
fields populate with the Tenable application/connector you selected in step 3.
7. From the Tenable Application drop-down box, select Tenable for Assets.
Tenable.io
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Tenable.sc
8. From the Tenable Job Type drop-down box, select the appropriate job type.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
9. If you are in a domain separated environment, in the Domain box, type the domain into which to
bring connector data.
10. (For Tenable.io) From the Import Export drop-down box, select Import. Import is selected by
default.
11. In the Name text box, type a unique name for this scheduled job.
Option Description
Last Update Pull Sets a date and time for the next pull.
Order Prioritizes when the import should run. (This option pop-
ulates when you select the Tenable Application in step
6. However, you can modify it by typing in the text box.)
Default Chunk Size The number of records pulled in segments during the
import. (This option populates when you select the Ten-
able Application in step 6. However, you can modify it
by typing in the text box.)
Configuration
Record Update Sync Frequency The frequency of pulling assets (in minutes). The
default setting is once a day (1,440 minutes).
Note: Ensure that you accurately configure the assets. Asset configuration is key in making the integration work
properly. Errors in these configuration steps, effect all future configurations.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Configure IRE Rules
Be sure to review the ServiceNow 3.0.x upgrade instructions to ensure the IRE will work in your envir-
onment.
Note: By default, Tenable data updates CI fields on each import. If you are using ServiceNow Paris or later, you can
use reconciliation rules to control what asset data updates.
1. Log in to ServiceNow.
2. In the left panel, in the Filter navigator, type "CI Class Manager".
9. In the Advanced Options section, deselect the Enforce exact count match check box.
What to do next:
Clean the correlation data to ensure IRE rule changes are applied on the next import.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Below are example background scripts that you can run to clean direct correlations between Tenable
data, the CMDB, and IRE data. When you make changes to the IRE rules to better match third party data
to your existing ServiceNow CIs, you must clean up old relationships to ensure the updated rules are
applied.
1. Log in to ServiceNow.
The Tenable Scheduled Import page appears. By default, the Tenable Product and Connector
fields populate with the Tenable application/connector you selected in step 3.
6. From the Tenable Application drop-down box, select Tenable for Assets.
7. From the Tenable Job Type drop-down box, select the appropriate job type.
8. If you are in a domain separated environment, in the Domain box, type the domain into which to
bring connector data.
9. (For Tenable.io) From the Import Export drop-down box, select Import. Import is selected by
default.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
10. In the Name text box, type a name for the export.
Option Description
Last Update Pull Sets a date and time for the next pull.
Order The order that the import should run. (This option pop-
ulates when you select the Tenable Application in step
6. However, you can modify it by typing in the text box.)
Default Chunk Size The number of records pulled in segments during the
import. (This option populates when you select the Ten-
able Application in step 6. However, you can modify it
by typing in the text box.)
Configuration
Record Update Sync Frequency The frequency of pulling assets (in minutes). The
default setting is once a day (1,440 minutes).
Source table and Conditions Select source tables and use filter conditions to specify
export information.
1. Log in to ServiceNow.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
3. Delete the default export.
Note: Tenable does not recommend using the default export because it uses predefined ServiceNow sysids
that can be overwritten during the upgrade process.
4. In the upper-right corner of the page, from the application picker drop-down box, select Global.
5. Click New.
7. In the Connector text box, type the connector to use for the import.
8. From the Group Type drop-down box, select the type of asset group to create.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
VR Configuration and Schedule Import
Note: The Tenable for Vulnerability Response application only supports Tenable.sc versions 5.7 and later.
The VR integration configuration allows ServiceNow to poll and retrieve vulnerability data from Tenable.
Note: You must completely configure and tune Tenable for Assets to correctly match Tenable Assets with
ServiceNow CIs. If you do not do this first, you will have issues with VR.
The Tenable Scheduled Import page appears. By default, the Tenable Product and Connector
fields populate with the Tenable application/connector you selected in step 3.
6. From the Tenable Application drop-down box, select Tenable for VR.
Tenable.io
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Tenable.sc
7. From the Tenable Job Type drop-down box, select the appropriate job type.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
8. If you are in a domain separated environment, in the Domain box, type the domain into which to
bring connector data.
9. (For Tenable.io) From the Import Export drop-down box, select Import. Import is selected by
default.
10. In the Name text box, type a name for the VR.
Option Description
Initial Run Historical Data Specifies how far back (in days) to import when run for the first
time. For example, if Within 30 days is selected, vulnerabilities
that were observed 15 or 25 days ago are imported into Ser-
viceNow. After the first import, Tenable only requests as many
days as needed to catch up with Tenable.io or Tenable.sc.
Run Fixed Query on Initial Pulls fixed vulnerabilities from the past on the first import. This
Run allows for more complete reporting in ServiceNow for prior fixed
vulnerabilities. Default setting: deselected.
Last Run -Opene- The date and time that the open/reopened import was last run.
d/Reopened
Last run - Fixed The date and time that the fixed import was last run.
Default Chunk Size The number of records pulled in segments during the import.
(This option populates when you select the Tenable Application
in step 6. However, you can modify it by typing in the text box.)
(For Tenable.io, you should not change this unless Tenable
advises you to do so.)
Included Severities (Only for Tenable.io) Select the severity levels to import. If not
specified, all severity levels are imported.
Included Plugin Family (Only for Tenable.io) Select plugin family names to include in the
Names import. If not specified, all families are imported.
SC Query (Only for Tenable.sc) The Tenable.sc query used for the import
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
or export.
Schedule
Run The frequency with which you want the import to run.
12. In the Access Key text box, type the access key provided by your Tenable administrator.
13. In the Secret Key text box, type the secret key provided by your Tenable administrator.
By default, that evening the connector starts syncing ServiceNow vulnerabilities to Tenable.io.
Vulnerabilities that include TEN- were imported from Tenable.io or Tenable.sc. Click a vulnerability
to view the details.
Note: The bottom of the page includes vulnerability items and lists of CVE information linked during the
import.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
l Navigate to Vulnerabilities > Vulnerable Items.
Vulnerabilities that include TEN- were imported from Tenable.io and Tenable.sc. Click a vul-
nerability to view the details.
Note: If a vulnerability item is closed, the text boxes are disabled. In the Notes section, you can view inform-
ation about why the item is closed.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
ITSM Configuration and Schedule Import
Note: The ITSM app only pulls in Critical and High vulnerabilities. If you require more flexibility/customization, you
can upgrade to the free Tenable for Vulnerability Response application.
Note: The ServiceNow configuration only supports Tenable.sc versions 5.7 and later.
The ITSM integration configuration allows ServiceNow to poll and retrieve vulnerability data from Ten-
able.io/Tenable.sc.
Note: You must completely configure and tune Tenable for Assets to correctly match Tenable Assets with Ser-
viceNow CIs. If you do not do this first, you will have issues with ITSM.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
5. In the Scheduled Jobs section, click New.
The Tenable Scheduled Import page appears. By default, the Tenable Product and Connector
fields populate with the Tenable application/connector you selected in step 3.
6. From the Tenable Application drop-down box, select Tenable for ITSM.
Tenable.io
Tenable.sc
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
7. If you are in a domain separated environment, in the Domain box, type the domain into which to
bring connector data.
8. (For Tenable.io) From the Import Export drop-down box, select Import. Import is selected by
default.
Option Description
Initial Run - Historical The amount of time (in days) of how far back you want to pull
Data data.
Run Fixed Query on Initial Pulls fixed vulnerabilities on the first import. Default setting:
Run deselected.
Last Run -Opene- The date and time that the open/reopened import was last run.
d/Reopened
Last run - Fixed The date and time that the fixed import was last run.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
mit the import or export. Default setting: selected.
Default Chunk Size The number of records pulled in segments during the import.
(This option populates when you select the Tenable Application
in step 6. However, you can modify it by typing in the text box.)
(For Tenable.io, you should not change this unless Tenable
advises you to do so.)
SC Query (Only for Tenable.sc) The Tenable.sc query used for the import
or export.
Schedule
Run The frequency with which you want the import to run.
By default, that evening, the connector starts syncing ServiceNow vulnerabilities to Tenable.io/Ten-
able.sc.
1. From the left navigation pane, navigate to Tenable for ITSM > Configuration > Incident Rules.
2. Click New.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
3. In the Name text box, type a name for the matching rule.
5. (Optional) If you want to use scripting to create this rule, click the Advanced check box and type the
desired script.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
asset/ipv4 u_asset_ipv4 String
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
family u_family String
id u_id String
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
plugin/checks_for_default_account u_plugin_check_efault_account String
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
plugin/exploit_framework_metasploit u_plugin_explo_ork_metasploit String
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
plugin/vpr/drivers u_plugin_vpr_drivers String
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
port/port u_port_port String
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
stigSeverity u_stigseverity String
6. In the Asset field text box, select the appropriate asset for the rule.
7. In the Operator text box, select the appropriate operator for the rule.
8. In the Value text box, type the value for the rule.
9. (Optional) To reorder the incident rule, update the value in the Order text box. Incident rules are
tried in ascending order (lowest to highest).
10. If you are in a domain separated environment, in the Domain box, type the domain into which to
bring connector data.
Plugins
To view plugins:
Vulnerabilities
To view vulnerabilities:
Incidents
To view incidents:
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Settings
General Settings
Assets Settings
ITSM Settings
VR Settings
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
General Settings
1. Log in to ServiceNow.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Assets Settings
1. Log in to ServiceNow.
l Logging level
l Additional Settings
o New Record sync frequency (min)
o Record update sync frequency (min)
o Asset Max Job Age (days)
o Asset Max Job Wait Time (days)
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
VR Settings
1. Log in to ServiceNow.
l VR Logging level
Furthermore, in the left-hand menu, you can configure the following settings:
l Advanced
o Transform Maps: Defines how fields are mapped as records and brought back in to update
ServiceNow records.
Caution: We do not support changes made to Transform Maps. If you want to customize your Trans-
form Maps options, we recommend you contact your ServiceNow Administrator.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
l Diagnostics
o Dashboard
o VR Logs
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
ITSM Settings
1. Log in to ServiceNow.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Configure CI to SC Asset Group
You can configure matching and creating rules in ServiceNow for Tenable.io and Tenable.sc. See the
steps below for instructions on how to configure matching and creating rules.
2. In the Name text box, type a name for the asset group.
4. In the Filter section, add filter conditions for the asset group.
5. In the Connector field, enter the connector you want to use for the asset group.
6. (Optional) Correlation ID and Last Sync options can be added for your asset group.
7. Click Submit.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Tenable Applications
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Tenable for Assets
Tenable for Assets syncs and reconciles assets between Tenable.io/Tenable.sc and the ServiceNow Con-
figuration Management Database (CMDB). With Tenable's sophisticated discovery and scanning tech-
nology and ServiceNow's extensive CMDB you can accurately track all of your assets.
Note: Tenable for Assets only supports Tenable.sc versions 5.7 and later.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Tenable for Assets for ServiceNow
Description
Tenable.io offers continuous monitoring and vulnerability management that protects critical applications,
devices, and infrastructures. The Tenable for Assets application is purpose-built for ServiceNow's Vul-
nerability Response offering, allowing you to import your Tenable.io vulnerability data and manage it
within ServiceNow.
Application Menu
Documentation x_tsirm_tio_cmdb.user
Dashboard x_tsirm_tio_cmdb.user
Configuration x_tsirm_tio_cmdb.admin
Connectors x_tsirm_tio_cmdb.admin
Diagnostics x_tsirm_tio_cmdb.admin
Primary Roles
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
x_tsirm_tio_cmdb.admin
Description: An administrative user of the application.
x_tsirm_tio_cmdb.user
Description: A basic user of the application.
Business Rules
Set Name
Description: Sets the name of the asset attribute record if the connector or Asset UUID change.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Description: Shows UI message explaining that out of box CI rules are not editable.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Tenable for ITSM
Tenable for IT Service Management (ITSM) provides the ability to import Tenable vulnerability findings
and transform them into ServiceNow incidents without the need for ServiceNow Vulnerability Response.
This helps you move from manual email and spreadsheet processes to a repeatable workflow in Ser-
viceNow. As your needs expand or you need more flexibility and customization, you can easily transition
to Vulnerability Response.
l The Tenable ITSM app uses the Tenable for Assets app to match vulnerable assets to ServiceNow
CI’s.
l For every high and critical vulnerability finding, it creates a unique vulnerability entry in the Tenable
ITSM app.
l Unique vulnerability entries are determined by coalescing on ServiceNow CI, plugin id, port and pro-
tocol.
l If a vulnerability is fixed in Tenable, both the vulnerability and incident close in ServiceNow.
l If a vulnerability is manually closed, but is found in the future, Tenable reopens the vulnerability and
incident in ServiceNow.
l You can manually create a ServiceNow incident from the vulnerability form.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Tenable.io for ITSM for ServiceNow
Tenable.io offers continuous monitoring and vulnerability management that protects critical applications,
devices, and infrastructures. The Tenable for ITSM application is purpose built for ServiceNow's Vul-
nerability Response offering, allowing you to import your Tenable.io vulnerability data and manage it
within ServiceNow.
Application Menu
Documentation x_tsirm_tio_itsm.user
Plugins x_tsirm_tio_itsm.user
Vulnerabilities x_tsirm_tio_itsm.user
Incidents x_tsirm_tio_itsm.user
Configuration x_tsirm_tio_itsm.user
Connectors x_tsirm_tio_itsm.admin
Diagnostics x_tsirm_tio_itsm.admin
Documentation x_tsirm_tio_itsm.user
Plugins x_tsirm_tio_itsm.user
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Title Required Role
Vulnerabilities x_tsirm_tio_itsm.user
Incidents x_tsirm_tio_itsm.user
Primary Roles
x_tsirm_tio_itsm.admin
Description: An administrative user of the application.
x_tsirm_tio_itsm.user
Description: A basic user of the application.
Business Rules
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Tenable for Vulnerability Response (VR)
The integration of Tenable for Vulnerability Response with ServiceNow’s Vulnerability Response module
takes your Tenable platform findings and syncs them into ServiceNow Vulnerability Response tables and
data structures. This integration allows you to reduce your cyber risk by allowing you to rapidly prioritize
and automate the remediation of critical vulnerabilities across your most important assets.
Note: The Tenable for Vulnerability Response application only supports Tenable.sc versions 5.7 and later.
l Leverage the Tenable for Assets application to properly link vulnerabilities to ServiceNow CIs
l Reopen previously closed vulnerable items if they are found again at a later date.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Tenable for VR
Tenable for VR allows you to fully integrate your Tenable data with ServiceNow creating closed loop
remediation. This application has grouping functionality and risk calculators. In addition, it creates tickets
for IT staff according to specified machines, allows reallocation, closing, and reopening.
Application Menu
Tenable for VR
Primary Role Required: x_tsirm_tio_vr.user
Documentation x_tsirm_tio_vr.user
Configuration x_tsirm_tio_vr.user
Connectors x_tsirm_tio_vr.admin
Diagnostics x_tsirm_tio_vr.admin
Documentation x_tsirm_tio_vr.user
Configuration x_tsirm_tio_vr.user
Connectors x_tsirm_tio_vr.admin
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Primary Roles
x_tsirm_tio_vr.admin
Description: An administrative user of the application.
x_tsirm_tio_vr.user
Description: A basic user of the application.
Business Rules
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Available Data
Tenable.io ServiceNow
bios_uuid bios_uuid
fqdns fqdn
ipv4s/ipv6s/network_interfaces ipv4/ipv6
last_authenticated_scan_date last_authenticated_scan_date
mac_addresses mac_address
mcafee_epo_guid mcafee_epo_guid
netbios_names netbios_name
agent_uuid agent_uuid
id asset_uuid
has_agent has_agent
has_plugin_results has_plugin_results
created_at created_at
terminated_at terminated_at
terminated_by terminated_by
updated_at updated_at
deleted_at deleted_at
deleted_by deleted_by
first_seen first_seen
last_seen last_seen
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
last_scan_time last_scan_time
last_licensed_scan_date last_licensed_scan_date
azure_vm_id azure_vm_id
azure_resource_id azure_resource_id
aws_ec2_instance_ami_id aws_ec2_instance_ami_id
aws_ec2_instance_id aws_ec2_instance_id
aws_owner_id aws_owner_id
aws_availability_zone aws_availability_zone
aws_region aws_region
aws_vpc_id aws_vpc_id
aws_ec2_instance_group_name aws_ec2_instance_group_name
aws_ec2_instance_state_name aws_ec2_instance_state_name
aws_ec2_instance_type aws_ec2_instance_type
aws_subnet_id aws_subnet_id
aws_ec2_product_code aws_ec2_product_code
aws_ec2_name aws_ec2_name
mcafee_epo_agent_guid mcafee_epo_agent_guid
servicenow_sysid servicenow_sysid
agent_names agent_names
mac_addresses mac_addresses
netbios_names netbios_names
operating_systems operating_systems
system_types system_types
hostnames hostnames
ssh_fingerprints ssh_fingerprints
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
fqdns fqdns
manufacturer_tpm_ids manufacturer_tpm_ids
symantec_ep_hardware_keys symantec_ep_hardware_keys
sources sources
tags tags
ipv4s ipv4s
ipv6s ipv6s
Tenable.sc ServiceNow
biosGUID bios_uuid
dnsName fqdn
ip ipv4/ipv6
lastAuthRun last_authenticated_scan_date
lastUnauthRun last_unauthenticated_scan_date
macAddress mac_address
mcafeeGUID mcafee_epo_guid
netbiosName netbios_name
osCPE os_cpe
uniqueness uniqueness
uuid agent_uuid
repository.dataFormat repository_data_format
repository.description repository_description
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
repository.id repository_id
repository.name repository_name
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Support
The Tenable for ServiceNow applications are highly customizable as every ServiceNow environment
tends to be very different. However, Tenable cannot provide ServiceNow specific customization support.
This guide provides information for basic customization scenarios. Tenable cannot troubleshoot or sup-
port items such as custom CI rules, custom transform maps, and custom field mapping.
Many customers utilize a deployment partner to help set up their instance appropriately for their customer
needs. If you are interested, contact your Tenable representative to get information on other companies
that have extensive experience with the Tenable for ServiceNow applications.
l Contact Details: 1-855- 267-7044 (Toll Free) 1-443- 545-2104 (Direct), Tenable Community Site
l Follow the Contact Tenable Support link in the application to go directly to the Tenable Community
Site
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective
Troubleshooting
The status of these jobs updates throughout the progress of the import:
c. When the export job finishes and ServiceNow begins receiving chunk data from Tenable.io, the
status changes to Receiving Chunk Data.
Each chunk is attached to a .json file in ServiceNow. Chunks are listed under their associated job.
d. Once all the chunk data is retrieved, the status changes to Importing. Each chunk imports into Ser-
viceNow one at a time.
e. Once importing is complete, the job is marked as Complete or Complete with Errors.
Note: If a job is marked Complete with Errors, the job is attempted again on the next schedule.
2. From the Logging Level drop-down, select the logging level you wish to employ.
Copyright © 2021 Tenable, Inc. All rights reserved. Tenable, Tenable.io, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trade-
marks of Tenable,Inc. Tenable.sc, Tenable.ot, Lumin, Indegy, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective