Tenable Vulnerability Management-User Guide
Tenable Vulnerability Management-User Guide
Copyright © 2024 Tenable, Inc. All rights reserved. Tenable, Tenable Nessus, Tenable Lumin, Assure, and the Tenable logo are registered trademarks of Tenable, Inc. or its affiliates. All other
products or services are trademarks of their respective owners.
Table of Contents
System Requirements 41
CVSS 43
CVSS-Based Severity 44
Vulnerability Mitigation 48
Vulnerability States 49
Navigate Breadcrumbs 57
Navigate Planes 58
Filter a Table 62
-2-
Error Messages 68
Dashboards 81
Tenable-Provided Dashboards 94
Create a Dashboard 98
-3-
Duplicate a Dashboard 114
-4-
Improve Your Tenable Lumin Metrics 166
Scans 232
-5-
View Scans 237
-6-
Scan Templates 292
Description 356
Configuration 357
-7-
Preconfigured Advanced Settings 417
DB2 437
MySQL 437
Oracle 438
PostgreSQL 439
Cassandra 441
MongoDB 442
Password 443
Import 444
BeyondTrust 445
CyberArk 446
-8-
Delinea 451
Lieberman 454
QiAnXin 457
Senhasegura 459
Host 460
Miscellaneous 522
Mobile 529
HTTP Server Authentication Settings in Tenable Web App Scanning Scans 583
-9-
Client Certificate Authentication 588
Introduction 598
- 10 -
Search Known Vulnerabilities 606
Sources 612
CVEs 626
My Findings 627
Plugins 629
Explore 634
Findings 636
Vulnerabilities 637
- 11 -
Web Application Findings 644
Assets 697
- 12 -
Supported Plugins 748
Vulnerabilities 774
- 13 -
View Vulnerability Details 781
Assets 813
- 14 -
View Deleted Assets 846
Act 861
Reports 861
Remediation 885
- 15 -
Edit a Remediation Project 898
Solutions 926
- 16 -
Push a Container Image to Tenable Container Security 936
Prepare Kubernetes Objects to Configure and Run the Tenable Container Security
Scanner 954
Configure and Run the Tenable Container Security Scanner in Kubernetes 956
- 17 -
Configure Tenable Container Security Connectors to Import and Scan Images 983
Configure an AWS ECR Connector to Import Images in Tenable Container Security 985
Settings 1008
My Account 1016
- 18 -
SAML 1033
Users 1054
- 19 -
Export Users 1072
Permissions 1088
Roles 1104
- 20 -
Export Activity Logs 1130
Language 1157
Exports 1157
- 21 -
Renew an Export Expiration Date 1171
Tags 1192
- 22 -
Edit a Tag via Asset Filters 1222
Sensors 1241
Agents 1241
- 23 -
Agent Filters 1279
Networks 1300
- 24 -
Move Assets to a Network via Settings 1311
OT Connectors 1346
- 25 -
Tenable FedRAMP Moderate Cloud Sensors 1353
Credentials 1374
Exclusions 1385
- 26 -
Connectors 1396
Limitations 1401
- 27 -
Manually Delete Connector Artifacts from Azure Frictionless Assessment 1435
- 28 -
Welcome to Tenable Vulnerability Management
Tenable Vulnerability Management® (formerly known as Tenable.io) allows security and audit teams
to share multiple Tenable Nessus, Tenable Nessus Agent, and Tenable Nessus Network Monitor
scanners, scan schedules, scan policies, and scan results among an unlimited set of users or
groups.
Note: Tenable Vulnerability Management can be purchased alone or as part of the Tenable One package.
For more information, see Tenable One.
Tip: The Tenable Vulnerability Management User Guide is available in English and Japanese. The Tenable
Vulnerability Management user interface is available in English, Japanese, and French. To switch the user
interface language, see Language.
For additional information on Tenable Vulnerability Management, review the following customer
education materials:
The platform combines the broadest vulnerability coverage spanning IT assets, cloud resources,
containers, web apps, and identity systems, builds on the speed and breadth of vulnerability
coverage from Tenable Research, and adds comprehensive analytics to prioritize actions and
communicate cyber risk. Tenable One allows organizations to:
- 29 -
Tip: For additional information on getting started with Tenable One products, check out the Tenable One
Deployment Guide.
By making different resources available for sharing among users and groups, Tenable Vulnerability
Management provides endless possibilities for creating customized workflows for vulnerability
management programs, regardless of any of the numerous regulatory or compliance drivers that
demand keeping your business secure.
Tenable Vulnerability Management can schedule scans, push policies, view scan findings, and
control multiple Tenable Nessus scanners from the cloud. This enables the deployment of Tenable
Nessus scanners throughout networks to both public and private clouds as well as multiple physical
locations.
Tenable Lumin
Get Started with Tenable Lumin
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Tenable Lumin features augment Tenable Vulnerability Management data. Use Tenable Lumin to
quickly and accurately assess your exposure risk and compare your health and remediation
performance to other Tenable customers in your Salesforce industry and the larger population.
Tenable Lumin correlates raw vulnerability data with asset business criticality and threat context
data to support faster, more targeted analysis workflows than traditional vulnerability management
tools.
- 30 -
web applications that rely on Javascript and are built on HTML5. This leaves you with an incomplete
understanding of your web application security posture.
Tenable Web App Scanning provides comprehensive vulnerability scanning for modern web
applications. Tenable Web App Scanning's accurate vulnerability coverage minimizes false positives
and false negatives, ensuring that security teams understand the true security risks in their web
applications. The product offers safe external scanning that ensures production web applications
are not disrupted or delayed, including those built using HTML5 and AJAX frameworks.
Tenble Container Security stores and scans container images as the images are built, before
production. It provides vulnerability and malware detection, along with continuous monitoring of
container images. By integrating with the continuous integration and continuous deployment
(CI/CD) systems that build container images, Tenable Container Security ensures every container
reaching production is secure and compliant with enterprise policy.
The Tenable Vulnerability Management API can be leveraged to develop your own applications using
various features of the Tenable Vulnerability Management platform, including scanning, creating
policies, and user management.
- 31 -
3. Configure Scans
6. Expand
Tip: For additional information on Tenable Vulnerability Management, review the following customer
education materials:
1. Review principles of the TCP/IP internet protocol suite. Tenable Vulnerability Management
documentation assumes you know basic networking concepts and principles.
2. Get your Tenable Vulnerability Management access information and starter account
credentials from your Tenable representative.
3. If necessary, access Tenable Support and training resources for Tenable Vulnerability
Management, including the Professional Services Scan Strategy guide.
4. Design a deployment plan by identifying your organization's objectives and analyzing your
network topology. Consider Tenable-recommended best practices for your environment.
For more information about environment requirements, see the guidelines provided for your
scanner in the General Requirements Guide. For more information about supported browsers
for Tenable Vulnerability Management, see System Requirements.
5. Design an internal scanning and external scanning plan. Identify the scans you intend to run
and ensure that you have sufficient network coverage.
6. Design an analysis workflow. Identify key stakeholders in your management and operational
groups, considering the data you intend to share with each stakeholder.
- 32 -
To install your scanners and link them to Tenable Vulnerability Management:
l If your deployment plan includes Tenable Nessus scanners, install Tenable Nessus as
described in Install Tenable Nessus in the Tenable Nessus User Guide.
l If your deployment plan includes Tenable Nessus Agents, install agents as described in
Install Tenable Nessus Agents in the Tenable Nessus Agent Deployment and User Guide.
l If your deployment plan includes Tenable Nessus Network Monitor, install Tenable
Nessus Network Monitor as described in Install NNM in the Tenable Nessus Network
Monitor User Guide.
o Then, configure Tenable Nessus Network Monitor to communicate with Tenable
Vulnerability Management, as described in Configure NNM in the Tenable Nessus
Network Monitor User Guide.
l If your deployment plan includes Tenable Web App Scanning, install web applications as
described in Deploy or Install Tenable Core + Tenable Web App Scanning in the Tenable
Core User Guide.
Then, link your first scanners to Tenable Vulnerability Management, as described in Link a
Sensor.
Configure Scans
Configure and run basic scans to begin evaluating the effectiveness of your deployment
plan and analysis workflow:
Note: For information on how to configure scans based on your environment and business needs, see the
Tenable Vulnerability Management Scan Tuning Guide.
- 33 -
1. Configure your first active scan using the Basic Network Scan template:
b. Create a scan using the Basic Network Scan template, as described in Create a Scan.
2. Configure your first agent scan using the Basic Agent Scan template:
b. Create an agent scan using the Basic Agent Scan template, as described in Create a
Scan.
3. Launch your first Tenable Nessus scan and agent scan, as described in Launch a Scan.
4. Confirm your Tenable Nessus scan and agent scan completed, accessing all targeted areas of
your network. Review your discovered assets to assess your knowledge of your network.
1. Create user accounts and create user groups within your Tenable Vulnerability Management
container.
2. Create access groups to manage view and scan permissions for assets and targets.
a. Launch your credentialed Tenable Nessus scan and credentialed agent scan, as
described in Launch a Scan.
b. Confirm your credentialed scan completed, accessing all targeted areas of your
network.
- 34 -
6. If you want to assess your exposure, obtain a Tenable Lumin license.
7. If you want to perform web application scanning, obtain a Tenable Web App Scanning license.
8. If you want to evaluate risk on your containers, obtain a Tenable Container Security license.
9. Configure user Access Control to control what objects users can and cannot view and interact
with within Tenable Vulnerability Management.
2. View and analyze your vulnerability and asset findings via the Findings and Assets pages.
3. Create a dashboard to gain immediate insight and quickly analyze vulnerabilities in your
network. Use interactive widgets and customizable tables to explore your data.
4. Filter your dashboards, assets, and findings to drill into data and investigate your progress.
6. Create a report to share scan and vulnerability information with others in your organization.
Expand
Tenable recommends the following as best practices to keep up to date with your
deployment plan and analysis workflow:
l Conduct weekly meetings to review your organization's responses to identified vulnerabilities.
Conduct weekly management meetings to oversee your teams executing the analysis
workflow.
l Review your scan results and scan coverage. You may need to modify your scan
configurations to suit your organization's objectives and reach all areas of your network.
- 35 -
l Consider API integrations, as described in the Tenable Vulnerability Management API
Documentation.
When your environment expands, so does your asset count, so you purchase more licenses to
account for the change. Tenable licenses use progressive pricing, so the more you purchase, the
lower the per-unit price. For prices, contact your Tenable representative.
Tip: To view your current license count and available assets, in the Tenable top navigation bar, click
and then click License Information. To learn more, see License Information Page.
Note: Tenable offers simplified pricing to managed security service providers (MSSPs). To learn more,
contact your Tenable representative.
Tenable Vulnerability Management uses a complex algorithm to identify new assets without creating
duplicates. The algorithm looks at the asset’s BIOS UUID, MAC address, NetBIOS name, fully
qualified domain name (FQDN), and more. Authenticated scanners or agents also assign a Tenable
- 36 -
UUID to each asset to mark it as unique. For more information, see the Tenable Vulnerability
Management FAQ.
The following table describes when assets count towards your license.
- 37 -
l Access to the Tenable Vulnerability Management API.
Reclaiming Licenses
When you purchase licenses, your total license count is static for the length of your contract unless
you purchase more licenses. However, Tenable Vulnerability Management reclaims licenses under
some conditions—and then reassigns them to new assets so that you do not run out of licenses.
The following table explains how Tenable Vulnerability Management reclaims licenses.
Deleted assets Tenable Vulnerability Management removes deleted assets from the Assets
workbench and reclaims their licenses within 24 hours.
Aged out In Settings > Sensors > Networks, if you enable Asset Age Out, Tenable
assets Vulnerability Management reclaims assets after they have not been scanned
for a period you specify.
Assets from Tenable Vulnerability Management reclaims assets from connectors the day
connectors after they are terminated. You can observe this event in each connector.
All other Tenable Vulnerability Management reclaims all other assets—such as those
assets imported from other products or assets with no age-out setting—after they
have not been scanned for 90 days.
Scenario Result
You scan more assets than are A message appears in Tenable Vulnerability
licensed for three consecutive days. Management.
You scan more assets than are A message and warning about reduced functionality
licensed for 15+ days. appears in Tenable Vulnerability Management.
- 38 -
You scan more assets than are A message appears in Tenable Vulnerability
licensed for 45+ days. Management; scan and export features are disabled.
Tip: Improper scan hygiene or product misconfigurations can cause scan overages, which result in inflated
asset counts. To learn more, see Scan Best Practices.
Expired Licenses
The Tenable Vulnerability Management licenses you purchase are valid for the length of your
contract. 30 days before your license expires, a warning appears in the user interface. During this
renewal period, work with your Tenable representative to add or remove products or change your
license count.
After your license expires, you can no longer sign in to the Tenable platform.
Note: Plugin IDs are static, but Tenable products may sometimes update plugin names. For the latest
information on plugins, see Tenable Plugins.
- 39 -
34277 Nessus UDP Scanner
11936 OS Identification
0 Open Ports
- 40 -
19 VLAN ID Detection
System Requirements
Display Settings
Minimum screen resolution: 1440 x 1024
Supported Browsers
Tenable Vulnerability Management supports the latest versions of the following browsers.
Note: Before reporting issues with Tenable Vulnerability Management, ensure your browser is up to date.
l Google Chrome
l Apple Safari
l Mozilla Firefox
l Microsoft Edge
l 162.159.129.83/32
l 162.159.130.83/32
l 162.159.140.26/32
- 41 -
l 172.66.0.26/32
l 2606:4700:7::1a
l 2a06:98c1:58::1a
l 2606:4700:7::a29f:8153
l 2606:4700:7::a29f:8253
l *.cloud.tenable.com with the wildcard character (*) to allow cloud.tenable.com and all
subdomains, such as sensor.cloud.tenable.com
Tip: For information about the port requirements for Tenable Security Center, Tenable Nessus
scanners, and Tenable Nessus Agents, see the following topics:
l Tenable Security Center Port Requirements
l Tenable Nessus Port Requirements
l Tenable Nessus Agent Port Requirements
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Note: If you bookmark a Tenable Vulnerability Management page within your browser, you must still log in
before accessing the bookmarked page.
In some cases, you may also need to navigate through the Workspace page and navigate to the Tenable
Vulnerability Management application before accessing the bookmarked page.
Note: If you are an administrator logging in to your Tenable Vulnerability Management instance for
the first time, Tenable provides your first-time credentials during setup. After you log in for the first
time, you can set your new password. If you are logging in to Tenable Vulnerability Management after
initial setup, your username is the email address you used to register for your Tenable Vulnerability
Management account.
- 42 -
l Review the System Requirements in the General Requirements User Guide and confirm that
your computer and browser meet the requirements.
Note: If your account is configured to use SAML, you can log in to Tenable Vulnerability Management
directly through your SAML provider. For more information, see SAML.
3. In the password box, type the Tenable Vulnerability Management password you created during
registration.
4. (Optional) To retain your username for later sessions, select the Remember Me check box.
Note:Tenable Vulnerability Management logs you out after a period of inactivity (typically, 30
minutes).
Note: When you view these metrics on an analysis page organized by plugin (for example, the
Vulnerabilities by Plugin page), the metrics represent the highest value assigned or calculated
for a vulnerability associated with the plugin.
For Tenable Lumin-specific information about VPR and the other Tenable Lumin metrics, see
Tenable Lumin Metrics.
CVSS
- 43 -
Tenable uses and displays third-party Common Vulnerability Scoring System (CVSS) values retrieved
from the National Vulnerability Database (NVD) to describe risk associated with vulnerabilities. CVSS
scores power a vulnerability's Severity and Risk Factor values.
Note: If a vulnerability's related plugin has CVSS vectors, the Risk Factor is calculated based on the
CVSSv2 vector and equates to the CVSSv2 score Severity. If a plugin does not have CVSS vectors, Tenable
independently calculates the Risk Factor.
Tenable Vulnerability Management imports a CVSS score every time a scan sees a vulnerability.
CVSS-Based Severity
Tenable assigns all vulnerabilities a severity (Info, Low, Medium, High, or Critical) based on the
vulnerability's static CVSS score (the CVSS version depends on your configuration). For more
information, see Configure Your Severity Metric.
Critical The plugin's highest The plugin's highest The plugin's highest
vulnerability CVSSv2 vulnerability CVSSv3 vulnerability CVSSv4
score is 10.0. score is between 9.0 score is between 9.0
and 10.0. and 10.0.
High The plugin's highest The plugin's highest The plugin's highest
vulnerability CVSSv2 vulnerability CVSSv3 vulnerability CVSSv4
score is between 7.0 score is between 7.0 score is between 7.0
and 9.9. and 8.9. and 8.9.
Medium The plugin's highest The plugin's highest The plugin's highest
vulnerability CVSSv2 vulnerability CVSSv3 vulnerability CVSSv4
score is between 4.0 score is between 4.0 score is between 4.0
and 6.9. and 6.9. and 6.9.
Low The plugin's highest The plugin's highest The plugin's highest
vulnerability CVSSv2 vulnerability CVSSv3 vulnerability CVSSv4
score is between 0.1 score is between 0.1 score is between 0.1
- 44 -
and 3.9. and 3.9. and 3.9.
Info The plugin's highest The plugin's highest The plugin's highest
vulnerability CVSSv2 vulnerability CVSSv3 vulnerability CVSSv3
score is 0. score is 0. score is 0.
- or - - or - - or -
The plugin does not The plugin does not The plugin does not
search for search for search for
vulnerabilities. vulnerabilities. vulnerabilities.
For each plugin, Tenable interprets CVSS scores for the vulnerabilities associated with the plugin
and assigns an overall risk factor (Low, Medium, High, or Critical) to the plugin. The Vulnerability
Details page shows the highest risk factor value for all the plugins associated with a vulnerability.
Note: Detection (non-vulnerability) plugins and some automated vulnerability plugins do not receive CVSS
scores. In these cases, Tenable determines the risk factor based on vendor advisories.
Tip: Info plugins receive a risk factor of None. Other plugins without associated CVSS scores receive a
custom risk factor based on information provided in related security advisories.
Tenable calculates a dynamic VPR for most vulnerabilities. The VPR is a dynamic companion to the
data provided by the vulnerability's CVSS score, since Tenable updates the VPR to reflect the
current threat landscape. VPR values range from 0.1-10.0, with a higher value representing a higher
likelihood of exploit.
- 45 -
Medium 4.0 to 6.9
Note: Vulnerabilities without CVEs in the National Vulnerability Database (NVD) (for example, many
vulnerabilities with the Info severity) do not receive a VPR. Tenable recommends remediating these
vulnerabilities according to their CVSS-based severity.
Tenable Vulnerability Management provides a VPR value the first time you scan a vulnerability on
your network. Then, Tenable Vulnerability Management automatically provides new and updated
VPR values daily.
Tenable recommends resolving vulnerabilities with the highest VPRs first. You can view VPR scores
and summary data in:
You can view the following key drivers to explain a vulnerability's VPR.
Note:Tenable does not customize these values for your organization; VPR key drivers reflect a
vulnerability's global threat landscape.
Age of Vuln The number of days since the National Vulnerability Database (NVD) published
the vulnerability.
CVSSv3 The NVD-provided CVSSv3 impact score for the vulnerability. If the NVD did
Impact not provide a score, Tenable Vulnerability Management displays a Tenable-
Score predicted score.
Exploit Code The relative maturity of a possible exploit for the vulnerability based on the
Maturity existence, sophistication, and prevalence of exploit intelligence from internal
- 46 -
and external sources (e.g., Reversinglabs, Exploit-db, Metasploit, etc.). The
possible values (High, Functional, PoC, or Unproven) parallel the CVSS Exploit
Code Maturity categories.
Product The relative number of unique products affected by the vulnerability: Low,
Coverage Medium, High, or Very High.
Threat A list of all sources (e.g., social media channels, the dark web, etc.) where
Sources threat events related to this vulnerability occurred. If the system did not
observe a related threat event in the past 28 days, the system displays No
recorded events.
Threat The relative intensity based on the number and frequency of recently observed
Intensity threat events related to this vulnerability: Very Low, Low, Medium, High, or
Very High.
Threat The number of days (0-180) since a threat event occurred for the vulnerability.
Recency
- 47 -
The Tenable Vulnerability Management interface uses different icons for each severity category and
accepted or recasted status.
Vulnerability Mitigation
Tenable Vulnerability Management vulnerabilities exist in one of two categories: Active or Fixed.
When Tenable Vulnerability Management discovers a vulnerability on an asset, the vulnerability
remains in the Active category until it is mitigated or fixed. Then, the vulnerability moves to the
Fixed category.
Active Vulnerabilities
- 48 -
Active vulnerabilities are any vulnerabilities in the New, Active, or Resurfaced states. For more
information, see Vulnerability States.
Fixed Vulnerabilities
The Fixed category contains vulnerabilities that Tenable Vulnerability Management determines are
not vulnerable, based on the scan definition, the results of the scan, and authentication
information. To be considered for mitigation, a vulnerability must be active and successfully
authenticated.
l A vulnerability with that combination of IP address, port, protocol, and plugin ID is not listed in
the scan results.
Mitigation Exceptions
Note the following exceptions for vulnerability mitigation:
l Vulnerabilities identified during a thorough scan by a plugin with the thorough_tests attribute
can only be mitigated by another thorough scan.
l The list of scanned ports can be expanded to “all” ports when one of the following plugins
triggered the host:14272 (SSH netstat), 34220 (WMI netstat), 14274 (SNMP).
l Agent scans cannot mitigate vulnerabilities discovered by a combined type plugin reported on
a remote port (not 0/445).
Vulnerability States
- 49 -
Tenable assigns a state to vulnerabilities detected on your network. You can track and filter by
vulnerability state to see the detection, resolution, and reappearance of vulnerabilities over time.
To filter for vulnerabilities by their state, use the Findings workbench.
Vulnerability
Description
State
Note: To view Fixed vulnerabilities by date range, use the Last Fixed filter.
Note: The API uses different terms for vulnerability states than the user interface. In the API, the new and
active states are both labeled as open. The resurfaced state is labeled as reopened. The fixed state is the
same.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
- 50 -
1. In the upper-right corner, click the blue user circle.
The quick actions menu displays a list of the most commonly performed actions.
Resource Center
The Resource Center displays a list of informational resources including product announcements,
Tenable blog posts, and user guide documentation.
- 51 -
To access the Resource Center:
Notifications
In Tenable Vulnerability Management, the Notifications panel displays a list of system notifications.
The button shows the current number of unseen notifications. When you open the Notifications
panel, Tenable Vulnerability Management marks those notifications as seen. Once you have seen a
notification, you can clear it to remove it from the Notifications panel.
- 52 -
Note:Tenable Vulnerability Management groups similar notifications together.
To view notifications:
o To expand a group of notifications, at the bottom of the grouped notification, click More
Notifications.
o To collapse an expanded group of notifications, at the top of the expanded notifications,
click Show Less.
o To clear an expanded group of notifications, at the top of the expanded notifications,
click Clear Group.
o To clear all notifications, at the bottom of the panel, click Clear All.
Settings Icon
Click the button to navigate directly to the Settings page, where you can configure your system
settings.
Workspace
When you log in to Tenable, the Workspace page appears by default. On the Workspace page, you
can switch between your Tenable applications or set a default application to skip the Workspace
page in the future. You can also switch between your applications from the Workspace menu,
which appears in the top navigation bar.
Important: Tenable disables application tiles for expired applications. Tenable removes expired application
tiles from the Workspace page and menu 30 days after expiration.
- 53 -
To open the Workspace menu:
1. From any Tenable application, in the upper-right corner, click the button.
1. From any Tenable application, in the upper-right corner, click the button.
- 54 -
The Workspace page appears.
By default, users with the Administrator, Scan Manager, Scan Operator, Standard, and Basic roles can set
a default application. If you have another role, contact your administrator and request the Manage
permission under My Account. For more information, see Custom Roles.
1. Log in to Tenable.
A menu appears.
- 55 -
3. In the menu, click Make Default Login Page.
1. Log in to Tenable.
A menu appears.
The user account menu provides several quick actions for your user account.
- 56 -
2. Do one of the following:
l Click My Profile to configure your own user account. You navigate directly to the My
Account settings page. See My Account for more information.
l Click What's new to navigate directly to the Tenable Vulnerability Management Release
Notes.
For additional information about navigating the Tenable Vulnerability Management interface, see
the following topics:
Navigate Breadcrumbs
Navigate Planes
Navigate Breadcrumbs
In the Tenable Vulnerability Management interface, certain pages display breadcrumbs in the top
navigation bar. From left to right, the breadcrumbs show the path of pages you visited to reach your
current page:
- 57 -
To navigate breadcrumbs:
l In the top navigation bar, click a link in the breadcrumb trail to return to a previous page.
Navigate Planes
Tenable Vulnerability Management combines fixed pages with overlapping planes.
l
Use the left navigation plane as follows:
a. In the upper-left corner, click the button.
With the exception of the left navigation plane, planes open from the right side of the screen.
2. Manipulate a plane using the following buttons at the left edge of the plane:
3. Return to a previous plane or page (and close a new plane or planes) by clicking the previous
plane.
- 58 -
Tenable Vulnerability Management Tables
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Explore Tables
Explore tables are any tables within the Explore section in the Tenable Vulnerability Management
user interface. They include many of the features of Tenable Vulnerability Management Workbench
tables, but include additional customization and filtering capabilities. For more information, see
Filter Findings or Assets.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Note: Customizable tables also include the ability to access the actions buttons by right-clicking a table
row. To access your browser menu, press the Ctrl key and right-click.
Tenable Vulnerability Management Workbench tables are any tables in the Tenable Vulnerability
Management interface outside of the Explore section.
- 59 -
l
Navigate the table:
o To adjust the sort order, click a column title.
Tenable Vulnerability Management sorts all pages of the table by the data in the
column you selected.
o In Tenable Vulnerability Management, to increase or decrease the number of rows
displayed per page, click Results per page and select a number.
This button appears instead of individual action buttons if 5 or more actions are
possible for the row.
o To navigate to another page of the table, click the arrows:
Button Action
Note: Due to limitations, the total number of findings is not always known past the 1000
limit. In this case, the table may display a modified interface, changes in pagination
labeling, and a disabled last page navigation button.
l
Search the table:
In the new interface, a search box appears above individual tables in various pages and
planes. In some cases, the search box appears next to the Filters box.
Your search criteria depends on the type of data in the table you want to search.
- 60 -
b. Click the button.
l To change the column order, drag and drop a column header to another position in the
table.
l
Remove or add columns:
a. Roll over any column.
c. Select or clear the check box for any column you want to show or hide in the table.
l
Adjust column width:
a. Roll over the header between two columns until the resize cursor appears.
Tip: To automatically resize a column to the width of its content, double-click the right
side of the column header.
Tenable Vulnerability Management sorts all pages of the table by the data in the column
you selected.
l To sort data in the table by multiple columns, press Shift and click one or more column
headers.
- 61 -
Tenable Vulnerability Management sorts all pages of the table in the order in which you
selected the columns.
Filter a Table
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
In Tenable Vulnerability Management, a Filters box appears above individual tables in various pages
and planes.
To filter a table:
a. In the drop-down list, search for the filter you want to apply.
b. Select the check box next to the filter or filters you want to apply.
For example, you might select Severity if filtering findings or Asset ID if filtering assets.
Note: When using the contains or does not contain operators, use the following best
practices:
l For the most accurate and complete search results, use full words in your search
value.
l Do not use periods in your search value.
l Remember that when filtering assets, the search values are case sensitive.
- 62 -
l Where applicable, Tenable recommends using the contains or does not contain
instead of the is equal to or is not equal to operators.
An example of the expected input is present in the box until you start
typing. If what you type is invalid for the attribute, a red outline appears
around the text box.
Single valid If a default value is associated with the attribute, Tenable Vulnerability
value Management selects the default value automatically.
To deselect values:
- 63 -
The value disappears from the box.
7. Click Apply.
Tenable Vulnerability Management clears all filters from the table, including saved
searches.
Note: Clearing filters does not change the date range selected in the upper-right corner of the
page. For more information, see Tenable Vulnerability Management Tables.
Tenable recommends the following to get started with Tenable Lumin data and functionality.
1. To add Tenable Lumin to your Tenable Vulnerability Management license, contact your
Tenable representative.
- 64 -
2. In your browser, disable features that may prevent you from enabling Tenable Lumin:
l Ad blocker extensions
l Do Not Track (Mozilla Firefox, Google Chrome, Apple Safari, or Microsoft Internet
Explorer)
Tip: You can re-enable these features after you fully enable Tenable Lumin.
Prepare
Generate data and learn about Tenable Lumin terminology.
Note: You must run scans to start Note: Tenable Lumin does not support
seeing data in Tenable Lumin views; third-party integration data.
Tenable Lumin shows scan result data
generated after you licensed Tenable 2. Create assets in Tenable Security
Lumin. For more information, see
Center to add business context to your
Tenable Lumin Data Timing.
assets.
Note: Tenable Lumin does not support 3. Configure Tenable Security Center to
third-party integration data. Tenable Lumin synchronization.
- 65 -
your assets. information, see Tenable Lumin Data
Timing.
3. Review the metrics terminology to
understand Vulnerability Priority Rating 4. View your assets as business context
(VPR) and Asset Criticality Rating (ACR) tags in Tenable Vulnerability
values and how they impact your Asset Management. For more information, see
Exposure Score (AES), Assessment Manage Asset Tags.
Maturity grade, and Cyber Exposure
5. Review the metrics terminology to
Score (CES).
understand Vulnerability Priority Rating
4. Allow sufficient time for your metrics to (VPR) and Asset Criticality Rating (ACR)
calculate. For more information, see values and how they impact your Asset
Tenable Lumin Data Timing. Exposure Score (AES), Assessment
Maturity grade, and Cyber Exposure
Score (CES).
1. Use the Tenable Lumin dashboard to understand your CES and access details pages.
l Cyber Exposure Score widget — How does your overall risk compare to other Tenable
customers in your Salesforce industry and the larger population?
l Cyber Exposure Score Trend widget — How has the overall risk for your entire
organization changed over time?
l Assessment Maturity widget — How frequently and thoroughly are you scanning your
assets?
- 66 -
l Remediation Maturity widget — How quickly and thoroughly are you remediating
vulnerabilities on your assets?
l Reduce Cyber Exposure Score widget — What would the impact be if you addressed all
of your top 20 recommended actions?
l Asset Criticality Rating Breakdown widget — How critical are your assets?
l Asset Scan Distribution widget — What types of scans have run on your assets?
l Mitigations widget — What endpoint protection agents are running on your assets?
l Cyber Exposure Score by Business Context/Tag widget — How do assets with different
tags (unique business context) compare?
2. To browse the most critical vulnerabilities on your network, sort your vulnerabilities by VPR.
3. To browse the most critical assets on your network, sort your assets by ACR.
1. Use the Assets page to review the Tenable-provided ACR values for your assets.
l Do any of your assets have ACR values that seem too high for the relative criticality of
that asset?
l Do any of your assets have ACR values that seem too low for the relative criticality of
that asset?
Important: Private findings are excluded from all scores in Tenable Lumin. For more information see
Findings.
- 67 -
1. View lists of Tenable-recommended action items:
2. Follow the recommendations and take steps to address the vulnerabilities on your network.
Mature
Mature your vulnerability management strategy.
l Continue monitoring and addressing vulnerabilities to lower your CES and AES.
l Continue exporting and sharing recommended actions (solutions) data with others in your
organization to refine your vulnerability management strategy.
Error Messages
For Tenable Vulnerability Management API status codes, see the Tenable Developer Portal.
Scanning
The following table describes the scanning error messages that may appear in Tenable Vulnerability
Management.
Some scanning errors occur when you exceed the following Tenable Vulnerability Management
scanning limitations:
Scan Limitations
Limitation Description
- 68 -
hostnames per information, see Discovery Scans vs. Assessment Scans). The host target
assessment scan limit is 10 times your organization's licensed asset count.
Host scan results Tenable Vulnerability Management limits the number of live hosts for
per scan which a single scan can generate scan results for. The live host scan
results limit is 1.1 times your organization's licensed asset count.
- 69 -
Targeted IP You cannot specify more than 300,000 comma-separated IP addresses or
addresses or ranges when configuring a scan’s targets.
ranges per scan
Active scans You cannot have more than 25 scans running in your container
simultaneously.
Scan chunks Tenable Vulnerability Management limits scan chunks to 10,000 hosts or
150,000 findings. If a scan chunk exceeds either value, Tenable
Vulnerability Management does not process the scan and eventually
aborts it.
Note: This limits items like MDM assessments, importing Nessus files, and
very large Auto Discovery scenarios like VMware to individual scans with less
than 10,000 assessed targets.
For more information about creating, modifying, and launching scans, see Manage Scans. For more
information about scan status values, see Scan Status.
Account Target The target count exceeds the limit You reached the maximum scan
Limit for this account. Please contact target limit. To increase your scan
customer support to upgrade your target limit by upgrading your
license. license, contact Tenable Support.
Agent Group The owner does not have access to You do not have access to all the
Permissions all of the configured agent groups. agent groups selected for this scan.
Select the correct groups. For more
information, see Agent Groups.
- 70 -
Warning Message Recommended Action
All Scans All active scans were aborted. Tenable Vulnerability Management
Aborted aborted the scan due to a system
abort request. Re-run the scan.
Auto Routed Custom scan targets are not Select a specific scanner to run
Custom Targets currently supported for auto routed scans on custom targets.
scans.
Concurrent Scan Concurrent scan limit reached for You reached the maximum
Limit this account. Please contact concurrent scan limit. Re-run the
customer support to upgrade your scan later.
license.
Concurrent Scan Scan could not be completed: You reached the maximum
Limit Reached concurrent scan limit reached for concurrent scan limit. Re-run the
this account. Please contact scan later.
customer support to upgrade your
license.
Conflict Transition for indexing to pausing The scan is completed and is now
not supported. in the process of indexing. Wait for
the indexing to complete.
Empty Scanner The scan is configured to use a Confirm the scanner group contains
- 71 -
Warning Message Recommended Action
Empty Targets No targets are configured for the Confirm the scan configuration
scan. contains one or more valid targets,
then re-run the scan.
Inactive The scan is configured to use a Confirm the scanner group contains
Scanners scanner group with no active functioning scanners, then re-run
scanners. the scan. For more information, see
Scanner Groups.
Indexing Error Unexpected error during task Re-run the scan for unscanned
processing. Targets may need to targets or targets that need to be
be rescanned : [scan targets] re-scanned.
Invalid AWS No valid AWS targets are Confirm the scan contains valid
Targets configured for the scan. AWS scan targets and re-run the
scan. For more information, see
Targets.
Invalid PCI The PCI scan can only be launched Use a Tenable cloud sensor to run a
Scanner using Tenable Cloud Scanners Tenable PCI ASV scan. For more
information, see Cloud Sensors.
Invalid Tag Failed to resolve a target FQDN or One or more assets in a tag
Target IP from an asset in the configured configured for the scan requires an
tags. associated scan target. Confirm the
tag configuration, then re-run the
scan. For more information, see
Tags.
Invalid Tag Rule Tags with the "Match All" filter can Adjust your tag rules, then re-run
- 72 -
Warning Message Recommended Action
As Target only have one rule for scans with the scan.
the "Targets defined by tags"
option enabled. Tag category: [tag
category], Tag value: [tag value].
Invalid Target Can't resolve target. Confirm your scan includes valid
scan targets, then re-run the scan.
For more information, see Targets.
Invalid Target An invalid target range is Correct or remove the invalid scan
Range configured for the scan: [scan target range, then re-run the scan.
targets] For more information, see Targets.
Invalid Targets No valid targets are configured for Confirm the scan targets meet the
the scan. following criteria:
- 73 -
Warning Message Recommended Action
Log4j DNS Unable to resolve DNS [scan Re-run the scan for unscanned
Failed Request target] to check Log4j targets or targets that need to be
Vulnerability. re-scanned.
Max Findings The maximum number of findings Review the Tenable Vulnerability
Error was reached. Management scan limitations and
adjust the scan configuration to
produce an allowed number of
findings.
Max Hosts Scan has exceeded the maximum Review the Tenable Vulnerability
Reached Error number of allowed hosts. Management scan limitations and
adjust the scan configuration to
scan an allowed number of hosts.
No Available Unable to find a scanner that is Confirm you selected the correct
Scanner able to run the scan. scanner, then re-run the scan.
No Configured The scan has no configured Agent Add at least one Agent Group to the
Agent Groups Groups. scan.
No Scan Policy The scan must be configured with The scan requires a scan policy.
a scan policy. Configure a scan policy, then re-run
the scan.
- 74 -
Warning Message Recommended Action
Notification Notifications for this scan may not The scan completed, but failed to
Error have been sent. send a notification.
Owner Disabled The owner of the scan is disabled. Enable the owner of the scan or
transfer ownership to an enabled
user. For more information, see
Permissions.
Paused Scan Paused scan exceeded timeout of The paused scan exceeded the
Timeout [maximum allowed pause] days. maximum pause duration. Re-run
Some tasks were aborted. Targets the scan for all incomplete scan
may need to be rescanned. targets.
Pending Scan The scan was unable to transition Confirm the selected scanner group
Timeout to running within the expected has sufficient capacity, then re-run
timeout. the scan. For more information, see
Scanner Groups.
Policy The owner of the scan does not You do not have access to the scan
Permissions have access to the configured policy for this scan. Re-run the
policy. scan with correct permissions. For
more information, see Permissions.
Portscanner Max Portscanners have found more Since this negatively impacts both
Ports Exceeded than [number] ports open for scan accuracy and performance,
target [target name], and the you may want to adjust your
number of reported ports has been network security configuration to
truncated to [number] (threshold disable this behavior for
controlled by scanner preference vulnerability scans.
portscanner.max_ports). Usually
this is due to intervening network
equipment intercepting and
responding to connection requests
as a countermeasure against
portscanning or other potentially
- 75 -
Warning Message Recommended Action
malicious activity.
Routed To The following targets were routed Confirm the scanner group contains
Inactive to a scanner group with no active functioning scanners, then re-run
Scanners scanners: [scan targets] the scan. For more information, see
Scanner Groups.
Running Scan The scan exceeded the maximum The scan may be taking too long to
Timeout allowed runtime. scan some scan targets. Re-run the
scan.
Scan Aborted The assigned scanner was not Tenable Vulnerability Management
found. could not find the selected scanner.
Select a different scanner and re-
run the scan.
Scan Forbidden Rejected attempt to scan [scan The scan target is excluded from
target], as it violates user-defined scans. If you want to scan this
- 76 -
Warning Message Recommended Action
Scan Job The scan could not be initialized. Tenable Vulnerability Management
Initialization Please check the scan targets failed to launch the scan. Re-run
Error setting for irregularities and the scan with the correct scan
contact support if the problem target. For more information, see
persists. Targets.
Scanner Group Unable to load scanner group for Confirm the scan configuration
Error scanner [scanner ID]. contains one or more valid targets,
then re-run the scan.
- 77 -
Warning Message Recommended Action
Scanner Not The assigned scanner was not Tenable Vulnerability Management
Found found. could not find the selected scanner.
Select a valid scanner and re-run
the scan.
Scanner The owner of the scan does not You do not have access to the
Permissions have access to the assigned selected scanner. Select a different
scanner. scanner and re-run the scan. For
more information, see Permissions.
Stalled Task A task was automatically aborted Confirm the scanners are
after stalling on scanner. Targets functioning properly and have
may need to be rescanned: [scan enough capacity for your scans,
targets] then re-run the scan for unscanned
targets or targets that need to be
re-scanned.
Tag Not Found Tenable Vulnerability Management Open the scan configuration in
could not process the tag. The tag Tenable Vulnerability Management
either did not exist at the time of to automatically remove any tags
scanning or the user does not have that no longer existing. Save the
access to the tag. Tag UUID: [tag scan configuration and re-run the
uuid]. scan.
- 78 -
Warning Message Recommended Action
Error associated with scan. could not obtain the scan targets.
Verify the targets and re-run the
scan. For more information, see
Targets.
Target Access The owner of the scan does not You do not have the correct user
Error have access to any configured permissions to run the scan. Check
targets. your user permissions and re-run
the scan. For more information, see
Permissions.
Target Group The owner of the scan does not Confirm the scan owner's
Permissions have access to all of the configured permissions, then re-run the scan.
target groups. For more information, see Target
Groups.
Target Limit The target count exceeds the The scan target range is too large.
maximum allowed for Tenable Confirm the scan configuration
Vulnerability Management. includes a valid target range, then
re-run the scan. For more
information, see Targets.
Target Range A target range exceeds the Confirm or reduce the configured
Limit maximum allowed targets: [scan scan target range and re-run the
targets] scan. For more information, see
Targets.
Targets Unable The following targets are not able Re-run the scan for unscanned
To Complete to complete scanning in the targets or targets that need to be
allowed scan time and will need to scanned again.
be rescanned: [scan targets]
- 79 -
Warning Message Recommended Action
Task Processing Unexpected error in processing. Re-run the scan for unscanned
Error Targets may need to be rescanned: targets or targets that need to be
[scan targets] re-scanned.
Transition Some tasks stalled when being Failed to complete scan on some
Timeout [resumed, paused, or stopped] and scan targets. Re-run the scan for all
were aborted. Targets may need to unscanned scan targets.
be rescanned.
- 80 -
Dashboards
Dashboards are interactive, graphical interfaces that often provide at-a-glance views of key
performance indicators (KPIs) relevant to a particular objective or business process.
Note: Depending on your license, more dashboards are included. For example, the Tenable Lumin
dashboard.
l Dashboards that other users have shared with you. Click the Shared with Me tab to view
dashboards that others have shared with you.
Note: There may be a delay between when a scan completes and when the dashboard data updates while
Tenable Vulnerability Management indexes the data.
You can roll over individual items to reveal additional information or click on items to drill down into
details behind the data.
- 81 -
Tip: All charts on the Vulnerability Management Overview show New, Active, and Resurfaced vulnerability
data. However, the counts or data displayed on each chart may differ for other reasons. For example, the
Vulnerability Priority Rating (VPR) widget organizes vulnerabilities by VPR category, but the Vulnerability
Trending widget graphs vulnerabilities by CVSS-based severity category. For more information about how
severity and VPR metrics compare, see CVSS vs. VPR.
In the Vulnerability Management Overview, you can interact with the following widgets:
Widget Action
Cyber Exposure News This widget highlights the most recent Tenable blog posts
Feed related to exposure incidents.
- 82 -
information, see View Asset Details.
l View a count of your scans run during the last 90 days and
the percentage that succeeded and failed.
CISA Alerts AA22-011A This widget provides a vulnerability count of risks associated
and AA22-047A with the CISA Alerts AA22-011A and AA22-047A vulnerabilities
that have been identified or mitigated.
- 83 -
The Vulnerabilities page appears, filtered by the range you
selected. For more information, see View Vulnerabilities by
Plugin.
Vulnerability Trending This widget shows the cumulative number of Critical, High,
Medium, and Low severity vulnerabilities on your network over
time. For more information, see CVSS vs. VPR.
- 84 -
l To export the data in the widget, click the button and
select a format.
Critical and High This widget summarizes the number of Critical and High severity
Exploitable Vulnerabilities vulnerabilities on your network, organized by exploitability
characteristic category. A single vulnerability may have multiple
exploitability characteristics and count towards multiple
categories.
Future Threats: Not Yet This widget summarizes the vulnerabilities that are not yet
Exploitable Vulnerabilities exploitable, determined by their Exploit Code Maturity and
Vulnerability Publication Date.
Vulnerability Age This widget summarizes the age of your vulnerabilities (by
Vulnerability First Seen date), organized by severity, to help you
manage your SLAs. For more information about severity, see
- 85 -
CVSS vs. VPR.
Note: There may be a delay between the time when a scan completes and when the dashboard data
updates while Tenable Vulnerability Management indexes the data.
Hovering over individual items reveals a data summary that you can click to drill down for further
details.
In the Vulnerability Management Overview (Explore), you can interact with the following widgets:
Widget Action
Cyber Exposure News This widget highlights the most recent Tenable blog posts
Feed related to exposure incidents.
- 86 -
and Frictionless Assessment. The numbers displayed in this
widget use severity to determine the precedence of
vulnerabilities to mitigate.
Tenable Research This widget provides two indicators for current major threats
Advisory discovered by Tenable Research. The red indicator signifies the
presence of the relevant vulnerabilities, while the green
indicator is enabled when these vulnerabilities are patched.
- 87 -
The Findings page appears with details about the assets
detected in the selected range.
Critical and High This widget focuses on the most severe current threats, critical,
Exploitable Vulnerabilities and high exploitable vulnerabilities to help prioritize remediation.
Each bar represents vulnerabilities grouped by an exploitability
characteristic.
- 88 -
l Exploited by Malware: Vulnerabilities that can be exploited
by malicious software, such as viruses, worms, spyware,
adware, and ransomware.
Future Threats: Not Yet This widget provides a view of vulnerabilities based on exploit
Exploitable Vulnerabilities code maturity and vulnerability publication date. The columns
display counts of published vulnerabilities within the specified
- 89 -
time period present in the organization. The rows display the
exploit code maturity, where Proof of Concept is more serious
than Unproven Exploit.
- 90 -
The Findings page appears with details about assets
detected for the category.
The tables below describes the sections and widgets displayed in the Web Applications Scanning
dashboard. You can view details about the data in a widget by clicking the widget.
Widget Description
Findings Number of findings Tenable Web App Scanning has discovered. The
findings are categorized by severity (Critical and High).
- 91 -
Widget Description
OWASP Top 10
This chart displays the vulnerabilities discovered by Tenable Web App Scanning that appear in the
latest Open Web Application Security Project (OWASP) Top 10 Most Critical Web Application
Security Risks document.
Tenable Vulnerability Management updates dashboard data based on date filters you add when you
Create a Custom Widget for the dashboard.
- 92 -
a. In the upper-left corner, click the button.
The Dashboards page appears. The page contains tiles that represent:
l Tenable-provided dashboards
l In the upper-left corner, use the Search bar to search for specific dashboards.
l In the upper-left corner, use the drop-down to change the order in which dashboards
appear on the Dashboards page.
l Edit a dashboard.
l Share a dashboard.
l Export a dashboard.
l Duplicate a dashboard.
- 93 -
l Delete a dashboard.
Tenable-Provided Dashboards
On the Dashboards page, Tenable Vulnerability Management shows dashboards in the following
order:
2. Dashboards you create and dashboards that have been shared with you.
Note: You can change the order in which dashboards appear by using the drop-down in the upper-right
corner of the Dashboards page.
The Tenable-provided dashboards you see depend on the licenses you have, but can include the
following:
Dashboard License
Note: You can export the Vulnerability Management Overview and Asset View dashboard landing pages,
or export individual widgets on those dashboards. For more information, see Export a Full Dashboard and
Export an Individual Dashboard Widget.
Note: If your dashboard fails to show data, you may be filtering the dashboard by a target group with too many
targets. Tenable recommends limiting the number of targets in any individual target group.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
- 94 -
In Tenable Vulnerability Management, you can export the following dashboard landing pages:
l Asset View
l Tenable Lumin
Once the export completes, a Success message appears and Tenable Vulnerability
Management downloads the export file to your computer. Depending on your browser
settings, your browser may notify you that the download is complete.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
In Tenable Vulnerability Management, you can export individual widgets from the following
dashboard landing pages:
l Asset View
- 95 -
l Tenable Lumin
1. View the dashboard page that contains the widget you want to export.
2. In the header of the widget you want to export, click the button.
Once the export completes, a Success message appears and Tenable Vulnerability
Management downloads the export file to your computer. Depending on your browser
settings, your browser may notify you that the download is complete.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Tenable Vulnerability Management updates dashboard data every time you run a scan.
l In grid view, roll over the tile for the dashboard you want to view.
- 96 -
l In list view, roll over the thumbnail dashboard image for the dashboard you want to view.
3. Click View.
Tip: Use this option to view legacy versions of Explore dashboards. For more
information, see Enable Explore Dashboards
l Click on widget elements to drill down into details behind the data.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
- 97 -
To view the dashboard template library:
a. In the upper-right corner of the page, click the button in the drop-down box.
l In the upper-left corner, use the Search bar to search for specific dashboards.
l Click the New and Updated tab to view dashboards that are eligible for auto-update.
l Preview a dashboard.
l Create a dashboard.
Create a Dashboard
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
You can create a custom dashboard or use the Template Library to create a copy from the available
templates. Dashboards let you drill down to view the details of each widget.
Important: The Template Library in Tenable Vulnerability Management includes Explore dashboard
templates. The Explore dashboard templates are marked with Explore at the end of the template name.
For example: Vulnerability Management (Explore). From the dashboards that you create using these
templates, you can drill down to the Findings or Assets pages. To add an Explore dashboard, see Enable
Explore Dashboards.
To create a dashboard:
- 98 -
1. View the Dashboards page.
b. In the Groups panel on the left, click the group name to view the templates for the
category.
The following is not supported in Tenable FedRAMP Moderate environments. For more
information, see the Tenable FedRAMP Moderate Product Offering.
Category Description
Center for CIS Benchmarks are best practices for the secure configuration
Internet of a target system. Be sure to use the proper audit file for
Security (CIS) scans.
- 99 -
Host Audit Organizations such as CIS, DISA, and some vendors create
Plugin Type golden configurations standards, known as benchmarks.
Tenable creates audit files that perform a detailed
configuration review. Scanning the assets with the Host Audit
Compliance Check plugins allows you to do detailed
configuration checks. These reports provide summary and
detailed information for all the Host Audit Compliance Check
plugins.
Tenable Best Allows you to implement best practice audits for new
Practice Audits technologies. Be sure to use the proper audit file for scans.
Web App Web application security provides the ability to detect and
Scanning mitigate threats and vulnerabilities that may compromise the
confidentiality, integrity, and availability of web applications.
These reports leverage data from Tenable Web App Scanning, a
comprehensive and automated vulnerability scanning tool for
modern web applications.
- 100 -
d. Hover over the template.
e. (Optional) To preview the dashboard template, click Preview. For more information, see
Preview a Dashboard.
f. Click Add.
The new dashboard appears on the Dashboards page with the name Copy of selected
dashboard.
A menu appears.
- 101 -
b. Do one of the following:
Note: The Edit Filter option does not appear if there are no widgets added to the
dashboard.
The edges of the widget become defined and exhibit a raised appearance.
d. Release the mouse button to drop the widget in the new location.
What to do next:
l Manage Dashboards
- 102 -
Preview a Dashboard
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
When creating a new dashboard from a template, you can preview the dashboard before adding it to
the Dashboards page.
To preview a dashboard:
1. Create a dashboard.
2. In the Template Library, roll over the template you want to preview.
3. Click Preview.
4. To exit the preview, in the top navigation bar, click a link in the breadcrumb trail to return to
the Template Library, or the Dashboards page.
An Added dashboard to Dashboards confirmation message appears, and the new dashboard
appears on the Dashboards page with the name Copy of selected dashboard.
To use Explore dashboards within Tenable Vulnerability Management, you must first add them to
your interface via the Template Library.
Note: The numerical data that appears on your Explore dashboards may not match the data on your legacy
Tenable Web App Scanning or VM dashboards.
Note: The data on your Explore Tenable Web App Scanning and VM dashboards reflects your complete
scanning history. This differs from the Tenable Web App Scanning and VM dashboards, which display data
- 103 -
for only the last 30 calendar days.
If Explore dashboards do not appear, your container may not have enabled them. Please contact
your Customer Success Manager.
5. For each Explore dashboard you want to add to your interface, do the following:
b. Click Add.
Note: To reenable your Tenable Web App Scanning or VM dashboards, enable the corresponding
workbench.
Manage Dashboards
This section contains the following topics related to help you manage your Tenable Vulnerability
Management dashboards:
Dashboard Groups
- 104 -
In Tenable Vulnerability Management, you can organize dashboards into groups via the dashboard
Groups panel. This allows you to track different types of dashboards, and dashboards that others
have shared with you. You can also share a dashboard group with one or more users or user groups.
The Groups panel automatically expands when you view the Dashboards page. The panel is
separated by Tenable-provided dashboard groups and user-created dashboard groups.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
3. In the Group Name box, type a name for your dashboard group.
4. In the Dashboards to Include section, select the check box next to any dashboards you want
to add to the dashboard group.
5. Click Save.
Tenable Vulnerability Management adds the dashboard group to the user-created dashboard
list in the Groups panel.
Note: Dashboard groups are not automatically re-shared with a user after they have been updated. For
example:
- 105 -
User A shares a dashboard group with User B. User A then makes a change to the dashboard group. To see
the update, User A must re-share the dashboard group, with User B.
Note: Shared content may appear differently to the users with which it is shared based on the access group
to which they belong.
2. In the Groups panel, click the user-created dashboard group you want to share.
l To share the dashboard group with all users, select the All Users check box.
l To share the dashboard group with specific users or user groups, from the drop-down
box, select the users or user groups with which you want to share the dashboard group.
5. Click Share.
A Group shared successfully message appears. Tenable Vulnerability Management shares the
dashboard group with the designated users or user groups and sends an email indicating that
you shared a dashboard with them.
- 106 -
1. View the Dashboards page.
2. In the Groups panel, click the user-created dashboard group you want to edit.
4. (Optional) In the Group Name box, edit the name of the dashboard group.
5. (Optional) In the Dashboards to Include section, select or deselect the dashboards that
appear in the dashboard group.
6. Click Save.
2. In the Groups panel, click the user-created dashboard group you want to delete.
4. Click Delete.
Note: Deleting dashboard groups does not delete the dashboards within the group.
- 107 -
Automatically Update Widgets on a Dashboard
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
To provide the most up-to-date vulnerability information, Tenable updates or adds new dashboard
widgets when, for example, a new vulnerability is exposed or when Tenable Vulnerability
Management adds a new vulnerability filter. When Tenable updates these widgets, you can view and
automatically update them in one of the following ways:
l Dashboards page — On the Dashboards page, you can update all updated widgets on a
dashboard at one time.
l Dashboard Template Library — When creating a custom dashboard via the Template Library,
you can view new or updated widgets and add them to the custom dashboard.
Note: On predefined dashboard templates, Tenable Vulnerability Management always includes the
most recent version of widgets.
l Widget Library — In the Widget Library, you can view new or updated widgets and add them
to up to ten individual dashboards.
Note: You can also see dashboards with new and updated widgets on the All tab. These dashboards
appear with a pulsing blue dot next to the dashboard name.
3. Roll over the dashboard for which you want to update widgets.
4. Click Apply.
An Update Available message appears that describes the updates to the widgets on the
dashboard.
- 108 -
5. Click Update.
4. Click Add.
5. In the Dashboards drop-down, select the dashboard or dashboards to which you want to add
the new or updated widget.
6. Click Save.
Edit a Dashboard
- 109 -
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
To edit a dashboard:
c. Click Edit.
A drop-down appears.
l
Rename the dashboard:
a. Click the name of the dashboard.
- 110 -
l
Edit the dashboard description:
a. Click the dashboard description.
l
Edit the dashboard filters:
a. In the upper-right corner of the page, click Edit Filter.
l
Add widgets to the dashboard:
a. In the upper-right corner of the page, click Add Widgets.
A menu appears.
l
Reorder widgets on the dashboard:
a. Roll over the top of the widget until the move cursor appears.
l
Resize the widgets on the dashboard:
- 111 -
a. Roll over the lower-right corner of the widget until the resize cursor appears.
l
Delete the dashboard:
o In the lower-left corner of the page, click Delete Dashboard.
You return to the selected dashboard and Tenable Vulnerability Management applies your
changes.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
You can set any dashboard as the default dashboard to make it your landing page. If you do not set
a default dashboard, Tenable Vulnerability Management uses the Tenable-provided Vulnerability
Management Overview dashboard as the default.
When you set a dashboard as default, on the Dashboards page, the Default label appears in the
header of the dashboard tile.
Note: If you delete a dashboard set as default, the product Tenable-provided dashboard becomes the
default.
- 112 -
1. Do one of the following:
Note: You may have to log out and log back in to see the updated default dashboard.
Rename a Dashboard
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
To rename a dashboard:
- 113 -
A confirmation appears at the top of the page.
Duplicate a Dashboard
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Required Tenable Web App Scanning User Role: Scan Operator, Standard, Scan Manager, or
Administrator
To duplicate a dashboard:
2. Click Duplicate.
Filter a Dashboard
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
You can apply filters at the dashboard level to all widgets within that dashboard.
- 114 -
Note: You can apply configurations to individual widgets. The widget-level configuration takes precedence
over dashboard-level configuration.
A drop-down appears.
3. Click Filter.
4. In the Select Filter Type drop-down, select the assets you want the dashboard to analyze. See
the following table for options and requirements.
All Assets (Default) This option includes This is the default option and
all the assets in the includes all assets in the dashboard.
dashboard. There is not a requirement for this
option.
Target Group This option only includes An extra field for Select Target
assets in a specific target Groups appears when you select this
group. option. Select the desired target
group from the drop-down list.
Custom This option only includes A text box appears when you select
assets with a specific this option. Enter one or more of the
hostname, IP address, FQDN, custom option formats (hostname, IP
or CIDR. address, FQDN, or CIDR). Separate
multiple items with commas.
- 115 -
number of IP addresses in your
search filter is less than or equal to
25.
5. Click Apply.
6. In the widgets section, roll over the icon to view the added filter.
Note: The following are the filtering limitations for Explore widgets:
Note: You can filter only with the tags you can access. You cannot apply tags that you do not have access
to.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
You can filter a dashboard to show only vulnerabilities within a specific timeframe — in hours, days,
months, or years. Filters are available only for custom dashboards or dashboards created using the
template library.
Note: Filter by time option is available only for Explore dashboards and Explore widgets.
2. To filter your dashboard data for a specific timeframe, do one of the following:
- 116 -
l In the All drop-down box, select the required timeframe: All, 7 days ago, 14 days ago, 30
days ago, 60 days ago, 90 days ago.
l For a custom timeframe, in the Last Seen box, type the value to view the data within the
last number of days, hours, years, or months.
Tenable Vulnerability Management displays the vulnerabilities for the selected timeframe on
the dashboard.
Share a Dashboard
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Tenable Vulnerability Management users can share a dashboard with one or more users, or one or
more user groups. Shared dashboards appear automatically for the users or groups with which they
are shared.
Note: You cannot edit dashboards that are shared with you. You can, however, duplicate or delete a
dashboard that is shared with you.
Note: Dashboards are not automatically re-shared with a user after they have been updated. For example:
User A shares a dashboard with User B. User A then makes a change to the dashboard. To see the update,
User A must re-share the dashboard with User B.
Note: Shared content may appear differently to the users with which it is shared based on the access group
to which they belong.
To share a dashboard:
- 117 -
c. Click Share.
l To share the dashboard with all users, select the All Users check box.
l To share the dashboard with specific users or user groups, from the drop-down box,
select the users or user groups with which you want to share the dashboard.
3. Click Share.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
With the export feature, you can export dashboard data in CSV, PDF, and detailed PDF formats. You
can create dashboard exports on demand or schedule automated exports to specified recipients.
You can also manage your dashboard exports. You can download them, view your export history,
delete your exports, or delete their configuration.
Note: While you cannot export the Vulnerability Management Overview and Asset View dashboards, you
can export their associated landing pages, or export individual widgets on those dashboards. For more
information, see Export a Full Dashboard Landing Page and Export an Individual Dashboard Widget.
Export a Dashboard
- 118 -
To export a dashboard in CSV format:
1. Do one of the following:
c. Click CSV.
The export request and status appears in the Downloads section on the Exports plane.
When the export completes, Tenable Vulnerability Management downloads the export file to
your computer. Depending on your browser settings, your browser may notify you that the
download is complete.
To export a PDF:
- 119 -
1. Do one of the following:
Note: The PDF report contains the displayed information for the selected dashboard. The
information that you see on the screen is the information that is included in the report.
- 120 -
The PDF - Detailed report has in-depth information, including vulnerability details, that goes beyond
the items displayed.
Note: If you select PDF - Detailed and there are user-created filters applied to one or more widgets
on the dashboard, a Confirm Export message appears indicating that Tenable Vulnerability
Management does not apply user-created filters to any additional chapters. Click Confirm to continue
with the export.
The export request and status appears in the Downloads section on the Exports plane.
When the export completes, Tenable Vulnerability Management downloads the export file to
your computer. Depending on your browser settings, your browser may notify you that the
download is complete.
To schedule an export:
- 121 -
The Schedule Export plane appears.
l If you have never exported and/or scheduled an export for the dashboard, the Schedule
options automatically appear.
l If you have already exported the dashboard, in the Schedule section, click Add New.
l If you have already scheduled an export for the dashboard, you cannot create another
one. You must first cancel the scheduled dashboard export.
Note: The PDF report contains the displayed information for the selected dashboard. The
information that you see on the screen is the information included in the report.
The PDF - Detailed report has in-depth information, including vulnerability details, that goes beyond
the items displayed.
Note: If you select PDF - Detailed and there are user-created filters applied to one or more widgets
on the dashboard, a Confirm Export message appears indicating that Tenable Vulnerability
Management does not apply user-created filters to any additional chapters. Click Confirm to continue
with the export.
Option Description
Start Date and Time The date and time that you want the export to begin.
- 122 -
l Monthly — The export occurs once a month on the day of
the week and time specified (for example Monthly on Last
Tuesday)
Note: Once you save the scheduled export, you cannot edit the
Encryption Password. Instead, you must create a copy of the
dashboard, create a scheduled export, and then select the desired
password.
Add Recipients (Optional) The email address for the person that receives the
report. You can specify multiple email addresses as a comma-
separated list.
5. Click Schedule.
- 123 -
1. Do one of the following:
c. Click Export.
2. In the Downloads section, next to the export download you want to download, click the
button.
- 124 -
l The schedule for the dashboard export.
You cannot access the Export History plane if the dashboard has not yet been exported.
c. Click Export.
2. In the Downloads section, roll over the export download you want to delete.
4. Click Delete.
- 125 -
To delete a dashboard export configuration:
1. Do one of the following:
c. Click Export.
a. View the dashboard for which you want to delete a scheduled export.
2. In the Schedule section, roll over the scheduled export configuration you want to delete.
4. Click Confirm.
Delete a Dashboard
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Note: In Tenable Vulnerability Management, you can only delete custom dashboards. You cannot delete
Tenable-Provided Dashboards.
- 126 -
To delete a dashboard:
2. Click Delete.
3. Click Delete.
Manage Widgets
You can use the widget library to create and edit widgets to use across your dashboards.
On your dashboards, you can further configure widgets to modify your dashboards.
- 127 -
l Configure a Widget
l Duplicate a Widget
l Rename a Widget
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
The widget library provides a selection of Tenable-provided widgets to add to your template-based
or custom dashboard.
Note: The Tenable-provided Vulnerability Trending widget is not available in the widget library. All other
Tenable-provided widgets appear in the widget library.
2. In the upper-right corner of the page, click the Widget Library button.
3. (Optional) In the upper-left corner of the page, click the tab for the dashboard widgets you
want to view. For example, if you want to only widgets associated with Tenable Vulnerability
Management, click the Vulnerability Management tab.
Note: The tabs that appear on the Widgets page depend on the licenses (for example, Tenable
Lumin, Tenable Web App Scanning) you have enabled in Tenable Vulnerability Management.
a. In the upper-right corner of the page, click the button in the drop-down box.
b. Select the criteria by which you want to sort the widgets page.
l In the upper-left corner, use the Search bar to search for specific widgets.
- 128 -
l Click the New and Updated tab to view dashboard widgets that are eligible for auto-
update.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Note: You can only delete custom widgets. You cannot delete pre-configured Tenable Vulnerability
Management widgets.
3. In the header of the widget you want to delete, click the button.
4. Click Delete.
5. Click Delete.
Tenable Vulnerability Management removes the widget from the widget plane, and a message
confirming the deletion appears at the top of the plane.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
You can use the custom widget option to create uniquely defined widgets, which you can then add
to any user-defined dashboards.
- 129 -
To create a custom widget:
b. In the upper-right corner of the page, click the Custom Widget button.
a. Edit a dashboard.
A menu appears.
A menu appears.
4. In the charts section, select the chart type for your custom widget:
l Table
5. In the dataset drop-down box, select the type of information Tenable Vulnerability
Management uses to update the widget:
- 130 -
l Vulnerabilities
l Assets
Note: If you selected ring chart or bar chart in the charts section, selecting the Assets
dataset resets the chart selection to a table.
The chart type, Data Grouping, and Display Fields options update based on your selection.
6. In the Data Grouping drop-down box, select how you want to group the data:
Note: If you previously created a tag, it appears in the custom widget's list of filters.
Note: If you exceed the current asset query limitation of 5,000, a message appears in your interface.
Refine the query to a smaller set of asset tags.
Note: Tenable Vulnerability Management does not currently support tag filters in exports.
8. (Optional) To filter the widget data using an existing saved search, in the Saved Searches
drop-down box, select the saved search you want to use to filter your widget data.
Note: If you do not have any saved searches, this option does not appear. To create a new saved
search, see Saved Search.
- 131 -
In the Widget Preview, the title updates automatically.
10. (Optional) In the Description box, type a description for the custom widget.
In the Widget Preview, the icon appears and the description hover text updates
automatically.
Note: While Name, Description, and the chart type all update in the widget preview automatically, all
other configuration options refresh after you click Update Preview.
Tenable Vulnerability Management saves the custom widget to the widget library, and you can
add the widget to any user-defined dashboards.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Required Tenable Web App Scanning User Role: Scan Operator, Standard, Scan Manager, or
Administrator
You can use the custom widget option to create uniquely defined widgets, which you can then add
to any user-defined Explore dashboards. You can create custom widgets with vulnerabilities and
assets data. Vulnerabilities can include host vulnerabilities, Tenable Web App Scanning
vulnerabilities, and vulnerabilities from Legacy Tenable Cloud Security. Adding a mix of these
custom widgets to your dashboard provides you with a holistic view of the vulnerability
environment.
You can drill down from the custom widgets to the Findings and Assets pages.
- 132 -
1. Do one of the following:
b. In the upper-right corner of the page, click the New Custom Widget button.
a. Edit a dashboard.
A menu appears.
2. In the Chart Type section, select the chart type for your custom widget:
l Bar
l Column
l Doughnut
l Matrix
l Multi-series Bar
l Multi-series Column
l Stacked Bar
l Stacked Column
l Table
- 133 -
l Chart types for assets:
l Column
l Bar
l Doughnut
l Table
4. (Optional) In the Description box, type a description for the custom widget.
In the Widget Preview, the icon appears and the contextual description updates
automatically.
5. In the Data Set drop-down box, select the type of information Tenable Vulnerability
Management uses to update the widget:
l Findings
l Assets
The Chart Type, Group By, and Sort Fields options update based on your selection.
If you
Options
selected...
- 134 -
b. In the Limit drop-down box, select the number of records you
want to show on the widget. The default value is 5 and maximum
value is 20.
c. In the Group By drop-down box, select how you want to group the
data. The values in the Group By drop-down changes based on the
Entity you select.
Note: For Bar, Column, Doughnut, and Table chart types, you
can select only one option to group vulnerabilities. For Matrix,
Multi-series Bar, Multi-series Column, Stacked Bar, and
Stacked Column chart types, you must select two options for
grouping vulnerabilities.
d. In the Stats drop-down box, select the statistics you want to show
on the widget.
For all chart types except Table, count is the default statistic
option. For the Table chart type, you can select from multiple
options.
e. In the Sort Fields drop-down box, select how you want to sort the
data on the widget. You can sort by one of these options:
l Count
l Value in Group By
f. In the Sort Order drop-down box, select whether you want the sort
in ascending or descending order.
- 135 -
b. In the Group By drop-down box, select how you want to group the
data:
l System Type
l Name
l Operating System
l SSH Fingerprint
l Mac Addresses
l Asset Types
Note: For Bar, Column, Doughnut, and Table chart types, you
can select only one option to group assets. For Matrix, Multi-
series Bar, Multi-series Column, Stacked Bar, and Stacked
Column chart types, you must select two options for grouping
assets.
c. In the Stats drop-down box, select the statistics you want to show
on the widget.
For all chart types except Table, count is the default statistic
option. For the Table chart type, you can select from multiple
options.
Note: Tenable recommends that you use simple instead of complex queries or one level of nested
filters when creating your custom widgets. Widgets can only have a maximum of one level of nested
filters, provided no additional context filters are applied when the widgets are added to the
dashboards. An example of a query with one level of nesting:
(CVSSv3 Base Score is greater than 8.9 OR VPR is greater than 8.9) AND State is
not equal to Fixed
- 136 -
b. Click the filter you want to apply.
d. In the first drop-down box, select the operator you want to apply to the filter.
e. In the second drop-down box, select one or more values to apply to the filter.
f. Select Match All from the drop-down box. By default, Tenable Vulnerability Management
sets the filter to Match All.
Note: While Name, Description, and the chart type all update in the widget preview automatically, all
other configuration options refresh after you click Update Preview.
Tenable Vulnerability Management saves the custom widget to the widget library, and you can
add the widget to any user-defined dashboards.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
3. In the upper-right corner of the widget you want to edit, click the button.
A menu appears.
- 137 -
4. Click Edit.
A confirmation appears.
Note: A custom widget that was previously included in dashboards before you edited the widget does not
update to reflect your edits. To include the edited widget, you must add the widget again as described in
Add a Widget to a Dashboard.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Use the following steps to add a widget to your template-based and custom dashboards.
You can add custom widgets, widgets from Tenable-provided dashboards, and other general
purpose Tenable-provided widgets.
Note: These steps describe how to add a template widget to a dashboard. See custom widgets for
information on how to create custom widgets and add them to your dashboard.
Tip: You can hover over a widget tile for brief descriptions of each widget. For detailed
descriptions about widgets originating from Tenable-provided dashboards, see Tenable-
Provided Dashboards.
- 138 -
b. Roll over the widget you want to add.
d. In the Dashboards drop-down box, select the dashboard or dashboards to which you
want to add the widget.
e. Click Save.
Tenable Vulnerability Management adds the widget to the bottom of the appropriate
dashboard or dashboards.
f. Click Add.
Tenable Vulnerability Management adds the widget to the bottom of the appropriate
dashboard.
3. Click Done.
Configure a Widget
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
To configure a widget:
1. View the dashboard page that contains the widget you want to configure.
2. In the upper-right corner of the widget you want to change, click the button.
A menu appears.
3. Click Configure.
- 139 -
l
Rename the widget:
a. Do one of the following:
l In the widget summary plane, roll over the widget name and click the
button.
A confirmation message appears at the top of the page, and the new name
appears in the widget header.
l
Edit the widget description:
a. Do one of the following:
l In the widget summary plane, roll over the widget description and click the
button.
A confirmation message appears at the top of the page, and the new description
appears in the widget header.
l
Duplicate the widget:
o In the Actions row, click the button.
- 140 -
l
Delete the widget from the dashboard:
a. In the Actions row, click the button.
b. Click Delete.
l
Apply filters to the widget:
All Assets (Default) This option This is the default option and
includes all the assets in the includes all assets in the
dashboard. dashboard. There is not a
requirement for this option.
Custom This option only includes When you select this option, a
assets with a specific text box appears. Enter one or
hostname, IP address, FQDN, more of the custom option
or CIDR. formats (hostname, IP address,
FQDN, or CIDR). You must
separate multiple items with a
comma.
Tags This option uses tags to When you select this option, a
filter asset results or drop-down box appears. Select or
vulnerability results. type the tag name by which you
want to filter results. Tenable
Note: Because the Vulnerability Management filters
ACR Widget uses Tenable
Lumin data, this widget
the results by the selected tags.
does not support filtering
by tag. Note: Tenable Vulnerability
Management supports a
maximum of 100 filters.
- 141 -
Note: Once you apply a filter to a widget, a icon appears in the widget header. Roll over the
icon to view the applied filter.
5. Click Apply.
A confirmation message appears and Tenable Vulnerability Management applies your changes
to the widget.
Duplicate a Widget
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
To duplicate a widget:
1. View the dashboard page that contains the widget you want to duplicate.
2. In the upper-right corner of the widget you want to duplicate, click the button.
A menu appears.
3. Click Duplicate.
Rename a Widget
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
To rename a widget:
1. View the dashboard page that contains the widget you want to change.
2. In the upper-right corner of the widget you want to rename, click the button.
A menu appears.
- 142 -
3. Click Configure.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
1. View the dashboard page that contains the widget you want to remove.
2. In the upper-right corner of the widget you want to remove, click the button.
A menu appears.
3. Click Delete.
4. Click Delete.
Tenable Vulnerability Management removes the widget from the dashboard. Remaining
widgets adjust to fill the new space.
- 143 -
Welcome to Tenable Lumin
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
You can use Tenable Lumin to quickly and accurately assess your risk and compare your health and
remediation performance to other Tenable customers in your Salesforce industry and the larger
population. Tenable Lumin correlates raw vulnerability data with asset business criticality and
threat context data to support faster, more targeted analysis workflows than traditional
vulnerability management tools.
Tenable-provided metrics help you quantify your risk to make informed remediation and strategic
security decisions. For more information about the metrics used in Tenable Lumin analysis, see
Tenable Lumin Metrics.
For information on how to prepare, install, and configure Tenable Lumin, see Get Started with
Tenable Lumin.
Important! Tenable One customers can access Tenable Lumin directly from the Workspace page.
Tenable Tenable Lumin uses several metrics to help you assess your risk.
For information about improving the accuracy of your Tenable Lumin metrics and increasing your
overall vulnerability management health, see Improve Your Tenable Lumin Metrics.
- 144 -
Important: Private findings are excluded from all scores in Tenable Lumin. For more information see
Findings.
l the overall CES for your entire organization (for example, the CES displayed in the Cyber
Exposure Score widget)
l the tag-level CES for assets in a specific business context (for example, the CES displayed in
the Cyber Exposure Score by Business Context/Tag widget).
Low 0 to 349
To view the CES for your entire organization or for a group of assets, view the widgets on the View
the Tenable Lumin Dashboard.
For more information about how long Tenable Vulnerability Management takes to calculate or
recalculate your CES, see Tenable Lumin Data Timing.
- 145 -
Critical 9.0 to 10.0
Note: Vulnerabilities without CVEs in the National Vulnerability Database (NVD) (for example, many
vulnerabilities with the Info severity) do not receive a VPR. Tenable recommends remediating these
vulnerabilities according to their CVSS-based severity.
Tenable Vulnerability Management provides a VPR value the first time you scan a vulnerability on
your network. Then, Tenable Vulnerability Management automatically provides new and updated
VPR values daily.
Tenable recommends prioritizing vulnerabilities with the highest VPRs that are present on your
assets with the highest ACRs.
To view the VPR for a specific vulnerability, view vulnerabilities as described in View Vulnerabilities
by Plugin.
Note:Tenable does not customize these values for your organization; VPR key drivers reflect a
vulnerability's global threat landscape.
Age of Vuln The number of days since the National Vulnerability Database (NVD) published
the vulnerability.
CVSSv3 The NVD-provided CVSSv3 impact score for the vulnerability. If the NVD did
Impact not provide a score, Tenable Vulnerability Management displays a Tenable-
Score predicted score.
- 146 -
Exploit Code The relative maturity of a possible exploit for the vulnerability based on the
Maturity existence, sophistication, and prevalence of exploit intelligence from internal
and external sources (e.g., Reversinglabs, Exploit-db, Metasploit, etc.). The
possible values (High, Functional, PoC, or Unproven) parallel the CVSS Exploit
Code Maturity categories.
Product The relative number of unique products affected by the vulnerability: Low,
Coverage Medium, High, or Very High.
Threat A list of all sources (e.g., social media channels, the dark web, etc.) where
Sources threat events related to this vulnerability occurred. If the system did not
observe a related threat event in the past 28 days, the system displays No
recorded events.
Threat The relative intensity based on the number and frequency of recently observed
Intensity threat events related to this vulnerability: Very Low, Low, Medium, High, or
Very High.
Threat The number of days (0-180) since a threat event occurred for the vulnerability.
Recency
- 147 -
Tenable assigns an ACR to each asset on your network to represent the asset's relative criticality as
an integer from 1 to 10. A higher ACR indicates higher criticality.
Critical 9 to 10
High 7 to 8
Medium 4 to 6
Low 1 to 3
Because Tenable Vulnerability Management calculates ACR values every 24 hours, you may need to
wait up to 24 hours to view the ACR after scanning the asset on your network.
Note: Tenable recommends reviewing your Tenable-provided ACR values and overriding them, if
necessary. You can customize ACR values to reflect the unique infrastructure or needs of your
organization, as described in Edit an ACR.
If an asset receives multiple ACR values, Tenable Vulnerability Management prioritizes the values in
the following order:
To view the ACR for a specific asset, view the asset details as described in View Asset Details.
Note: Tenable does not customize these values for your organization; ACR key drivers reflect the global
threat landscape associated with the asset's characteristics.
Note: Running unauthenticated scans may result in limited or incomplete ACR key drivers.
- 148 -
device_type The device type. For example:
internet_ The device's location on your network and proximity to the internet. For
exposure example:
l internal — The device is located within your local area network (LAN),
possibly behind a firewall.
l external — The device is located outside your LAN and not behind a
firewall.
Software or
Capability Description
Services
- 149 -
analytics_system A software solution for data analytics and reporting QlikView
is installed on the target host.
TIBCO Spotfire
IBM SPSS
SharePoint 2013
SOLR
Elasticsearch
Enterprise Search
Google Search
Appliance
Lucene
SQL Server
Reporting
Services
Oracle BI
publisher
SAP Business
Object
- 150 -
backup_server An enterprise backup solution is installed or Acronis Backup
running on the target host.
Quest NetVault
Unitrends
Enterprise Backup
Veritas Backup
Exec
Spectrum Protect
(formerly Tivoli
Storage Manager)
Siebel CRM
- 151 -
database_server A database system is installed on the target host or PostgreSQL
a database server is running on the target host.
Microsoft SQL
Server
MongoDB
Oracle Database
Db2 Hosted
Percona XtraDB
Cluster
IBM Informix
PostgreSQL
Percona Server
MariaDB Cluster
MySQL
Microsoft SQL
Server
SAP Adaptive
Server Enterprise
(ASE)
MariaDB Server
SQLite
Apache Derby
Network Server
SAP DB
Cogent Datahub
Server
- 152 -
directory_server The target asset is an authentication server. McAfee Stonegate
Authentication
Server
Kerberos
Ticketing Server
LDAP protocol
IBM Tivoli
Stonegate Auth
Server
Oracle E-Business
Suite
SAP ERP
Microsoft
Dynamics GP
SAP DB
SAPControl
SAP RMI-P4
Protocol Service
Apache OFBiz
erp_system_ The target asset has installed a client software for SAP GUI
client accessing ERP systems.
- 153 -
file_server The target asset is used for file sharing purposes. WebCenter
The file sharing here is a narrow sense. SMB server
ownCloud
is not considered as a file server in this
classification. Sharepoint
Oracle WebCenter
Content
Sharepoint
FTP service
Apple File
Protocol (AFP)
service
Network File
System (NFS)
Server Detection
ServiceDesk Plus
OTRS
ManageEngine
Service Desk
- 154 -
Performance
Monitoring
System Center
Operations
Manager
Applications
Manager-
ManageEngine
ManageEngine
Desktop Central
Ghost Solution
Suite
ZENworks -
Configuration
Management
IBM BigFix
System Center
Configuration
Manager
CA Unified
Infrastructure
Management
Centreon
VMware vRealize
Operations
OpManager
Nagios XI
- 155 -
SCOM
- 156 -
PRTG Network
Monitor
Zabbix
SolarWinds
Storage Resource
Monitor
GroundWork
Monitor
Pandora FMS
Tivoli Monitoring
OP5 Monitor
NetFlow Traffic
Analyzer
PRTG Network
Monitor
Cisco Prime
Infrastructure
H3C Intelligent
Management
Center
ZENworks Asset
Management
ManageEngine
Desktop Central
Unified Endpoint
Manager
- 157 -
Google Analytics
Cisco Prime
Infrastructure
H3C Intelligent
Management
Center
HP 3PAR
Management
Server
Ghost Solution
Suite
Fortigate Firewall
Management
Console
Barracuda Spam
& Virus Firewall
Management Web
Console
IMAP Service
Detection
CCProxy SMTP
Server Detection
SMTP Service
Detection
POP Service
Detection
- 158 -
pci The target asset has PCI sensitive information. PCI Plugin Fired
HTTP proxy
Detected in
Service Banner
McAfee Email
Gateway
reverse_proxy_ The target asset is a reverse proxy that directs NetApp SANtricity
server external client requests to internal servers. A Web Services
reverse proxy can be an ADC or a load-balancer. Proxy
Foreman Smart-
Proxy TFTP
rnd_software The target asset is for development purposes Red Hat Mobile
because product development software is installed Application
on it. Platform
Application
Testing Suite
Windows Visual
Studio
AutoCAD
Autodesk DWG
TrueView
- 159 -
Detection
Trihedral VTScada
Detection
- 160 -
web_application_ There is a web application server running or Geronimo
server installed on the target asset. Having a web
Resin
application server running on the target asset does
not necessarily indicate its criticality. But it can Tuxedo
hint criticality when used in together with some
Tomcat
properties, e.g. web application server + external +
server device type = high criticality. Jetty
Microsoft .NET
Platform
WebLogic Server
Magento
WebSphere
Commerce
Cobalt
DNN Platform
Umbraco
Oracle WebCenter
Sites
Glassfish
nginx
Microsoft IIS
- 161 -
Tenable calculates a dynamic AES for each asset on your network to represent the asset's relative
exposure as an integer between 0 and 1000. A higher AES indicates higher exposure.
Tenable calculates AES based on the current ACR (Tenable-provided or custom) and the VPRs
associated with the asset.
Low 0 to 349
Assessment Maturity provides a high-level summary of how effectively you are scanning for
vulnerabilities on your licensed assets. Tenable calculates a dynamic Assessment Maturity grade
that represents your assessment scanning health as a letter grade between A and F. An A grade
indicates you are assessing your assets frequently and thoroughly.
Tenable provides an Assessment Maturity grade the first time you scan. Then, Tenable Vulnerability
Management automatically provides an updated Assessment Maturity grade daily.
A 75 to 100
B 55 to 74
C 30 to 54
D 15 to 29
F 0 to 14
- 162 -
l
For asset scores:
o Scan Frequency score — How often the asset was scanned within the last 90 days
o Scan Depth score — Whether or not the asset was in an authenticated scan within the
last 90 days
o Assessment Maturity score — A calculation of (Scan Frequency score + Scan Depth
score) / 2
l
For a container/business context score:
o Scan Frequency score — the average of the asset Scan Frequency scores
o Scan Depth score — the average of the asset Scan Depth scores
o Assessment Maturity score — the average of the asset Assessment Maturity scores
A high depth grade indicates you are running authenticated scans on these assets.
A 75 to 100
B 55 to 74
C 30 to 54
D 15 to 29
F 0 to 14
Tenable calculates your frequency grade based on how often you scan assets on your network. A
high frequency grade indicates you are scanning your assets often.
A 75 to 100
B 55 to 74
- 163 -
C 30 to 54
D 15 to 29
F 0 to 14
To view your Assessment Maturity grade, depth grade, and frequency grade, see View Assessment
Maturity Details.
For more information about how long Tenable Vulnerability Management takes to calculate or
recalculate your Assessment Maturity grade, see Tenable Lumin Data Timing.
Remediation Maturity provides a high-level summary of how effectively you are remediating
vulnerabilities on your licensed assets. Tenable calculates a dynamic Remediation Maturity grade
that represents your remediation health as a letter grade between A and F. An A grade indicates
you are remediating the vulnerabilities on your assets quickly and thoroughly.
A 75 to 100
B 55 to 74
C 30 to 54
D 15 to 29
F 0 to 14
Tenable provides a Remediation Maturity grade the first time you remediate a vulnerability. Then,
Tenable Lumin automatically provides an updated Remediation Maturity grade daily.
- 164 -
Tenable calculates your remediation responsiveness grade based on how long it takes you to
remediate a vulnerability after it is first discovered (the First Seen date).
A high remediation responsiveness grade indicates you are quickly remediating the vulnerabilities
on your assets.
A 75 to 100
B 55 to 74
C 30 to 54
D 15 to 29
F 0 to 14
Tenable calculates your remediation coverage grade based on the percentage of remediated
vulnerabilities on your assets.
A high remediation coverage grade indicates you are remediating a high percentage of the
vulnerabilities on your assets.
A 75 to 100
B 55 to 74
C 30 to 54
D 15 to 29
F 0 to 14
To view your Remediation Maturity grade, remediation responsiveness grade, and remediation
coverage grade, see View Remediation Maturity Details.
For more information about how long Tenable Lumin takes to calculate or recalculate your
Remediation Maturity grade, see Tenable Lumin Data Timing.
- 165 -
Improve Your Tenable Lumin Metrics
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
If you want to improve the accuracy of your Tenable Lumin metrics and increase your overall
vulnerability management health, evaluate your Tenable-provided values and your scanning
strategy.
Important: Private findings are excluded from all scores in Tenable Lumin. For more information see
Findings.
1. On the Assessment Maturity Details page, review your Assessment Maturity grade to evaluate
your overall scanning health.
l View details about your Assessment Maturity depth grade in the Depth Grade widget. If
necessary, improve your depth grade by increasing the number of plugins enabled in
your user-defined templates or scans, or by increasing the number of authenticated or
agent scans. For more information, see Configure Plugins in Tenable Vulnerability
Management Scans, Credentials in Tenable Vulnerability Management Scans, or Scan
Templates.
If you improve your Assessment Maturity score, you improve the accuracy of your Tenable-
provided ACR and VPR values. Then, more accurate ACR and VPR values improve the accuracy
of your AES and CES values.
2. In the Assets table, review your Tenable-provided ACR values to evaluate the
characterizations of the assets on your network. If the ACR values do not reflect the unique
infrastructure or needs of your organization, you can override them. For more information,
see Edit an ACR Manually.
More accurate ACR values improve the accuracy of your AES and CES values.
- 166 -
3. On the Remediation Maturity Details page, review your Remediation Maturity grade to evaluate
your overall vulnerability remediation health.
l View details about your Remediation Maturity remediation responsiveness grade in the
Remediation Responsiveness Grade widget. If necessary, improve your remediation
responsiveness grade by quickly remediating your most critical (highest VPR)
vulnerabilities. For more information, see View Recommended Actions.
l View details about your Remediation Maturity remediation coverage grade in the
Remediation Coverage Grade widget. If necessary, improve your remediation coverage
grade by increasing the number of vulnerabilities you remediate. For more information
on the assets with the most critical vulnerabilities, see the Vulnerability Priority Rating
(VPR) widget described in Vulnerability Management Dashboard.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
You can customize an asset's Asset Criticality Rating (ACR) value to reflect the unique infrastructure
or needs of your organization. You can edit the ACR for a single asset independently or multiple
assets simultaneously.
Tip: Changes to an ACR value (and recalculations for your AES and CES values) take effect within 24 hours.
Tip: For information about how Tenable Vulnerability Management prioritizes manually overridden ACR
values, see Asset Criticality Rating (ACR).
- 167 -
Note: All Tenable Lumin data reflects all assets within the organization's Tenable Vulnerability Management
instance.
Location Action
Asset Details page a. In the left navigation plane, in the Asset View section,
click Assets.
Assets page a. In the left navigation plane, in the Asset View section,
click Assets.
b. In the assets table, roll over the asset you want to edit.
- 168 -
3. Do one of the following:
l To modify the ACR value, click or drag the Asset Criticality Rating slider to increase or
decrease the ACR.
l To reset an existing ACR value to the Tenable-provided ACR value, click Reset to
Tenable ACR.
4. (Optional) If you want to include a justification for your ACR change, in the Overwrite
Reasoning section, select one or more reasons.
5. (Optional) If you want to include a note about your ACR change, in the Notes section, type a
note.
6. Click Save.
3. In the Cyber Exposure Score by Business Context/Tag widget, click the tag for which you
want to view asset details.
The Tenable Lumin Business Context/Tag Asset Details page appears, filtered by the tag you
selected.
4. Access the Assets page through the Asset Criticality Rating Breakdown widget, the Asset
Scan Distribution widget, or the Asset Scan Frequency widget, as described in View Business
Context/Tag Asset Details.
- 169 -
5. In the table, select the check boxes next to the assets that you want to edit.
7. Click and drag the Asset Criticality Rating slider to set the ACR.
8. (Optional) If you want to include a justification for your ACR change, in the Overwrite
Reasoning section, select one or more reasons.
9. (Optional) If you want to include a note about your ACR change, in the Notes section, type a
note.
Tenable Vulnerability Management saves the custom ACR for all selected assets.
Run scans to generate vulnerability data for use in Tenable Lumin views.
Newly generated data does not immediately impact your Tenable Lumin metrics (for example, your
CES). Tenable requires more time to recalculate your metrics. For more information, see Time to
Calculate or Recalculate Your CES, Assessment Maturity, or Remediation Maturity Grade.
- 170 -
Time to Synchronize Data from Tenable Security Center
Vulnerability and asset data synchronize differently to Tenable Vulnerability Management.
Asset data (tags Manual (on-demand) All data and recalculated Tenable Lumin
in Tenable synchronizations only. metrics appear in Tenable Vulnerability
Vulnerability Management within 48 hours.
Management)
For more information about Tenable Security Center synchronization, see Tenable One
Synchronization in the Tenable Security Center User Guide.
l You run your first Tenable Vulnerability Management-configured scans after licensing Tenable
Lumin.
l You initiate your first Tenable Security Center synchronization after licensing Tenable Lumin.
l Tenable Security Center runs a scan that imports new data to a synchronized repository.
- 171 -
Tip: Tenable Vulnerability Management calculates Tenable Lumin metrics based on your licensed assets seen
in the last 90 days. If you change your scanning configuration (for example, you perform a recommended
action to increase your Assessment Maturity grade), your changes influence the next scheduled
recalculation, but take more time over the next 90 days to impact significantly and overhaul your metrics.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
The Tenable-provided Tenable Lumin dashboard visualizes exposure data for your organization. You
cannot customize the widgets on this Tenable-provided dashboard.
Important! Tenable One customers can access Tenable Lumin directly from the Workspace page.
- 172 -
1. In the upper-left corner, click the button.
Note: All Tenable Lumin data reflects all assets within the organization's Tenable Vulnerability
Management instance.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
In Tenable Vulnerability Management, you can export the Tenable Lumin dashboard landing page.
- 173 -
3. From the drop-down menu, select one of the following options:
Once the export completes, a Success message appears and Tenable Vulnerability
Management downloads the export file to your computer. Depending on your browser
settings, your browser may notify you that the download is complete.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
In Tenable Vulnerability Management, you can export individual widgets from the Tenable Lumin
dashboard.
Note: You cannot export the Cyber Exposure Score by Business Context widget.
2. In the header of the widget you want to export, click the button.
- 174 -
3. From the drop-down menu, select one of the following options:
Once the export completes, a Success message appears and Tenable Vulnerability
Management downloads the export file to your computer. Depending on your browser
settings, your browser may notify you that the download is complete.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Larger organizations may have business units that span multiple industries, or that don't fit neatly
into one industry categorization. By selecting the most applicable industry benchmark in Tenable
Lumin, users can maximize the relevancy of their data and more accurately track how their Tenable
Lumin metrics compare with others across similar industries.
- 175 -
1. In the upper-left corner, click the button.
4. In the Benchmark section, from the Industry drop-down, select the industry benchmark you
want to use across the Tenable Lumin dashboard.
5. Click Save.
2. Click Confirm.
- 176 -
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
l Assessment Maturity
l Remediation Maturity
l Mitigations
Note: All Tenable Lumin data reflects all assets within the organization's Tenable Vulnerability Management
instance.
- 177 -
This widget summarizes the CES for your entire organization compared to Tenable customers in
your Salesforce industry and the larger population.
l View a visual representation of your CES compared to the average CES for Tenable customers
in your Salesforce industry and the larger population.
l View a summary statement about whether your CES recently increased or decreased.
The Tenable Lumin Cyber Exposure Score details panel appears. For more information, see
CES Details.
- 178 -
Time Frame Assets
Past 90 days at each point on the graph, Licensed assets for your entire
recalculated daily organization
This widget graphs the increases and decreases to your CES and to the average CES for Tenable
customers in your Salesforce industry and the larger population.
l To view details about an industry or population CES value on a specific date, hover over a
point on the graph.
l To view details about your CES value on a specific date, click a point on the You line.
The Tenable Lumin Cyber Exposure Score details plane appears. For more information, see
CES Details.
l To show or hide data for your organization, the industry, or the population, click the boxes in
the graph legend.
The system updates the widget to show or hide the data you selected.
- 179 -
Time Frame Assets
l View the expected CES reduction if you address all top 20 recommended actions.
l View the number of vulnerability instances you would eliminate if you addressed all top 20
recommended actions.
l To view details about your top 20 recommended actions, click See Top Recommended
Actions.
The Tenable Lumin Recommended Actions page appears. For more information, see View
Recommended Actions.
Assessment Maturity
- 180 -
How frequently and thoroughly are you scanning your assets?
This widget summarizes the Assessment Maturity grade for your entire organization compared to
Tenable customers in your Salesforce industry and the larger population.
Important: Your Assessment Maturity and Remediation Maturity scores may have recently changed due to
data migration and algorithm changes within Tenable Lumin. This is expected behavior. For more
information, contact your Tenable representative.
l View your Assessment Maturity grade compared to the average Assessment Maturity grade
for Tenable customers in your Salesforce industry and the larger population.
l View a summary statement about whether your Assessment Maturity grade recently increased
or decreased.
l To view historical details about your Assessment Maturity grade, hover over a point on the
graph.
The hover text provides historical data about the Assessment Maturity grade.
l To view more details about your Assessment Maturity grade, click More Details.
- 181 -
The Tenable Lumin Assessment Maturity page appears. For more information, see View
Assessment Maturity Details.
Remediation Maturity
How quickly and thoroughly are you remediating vulnerabilities on your assets?
Important: Your Assessment Maturity and Remediation Maturity scores may have recently changed due to
data migration and algorithm changes within Tenable Lumin. This is expected behavior. For more
information, contact your Tenable representative.
This widget summarizes the Remediation Maturity grade for your entire organization compared to
Tenable customers in your Salesforce industry and the larger population.
l View your Remediation Maturity grade compared to the average Remediation Maturity grade
for Tenable customers in your Salesforce industry and the larger population.
l View a summary statement about whether your Remediation Maturity grade recently
increased or decreased.
- 182 -
l To view historical details about your Remediation Maturity grade, hover over a point on the
graph.
The hover text provides historical data about the Remediation Maturity grade.
l To view more details about your Remediation Maturity grade, click More Details.
The Tenable Lumin Remediation Maturity page appears. For more information, see View
Remediation Maturity Details.
This widget shows the 6 most recent cyber security alerts provided by the Tenable research team.
Tenable Lumin provides further details about how many assets are potentially impacted and a link
to the Tenable blog post for the alert, where you can view further information and any required
responses.
Note: To maintain an accurate CVE count, Tenable Lumin does not include entries from patch Tuesdays,
Oracle CPU, etc. as alerts within the Cyber Exposure Alerts widget.
- 183 -
To reduce noise within the Cyber Exposure Alerts widget, Tenable Lumin does not target specific
CVEs ( i.e., from Patch Tuesday/Oracle CPU)
l To view the severity of the alert, a brief description, and the date on which the alert was
published, roll over one of the alerts in the widget.
l To view the percentage of your assets affected by the alert (assets where one of the CVEs
associated with the alert is present as a vulnerability on the asset), roll over one of the rows in
the Assets Affected column.
If an alert has a CVE but no assets are affected, or you have not yet scanned your assets for
the vulnerability, then the Assets Affected column shows a value of 0%. If no CVE is currently
assigned to the alert, then the Assets Affected column shows a value of Pending. Once
Tenable Vulnerability Management calculates the CVE for the alert, Tenable Lumin updates
the column with the appropriate value.
l To view your vulnerabilities by asset automatically filtered by the CVE associated with the
alert, click one of the percentages in the widget.
l To view the Tenable blog post about the exposure alert, click one of the alerts in the widget.
l To view the Trending Threats page for an alert, click one of the alerts in the widget.
Mitigations
How are endpoint protection agents distributed on your assets?
- 184 -
Time Frame Assets
This widget summarizes the distribution of endpoint protection agents on your assets.
If you run an authenticated scan based on the Basic Network Scan template or Advanced Network
Scan template or an agent scan based on the Basic Agent Scan or Advanced Agent Scan template,
Tenable automatically enables the plugins required to detect mitigations present on your assets.
Tenable Lumin defines mitigations as endpoint protection agents, which include antivirus software,
Endpoint Protection Platforms (EPPs), or Endpoint Detection and Response (EDR) solutions.
l To view a list of assets in a Mitigations category, click one of the percentages in the widget.
The Assets page appears, filtered by licensed assets, the mitigations category you selected,
and the past 90 days. For more information, see View Assets.
Note: When accessing the Assets page from the Mitigations widget, you may see an asset count
notification at the top of the page. This notification indicates the number of assets you have
permission to view based on the access group to which you belong.
l To view details about the endpoint protection agents detected on your assets, click More
Details.
- 185 -
The Tenable Lumin Mitigations page appears. For more information, see View Mitigations
Details in Tenable Lumin.
Past 90 days All licensed assets to which the selected tags apply
This widget summarizes data about the CES calculated for your entire organization and for assets
with specific business context tags.
l CES — The average CES for assets with the tag. A value of N/A indicates Tenable is
calculating your CES.
l CES Trend — A visual representation of your CES change over the past 180 days. A value
of N/A indicates Tenable is processing your CES data or that there are 0 assets with
this tag.
l 14 Day Trend — A summary of how the CES increased ( ) or decreased ( ) in the past 14
days. A value of N/A indicates Tenable is processing your CES data or that there are 0
assets with this tag.
l Assessment Maturity — The Assessment Maturity grade for assets with the tag. A value
of N/A indicates there are 0 licensed assets with the tag.
To view details about your Assessment Maturity grade for assets with a specific tag, in
the Assessment Maturity column, click the grade.
- 186 -
The Tenable Lumin Assessment Maturity page appears, filtered by the tag you selected.
l Remediation Maturity — The Remediation Maturity grade for assets with the tag.
To view details about your Remediation Maturity grade for assets with a specific tag, in
the Remediation Maturity column, click the grade.
The Tenable Lumin Remediation Maturity page appears, filtered by the tag you selected.
For more information, see View Remediation Maturity Details.
l # Assets with High AES — The number of assets with the tag and a high AES.
l Reduce Tag CES — Your expected tag-level CES reduction if you resolve all the solutions
for assets with this specific tag. A value of N/A indicates your expected reduction is 5
or fewer. Typically, you cannot significantly reduce your CES if many assets were
scanned without authentication or if your assets are healthy and your risk is already low.
To view the recommended actions for assets with a specific tag, in the Reduce Tag CES
column, click See Actions.
The Tenable Lumin Recommended Actions page appears, filtered by licensed assets
and the tag you selected.
l To view details about the assets with a specific tag, click a row of the table.
The Tenable Lumin Business Context/Tag Asset Details page appears. For more information,
see View Business Context/Tag Asset Details.
- 187 -
l To reorder the tags in the widget:
a. Click and hold the button next to the tag you want to move.
c. Release the mouse button to drop the tag in the new location.
l To add a tag to the widget, click the Add Tag button and specify the tag you
want to add.
4. Click Save.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Use this page to browse CES details for your organization, or for assets with a specific business
context tag.
- 188 -
3. Do one of the following:
l To view current CES details, in the Cyber Exposure Score widget, click the
CES value.
l To view historical CES details, in the Cyber Exposure Score Trend widget,
- 189 -
click a past point on the graph.
l To view CES details for assets with a specific business context tag:
a. In the Cyber Exposure Score by Business Context/Tag widget, click the tag for
which you want to view asset details.
The Tenable Lumin Business Context/Tag Asset Details page appears, filtered by
the tag you selected.
- 190 -
Note: All Tenable Lumin data reflects all assets within the organization's Tenable Vulnerability
Management instance.
- 191 -
Score Past 90 days Licensed l View the CES for your
assets entire organization and
the average CES for
other Tenable customers
in your Salesforce
industry and the larger
population.
Note: This
section only
appears if the
algorithm update
- 192 -
affected your
CES score.
o Asset Composition
Change — Asset
license changes,
assets depth
changes, etc.
o Vulnerability
Composition
Change —
Remediation of
vulnerabilities, the
discovery of new
vulnerabilities, etc.
o Asset Exposure
and ACR Change —
Any changes to
your AES or ACR
Assets (#) All time Licensed and l View the total number of
- 193 -
(Visible only when unlicensed assets.
viewing current assets l For each ACR category,
CES details)
view the following
information:
o The percentage of
assets with critical,
high, medium, and
low ACR values.
Tip: The
percentages do
not total to 100%
if any of your
assets are
unscored.
- 194 -
) or decreased (
) during that time.
Vulnerabilities (#) All time Licensed and l View the total number of
unlicensed vulnerabilities present on
(Visible only when
assets the assets.
viewing current
CES details) l For each VPR category,
view the following
information:
o The percentage of
vulnerabilities with
critical, high,
medium, and low
VPR values.
Tip: The
percentages do
not total to 100%
if any of your
assets are
unscored.
- 195 -
of vulnerabilities
with critical, high,
medium, and low
VPR values.
o If the number of
vulnerabilities with
critical, high,
medium, and low
VPR values
increased or
decreased in the
past 14 days, the
amount by which
the percentage of
vulnerabilities and
the total number of
vulnerabilities has
increased ( ) or
decreased ( )
during that time.
l To view a list of
vulnerabilities in a VPR
category, click a
percentage.
- 196 -
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Tenable calculates a dynamic Assessment Maturity grade that represents your overall scanning
depth and frequency. For more information, see Assessment Maturity.
Important: Your Assessment Maturity and Remediation Maturity scores may have recently changed due to
data migration and algorithm changes within Tenable Lumin. This is expected behavior. For more
information, contact your Tenable representative.
The Assessment Maturity page appears and, by default, shows details for your entire
organization.
- 197 -
3. (Optional) To change the tag filter applied to the page, in the upper left corner, select a tag
from the drop-down list.
Note: All Tenable Lumin data reflects all assets within the organization's Tenable Vulnerability Management
instance.
- 198 -
l To view a list of your licensed
assets impacting your
Assessment Maturity, click
<count> Licensed Assets.
Maturity Score Past 90 days at Licensed This widget graphs the increases
Trend each point on assets and decreases to your Assessment
the graph, Maturity grade and to the average
How is your
recalculated Assessment Maturity grade for
Assessment
daily Tenable customers in your
Maturity grade
Salesforce industry and the larger
changing over
population.
time?
l To view details about an
Assessment Maturity grade on
a specific date, hover over a
point on the graph.
- 199 -
Assessment Maturity grade.
- 200 -
decreased.
- 201 -
Frequency Grade Past 90 days Licensed This widget summarizes the
assets Assessment Maturity frequency
Are you scanning
grade for your entire organization,
your assets
compared to Tenable customers in
frequently
your Salesforce industry and the
enough?
larger population.
Asset Scan Past 90 days Licensed This widget graphs the percentage
Frequency assets of your assets that Tenable
Vulnerability Management scans
How often are you
- 202 -
scanning your daily, weekly, monthly, and
assets? quarterly, compared to Tenable
customers in your Salesforce
industry and the larger population.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Tenable calculates a dynamic Remediation Maturity grade that represents your overall vulnerability
remediation responsiveness and coverage. For more information, see Remediation Maturity.
Important: Your Assessment Maturity and Remediation Maturity scores may have recently changed due to
data migration and algorithm changes within Tenable Lumin. This is expected behavior. For more
information, contact your Tenable representative.
- 203 -
To view Remediation Maturity details for all assets:
3. (Optional) To change the tag filter applied to the page, in the upper left corner, select a tag
from the drop-down list.
Note: All Tenable Lumin data reflects all assets within the organization's Tenable Vulnerability Management
instance.
- 204 -
l View a visual representation
of your Remediation
Maturity compared to the
average Remediation
Maturity for Tenable
customers in your
Salesforce industry and the
larger population.
Maturity Score Past 90 days at Licensed This widget graphs the increases
Trend each point on assets and decreases to your
the graph, Remediation Maturity grade and
How is your
- 205 -
Remediation Maturity recalculated to the average Remediation
grade changing over daily Maturity grade for Tenable
time? customers in your Salesforce
industry and the larger
population.
- 206 -
population.
- 207 -
legend.
- 208 -
l View a visual representation
of your remediation
coverage grade compared
to the average remediation
coverage grade for Tenable
customers in your
Salesforce industry and the
larger population.
- 209 -
data you selected.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
You can use this page to view details about assets with a specific business context tag.
- 210 -
l Add tags to assets, as described in Add a Tag to an Asset.
3. (Optional) To change the tag filter applied to the page, in the upper left corner, select a tag
from the drop-down list.
Note: All Tenable Lumin data reflects all assets within the organization's Tenable Vulnerability Management
instance.
Section or
Timeframe Assets Action
Widget
Tag summary All time Licensed and l View the name of the tag.
unlicensed l View the CES calculated
assets with the
for assets with the tag.
tag applied
Cyber Exposure Past 90 days at Licensed assets This widget graphs the
- 211 -
Score Trend each point on the with the tag increases and decreases to your
graph, applied tag-specific CES compared to
How has the
recalculated daily the average organization-wide
overall risk for
CES for Tenable customers in
this business
your Salesforce industry and
context changed
the larger population.
over time?
Note: Newly added tags may
take up to 14 days before
displaying CES trending
information.
- 212 -
population, click the
boxes in the graph legend.
Asset Criticality Past 90 days Licensed and This widget visualizes the
Rating unlicensed percentage of your assets in
- 213 -
Breakdown assets with the each ACR category.
tag applied
How critical are l View the total number of
my assets? scanned assets on your
network.
Asset Scan Past 90 days Licensed and This widget summarizes your
Distribution unlicensed asset scan distribution during
assets with the the past 90 days.
What percentage
tag applied
of your assets Authenticated Scans are run by
are scanned with a non-agent scanner with
different credentialed scanning
methods? configured. Agent Scans are
run by agent scanners. All other
scans are Unauthenticated
Scans.
- 214 -
assets scanned on your
network in the past 90
days.
Tenable Vulnerability
Management refreshes
the widget.
- 215 -
Asset Scan Past 90 days Licensed and This widget visualizes the
Frequency unlicensed percentage of assets scanned
assets with the on your network during periods
How often are
tag applied in the past 90 days, compared
you scanning
to others in your Salesforce
your assets?
industry and the population.
Tenable Vulnerability
Management refreshes
the widget.
- 216 -
filtered by the tag,
licensed assets, the time
period you selected, and
the ACR category filter
applied to the widget. For
more information, see
View Assets.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
If you run an authenticated scan based on the Basic Network Scan template or Advanced Network
Scan template or an agent scan based on the Basic Agent Scan or Advanced Agent Scan template,
Tenable automatically enables the plugins required to detect mitigations present on your assets.
Tenable Lumin defines mitigations as endpoint protection agents, which include antivirus software,
Endpoint Protection Platforms (EPPs), or Endpoint Detection and Response (EDR) solutions.
Then, you can use Tenable Lumin Mitigations data to assess whether your assets are covered
properly with the endpoint protection agent software.
You must enable certain plugins in your authenticated and agent scans to detect endpoint
protection agents on your assets. For more information, see Plugins for Mitigation Detection.
- 217 -
1. In the upper-left corner, click the button.
Note: All Tenable Lumin data reflects all assets within the organization's Tenable Vulnerability Management
instance.
Section Action
Date range Change the date range for the mitigations table. For more information, see
selector Tenable Vulnerability Management Tables.
Search box Search the mitigations table by product name. For more information, see
Tenable Vulnerability Management Tables.
- 218 -
o All Assets — The total number of assets with the endpoint
protection agent present.
o Critical Assets — The total number of Critical ACR assets with
the endpoint protection agent present.
o High Assets — The total number of High ACR assets with the
endpoint protection agent present.
o Version — The version of the endpoint protection agent.
o Last Detected — The date that a scan last detected the endpoint
protection agent on an asset.
l Export mitigations.
The Assets page appears, filtered by licensed assets, ACR severity, the
mitigation product name, the mitigation vendor name, the mitigation
version, and the past 90 days. For more information, see View Assets.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
To detect mitigations, you must enable the following plugins in your scan.
- 219 -
Tip: Tenable Vulnerability Management enables these plugins automatically in the following Tenable-
provided scan templates: Advanced Network Scan, Basic Network Scan, Advanced Agent Scan, Basic
Agent Scan.
ID Name
- 220 -
87923 McAfee Application Control / Change Control Installed
- 221 -
139918 ClamAV Installed (Linux)
Export Mitigations
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
You can export a list of mitigations and affected assets, if needed, to share the data with others in
your organization.
2. In the mitigations table, select the check boxes next to the mitigation or mitigations that you
want to include in the export file.
4. In the Type section, click the type of export you want to perform.
- 222 -
l CSV - Mitigations — A single .csv file that includes the mitigations you selected.
l CSV - Mitigations & Assets Affected — Two .csv files that include the mitigations you
selected and the assets affected where those mitigations are present.
The export begins and Tenable Vulnerability Management downloads the export as a tar.gz
package. For more information about the data in the export files, see Mitigations Export File
Contents.
What to do next:
l To download previously exported mitigation data, see View and Download Exported
Mitigations.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
You can export mitigations from the Mitigations page. Your export files contain the following data.
vendor_name The name of the vendor that maintains the endpoint protection agent.
all_assets The total number of assets with the endpoint protection agent
present.
critical_assets The total number of Critical ACR assets with the endpoint protection
agent present.
high_assets The total number of High ACR assets with the endpoint protection
agent present.
last_detected The date that a scan last detected the endpoint protection agent on an
asset.
- 223 -
mitigations_detail.csv — the Affected Assets file
vendor_name The name of the vendor that maintains the endpoint protection agent.
last_detected The date that a scan last detected the endpoint protection agent on an
asset.
acr_severity The ACR category of the ACR calculated for the asset.
aes_severity The AES category of the AES calculated for the asset.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
After you export mitigation or affected assets files, you can view and download them. You cannot
view or download export files generated by other users.
- 224 -
To view and download mitigation and affected asset exports files:
3. In the exports table, click the row for the export you want to download.
Tenable Vulnerability Management downloads the export file as a tar.gz package. For
information about the data in the export files, see Mitigations Export File Contents.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Tenable provides a list of top recommended actions (solutions) for assets on your network,
regardless of your access group permissions. You can identify solutions, then drill into the solution
details to understand the steps to address the vulnerability on your network.
To generate the top recommended actions, Tenable Lumin looks for the plugins that, if remediated
for all licensed assets, have the biggest effect on your CES. If plugins are related, remediating one
may affect other plugins.
Addressing vulnerabilities on your network lowers your CES and AES metrics.
To view the top recommended solutions for all assets on your network:
- 225 -
2. In the left navigation plane, click Lumin.
3. In the Actions to Reduce CES widget, click See Top Recommended Actions.
The Tenable Lumin Recommended Actions page appears. The table sorts your top solutions
(up to 20) by VPR category (Critical to Low) and then by decreasing Assets Affected.
4. (Optional) To change the tag filter applied to the page, in the upper left corner, select a tag
from the drop-down list.
Section Action
Summary bar View summary statistics about the expected impact if you address all the
solutions in the Recommended Actions table.
- 226 -
l CVEs — The number of individual Common Vulnerabilities and
Exposures (CVEs) addressed by the solution.
l Exploit Code Maturity — The key driver value for the highest
VPR for the vulnerabilities addressed by the solution.
The Solution Details page appears. For more information, see View
Solution Details.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
You can export a list of recommended actions (solutions) and affected assets, if needed, to share
the data with others in your organization.
- 227 -
1. Navigate to one the Tenable Lumin Recommended Actions page, as described in View
Recommended Actions.
2. In the table, select the check boxes next to the recommended actions that you want to
include in the export file.
4. In the CSV section, select the check box for the recommended action data you want to
export:
l Solutions — A .csv file that includes the recommended actions you selected. This check
box is selected by default.
l Details — A .csv file that includes the recommended actions you selected as well as
additional details about those solutions.
The export begins and Tenable Vulnerability Management downloads the export as a tar.gz
package. For information about the data in the export files, see Recommended Actions Export
File Contents.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
You can export recommended actions (solutions) from two recommended action pages. The export
contents from each page are unique to that page.
- 228 -
Recommended Actions Export for a Group of Assets
If you export recommended actions and assets affected files from the Recommended Actions page
for a group of assets, your export files contain the following data.
cve_instance_ The total number of vulnerability instances on this asset addressed by the
count solution.
assets_ The total number of assets affected by the vulnerabilities addressed by the
affected solution.
vpr The highest VPR for the vulnerabilities addressed by the solution.
cvss The highest CVSSv2 score (or CVSSv3 score, when available) for the
- 229 -
vulnerabilities addressed by the solution.
acr_severity The ACR category of the ACR calculated for the asset.
aes_severity The AES category of the AES calculated for the asset.
vuln_instance_ The total number of vulnerability instances on this asset addressed by the
count solution.
- 230 -
summary A description for the solution.
exploit_code_ The key driver value for the highest VPR for the vulnerabilities addressed
maturity by the solution.
vpr The highest VPR for the vulnerabilities addressed by the solution.
cvss The highest CVSSv2 score (or CVSSv3 score, when available) for the
vulnerabilities addressed by the solution.
- 231 -
Scans
You can create, configure, and manage scans in Tenable Vulnerability Management.
Section Description
Manage Scans Create, import, and launch scans. View and manage scans and scan
results.
Scans (Unified Create, launch, and manage Tenable Vulnerability Management and
Configuration) Tenable Web App Scanning scans in the Tenable Vulnerability
Overview Management unified user interface.
Sensors Link your sensors, such as Tenable Nessus scanners, Tenable Nessus
Agents, and Tenable Nessus Network Monitors, to Tenable Vulnerability
Management.
Note: For information about scanning in Tenable Web App Scanning, see the Tenable Web App Scanning
Getting Started Guide.
Note: For information about scanning in Tenable Container Security, see Tenable Container Security
Scanner Scanning Overview.
Manage Scans
To manage your Tenable Vulnerability Management and Tenable Web App Scanning scans in the
unified Scans user interface, see Scans Overview.
To manage your Tenable Web App Scanning scans in Tenable Web App Scanning, see the Tenable
Web App Scanning Getting Started Guide.
Scans Overview
The Scans page allows you to create, launch, and configure Tenable Vulnerability Management
scans and Tenable Web App Scanning scans.
- 232 -
Many of the Scans workflows and procedures are similar to the legacy Vulnerability Management >
Scans and Web App Scanning > Scans pages, but we have provided updated help topics that match
the new Scans user interface:
Create a Scan
In Tenable Vulnerability Management, you can create scans using scan templates. For general
information about templates and settings, see Scan Templates and Settings.
When you create a scan, Tenable Vulnerability Management assigns you owner permissions for the
scan.
Tip: To quickly target specific vulnerabilities that previous scans have identified on your assets, create a
Tenable Vulnerability Management remediation scan.
Note: Tenable Vulnerability Management excludes PCI Quarterly External scan data from dashboards,
reports, and workbenches intentionally. This is due to the scan's paranoid nature, which may lead to false
positives that Tenable Vulnerability Management would otherwise not detect. For more information, see
Tenable PCI ASV Scans.
l If you want to create a scan from a user-defined template, create a user-defined template as
described in Create a User-Defined Template.
l Create an access group for any targets you want to use in the scan and assign Can Scan
permissions to the appropriate users.
To create a scan:
3. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
- 233 -
This also determines whether you are creating a Tenable Vulnerability Management or Tenable
Web App Scanning scan.
4. In the upper-right corner of the page, click the Create a Scan button.
l If you are creating a Tenable Vulnerability Management scan, use the following
procedure:
a. Click the Nessus Scanner, Nessus Agent, or User Defined tab to view available
templates for your scan.
Note: Users with Scan Operator permissions can see and use only the user-defined
templates shared with their account.
b. Click the tile for the template you want to use for your scan.
Tab Action
- 234 -
l Assessment Settings — Specifies how a scan
identifies vulnerabilities, as well as what
vulnerabilities are identified. This includes
identifying malware, assessing the
vulnerability of a system to brute force
attacks, and the susceptibility of web
applications.
l If you want to save and launch the scan immediately, click Save & Launch.
Note: If you scheduled the scan to run at a later time, the Save & Launch option
is not available.
l If you are creating a Tenable Web App Scanning scan, use the following procedure:
- 235 -
a. Click the Web Application or User Defined tab to view available templates for your
scan.
Note: Users with Scan Operator permissions can see and use only the user-defined
templates shared with their account.
b. Click the tile for the template you want to use for your scan.
Tab Action
Scope Specify the URLs and file types that you want to include in
or exclude from your scan. For more information, see
Scope Settings in Tenable Web App Scanning Scans.
- 236 -
l If you want to save without launching the scan, click Save.
l If you want to save and launch the scan immediately, click Save & Launch.
Note: If you scheduled the scan to run at a later time, the Save & Launch option
is not available.
View Scans
Tenable Vulnerability Management defines Archived as any individual scan results that are older
than 35 days. For scan results that are younger than 35 days, you can view and export the results in
Tenable Vulnerability Management. For archived scan results, you can export the results, but cannot
view them in Tenable Vulnerability Management. This limitation applies to both imported scan
results and scan results that Tenable Vulnerability Management collects directly from scanners.
After 15 months, Tenable Vulnerability Management removes the scan data entirely.
You can view configured and imported scans. If you have appropriate permissions, you can also
perform actions to manage the scans.
3. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
4. In the Folders section, click a folder to load the scans you want to view.
- 237 -
The scans table updates to display the scans in the folder you selected.
For more information about scan folders, see Organize Scans by Folder.
Section Action
Search box Search the table by scan name or status. For more information, see
Tenable Vulnerability Management Tables.
Create In the upper-right corner, click the Create Scan button to create a new
Scan scan.
button
Tools In the upper-right corner, click the Tools button. A menu appears with
button the following options:
l Manage Sensors
l Manage Credentials
l Manage Exclusions
l Last Run — The date and time the scan was last run.
- 238 -
l Sort, increase or decrease the number of rows per page, or navigate
to another page of the table. For more information, see Tenable
Vulnerability Management Tables.
l Launch a scan.
You can view scan results for scans you own and scans that were shared with you.
l You can view details for an individual scan based on the permissions configured for the scan.
However, when you view aggregated scan results in dashboards and other analysis views (for
example, the Vulnerabilities or Assets tables), your access is based on the access groups you
belong to.
l Tenable Vulnerability Management defines Archived as any individual scan results that are
older than 35 days. For scan results that are younger than 35 days, you can view and export
the results in Tenable Vulnerability Management. For archived scan results, you can export the
results, but cannot view them in Tenable Vulnerability Management. This limitation applies to
both imported scan results and scan results that Tenable Vulnerability Management collects
directly from scanners. After 15 months, Tenable Vulnerability Management removes the scan
data entirely.
l When you view results from the latest run of the scan, Tenable Vulnerability Management
categorizes the scan as Read. The Read status is specific to your user account only. You can
- 239 -
also manually change the read status.
l Tenable Vulnerability Management retains scan data for 15 months. If you want to store scan
data for longer than 15 months, you can export the scan data for storage outside of Tenable
Vulnerability Management.
l You can view a maximum of 5,000 rows at a time in the Vulns by Asset table.
3. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
4. In the Folders section, click a folder to load the scans you want to view.
The scans table updates to display the scans in the folder you selected.
5. In the scan table, click the scan where you want to view details.
The scan details plane appears below the scan table. By default, this plane shows details for
the latest run of the scan.
Section Action
- 240 -
l Copy a scan.
See All Details button Click the See All Details button to open the Scan
Details page and view the scan's vulnerabilities and
affected assets, target information, and scan history.
You can also use the Scan Details page to export the
scan, edit the scan configuration, move the scan to the
trash folder, and submit the scan for PCI validation.
Table header
l (Rollover scans only) Download a list of a rollover
scan's remaining targets.
Severity summaries
The number of vulnerabilities with a Critical, High,
Medium, and Low severity in the scan results.
- 241 -
l Scanner — The scanner that performed the scan.
Note: This tab does not appear for scan results older
than 35 days.
- 242 -
per page, or navigate to another page of the
table, see Tenable Vulnerability Management
Tables.
Audit tab
View compliance audit check results. This tab only
appears if the scan results include data from
compliance audit checks.
Tip: This tab does not appear for scan results older than
35 days.
- 243 -
identified.
Summary tab
(Rule-based scans only) Shows the scan's description,
triggers, an explanation of rule-based scanning, and a
link to the vulnerabilities workbench.
Tip: This tab does not appear for scan results older than
35 days.
- 244 -
o FQDN
o IPv4 address
- 245 -
information, see View Asset Details.
Warnings tab
View warnings about problems Tenable Vulnerability
Management or the scanner encountered while running
the scan. This tab only appears if Tenable Vulnerability
Management or the scanner encountered an issue
while running the scan.
Tip: This tab does not appear for scan results older than
35 days.
Remediations tab
View remediation details.
History tab
View the scan history.
This tab contains a table listing each time the scan has
run. For the scan run currently displaying in the Scan
- 246 -
Details page, Tenable Vulnerability Management adds
the label Current to the run. By default, the latest scan
run is labeled Current.
- 247 -
you selected as Current and updates the Scan
Details section to show data for the selected run.
In this section, you can view the date and time when
the scan Started, Completed, and when it was
Modified, Canceled, or manually Aborted.
Scan Duration section The amount of time elapsed between the start and end
of the scan.
You can view a scan's vulnerability details by plugin or by asset (Tenable Vulnerability Management
scans only) from the Scans section.
- 248 -
1. In the upper-left corner, click the button.
4. In the Folders section, click a folder to load the scans you want to view.
The scans table updates to display the scans in the folder you selected.
5. In the scans table, click the scan where you want to view details.
The scan details plane appears below the scan table. By default, this plane shows details for
the latest run of the scan.
6. In the scan details plane, click the See All Details button.
The Scan Details page appears. The Vulns by Plugin tab shows by default.
7. If you would rather view vulnerabilities by the affected asset, click the Vulns by Asset tab.
Note: You can view a maximum of 5,000 rows at a time in the Vulns by Asset table.
8. From either the Vulns by Plugin tab or the Vulns by Asset tab, do one of the following:
l On the Vulns by Plugin tab, click a vulnerability to view its details. For more information,
see View Vulnerability Details.
l On the Vulns by Asset tab, click an asset row to view its vulnerability details. For more
information, see View Asset Details.
Scan Filters
- 249 -
On the Scans page, you can filter scans using Tenable-provided filters. The Tenable Vulnerability
Management scan view allows you to filter by scan status, and the Tenable Web App Scanning scan
view allows you to filter by multiple values.
Filter Description
Created Date (Tenable Web App The date the scan configuration was created.
Scanning scans only)
Finalized Date (Tenable Web App The date on which the scan last completed.
Scanning scans only)
Last Modified Date (Tenable Web App The date on which the scan configuration was last
Scanning scans only) modified.
Last Scanned Date (Tenable Web App The date on which the scan was last ran.
Scanning scans only)
Name (Tenable Web App Scanning The name of the scan configuration.
scans only)
Schedule (Tenable Web App Scanning Whether a scan schedule is enabled or on demand.
scans only)
Target (Tenable Web App Scanning The target URL used to launch the scan.
scans only)
Template (Tenable Web App The Tenable-provided scan template the scan
Scanning scans only) configuration was based on.
User Template (Tenable Web App The user-defined scan template the scan
Scanning scans only) configuration was based on.
Launch a Scan
- 250 -
In addition to configuring a scan's Schedule settings to launch the scan at scheduled times, you can
launch a scan manually. You can only launch a new scan when the previous scan has the Completed,
Aborted, or Canceled status (for more information, see Scan Status).
Alternatively, you can launch a rollover scan to scan the remaining targets of a previous scan that
ended prematurely (for more information, see Launch a Rollover Scan). You can also launch a
remediation scan to run a follow-up scan against existing scan results (for more information, see
Launch a Remediation Scan).
Note: To learn more about scan limitations in Tenable Vulnerability Management, see Scan Limitations.
Launch a Scan
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
Use the following steps to launch a scan manually. You can launch the scan using the targets as
configured in the scan, or you can launch the scan with custom targets that override the configured
targets.
To launch a scan:
3. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
4. In the Folders section, click a folder to load the scans you want to view.
The scans table updates to display the scans in the folder you selected.
For more information about scan folders, see Organize Scans by Folder.
- 251 -
5. In the scans table, roll over the scan you want to launch.
l To launch the scan using the targets as configured in the scan, click the button in the
row.
l If you have previously launched the scan and want to use custom targets that override
the configured targets:
c. Click Launch.
You can follow the scan's progress by checking its Scan Status on the Scans page.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
When you launch a rollover scan, the scan runs only against targets and hosts that Tenable
Vulnerability Management did not scan previously. This happens when a scan ends before scanning
all the assigned targets, which can occur when:
- 252 -
In some cases, you may see Completed scans that you can perform rollover scans for. This
indicates that even though all the assigned targets were scanned, some individual scan tasks may
have failed.
Rollover scans allow you to achieve complete scan coverage for all your assets, and you can use the
rollover feature to split up large, network-impacting scans. You can launch a rollover scan from
Scans page. Tenable Vulnerability Management marks scans that you can launch a rollover scan for
in the scan table with the Rollover tag in the Name column.
To view the remaining targets that the rollover scan will run against, see Download Rollover Targets.
If you want to restart the scan and rescan all the targets, see Launch a Scan.
3. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
4. In the Folders section, click a folder to load the scans you want to view.
The scans table updates to display the scans in the folder you selected.
For more information about scan folders, see Organize Scans by Folder.
5. In the scans table, roll over the scan you want to launch.
A menu appears.
You can follow the scan's progress by checking its Scan Status on the Scans page.
- 253 -
Launch a Remediation Scan
Required Tenable Vulnerability Management User Role: Standard, Scan Manager, or Administrator
You can create a remediation scan to run a follow-up scan against existing scan results. A
remediation scan evaluates a specific plugin against a specific scan target or targets where a
vulnerability was present in your earlier active scan.
Remediation scans allow you to validate whether your vulnerability remediation actions on the scan
targets have been successful. If a remediation scan cannot identify a vulnerability on targets where
the vulnerability was previously identified, the system changes the status of the vulnerability to
Fixed.
You can perform remediation scans for scan results from certain sensors only:
Note: To learn more about scan limitations in Tenable Vulnerability Management, see Scan Limitations.
- 254 -
1. Set the scope for the remediation scan:
- 255 -
An individual vulnerability on an To set this scope:
individual asset
a. View vulnerability details.
- 256 -
Vulnerabilities tab.
Tenable Vulnerability Management automatically creates the remediation scan from the
Tenable-provided Advanced Network Scan template and populates certain settings based on
the assets and vulnerabilities you selected.
a. Verify the settings that Tenable Vulnerability Management populated based on the
vulnerabilities and assets you selected.
- 257 -
b. Configure additional settings for the scan.
The number of manual changes you must make depends on the plugins involved in the
remediation scan.
The following table defines the inherited and default values for settings in the remediation
scan.
Setting
Setting Remediation Scan Value
Category
- 258 -
o Rebuild scanners and link new
scanners in the future without having
to update scanner designations in
scan configurations.
- 259 -
Network Scan template.
- 260 -
l the plugins you selected for remediation
scanning
l If you want to save and launch the scan immediately, click Save & Launch.
Note: If you scheduled the scan to run at a later time, the Save & Launch option is not
available.
What to do next:
l In the Remediation Scans folder on the Scans page:
o View the scan status to determine when the scan completes.
o Edit the scan configuration.
o Change the read status of the scan results.
o Launch the scan.
b. Verify that the status for the selected vulnerabilities is now Fixed on the assets that the
remediation scan targeted.
- 261 -
When you stop a scan, Tenable Vulnerability Management terminates all tasks for the scan and
categorizes the scan as canceled. The scan results associated with the scan reflect only the
completed tasks. You cannot stop individual tasks, only the scan as a whole.
3. In the scans table, roll over the scan you want to stop.
A menu appears.
5. Click Stop.
Tenable Vulnerability Management stops the scan. The Status column updates to reflect the
status of the scan.
You can pause scans that you want to stop temporarily. When you pause a scan, Tenable
Vulnerability Management pauses all active tasks for that scan and concludes the scanner's local
scan task. Paused scans do not consume scanner resources, and other scans can run while there is
a paused scan. Tenable Vulnerability Management does not dispatch new tasks from a paused scan
job. If the scan remains in a paused state for more than 14 days, the scan times out. Tenable
Vulnerability Management terminates the related tasks on the scanner and categorizes the scan as
aborted.
You can resume scans that you previously paused. When you resume a scan, Tenable Vulnerability
Management instructs the scanner to start the tasks from the point at which the scan was paused.
- 262 -
If Tenable Vulnerability Management encounters problems when resuming the scan, the scan fails,
and Tenable Vulnerability Management categorizes the scan as aborted. Tenable Vulnerability
Management does not dispatch new tasks from a paused scan job. If the scan remains in a paused
state for more than 14 days, the scan times out. Tenable Vulnerability Management terminates the
related tasks on the scanner and categorizes the scan as aborted.
Note: You can only pause and resume Tenable Vulnerability Management scans.
- 263 -
l If the scan is based on a user-defined template, assign the new owner at least Can View
permissions for that template. Otherwise, the new owner cannot view the scan configuration.
Note: Only the scan owner can change scan ownership. Therefore, if an administrator needs to change the
ownership of another user's scan, they must first assist the user with their account and then assign
ownership to the appropriate user.
3. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
4. In the Folders section, click a folder to load the scans you want to view.
The scans table updates to display the scans in the folder you selected.
5. (Optional) Search for the scan you want to edit. For more information, see Tenable
Vulnerability Management Tables.
9. In the User Permissions section, next to the permission drop-down for Owner, click the
button.
- 264 -
10. Select a user from the list.
Tenable Vulnerability Management automatically adds you to the list of users and assigns Can
View permissions to your user account.
Tenable Vulnerability Management removes your account from the list of users.
12. (Optional) Edit the Tenable Vulnerability Management permissions for your user account:
a. Next to the permission drop-down for your user account, click the button.
b. Select a permission.
Tenable Vulnerability Management assigns ownership to the selected user and assigns your
user account the permissions you selected. If you removed all permissions for your user
account from the scan, the scan no longer appears in any of your scan folders.
On the Scans page, a scan appears in bold in the scans table if you have not yet viewed (read) the
results of the latest run of the scan.
If you view the scan results, Tenable Vulnerability Management categorizes the scan as "read" and
removes the bold formatting from the scan in the scans table.
2. In the scans table, roll over the scan you want to change.
- 265 -
3. Click the button.
A menu appears.
Tenable Vulnerability Management changes the read status for the scan.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
3. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
4. In the Folders section, click a folder to load the scans you want to view.
The scans table updates to display the scans in the folder you selected.
5. (Optional) Search for the scan you want to edit. For more information, see Tenable
Vulnerability Management Tables.
- 266 -
7. Click the button next to the scan name.
8. Change the scan configuration. For more information about scan configuration settings, see
Scan Settings.
l If you want to save and launch the scan immediately, click Save & Launch.
Note: If you scheduled the scan to run at a later time, the Save & Launch option is not
available.
l Virtual machines
Note: You must provide an IPv4 address when scanning an ESXi host. Otherwise, the scan fails.
- 267 -
3. In the Targets section, type the IP address or addresses of the ESXi host or hosts.
The Credentials page appears. This page contains a table of credentials configured for the
scan.
7. In the Username box, type the username associated with the local ESXi account.
8. In the Password box, type the password associated with the local ESXi account.
9. If your vCenter host includes an SSL certificate (not a self-signed certificate), disable the Do
not verify SSL Certificate toggle. Otherwise, leave the toggle enabled.
l If you want to save and launch the scan immediately, click Save & Launch.
Note: If you scheduled the scan to run at a later time, the Save & Launch option is not
available.
Note: When scanning vCenter-managed ESXis with API credentials, the Nessus Scan information plugin
always shows Credentialed Checks: No in the vCenter scan results. To verify that the authentication
was successful, check to see that the Nessus Scan Information plugin shows Credentialed Checks:
Yes in the scan results of the ESXis.
- 268 -
Note: The SOAP API requires a vCenter admin account with read and write permissions. The REST API
requires a vCenter admin account with read permissions, and a VMware vSphere Lifecycle manager
account with read permissions.
The Credentials page appears. This page contains a table of credentials configured for the
scan.
7. In the vCenter Host box, type the IP address of the vCenter host.
8. In the vCenter Port box, type the port for the vCenter host. By default, this value is 443.
9. In the Username box, type the username associated with the vCenter account.
10. In the Password box, type the password associated with the vCenter account.
11. If the vCenter host is SSL enabled, enable the HTTPS toggle.
12. If your vCenter host includes an SSL certificate (not a self-signed certificate), enable the
Verify SSL Certificate toggle. Otherwise, leave the toggle disabled.
- 269 -
l If you want to save without launching the scan, click Save.
l If you want to save and launch the scan immediately, click Save & Launch.
Note: If you scheduled the scan to run at a later time, the Save & Launch option is not
available.
When you copy a scan configuration, Tenable Vulnerability Management assigns you owner
permissions for the copy and assigns the copy scan permissions from the original scan.
Note: You cannot copy a scan from the Remediation Scans folder.
3. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
4. In the Folders section, click a folder to load the scans you want to view.
The scans table updates to display the scans in the folder you selected.
- 270 -
5. In the scans table, roll over the scan you want to copy.
A menu appears.
7. Click Copy.
The Copy to Folder plane appears, which contains a list of your scan folders.
9. Click Copy.
Tenable Vulnerability Management creates a copy of the scan with Copy of prepended to the
name and assigns you owner permissions for the copy. The copy appears in the scans table of
the folder you selected.
You can export both imported scan results and results that Tenable Vulnerability Management
collects directly from scanners.
Tenable Vulnerability Management retains individual scan results until the results are 15 months old.
Notes:
l Filters are not applicable for Tenable Web App Scanning exports, All results will are
exported.
l For archived scan results (that is, results older than 45 days), Tenable Vulnerability
Management limits export types to .nessus and .csv files.
l When a scan is actively running, the Export button does not appear in the Tenable
Vulnerability Management interface. Wait until the scan completes, then export the scan
results.
- 271 -
1. In the upper-left corner, click the button.
3. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
4. In the Folders section, click a folder to load the scans you want to view.
The scans table updates to display the scans in the folder you selected.
Scans table a. In the scans table, roll over the scan you want to export.
A menu appears.
c. Click Export.
Note: You cannot export scan results from the Scans table if the scan has
multiple targets. For scans with multiple targets, you can export scan results
for each target from the Scan Details page.
Scan Details a. In the scans table, click the scan you want to export.
A menu appears.
c. Click Export.
- 272 -
Supported for
Format Description Archived
Scan Results
Nessus A .nessus file in XML format that contains the list of Yes
targets, scan settings defined by the user, and scan
results. Tenable Vulnerability Management strips
password credentials and does not export them as
plain text in the XML. If you import a .nessus file as a
user-defined scan template, you must re-apply your
passwords to any credentials.
- 273 -
Vulnerability Management with Tenable Security
Center.
PDF An Adobe .pdf file that contains the list of targets, n/a
scan results, and scan notes.
Nessus A .nessus file in XML format that contains the list of n/a
targets, scan settings defined by the user, and scan
results. Tenable Vulnerability Management strips
password credentials and does not export them as
plain text in the XML.
JSON A .json file that contains the list of targets, scan n/a
- 274 -
settings defined by the user, scan results, and scan
notes. Tenable Vulnerability Management strips
password credentials and does not export them as
plain text in the JSON file.
7. For Tenable Vulnerability Management scans, if you select the PDF - Custom or HTML -
Custom formats:
l Select either Assets or Plugin from the Group By list, depending on how you want to
group the scan results in the export file.
8. Click Export.
Tenable Vulnerability Management generates the export file. Depending on your browser
settings, your browser may automatically download the export file to your computer, or may
prompt you to confirm the download before continuing.
Import a Scan
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
You can import scan results into Tenable Vulnerability Management. You cannot import results from
scans run more than 15 months ago.
Imported scans always belong to the default network. For more information, see Networks.
- 275 -
The Scans page appears.
A menu appears.
If the scan file is a .nessus or .db file, the Import plane appears.
Note: To learn more about the .nessus file format, see Nessus File Format.
If the scan file is any other file type, the Scan Import window appears.
b. (Optional) To show the scan results in dashboards, select the Show in Dashboard?
check box.
c. Click Import.
l If the scan file is any other file type, specify if you want the scan results to appear in
dashboards:
o Click Yes to show the scan results in dashboards.
o Click No to prevent the scan results from appearing in dashboards.
The Scans page appears, and the imported scan appears in the scans table.
Tenable Vulnerability Management begins processing the imported scan results. Once this
process is complete, the imported data appears in the individual scan details and aggregated
- 276 -
data views (such as dashboards). This process can take up to 30 minutes, depending on the
size of the import file.
Tip: If the imported data does not appear in the individual scan results or aggregated data views
after a reasonable processing time, verify that you are assigned adequate permissions for the
imported targets in access groups.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
In Tenable Vulnerability Management, the Scans page contains a Folders section that automatically
groups your configured and imported scans into default folders. To organize your scans further, you
can create custom folders.
Folder Description
This folder appears by default when you access the Scans page.
Remediation Contains any remediation scans you own or that another user has
- 277 -
Scans shared with you.
Trash Contains scans that you have moved to the trash. If you have Can
Configure permissions for a scan in this folder, you can permanently
delete the scan for all users.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
The custom scan folders you create appear only to you and cannot be shared with other users. You
are the only user who can view, rename, or delete the scan folders you create.
Note: The custom folders you create appear only to you and cannot be shared with other users.
2. In the left navigation plane, in the Vulnerability Management section, click Scans.
The New Folder box appears at the bottom of the folder list.
- 278 -
5. Click the button.
A Folder added successfully message appears and the new folder appears in the Folders
section.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
You can move a scan from a default folder to either the My Scans default folder or a custom scan
folder. You can also move a scan from a custom folder to the My Scans default folder or a different
custom folder.
If you move a scan from the All Scans default folder, the scan appears in both the folder you select
and the All Scans folder.
If you move a scan from the My Scans default folder, the scan appears in the custom folder only.
For information about moving a scan to the trash, see Move a Scan to the Trash Folder.
Note: You cannot move scans to or from the Remediation Scans folder.
2. In the left navigation plane, in the Vulnerability Management section, click Scans.
3. In the Folders section, click a folder to load the scans you want to view.
The scans table updates to display the scans in the folder you selected.
4. In the scan table, roll over the scan you want to move.
- 279 -
5. Do one of the following:
A menu appears.
The Move to Folder plane appears. This plane contains a list of your scan folders.
The Move to Folder plane appears. This plane contains a list of your scan folders.
Tenable Vulnerability Management limits the list to folders that match your search.
7. In the folder list, click the folder where you want to move the scan.
8. Click Move.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
You can rename custom scan folders only. You cannot rename the default scan folders.
Renaming a scan folder affects your user account only, because the custom folders you create
appear only to you and cannot be shared with other users.
- 280 -
1. In the upper-left corner, click the button.
2. In the left navigation plane, in the Vulnerability Management section, click Scans.
3. In the Folders section, roll over the folder you want to rename.
Tenable Vulnerability Management updates the folder name and a Folder updated
successfully message appears.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
You can delete custom scan folders only. You cannot delete the default scan folders that Tenable
Vulnerability Management provides (All Scans, My Scans, and Trash).
Deleting a scan folder affects your user account only, because the custom folders you create
appear only to you and cannot be shared with other users.
If you delete a scan folder that contains inactive scans, Tenable Vulnerability Management moves
the folder's scans to the Trash folder. If you delete a scan folder that contains at least one active
(Pending or Running) scan, Tenable Vulnerability Management moves the folder's scans to the My
Scans folder.
- 281 -
1. In the upper-left corner, click the button.
2. In the left navigation plane, in the Vulnerability Management section, click Scans.
3. In the Folders section, roll over the folder you want to delete.
When you move a shared scan to the Trash folder, Tenable Vulnerability Management moves the
scan for your account only. The scan remains in the original folder for all other users who have Can
View permissions or higher for the scan.
Scans moved to the Trash folder also appear in the All Scans folder, marked with the label, Trash.
Note: After you move a scan to the Trash folder, the scan remains in the Trash folder until a user with Can
Edit permissions permanently deletes the scan.
Note: Scheduled scans do not run if they are in the scan owner's Trash folder.
l For more information about Tenable Vulnerability Management scan schedules, see
Schedule.
l For more information about Tenable Web App Scanning scan schedules, see Schedule.
Note: You cannot move scans from the Remediation Scans folder to the Trash folder. Instead, delete
remediation scans directly in the folder.
- 282 -
To move a scan or scans to the Trash folder:
3. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
4. In the Folders section, click the folder that contains the scan you want to move.
l
Select a single scan:
a. In the scans table, roll over the scan you want to move.
A menu appears.
c. Click Trash.
l
Select multiple scans:
a. In the scans table, select the check box next to each scan you want to move.
Tenable Vulnerability Management moves the scan or scans you selected to the Trash
folder.
Delete a Scan
When you permanently delete a scan, you delete the scan configuration and scan results for all
users the scan is shared with.
- 283 -
The workflow for deleting a remediation scan differs from the workflow described in this procedure.
For more information, see the Delete a remediation scan steps at the end of this topic.
Caution: After you delete a scan, you cannot recover the scan or any scan data associated with the scan.
Delete only scans you are certain you no longer need to view or run.
To delete a scan:
3. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
The scan table updates to show the scans in the trash folder.
l
Select a single scan:
a. In the scans table, roll over the scan you want to delete.
A menu appears.
c. Click Delete.
l
Select multiple scans:
- 284 -
a. In the scans table, select the check box next to the scans you want to delete.
When you delete a remediation scan, you delete the scan configuration and scan results for all
users the scan is shared with.
Note: The Remediation Scans folder only shows for Tenable Vulnerability Management scans.
The scan table updates to show remediation scans that you own or that other users have
shared with you. By default, the rows are sorted by Created Date.
- 285 -
l
Select a single scan:
a. In the scans table, roll over the scan you want to delete.
A menu appears.
c. Click Delete.
l
Select multiple scans:
a. In the scans table, select the check box next to the scans you want to delete.
Note: Tenable Vulnerability Management keeps up to 10,000 of the most recent remediation scan
results. Once you have more than 10,000 remediation scan results, Tenable Vulnerability
Management deletes the scan results, starting with the oldest result.
For information about how discovered and assessed assets are counted towards your license, see
Tenable Vulnerability Management Licenses.
- 286 -
l a scan configured with the your license.
Host Discovery template.
Authenticated Scans
- 287 -
login account (e.g., root or
administrator access), the more
thorough the scan results.
Unauthenticated Scans
This licensing exception allows you to discover assets on your network without the large number of
assets counting towards your license limit. After you discover your assets, you can then identify
which assets have not yet been assessed for vulnerabilities, and choose which of those assets you
want to scan and manage going forward.
- 288 -
1. Discover assets using any of the following methods:
l Configure Tenable Nessus Network Monitor with discovery mode enabled, linked to
Tenable Vulnerability Management.
l Configure a connector.
Assets discovered by these methods do not count towards your asset license limit until they
have been assessed for vulnerabilities.
a. Click Apply.
Tenable Vulnerability Management filters for assets that have not yet been assessed for
vulnerabilities.
Note: Unassessed assets (where Asset Assessed is equal to false) can differ from unlicensed
assets (where Is Licensed (VM) is equal to false). Once you scan an asset for vulnerabilities,
Tenable Vulnerability Management categorizes the asset as assessed from that point on, but
the licensing status of an asset can change over time as assets are deleted or age out of your
organization's license count.
3. (Optional) Tag assets to identify assets that have not been assessed.
b. Manually apply the tag to assets, or create tag rules that automatically filter for assets
that have not been assessed.
- 289 -
For example, to create a dynamic tag for assets that have not yet been assessed, set
the tag rules to filter for Asset Assessed is equal to false.
4. (Optional) Create a scan to target assets using the tag you created.
Scan Failovers
If Tenable Vulnerability Management assigns a scan job to a scanner, and the scanner goes offline
while scanning, the following happens:
1. The scan job times out if the assigned scanner does not respond to Tenable Vulnerability
Management after two hours.
2. Tenable Vulnerability Management removes the scan job from the scanner and attempts the
scan job on another scanner in the same scanner group, or on the same scanner if it comes
back online.
3. Tenable Vulnerability Management attempts steps 1 and 2 three times. If the scan job is not
completed after three attempts, Tenable Vulnerability Management aborts the scan job.
Scan Status
Tenable Vulnerability Management provides a scan status for each of your configured scans.
If the scan is in progress, Tenable Vulnerability Management shows the number of scan tasks
completed as a percentage.
For example, if you scan less than 120 IP addresses in a single scan, Tenable Vulnerability
Management creates a single scan task and the progress percentage changes from 0% to 100%
when it completes.
However, if you target more than 120 IP addresses, Tenable Vulnerability Management creates
multiple scan tasks. After each task completes, the percentage changes to reflect the number of
completed tasks. For example, a scan that targets 300 IP addresses is split into three scan tasks,
and as each task completes, the progress bar updates the percentage to reflect the completed
tasks.
Note: Pausing a scan causes Tenable Vulnerability Management to move any completed results to
processing. When you resume the scan, Tenable Vulnerability Management creates a new scan task or
tasks for incomplete results. Therefore, pausing a scan can cause the progress percentage to update.
- 290 -
Tip: For Tenable Vulnerability Management scans, you can hover over the scan status to view more status
information in a pop-up window, such as the number of targets scanned and the elapsed or final scan time.
The window shows different information based on the scan's current status.
Tenable Vulnerability Management scans can have the following status values:
Status Description
Tip: The typical Tenable Vulnerability Management scan status flow is as follows: Initializing, Running,
Publishing Results, Completed.
Aborted Either the latest run of the scan is incomplete because Tenable Vulnerability
Management or the scanner encountered problems during the run, or the
scan remained queued without running for four or more hours. For more
information about the problems encountered during the run, view the scan
warnings.
Empty The scan is either empty (the scan is new or has yet to run) or pending
(Tenable Vulnerability Management is processing a request to run the scan).
Imported A user imported the scan. You cannot run imported scans. Scan history is
unavailable for imported scans.
Pausing A user paused the scan, and Tenable Vulnerability Management is processing
the action.
- 291 -
Status Description
Pending Tenable Vulnerability Management has the scan queued to launch and is
assigning scan tasks to the assigned sensors.
Publishing Tenable Vulnerability Management processes and stores the scan results
Results data for you to view and use in the Tenable Vulnerability Management user
interface. The Publishing Results status begins once the Running status
reaches 100%.
Running The scan is currently running. While this status is shown, the scan's sensors
complete their assigned scan tasks, and Tenable Vulnerability Management
processes the scan results. The progress bar shows next to the status when
a scan is running. The progress bar shows the percentage of the completed
tasks.
Stopping A user stopped the scan, the scan timed out, or Tenable Vulnerability
Management is stopping the scan after all associated scan tasks are
complete.
Scan Templates
- 292 -
Scan templates contain granular configuration settings for your scans. You can use Tenable's scan
templates to create custom scan configurations for your organization. Then, you can run scans
based on Tenable's scan templates or your custom configurations' settings.
When you create a scan configuration, the Select a Scan Template page appears. Tenable
Vulnerability Management provides separate templates for Tenable Vulnerability Management and
Tenable Web App Scanning. Within Tenable Vulnerability Management scanning, Tenable
Vulnerability Management provides separate templates for scanners and agents, depending on
which sensor you want to use for scanning:
If you have custom configurations, they appear in the User Defined tab. For more information about
user-defined templates, see User-Defined Templates.
When you configure a Tenable-provided scan template, you can modify only the settings included
for the scan template type. When you create a user-defined scan template, you can modify a
custom set of settings for your scan.
Tip: For information and tips on optimizing your Tenable Vulnerability Management scan configurations,
see the Tenable Vulnerability Management Scan Tuning Guide.
l Vulnerability Scans (Common) — Tenable recommends using vulnerability scan templates for
most of your organization's standard, day-to-day scanning needs.
l Tactical Scans — Tenable recommends using the tactical scan templates to scan your network
for a specific vulnerability or group of vulnerabilities. Tactical scans are lightweight, timely
scan templates that you can use to scan your assets for a particular vulnerability. Tenable
- 293 -
frequently updates the Tenable Vulnerability Management Tactical Scans library with
templates that detect the latest vulnerabilities of public interest, such as Log4Shell.
The following table describes the available Tenable Nessus Scanner templates:
Template Description
Advanced Network The most configurable scan type. You can configure this scan template
Scan to match any policy. This template has the same default settings as the
basic scan template, but it allows for additional configuration options.
Basic Network Performs a full system scan that is suitable for any host. Use this
Scan template to scan an asset or assets with all of Nessus's plugins enabled.
For example, you can perform an internal vulnerability scan on your
organization's systems.
Host Discovery Performs a simple scan to discover live hosts and open ports.
Launch this scan to see what hosts are on your network and associated
information such as IP address, FQDN, operating systems, and open
ports, if available. After you have a list of hosts, you can choose what
hosts you want to target in a specific vulnerability scan.
- 294 -
Note: Assets identified by discovery scans do not count toward your license.
Note: While the PCI DSS requires you to provide evidence of passing or
"clean" scans on at least a quarterly basis, you must also perform scans after
any significant changes to your network (PCI DSS 11.2.3).
Legacy Web App Uses a Tenable Nessus scanner to scan your web applications.
Scan
Note: Unlike the Tenable Web App Scanning scanner, the Tenable Nessus
scanner does not use a browser to scan your web applications. Therefore, a
Legacy Web App Scan is not as comprehensive as Tenable Web App Scanning.
Configuration Scans
- 295 -
The MDM Config Audit template reports on a variety of MDM
vulnerabilities, such as password requirements, remote wipe settings,
and the use of insecure features, such as tethering and Bluetooth.
The compliance checks can audit against custom security policies, such
as password complexity, system settings, or registry values on Windows
operating systems. For Windows systems, the compliance audits can
test for a large percentage of anything that can be described in a
Windows policy file. For Unix systems, the compliance audits test for
running processes, user security policy, and content of files.
SCAP and OVAL Audits systems using SCAP and OVAL definitions.
Auditing
The National Institute of Standards and Technology (NIST) Security
Content Automation Protocol (SCAP) is a set of policies for managing
vulnerabilities and policy compliance in government agencies. It relies on
- 296 -
multiple open standards and policies, including OVAL, CVE, CVSS, CPE,
and FDCC policies.
l When using the SCAP and OVAL Auditing template, you can
perform Linux and Windows SCAP CHECKS to test compliance
standards as specified in NIST’s Special Publication 800-126.
Tactical Scans
Active Directory Use a Domain User account to query AD identity information. This policy
Identity enumerates Active Directory identity information via LDAPS. It requires
Domain User credentials, LDAPS configuration, and an Active Directory
Domain Controller as the scan target.
CISA Alerts AA22- Performs remote and local checks for vulnerabilities from recent CISA
011A and AA22- alerts.
047A
- 297 -
ContiLeaks Performs remote and local checks for ContiLeaks vulnerabilities.
Intel AMT Security Performs remote and local checks for CVE-2017-5689.
Bypass
ProxyLogon: Performs remote and local checks to detect Microsoft Exchange Server
MS Exchange vulnerabilities related to CVE-2021-26855, CVE-2021-26857, CVE-2021-
26858, and CVE-2021-27065.
Ripple20 Remote Detects hosts running the Treck stack in the network, which may be
Scan affected by Ripple20 vulnerabilities.
Spectre and Performs remote and local checks for CVE-2017-5753, CVE-2017-5715,
Meltdown and CVE-2017-5754.
- 298 -
Zerologon Remote Detects Microsoft Netlogon elevation of privilege vulnerability
Scan (Zerologon).
l Vulnerability Scans — Tenable recommends using vulnerability scan templates for most of
your organization's standard, day-to-day scanning needs.
l Inventory Collection — Unlike standard Tenable Nessus Agent vulnerability scans, the Collect
Inventory template uses Tenable's Frictionless Assessment technology to provide faster scan
results and reduce the scan's system footprint. Agent-based inventory scans gather basic
information from a host and upload it to Tenable Vulnerability Management. Then, Tenable
Vulnerability Management analyzes the information against missing patches and
vulnerabilities as Tenable releases coverage. This reduces the performance impact on the
target host while also reducing the time it takes for an analyst to see the impact of a recent
patch.
Note: If a plugin requires authentication or settings to communicate with another system, the
plugin is not available on agents. This includes, but is not limited to:
l Patch management
l Mobile device management
l Cloud infrastructure audit
l Database checks that require authentication
The following table describes the available Tenable Nessus Agent templates:
Template Description
Vulnerability Scans
Advanced An agent scan without any recommendations, so that you can fully
Agent Scan customize the scan settings. In Tenable Vulnerability Management, the
Advanced Agent Scan template allows for two scanning methods:
l Scan Window - Specify the timeframe during which the agent must
- 299 -
Template Description
Note: When you create an agent scan using the Advanced Agent Scan template,
you must also select the plugins you want to use for the scan.
Malware Scan Scans for malware on systems connected via Tenable Nessus Agents.
Tenable Nessus Agent detects malware using a combined allow list and
block list approach to monitor known good processes, alert on known bad
processes, and identify coverage gaps between the two by flagging unknown
processes for further inspection.
SCAP and Audits systems using SCAP and OVAL definitions for systems connected via
OVAL Agent Tenable Nessus Agents.
Auditing
The National Institute of Standards and Technology (NIST) Security Content
Automation Protocol (SCAP) is a set of policies for managing vulnerabilities
- 300 -
Template Description
l When using the SCAP and OVAL Auditing template, you can perform
Linux and Windows SCAP CHECKS to test compliance standards as
specified in NIST’s Special Publication 800-126.
Inventory Collection
- 301 -
Template Description
Template Description
API A scan that checks an API for vulnerabilities. This scan analyzes RESTful APIs
described via an OpenAPI (Swagger) specification file. File attachment size is
limited to 1 MB.
Tip: If the API you want to scan requires keys or a token for authentication, you
can add the expected custom headers in the Advanced settings in the HTTP
Settings section.
Note: The API scan template is available as a public beta. Its functionality is
subject to change as ongoing improvements are made throughout the beta period.
- 302 -
Config Audit A high-level scan that analyzes HTTP security headers and other externally
facing configurations on a web application to determine if the application is
compliant with common security industry standards.
If you create a scan using the Config Audit scan template, Tenable Web App
Scanning analyzes your web application only for plugins related to security
industry standards compliance.
Log4Shell Detects the Log4Shell vulnerability (CVE-2021-44228) in Apache Log4j via local
checks.
Overview A high-level preliminary scan that determines which URLs in a web application
Tenable Web App Scanning scans by default.
The Overview scan template does not analyze the web application for active
vulnerabilities. Therefore, this scan template does not offer as many plugin
family options as the Scan template.
PCI A scan that assesses web applications for compliance with Payment Card
Industry Data Security Standards (PCI DSS) for Tenable PCI ASV.
Quick Scan A high-level scan similar to the Config Audit scan template that analyzes
HTTP security headers and other externally facing configurations on a web
application to determine if the application is compliant with common security
industry standards. Does not include scheduling.
If you create a scan using the Quick Scan scan template, Tenable Vulnerability
Management analyzes your web application only for plugins related to security
industry standards compliance.
Scan A comprehensive scan that assesses web applications for a wide range of
vulnerabilities.
The Scan template provides plugin family options for all active web
application plugins.
If you create a scan using the Scan template, Tenable Web App Scanning
analyzes your web application for all plugins that the scanner checks for when
you create a scan using the Config Audit, Overview, or SSL TLS templates, as
well as additional plugins to detect specific vulnerabilities.
- 303 -
A scan run with this scan template provides a more detailed assessment of a
web application and take longer to complete that other Tenable Web App
Scanning scans.
SSL TLS A scan to determine if a web application uses SSL/TLS public-key encryption
and, if so, how the encryption is configured.
When you create a scan using the SSL TLS template, Tenable Web App
Scanning analyzes your web application only for plugins related to SSL/TLS
implementation. The scanner does not crawl URLs or assess individual pages
for vulnerabilities.
User-Defined Templates
Tenable provides a variety of scan templates for specific scanning purposes. If you want to
customize a Tenable-provided scan template and share it with other users, you can create a user-
defined scan template.
You can create, edit, copy, export, or delete user-defined Tenable Vulnerability Management and
Tenable Web App Scanning Scan templates from the Scans page. You can also import and export
Tenable Vulnerability Management scan templates.
A menu appears.
- 304 -
The Scan Templates page appears.
5. Below Scan Templates, choose to view Vulnerability Management Scan Templates or Web
Application Scan Templates.
Click a template to view or edit its settings and parameters, or use the following procedures to
further manage your user-defined templates:
You can create user-defined scan templates to save and share custom scan settings with other
Tenable Vulnerability Management users.
When you define a scan template, Tenable Vulnerability Management assigns you owner
permissions for the scan template. You can share the scan template by assigning template
permissions to other users, but only you can delete the scan template.
3. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
4. In the upper-right corner of the page, click the Create Template button.
5. Click the tile for the template you want to use as the base for your user-defined scan
template.
- 305 -
l If you are creating a Tenable Vulnerability Management scan template, use the following
procedure:
- 306 -
a. Configure the scan template:
Tab Action
- 307 -
Plugins Select security checks by plugin family or individual
plugin.
l If you are creating a Tenable Web App Scanning scan, use the following procedure:
Tab Action
Scope Specify the URLs and file types that you want to include in
or exclude from your scan. For more information, see
Scope Settings in Tenable Web App Scanning Scans.
7. Click Save.
Tenable Vulnerability Management saves the user-defined scan template and adds it to the list
of scan templates on the Scan Templates page.
- 308 -
To edit a user-defined scan template:
3. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
A menu appears.
6. In the scan templates table, click the scan template you want to edit.
l If you are editing a Tenable Vulnerability Management scan template, use the following
procedure:
- 309 -
a. Configure the scan template options:
Tab Action
- 310 -
Plugins Select security checks by plugin family or individual
plugin.
l If you are editing a Tenable Web App Scanning scan template, use the following
procedure:
Tab Action
Scope Specify the URLs and file types that you want to include in
or exclude from your scan. For more information, see
Scope Settings in Tenable Web App Scanning Scans.
8. Click Save.
Tenable Vulnerability Management saves the user-defined scan template and adds it to the list
of templates on the Scan Templates page.
- 311 -
When you copy a user-defined scan template, Tenable Vulnerability Management assigns you owner
permissions for the copy. You can share the copy by assigning template permissions to other users,
but only you can delete the copied scan template.
3. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
A menu appears.
6. In the scans table, roll over the scan you want to launch.
A menu appears.
Note: Tenable Vulnerability Management does not export passwords, credentials, and file-based settings
(for example, .audit files and the SSH known_hosts file) in user-defined scan templates.
- 312 -
1. In the upper-left corner, click the button.
A menu appears.
6. In the scans table, roll over the scan template you want to export.
A menu appears.
Tenable Vulnerability Management exports the user-defined scan template as a .nessus file.
Note: To learn more about the .nessus file format, see Nessus File Format.
When you import a scan template, Tenable Vulnerability Management assigns you owner
permissions for the scan template. You can share the scan template by assigning template
permissions to other users, but only you can delete the scan template.
Tenable Vulnerability Management does not include passwords or compliance audit files in exported
user-defined scan templates. You must add these settings in manually after importing the scan
template.
- 313 -
1. In the upper-left corner, click the button.
A menu appears.
8. Click Open.
A Template uploaded message appears, and the scan template appears on the Scan
Templates page.
What to do next:
l As needed, add passwords and compliance audit files to the imported template.
If you delete a user-defined scan template, Tenable Vulnerability Management deletes it from all
user accounts.
- 314 -
1. In the upper-left corner, click the button.
3. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
A menu appears.
l
Select a single scan template:
a. In the scans table, roll over the scan you want to launch.
A menu appears.
l
Select multiple scan templates:
a. In the scan templates table, select the check box for each scan template you want
to delete.
- 315 -
Tenable Vulnerability Management deletes the user-defined scan template or templates you
selected.
3. In the User Permissions section, next to the permission drop-down for Owner, click the
button.
Tenable Vulnerability Management automatically adds you to the list of users and assigns Can
View permissions to your user account.
Tenable Vulnerability Management removes your account from the list of users.
a. Next to the permission drop-down for your user account, click the button.
b. Select a permission.
7. Click Save.
- 316 -
Tenable assigns ownership to the selected user and assigns your user account the
permissions you selected. If you removed all permissions for your user account from the
template, the template no longer appears in the templates table.
Scan Settings
Scan settings enable you to refine parameters in scans to meet your specific network security
needs. The scan settings you can configure vary depending on the Tenable-provided template on
which a scan or user-defined template is based.
You can configure these settings in individual scans or in user-defined templates from which you
create individual scans.
- 317 -
l Configure Plugins in Tenable Vulnerability
Management Scans
l If you configure a setting in a user-defined template, that setting applies to any scans you
create based on that user-defined template.
l You base a user-defined template on a Tenable-provided template. Most of the settings are
identical to the settings you can configure in an individual scan that uses the same Tenable-
provided template.
However, certain Basic settings are unique to creating a user-defined template, and do not
appear when configuring an individual scan. For more information, see Basic Settings in User-
Defined Templates.
l You can configure certain settings in a user-defined template, but cannot modify those
settings in an individual scan based on a user-defined template. These settings include
Discovery, Assessment, Report, Advanced, Compliance, SCAP, and Plugins. If you want to
modify these settings for individual scans, create individual scans based on a Tenable-
provided template instead.
l If you configure Credentials in a user-defined template, other users can override these
settings by adding scan-specific or managed credentials to scans based on the template.
You can configure these settings in individual scans or in user-defined templates from which you
create individual scans.
Tenable Vulnerability Management scan settings are organized into the following categories:
- 318 -
l Discovery Settings in Tenable Vulnerability Management Scans
l If you configure a setting in a user-defined template, that setting applies to any scans you
create based on that user-defined template.
l You base a user-defined template on a Tenable-provided template. Most of the settings are
identical to the settings you can configure in an individual scan that uses the same Tenable-
provided template.
However, certain Basic settings are unique to creating a user-defined template, and do not
appear when configuring an individual scan. For more information, see Basic Settings in User-
Defined Templates.
l You can configure certain settings in a user-defined template, but cannot modify those
settings in an individual scan based on a user-defined template. These settings include
Discovery, Assessment, Report, Advanced, Compliance, SCAP, and Plugins. If you want to
modify these settings for individual scans, create individual scans based on a Tenable-
provided template instead.
l If you configure Credentials in a user-defined template, other users can override these
settings by adding scan-specific or managed credentials to scans based on the template.
- 319 -
Note: This topic describes Basic settings you can set in individual scans. For Basic settings in user-
defined templates, see Basic Settings in User-Defined Templates.
You can use Basic settings to specify organizational and security-related aspects of a scan
configuration. This includes specifying the name of the scan, its targets, whether the scan is
scheduled, and who has access to the scan.
Note: To learn more about scan limitations in Tenable Vulnerability Management, see Scan Limitations.
l General
l Schedule
l Notifications
l User Permissions
General
The general settings for a scan.
Scan Results Show in Specifies whether the results of the scan should
dashboard appear in workbenches, dashboards, and reports, or
be kept private.
- 320 -
Resurfaced.
Folder My Scans Specifies the folder where the scan appears after
being saved.
Agent Groups None (Tenable Nessus Agent templates only) Specifies the
agent group or groups you want the scan to target. In
the drop-down box, select an existing agent group, or
create a new agent group.
Scanner Type Internal Scanner Specifies whether a local, internal scanner or a cloud-
managed scanner performs the scan, and determines
whether the Scanner field lists local or cloud-
managed scanners to choose from.
- 321 -
scanner designations in scan
configurations.
Tags None Select one or more tags to scan all assets that have
any of the specified tags applied. To see a list of
assets identified by the specified tags, click View
Assets.
- 322 -
Use Tag Rules Existing tagged (Required) Specifies whether Tenable Vulnerability
as Targets assets only Management scans tagged assets only, or any assets
that which the selected tags' rules apply to.
- 323 -
Tags and Tag Rules.
Scan Type Scan Window (Tenable Nessus Agent templates only) (Required)
Specifies whether the agent scans occur based on a
scan window or triggers:
- 324 -
file name is detected in the trigger
directory.
- 325 -
Target Groups None You can select or add a new target group to which the
scan applies. Assets in the target group are used as
scan targets.
Upload Targets None Uploads a text file that specifies the targets.
- 326 -
The targets file must be formatted in the following
manner:
Policy None This setting appears only when the scan owner edits
an existing scan that is based on a user-defined scan
template.
- 327 -
Schedule
The scan schedule settings.
By default, scans are not scheduled. When you first access the Schedule section, the Enable
Schedule setting appears, set to Off. To modify the settings listed on the following table, click the
Off button. The rest of the settings appear.
Note: Scheduled scans do not run if they are in the scan owner's Trash folder.
Default
Setting Description
Value
- 328 -
Note: If you schedule your scan to recur
monthly and by time and day of the month,
Tenable recommends setting a start date no
later than the 28th day. If you select a start
date that does not exist in some months (for
example, the 29th), Tenable Vulnerability
Management cannot run the scan on those
days.
Starts Varies Specifies the exact date and time when a scan
launches.
Timezone Zulu Specifies the timezone of the value set for Starts.
Repeat On Varies Specifies what day of the week a scan repeats. This
item appears only if you specify Weekly for
Frequency.
- 329 -
available settings.
Notifications
The notification settings for a scan.
Default
Setting Description
Value
User Permissions
You can share the scan with other users by setting permissions for users or groups. When you
assign a permission to a group, that permission applies to all users within the group.
Tip: Tenable recommends assigning permissions to user groups, rather than individual users, to minimize
maintenance as individual users leave or join your organization.
Permission Description
No Access (Default user only) Groups and users set to this permission cannot interact
with the scan in any way.
Can View Groups and users with this permission can view the results of the scan,
export the scan results, and move the scan to the Trash folder. They cannot
view the scan configuration or permanently delete the scan.
Can Execute In addition to the tasks allowed by Can View, groups and users with this
permission can launch, pause, and stop a scan. They cannot view the scan
configuration or permanently delete the scan.
Note: In addition to Can Execute permissions for the scan, users running a scan
must have Can Scan permissions in an access group for the specified target, or
- 330 -
the scanner does not scan the target.
Can Edit In addition to the tasks allowed by Can Execute, groups and users with this
permission can view the scan configuration and modify any setting for the
scan except scan ownership. They can also delete the scan.
Note: This topic describes Basic settings you can set in user-defined templates. For Basic settings in
individual scans, see Basic Settings in Tenable Vulnerability Management Scans .
You can use Basic settings to specify basic aspects of a user-defined template, including who has
access to the user-defined template.
l General
l Permissions
General
The general settings for a user-defined template.
Default
Setting Description
Value
- 331 -
Description None (Optional) Specifies a description of the user-defined
template.
Permissions
You can share the user-defined template with other users by setting permissions for users or
groups. When you assign a permission to a group, that permission applies to all users within the
group.
Tip: Tenable recommends assigning permissions to user groups, rather than individual users, to minimize
maintenance as individual users leave or join your organization.
Permission Description
No Access (Default user only) Groups and users set to this permission cannot interact
with the scan in any way.
Can View Groups and users with this permission can view the results of the scan,
export the scan results, and move the scan to the Trash folder. They cannot
view the scan configuration or permanently delete the scan.
Can Execute In addition to the tasks allowed by Can View, groups and users with this
permission can launch, pause, and stop a scan. They cannot view the scan
configuration or permanently delete the scan.
Note: In addition to Can Execute permissions for the scan, users running a scan
must have Can Scan permissions in an access group for the specified target, or
the scanner does not scan the target.
Can Edit In addition to the tasks allowed by Can Execute, groups and users with this
permission can view the scan configuration and modify any setting for the
scan except scan ownership. They can also delete the scan.
- 332 -
the permissions assigned to that user in the individual scan.
l An administrator always has the equivalent of Can Edit permissions,
regardless of the permissions set for the administrator account in
the individual scan. This does not apply to user-defined scan
templates.
Authentication
In user-defined templates, you can use Authentication settings to configure the authentication
Tenable Vulnerability Management performs for credentialed scanning.
Tip: The Authentication settings are equivalent to the Scan-wide Credential Type Settings in Tenable-
provided scan templates.
SNMPv1/v2c
HTTP
Login method POST Specify if the login action is performed via a GET or
POST request.
- 333 -
force lockout mechanisms.
Invert Disabled A regex pattern to look for on the login page, that if
authenticated found, tells Tenable Vulnerability Management that
regex authentication was not successful (e.g., Authentication
failed!).
Case insensitive Disabled he regex searches are case sensitive by default. This
authenticated instructs Tenable Vulnerability Management to ignore
regex case.
telnet/rsh/rexec
Windows
Never send Enabled By default, for security reasons, this option is enabled.
credentials in the
clear
- 334 -
Do not use Enabled If the Do not use NTLMv1 authentication option is
NTLMv1 disabled, then it is theoretically possible to trick
authentication Tenable Vulnerability Management into attempting to
log into a Windows server with domain credentials via
the NTLM version 1 protocol. This provides the remote
attacker with the ability to use a hash obtained from
Tenable Vulnerability Management. This hash can be
potentially cracked to reveal a username or password.
It may also be used to directly log into other servers.
Force Tenable Vulnerability Management to use
NTLMv2 by enabling the Only use NTLMv2 setting at
scan time. This prevents a hostile Windows server from
using NTLM and receiving a hash. Because NTLMv1 is
an insecure protocol, this option is enabled by default.
Start the Remote Disabled This option tells Tenable Vulnerability Management to
Registry service start the Remote Registry service on computers being
during the scan scanned if it is not running. This service must be
running in order for Tenable Vulnerability Management
to execute some Windows local check plugins.
- 335 -
control configurations for your network firewall might
blacklist your scanner for attempting to negotiate Server
Message Block Protocol (SMB protocol) connections.
SSH
Preferred port 22 The port on which SSH is running on the target system.
Amazon AWS
equivalent to Scans > Credentials > Cloud Services > Amazon AWS
Regions to access Rest of the In order for Tenable Vulnerability Management to audit
World an Amazon AWS account, you must define the regions
you want to scan. Per Amazon policy, you need
different credentials to audit account configuration for
- 336 -
the China region than you do for the rest of the world.
l us-east-1
l us-east-2
l us-west-1
l us-west-2
l ca-central-1
l eu-west-1
l eu-west-2
l eu-central-1
l ap-northeast-1
l ap-northeast-2
l ap-southeast-1
l ap-southeast-2
l sa-east-1
l cn-north-1
l cn-northwest-1
- 337 -
authenticates over an encrypted (HTTPS) or an
unencrypted (HTTP) connection.
Rackspace
l Chicago (ORD)
l London (LON)
l Syndney (SYD)
Microsoft Azure
equivalent to Scans > Credentials > Cloud Services > Amazon AWS
When you configure a Tenable Nessus Agent scan in Tenable Vulnerability Management, Tenable
Vulnerability Management offers two agent scan types: Scan Window and Triggered Scan.
For window scans, Tenable Vulnerability Management creates a timeframe (for example, the default
is three hours) in which an agent group must report in order to be included in the scan results. You
must schedule Tenable Vulnerability Management to launch window scan at a scheduled time, or
you must manually launch the scan from the Tenable Vulnerability Management user interface (for
example, if you schedule a three-hour agent window scan for every Monday, Tenable Vulnerability
Management pulls data updates from the agent group for three hours every Monday).
- 338 -
Triggered scans differ from window agent scans in that the agent or agent group launches the scan
without any Tenable Vulnerability Management or user intervention. Agents can launch triggered
scans using three different methods:
l Interval trigger — Configure agents to scan at a certain time interval (for example, every 12
hours or every 24 hours).
l File Name trigger — Configure agents to scan whenever a file with a specific file name is
added to the agent trigger directory. The trigger file disappears after the scan begins. The
agent trigger directory location varies by operating system:
macOS /Library/NessusAgent/run/var/nessus/triggers
Linux /opt/nessus_agent/var/nessus/triggers
l Nessuscli trigger — Launch an existing triggered scan manually by running the following
command in the Tenable Nessus Agent nessuscli utility:
You can also set multiple triggers for a single scan, and the scan searches for the triggers in their
listed order (in other words, if the first trigger does not trigger the scan, it searches for the second
trigger).
Tenable recommends using triggered agent scans over window agent scans in many cases. Due to
the scanning independence from Tenable Vulnerability Management or user intervention and the
multiple trigger options, triggered scanning offers more flexibility to meet the needs of your
workflow, especially if you have a mobile workforce in multiple time zones.
Triggered scans can provide more consistent coverage than window scans and help overcome
connectivity issues between Tenable Vulnerability Management and linked agents. While window
scans can create gaps in data coverage due to unresponsive or offline agents, triggered scans allow
agents to scan and send data to Tenable Vulnerability Management whenever the triggers occur;
Tenable Vulnerability Management accepts and processes data from triggered scans at any time.
- 339 -
Tenable recommends using scan windows if you need to export individual scan results, as you can
only export triggered scan data by using the bulk vulnerability export API.
To view triggered scan results, see View Tenable Vulnerability Management Scan Details.
Note: For triggered scan histories, Tenable Vulnerability Management shows a scan history entry for each
12-hour window of the past 7 days. Tenable Vulnerability Management only retains up to 15 triggered scan
histories at a time for each scan.
In addition to managing triggered scans from Tenable Vulnerability Management, you can view
triggered scan details by running the following command in the Tenable Nessus Agent nessuscli
utility:
The --list command returns the agent's triggered scan details. These details include:
l Scan name
l Scan description
For more information about the Tenable Nessus Agent nessuscli utility, see Nessuscli Agent
in the Tenable Nessus User Guide.
You can also view your agent trigger information in the agent trigger directory:
- 340 -
macOS /Library/NessusAgent/run/var/nessus/triggers
Linux /opt/nessus_agent/var/nessus/triggers
Scan Targets
In Tenable Vulnerability Management, you can use a number of different formats when specifying
targets for a scan. The following tables contain target formats, examples, and a short explanation of
what occurs when Tenable Vulnerability Management scans that target type.
Note: Tenable limits the number of targets that you can scan in a single scan. For more information, see
Scan Limitations.
Note: For previously scanned assets, you can configure scan targets based on host attributes like
operating system or installed software, instead of host identifiers like IP address.
Tip: If a hostname target looks like either a link6 target (start with the text "link6") or one of the two IPv6
range forms, put single quotes around the target to ensure that Tenable Vulnerability Management
processes it as a hostname.
Target
Example Explanation
Description
- 341 -
Target
Example Explanation
Description
- 342 -
Target
Example Explanation
Description
- 343 -
Target
Example Explanation
Description
identifier on Windows
platforms.
Some text with Test Host 1[10.0.1.1] Scans the IPv4 or IPv6 address
either a single or within the brackets, like a
IPv4 or IPv6 Test Host 2[2001:db8::abcd] normal single target.
address within
square
brackets
Target Groups
You can still use target groups to manage your scan targets. However, Tenable recommends that you
instead use tags to group and scan your assets when possible. In the future, when tagging features and
options match those currently available in target groups, Tenable will convert your target groups into tags
and retire your existing target groups. No action is required on your part, and Tenable will provide you with
60 calendar days notice before converting and retiring your target groups. For more information, contact
your Tenable representative.
A target group allows you to construct a list of scan targets by FQDN, CIDR notation, or IP address
range. You can then specify which users in your organization can use the target group in scan
configurations or filtering dashboards (including workbenches).
Note: Tenable recommends limiting the number of targets in any single target group. When filtering a
dashboard by a target group with too many targets, Tenable Vulnerability Management may fail to show
data.
Note: Scan targets listed by CIDR notation must be in one of the following formats:
l xx.xx.0.0/16
l xx.xx.xx.0/24
If you grant a user permissions in a target group, the user can use the target group in the Target
Groups option for scan configuration. However, you must also grant the user Can Scan permissions
in an access group for the targets, or Tenable Vulnerability Management excludes the targets from
the scan results. For more information, see Permissions.
- 344 -
To manage target groups, use the following procedures:
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
The Target Groups page appears. By default, the System tab is active. This tab contains a
table of system target groups.
4. If you want to edit a user target group, click User. Otherwise, stay on the System target
groups tab.
5. In the upper-right corner of the page, click the Create Target Group button.
Setting Description
- 345 -
Setting Description
Note: Scan targets listed by CIDR notation must be in one of the following
formats:
l xx.xx.0.0/16
l xx.xx.xx.0/24
The system adds the uploaded targets to the Targets box after you save
the target group.
Note: If you grant a user permissions in a target group, the user can use the target group in the
Target Groups option for scan configurations. However, you must also grant the user Can Scan
permissions in an access group for the targets, or Tenable Vulnerability Management excludes the
targets from the scan results. For more information, see Access Groups.
8. Click Save.
l If you configured user permissions for the target group, Tenable Vulnerability
Management creates the target group and adds it to the table on the Target Groups
page.
l If you retained the default No Access permissions for the target group, a confirmation
window appears.
- 346 -
l If the default configuration is appropriate for the target group, click Continue to
confirm your action.
l If the default configuration is not appropriate for the target group, click Cancel to
return to user permissions configuration for the target group.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
Note: For auditing cloud infrastructure, Tenable Vulnerability Management requires a target group with
Can Scan permissions to be present on 127.0.0.1.
Note: To enable the user to use a target group in the Target Groups option for scan configurations, you must
also grant the user Can Scan permissions in an access group for the targets. If you do not, Tenable
Vulnerability Management excludes the targets from the scan results. For more information, see Access
Groups.
l
Change the permissions for the Default user
Note: The Default user represents any users that have not been specifically added to the
target group.
- 347 -
a. Next to the permission drop-down for the Default user, click the button.
c. Click Save.
l
Add permissions
a. Next to User Permissions, click the button.
b. In the Add users or groups box, type the name of a user or group.
The selected user or group appears in the list of users and groups.
d. Next to the permission drop-down for the user or group, click the button.
f. Click Save.
l
Edit permissions
a. Next to the permission drop-down for the user or group, click the button.
c. Click Save.
l
Delete permissions
a. In the list of users, roll over the user or group you want to delete.
- 348 -
c. Click Save.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
Note: System target groups and related functionality asset isolation are deprecated. To control
scan permissions, use access groups instead.
You can still create and edit system target groups, as well as use system target groups in scan
configurations and dashboard filters. However, Tenable recommends using user target groups
instead.
The Target Groups page appears. By default, the System tab is active. This tab contains a
table of system target groups.
4. If you want to edit a user target group, click User. Otherwise, stay on the System target
groups tab.
- 349 -
5. In the target groups table, click the target group you want to edit.
Setting Description
The system adds the uploaded targets to the Targets box after you save
the target group.
8. Click Save.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
Tip: To create or modify the .csv file, Tenable recommends using a robust editor such as Microsoft Excel.
- 350 -
1. In the upper-left corner, click the button.
The Target Groups page appears. By default, the System tab is active. This tab contains a
table of system target groups.
4. If you want to import a user target group, click User. Otherwise, stay on the System target
groups page.
Note: System target groups and related functionality asset isolation are deprecated. To
control scan permissions, use access groups instead.
You can still create and edit system target groups, as well as use system target groups in
scan configurations and dashboard filters. However, Tenable recommends using user
target groups instead.
Tenable Vulnerability Management imports the file and adds the target groups to the target
groups box.
name Field used to identify the name of the target group. You can use any
combination of alphanumeric characters or symbols in the name field.
- 351 -
members Field used to identify the host address or addresses to include in the
target group.
Required Tenable Vulnerability Management User Role: Standard, Scan Manager, or Administrator
You can export a target group as a .csv file. Depending on your browser, the target group may
download automatically.
The Target Groups page appears. By default, the System tab is active. This tab contains a
table of system target groups.
4. If you want to export a user target group, click User. Otherwise, stay on the System target
groups tab.
Note: System target groups and related functionality asset isolation are deprecated. To
control scan permissions, use access groups instead.
- 352 -
You can still create and edit system target groups, as well as use system target groups in
scan configurations and dashboard filters. However, Tenable recommends using user
target groups instead.
l
Select a single target group.
a. In the target groups table, roll over the target group you want to export.
l
Select multiple target groups.
a. In the target groups table, select the check boxes for each target group you want
to export.
creation_date Date (in UNIX timestamp format) when the target group was created.
last_modification_ Date (in UNIX timestamp format) when the target group was last
date modified.
- 353 -
Delete a target group
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
The Target Groups page appears. By default, the System tab is active. This tab contains a
table of system target groups.
4. If you want to delete a user target group, click User. Otherwise, stay on the System target
groups tab.
l
Select a single target group.
a. In the target groups table, roll over the target group you want to delete.
- 354 -
b. In the row, click the button.
l
Select multiple target groups.
a. In the target groups table, select the check box for each target group you want to
delete.
Tenable Vulnerability Management deletes the target group or groups you selected.
The following table describes user permissions for both system and user target groups.
Permission Description
No Access (Default user only) Users assigned this permission cannot use the system
target group to filter dashboards.
Can Use Note: System target groups are deprecated; Tenable recommends using user
target groups instead.
Users assigned this permission can use hosts in the user target groups to
filter dashboards and configure scans.
Note: To enable the user to use a target group in the Target Groups option for
scan configurations, you must also grant the user Can Scan permissions in an
access group for the targets. If you do not, Tenable Vulnerability Management
excludes the targets from the scan results. For more information, see Access
Groups.
- 355 -
User Target Group
No Access (Default user only) Users assigned this permission cannot configure scans for
hosts in the user target group or use hosts in the user target group to filter
dashboards.
Can Use Users assigned this permission can use hosts in the user target groups to
filter dashboards and configure scans.
Note: To enable the user to use a target group in the Target Groups option for
scan configurations, you must also grant the user Can Scan permissions in an
access group for the targets. If you do not, Tenable Vulnerability Management
excludes the targets from the scan results. For more information, see Access
Groups.
Can Change In addition to using hosts in this user target group when configuring scans
and filtering dashboards, users assigned this permission can modify any
setting for the target group except permissions.
Info-level Reporting
Info-level Reporting is a scan setting available for Nessus Agent vulnerability scan templates. The
setting specifies how often the agent scan should report unchanged Info-severity vulnerability
findings.
Description
Info-severity findings can account for up to 90% of agent scan findings. Most Info-level findings do
not change from scan to scan and have minimal impact on your overall network exposure.
Configuring Info-level Reporting can help minimize your scan processing times by decreasing the
number of unchanged Info-severity findings that Tenable Vulnerability Management processes after
every agent scan.
After you configure an agent scan, the first execution of that scan always reports all detected
findings regardless of severity level. This is known as a baseline scan. Subsequent scans return all
vulnerability findings with a severity of Low or higher, and any new or changed Info-level findings.
Agents do not re-report existing, unchanged Info-level findings to Tenable Vulnerability
Management until a new baseline scan is performed.
- 356 -
When you view agent vulnerability scan results in the Tenable Vulnerability Management user
interface, baseline scans are indicated with the baseline icon ( ). For example:
Note: The baseline icon does not appear for triggered scans, regardless of whether or not the
scan was a baseline scan.
The baseline icon always appears for scans whose scan configurations do not have the Info-
level Reporting setting. This is because every execution of that scan includes all findings and is,
therefore, a baseline scan.
The baseline icon does not appear for scans whose configurations have the Info-level Reporting
setting, but were run before the Info-level Reporting feature was released.
Configuration
You can configure the agent scan to report all severity findings by launching a new baseline scan
after one of the following intervals:
l After number of scans — The agent scan reports all findings every x number of scans. You
choose from the following increments: 7, 10, 15, or 20 scans.
For example, if you set the value to the default of 10, the agent scan reports all findings in its
next scan and then reports all findings again during every 10th scan. All interim scans only
- 357 -
return findings with a severity of Low or higher, as well as any new or changed Info-level
findings.
l After number of days — The agent scan reports all findings after a set number of days after
the previous day on which the agent scan last reported all findings. You choose from the
following increments: 7, 10, 20, 30, 60, or 90 days.
For example, if you set the value to the default of 10, the agent scan reports all findings in its
next scan. For 10 days, all interim scans return all findings with a severity of Low or higher and
any new or changed Info-level findings. After the 10-day period passes, the agent scan reports
all findings again in its next scan.
You can only set triggered agent scans to After number of scans. You can set Scan Window
scans to either After number of scans or After number of days.
The default value for triggered agent scans is After 10 scans, and the default value for Scan
Window agent scans is After 10 days. Tenable recommends using the default values. Only
lower the value if doing so is necessary for your organization.
In addition to Info-level Reporting, you can enable Force refresh of all Info-severity vulnerabilities
on next scan to force the agent scan to report all findings in the next scan. After the next scan
completes and reports all findings, the Info-level Reporting setting determines how often the scan
reports Info-severity findings.
Note: All vulnerability findings with a severity of Low or higher and new or changed Info-severity
vulnerabilities are always reported after every scan.
l Only agents version 10.5.0 and later can use the Info-level Reporting setting. Any agents on
earlier versions always perform baseline scans.
l The Info-level Reporting setting is not supported when Tenable Vulnerability Management is
connected to Tenable Security Center.
l Agent scans with configured Compliance settings do not support the Info-level Reporting
setting. All agent scans with Compliance settings configured are baseline scans.
l If you recast an Info-level plugin to a higher severity level (for example, Low or Medium), the
plugin is still affected by Info-level Reporting and excluded from non-baseline scans if the
- 358 -
plugin output has not changed.
l Each individual agent calculates the After number of scans value separately. Therefore,
triggered scans can return a combination of baseline and non-baseline results.
l Plugins 19506 (Nessus Scan Information) and 42980 (SSL Certificate Expiry) are always
reported in full with every scan.
Note: If a scan is based on a user-defined template, you cannot configure Discovery settings in the scan.
You can only modify these settings in the related user-defined template.
The Discovery settings relate to discovery and port scanning, including port ranges and methods.
If you select the Custom preconfigured setting option, or if you are using a scanner template that
does not include preconfigured discovery settings, you can manually configure Discovery settings
in the following categories:
l Host Discovery
l Port Scanning
l Service Discovery
l Identity
Host Discovery
By default, some settings in the Host Discovery section are enabled. When you first access the
Host Discovery section, the Ping the remote host option appears and is set to On.
Default
Setting Description
Value
Ping the Remote On If set to On, the scanner pings remote hosts on multiple
Host ports to determine if they are alive. Additional options
General Settings and Ping Methods appear.
- 359 -
multiple ports during the scan.
Scan Unresponsive Disabled Specifies whether the Nessus scanner scans hosts that
Hosts do not respond to any ping methods. This option is only
available for scans using the PCI Quarterly External Scan
template.
General Settings
Use Fast Network Disabled When disabled, if a host responds to ping, Tenable
Discovery Vulnerability Management attempts to avoid false
positives, performing additional tests to verify the
response did not come from a proxy or load balancer.
These checks can take some time, especially if the
remote host is firewalled.
Ping Methods
ARP Enabled Ping a host using its hardware address via Address
Resolution Protocol (ARP). This only works on a local
network.
- 360 -
ICMP Enabled Ping a host using the Internet Control Message Protocol
(ICMP).
Assume ICMP Disabled Assume ICMP unreachable from the gateway means the
Unreachable From host is down. When a ping is sent to a host that is down,
the Gateway its gateway may return an ICMP unreachable message.
Means the Host is When this option is enabled, when the scanner receives
Down an ICMP Unreachable message, it considers the targeted
host dead. This approach helps speed up discovery on
some networks.
UDP Disabled Ping a host using the User Datagram Protocol (UDP). UDP
is a stateless protocol, meaning that communication is
not performed with handshake dialogues. UDP-based
communication is not always reliable, and because of
the nature of UDP services and screening devices, they
are not always remotely detectable.
Fragile Devices
Scan Network Disabled When enabled, the scanner scans network printers.
Printers
Scan Novell Disabled When enabled, the scanner scans Novell NetWare hosts.
Netware Hosts
Scan Operational Disabled When enabled, the scanner performs a full scan of
Technology Operational Technology (OT) devices such as
Devices programmable logic controllers (PLCs) and remote
- 361 -
terminal units (RTUs) that monitor environmental factors
and the activity and state of machinery.
Wake-on-LAN
For example:
33:24:4C:03:CC:C7
FF:5C:2C:71:57:79
Boot Time Wait (In 5 minutes The amount of time to wait for hosts to start before
Minutes) performing the scan.
Port Scanning
The Port Scanning section includes settings that define how the port scanner behaves and which
ports to scan.
Default
Setting Description
Value
Ports
Consider Disabled When enabled, if a port is not scanned with a selected port
Unscanned scanner (for example, the port falls outside of the specified
Ports as Closed range), the scanner considers it closed.
- 362 -
Default
Setting Description
Value
If scanning both TCP and UDP, you can specify a split range
specific to each protocol. For example, if you want to scan
a different range of ports for TCP and UDP in the same
policy, you would type T:1-1024,U:300-500.
SSH (netstat) Enabled When enabled, the scanner uses netstat to check for open
ports from the local machine. It relies on the netstat
command being available via an SSH connection to the
target. This scan is intended for Linux-based systems and
requires authentication credentials.
WMI (netstat) Enabled When enabled, the scanner uses netstat to determine open
- 363 -
Default
Setting Description
Value
Only Run Enabled If a local port enumerator runs, all network port scanners
Network Port will be disabled for that asset.
Scanners if
Local Port
Enumeration
Failed
Verify Open TCP Disabled When enabled, if a local port enumerator (for example, WMI
Ports Found By or netstat) finds a port, the scanner also verifies that the
Local Port port is open remotely. This approach helps determine if
Enumerators some form of access control is being used (for example,
TCP wrappers or a firewall).
- 364 -
Default
Setting Description
Value
TCP Disabled Use the built-in Tenable Nessus TCP scanner to identify
open TCP ports on the targets, using a full TCP three-way
handshake. If you enable this option, you can also set the
Override Automatic Firewall Detection option.
SYN Enabled Use the built-in Tenable Nessus SYN scanner to identify
open TCP ports on the target hosts. SYN scans do not
initiate a full TCP three-way handshake. The scanner sends
a SYN packet to the port, waits for SYN-ACK reply, and
determines the port state based on a response or lack of
response.
If you enable this option, you can also set the Override
Automatic Firewall Detection option.
Override Disabled This setting can be enabled if you enable either the TCP or
Automatic SYN option.
Firewall
When enabled, this setting overrides automatic firewall
Detection
detection.
- 365 -
Default
Setting Description
Value
UDP Disabled This option engages the built-in Tenable Nessus UDP
scanner to identify open UDP ports on the targets.
Service Discovery
The Service Discovery section includes settings that attempt to map each open port with the
service that is running on that port.
Default
Setting Description
Value
General Settings
Probe All Ports Enabled When enabled, the scanner attempts to map each open
to Find Services port with the service that is running on that port, as
defined by the Port scan range option.
Search for Known Specifies which ports on target hosts the scanner searches
SSL/TLS On SSL/TLS for SSL/TLS services.
- 366 -
Default
Setting Description
Value
Search for None Specifies which ports on target hosts the scanner searches
DTLS On for DTLS services.
l None
Enumerate All True When enabled, the scanner ignores the list of ciphers
SSL/TLS advertised by SSL/TLS services and enumerates them by
Ciphers attempting to establish connections using all possible
ciphers.
Enable CRL False When enabled, the scanner checks that none of the
Checking identified certificates have been revoked.
(Connects to
the Internet)
Identity
The Identity section allows you to enable or disable the collection of Active Directory data.
- 367 -
General Settings
- 368 -
l Ping hosts using:
o TCP
o ARP
o ICMP (2 retries)
- 369 -
o Scan common ports
o Use netstat if
credentials are provided
o Use SYN scanner if
necessary
- 370 -
o Always test the local
Nessus host
o Use fast network
discovery
- 371 -
o Use SYN scanner if
necessary
- 372 -
discovery
- 373 -
Custom All defaults
Legacy Web App Scan Port scan (common ports) l General Settings:
(default) o Always test the local
Nessus host
o Use fast network
discovery
- 374 -
necessary
Configuration Scans
Audit Cloud – –
Infrastructure
- 375 -
o Use fast network
discovery
Tactical Scans
- 376 -
where it is commonly
used
- 377 -
o Always test the local
Nessus host
- 378 -
Nessus host
- 379 -
Intel AMT Security Quick l General Settings:
Bypass o Ping the remote host
o Always test the local
Nessus host
- 380 -
o Detect SSL on all open
ports
- 381 -
Shadow Brokers Scan Normal (default) l General Settings:
o Ping the remote host
o Always test the local
Nessus host
- 382 -
Detection o Ping the remote host
o Always test the local
Nessus host
- 383 -
where it is commonly
used
Note: If a scan is based on a user-defined template, you cannot configure Assessment settings in the
scan. You can only modify these settings in the related user-defined template.
You can use Assessment settings to configure how a scan identifies vulnerabilities, as well as what
vulnerabilities are identified. This includes identifying malware, assessing the vulnerability of a
system to brute force attacks, and the susceptibility of web applications.
- 384 -
Certain Tenable-provided scanner templates include preconfigured assessment settings.
If you select the Custom preconfigured setting option, or if you are using a scanner template that
does not include preconfigured assessment settings, you can manually configure Assessment
settings in the following categories:
l General
l Brute Force
l SCADA
l Web Applications
l Windows
l Malware
l Databases
Note: The following tables include settings for the Advanced Network Scan template. Depending on the
template you select, certain settings may not be available, and default values may vary.
General
The General section includes the following groups of settings:
l Accuracy
l Antivirus
l SMTP
Accuracy
- 385 -
Management to not report any flaw whenever there is a hint
of uncertainty about the remote host. As a middle ground
between these two settings, disable this setting.
Perform Disabled Causes various plugins to work harder. For example, when
thorough looking through SMB file shares, a plugin analyzes 3
tests (may directory levels deep instead of 1. This could cause much
disrupt your more network traffic and analysis in some cases. By being
network or more thorough, the scan is more intrusive and is more likely
impact scan to disrupt the network, while potentially providing better
speed) audit results.
Antivirus
Antivirus 0 Configure the delay of the Antivirus software check for a set
definition number of days (0-7). The Antivirus Software Check menu
grace period allows you to direct Tenable Vulnerability Management to
(in days) allow for a specific grace time in reporting when antivirus
signatures are considered out of date. By default, Tenable
Vulnerability Management considers signatures out of date
regardless of how long ago an update became available (e.g.,
a few hours ago). You can configure this option to allow for
up to 7 days before reporting them out of date.
SMTP
Third party Tenable Vulnerability Management attempts to send spam through each SMTP
domain device to the address listed in this field. This third party domain address must
be outside the range of the site being scanned or the site performing the scan.
Otherwise, the test may be aborted by the SMTP server.
From The test messages sent to the SMTP server(s) appear as if the messages
address originated from the address specified in this field.
- 386 -
Brute Force
The Brute Force section includes the following groups of settings:
l General Settings
l Oracle Database
Default
Setting Description
Value
General Settings
Only use Enabled In some cases, Tenable Vulnerability Management can test
credentials default accounts and known default passwords. This can
provided by cause the account to be locked out if too many consecutive
the user invalid attempts trigger security protocols on the operating
system or application. By default, this setting is enabled to
prevent Tenable Vulnerability Management from performing
these tests.
Oracle Database
Test default Disabled Test for known default accounts in Oracle software.
accounts
(slow)
SCADA
Default
Setting Description
Value
Web Applications
The Web Applications section includes the following groups of settings:
- 387 -
l General Settings
l Web Crawler
Use a custom Mozilla/4.0 (compatible; MSIE Specifies which type of web browser
User-Agent 8.0; Windows NT 5.1; Tenable Vulnerability Management
Trident/4.0) impersonates while scanning.
Web Crawler
- 388 -
Setting Default Value Description
- 389 -
Setting Default Value Description
- 390 -
Setting Default Value Description
- 391 -
Setting Default Value Description
Do not stop Stop after one flaw is found This setting determines when a new flaw
after first flaw per web server (fastest) is targeted. This applies at the script level.
is found per Finding an XSS flaw does not disable
web page searching for SQL injection or header
injection, but unless otherwise specified,
there is at most one report for each type
on a given port. Note that several flaws of
the same type (for example, XSS or SQLi)
may be reported if they were caught by
the same attack.
- 392 -
Setting Default Value Description
- 393 -
Setting Default Value Description
Windows
The Windows section contains the following groups of settings:
l General Settings
Default
Setting Description
Value
General Settings
Request Enabled If enabled, domain users are queried instead of local users.
information
about the SMB
Domain
You can enable as many of the user enumeration methods as appropriate for user discovery.
- 394 -
ADSI Query Enabled Tenable Vulnerability Management enumerates users via
Active Directory Service Interfaces (ADSI). To use ADSI, you
must configure credentials under Credentials >
Miscellaneous > ADSI.
Start UID 1000 The beginning of a range of IDs where Tenable Vulnerability
Management attempts to enumerate domain users.
End UID 1200 The end of a range of IDs where Tenable Vulnerability
Management attempts to enumerate domain users.
Start UID 1000 The beginning of a range of IDs where Tenable Vulnerability
Management attempts to enumerate local users.
End UID 1200 The end of a range of IDs where Tenable Vulnerability
Management attempts to enumerate local users.
Malware
The Malware section contains the following groups of settings:
l General Settings
l Yara Rules
- 395 -
Default
Setting Description
Value
Custom Netstat IP None A text file that contains a list of known bad IP
Threat List addresses that you want to detect.
Provide your own list None A text file with one MD5 hash per line that specifies
of known bad MD5 additional known bad MD5 hashes.
hashes
Optionally, you can include a description for a hash by
adding a comma after the hash, followed by the
description. If any matches are found when scanning a
target, the description appears in the scan results. You
can also use hash-delimited comments (for example,
fop) in addition to comma-delimited comments.
Provide your own list None A text file with one MD5 hash per line that specifies
of known good MD5 additional known good MD5 hashes.
hashes
Optionally, you can include a description for each hash
by adding a comma after the hash, followed by the
description. If any matches are found when scanning a
target, and a description was provided for the hash,
the description appears in the scan results. You can
also use hash-delimited comments (for example, #) in
addition to comma-delimited comments.
- 396 -
Hosts file allow list None Tenable Vulnerability Management checks system
hosts files for signs of a compromise (for example,
Plugin ID 23910 titled Compromised Windows System
(hosts File Check)). This option allows you to upload a
file containing a list of IPs and hostnames you want
Tenable Vulnerability Management to ignore during a
scan. Include one IP and one hostname (formatted
identically to your hosts file on the target) per line in a
regular text file.
Yara Rules
Yara Rules None A .yar file containing the YARA rules to be applied in
the scan. You can only upload one file per scan, so
include all rules in a single file. For more information,
see yara.readthedocs.io.
Scan file system Disabled If enabled, Tenable Vulnerability Management can scan
system directories and files on host computers.
- 397 -
Scan User Profiles Disabled Enables file system scanning to scan user profiles.
Linux Directories
MacOS Directories
Databases
Default
Setting Description
Value
Oracle Database
Use Disabled When enabled, if at least one host credential and one
detected SIDs Oracle database credential are configured, the scanner
authenticates to scan targets using the host credentials,
and then attempts to detect Oracle System IDs (SIDs)
locally. The scanner then attempts to authenticate using
the specified Oracle database credentials and the
detected SIDs.
- 398 -
Preconfigured Assessment Settings
l Web Applications:
o Disable web application
scanning
l Web Applications:
o Start crawling from "/"
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
- 399 -
tests disabled
- 400 -
Scan for all web l General Settings:
vulnerabilities (quick) o Avoid potential false alarms
o Enable CGI scanning
l Web Applications:
o Start crawling from "/"
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
l Web Applications:
o Start crawling from "/"
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
- 401 -
app test for 10 minutes
(max)
o Try all HTTP methods
o Attempt HTTP Parameter
Pollution
Host Discovery – –
l Web Applications:
o Disable web application
scanning
l Web Applications:
o Start crawling from "/"
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
- 402 -
o Generic web application
tests disabled
l Web Applications:
o Start crawling from "/"
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
l Web Applications:
o Start crawling from "/"
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
- 403 -
used web applications
o Perform each generic web
app test for 10 minutes
(max)
o Try all HTTP methods
o Attempt HTTP Parameter
Pollution
l Web Applications:
o Start crawling from "/"
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
l Web Applications:
o Start crawling from "/"
- 404 -
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
l Web Applications:
o Start crawling from "/"
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
- 405 -
Mobile Device Scan – –
PCI Quarterly – –
External Scan
Configuration
Scans
Audit Cloud – –
Infrastructure
Policy Compliance – –
Auditing
Tactical Scans
DROWN Detection – –
Shadow Brokers – –
Scan
Spectre and –
Meltdown
Detection – –
- 406 -
WannaCry – –
Ransomware
Detection
Note: If a scan is based on a user-defined template, you cannot configure Report settings in the scan. You
can only modify these settings in the related user-defined template.
l Processing
l Output
Default
Setting Description
Value
Processing
Override normal Disabled When disabled, provides the standard level of plugin
verbosity activity in the report. The output does not include the
informational plugins 56310, 64582, and 58651.
- 407 -
Default
Setting Description
Value
Hide results from Enabled When enabled, the list of dependencies is not included
plugins initiated as in the report. If you want to include the list of
a dependency dependencies in the report, disable this setting.
Output
Designate hosts by Disabled Uses the host name rather than IP address for report
their DNS name output.
Display hosts that Disabled Reports hosts that successfully respond to a ping.
respond to ping
Display Disabled When enabled, hosts that did not reply to the ping
unreachable hosts request are included in the security report as dead
hosts. Do not enable this option for large IP blocks.
Note: If a scan is based on a user-defined template, you cannot configure Advanced settings in the scan.
You can only modify these settings in the related user-defined template.
- 408 -
The Advanced settings provide increased control over scan efficiency and the operations of a scan,
as well as the ability to enable plugin debugging.
If you select the Custom preconfigured setting option, or if you are using a Nessus Scanner
template that does not include preconfigured advanced settings, you can manually configure
Advanced settings in the following categories:
l General Settings
l Performance Options
l Debug Settings
Note: The following tables include settings for the Advanced Network Scan template. Depending on the
template you select, certain settings may not be available, and default values may vary.
Default
Setting Description
Value
General Settings
Enable Safe Enabled When enabled, disables all plugins that may have an
Checks adverse effect on the remote host.
Scan for Disabled Determines whether the scan searches for unpatched
unpatched vulnerabilities. This includes CVEs marked as "Will Not
vulnerabilities (no Fix" by the related vendor.
patches or
Enabling this setting may increase your overall findings
mitigations
count; each platform and package combination results in
available)
an individual plugin. If additional CVEs are found to affect
a platform and package combination, the CVEs are added
- 409 -
Default
Setting Description
Value
- 410 -
Default
Setting Description
Value
Scan targets with Disabled When disabled, to avoid overwhelming a host, Tenable
multiple domain Vulnerability Management prevents a single scanner from
names in parallel simultaneously scanning multiple targets that resolve to a
single IP address. Instead, Tenable Vulnerability
Management scanners serialize attempts to scan the IP
address, whether it appears more than once in the same
scan task or in multiple scan tasks on that scanner. Scans
may take longer to complete.
Create unique Enabled When enabled, the scanner creates a unique identifier
identifier on (Tenable UUID) . Tenable Vulnerability Management and
hosts scanned Tenable Security Center use the Tenable UUID to merge
using credentials incoming scan data with historical results for the asset
and ensure that license counts are accurately reflected.
- 411 -
Default
Setting Description
Value
Performance Options
Slow down the Disabled When enabled, Tenable detects when it is sending too
scan when many packets and the network pipe is approaching
network capacity. If network congestion is detected, throttles the
congestion is scan to accommodate and alleviate the congestion. Once
detected the congestion has subsided, Tenable automatically
attempts to use the available space within the network
pipe again.
Use Linux kernel Disabled When enabled, Tenable Vulnerability Management uses
congestion the Linux kernel to detect when it sends too many
detection packets and the network pipe approaches capacity. If
detected, Tenable Vulnerability Management throttles the
scan to accommodate and alleviate the congestion. Once
the congestion subsides, Tenable Vulnerability
Management automatically attempts to use the available
space within the network pipe again.
- 412 -
Default
Setting Description
Value
Network timeout 5 Specifies the time that Tenable waits for a response from
(in seconds) a host unless otherwise specified within a plugin. If you
are scanning over a slow connection, you may want to set
this to a higher number of seconds.
- 413 -
Default
Setting Description
Value
Exclude Filepath None A plain text file containing a list of filepaths to exclude
from all plugins that search using the find command on
Unix systems.
Include Filepath None A plain text file containing a list of filepaths to include
- 414 -
Default
Setting Description
Value
Windows Exclude None A plain text file containing a list of filepaths to exclude
Filepath from any search on Windows systems.
Windows Include None A plain text file containing a list of filepaths to include in
Filepath any use of Recursive search on Windows systems.
Debug Settings
Enable plugin Disabled Attaches available debug logs from plugins to the
- 415 -
Default
Setting Description
Value
Maximum delay 0 (Agents 8.2 and later) If set, each agent in the agent
(minutes) group delays starting the scan for a random number of
minutes, up to the specified maximum. Staggered starts
can reduce the impact of agents that use a shared
resource, such as virtual machine CPU.
Maximum 128,000 KB Controls the maximum output length for each individual
Compliance compliance check value that the target returns. If a
Output Length in compliance check value that is greater than this setting's
KB value, Tenable Vulnerability Management truncates the
result.
- 416 -
Default
Setting Description
Value
- 417 -
Vulnerability Scans (Common)
l Performance options:
o 30 simultaneous hosts (max)
o 4 simultaneous checks per host
(max)
o 5 second network read timeout
- 418 -
o Create unique identifier on
hosts scanned using credentials
Host Discovery – –
- 419 -
o 4 simultaneous checks per host
(max)
o 5 second network read timeout
- 420 -
bandwidth links o 2 simultaneous hosts (max)
o 2 simultaneous checks per host
(max)
o 15 second network read timeout
o Slow down the scan when
network congestion is detected
- 421 -
o Create unique identifier on
hosts scanned using credentials
Configuration Scans
- 422 -
l Asset identification options:
o Create unique identifier on
hosts scanned using credentials
Tactical Scans
- 423 -
Bash Shellshock – All defaults
Detection
- 424 -
Detection
Credentialed scans can perform any operation that a local user can perform. The level of scanning
depends on the privileges granted to the user account. The more privileges the scanner has via the
login account (for example, root or administrator access), the more thorough the scan results.
In Tenable Vulnerability Management, you can create credentials for use in scans in the following
ways:
- 425 -
recommends adding managed credentials to scans,
instead of adding credentials to user-defined
templates.
The settings you configure for a credential vary based on the credential type. Credential types
include:
l Cloud Services
l Database
l Host
l Miscellaneous
- 426 -
l Patch Management
l Plaintext authentication
Note: Tenable Vulnerability Management opens several concurrent authenticated connections. Ensure that
the host being audited does not have a strict account lockout policy based on concurrent sessions.
Note: By default, when creating credentialed scans or user-defined templates, hosts are
identified and marked with a Tenable Asset Identifier (TAI). This globally unique identifier is
written to the host's registry or file system, and subsequent scans can retrieve and use the TAI.
This option is enabled (by default) or disabled in the Advanced -> General Settings of a scan
configuration or template: Create unique identifier on hosts scanned using credentials.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
In the event that a scan contains multiple instances of a single type of credential (SSH logins, SMB
logins, etc.), Tenable Vulnerability Management attempts to use them on a valid target in the order
that they were added to the scan configuration.
Note: The first credential that allows successful login is used to perform credentialed checks on the
target. After a credential provides successful login, Tenable Vulnerability Management does not try any of
the other credentials in the list, even if one of the latter credentials has a greater degree of access or
privileges.
- 427 -
To add a credential to a scan:
The Credentials page appears. This page contains a table of credentials configured for the
scan.
a. (Optional) Search for a managed credential in the list by typing your search criteria in the
text box and clicking the button.
b. In the Managed Credentials section, click the button to display all managed
credentials.
d. To close the Select Credential Type plane, click the button in the upper-right corner
of the plane.
- 428 -
Add a new managed credential.
a. In any section of the Select Credential Type plane except the Managed Credentials
section, click the button to display the credentials for that type.
e. In the first text box, type a name for the managed credential.
f. (Optional) In the second text box, type a brief description of the managed credential.
Tenable Vulnerability Management closes the settings plane and adds the credential to the
credentials table for the scan.
Note: Upon saving, Tenable Vulnerability Management automatically orders the credentials by
ascending ID and groups the credentials by type.
l If you want to save and launch the scan immediately, click Save & Launch.
Note: If you scheduled the scan to run at a later time, the Save & Launch option is not
available.
- 429 -
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
1. Edit a scan.
6. (Managed credentials only) Click Yes to save the changes to the managed credential.
- 430 -
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
l You cannot use managed credentials in user-defined templates. To use a single set of
credentials for multiple scans, add managed credentials to scans, instead of adding
credentials to user-defined templates.
Note: In scan configurations, the Scan-wide Credential Type settings are located in individual credentials.
In user-defined templates, these settings are located in the Authentication section of the Basic settings
for the template.
The Credentials page appears. This page contains a table of credentials configured for the
template.
Tenable Vulnerability Management closes the settings plane and adds the credential to the
credentials table for the template.
- 431 -
7. Click Save to save your template changes.
Tenable Vulnerability Management adds the credential to the credentials table for the
template.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
A scan-specific credential can only be used in a single scan. To reuse a scan-specific credential in
multiple scans, convert it to a managed credential.
- 432 -
1. In the upper-left corner, click the button.
2. In the left navigation plane, in the Vulnerability Management section, click Scans.
3. In the Folders section, click a folder to load the scans you want to view.
The scans table updates to display the scans in the folder you selected.
7. In the credentials table, click the scan-specific credential you want to convert.
9. In the first text box, type a name for the managed credential.
10. (Optional) In the second text box, type a brief description of the managed credential.
Tenable Vulnerability Management closes the settings plane and adds the credential to the
credentials table for the scan.
Cloud Services
- 433 -
Tenable Vulnerability Management can authenticate a scan using accounts in the cloud services
listed below.
Note: Some credential types may not be available for configuration, depending on the scan template you
selected.
AWS
Default
Option Description Required
Value
l us-east-1
l us-east-2
- 434 -
l us-west-1
l us-west-2
l ca-central-1
l eu-west-1
l eu-west-2
l eu-central-1
l ap-northeast-1
l ap-northeast-2
l ap-southeast-1
l ap-southeast-2
l sa-east-1
l cn-north-1
l cn-northwest-1
Microsoft Azure
Default
Option Description Required
Value
- 435 -
Password – Password associated with the username. yes
Rackspace
l Chicago (ORD)
l London (LON)
l Syndney (SYD)
Salesforce.com
- 436 -
Value
Database Credentials
Note: Some credential types may not be available for configuration, depending on the scan template you
selected.
DB2
The following table describes the additional options to configure for DB2 credentials.
Options Description
Auth Type The authentication method for providing the required credentials.
l Password
l Import
l CyberArk
l Lieberman
l Hashicorp Vault
For descriptions of the options for your selected authentication type, see
Database Credentials Authentication Types.
Database The TCP port that the IBM DB2 database instance listens on for
Port communications from Tenable Vulnerability Management. The default is port
50000.
Database The name for your database (not the name of your instance).
Name
MySQL
- 437 -
The following table describes the additional options to configure for MySQL credentials.
Options Description
Auth Type The authentication method for providing the required credentials.
l Password
l Import
l CyberArk
l Lieberman
l Hashicorp Vault
For descriptions of the options for your selected authentication type, see
Database Credentials Authentication Types.
Database The TCP port that the MySQL database instance listens on for
Port communications from Tenable Vulnerability Management. The default is port
3306.
Oracle
The following table describes the additional options to configure for Oracle credentials.
Options Description
Auth Type The authentication method for providing the required credentials.
l Password
l Import
l CyberArk
l Lieberman
l Hashicorp Vault
- 438 -
Options Description
For descriptions of the options for your selected authentication type, see
Database Credentials Authentication Types.
Database The TCP port that the Oracle database instance listens on for communications
Port from Tenable Vulnerability Management. The default is port 1521.
Auth Type The type of account you want Tenable Vulnerability Management to use to
access the database instance:
l SYSDBA
l SYSOPER
l NORMAL
Service Type The Oracle parameter you want to use to specify the database instance: SID or
SERVICE_NAME.
Service The SID value or SERVICE_NAME value for your database instance.
The Service value you enter must match your parameter selection for the
Service Type option.
PostgreSQL
The following table describes the additional options to configure for PostgreSQL credentials.
Options Description
Auth Type The authentication method for providing the required credentials.
l Password
l Client Certificate
l CyberArk
l Lieberman
l Hashicorp Vault
For descriptions of the options for your selected authentication type, see
- 439 -
Options Description
Database The TCP port that the PostgreSQL database instance listens on for
Port communications from Tenable Vulnerability Management. The default is port
5432.
SQL Server
The following table describes the additional options to configure for SQL Server credentials.
Options Description
Auth Type The authentication method for providing the required credentials.
l Password
l Import
l CyberArk
l Lieberman
l Hashicorp Vault
For descriptions of the options for your selected authentication type, see
Database Credentials Authentication Types.
Database The TCP port that the SQL Server database instance listens on for
Port communications from Tenable Vulnerability Management. The default is port
1433.
AuthType The type of account you want Tenable Vulnerability Management to use to
access the database instance: SQL or Windows.
- 440 -
Options Description
Name
Sybase ASE
The following table describes the additional options to configure for Sybase ASE credentials.
Options Description
Auth Type The authentication method for providing the required credentials.
l Password
l CyberArk
l Lieberman
l Hashicorp Vault
For descriptions of the options for your selected authentication type, see
Database Credentials Authentication Types.
Database The TCP port that the Sybase ASE database instance listens on for
Port communications from Tenable Vulnerability Management. The default is port
3638.
Auth Type The type of authentication used by the Sybase ASE database: RSA or Plain
Text.
Cassandra
Option Description
Auth Type The authentication method for providing the required credentials.
l Password
l CyberArk
l Lieberman
l Hashicorp Vault
- 441 -
Option Description
For descriptions of the options for your selected authentication type, see
Database Credentials Authentication Types.
Port The port the database listens on. The default is port 9042.
MongoDB
Option Description
Auth Type The authentication method for providing the required credentials.
Note: This option is only available for non-legacy versions of the MongoDB
authentication method.
l Password
l Client Certificate
l CyberArk
l Lieberman
l Hashicorp Vault
For descriptions of the options for your selected authentication type, see
Database Credentials Authentication Types.
Port (Required) The TCP port that the MongoDB database instance listens on for
communications from Tenable Vulnerability Management.
- 442 -
Depending on the authentication type you select for your database credentials, you must configure
the options described in this topic.
Client Certificate
The Client Certificate authentication type is supported for PostgreSQL databases only.
Client Certificate The file that contains the PEM certificate for the yes
database.
Client CA Certificate The file that contains the PEM certificate for the yes
database.
Client Certificate The file that contains the PEM private key for the yes
Private Key client certificate.
Password
Database
Option Description Required
Types
- 443 -
Database
Option Description Required
Types
l SYSDBA
l SYSOPER
l NORMAL
l RSA
l Plain Text
l SID
l SERVICE_NAME
Import
- 444 -
Upload a .csv file with the credentials entered in the specified format. For descriptions of valid
values to use for each item, see Database Credentials.
You must configure either CyberArk or HashiCorp credentials for a database credential in the same
scan so that Tenable Vulnerability Management can retrieve the credentials.
Database
CSV Format
Credential
Note: Include the required data in the specified order, with commas between each value, without spaces.
For example, for Oracle with CyberArk: 192.0.2.255,1521,SID,service_
id,username,SYSDBA,CyberArk,Database-Oracle-SYS.
BeyondTrust
Option Description Required
- 445 -
BeyondTrust port The port on which BeyondTrust listens. yes
Checkout duration The length of time, in minutes, that you want to yes
keep credentials checked out in BeyondTrust.
Configure the checkout duration to exceed the
typical duration of your scans. If a password from a
previous scan is still checked out when a new scan
begins, the new scan fails.
Use SSL When enabled, the integration uses SSL through IIS no
for secure communications. Configure SSL through
IIS in BeyondTrust before enabling this option.
Verify SSL certificate When enabled, the intergation validates the SSL no
certificate. Configure SSL through IIS in
BeyondTrust before enabling this option.
CyberArk
CyberArk is a popular enterprise password vault that helps you manage privileged credentials.
Tenable Vulnerability Management can get credentials from CyberArk to use in a scan.
CyberArk Host The IP address or FQDN name for the CyberArk AIM Web yes
Service. This can be the host, or the host with a custom
URL added on in a single string.
- 446 -
Option Description Required
Client The file that contains the PEM private key for the client yes, if
Certificate certificate. private key
Private Key is applied
Get credential The method with which your CyberArk API credentials are yes
by retrieved. Can be Username, Identifier, or Address.
Account Name (If Get credential by is Identifier) The unique account name no
or identifier assigned to the CyberArk API credential.
Use SSL If enabled, the scanner uses SSL through IIS for secure no
communications. Enable this option if CyberArk is
- 447 -
Option Description Required
Verify SSL If enabled, the scanner validates the SSL certificate. Enable no
Certificate this option if CyberArk is configured to support SSL through
IIS and you want to validate the certificate.
CyberArk (Legacy)
CyberArk is a popular enterprise password vault that helps you manage privileged credentials.
Tenable Vulnerability Management can get credentials from CyberArk to use in a scan.
Database
Option Description Required
Types
- 448 -
Database
Option Description Required
Types
- 449 -
Database
Option Description Required
Types
l SYSDBA
l SYSOPER
l NORMAL
l RSA
- 450 -
Database
Option Description Required
Types
l Plain Text
Instance Name SQL Server The name for your database instance. no
l SID
l SERVICE_NAME
Delinea
Option Description Required
Delinea Secret Name The value of the secret on the Delinea server. The yes
secret is labeled Secret Name on the Delinea
server.
Delinea Port The port on which Delinea Secret Server listens. yes
- 451 -
Name you provided.
Delinea API key The API key provided by Delinea Secret Server. yes
HashiCorp Vault
HashiCorp Vault is a popular enterprise password vault that helps you manage privileged
credentials. Tenable Vulnerability Management can get credentials from HashiCorp Vault to use in a
scan.
Hashicorp Vault host The Hashicorp Vault IP address or DNS address. yes
Hashicorp Vault port The port on which Hashicorp Vault listens. yes
Role Secret ID The GUID generated by Hashicorp Vault when you yes
- 452 -
configured your App Role.
/v1/auth/approle/login
KV1 Engine URL (KV1) The URL Tenable Vulnerability Management yes, if you
uses to access the KV1 engine. select the KV1
Vault Type
Example: /v1/path_to_secret. No trailing /
KV2 Engine URL (KV2) The URL Tenable Vulnerability Management yes, if you
uses to access the KV2 engine. select the KV2
Vault Type
Example: /v1/path_to_secret. No trailing /
AD Engine URL (AD) The URL Tenable Vulnerability Management yes, if you
uses to access the active directory engine. select the AD
Vault Type
Example: /v1/path_to_secret. No trailing /
LDAP Engine URL (LDAP) The URL Tenable Vulnerability yes, if you
Management uses to access the LDAP engine. select the
LDAP Vault
Example: /v1/path_to_secret. No trailing /
Type
Username Source (KV1 and KV2) A drop-down box to specify whether yes
the username is input manually or pulled from
Hashicorp Vault.
Username Key (KV1 and KV2) The name in Hashicorp Vault that yes
- 453 -
usernames are stored under.
Password Key (KV1 and KV2) The key in Hashicorp Vault that yes
passwords are stored under.
Secret Name (KV1, KV2, and AD) The key secret you want to yes
retrieve values for.
Verify SSL Certificate If enabled, validates the SSL certificate. You must no
configure SSL in Hashicorp Vault before enabling
this option.
l SYSDBA
l SYSOPER
l NORMAL
Service Type (Oracle databases only) Valid values include: SID yes
and SERVICE_NAME.
Lieberman
Lieberman is a popular enterprise password vault that helps you manage privileged credentials.
Tenable Vulnerability Management can get credentials from Lieberman to use in a scan.
- 454 -
Option Database Type Description Required
- 455 -
Option Database Type Description Required
Authenticator fields.
Lieberman Client All The file that contains the PEM private no
Certificate key for the client certificate.
Private Key
Auth type Oracle (SQL Server, Oracle. and Sybase ASE yes
databases only)
- 456 -
Option Database Type Description Required
l SQL
l SYSDBA
l SYSOPER
l NORMAL
l RSA
l Plain Text
Instance Name SQL Server The name for your database instance. no
l SID
l SERVICE_NAME
QiAnXin
QiAnXin is a popular enterprise password vault that helps you manage privileged credentials.
Tenable Vulnerability Management can get credentials from QiAnXin to use in a scan.
QiAnXin Host The IP address or URL for the QiAnXin host. yes
- 457 -
Option Description Required
QiAnXin Port The port on which the QiAnXin API communicates. yes
By default, Tenable uses 443.
QiAnXin API Client ID The Client ID for the embedded account yes
application created in QiAnXin PAM
QiAnXin API Secret ID The Secret ID for the embedded account yes
application created in QiAnXin PAM
l HP_UNIX — HP Unix
- 458 -
Option Description Required
l SOLARIS — Solaris
l OPENLDAP — OpenLDAP
l POSTGRESQL — PostgreSQL
Region ID Specify the region ID of the asset containing the Only if using
account to use. multiple
regions
Verify SSL Certificate When enabled, Tenable verifies that the SSL no
Certificate on the server is signed by a trusted CA.
Senhasegura
Option Description Required
- 459 -
Option Description Required
Private Key File The Private Key used to decrypt Required if you have
encrypted sensitive data from A2A. enabled encryption of
sensitive data in A2A
Note: You can enable encryption of Application
sensitive data in the A2A Application
Authorizations. If enabled, you must
Authorizations.
provide a private key file in the scan
credentials. This can be downloaded from
the applicable A2A application in
Senhasegura.
Host
l SNMPv3
l Windows
Note: Some credential types may not be available for configuration, depending on the scan template you
selected.
SNMPv3
Use SNMPv3 credentials to scan remote systems that use an encrypted network management
protocol (including network devices). Tenable Vulnerability Management uses these credentials to
scan for patch auditing or compliance checks.
Note: SNMPv3 options are only available in the Advanced Network Scan template.
- 460 -
Option Description Default Required
l Authentication and
privacy
Authentication The algorithm the remove SHA1 yes (if you select
algorithm service supports: , SHA1, authentication)
SHA224, SHA-256, SHA-
384, SHA-512 or MD5.
Privacy algorithm The encryption algorithm to AES-192 yes (if you select
use for SNMP traffic: AES, authentication
AES-192, AES-192C, AES- with privacy)
256, AES-256C, or DES.
- 461 -
Option Description Default Required
SSH
Use SSH credentials for host-based checks on Unix systems and supported network devices.
Tenable Vulnerability Management uses these credentials to obtain local information from remote
Unix systems for patch auditing or compliance checks. Tenable Vulnerability Management uses
Secure Shell (SSH) protocol version 2 based programs (e.g., OpenSSH, Solaris SSH, etc.) for host-
based checks.
Tenable Vulnerability Management encrypts the data to protect it from being viewed by sniffer
programs.
Note: Non-privileged users with local access on Linux systems can determine basic security issues, such
as patch levels or entries in the /etc/passwd file. For more comprehensive information, such as system
configuration data or file permissions across the entire system, an account with root privileges is required.
Note: You can add up to 1000 SSH credentials in a single scan. For best performance, Tenable
recommends adding no more than 10 SSH credentials per scan.
Select SSH in the Credentials list to configure the settings for the following SSH authentication
methods:
Like Public Key Encryption, Tenable Vulnerability Management supports RSA and DSA OpenSSH
certificates. Tenable Vulnerability Management also requires the user certificate, which is signed by
a Certificate Authority (CA), and the user’s private key.
- 462 -
Note:Tenable Vulnerability Management supports the OpenSSH SSH public key format. Formats from other
SSH applications, including PuTTY and SSH Communications Security, must be converted to OpenSSH
public key format.
The most effective credentialed scans are when the supplied credentials have root privileges. Since
many sites do not permit a remote login as root, Tenable Vulnerability Management can invoke su,
sudo, su+sudo, dzdo, .k5login, or pbrun with a separate password for an account that has been set
up to have su or sudo privileges. In addition, Tenable Vulnerability Management can escalate
privileges on Cisco devices by selecting Cisco ‘enable’ or .k5login for Kerberos logins.
Note:Tenable Vulnerability Management supports the blowfish-cbc, aes-cbc, and aes-ctr cipher
algorithms. Some commercial variants of SSH do not have support for the blowfish algorithm, possibly for
export reasons. It is also possible to configure an SSH server to accept certain types of encryption only.
Check your SSH server to ensure the correct algorithm is supported.
Tenable Vulnerability Management encrypts all passwords stored in policies. However, the use of
SSH keys for authentication rather than SSH passwords is recommended. This helps ensure that
the same username and password you are using to audit your known SSH servers is not used to
attempt a log into a system that may not be under your control.
Note: For supported network devices, Tenable Vulnerability Management only supports the network
device’s username and password for SSH connections.
If an account other than root must be used for privilege escalation, it can be specified under the
Escalation account with the Escalation password.
Private Key The RSA or DSA Open SSH key file of the user. yes
- 463 -
Option Description Required
User The RSA or DSA Open SSH certificate file of the user. yes
Certificate
Private Key The RSA or DSA Open SSH key file of the user. yes
- 464 -
Option Description Required
CyberArk
CyberArk Host The IP address or FQDN name for the CyberArk AIM Web yes
Service.
Client Certificate The file that contains the PEM certificate used to no
communicate with the CyberArk host.
Client Certificate The file that contains the PEM private key for the client yes, if
- 465 -
Option Description Required
Client Certificate The passphrase for the private key, if required. yes, if
Private Key private key
Passphrase is applied
Get credential by The method with which your CyberArk API credentials yes
are retrieved. Can be Username, Identifier, or Address.
- 466 -
Option Description Required
Use SSL If enabled, the scanner uses SSL through IIS for secure no
communications. Enable this option if CyberArk is
configured to support SSL through IIS.
CyberArk Auto-Discovery
You can now take advantage of a significant improvement to Tenable’s CyberArk Integration which
gathers bulk account information for specific target groups without entering multiple targets. For
more information, see CyberArk Dynamic Scanning in the Tenable CyberArk Integrations Guide.
- 467 -
Option Description Required
CyberArk Host The IP address or FQDN name for the user’s CyberArk yes
Instance.
AIM Web Service There are two authentication methods established in yes
Authentication the feature. IIS Basic Authentication and Certificate
Type Authentication. Certificate Authentication can be either
encrypted or unencrypted.
CyberArk PVWA Password for the username to log in to CyberArk web yes
Web UI Login console. This is used to authenticate to the PVWA REST
Password API and gather bulk account information.
CyberArk String used in the PVWA REST API query parameters to yes
Platform Search gather bulk account information. For example, the user
String can enter UnixSSH Admin TestSafe, to gather all
UnixSSH platform accounts containing a username
Admin in a Safe called TestSafe.
- 468 -
Option Description Required
Elevate Privileges Users can only select Nothing or sudo at this time. no
with
Use SSL If enabled, the scanner uses SSL through IIS for secure yes
communications. Enable this option if CyberArk is
configured to support SSL through IIS.
CyberArk (Legacy)
CyberArk AIM The URL for the CyberArk AIM web service. By no
Service URL default, Tenable Vulnerability Management uses
/AIMWebservice/v1.1/AIM.asmx.
Central The port on which the CyberArk Central Credential Provider yes
Credential is listening.
Provider Port
- 469 -
Option Description Required
Safe The safe on the CyberArk Central Credential Provider server yes
that contained the authentication information that you want
to retrieve.
CyberArk The file that contains the PEM private key for the client no
Client certificate.
Certificate
Private Key
AppId The AppId that has been allocated permissions on the yes
CyberArk Central Credential Provider to retrieve the target
password.
- 470 -
Option Description Required
CyberArk The unique name of the credential you want to retrieve from no
Account CyberArk.
Details Name
Custom The password prompt used by the target host. Only use this no
password setting when an interactive SSH session fails due to
- 471 -
Option Description Required
Delinea Password The password to authenticate to the Delinea server. This yes
is associated with the Delinea Login Name you provided.
Delinea API Key The API key generated in the Secret Server user yes
interface. This setting is required if the API Key
authentication method is selected.
Delinea Secret The value of the secret on the Delinea server. The secret yes
Name is labeled Secret Name on the Delinea server.
Delinea Host The Delinea Secret Server host to pull the secrets from. yes
Delinea Port The Delinea Secret Server Port for API requests. By yes
default, Tenable uses 443.
- 472 -
Elevate privileges The privilege escalation method you want to use to no
with increase users' privileges after initial authentication.
Multiple options for privilege escalation are supported,
including su, su+sudo and sudo. Your selection
determines the specific options you must configure.
- 473 -
Hashicorp Vault The Hashicorp Vault IP address or DNS address. yes
host
Note: If your Hashicorp Vault installation is in a
subdirectory, you must include the subdirectory path.
For example, type IP address or hostname /
subdirectory path.
Role Secret ID The GUID generated by Hashicorp Vault when you yes
configured your App Role.
/v1/auth/approle/login
- 474 -
KV1 Engine URL (KV1) The URL Tenable Vulnerability Management yes, if you
uses to access the KV1 engine. select the KV1
Vault Type
Example: /v1/path_to_secret. No trailing /
KV2 Engine URL (KV2) The URL Tenable Vulnerability Management yes, if you
uses to access the KV2 engine. select the KV2
Vault Type
Example: /v1/kv_mount_name. No trailing /
Note: You cannot use the path to the secret for the
KV2 Engine URL because an additional
string/segment, data, gets injected into the read
request made to Vault for KV v2 stores. Only enter the
name of the KV mount, not the path to the secret, in
the Engine URL field.
AD Engine URL (AD) The URL Tenable Vulnerability Management uses yes, if you
to access the Active Directory engine. select the AD
Vault Type
Example: /v1/path_to_secret. No trailing /
LDAP Engine URL (LDAP) The URL Tenable Vulnerability Management yes, if you
uses to access the LDAP engine. select the
LDAP Vault
Example: /v1/path_to_secret. No trailing /
Type
Username Source (KV1 and KV2) A drop-down box to specify if the yes
username is input manually or pulled from Hashicorp
Vault.
Username Key (KV1 and KV2) The name in Hashicorp Vault that yes
usernames are stored under.
- 475 -
Domain Key (KV1 and KV2) The name in Hashicorp Vault that no
domains are stored under.
Password Key (KV1 and KV2) The key in Hashicorp Vault that yes
passwords are stored under.
Secret Name (KV1, KV2, and AD) The key secret you want to yes
retrieve values for.
- 476 -
Hashicorp Vault before enabling this option.
Enable for Tenable Enables/disables IBM DataPower Gateway use with yes
Vulnerability Tenable Vulnerability Management.
Management
Escalate Privileges Use a privilege escalation method such as su or sudo Required if you
with (SSH) to use extra privileges when scanning. wish to
escalate
Note: Tenable supports multiple options for privilege privileges.
escalation, including su, su+sudo and sudo. For
example, if you select sudo, more fields for sudo user,
Escalation Account Name, and Location of su and
sudo (directory) are provided and can be completed to
support authentication and privilege escalation
through Tenable Vulnerability Management. The
Escalation Account Name field is then required to
complete your privilege escalation.
- 477 -
all users and services that require Kerberos authentication. Users authenticate to Kerberos by
requesting a TGT (Ticket Granting Ticket). Once a user is granted a TGT, it can be used to request
service tickets from the KDC to be able to utilize other Kerberos based services. Kerberos uses the
CBC (Cipher Block Chain) DES encryption protocol to encrypt all communications.
Note: You must already have a Kerberos environment established to use this method of authentication.
4. The nessusd requests a Kerberos TGT, along with login and password.
In both Windows and SSH credentials settings, you can specify credentials using Kerberos keys
from a remote system. There are differences in the configurations for Windows and SSH.
Key This host supplies the session tickets for the user. yes
Distribution
Center (KDC)
- 478 -
Option Description Required
KDC Transport The method by which you want to access the KDC server. no
Note: if you set KDC Transport to UDP, you may also need to
change the port number, because depending on the
implementation, the KDC UDP protocol uses either port 88 or
750 by default.
If Kerberos is used, sshd must be configured with Kerberos support to verify the ticket with the
KDC. Reverse DNS lookups must be properly configured for this to work. The Kerberos interaction
method must be gssapi-with-mic.
- 479 -
Option Description Required
Custom The password prompt used by the target host. Only use this no
password setting when an interactive SSH session fails due to Tenable
prompt Vulnerability Management receiving an unrecognized
password prompt on the target host's interactive SSH shell.
- 480 -
Option Description Required
Lieberman user The Lieberman explicit user for authenticating to the yes
Lieberman RED API.
Lieberman Client The file that contains the PEM certificate used to no
Certificate communicate with the Lieberman host.
Lieberman Client The file that contains the PEM private key for the client no
Certificate certificate.
Private Key
- 481 -
Option Description Required
System Name In the rare case your organization uses one default no
Lieberman entry for all managed systems, enter the
default entry name.
Custom The password prompt used by the target host. Only use no
- 482 -
Option Description Required
password prompt this setting when an interactive SSH session fails due to
Tenable Vulnerability Management receiving an
unrecognized password prompt on the target host's
interactive SSH shell.
QiAnXin Host The IP address or url for the QiAnXin host. yes
QiAnXin Port The port on which the QiAnXin API communicates. yes
By default, Tenable uses 443.
QiAnXin API Client ID The Client ID for the embedded account yes
application created in QiAnXin PAM.
QiAnXin API Secret ID The Secret ID for the embedded account yes
application created in QiAnXin PAM.
- 483 -
Option Description Required
Account
l HP_UNIX — HP Unix
l SOLARIS — Solaris
l OPENLDAP — OpenLDAP
l POSTGRESQL — PostgreSQL
Region ID Specify the region ID of the asset containing the Only if using
account to use. multiple
regions
Escalate Privileges Use the drop-down menu to select the privilege Required if you
with elevation method, or select “Nothing” to skip wish to
privilege elevation. escalate
privileges.
Note: Tenable supports multiple options for
privilege escalation, including su, su+sudo and
sudo. For example, if you select sudo, more fields
for sudo user, Escalation Account Name, and
Location of su and sudo (directory) are provided
and can be completed to support authentication
and privilege escalation through QiAnXin. The
Escalation Account Name field is only required if
- 484 -
Option Description Required
Verify SSL Certificate When enabled, Tenable verifies that the SSL no
Certificate on the server is signed by a trusted
CA.
Thycotic Secret The value of the secret on the Thycotic server. The secret yes
Name is labeled Secret Name on the Thycotic server.
Thycotic Secret The transfer method, target, and target directory for the yes
Server URL scanner. You can find this value on the Thycotic server in
Admin > Configuration > Application Settings > Secret
Server URL.
- 485 -
l Transfer method: https indicates an ssl connection.
Thycotic The organization you want to query. You can use this value no
Organization for cloud instances of Thycotic.
Use Private Key The key for the SSH connection, if you do not use a no
password.
Verify SSL Whether you want to verify if the SSL Certificate on the no
Certificate server is signed by a trusted CA.
Custom The password prompt used by the target host. Only use no
password this setting when an interactive SSH session fails due to
prompt Tenable Vulnerability Management receiving an
unrecognized password prompt on the target host's
interactive SSH shell.
- 486 -
Targets to Specify IPs or CIDR blocks on which this credential is no
prioritize attempted before any other credential. To specify multiple
credentials IPs or CIDR blocks, use a comma or space-separated list.
Username The username to log in to the hosts you want to scan. yes
Checkout The length of time, in minutes, that you want to keep yes
duration credentials checked out in BeyondTrust. Configure the
Checkout duration to exceed the typical duration of your
Tenable Vulnerability Management scans. If a password
from a previous scan is still checked out when a new scan
begins, the new scan fails.
- 487 -
Note: Configure the password change interval in
BeyondTrust so that password changes do not disrupt your
Tenable Vulnerability Management scans. If BeyondTrust
changes a password during a scan, the scan fails.
Custom The password prompt used by the target host. Only use no
password this setting when an interactive SSH session fails due to
prompt Tenable Vulnerability Management receiving an
unrecognized password prompt on the target host's
interactive SSH shell.
- 488 -
credentials, and the successful credential is the 59th
credential out of 100, the first 58 credentials have to fail
before the 59th credential succeeds. If you use Targets To
Prioritize Credentials, you configure the scan to use the
successful credential first, which allows the scan to
access the target faster.
- 489 -
Option Default Value Description
30%.
Option Description
Centrify Port (Required) The port on which Centrify listens. By default, Tenable
Vulnerability Management uses port 443.
Tenant (Required) The Centrify tenant associated with the API. By default,
Tenable Vulnerability Management uses centrify.
Password Query (Required) The URL Tenable Vulnerability Management uses to query the
URL passwords in Centrify. By default, Tenable Security Center uses
/RedRock.
Password Engine (Required) The URL Tenable Vulnerability Management uses to access
URL the passwords in Centrify. By default, Tenable Vulnerability Management
uses /ServerManage.
Username (Required) The username to log in to the hosts you want to scan.
Checkout Duration (Required) The length of time, in minutes, that you want to keep
credentials checked out in Centrify.
- 490 -
Tenable Security Center scans so that password changes do not disrupt
your Tenable Vulnerability Management scans. If Centrify changes a
password during a scan, the scan fails. If a password from a previous
scan is still checked out when a new scan begins, the new scan fails.
Use SSL When enabled, Tenable Vulnerability Management uses SSL through IIS
for secure communications. You must configure SSL through IIS in
Centrify before enabling this option.
Option Description
Arcon Port (Required) The port on which Arcon listens. By default, Tenable Security
Center uses port 444.
Authentication (Required) The URL Tenable Security Center uses to access Arcon.
URL
Password Engine (Required) The URL Tenable Security Center uses to access the
URL passwords in Arcon.
Username (Required) The username to log in to the hosts you want to scan.
Arcon Target Type (Optional) The name of the target type. Depending on the Arcon PAM
version you are using and the system type the SSH credential has been
- 491 -
created with, this is set to linux by default. Refer to the Arcon PAM
Specifications document (provided by Arcon) for target type/system
type mapping for the correct target type value.
Checkout Duration (Required) The length of time, in hours, that you want to keep
credentials checked out in Arcon. Configure the Checkout Duration to
exceed the typical duration of your Tenable Security Center scans. If a
password from a previous scan is still checked out when a new scan
begins, the new scan fails.
Use SSL When enabled, Tenable Security Center uses SSL through IIS for secure
communications. You must configure SSL through IIS in Arcon before
enabling this option.
Verify When enabled, Tenable Security Center validates the SSL certificate.
SSL Certificate You must configure SSL through IIS in Arcon before enabling this option.
Privilege The privilege escalation method you want to use to increase users'
Escalation privileges after initial authentication. Your Privilege Escalation selection
determines the specific options you must configure. For more
information, see Privilege Escalation.
Note: Non-privileged users with local access on Unix systems can determine basic security issues, such as
patch levels or entries in the /etc/passwd file. For more comprehensive information, such as system
configuration data or file permissions across the entire system, an account with root privileges is required.
Windows
Click Windows in the Credentials list to configure settings for the following Windows-based
authentication methods:
- 492 -
CyberArk
CyberArk Host The IP address or FQDN name for the CyberArk AIM Web yes
Service. This can be the host, or the host with a custom
URL added on in a single string.
Client Certificate The file that contains the PEM certificate used to no
communicate with the CyberArk host.
Client Certificate The file that contains the PEM private key for the client yes, if
Private Key certificate. private key
is applied
Client Certificate The passphrase for the private key, if required. yes, if
Private Key private key
Passphrase is applied
- 493 -
Option Description Required
Get credential by The method with which your CyberArk API credentials yes
are retrieved. Can be Username, Identifier, or Address.
Use SSL If enabled, the scanner uses SSL through IIS for secure no
communications. Enable this option if CyberArk is
configured to support SSL through IIS.
- 494 -
Option Description Required
CyberArk Auto-Discovery
You can now take advantage of a significant improvement to Tenable’s CyberArk Integration which
gathers bulk account information for specific target groups without entering multiple targets. For
more information, see CyberArk Dynamic Scanning in the Tenable CyberArk Integrations Guide.
CyberArk Host The IP address or FQDN name for the user’s CyberArk yes
Instance.
AIM Web Service There are two authentication methods established in yes
Authentication the feature. IIS Basic Authentication and Certificate
Type Authentication. Certificate Authentication can be either
encrypted or unencrypted.
CyberArk PVWA Password for the username to log in to CyberArk web yes
Web UI Login console. This is used to authenticate to the PVWA REST
Password API and gather bulk account information.
CyberArk String used in the PVWA REST API query parameters to yes
- 495 -
Option Description Required
Platform Search gather bulk account information. For example, the user
String can enter UnixSSH Admin TestSafe, to gather all
Windows platform accounts containing a username
Admin in a Safe called TestSafe.
Use SSL If enabled, the scanner uses SSL through IIS for secure yes
communications. Enable this option if CyberArk is
configured to support SSL through IIS.
CyberArk (Legacy)
CyberArk AIM The URL for the CyberArk AIM web service. By default, no
Service URL Tenable Vulnerability Management uses
/AIMWebservice/v1.1/AIM.asmx.
Central The port on which the CyberArk Central Credential Provider yes
Credential is listening.
Provider Port
- 496 -
Option Description Required
Safe The safe on the CyberArk Central Credential Provider server yes
that contained the authentication information that you want
to retrieve.
CyberArk The file that contains the PEM private key for the client no
Client certificate.
Certificate
Private Key
AppId The AppId that has been allocated permissions on the yes
CyberArk Central Credential Provider to retrieve the target
password.
- 497 -
Option Description Required
CyberArk The unique name of the credential you want to retrieve from no
Account CyberArk.
Details Name
Delinea Password The password to authenticate to the Delinea server. This yes
is associated with the Delinea Login Name you provided.
Delinea API Key The API key generated in the Secret Server user yes
interface. This setting is required if the API Key
authentication method is selected.
Delinea Secret The value of the secret on the Delinea server. The secret yes
Name is labeled Secret Name on the Delinea server.
Delinea Host The Delinea Secret Server IP address for API requests. yes
Delinea Port The Delinea Secret Server Port for API requests. By yes
- 498 -
default, Tenable uses 443.
Checkout The duration Tenable should check out the password yes
Duration from Delinea. Duration time is in hours and should be
longer than the scan time.
- 499 -
Role ID The GUID provided by Hashicorp Vault when you yes
configured your App Role.
Role Secret ID The GUID generated by Hashicorp Vault when you yes
configured your App Role.
/v1/auth/approle/login
KV1 Engine URL (KV1) The URL Tenable Vulnerability Management yes, if you
uses to access the KV1 engine. select the KV1
Vault Type
Example: /v1/path_to_secret. No trailing /
KV2 Engine URL (KV2) The URL Tenable Vulnerability Management yes, if you
uses to access the KV2 engine. select the KV2
Vault Type
Example: /v1/kv_mount_name. No trailing /
Note: You cannot use the path to the secret for the
KV2 Engine URL because an additional
string/segment, data, gets injected into the read
request made to Vault for KV v2 stores. Only enter the
name of the KV mount, not the path to the secret, in
the Engine URL field.
- 500 -
AD Engine URL (AD) The URL Tenable Vulnerability Management uses yes, if you
to access the Active Directory engine. select the AD
Vault Type
Example: /v1/path_to_secret. No trailing /
LDAP Engine URL (LDAP) The URL Tenable Vulnerability Management yes, if you
uses to access the LDAP engine. select the
LDAP Vault
Example: /v1/path_to_secret. No trailing /
Type
Username Source (KV1 and KV2) A drop-down box to specify if the yes
username is input manually or pulled from Hashicorp
Vault.
Username Key (KV1 and KV2) The name in Hashicorp Vault that yes
usernames are stored under.
Domain Key (KV1 and KV2) The name in Hashicorp Vault that no
domains are stored under.
Password Key (KV1 and KV2) The key in Hashicorp Vault that yes
passwords are stored under.
Secret Name (KV1, KV2, and AD) The key secret you want to yes
retrieve values for.
- 501 -
also need to change the port as the KDC UDP uses
either port 88 or 750 by default, depending on the
implementation.
Enable for Tenable Enables/disables IBM DataPower Gateway use with yes
Vulnerability Tenable Vulnerability Management.
Management
Escalate Privileges Use a privilege escalation method such as su or sudo Required if you
with (SSH) to use extra privileges when scanning. wish to
escalate
Note: Tenable supports multiple options for privilege privileges.
escalation, including su, su+sudo and sudo. For
example, if you select sudo, more fields for sudo user,
Escalation Account Name, and Location of su and
sudo (directory) are provided and can be completed to
support authentication and privilege escalation
through Tenable Vulnerability Management. The
Escalation Account Name field is then required to
complete your privilege escalation.
- 502 -
Note: For more information about supported privilege
escalation types and their accompanying fields, see
the Nessus User Guide and the Tenable Vulnerability
Management User Guide.
Key None The host that supplies the session tickets for yes
Distribution the user.
Center (KDC)
KDC Transport TCP The method by which you want to access the no
KDC server.
- 503 -
Lieberman is a popular enterprise password vault that helps you manage privileged credentials.
Tenable Vulnerability Management can get credentials from Lieberman to use in a scan.
Lieberman user The Lieberman explicit user for authenticating to the yes
Lieberman RED API.
Lieberman Client The file that contains the PEM certificate used to no
Certificate communicate with the Lieberman host.
Lieberman Client The file that contains the PEM private key for the client no
- 504 -
Option Description Required
Certificate certificate.
Private Key
System Name In the rare case your organization uses one default no
Lieberman entry for all managed systems, enter the
default entry name.
- 505 -
NTLM and is the default authentication method chosen by Tenable Vulnerability Management when
attempting to log into a Windows server. NTLMv2 can use SMB Signing.
QiAnXin Host The IP address or URL for the QiAnXin host. yes
QiAnXin Port The port on which the QiAnXin API communicates. yes
By default, Tenable uses 443.
QiAnXin API Client ID The Client ID for the embedded account yes
application created in QiAnXin PAM.
QiAnXin API Secret ID The Secret ID for the embedded account yes
application created in QiAnXin PAM.
- 506 -
Option Description Required
l HP_UNIX — HP Unix
l SOLARIS — Solaris
l OPENLDAP — OpenLDAP
l POSTGRESQL — PostgreSQL
Region ID Specify the region ID of the asset containing the Only if using
account to use. multiple
regions.
- 507 -
Option Description Required
Verify SSL Certificate When enabled, Tenable verifies that the SSL no
Certificate on the server is signed by a trusted CA.
Thycotic Secret The value of the secret on the Thycotic server. The secret yes
Name is labeled Secret Name on the Thycotic server.
Thycotic Secret The transfer method, target, and target directory for the yes
Server URL scanner. You can find this value on the Thycotic server in
Admin > Configuration > Application Settings > Secret
Server URL.
Thycotic The organization you want to query. You can use this value no
Organization for cloud instances of Thycotic.
- 508 -
Verify SSL Whether you want to verify if the SSL Certificate on the no
Certificate server is signed by a trusted CA.
Username The username to log in to the hosts you want to scan. yes
Checkout The length of time, in minutes, that you want to keep yes
duration credentials checked out in BeyondTrust. Configure the
Checkout duration to exceed the typical duration of your
Tenable Vulnerability Management scans. If a password
from a previous scan is still checked out when a new scan
begins, the new scan fails.
- 509 -
configure SSL through IIS in BeyondTrust before enabling
this option.
Never send Enabled By default, for security reasons, this option is enabled.
credentials in the
clear
Start the Remote Disabled This option tells Tenable Vulnerability Management to
Registry service start the Remote Registry service on computers being
during the scan scanned if it is not running. This service must be running
- 510 -
Option Default Description
Start the Server Disabled When enabled, the scanner temporarily enables the
service during the Windows Server service, which allows the computer to
scan share files and other devices on a network. The service is
disabled after the scan completes.
Option Description
Centrify Port (Required) The port on which Centrify listens. By default, Tenable
Vulnerability Management uses port 443.
Tenant (Required) The Centrify tenant associated with the API. By default,
- 511 -
Tenable Vulnerability Management uses centrify.
Password Query (Required) The URL Tenable Vulnerability Management uses to query the
URL passwords in Centrify. By default, Tenable Security Center uses
/RedRock.
Password Engine (Required) The URL Tenable Vulnerability Management uses to access
URL the passwords in Centrify. By default, Tenable Vulnerability Management
uses /ServerManage.
Username (Required) The username to log in to the hosts you want to scan.
Checkout Duration (Required) The length of time, in minutes, that you want to keep
credentials checked out in Centrify.
Use SSL When enabled, Tenable Vulnerability Management uses SSL through IIS
for secure communications. You must configure SSL through IIS in
Centrify before enabling this option.
Option Description
- 512 -
path.
Arcon Port (Required) The port on which Arcon listens. By default, Tenable Security
Center uses port 444.
Authentication (Required) The URL Tenable Security Center uses to access Arcon.
URL
Password Engine (Required) The URL Tenable Security Center uses to access the
URL passwords in Arcon.
Username (Required) The username to log in to the hosts you want to scan.
Arcon Target Type (Optional) The name of the target type. Depending on the Arcon PAM
version you are using and the system type the SSH credential has been
created with, this is set to linux by default. Refer to the Arcon PAM
Specifications document (provided by Arcon) for target type/system
type mapping for the correct target type value.
Checkout Duration (Required) The length of time, in hours, that you want to keep
credentials checked out in Arcon. Configure the Checkout Duration to
exceed the typical duration of your Tenable Security Center scans. If a
password from a previous scan is still checked out when a new scan
begins, the new scan fails.
Use SSL When enabled, Tenable Security Center uses SSL through IIS for secure
communications. You must configure SSL through IIS in Arcon before
enabling this option.
Verify When enabled, Tenable Security Center validates the SSL certificate.
SSL Certificate You must configure SSL through IIS in Arcon before enabling this option.
- 513 -
Privilege The privilege escalation method you want to use to increase users'
Escalation privileges after initial authentication. Your Privilege Escalation selection
determines the specific options you must configure. For more
information, see Privilege Escalation.
l Tenable Vulnerability Management automatically uses SMB signing if the remote Windows
server requires it. SMB signing is a cryptographic checksum applied to all SMB traffic to and
from a Windows server. Many system administrators enable this feature on their servers to
ensure that remote users are 100% authenticated and part of a domain. In addition, make sure
you enforce a policy that mandates the use of strong passwords that cannot be easily broken
via dictionary attacks from tools like John the Ripper and L0phtCrack. There have been many
different types of attacks against Windows security to illicit hashes from computers for re-
use in attacking servers. SMB Signing adds a layer of security to prevent these man-in-the-
middle attacks.
l The SPNEGO (Simple and Protected Negotiate) protocol provides Single Sign On (SSO)
capability from a Windows client to a variety of protected resources via the users’ Windows
login credentials. Tenable Vulnerability Management supports use of SPNEGO Scans and
Policies: Scans 54 of 151 with either NTLMSSP with LMv2 authentication or Kerberos and RC4
encryption. SPNEGO authentication happens through NTLM or Kerberos authentication;
nothing needs to be set in the Tenable Vulnerability Management scan configuration.
Server Message Block (SMB) is a file-sharing protocol that allows computers to share information
across the network. Providing this information to Tenable Vulnerability Management allows it to find
local information from a remote Windows host. For example, using credentials enables Tenable
- 514 -
Vulnerability Management to determine if important security patches have been applied. It is not
necessary to modify other SMB parameters from default settings.
The SMB domain field is optional and Tenable Vulnerability Management is able to log on with
domain credentials without this field. The username, password, and optional domain refer to an
account that the target machine is aware of. For example, given a username of joesmith and a
password of my4x4mpl3, a Windows server first looks for this username in the local system’s list of
users, and then determines if it is part of a domain.
Regardless of credentials used, Tenable Vulnerability Management always attempts to log into a
Windows server with the following combinations:
The actual domain name is only required if an account name is different on the domain from that on
the computer. It is entirely possible to have an Administrator account on a Windows server and
within the domain. In this case, to log on to the local server, the username of Administrator is used
with the password of that account. To log on to the domain, the Administrator username is also
used, but with the domain password and the name of the domain.
When multiple SMB accounts are configured, Tenable Vulnerability Management attempts to log in
with the supplied credentials sequentially. Once Tenable Vulnerability Management is able to
authenticate with a set of credentials, it checks subsequent credentials supplied, but only uses
them if administrative privileges are granted when previous accounts provided user access.
Some versions of Windows allow you to create a new account and designate it as an administrator.
These accounts are not always suitable for performing credentialed scans. Tenable recommends
that the original administrative account, named Administrator be used for credentialed scanning to
ensure full access is permitted. On some versions of Windows, this account may be hidden. To
unhide the real administrator account, open a DOS prompt with administrative privileges and run
the following command:
- 515 -
If an SMB account is created with limited administrator privileges, Tenable Vulnerability
Management can easily and securely scan multiple domains. Tenable recommends that network
administrators create specific domain accounts to facilitate testing. Tenable Vulnerability
Management includes a variety of security checks for Windows Vista, Windows 7, Windows 8,
Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, and Windows Server 2012
R2 that are more accurate if a domain account is provided. Tenable Vulnerability Management does
attempt to try several checks in most cases if no account is provided.
Note: The Windows Remote Registry service allows remote computers with credentials to
access the registry of the computer being audited. If the service is not running, reading keys
and values from the registry is not possible, even with full credentials. This service must be
started for a Tenable Vulnerability Management credentialed scan to audit a system fully using
credentials.
For more information, see the Tenable blog post Dynamic Remote Registry Auditing - Now you
see it, now you don’t!
Credentialed scans on Windows systems require using a full administrator level account. Several
bulletins and software updates by Microsoft have made reading the registry to determine software
patch level unreliable without administrator privileges, but not all of them. Tenable Vulnerability
Management plugins check that the provided credentials have full administrative access to ensure
the plugins execute properly. For example, full administrative access is required to perform direct
reading of the file system. This allows Tenable Vulnerability Management to attach to a computer
and perform direct file analysis to determine the true patch level of the systems being evaluated.
Privilege Escalation
You can add privilege escalation while creating a credentialed scan if the scan uses the following
authentication methods found in the Elevate Privileges With portion of the Settings tab for your
selected Authentication Method.
Arcon .k5login
certificate Cisco 'enable'
CyberArk dzdo
Kerberos pbrun
password su
public key su+sudo
- 516 -
Thycotic Secret Server sudo
The tables below describe the additional credential options you must configure for privilege
escalation.
Note: BeyondTrust's PowerBroker (pbrun) and Centrify's DirectAuthorize (dzdo) are proprietary root task
delegation methods for Unix and Linux systems.
Tip: Scans run using su+sudo allow the user to scan with a non-privileged account and then switch to a
user with sudo privileges on the remote host. This is important for locations where remote privileged login
is prohibited.
Note: Scans run using sudo vs. the root user do not always return the same results because of the
different environmental variables applied to the sudo user and other subtle differences. For more
information, see: https://www.sudo.ws/docs/man/sudo.man/.
- 517 -
su+sudo account with
elevated
privileges.
- 518 -
su privileges.
Enable password Cisco 'enable' The password to run the 'enable' yes
utility on a Cisco device.
Escalation account .k5login The username for the account with yes
pbrun elevated privileges.
dzdo
Escalation password dzdo The password for the account with yes
pbrun elevated privileges.
su
su+sudo
- 519 -
(directory) command.
SSH user password pbrun The password for the account with yes
elevated privileges.
sudo password sudo The password for the account with yes
sudo privileges.
sudo user su+sudo The username for the account with yes
sudo sudo privileges.
CyberArk Account .k5login The name parameter for the CyberArk yes
Details Name Cisco 'enable' account with elevated privileges.
dzdo
pbrun
su
su+sudo
- 520 -
sudo
Escalation account dzdo The username for the account with yes
elevated privileges.
sudo user su+sudo The username for the account with yes
sudo sudo privileges.
- 521 -
sudo
Miscellaneous
Tenable Vulnerability Management supports the additional authentication methods described below.
Note: Some credential types may not be available for configuration, depending on the scan template you
selected.
ADSI
ADSI requires the domain controller information, domain, and domain admin and password.
ADSI allows Tenable Vulnerability Management to query an ActiveSync server to determine if any
Android or iOS-based devices are connected. Using the credentials and server information, Tenable
Vulnerability Management authenticates to the domain controller (not the Exchange server) to
directly query it for device information. This feature does not require any ports be specified in the
scan configuration. These settings are required for mobile device scanning.
Option Description
- 522 -
Option Description
Tenable Vulnerability Management supports obtaining the mobile information from Exchange Server
2010 and 2013 only; Tenable Vulnerability Management cannot retrieve information from Exchange
Server 2007.
F5
Note: This credential type is only available in the Advanced Network Scan template.
Option Description
Verify SSL Verify that the SSL certificate is valid. If you are using a self-signed
Certificate certificate, disable this setting.
IBM iSeries
Note: This credential type is only available in the Advanced Network Scan template.
Option Description
Netapp API
- 523 -
Note: This credential type is only available in the Advanced Network Scan template.
Option Description
Username (Required) Username for an account on the Netapp system that has HTTPS
access.
vFiler If this setting is blank, the scan audits for all discovered Netapp virtual filers
(vFilers) on target systems. To limit the audit to a single vFiler, type the name
of the vFiler.
Nutanix Prism
Note: This credential type is only available in the Advanced Network Scan template.
Nutanix Port (Required) The TCP port that the Nutanix Prism Central host 9440
listens on for communications from Tenable.
Discover Host This option adds any discovered Nutanix Prism Central hosts -
to the scan targets to be scanned.
Discover This option adds any discovered Nutanix Prism Central Virtual -
Virtual Machines to the scan targets to be scanned.
Machines
- 524 -
Option Description Default
Verify SSL When enabled, Tenable verifies that the SSL certificate on enabled
Certificate the server is signed by a trusted CA.
OpenStack
Note: This credential type is only available in the Advanced Network Scan template.
Option Description
Tenant Name for (Required) Name of the specific tenant the scan uses to authenticate. A
Authentication tenant (also known as a project) is a group of resources that can be
controlled by users in the tenant.
Verify SSL Verify that the SSL certificate is valid. If you are using a self-signed
Certificate certificate, disable this setting.
Option Description
- 525 -
Password (Required) The Pan-OS password.
Verify SSL Verify that the SSL certificate is valid. If the target is using a self-signed
Certificate certificate, disable this setting.
Note: This credential type is only available in the Advanced Network Scan template.
Option Description
Verify SSL Certificate Verify that the SSL certificate for the RHEV server is valid.
Note: This credential type is only available in the Advanced Network Scan template.
Option Description
Do not verify SSL Do not verify that the SSL certificate for the ESXi server is
Certificate valid.
- 526 -
VMware vCenter SOAP API
VMware vCenter SOAP API allows you to access vCenter. If available, the vCenter REST API is used
to collect data in addition to the SOAP API.
For more information on configuring VMWare vCenter SOAP API, see Configure vSphere Scanning.
Note: You must use a vCenter admin account with read and write permissions.
Option Description
Verify SSL Certificate Verify that the SSL certificate for the ESXi server is valid.
Note: This credential type is only available in the Advanced Network Scan template.
Tenable can access vCenter through the native VMware vCenter SOAP API. If available, Tenable uses
the vCenter REST API to collect data in addition to the SOAP API.
Note: Tenable supports VMware vCenter/ESXi versions 7.0.3 and later for authenticated scans. This does
not impact vulnerability checks for VMware vCenter/ESXi, which do not require authentication.
Note: The SOAP API requires a vCenter account with read permissions and settings privileges. The REST
API requires a vCenter admin account with general read permissions and required Lifecycle Manager
privileges to enumerate VIBs.
- 527 -
Option Description Default
vCenter Port (Required) The TCP port that vCenter listens on for 443
communications from Tenable.
Verify SSL When enabled, Tenable verifies that the SSL certificate enabled
Certificate on the server is signed by a trusted CA.
Auto Discover This option adds any discovered VMware ESXi hypervisor not
Managed VMware hosts to the scan targets you include in your scan. enabled
ESXi Hosts
Auto Discover This option adds any discovered VMware ESXi hypervisor not
Managed VMware virtual machines to the scan targets you include in your enabled
ESXi Virtual scan.
Machines
X.509
Note: This credential type is only available in the Advanced Network Scan template.
Option Description
- 528 -
Option Description
CA certificate to trust (Required) The trusted Certificate Authority's (CA) digital certificate.
Mobile
Note: Some credential types may not be available for configuration, depending on the scan template you
selected.
ActiveSync
- 529 -
AirWatch
Default
Setting Description Required
Value
Port 443 The TCP port that AirWatch listens on for yes
communications from Tenable.
API Key – The API key for the VMware Workspace yes
ONE API.
Blackberry UEM
Option Description
- 530 -
Note: To locate the SRP ID in Blackberry UEM:
1. In the Blackberry UEM top navigation bar, click the Help drop-down.
Username The username for the account you want Tenable Vulnerability Management to
use to authenticate to Blackberry UEM.
Password The password for the account you want Tenable Vulnerability Management to
use to authenticate to Blackberry UEM.
Verify SSL When enabled, Tenable Vulnerability Management verifies that the SSL
Certificate Certificate on the server is signed by a trusted CA.
> Intune
Option Description
Tenant The Microsoft Azure Directory (tenant) ID visible in your App registration.
Client The Microsoft Azure Application (client) ID generated during your App
registration.
Secret The secret key generated when you created your client secret key in Microsoft
Azure.
Username The username for the account you want Tenable Vulnerability Management to
use to authenticate to Intune.
Password The password for the account you want Tenable Vulnerability Management to
use to authenticate to Intune.
- 531 -
MaaS360
Default
Setting Description Required
Value
App access – The App Access Key provided for MaaS360. yes
key
Collect All On When enabled, the scan collects all data types. no
Device Data
When disabled, the scan collects one or more
types of data to decrease the scan time. When
disabled, choose one or more of the following
collection options:
MobileIron
Default
Setting Description Required
Value
- 532 -
VSP Admin – The server URL Tenable Vulnerability yes
Portal URL Management uses to authenticate with the
MobileIron Admin Portal.
Workspace ONE
Note: For the Workspace ONE integration to function properly, you must be assigned all the Read-Only
permissions available for the role. For more information, see the VMware documentation.
Default
Setting Description Required
Value
- 533 -
communications from Tenable.
Collect All Device Data Yes Collects all device data required no
for plugin checks.
Patch Management
Note: Some credential types may not be available for configuration, depending on the scan template you
selected.
Tenable Vulnerability Management can leverage credentials for patch management systems to
perform patch auditing on systems for which credentials may not be available.
- 534 -
Tenable Nessus Manager can leverage credentials for patch management systems to perform patch
auditing on systems for which credentials may not be available.
Note: Patch management integration is not available on Tenable Nessus Essentials, Tenable Nessus
Professional, Tenable Nessus Expert, or managed Tenable Nessus scanners.
l HCL BigFix
l Symantec Altiris
You can configure patch management options in the Credentials section while creating a scan, as
described in Create a Vulnerability Management Scan.
IT administrators are expected to manage the patch monitoring software and install any agents
required by the patch management system on their systems.
Note: If the credential check sees a system but it is unable to authenticate against the system, it uses the
data obtained from the patch management system to perform the check. If Tenable Vulnerability
Management is able to connect to the target system, it performs checks on that system and ignores the
patch management system output.
Note: The data returned to Tenable Vulnerability Management by the patch management system is only as
current as the most recent data that the patch management system has obtained from its managed hosts.
Note: If the credential check sees a system but it is unable to authenticate against the system, it uses the
data obtained from the patch management system to perform the check. If Tenable Vulnerability
Management is able to connect to the target system, it performs checks on that system and ignores the
patch management system output.
Note: The data returned to Tenable Vulnerability Management by the patch management system is only as
current as the most recent data that the patch management system has obtained from its managed hosts.
- 535 -
Scanning with Multiple Patch Managers
If you provide multiple sets of credentials to Tenable Vulnerability Management for patch
management tools, Tenable Vulnerability Management uses all of them.
If you provide credentials for a host and for one or more patch management systems, Tenable
Vulnerability Management compares the findings between all methods and report on conflicts or
provide a satisfied finding. Use the Patch Management Windows Auditing Conflicts plugins to
highlight patch data differences between the host and a patch management system.
If you provide multiple sets of credentials to Tenable Vulnerability Management for patch
management tools, Tenable Vulnerability Management uses all of them.
If you provide credentials for a host and for one or more patch management systems, Tenable
Vulnerability Management compares the findings between all methods and report on conflicts or
provide a satisfied finding. Use the Patch Management Windows Auditing Conflicts plugins to
highlight patch data differences between the host and a patch management system.
Tenable Vulnerability Management supports KACE K1000 versions 6.x and earlier.
KACE K1000 scanning uses the following Tenable plugins: 76867, 76868, 76866, and 76869.
Database Port (Required) The TCP port that KACE K1000 listens on for 3306
communications from Tenable Vulnerability Management.
Organization (Required) The name of the organization component for the ORG1
Database Name KACE K1000 database (e.g., ORG1).
Database (Required) The username for the KACE K1000 account that R1
Username Tenable Vulnerability Management uses to perform checks
- 536 -
Option Description Default
K1000 Database (Required) The password for the KACE K1000 user. -
Password
Package reporting is supported by RPM-based and Debian-based distributions that HCL Bigfix
officially supports. This includes Red Hat derivatives such as RHEL, CentOS, Scientific Linux, and
Oracle Linux, as well as Debian and Ubuntu. Other distributions may also work, but unless
HCL Bigfix officially supports them, there is no support available.
For local check plugins to trigger, only RHEL, CentOS, Scientific Linux, Oracle Linux, Debian,
Ubuntu, and Solaris are supported. Plugin 160250 must be enabled.
Tenable Vulnerability Management supports HCL Bigfix 9.5 and later and 10.x and later.
HCL Bigfix scanning uses the following Tenable plugins: 160247, 160248, 160249, 160250, and
160251.
Web Reports (Required) The name of HCL Bigfix Web Reports server. -
Server
Web Reports (Required) The TCP port that the HCL Bigfix Web Reports -
Port server listens on for communications from Tenable
Vulnerability Management.
Web Reports (Required) The username for the HCL Bigfix Web Reports -
Username administrator account that Tenable Vulnerability Management
uses to perform checks on the target system.
Web Reports (Required) The password for the HCL Bigfix Web Reports -
- 537 -
Option Description Default
Verify SSL When enabled, Tenable verifies that the SSL certificate on the Enabled
certificate server is signed by a trusted CA.
From the HCL BigFix Console application, import the following .bes files.
BES file:
- 538 -
<Property Name="Tenable AIX Technology Level" ID="76">current technology level of operating system</Prop
<Property Name="Tenable Solaris - Showrev -a" ID="77"><![CDATA[if ((operating system as string as lowerc
"SunOS 5.10" as lowercase) AND (exists file "/var/opt/BESClient/showrev_patches.b64")) then lines of file
"/var/opt/BESClient/showrev_patches.b64" else "<unsupported>"]]></Property>
</Analysis>
</BES>
BES file:
]]></ActionScript>
</DefaultAction>
</Task>
</BES>
- 539 -
whether or not patches are installed on systems managed by SCCM and display the patch
information through the scan results.
Tenable Vulnerability Management connects to the server that is running the SCCM site (e.g.,
credentials must be valid for the SCCM service, so the selected user must have privileges to query
all the data in the SCCM MMC). This server may also run the SQL database, or the database and the
SCCM repository can be on separate servers. When leveraging this audit, configured sensors
Tenable Vulnerability Management must connect to the SCCM server via WMI and HTTPS.
Note: SCCM scanning with Tenable products requires one of the following roles: Read-only Analyst,
Operations Administrator, or Full Administrator. For more information, see Setting Up SCCM Scan Policies.
SCCM scanning uses the following Tenable plugins: 57029, 57030, 73636, and 58186.
Note: SCCM patch management plugins support versions from SCCM 2007 up to and including
Configuration Manager version 2309.
Username (Required) The username for the SCCM user account that -
Tenable Vulnerability Management uses to perform checks on
the target system. The user account must have privileges to
query all data in the SCCM MMC.
Password (Required) The password for the SCCM user with privileges to -
query all data in the SCCM MMC.
WSUS scanning uses the following Tenable plugins: 57031, 57032, and 58133.
- 540 -
Option Description Default
Port (Required) The TCP port that Microsoft WSUS listens on 8530
for communications from Tenable Vulnerability
Management.
Verify When enabled, Tenable verifies that the SSL certificate Enabled
SSL Certificate on the server is signed by a trusted CA.
Although not supported by Tenable, the Red Hat Satellite plugin also works with Spacewalk Server,
the Open Source Upstream Version of Red Hat Satellite. Spacewalk can manage distributions based
on Red Hat (RHEL, CentOS, Fedora) and SUSE. Tenable supports the Satellite server for Red Hat
Enterprise Linux.
Satellite scanning uses the following Tenable plugins: 84236, 84235, 84234, 84237, and 84238.
- 541 -
Option Description Default
Port (Required) The TCP port that Red Hat Satellite listens on for 443
communications from Tenable Vulnerability Management.
Username (Required) The username for the Red Hat Satellite account -
that Tenable Vulnerability Management uses to perform
checks on the target system.
Password (Required) The password for the Red Hat Satellite user. -
Verify SSL When enabled, Tenable verifies that the SSL certificate on Enabled
Certificate the server is signed by a trusted CA.
Although not supported by Tenable, the Red Hat Satellite 6 plugin also works with Spacewalk
Server, the Open Source Upstream Version of Red Hat Satellite. Spacewalk can manage
distributions based on Red Hat (RHEL, CentOS, Fedora) and SUSE. Tenable supports the Satellite
server for Red Hat Enterprise Linux.
Red Hat Satellite 6 scanning uses the following Tenable plugins: 84236, 84235, 84234, 84237, 84238,
84231, 84232, and 84233.
Port (Required) The TCP port that Red Hat Satellite 6 listens 443
- 542 -
Option Description Default
Password (Required) The password for the Red Hat Satellite 6 user. -
Verify When enabled, Tenable verifies that the SSL certificate Enabled
SSL Certificate on the server is signed by a trusted CA.
Symantec Altiris
Altiris is available from Symantec to manage the distribution of updates and hotfixes for Linux,
Windows, and macOS systems. Tenable Vulnerability Management has the ability to use the Altiris
API to verify whether or not patches are installed on systems managed by Altiris and display the
patch information through the Tenable Vulnerability Management user interface.
Tenable Vulnerability Management connects to the Microsoft SQL server that is running on the
Altiris host. When leveraging this audit, if the MSSQL database and Altiris server are on separate
hosts, Tenable Vulnerability Management must connect to the MSSQL database, not the Altiris
server.
Altiris scanning uses the following Tenable plugins: 78013, 78012, 78011, and 78014.
- 543 -
Credential Description Default
Database Port (Required) The TCP port that Altiris listens on for 5690
communications from Tenable Vulnerability
Management.
Database Name (Required) The name of the MSSQL database that Symantec_
manages Altiris patch information. CMDB
Use Windows When enabled, use NTLMSSP for compatibility with Disabled
Authentication older Windows Servers.
Plaintext Authentication
Caution: Using plaintext credentials is not recommended. Use encrypted authentication methods when
possible.
If a secure method of performing credentialed checks is not available, you can configure Tenable
Vulnerability Management to perform checks over unsecure protocols using the Plaintext
Authentication settings.
Note: Some credential types may not be available for configuration, depending on the scan template you
selected.
FTP
Setting Default Value Description Required?
- 544 -
Username – Login user’s name. yes
HTTP
Setting Default Description Required
l Automatic authentication
l Basic/Digest authentication
- 545 -
Setting Default Description Required
- 546 -
Setting Default Description Required
- 547 -
Setting Default Description Required
IMAP
Setting Default Value Description Required?
IPMI
Setting Default Value Description Required?
NNTP
Setting Default Value Description Required?
POP2
Setting Default Value Description Required?
- 548 -
POP3
Setting Default Value Description Required?
SNMPv1/v2c
SNMPv1/v2c configuration allows you to use community strings for authentication to network
devices. You can configure up to four SNMP community strings.
Default
Setting Description Required
Value
telnet/rsh/rexec
Tenable Vulnerability Management performs patch auditing on non-Windows targets only.
Default
Setting Description Required
Value
- 549 -
Username – Login user's name. yes
Note: If a scan is based on a user-defined template, you cannot configure Compliance settings in the scan.
You can only modify these settings in the related user-defined template.
Tenable Vulnerability Management can perform vulnerability scans of network services as well as
log in to servers to discover any missing patches.
However, a lack of vulnerabilities does not mean the servers are configured correctly or are
“compliant” with a particular standard.
You can use Tenable Vulnerability Management to perform vulnerability scans and compliance
audits to obtain all of this data at one time. If you know how a server is configured, how it is
patched, and what vulnerabilities are present, you can determine measures to mitigate risk.
At a higher level, if this information is aggregated for an entire network or asset class, security and
risk can be analyzed globally. This allows auditors and network managers to spot trends in non-
compliant systems and adjust controls to fix these on a larger scale.
When configuring a scan or policy, you can include one or more compliance checks, also known as
audits. Each compliance check requires specific credentials.
- 550 -
Some compliance checks are preconfigured by Tenable, but you can also create and upload custom
audits.
For more information on compliance checks and creating custom audits, see the Compliance
Checks Reference.
Note: The maximum number of audit files you can include in a single Policy Compliance Auditing scan is
limited by the total runtime and memory that the audit files require. Exceeding this limit may lead to
incomplete or failed scan results. To limit the possible impact, Tenable recommends that audit selection in
your scan policies be targeted and specific for the scan's scope and compliance requirements.
Aruba0S SSH
Database Database
F5 F5
- 551 -
Compliance Check Required Credentials
FireEye SSH
HP ProCurve SSH
MongoDB MongoDB
MySQL DB Database
OpenStack OpenStack
Oracle DB Database
Rackspace Rackspace
- 552 -
Compliance Check Required Credentials
RHEV RHEV
Sybase DB Database
Unix SSH
VMware vCenter/vSphere VMware ESX SOAP API or VMware vCenter SOAP API
WatchGuard SSH
Windows Windows
Zoom Zoom
Tenable Vulnerability Management allows you to add SCAP (and OVAL) compliance checks to your
scans. You can only configure SCAP settings when you use the SCAP and OVAL Auditing scan
template.
You can select Linux (SCAP), Linux (OVAL), Windows (SCAP), or Windows (OVAL). The following
table describes each option's settings:
- 553 -
Setting Default Value Description
SCAP File None A valid zip file that contains full SCAP content.
The file contains XCCDF, OVAL, and CPE for
versions 1.0 and 1.1, DataStream for version 1.2.
SCAP Version 1.2 The SCAP version that is appropriate for the
content in the uploaded SCAP file.
SCAP Data Stream ID None (SCAP Version 1.2 only) The data-stream id
that you copied from the SCAP XML file.
Example:
<data-stream id="scap_gov.nist_
datastream_USGCB-Windows-10-
1.2.3.1.zip">
SCAP Benchmark ID None The Benchmark id that you copied from the
SCAP XML file.
Example:
<xccdf:Benchmark id="xccdf_
gov.nist_benchmark_USGCB-Windows-
7">
SCAP Profile ID None The Profile id that you copied from the
SCAP XML file.
Example:
<xccdf:Profile id="xccdf_gov.nist_
profile_united_states_government_
configuration_baseline_version_
1.2.3.1">
- 554 -
OVAL Result Type Full results w/ The information you want the results file to
system include.
characteristics
The results file can be one of the following
types: Full results with system characteristics,
Full results without system characteristics, or
Thin results.
OVAL definitions file None A valid zip file that contains OVAL standalone
content.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Note: If a scan is based on a user-defined template, you cannot configure Plugin settings in the scan. You
can only modify these settings in the related user-defined template.
Note: When Tenable adds new plugins to Tenable Vulnerability Management, the new plugins are
automatically enabled if the entire plugin family they belong to is enabled in your scan policy template.
If you create a scan or user-defined template using the Tenable-provided Advanced Scan template,
you can configure which security checks the scan performs by enabling or disabling plugins
individually or by plugin family.
When you create and save a scan or user-defined template, it records all the plugins that are
initially selected. When new plugins are received via a plugin update, the plugins are automatically
enabled if the family with which the plugins are associated is enabled. If the family has been
disabled or partially enabled, new plugins in that family are also automatically disabled.
- 555 -
Caution: The Denial of Service family contains some plugins that could cause outages on a network if the
Safe Checks option is not enabled, in addition to some useful checks that do not cause any harm. The
Denial of Service family can be used with Safe Checks to ensure that any potentially dangerous plugins
are not run. However, Tenable recommends that you do not use Denial of Service family on a production
network except during a maintenance window and when staff are ready to respond to any issues.
The Plugins page appears. This page contains a table of plugin families.
l Search the plugin families table by plugin family name. For more information on
searching, see Tenable Vulnerability Management Tables.
4. To enable or disable all the plugins in a plugin family, click the Status toggle in row for the
plugin family.
l On — The scan includes the security checks associated with the plugin family.
l Off — The scan excludes the security checks associated with the plugin family.
a. In the plugin families table, click the plugin family where you want to edit plugins. The
plugin family plane appears.
b. (Optional) Click an individual plugin to review plugin details (Synopsis, Description, and
Solution).
c. For each plugin you want to enable or disable, select or clear the Status checkbox.
d. Click Save.
- 556 -
The Plugins page appears. In the plugin families table, Tenable Vulnerability
Management updates the plugin family status as follows:
l On — If you enabled all plugins for the plugin family, the scan includes the security
checks associated with the plugin family.
l Off — If you disabled all plugins for the plugin family, the scan excludes the
security checks associated with the plugin family.
Tip: Disabling a plugin family reduces the time and resources required to run the scan.
l Mixed — If you enabled only some of the plugins for the plugin family, the scan
includes only the enabled plugins. Mixed plugin families have a padlock icon that
is locked or unlocked:
l Locked — New plugins added to the plugin family via plugin feed updates are
disabled automatically in the policy.
l Unlocked — New plugins added to the plugin family via plugin feed updates
are enabled automatically in the policy.
You can configure these settings in individual scans or in user-defined templates from which you
create individual scans.
Tenable Web App Scanning scan settings are organized into the following categories:
- 557 -
l Report Settings in Tenable Web App Scanning Scans
l If you configure a setting in a user-defined template, that setting applies to any scans you
create based on that user-defined template.
l You base a user-defined template on a Tenable-provided template. Most of the settings are
identical to the settings you can configure in an individual scan that uses the same Tenable-
provided template.
However, certain Basic settings are unique to creating a user-defined template, and do not
appear when configuring an individual scan. For more information, see Basic Settings in User-
Defined Templates.
l You can configure certain settings in a user-defined template, but cannot modify those
settings in an individual scan based on a user-defined template. These settings include
Discovery, Assessment, Report, Advanced, Compliance, SCAP, and Plugins. If you want to
modify these settings for individual scans, create individual scans based on a Tenable-
provided template instead.
l If you configure Credentials in a user-defined template, other users can override these
settings by adding scan-specific or managed credentials to scans based on the template.
You can configure settings when you create a scan or user-defined scan template and select any
scan type. For more information, see Scan Templates.
- 558 -
Tip: If you want to save your settings configurations and apply them to other scans, you can create and
configure a user-defined scan template.
l General
l Schedule
l Notifications
l User Permissions
l Data Sharing
General
The general settings for a scan.
Default
Setting Description Required
Value
Folder My Scans Specifies the folder where the scan appears Yes
after being saved.
Target none Specifies the URL for the target you want to Yes
scan, as it appears on your Tenable Web
- 559 -
Default
Setting Description Required
Value
- 560 -
Schedule
The schedule settings for the scan.
Note: If you create a user-defined scan template, your schedule settings are not saved to the scan
template. Configure the schedule settings each time you create a new scan.
Click the toggle to enable the schedule and view the remaining
Schedule settings.
Note: The frequency with which you scan your target(s) depends
on several factors (e.g., how often you update your web
application, the content your web application contains, etc.). For
most web applications, Tenable recommends at least monthly
scans.
- 561 -
Setting Default Description
Starts varies Specifies the exact date and time at which a scan launches.
The starting date defaults to the date you create the scan. The
starting time is the next hour interval, displayed in 24-hour
clock format. For example, if you create your scan on October
31, 2019 at 9:12 PM, the default starting date and time is
10/31/2019 and 22:00.
Timezone varies The time zone of the value set for Starts.
Notifications
The notification settings for a scan.
Default
Setting Description
Value
- 562 -
Email None Specifies zero or more email addresses, separated by commas,
Recipient(s) whitespace, or new lines that are alerted when a scan
completes and the results are available.
User Permissions
Share the scan or user-defined scan template with other users by setting permissions for users. For
more information on adding or editing user permissions, see Set Scan Permissions.
Permission Description
No Access (Default) Users set to this permission cannot interact with the
scan in any way.
Can View Users set to this permission can view the results of the scan.
Can Control In addition to the tasks allowed by Can View, users with this
permission can launch and stop a scan. They cannot view or edit
the scan configuration or delete the scan.
Can Configure In addition to the tasks allowed by Can Control, users with this
permission can view the scan configuration and modify any
setting for the scan except scan ownership. They can also delete
the scan.
Data Sharing
Setting Default Value Description
Scan Show in Specifies whether the results of the scan should be kept
Results dashboard private or appear on your Dashboard and Findings pages.
When set to Keep private, the scan results Last Seen dates do
not update and you must access the scan directly to view the
results.
- 563 -
Configure Scope settings to specify the URLs and file types that you want to include in or exclude
from your scan.
You can configure Scope settings when you create a scan or user-defined scan template and select
the Overview or Scan template type. For more information, see Scan Templates.
Tip: If you want to save your settings configurations and apply them to other scans, you can create and
configure a user-defined scan template.
l Crawl Scripts
l Scan Inclusion
l Scan Exclusion
Crawl Scripts
Selenium scripts you want to add to your scan to enable the scanner to analyze pages with complex
access logic.
Note: If you add more than one target to your scan, these settings are disabled.
Setting Description
Add File Hyperlink that allows you to add one or more recorded Selenium script files to
your scan.
Setting Description
- 564 -
File Selecting this option in the drop-down list enables you to add one or more
OpenAPI (v2 or v3) specification files as a file upload. The specification files
should be represented in either JSON or YAML format.
URL Selecting this option in the drop-down list enables you to add one or more
OpenAPI (v2 or v3) specification files by entering the URL of the file location. The
specification files should be represented in either JSON or YAML format.
Scan Inclusion
The URLs you want the scanner to include, along with how you want the scanner to crawl them.
Note: If you add more than one target to your scan, these settings are disabled.
List of URLs none A list of any URLs you want to ensure the
scanner analyzes, in addition to the target URL
you specified in the Basic settings.
Specify how the scanner Crawl all Specifies the limits you want the scanner to
handles URLs found during URLs adhere to as it crawls URLs.
the application crawl detected
Select one of the following:
- 565 -
Setting Default Description
Scan Exclusion
The attributes of URLs you want the scanner to exclude from your scan.
Default
Setting Description
Value
Regex for logout Text box option in which you can specify a regex pattern
Excluded URLs that the scanner can look for in URLs to exclude from the
scan. You can specify multiple regex patterns separated by
new lines.
File Extensions js, css, png, Text box option in which you can specify the file types you
to Exclude jpeg, gif, want the scanner to exclude from the scan.
pdf, csv,
Separate each file type with a comma.
svn-base,
svg, jpg, Note: Excluding certain file extensions may be useful as the
ico, woff, scanner may not realize something is not a web page and
woff2, exe, attempt to scan it, as if it actually is a web page. This wastes
time and slows down the scan. You can add additional file
msi, zip
extensions if you know you use them, and are certain they do
not need to be scanned. For example, Tenable includes
different image extensions by default: .png, .jpeg, etc.
Decompose not Check box option that allows you to specify whether you
Paths selected want the scanner to break down each URL identified during
- 566 -
Default
Setting Description
Value
l www.example.com/dir1/dir2/dir3
l www.example.com/dir1/dir2
l www.example.com/dir1
Exclude selected Check box option that allows you to specify whether you
Binaries want the scanner to audit URLs with responses in binary
format.
Miscellaneous
Setting Description
Deduplicate Checkbox option that allows you to specify whether you want the scanner to
Similar Pages ignore pages in situations when similar pages have already been audited.
- 567 -
Assessment settings specify which web application elements you want the scanner to audit as it
crawls your URLs. You can configure Assessment settings when you create a scan or user-defined
scan template. For more information, see Scan Templates.
l Scan Type
l Credentials Bruteforcing
l Elements to Audit
l Optional
Scan Type
These settings specify the intensity of the assessment you want the scanner to perform.
- 568 -
Setting Default Value Description Required
Detection Most Drop-down box that allows you to choose from the following
Level Detected options to specify which pages you want the scanner to
Pages crawl.
Credentials Bruteforcing
The Credentials Bruteforcing setting is available only for the Scan template.
- 569 -
Setting Default Description
File Upload Disabled When enabled, the scanner attempts to detect file upload
Assessment vulnerabilities based on generic attacks against relevant
inputs, or specific attacks against known software
vulnerabilities. A file upload vulnerability detection can
remotely create files on the scanned web application which
the scanner cannot delete.
Elements to Audit
These settings specify the elements in your web application that you want the scanner to analyze
for vulnerabilities.
Links and Query Checks for vulnerabilities in links and their parameters.
String Parameters
- 570 -
Setting Scanner Action
Path Parameters Assesses path parameters. Path parameters are used in URL rewrite to
identify the object of the action within the URL. For example, scanId is
a path parameter for the following URL, used to identify the scan to
display results:
http://example.com/scan/scanId/results
UI Forms Checks input and button groups associated with JavaScript code.
Note: With UI Forms, Tenable Web App Scanning takes the inputs on the
page, and any buttons, and creates form-like elements from them (UI
Forms). For each button, Tenable Web App Scanning creates a UIForm
element with inputs that are all the inputs on the page.
Note: UI Inputs are when there is an input that responds to an event. For
example, after typing in the input in a search bar, the search bar responds to
an "onEnter" event which loads the next page. So, Tenable Web App
Scanningcreates a UIInput element to audit this vector as well.
Optional
Setting Default Description
URL for None Specifies a file on a remote host that Tenable Web App
Remote Scanning can use to test for a Remote File Inclusion (RFI)
Inclusion vulnerability.
- 571 -
Setting Default Description
If the scanner cannot reach the internet, the scanner uses this
internally-hosted file for more accurate RFI testing.
Note: If you do not specify a file, Tenable Web App Scanning uses a
safe, Tenable-hosted file for RFI testing.
Note: When the scanner is deciding whether to exclude an element based on an attribute value, it
performs an equality check. So, if you want to exclude any element with css class foo, the scanner
excludes an element that has class="foo", but not an element that has class="foo bar".
You can add exclusions by clicking the button and selecting Text Contents or CSS Attribute.
- 572 -
You can configure Report settings when you create a scan or user-defined scan template using the
Tenable-provided scan template, PCI. For more information, see Scan Templates.
Default
Setting Description Required
Value
(Tenable PCI None Text box that allows you to enter a list of No
ASV 6.1) Load load balancers and their configuration as
Balancers required for Tenable PCI ASV if applicable.
Usage
You can configure Advanced settings when you create a scan or user-defined scan template using
any Tenable-provided scan template. However, the Overview and Scan template types have more
configurable Advanced settings than the Config Audit and SSL TLS template types. For more
information, see Scan Templates.
The Advanced Settings options allow you to control the efficiency and performance of the scan.
l General
l HTTP Settings
l Screen Settings
l Limits
l Selenium Settings
l Performance Settings
l Session Settings
- 573 -
General
You can configure General options in scans and user-defined scan templates based on the
Overview and Scan templates only.
Target Scan 08:00:00 Specifies the maximum duration the scanner runs a scan
Max Time job runs before stopping, displayed in hours, minutes, and
(HH:MM:SS) seconds.
Maximum 08:00:00 Specifies the maximum duration the scan remains in the
Queue Time Queued state, displayed in hours, minutes, and seconds.
(HH:MM:SS)
Note: The maximum duration you can set is 48:00:00 (hours:
minutes: seconds).
Enable Debug disabled Specifies whether the scanner attaches available debug
logging for this logs from plugins to the vulnerability output of this scan.
scan
Debug Flags disabled (Only visible when you enable the Enable Debug logging for
this scan feature). Allows you to specify key and value
pairs, provided by support, for debugging.
HTTP Settings
These settings specify the user-agent you want the scanner to identify and the HTTP response
headers you want the scanner to include in requests to the web application.
You can configure Crawl Settings options in scans and user-defined scan templates based on any
Tenable-provided scan template.
Use a disabled Specifies whether you want the scanner to use a user-agent
- 574 -
different header other than Chrome when sending an HTTP request.
User Agent
to identify
scanner
User Agent Chrome's Specifies the name of the user-agent header you want the
user-agent scanner to use when sending an HTTP request.
You can configure this option only after you select the Use a
different User Agent to identify scanner checkbox.
Note: Not all requests from a scanner are guaranteed to have the
User Agent sent.
Add Scan ID disabled Specifies whether the scanner adds an additional X-Tenable-
HTTP Was-Scan-Id header (set with the scan ID) to all HTTP
Header requests sent to the target, which allows you to identify scan
jobs in web server logs and modify your scan configurations to
secure your sites.
Custom none Specifies the custom headers you want to inject into each
Headers HTTP request, in request and response format.
- 575 -
Note: If you enter a custom User-Agent header, that value
overrides the value entered in the User Agent setting box.
Screen Settings
You can configure Screen Settings options in scans and user-defined scan templates based on the
Overview and Scan templates only.
Screen 1600 Specifies the screen width, in pixels, of the browser embedded in
Width the scanner.
Screen 1200 Specifies the screen height, in pixels, of the browser embedded
Height in the scanner.
Limits
You can configure Limits options in scans and user-defined scan templates based on the Overview
and Scan templates only.
Number of URLS 10000 Specifies the maximum number of URLs the scanner
to Crawl and attempts to crawl.
Browse
- 576 -
Element Depth element levels the scanner crawls.
Max Response 500000 Specifies the maximum load size of a page, in bytes,
Size which the scanner analyzes.
Selenium Settings
These settings specify how the scanner behaves when it attempts to authenticate to a web
application using your recorded Selenium credentials.
Configure these options if you configured your scan to authenticate to the web application with
Selenium credentials. For more information see Credentials in Tenable Web App Scanning Scans.
You can configure Selenium Settings options in scans and user-defined scan templates based on
the Overview and Scan templates only.
Page 30000 Specifies the time (in milliseconds) the scanner waits for the
Rendering page to render.
Delay
Command 500 Specifies the time (in milliseconds) the scanner waits after
Execution processing a command before proceeding to the next
Delay command.
Script 5000 Specifies the time (in milliseconds) the scanner waits for all
Completion commands to render new content to finish processing.
Delay
Performance Settings
- 577 -
Setting Default Description
Slow down the scan disabled Specifies whether the scanner throttles the scan in
when network the event of network congestion.
congestion is
detected
Network Timeout (In 30 Specifies the time, in seconds, the scanner waits for
Seconds) a response from a host before aborting the scan,
unless otherwise specified in a plugin.
Browser Timeout (In 60 Specifies the time, in seconds, the scanner waits for
Seconds) a response from a browser before aborting the scan,
unless otherwise specified in a plugin.
Session Settings
Specifying these tokens speeds up the scan by allowing the scanner to skip token verification.
Session Settings are only available when you are editing an existing scan.
Token
Default Description
Type
Cookie None Name of your application's authentication cookie for the scanner
- 578 -
to use.
Header None Name of your application's authentication header for the scanner
to use.
Note: You can set Credentials settings for single-target scans only. If you create a scan with more than
one target, these settings are not available.
In Tenable Web App Scanning scans, you can configure credentials settings that allow Tenable Web
App Scanning to perform an authenticated scan on a web application. Credentialed scans can
perform a wider variety of checks than non-credentialed scans, which can result in more accurate
scan results.
Scans in Tenable Web App Scanning use managed credentials. Managed credentials allow you to
store credential settings centrally in a credential manager. You can then add those credential
settings to multiple scan configurations instead of configuring credential settings for each
individual scan.
Tenable Web App Scanning scans support credentials in the following authentication types:
Tip: If want to scan an API with the API scan template, and your API requires keys or a token for
authentication, you can add the expected custom headers in the Advanced settings in the HTTP Settings
section.
You can configure credentials settings in Tenable Web App Scanning scans using the following
methods.
Credentials Authentication
Configuration Method
Category Type
HTTP Server – Use the Tenable Web App Scanning user interface
Authentication to manually configure credentials settings in
scans.
- 579 -
Web Application Login Form
Authentication
Cookie
Authentication
API Key Use the Tenable Web App Scanning user interface
to manually configure credentials settings in
Bearer
scans.
Authentication
Selenium commands in Tenable Web App Scanning are used to record authentication and crawling
scripts so that users can tell the scanner exactly what to do in certain scenarios. You can run these
commands in the Selenium IDE Extension (available for download in the Chrome Web Store).
Support for Selenium commands in Tenable Web App Scanning is detailed below:
l addSelection l close
l answerOnNextPrompt l debugger
l assert l do
l assertAlert l else
l assertChecked l else if
l assertConfirmation l end
l assertNotChecked l if
l assertNotEditable l repeat if
l assertNotSelectedValue l run
- 580 -
l assertPrompt l store
l chooseCancelOnNextPrompt l times
l chooseOkOnNextConfirmation l while
l click
l clickAt
l doubleClick
l doubleClickAt
l echo
l editContent
l mouseDown
l mouseDownAt
l mouseMoveAt
l mouseOut
l mouseOver
l mouseUp
l mouseUpAt
l open
- 581 -
l pause
l removeSelection
l runScript
l select
l selectFrame
l sendKeys
l setSpeed
l setWindowSize
l submit
l type
l uncheck
l verify
l verifyChecked
l verifyEditable
l verifyElementNotPresent
l verifyElementPresent
l verifyNotChecked
l verifyNotEditable
l verifyNotSelectedValue
- 582 -
l verifyNotText
l verifySelectedLabel
l verifySelectedValue
l verifyText
l verifyTitle
l verifyValue
l waitForElementEditable
l waitForElementNotEditable
l waitForElementNotPresent
l waitForElementNotVisible
l waitForElementPresent
l waitForElementVisible
l webdriverAnswerOnNextPrompt
l webdriverAnswerOnVisiblePrompt
l webdriverChooseCancelOnNextConfirmation
l webdriverChooseCancelOnNextPrompt
l webdriverChooseCancelOnVisibleConfirmation
l webdriverChooseCancelOnVisiblePrompt
l webdriverChooseOkOnNextConfirmation
l webdriverChooseOkOnVisibleConfirmation
In a Tenable Web App Scanning scan, you can configure the following settings for HTTP server-
based authentication credentials.
Option Action
- 583 -
Username Type the username Tenable Web App Scanning uses to authenticate to
the HTTP-based server.
Password Type the password Tenable Web App Scanning uses to authenticate to
the HTTP-based server.
Authentication In the drop-down list, select one of the following authentication types:
Type
l Basic/Digest
l NTLM
l Kerberos
Kerberos Domain (Required when enabling the Kerberos Authentication Type) The realm to
which Kerberos Target Authentication belongs, if applicable.
Key Distribution (Required when enabling the Kerberos Authentication Type) This host
Center (KDC) supplies the session tickets for the user.
Note: Tenable Web App Scanning does not support multiple HTTP authentication types for a single target.
In a Tenable Web App Scanning scan, you can configure one of the following types of Web
Application Authentication credentials:
l Cookie Authentication
l Selenium Authentication
l Bearer Authentication
Tip: If the log in process causes any headers or cookies to be set, the scanner should notice this and
include those in subsequent requests. If this is not happening as you expect, use selenium authentication
and record the log in process into a .side file, then use that in the scan. If you are still experiencing
issues, contact your Tenable representative for support.
- 584 -
Option Action
Login Page Type the URL of the login page for the web application you want to scan.
Credentials For each field in the target's login form (that is, username, password, and
domain, etc.) complete a credential entry as follows:
a. In the left-hand text box, type the value of the login field's name or
id HTML DOM attribute.
b. In the right-hand text box in the row, type the literal value to insert
in that text field at login.
Tip: To see a text field's name or id HTML DOM attribute, right-click on the
text field and select "Inspect" in either your Firefox or Chrome browser.
Pattern to Verify Type a word, phrase, or regular expression that appears on the website
Successful only if the authentication is successful (for example, Welcome, your
Authentication username!). Note that leading slashes will be escaped and .* is not
required at the beginning or end of the pattern.
Page to Verify Type the URL that Tenable Web App Scanning can continually access to
Active Session validate the authenticated session.
Pattern to Verify Type a word, phrase, or regular expression that appears on the website
Active Session only if the session is still active (for example, Hello, your username.). Note
- 585 -
that leading slashes will be escaped and .* is not required at the
beginning or end of the pattern.
Cookie Authentication
Option Action
a. In the first text box, type the name of the cookie authentication
credentials.
b. In the second text box, type the value of the cookie authentication
credentials.
Page to Verify Type the URL that Tenable Web App Scanning can continually access to
Active Session validate the authenticated session.
Pattern to Verify Type a word, phrase, or regular expression that appears on the website
Active Session only if the session is still active (for example, Hello, your username.). Note
that leading slashes will be escaped and .* is not required at the
beginning or end of the pattern.
Selenium Authentication
Option Action
- 586 -
The file manager for your operating system appears.
Page to Verify Type the URL that Tenable Web App Scanning can continually access to
Active Session validate the authenticated session.
Pattern to Verify Type a word, phrase, or regular expression that appears on the website
Active Session only if the session is still active (for example, Hello, your username.). Note
that leading slashes will be escaped and .* is not required at the
beginning or end of the pattern.
a. In the first text box, type the name of the HTTP header.
b. In the second text box, type the value of the HTTP header.
Page to Verify Type the URL that Tenable Web App Scanning can continually access to
Active Session validate the authenticated session.
Pattern to Verify Type a word, phrase, or regular expression that appears on the website
Active Session only if the session is still active (for example, Hello, your username.). Note
that leading slashes will be escaped and .* is not required at the
beginning or end of the pattern.
Bearer Authentication
- 587 -
Option Action
Note: Bearer Token is a part of OAuth. Tenable Web App Scanning supports
OAuth in cases where it is a part of OpenIDConnect and recordable via a
selenium script. Implementations of OAuth that are not a part of
OpenIDConnect are supported only where the token is dynamic, or you craft a
special static (non-dynamic) token for authentication purposes.
Page to Verify Type the URL that Tenable Web App Scanning can continually access to
Active Session validate the authenticated session.
Pattern to Verify Type a word, phrase, or regular expression that appears on the website
Active Session only if the session is still active (for example, Hello, your username.). Note
that leading slashes will be escaped and .* is not required at the
beginning or end of the pattern.
In a Tenable Web App Scanning scan, you can configure Client Certificate Authentication
credentials.
Option Action
Client Certificate The file that contains the PEM-formatted certificate used to
communicate with the host.
Client Certificate The file that contains the PEM-formatted private key for the client
Private Key certificate.
Page to Verify Type the URL that Tenable Web App Scanning can access to validate the
Successful authenticated session.
- 588 -
Authentication
Pattern to Verify Type a word, phrase, or regular expression that appears on the website
Successful only if the authentication is successful (for example, Welcome, your
Authentication username!). Leading slashes will be escaped and .* is not required at the
beginning or end of the pattern.
Required Tenable Web App Scanning User Role: Scan Manager or Administrator
Configure Plugin settings to specify the plugins and plugin families you want the scanner to use as
it scans your web application.
When you create and launch a scan, Tenable Web App Scanning uses plugins in various plugin
families, each designed to identify certain types of finding or vulnerabilities, to analyze your web
application. Tenable Web App Scanning uses the 98000-98999 and 112290-117290 plugin ID ranges
for scanning. For more information about Tenable Web App Scanning plugin families, see the
Tenable Web App ScanningTenable Web App Scanning Plugin Families site.
Note: Tenable Web App Scanning displays only the first detected 25 instances of an individual plugin per
scan in your scan results. If you see 25 instances of a single plugin in your scan results, Tenable
recommends taking remediation steps to address the corresponding vulnerability and then rescanning
your target.
You can configure Plugin settings when you create a scan or user-defined scan template and select
the API, Overview, (Basic) Scan, Standard Scan, or Custom template or scan type. For more
information, see View Your Scan Plugins.
Tip: If you want to save your settings configurations and apply them to other scans, you can create and
configure a user-defined scan template.
l All enabled
l Plugins table
All Enabled
- 589 -
A toggle you can click to enable or disable all plugins simultaneously.
Plugins Table
Column Description Actions
Name Specifies the plugin family to which the grouped l View the name of each
plugins belong. plugin family.
Total Specifies the number of plugins in the plugin l View the number of
family. plugins in the family.
Status Toggle that allows you to specify if you want the l Click the Status toggle
scanner to use the plugins in the plugin family to disable the plugins
to analyze your target. in the plugin family.
l (Optional) To enable a
disabled plugin family,
click the Status
toggle.
In the plugins table, you can view details about or disable individual plugins.
1. In the table, click the row for the family that contains a plugin you want to view.
A plugin family details plane appears, displaying the name, ID, and status for each plugin in the
family in a paginated list.
- 590 -
2. (Optional) To locate a specific plugin, in the Search box, type the name or ID.
1. In the table, click the row for the family that contains the plugin you want to disable.
A plugin family details plane appears, displaying the name, ID, and status for each plugin in the
family in a paginated list.
2. (Optional) To locate a specific plugin, in the Search box, type the name or ID.
3. In the Status column, select the check box next to the plugin you want to disable.
5. Click Save.
Scan Distribution
Overview
The scan distribution feature improves the efficiency of scanning both for your organization’s
scanners as well as the cloud scanners provided by Tenable Vulnerability Management for the
platform as a whole. In the case of the scanners that belong to your organization, Tenable
Vulnerability Management distributes scans as tasks across multiple scanners in the scanner group
assigned to the scan, rather than assigning complete scan jobs to individual scanners. Similarly,
Tenable Vulnerability Management distributes scans utilizing Tenable-provided cloud scanners as
jobs across groups of scanners. Tenable Vulnerability Management breaks down those jobs into
tasks and funnels them down to scanners within the groups.
In both cases, this effectively allows multiple scans to run simultaneously, eliminating bottlenecks
that might otherwise occur if scans were staggered one after another on individual scanners. As the
requirements of your organization grow, scan performance is less likely to degrade. Even when
scans are assigned to a specific scanner, those scans are broken down into tasks that can be run
simultaneously, allowing the scanner to complete the scan job more efficiently.
- 591 -
As scanners complete the tasks, Tenable Vulnerability Management immediately reflects the
results. The results that were already obtained are not lost if the scan is canceled. If a scanner
crashes during the scan, or a problem is encountered with a target, the other tasks run as normal.
Each scan task accounts for the scanning of 120 IP addresses; the last scan task of a scan job may
account for less than 120 IP addresses (for example, Tenable Vulnerability Management splits a scan
job of 300 IP address into two 120 IP address tasks and a 60 IP address task).
Scanner Groups
You can create scanner groups in order to take advantage of the scan distribution feature with your
organization’s scanners. Scanner groups maximize the efficiency of your scans by spreading out
tasks across the individual scanners you assign to the group, rather than dedicating a single
scanner to complete a whole job.
Scan Results
You can view scan results live, as scanners complete tasks. Each time a task completes, Tenable
Vulnerability Management updates scan results with new data. If a scan fails or is interrupted,
Tenable Vulnerability Management retains the already completed results, though the scan reflects
that the process was not completed.
If a job is assigned to multiple scanners and one of those scanners happens to fail, the tasks
dispatched to the other scanners are still completed.
Scanner Capacity
Tenable Vulnerability Management considers the following three types of scanner capacities when
distributing scans, in order to efficiently determine how many tasks a scanner can process.
- 592 -
l Target Capacity: The number of assets a scanner can actively scan simultaneously. This value
is by default based on the hardware resources of the scanner, including the number of
processors and the amount of memory available.
l Task Capacity: The number of tasks (parts of a scan) that a scanner can perform
simultaneously. A scanner's task capacity is determined based on the target capacity.
l Job Capacity: The number of different jobs a scanner can include tasks from at once. In this
way, scans can be performed asynchronously, and a scanner that has available capacity can
complete multiple tasks even if those tasks are not derived from the same scan. Job capacity
is always determined to be less than equal to the task capacity so that when a scanner is at
its job capacity, it will be able to complete tasks from every job.
Job Queues
Tenable Vulnerability Management queues scan jobs before separating them into tasks for scan
distribution.
For example, the job queue for a scanner may include scan jobs that were assigned directly to the
scanner as well as jobs distributed to the scanner by the groups the scanner belongs to.
- 593 -
Dispatching Tasks
When a scanner has available capacity for tasks, it polls for and is assigned additional tasks from
the jobs that have filled the scanner’s job capacity. Tasks are assigned from each job in succession,
in a round robin method, similar to the way jobs are assigned to scanners in a group. This will be a
test.
The way the tasks are dispatched to scanners varies depending on the scenario.
Because the first scan job was configured to use that particular scanner, it is added to the
scanner’s job queue. In the case of SG1 and SG2, the scanner happens to be next in the order of
scanners to receive jobs in both groups. The jobs from those groups are also added to the scanner’s
job queue.
This scanner has a job capacity of three, so the scanner is able to be assigned tasks from all three
jobs.
This scanner has a task capacity of five. Tasks are assigned to the scanner one at a time from each
job in succession. In this case, tasks would be assigned in the following order: Job 1, Job 2, Job 3,
Job 1, Job 2, filling the task capacity. Using this “round robin” method, the scanner begins working
on two tasks from the first job, two tasks from the second job, and one task from the third job.
When one of the tasks is completed, the next task from the third job is then dispatched.
- 594 -
In this example, assume there are two scanners, Scanner 1 and Scanner 2. Both scanners are
assigned to a scanner group, SG1. Both Scanner 1 and Scanner 2 have a job capacity of three.
Two scan jobs are created. Job 1 is assigned directly to Scanner 1. Job 2 is assigned to SG1. Both
Jobs are broken down into Tasks. Job1 will only be worked by Scanner 1. Job 2 can be worked by
both Scanner 1 and Scanner 2.
Both Scanner 1 and Scanner 2 have a task capacity of six. Scanner 1 is assigned tasks one at a time
from each job in succession, three from Job 1 and three from Job 2. Scanner 2 is assigned six tasks
from Job 2.
Tasks for Job 2 are dispatched to Scanner 1 and Scanner 2 from SG1 as task capacity becomes
available for the scanners. This process continues until both jobs are completed.
If you configure scan routing for a scan, when the scan runs, Tenable Vulnerability Management
automatically does the following:
l Assigns the scan targets to the scanner group configured with the narrowest matching target
range.
l Within that scanner group, assigns targets to scanners as they check in, according to their
capacity and the targets still available.
Note: Tenable recommends pre-planning your scan routing strategy to efficiently target discrete areas of
your network. If configured improperly, scan routing can prevent scanners from reaching their targets.
- 595 -
1. Review the configuration guidelines for scan routing.
b. In the Targets for Scan Routing box, type a comma-separated list of scan routing
targets.
Note: You can specify up to 10,000 individual scan routing targets for an individual scanner
group. For example, 192.168.0.1, example.com, *.example.net, 192.168.0.0/24
specifies four scan routing targets. To condense a scan routing target list, Tenable
recommends using wildcard and range formats, instead of individual IP addresses.
c. Click Save.
Option Action
Targets / Specify targets for the scan, using one of the following options:
Upload
- 596 -
Targets / l In the Targets box, type the list of targets.
Tags l In the Upload Targets box, upload a file of targets.
c. Click Save.
Configuration Guidelines
l When configuring scan routes, Tenable recommends using IP ranges and CIDR ranges instead
of individual IP addresses where possible. This approach differs from the recommended
approach for scan targets, where narrower target values are recommended.
- 597 -
l Tenable Vulnerability Management does not support a numeric range format for IPv6
addresses. Instead, use a CIDR format for IPv6 address ranges.
l Typically, Tenable recommends adding an individual scanner to only one scanner group. In
some cases, however, you may want to configure overlapping scanner groups to ensure
scanning coverage or redundancy. If a host is targeted by two or more overlapping scanner
groups, Tenable Vulnerability Management chooses any one of the groups to scan it; none of
the groups is given preference.
Introduction
Every organization has unique needs for their vulnerability management program. These
requirements can vary from the scanner used (cloud or on-premises), the places where a sensor is
deployed, technology in your environment, and other conditions of your vulnerability management
- 598 -
program. The following information contains deployment best practices that should apply to
everyone and assist in situations where continued overages occur.
Credentialed Scanning
Tenable recommends running credentialed scans whenever possible. Credentialed scans provide
your organization with a more accurate snapshot of your current environment, allowing you to
quickly and safely collect information about your network and systems. You can use this
information to fill in the gaps in your security architecture and make better decisions on how to
improve your information security program.
Credentialed scans can also perform a wider variety of checks than non-credentialed scans, which
provide you with more accurate scan results. This ensures extensive scanning of your network to
determine local exposures or compliance violations. See Credentialed Scans in the Tenable Nessus
Agent User Guide for more information about the benefits of credentialed scanning.
Deleting Assets
You can delete assets via the user interface, but they remain on the license for 90 days or until the
Asset Age Out time has aged out. If the asset is found again before the 90 period or the Asset Age
Out expiration, it counts as an additional licensed asset. With this in mind, if you expect to detect
the asset again in the future, it is best to add this asset to the global exclusion list to avoid any
licensing issues or enable Asset Age Out to purge deleted assets as early as seven days after they
were deleted. For more information, see Delete Assets.
- 599 -
You can tag all assets that need to be deleted and use the API to bulk delete those assets. For
instance, you could tag assets and use an automated script to delete assets with the “delete” tag on
a custom time interval. If you know these assets may be found again (for example, honeypot
networks), it is best practice to add these affected assets to the global exclusion list to avoid
licensing issues or reduce your target scope to omit them.
Agent Scanning
Agents are a great way to capture vulnerability data on assets that are mobile or highly sensitive. It
is essential to understand that an agent scan cannot interrogate the potential external exposure
such as TLS vulnerabilities. If these types of vulnerabilities on these types of assets are important
to your program, you should pair this with a network-based scan. If a credentialed vulnerability scan
is not possible, you can use a non-credentialed scan. However, it is important to understand that
non-credentialed scans on agents may produce an additional licensed asset. See the following
section for more information.
Scan Hygiene
Before scanning, Tenable recommends reviewing the Tenable Vulnerability Management Scan Tuning
Guide. Tenable Vulnerability Management limits the total number of scan schedules to 10,000. A
scan schedule includes a scan template (including discovery and assessment settings), a list of scan
targets, and (optionally) credentials and compliance audits. You can reuse can schedules, and doing
so groups the scan results under the History tab of the given scan schedule.
It is best practice to reuse “on-demand” scan schedules, reduce clutter or confusion when looking
for scan schedules, and adhere to good scan hygiene. There is little to no benefit to creating new
“on-demand” scan schedules each time a new set of assets needs to be scanned. Instead, simply
change the targets of the scan and use the history to see older data. Keep in mind, unless you avoid
sending the data to the workbench, all of the changes found during the scan are reflected in the
workbenches, reducing the need to review old scan results.
It is common to ask, “What changed since the previous scan?” This question can drive attention to
the previous scan. However, you should note that each scan updates the assets with the newest
- 600 -
information. You can use the asset Activity tab to identify when a Tenable sensor detected the
asset. Furthermore, each vulnerability indicates when the vulnerability or plugin was first seen and
last seen. The difference between those two dates typically helps in identifying what has changed
since a previous scan.
Lastly, it is best practice to use remediation scans for re-scanning the asset outside of its
predefined scan cycle. You can initiate remediation scans from the action button on the
vulnerability details page. This is the most convenient way to manage remediation scans and helps
keep scan hygiene clean.
Maintaining scan hygiene helps reduce the number of scans sent back on each request to the
/scans endpoint and may speed up the endpoint.
Resolution:
l Scan the asset with credentials to uniquely identify the asset and de-duplicate the multiple
NICs.
l Exclude any extra IP addresses for the asset if they do not provide any reporting value. You
may use network scanning to “pen test” an asset, and visibility into different vulnerabilities or
- 601 -
open ports on a different network interface may provide insight and value. To correct any
reporting accuracy issues, delete the asset using the user interface or API.
l To remove duplicates that were deleted, enable Asset Age Out to mirror your scan schedule.
Resolution:
l When multiple interfaces are found in a scan, identify which ones are duplicates in value and
add them to the exclusion list.
l Example: In the case of a firewall with three interfaces, and therefore three IP
addresses, exclude two of the IP addresses and delete them using the user interface or
API.
l To remove duplicates that were deleted, enable Asset Age Out to mirror your scan schedule.
Resolution:
l For assets that are well hardened or do not provide enough data for Tenable’s algorithms to
merge assets confidently, you should add credentials so that Tenable can collect the data
necessary to merge the assets confidently.
Ephemeral Assets
- 602 -
Ephemeral assets or assets that are terminated and rebuilt before the 90-day period has aged out
creates a new asset each time they are rebuilt or deployed. Many asset attributes may change after
the asset has been terminated, making it difficult to merge the asset with its previous version.
Resolution:
l Use the cloud connectors. The cloud connectors not only help identify ephemeral assets in
the cloud, but they also detect their termination and remove the corresponding license.
l For situations where you cannot use a cloud connector, you need to leverage the Asset Age
Out feature. The Asset Age Out feature purges assets automatically if they are not found
within the configured time period.
Scan Limitations
The following table describes scanning limitations in Tenable Vulnerability Management:
Limitation Description
Host scan results Tenable Vulnerability Management limits the number of live hosts for
- 603 -
per scan which a single scan can generate scan results for. The live host scan
results limit is 1.1 times your organization's licensed asset count.
Active scans You cannot have more than 25 scans running in your container
simultaneously.
Scan chunks Tenable Vulnerability Management limits scan chunks to 10,000 hosts or
150,000 findings. If a scan chunk exceeds either value, Tenable
Vulnerability Management does not process the scan and eventually
aborts it.
Note: This limits items like MDM assessments, importing Nessus files, and
very large Auto Discovery scenarios like VMware to individual scans with less
than 10,000 assessed targets.
- 604 -
Vulnerability Intelligence
In the Vulnerability Intelligence section, you can review all vulnerabilities known to Tenable without
leaving Tenable Vulnerability Management.
The vulnerabilities come from Tenable’s database, which draws on sources such as internal
expertise, vendor advisories, the GitHub Advisory Database, and the National Vulnerability Database
(NVD).
The Vulnerability Intelligence section also holds curated categories that blend known risk
indicators with insights from the Tenable Research Team to surface the most crucial vulnerabilities.
Once you have chosen which vulnerabilities to focus on, you compare them to your own findings
and build a list to take action on. To do this, use the query builder to refine the results and save your
searches to re-use or share.
The following topics explain how to use the tools in the Vulnerability Intelligence section to: 1)
search Tenable’s vulnerability database, 2) view vulnerability profiles, and 3) identify your exposure
when compared to known vulnerabilities.
- 605 -
Search Known Vulnerabilities
On the Vulnerability Intelligence page or the Vulnerability Profile page, you can search all
vulnerabilities known to Tenable by Common Vulnerabilities and Exposures (CVE) ID or common
name.
4. In the search box, type a complete or partial search (for example, CVE-2014-0160, 2014, or
Heartbleed).
- 606 -
The Vulnerability Profile page breaks down a single vulnerability in detail and includes an event
timeline, your affected assets and products, the sources, and metrics such as risk profile and
severity.
In tabs, review an event timeline, VPR and EPSS trends, identifying plugins,
all known products affected, and a summary.
How Does This View affected assets and products in your environment and build queries to
Affect Me? refine the results.
Vulnerability Information
- 607 -
On the Vulnerability Profile page, the Vulnerability Information section provides a short summary
along the vulnerability's Vulnerability Priority Rating (VPR), Common Vulnerability Scoring System
(CVSSv3), and Exploit Prediction Scoring System (EPSS) scores.
It also contains four tabs, within which you can view an event timeline, VPR and EPSS widgets,
plugin details, known affected products, and a full summary.
Events
The Events tab appears by default and contains a timeline for the vulnerability. Use the horizontal
scroll bar or click an event marker to go to that event. Click event links to open them in your web
browser.
Event Description
Discovery Date Indicates the date Tenable first observed the vulnerability.
NVD Published Indicates the date that the National Vulnerability Database (NVD)
disclosed the vulnerability.
First Tenable Indicates the first time Tenable provided coverage for the vulnerability.
Coverage
First Proof of Indicates the date Tenable first observed a proof of concept for the
Concept vulnerability.
First Functional Indicates the date the first functional exploit for the vulnerability was
Exploit released.
Consec Plugin Appears when a new Container Security Scanner plugin for the
Published vulnerability is released.
LCE Plugin Appears when a new Log Correlation Engine plugin for the vulnerability is
Published released.
Nessus Plugin Appears when a new Tenable Nessus plugin for the vulnerability is
Published released.
NNM Plugin Appears when a new Tenable Nessus Network Monitor plugin for the
- 608 -
Published vulnerability is released.
WAS Plugin Appears when a new Tenable Web App Scanning plugin for the
Published vulnerability is released.
Ransomware Indicates the first time Tenable observed ransomware events for the
vulnerability.
Malware Indicates the first time Tenable observed malware events for the
vulnerability.
Exploited in the Indicates that the vulnerability has been used in a cyberattack.
Wild
Persistently Appears each time Tenable observes that the vulnerability is being
Exploited persistently exploited.
CISA Known Indicates the date that the Cybersecurity and Infrastructure Security
Exploits Agency (CISA) added the vulnerability to their Known Exploited
Vulnerabilities catalog.
CISA Due-Date Indicates the date by which federal agencies must fix vulnerabilities on
the CISA Known Exploited Vulnerabilities (KEV) list.
Cyber Exposure Appears when Tenable publishes a Cyber Exposure Alert for the
Alert vulnerability.
EPSS Increased Appears when the Exploit Prediction Scoring System (EPSS) increases (for
example, EPSS Increased to 65%).
VPR Increased Appears when the Vulnerability Priority Rating (VPR) increases (for
example, VPR Increased to 6.1).
- 609 -
VPR Decreased Appears when the VPR decreases.
Scores
The Scores tab contains ring charts for VPR and EPSS along with trend charts to track how these
scores have changed over time.
Age of Indicates the number of days since the vulnerability was discovered.
Vulnerability
CVSSv3 Impact Indicates the NVD-provided CVSSv3 impact score from 0–10. If NVD did not
Score provide a score, Tenable generates one.
Exploit Code Indicates the highest level of exploit maturity for the vulnerability:
Maturity Unproven, PoC, Functional, or High. Drawn from Tenable’s research, as well
as key external sources.
Product Indicates the relative number of unique products affected. Values are Low,
Coverage Medium, High, or Very High.
Threat Intensity Indicates the number and frequency of recent threat events. Values are
Very Low, Low, Medium, High, or Very High.
Threat Sources Lists sources where relevant threat events occurred (for example, social
media or the dark web). If no events were observed in the past 28 days, No
recorded events appears.
Threat Recency Indicates the number of days since a threat event occurred, from 0–180.
Plugins
The Plugins tab lists plugins that detected findings for the vulnerability. From the Source drop-
down, choose between Tenable Web App Scanning and Tenable Nessus.
- 610 -
Column Description
Plugin ID Indicates the ID of the Tenable plugin that detected the finding.
Name Indicates the name of the Tenable plugin that detected the finding.
Family Indicates the type of plugin. For example, with a Tenable Nessus plugin,
Backdoors. Or, with a Tenable Web App Scanning plugin, Code Execution. To
learn more, see About Plugin Families on the Tenable website.
Severity Indicates severity for the detected vulnerability as Low, Medium, or High.
Products
In the Products tab, view affected products by vendor. Next to a vendor, click the drop-down > to
view a list of products.
For example, a vulnerability might have the Vendor canonical with the Product linux.
Tip: Tenable curates this data. It represents all known affected products for a vulnerability, not only yours.
To view only your affected products, go to How Does This Affect Me.
Summary
In the Summary tab, read a summary and Copy it to your clipboard.
Affected Assets
The table of results in the Affected Assets tab has the following columns, which you can show or
hide as described in Customize Tables.
Column Description
- 611 -
Name Indicates the asset identifier, assigned based on the availability of
specific attributes in logical order.
IPv4 Address Indicates the IPv4 address for the affected asset.
IPv6 Address Indicates the IPv6 address for the affected asset.
Vulnerabilities Displays a heatmap for the asset’s vulnerabilities, color coded by severity.
Also lists the number of vulnerabilities.
Affected Products
The table of results in the Affected Products tab has the following columns.
Column Description
Product Indicates the name of the affected product, using Common Platform
Enumeration (CPE). For example, cpe:/a:apache:httpd. If multiple products are
affected, click the link to view a complete list.
Plugin Name Indicates the name of the Tenable plugin that detected a finding.
Findings Indicates the number of findings affected by the vulnerability which relate to
that product. Click the number to view more information on the Findings
workbench grouped by None.
Assets Indicates the number of assets with active findings relating to that product.
Affected Click the number to open that result on the Findings workbench grouped by
Asset.
Sources
- 612 -
In the Sources section, search for and review contextual intelligence such as security advisories on
the external websites where they appear.
Column Description
Source Details Provides more information about the source via labels added by the
Tenable Research Team (for example, Third Party Advisory).
Vulnerability Metrics
In the right-hand Vulnerability Metrics pane, review key details in the following sections.
General Information
In the General Information section, review when a vulnerability was first discovered, how
exploitable it is, and other details.
Field Description
NVD Published Indicates the date that the National Vulnerability Database (NVD) added the
Date vulnerability.
Exploitability Describes how easy it is to exploit the vulnerability (for example, Low
Complexity, Network Exploitability).
Exploit Maturity Indicates the highest level of exploit maturity for the vulnerability:
Unproven, PoC, Functional, or High. Drawn from Tenable’s research, as
well as key external sources.
First Proof of Indicates the date the first proof of concept for the vulnerability was
Concept released.
- 613 -
First Functional Indicates the date the first functional exploit for the vulnerability was
Exploit released.
Risk Profile
In the Risk Profile section, see if the Tenable Research Team is tracking a vulnerability, learn which
categories it belongs to, and find out if it can be exploited from a remote network.
Field Description
Proof of Indicates if Tenable has identified a proof of concept for this vulnerability.
Concept
Available
Severity Metrics
In the Severity Metrics section, view Common Vulnerability Scoring System (CVSS) v3 or CVSSv2
scores, depending on which are available, along with their vector strings.
Field Description
CVSSv3 Indicates the CVSSv3 score. When not available from NVD, Tenable determines
Base Score this score. To learn more, see CVSS vs. VPR.
CVSSv3 Lists a vector string with the values used to calculate the CVSSv3 score, for
Vector example: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H. To learn more, see
this CVSSv3 calculator on the FIRST website.
CVSSv2 Indicates the CVSSv2 score. When not available from NVD, Tenable determines
- 614 -
Base Score this score.
CVSSv2 Lists a vector string with the values used to calculate the CVSSv2 score.
Vector
Field Description
Nessus Lists the release date of the newest Tenable Nessus plugin to identify the
vulnerability.
Web App Lists the release date of the newest Tenable Web App Scanning plugin to
Scanning identify the vulnerability.
- 615 -
3. (Optional) Click a hexagon tile to choose a vulnerability category. Or, to search all
vulnerabilities, click the default category to deselect it.
In the CVEs tab on the lower area of the page, a table of results appears.
Tip: Under How Does This Affect Me? click Findings or Affected Assets to open those tabs and
start reviewing your vulnerabilities.
4. (Optional) Use the Query Builder to refine the results, as described in Work with the Query
Builder.
The Findings workbench appears. It is grouped by Asset and lists findings for that Tenable
plugin.
l Click the dropdown > to display a list of assets with that finding. Then, click an Asset Name.
l The Findings workbench appears. It is grouped by Plugin and lists findings for that asset.
l Click the dropdown > to display a list of assets with that finding. Then, click an Asset Name.
- 616 -
Work with the Query Builder
In the three tabs on the lower part of the Vulnerability Intelligence page, use the Query Builder to
refine your search results with contextual filters.
l Filter — The search criteria (for example, for a vulnerability, Common Name).
Tip: You can nest queries with parentheses. For example, to search for CISA Known Exploited
vulnerabilities where the VPR is greater than five or the EPSS is greater than 50, use:
Category is equal to CISA Known Exploited AND (VPR is greater than 5 OR EPSS Score is greater
than 50) .
Build a Query
To build a query with the Query Builder:
3. Build a list of CVEs, findings, or affected assets, as described in Identify Your Exposure.
The Filters list appears. To review the filters you can use, see Query Builder Filters.
- 617 -
6. In the Operators list, choose an operator.
For a filter where the value is text or a number, the Value Hint box appears. Otherwise, the
Value Options list appears.
8. (Optional) Add another query (that is, type a Condition and then add a Filter, an Operator, and a
Value).
Edit a Query
To edit a query, do one of the following.
Action Description
Replace a query In the query box, click the component to replace. A list of options
component appears.
Clear a query On the right side of the query box, click Clear.
Keyboard Shortcuts
Use the following keyboard shortcuts in the Query Builder.
Shortcut Description
Right Arrow or Left Move the cursor in your query or choose a date in the date picker.
Arrow
- 618 -
Esc Close a list (for example, the Filters list).
The following table lists the filters you can use with the Query Builder and the tabs they appear in.
Asset Name Filter by asset name, for example the IPv4 address My Findings,
206.206.136.40. My Affected
Assets
- 619 -
CVE ID Filter by Common Vulnerabilities and Exposures (CVE) CVEs, My
ID, for example CVE-2002-2024. Findings, My
Affected
Assets
CVSSv2 Base Filter by the CVSSv2 score for the vulnerability, for CVEs, My
Score example 5.2. When not available from NVD, Tenable Findings, My
determines this score. To learn more, see CVSS vs. VPR. Affected
Assets
CVSSv3 Attack Filter by attack complexity, which defines how difficult it CVEs, My
Complexity is to use a vulnerability in an attack. Choose from High Findings, My
or Low. Affected
Assets
CVSSv3 Base Filter by the CVSSv3 score for the vulnerability, for CVEs, My
Score example 4.3. When not available from NVD, Tenable Findings, My
determines this score. To learn more, see CVSS vs. VPR. Affected
Assets
CVSSv3 Integrity Filter by the expected impact of the affected asset's CVEs, My
data integrity loss. Choose from High, Low, or None. Findings, My
- 620 -
Affected
Assets
CVSSv3 Privileges Filter by the permission level attackers require to exploit CVEs, My
Required the vulnerability. Choose from High, Low, or None. None Findings, My
means attackers need no permissions in your Affected
environment and can exploit the vulnerability while Assets
unauthorized.
First Discovered Filter for the date a vulnerability was first identified. Use CVEs, My
Operators to get results based on a date range, a Findings, My
specific date, vulnerabilities older than a date, and Affected
others. Assets
First Functional Filter for the date a vulnerability was first known to be CVEs, My
- 621 -
Exploit exploited. Use Operators to get results based on a date Findings, My
range, a specific date, vulnerabilities older than a date, Affected
and others. Assets
First Proof of Filter for the date a vulnerability's first proof of concept CVEs, My
Concept was found. Use Operators to get results based on a date Findings, My
range, a specific date, vulnerabilities older than a date, Affected
and others. Assets
IPv4 Address Filter for affected asset IPv4 addresses as a single IP, an My Findings,
IP range, or an IP Classless Inter-Domain Routing (CIDR) My Affected
block. For example, type 172.16.2.1-172.16.2.100. Assets
IPv6 Address Filter for affected asset IPv6 addresses as a single IP, an My Findings,
IP range, or an IP Classless Inter-Domain Routing (CIDR) My Affected
block. For example, type ::ffff:c0a8:102. Assets
Last Seen Filter for the date a finding affected or asset last My Findings,
appeared on a scan. Use Operators to get results based My Affected
on a date range, a specific date, vulnerabilities older Assets
than a date, and others.
Plugin ID Filter by the ID of the Tenable plugin that detected the CVEs, My
vulnerability, for example 157288. To look up plugin IDs, Findings, My
go to the Tenable website. Affected
Assets
Plugin Name Filter by the name of the Tenable plugin that detected My Findings,
the vulnerability, for example TLS Version 1.1 Protocol My Affected
Deprecated. Assets
- 622 -
Assets
Save a Search
To save a search:
1. In the three tabs on the lower part of the Vulnerability Intelligence page, refine results with
the Query Builder.
A drop-down appears.
4. In the New Filter Name box, type a name and click the button.
- 623 -
To run a saved search:
1. In the three tabs on the lower part of the Vulnerability Intelligence page, click Saved Filters.
1. In the three tabs on the lower part of the Vulnerability Intelligence page, click Saved Filters.
Note: Any Tenable Vulnerability Management user can apply a shared search, but the assets they can view
are based on their permissions. To learn more, see Access Control.
1. In the three tabs on the lower part of the Vulnerability Intelligence page, click Saved Filters.
- 624 -
a. In the filter box, update the queries the search uses.
1. In the three tabs on the lower part of the Vulnerability Intelligence page, click Saved Filters.
Tip: The system does not delete copies shared to other users.
- 625 -
The Vulnerability Intelligence page appears.
3. Refine the results that appear in the table on the lower area of the page, as described in
Identify Your Exposure.
Note: You export different items from the Findings and Affected Assets tabs:
l My Findings — In the main table, export findings. In the drop-downs >, export the
assets that those findings appear on.
l My Affected Assets — In the main table, export assets. In the drop-downs >, export
plugin results for those assets.
Tip: To select all items, in the blue bar above the items to export, click, the check box. Then, if your
results span multiple pages, click Select all.
5. In the blue bar, depending on the items to export, click Export Findings, Export
Affected Assets, or Export Plugins.
The system processes your request. Once processed, a confirmation message appears and
your browser saves the file to your computer. Tenable Vulnerability Management also logs
your request to the Exports page.
Note: If you request a large export and then leave the Vulnerability Intelligence page before it is
processed, you must manually download the file from the Exports page.
CVEs
On the Vulnerability Intelligence page, the CVEs tab shows vulnerabilities from Tenable's database.
All vulnerabilities appear by default, but you can refine the results with vulnerability categories
and the query builder.
The table in the CVEs tab has the following columns, which you can show or hide as described in
Customize Tables.
- 626 -
Column Description
CVE ID Indicates the Common Vulnerability and Exposure (CVE) identifier for the
vulnerability, as assigned by the CISA-sponsored CVE Program.
Common Indicates the informal name of the vulnerability (for example, Log4Shell). Not
Name all vulnerabilities have a common name.
CVSSv2 Indicates the CVSSv2 score for the vulnerability. When not available from
NVD, Tenable determines this score. To learn more, see CVSS vs. VPR.
CVSSv3 Indicates the CVSSv3 score for the vulnerability. When not available from
NVD, Tenable determines this score.
Exploit Indicates the highest level of exploit maturity for the vulnerability: Unproven,
Maturity PoC, Functional, or High. Drawn from Tenable’s research, as well as key
external sources.
EPSS Indicates the likelihood that the vulnerability will be actively exploited, based
on the third-party Exploit Prediction Scoring System (EPSS).
First PoC Indicates the date the vulnerability’s first proof of concept was discovered.
Plugins Lists the IDs for the Tenable plugins that detected the vulnerability.
My Findings
On the Vulnerability Intelligence page, the My Findings tab shows all active, new, or resurfaced
findings findings in your environment that are being tracked by Tenable Vulnerability Management.
Refine the results with vulnerability categories and the query builder.
The My Findings tab has the following columns, which you can show or hide as described in
Customize Tables.
- 627 -
Column Description
VPR Indicates the Tenable-calculated Vulnerability Priority Rating (VPR) score from
0.1 to 10.
Note: A finding's VPR is based on the VPR of the plugin that identified it. When
plugins are associated with multiple vulnerabilities, the highest VPR appears.
Plugin Name Indicates the name of the Tenable plugin that detected the finding.
Plugin ID Indicates the ID of the Tenable plugin that detected the finding.
Affected Indicates the number of affected assets. Click the number to open the Asset
Assets Details page.
CVSSv3 Indicates the Common Vulnerability Scoring System (CVSS) v3 score for the
finding.
Affected Assets
In any findings row, click the dropdown > to reveal a table of assets on which that finding appears,
with the following columns.
Column Description
Asset Indicates the asset identifier, assigned based on the availability of specific
Name attributes in logical order.
ACR (Requires Tenable Lumin license) Indicates the Tenable-defined Asset Criticality
Rating (ACR) as an integer from 1 to 10, if available.
AES (Requires Tenable Lumin license) Indicates the Tenable-defined Asset Exposure
Score as an integer from 0 to 1000, if available.
Last Seen Indicates the date when the asset last appeared on a scan.
- 628 -
Tags Lists any asset tags you applied in Tenable Vulnerability Management.
My Affected Assets
On the Vulnerability Intelligence page, the My Affected Assets tab shows all assets in your
environment with a finding that has not yet been fixed. Refine the results with vulnerability
categories and the query builder, or add tags to provide business context.
The My Affected Assets tab has the following columns, which you can show or hide as described in
Customize Tables.
Column Description
Plugin Indicates the number of Tenable plugins that identified findings on the asset.
Count Click the number to review details on the Findings workbench.
ACR (Requires Tenable Lumin license) Indicates the Tenable-defined Asset Criticality
Rating (ACR) as an integer from 1 to 10, if available.
AES (Requires Tenable Lumin license) Indicates the Tenable-defined Asset Exposure
Score as an integer from 0 to 1000, if available.
Plugins
In any asset row, click the dropdown > to reveal a table of plugin results for the findings on that
asset, with the following columns.
Column Description
VPR Indicates the Tenable-calculated Vulnerability Priority Rating (VPR) score from
0.1 to 10.
- 629 -
Note: A finding's VPR is based on the VPR of the plugin that identified it. When
plugins are associated with multiple vulnerabilities, the highest VPR appears.
Severity Indicates the vulnerability's severity based on the Common Vulnerability Scoring
System (CVSS).
Plugin Indicates the name of the Tenable plugin that detected the finding.
Name
Plugin ID Indicates the ID of the Tenable plugin that detected the finding.
- 630 -
Add new tags...
a. In the two text boxes, type a tag category and value (for example, Location:
Headquarters).
b. After you type the value, in the drop-down that appears, click Create.
6. In the Remove Tags dialog and the Current Tags section, click the tag or tags to remove.
- 631 -
7. Click Remove Tags.
Vulnerability Categories
The Vulnerability Intelligence page breaks down key vulnerabilities from Tenable's database into
curated categories that you select from hexagon-shaped tiles.
While most vulnerabilities do not belong to categories, the ones that do require quick action when
found in your environment! To learn how to compare your findings to one of these categories, see
Identify Your Exposure.
Category Description
CISA Known Vulnerabilities that appear in the CISA Known Exploited Vulnerabilities
Exploited Catalog. CISA suggests that you prioritize remediation efforts for these
vulnerabilities since they are known to cause immediate harm.
In the News Vulnerabilities being widely reported in the press with notable coverage
over the past 30 days.
Recently Vulnerabilities with notable coverage in the press over the past 30 days,
Actively and for which Tenable has evidence of active exploitation.
Exploited
- 632 -
Ransomware Vulnerabilities used in current or historical ransomware attacks, as
determined from evidence gathered by the Tenable Research team.
- 633 -
Explore
In Tenable Vulnerability Management, the Explore section presents your organization’s findings and
assets on customizable dashboards and workbenches. This data comes from your scans. Using a
complex algorithm, Tenable Vulnerability Management matches incoming scan data to existing
resources, or creates new ones.
You can view and analyze your data in multiple ways, including visual overviews that enable you to
spot trends, filters that return specific resources, and rich export capabilities—all in a unified
interface.
The Explore section contains three components: the Explore Overview page, the Findings
workbench, and the Assets workbench.
Tip: If you are migrating from legacy workbenches, see Explore vs. Legacy Workbenches for a feature
comparison.
Explore Overview
Findings
Assets
Vulnerabilities
Assets
Explore Overview
On the Explore Overview page, customizable dashboards present your organization’s findings and
assets in visual overviews that enable you to spot trends. For example, you can view assets by
source, average scan duration over time, or average vulnerabilities per asset over time. Tenable
Vulnerability Management updates your dashboards whenever you run a scan.
Note: Tenable Vulnerability Management indexes your scan data before updating dashboards, so updates
do not appear immediately. Tenable Vulnerability Management may display up to 30 minutes of cached
data before updating dashboards.
- 634 -
View the Explore Overview Page
To view the Explore Overview page:
Widget Description
Trend - Shows trends for scan results, including host vulnerabilities, assets
Vulnerabilities, over time, and scan duration. In the top-right corner, filter by date
Assets, and Scan range.
Duration
Assets by Source Shows trends for assets by source over time, with each source
indicated by a colored line. In the top-right corner, filter by date
range. Asset counts for this widget are based on scans from the
last seven days.
- 635 -
Findings
On the Findings workbench, you can get insight into your organization's findings. These include
vulnerabilities, cloud misconfigurations, host audits, and web application findings.
- 636 -
To view your findings:
l In the search box, search for findings by asset name, IPv4 address or range, or Classless
Inter-Domain Routing (CIDR) block. Or, use a wildcard (*)
l Filter the displayed findings and customize your view, as described in Filter Findings or
Assets.
l Save filters as a custom search, as described in Saved Filters for Findings or Assets.
l Group findings by asset, plugin, and more, as described in Group Your Findings.
l Click Include Info Severity in the upper-right corner to include these findings. This
option only applies to Vulnerabilities and Web Application Findings and is described in
Vulnerability Severity Indicators.
l Filter the displayed findings by time period with a drop-down in the upper-right corner.
Vulnerabilities
- 637 -
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
On the Findings workbench, click the Vulnerabilities tab to view your asset vulnerabilities. Common
vulnerabilities include system misconfigurations, unpatched software, poor data encryption, and
weak authorization credentials.
The Vulnerabilities tab contains a table with the following columns. To show or hide columns, see
Customize Explore Tables.
Column Description
Asset ID The UUID of the asset where a scan detected the finding. This
value is unique to Tenable Vulnerability Management.
Asset Name The name of the asset. This value is unique to Tenable
Vulnerability Management.
Last Fixed The last time a previously detected vulnerability was scanned
and noted as no longer present on an asset.
Plugin Name The name of the plugin that identified the vulnerability detected
in the finding.
Plugin Family The family of the plugin that identified the vulnerability.
Port The port that the scanner used to connect to the asset where
the scan detected the vulnerability.
Protocol The protocol the scanner used to communicate with the asset
where the scan detected the vulnerability.
- 638 -
Time Taken to Fix How long it took your organization to fix a vulnerability identified
on a scan, in hours or days. Only appears for Fixed
vulnerabilities. Use this filter along with the State filter set to
Fixed for more accurate results.
CVSSv2 Base Score The CVSSv2 base score (intrinsic and fundamental
characteristics of a vulnerability that are constant over time and
user environments). Tenable Vulnerability Management shows
the CVSSv2 or CVSSv3 column depending on the Vulnerability
Severity Metric setting.
CVSSv3 Base Score The CVSSv3 base score (intrinsic and fundamental
characteristics of a vulnerability that are constant over time and
user environments). Tenable Vulnerability Management shows
the CVSSv2 or CVSSv3 column depending on the Vulnerability
Severity Metric setting.
Scan Origin The scanner that detected the finding. Also identifies if the scan
is a work-load scan. Possible values for this column are:
Tenable Vulnerability Management, Tenable Security Center, and
Agentless Assessment.
Live Result Indicates whether the scan result is based on live results. In
Agentless Assessment, you can use live results to view scan
results for new plugins based on the most recently collected
snapshot data, without running a new scan. The possible values
are Yes or No. For more information, see Live Results for
Agentless Assessment.
- 639 -
First Seen The date when a scan first found the vulnerability on an asset.
Last Seen The date when a scan last found the vulnerability on an asset.
Actions In this column, click the button to view a drop-down where you
can:
Cloud Misconfigurations
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
On the Findings workbench, click the Cloud Misconfigurations tab to view your cloud
misconfigurations. Common cloud misconfigurations include unrestricted inbound and outbound
ports, credential management and encryption, disabled monitoring and logging, insecure automated
backups, and storage access.
The Cloud Misconfigurations tab contains a table with the following columns. To show or hide
columns, see Customize Explore Tables.
- 640 -
Column Description
Resource ID A unique identifier made up of the resource type and the asset name.
Policy Name The security policy that governs the affected asset.
Policy Group The group associated with the security policy that governs the affected
Name asset.
Severity The vulnerability's CVSS-based severity. For more information, see CVSS
vs. VPR.
First Seen The date when a scan first found the vulnerability on an asset.
Last Seen The date when a scan last found the vulnerability on an asset.
Asset ID The UUID of the asset where a scan detected the finding. This value is
unique to Tenable Vulnerability Management.
Cloud Provider The name of the cloud provider that hosts the asset.
IaC Resource The Infrastructure as Code (IAC) resource type of the asset.
Type
Resource Name The name of the asset where the scanner detected the vulnerability.
Tenable Vulnerability Management assigns this identifier based on the
presence of certain asset attributes in the following order:
2. NetBIOS Name
3. FQDN
4. IPv6 address
5. IPv4 address
For example, if scans identify a NetBIOS name and an IPv4 address for an
asset, the NetBIOS name appears as the Resource Name.
- 641 -
Region The cloud region where the asset runs.
VPC The virtual private cloud on which the asset is hosted in AWS.
ARN The unique Amazon Resource Name for the asset in AWS.
Account ID The unique identifier assigned to the asset resource in the cloud service
that hosts the asset.
Policy Category The category associated with the security policy that governs the affected
asset.
Last Scan Time The date and time when Tenable Vulnerability Managementlast scanned the
asset.
Updated Time The date and time when a user last updated the asset.
Actions In this column, click the button to view a drop-down where you can:
Host Audits
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
On the Findings workbench, click the Host Audits tab to view your host audit findings. Host audits
assess workstations, services, or network devices in order to evaluate the configuration, hardening,
- 642 -
and security controls applied to a target. View specific host audit findings to identify issues to
remediate.
The Host Audits tab contains a table with the following columns. To show or hide columns, see
Customize Explore Tables.
Column Description
Audit The name of the compliance check the scanner performed on the affected
Check asset.
Name
Audit File The name of the audit file the scanner used to perform the compliance check.
Plugin The name of the plugin that identified the compliance check finding.
Name
Asset ID The UUID of the asset where a scan detected the finding. This value is unique to
Tenable Vulnerability Management.
Asset The name of the asset. This value is unique to Tenable Vulnerability
Name Management.
Last The date and time when a scan last performed the compliance check on the
Audited asset.
Control ID The UUID of the control instance applied on the system that hosts the impacted
asset. This value is unique to Tenable Vulnerability Management.
Actions In this column, click the button to view a drop-down where you can:
l View All Findings — View all findings for an asset, as described in View
Asset Details.
- 643 -
l View All Details — View complete details for a finding, as described in
View Finding Details.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
On the Findings workbench, click the Web Application Findings tab to view your web application
findings. Common web application findings include SQL injections, cross-site scripting, local file
inclusions, security misconfigurations, and XML external entity processing.
The Web Application Findings tab contains a table with the following columns. To show or hide
columns, see Customize Explore Tables.
Column Description
Asset ID The UUID of the asset where a scan detected the vulnerability. This value is
unique to Tenable Vulnerability Management.
Asset The name of the asset where the scanner detected the vulnerability. This value
Name is unique to Tenable Vulnerability Management.
Note:Tenable Vulnerability Management does not support a CIDR mask of /0 for this
parameter, because that value would match all IP addresses. If you submit a /0 value
for this parameter, Tenable Vulnerability Management returns a 400 Bad Request
error message.
Severity The vulnerability's CVSS-based severity. For more information, see CVSS vs.
VPR.
- 644 -
Plugin ID The ID of the plugin that identified the vulnerability.
First Seen The date when a scan first found the vulnerability on an asset.
Last Seen The date when a scan last found the vulnerability on an asset.
Actions In this column, click the button to view a drop-down where you can:
l View All Findings — View all findings for an asset, as described in View
Asset Details.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
- 645 -
Required Tenable Web App Scanning User Role: Scan Operator, Standard, Scan Manager, or
Administrator
From the Findings workbench, you can drill down into a single asset to view it on the Finding
Details page. Tenable Vulnerability Management customizes this page by finding type.
The findings for that type appear. Each type has different default columns.
4. Filter the displayed findings and customize your view, as described in Filter Findings or
Assets.
The Finding Details page appears. Its layout varies by finding type:
l Vulnerability Details
- 646 -
l Host Audit Details
Vulnerability Details
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
When you View Finding Details, the Finding Details page varies by finding type. For vulnerability
findings, it includes a description, the recommended solution, and the plugin output.
The Finding Details page for vulnerabilities contains the following sections.
Note: Tenable Vulnerability Management hides empty sections, so these may not appear in some cases.
Section Description
Solution A brief summary of how you can remediate the vulnerability detected
- 647 -
in the finding. Only appears if an official solution is available.
See Also Links to websites that contain helpful information about the
vulnerability detected in the finding.
Cloud The number of resources that failed to comply with the configured
Misconfigurations policies. Click this number to go to the Cloud Misconfigurations tile
and view the affected resources.
Asset Scan Information about the scan that detected the vulnerability, including:
Information
l First Seen — The date when a scan first found the vulnerability
on an asset.
- 648 -
l Last Seen — The date when a scan last found the vulnerability
on an asset.
l Last Licensed Scan — The date and time of the last scan in
which the asset was considered "licensed" and counted towards
Tenable's license limit. A licensed scan uses non-discovery
plugins and can identify vulnerabilities. Unauthenticated scans
that run non-discovery plugins update the Last Licensed Scan
field, but not the Last Authenticated Scan field. For more
information on licensed assets, see Tenable Vulnerability
Management Licenses.
- 649 -
l Installed Software — Software that a scan identified on the
affected asset.
Vulnerability Priority (Requires Tenable Lumin license) A descriptive icon indicating the
Rating (VPR) VPR of the vulnerability. For more information, see CVSS vs. VPR.
Asset Criticality (Requires Tenable Lumin license) Rates the criticality of an asset to
Rating (ACR) the organization from 1 to 10. A higher value means the asset is more
crucial to the business. For more information, see Tenable Lumin
Metrics.
Finding State A descriptive icon indicating the state of the vulnerability. For more
information, see Vulnerability States.
- 650 -
l Exploited by Nessus — Indicates whether Tenable Nessus
exploited the vulnerability during the identification process.
l Port — The port that the scanner used to connect to the asset
where the scan detected the vulnerability.
- 651 -
l Asset Inventory — This plugin is an Tenable Inventorynventory
plugin.
l First Seen — The date when a scan first found the vulnerability
on an asset.
l Last Seen — The date when a scan last found the vulnerability
on an asset.
VPR Key Drivers Information about the key drivers Tenable uses to calculate a VPR for
the vulnerability, including:
- 652 -
l CVSS3 Impact Score — The NVD-provided CVSSv3 impact score
for the vulnerability. If the NVD did not provide a score, Tenable
Vulnerability Management shows a Tenable-predicted score.
Plugin Details Information about the plugin that detected the vulnerability,
including:
Risk Information Information about the relative risk that the vulnerability presents to
the affected asset, including:
- 653 -
that change over time.
Actions In the upper-right corner, click the Actions button to view a drop-
down where you can:
- 654 -
l Create Remediation Project — Start a new remediation project
for an asset, as described in Remediation Projects.
The Finding Details page for cloud misconfigurations contains the following sections.
Note: Tenable Vulnerability Management hides empty sections, so these may not appear in some cases.
Section Description
Policy Group Name The name of the cloud policy group associated with the affected
- 655 -
finding.
Policy Name The name of the cloud policy associated with the affected finding.
Solution A brief summary of how you can remediate the vulnerability. This
section appears only if an official solution is available.
l VPC The unique identifier of the public cloud that hosts the
AWS virtual machine instance. Stands for "virtual private
cloud."
l Has Drift — Indicates whether the asset has any drifts. For
more information, see Set up Drift Analysis in the Legacy
- 656 -
Tenable Cloud Security User Guide.
l NetBIOS Name
l FQDN
l IPv6 address
l IPv4 address
for example, if scans identify a NetBIOS name and an
IPv4 address for an asset, the NetBIOS name appears as
the Resource Name.
Additional Information The number of vulnerabilities the policy detected during the scan.
Asset Scan Information about the scan that detected the vulnerability,
- 657 -
Information including:
l First Seen — The date when a scan first found the vulnerability
on an asset.
l Last Seen — The date when a scan last found the vulnerability
on an asset.
l Last Licensed Scan — The date and time of the last scan in
which the asset was considered "licensed" and counted
towards Tenable's license limit. A licensed scan uses non-
discovery plugins and can identify vulnerabilities.
Unauthenticated scans that run non-discovery plugins update
the Last Licensed Scan field, but not the Last Authenticated
Scan field. For more information on licensed assets, see
Tenable Vulnerability Management Licenses.
- 658 -
l Policy Group ID — The type of policy group ID associated with
the finding.
- 659 -
l Ignored — Indicates whether Legacy Tenable Cloud Security
ignored the policy violation when determining the finding
severity.
Actions In the upper-right corner, click the Actions button to view a drop-
down where you can:
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
When you View Finding Details, the Finding Details page varies by finding type. For host audit
findings, it includes a description of the host audit finding, its recommended solution, and a
summary of the corresponding asset.
- 660 -
The Finding Details page for host assets contains the following sections.
Note: Tenable Vulnerability Management hides empty sections, so these may not appear in some cases.
Section Description
Description A brief description of the plugin that identified the finding during a
compliance check.
Solution A brief summary of how you can address the compliance check findings.
Audit File The name of the audit file the scanner used to perform the compliance
check.
See Also Links to external websites that contain helpful information about the
compliance check.
- 661 -
l Name — The name of the asset on which the scanner performed a
compliance check.
l System Type — The type of system on which the affected asset runs.
Asset Scan Information about the scan that detected the vulnerability, including:
Information
l First Seen — The date when a scan first found the vulnerability on an
asset.
l Last Seen — The date when a scan last found the vulnerability on an
asset.
l Last Licensed Scan — The date and time of the last scan in which the
asset was considered "licensed" and counted towards Tenable's
license limit. A licensed scan uses non-discovery plugins and can
identify vulnerabilities. Unauthenticated scans that run non-discovery
plugins update the Last Licensed Scan field, but not the Last
Authenticated Scan field. For more information on licensed assets,
see Tenable Vulnerability Management Licenses.
l Source — The source of the scan that detected the vulnerability on the
affected asset.
- 662 -
Information l Network — The name of the network object associated with scanners
that detected the finding. The default network name is Default. For
more information, see Networks.
l MAC Address — The static Media Access Control (MAC) address for the
affected asset.
Policy Value The plugin output that appears in the finding if the affected asset is
compliant with the audit policy.
Actual Value The plugin output that actually appears in the finding.
l Audit File — The name of the audit file the scanner used to perform
the compliance check.
l Plugin Name — The name of the plugin that identified the compliance
check.
l Result — The result for the item in a configuration audit. Results can
be: Passed, Warning, or Failed.
Audit l First Audit — The date and time when a scan first performed the
Discovery compliance check on the asset.
- 663 -
l Last Audit — The date and time when a scan last performed the
compliance check on the asset.
Reference A list of industry resources that provide additional information about the
Information compliance check.
Actions In the upper-right corner, click the Actions button to view a drop-down
where you can:
l View All Findings — View all findings for an asset, as described in View
Asset Details.
l View All Details in New Tab — View complete details for an asset in a
new browser tab.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
When you View Finding Details, the Finding Details page varies by finding type. For web application
findings, it includes a description, the recommended solution, and details about the affected asset.
- 664 -
The Finding Details page for web application findings contains the following sections.
Note: Tenable Vulnerability Management hides empty sections, so these may not appear in some cases.
Section Description
Solution A brief summary of how you can remediate the vulnerability detected in
the finding. This section appears only if an official solution is available.
See Also Links to external websites that contain helpful information about the
vulnerability detected in the finding.
l Name — The name of the affected asset. You can click the link in the
- 665 -
name to view details about the affected asset on the Web
Application Details page.
Asset Scan Information about the scan that detected the vulnerability, including:
Information
l First Seen — The date and time when a scan first identified the
asset.
l Last Seen — The date and time at which the asset was last observed
as part of a scan.
l Last Licensed Scan — The date and time of the last scan in which
the asset was considered "licensed" and counted towards Tenable's
license limit. A licensed scan uses non-discovery plugins and can
identify vulnerabilities. Unauthenticated scans that run non-
discovery plugins update the Last Licensed Scan field, but not the
Last Authenticated Scan field. For more information on licensed
assets, see Tenable Vulnerability Management Licenses.
Identification Information about how the plugin identified the vulnerability detected in
the finding, including:
l URL — The target URL where the scanner detected the vulnerability.
- 666 -
section appears only if the asset is vulnerable to injection attacks.
Http Info Information about the HTTP messages between the scanner and the web
application, including:
l HTTP Request — The HTTP request of the scanner that identified the
vulnerability made to the web application.
l HTTP Response — The HTTP response that the web application sent
to the scanner that identified the vulnerability.
Attachments Plugin attachments that include more details about the vulnerability
detected in the finding. This section appears only if attachments are
available.
Vulnerability The Vulnerability Priority Rating Tenable calculated for the vulnerability.
Priority Rating
(VPR)
Finding State The state of the vulnerability detected in the finding. For more
information, see Vulnerability States.
Vulnerability Information about the vulnerability that the plugin identified, including:
Information
l Severity — An icon that indicates the severity of the vulnerability.
l Exploited With — The most common ways that the vulnerability may
be exploited.
- 667 -
l First Seen — The date when a scan first found the vulnerability on an
asset.
l Last Seen — The date when a scan last found the vulnerability on an
asset.
l Age — The number of days since a scan first found the vulnerability
on an asset in your network.
Plugin Details Information about the plugin that detected the vulnerability detected in
the finding, including:
l Publication Date — The date on which the plugin that identified the
vulnerability was published.
l Modification Date — The date on which the plugin was last modified.
l Risk Factor —The CVSS-based risk factor associated with the plugin.
Risk Information Information about the relative risk that the vulnerability presents to the
affected asset, including:
- 668 -
Information vulnerability that Tenable Vulnerability Management detected in the
finding, including but not limited to:
l OWASP API — A link or links to each OWASP API Top 10 list on which
the vulnerability appears.
Actions In the upper-right corner, click the Actions button to view a drop-down
where you can:
l View All Details in New Tab — View complete details for an asset in
a new browser tab.
Findings Filters
On the Findings page, you can filter and view analytics for the following findings types:
- 669 -
l Vulnerabilities
l Cloud Findings
You can save a set of commonly used filters as a saved filter to access later or share with other
members of your team.
Note: To optimize performance, Tenable limits the number of filters that you can apply to any Explore >
Findings or Assets views (including Group By tables) to 18.
Note: When Tenable Vulnerability Management identifies the same finding on multiple scans, it only stores
the most recent result. For example, if an Agent scan identifies a finding and then a later Tenable Nessus
scan identifies the same finding, that finding is associated with the Tenable Nessus scan. If you can't
locate a known finding with a filter such as Source, search for the finding directly.
Vulnerabilities Filters
Option Description
Asset ID The UUID of the asset where a scan detected the finding. This value is
unique to Tenable Vulnerability Management.
Asset Name The name of the asset where a scan detected the vulnerability. This
value is unique to Tenable Vulnerability Management. This filter is case-
sensitive, but you can use the wildcard character to turn this off.
Asset Tags A unique filter that searches tag (category: value) pairs. When you type a
tag value, you must use the category: value syntax, including the space
after the colon (:). You can use commas (,) to separate values. If there is
a comma in the tag name, insert a backslash (\) before the comma. You
can add a maximum of 100 tags.
Note: If your tag name includes double quotation marks (" "), you must use
the UUID instead.
- 670 -
Bugtraq ID The Bugtraq ID for the plugin that identified the vulnerability.
Canvas Exploit The name of the CANVAS exploit pack that includes the vulnerability.
CERT Vulnerability The ID of the vulnerability in the CERT Vulnerability Notes Database.
ID
CISA KEV Due The date on which Cybersecurity and Infrastructure Security Agency
Date (CISA) Known Exploitable Vulnerability (KEV) remediation is due, as per
Binding Operational Directive 22-01. Searches by the earliest due date
for KEVs associated with the plugin. For more information, see the
Known Exploited Vulnerabilities Catalog.
CORE Exploit Indicates whether an exploit for the vulnerability exists in the CORE
Framework Impact framework.
CVE The Common Vulnerability and Exposure (CVE) IDs for the vulnerabilities
that the plugin identifies.
CVSSv2 Base The CVSSv2 base score (intrinsic and fundamental characteristics of a
Score vulnerability that are constant over time and user environments).
CVSSv2 Vector The raw CVSSv2 metrics for the vulnerability. For more information, see
CVSSv2 documentation.
CVSSv3 Base The CVSSv3 base score (intrinsic and fundamental characteristics of a
- 671 -
Score vulnerability that are constant over time and user environments).
Default/Known Indicates whether the plugin that identified the vulnerability checks for
Account default accounts.
Elliot Exploit The name of the exploit for the vulnerability in the D2 Elliot Web
Exploitation framework.
Exploited By Indicates whether Tenable Nessus exploited the vulnerability during the
Nessus process of identification.
Exploit Hub Indicates whether an exploit for the vulnerability exists in the ExploitHub
framework.
Note: You can view the ID for a finding by accessing the Findings Details
page for the findings and checking the page URL. The finding ID is the alpha-
numeric text that appears in the path between details and asset.
First Seen The date when a scan first found the vulnerability on an asset.
IAVA ID The ID of the information assurance vulnerability alert (IAVA) for the
- 672 -
vulnerability.
IAVB ID The ID of the information assurance vulnerability bulletin (IAVB) for the
vulnerability.
In The News Indicates whether this plugin has received media attention (for example,
ShellShock, Meltdown).
IPv4 Address The IPv4 address for the affected asset. You can add up to 256
IP addresses to this filter.
Last Fixed The last time a previously detected vulnerability was scanned and noted
as no longer present on an asset.
Last Seen The date when a scan last found the vulnerability on an asset.
Malware Indicates whether the plugin that identified the vulnerability checks for
malware.
Metasploit Exploit The name of the related exploit in the Metasploit framework.
Microsoft Bulletin The Microsoft security bulletin that the plugin, which identified the
vulnerability, covers.
Original Severity The vulnerability's CVSS-based severity when a scan first detected the
finding. For more information, see CVSS vs. VPR.
Patch Published The date on which the vendor published a patch for the vulnerability.
Plugin Description The description of the Tenable plugin that identified the vulnerability.
- 673 -
Plugin Family The family of the plugin that identified the vulnerability.
Plugin The date at which the plugin that identified the vulnerability was last
Modification Date modified.
Plugin Name The name of the plugin that identified the vulnerability.
Plugin Output Use this filter to return findings with plugin output you specify. You can
search for plugin output that contains a value or does not contain it, as
described in Use Filters.
Note: Manually enable this filter in Settings > General Search > Enable
Plugin Output Search. If you do not use this filter for 35 days, it is disabled
again.
- 674 -
Plugin Output contains Kernel AND Plugin ID is equal
to 110483
l Search for output from any plugin but the ones listed:
Plugin Published The date on which the plugin that identified the vulnerability was
published.
Plugin Type The general type of plugin check. Possible options are:
l Local
l Remote
Port Information about the port the scanner used to connect to the asset
where the scan detected the vulnerability.
Protocol The protocol the scanner used to communicate with the asset where the
scan detected the vulnerability.
Risk Modified The risk modification applied to the vulnerability's severity. Possible
options are:
l Recasted
l Accepted
l None
- 675 -
Scan Origin The scanner that detected the finding.
See Also Links to external websites that contain helpful information about the
vulnerability.
Severity The vulnerability's CVSS-based severity. For more information, see CVSS
vs. VPR.
This filter appears in the filters plane by default, with Critical, High,
Medium, and Low selected.
Source The source of the scan that identified the asset. Possible values are:
l AWS Connector
l Azure Connector
l GCP Connector
l Qualys Connector
State The state of the vulnerability. Appears in the filters plane by default, with
Active, Resurfaced, and New selected. For more information, see
Vulnerability States.
Target Groups A target group or groups associated with the scan that identified the
vulnerability. For more information, see Target Groups.
- 676 -
Time Taken to Fix How long it took your organization to fix a vulnerability identified on a
scan, in hours or days. Only appears for Fixed vulnerabilities. Use this
filter along with the State filter set to Fixed for more accurate results.
VPR The Vulnerability Priority Rating Tenable calculated for the vulnerability.
Vulnerability The date when the vulnerability definition was first published (for
Published example, the date that the CVE was published).
Cloud
Option Description
Filters
Account ID The unique identifier assigned to the asset resource in the cloud
service that hosts the asset on which a scan detected the finding.
ARN The Amazon Resource Name (ARN) for the asset on which a scan
detected the finding.
Asset ID The UUID of the asset on which a scan detected the finding. This
value is unique to Tenable Vulnerability Management.
Created Time The time and date when Tenable Vulnerability Management created
the asset record on which a scan detected the finding.
Exists in Cloud Indicates whether the affected cloud resource exists in a cloud
environment.
- 677 -
Exists in IAC Indicates whether the affected asset was created via Infrastructure
as Code (IaC).
Note: You can view the ID for a finding by accessing the Findings
Details page for the findings and checking the page URL. The finding
ID is the alpha-numeric text that appears in the path between details
and asset.
First Seen The date when Tenable Vulnerability Management first scanned the
affected asset.
First Seen The date when Tenable Vulnerability Management first scanned the
affected asset.
IaC Resource The Infrastructure as Code (IAC) resource type of the asset.
Type
Immutable Drift Indicates whether the asset has immutable drifts. For more
information, see Set up Drift Analysis in the Legacy Tenable Cloud
Security User Guide.
Last Fixed The date when the finding was last fixed.
Last Scan Time The date when a scan was last run against the finding.
Last Seen The date when Tenable Vulnerability Management last scanned the
affected asset.
Managed By The name of the person, group, or company that manages the
- 678 -
affected asset.
Policy ID The unique ID for the cloud policy associated with the affected
asset.
Policy Name The unique ID for the cloud policy associated with the affected
asset.
Policy Type The unique ID for the cloud policy associated with the affected
asset.
Resource The category of the asset resource in the cloud service that hosts
Category the affected asset.
Resource ID The ID of the asset resource in the cloud service that hosts the
affected asset.
Resource Name The name of the asset resource in the cloud service that hosts the
affected asset.
Resource Type The type of the asset resource in the cloud service that hosts the
affected asset.
l Failed
l Passed
l Unknown
Rule ID The unique ID for the security rule for which the scanner found a
- 679 -
violation.
Rule Reference The reference ID for the security rule for which the scanner found a
ID violation.
This filter appears in the filters plane by default, with Critical, High,
Medium, and Low selected.
Updated Time The time and date when the asset record was last updated.
VPC The unique identifier of the public cloud that hosts the AWS virtual
machine instance. For more information, see the Amazon Virtual
Private Cloud User Guide.
Option Description
Filters
Asset ID The UUID of the asset where a scan detected the finding. This value is
unique to Tenable Vulnerability Management.
Asset Name The name of the asset on which the scanner performed an audit check.
This value is unique to Tenable Vulnerability Management.
Asset Tags A unique filter that searches tag (category: value) pairs. When you type a
tag value, you must use the category: value syntax, including the space
after the colon (:). You can use commas (,) to separate values. If there is a
comma in the tag name, insert a backslash (\) before the comma. You can
add a maximum of 100 tags.
- 680 -
Note: If your tag name includes double quotation marks (" "), you must use the
UUID instead.
Audit File The name of Audit file the scanner used to perform the audit. Audit files
are XML-based text files that contain the specific configuration, file
permission, and access control tests to be performed.
Audit Check The name Tenable assigned to the audit. In some cases, the compliance
Name control may be listed as the prefix within the name.
Note: Use this filter in conjunction with the Compliance Framework filter.
This filter groups the controls into families for easier and more efficient
- 681 -
queries. For example: A12 - Operations security or CSF:Detect.
Note: Use this filter in conjunction with the Compliance Framework filter.
Control ID An ID that can correlate results with other results that meet a certain
benchmark recommendation. You can use this filter to identify checks in
the audit portal.
First Audited Identifies the first date the audit check was performed on the asset.
FQDNs The fully qualified domain names (FQDNs) for the asset.
IPv4 Address The IPv4 address for the affected asset. You can add up to 256 IP
addresses to this filter.
Last Audited Identifies the date of the most recent audit check performed on the asset.
Last Fixed The date when the finding was last fixed.
Last Seen The date when a scan last observed the finding.
Plugin Name The Nessus Plugin Name used to perform the audit check.
Plugin Name The name of the plugin that identified the audit finding.
Result Modified Rules can be created to accept or modify the results of an audit check.
This filter allows you to report modified results.
Severity The vulnerability's CVSS-based severity. For more information, see CVSS
- 682 -
vs. VPR.
This filter appears in the filters plane by default, with Critical, High,
Medium, and Low selected.
State The state of the vulnerability detected in the finding. Appears in the filters
plane by default, with Active, Resurfaced, and New selected. For more
information, see Vulnerability States.
Option Description
Asset ID The UUID of the asset where a scan detected the vulnerability. This value is
unique to Tenable Vulnerability Management.
Asset Name The name of the asset where the scanner detected the vulnerability. This
value is unique to Tenable Vulnerability Management.
Bugtraq ID The Bugtraq ID for the plugin that identified the vulnerability.
CPE The Common Platform Enumeration (CPE) numbers for vulnerabilities that
the plugin identifies.
CVE The Common Vulnerability and Exposure (CVE) IDs for the vulnerabilities
that the plugin identifies.
CVSSv2 Base The CVSSv2 base score (intrinsic and fundamental characteristics of a
Score vulnerability that are constant over time and user environments).
CVSSv2 Vector The raw CVSSv2 metrics for the vulnerability. For more information, see
CVSSv2 documentation.
CVSSv3 Base The CVSSv3 base score (intrinsic and fundamental characteristics of a
Score vulnerability that are constant over time and user environments).
- 683 -
CVSSv3 Vector More CVSSv3 metrics for the vulnerability.
First Seen The date when a scan first found the vulnerability on an asset.
Input Name The name of the specific web application component that the vulnerability
exploits.
Input Type The web application component type (for example, form, cookie, header)
that the vulnerability exploits.
IPv4 Address The IPv4 address for the affected asset. You can add up to 256
IP addresses to this filter.
Last Fixed The date when the finding was last fixed.
Last Seen The date when a scan last observed the finding.
Original The vulnerability's CVSS-based severity when a scan first detected the
Severity finding. For more information, see CVSS vs. VPR.
OWASP 2010 The Open Web Application Security Project (OWASP) 2010 category for the
vulnerability targeted by the plugin.
OWASP 2013 The Open Web Application Security Project (OWASP) 2013 category for the
vulnerability targeted by the plugin.
OWASP 2017 The Open Web Application Security Project (OWASP) 2017 category for the
vulnerability targeted by the plugin.
OWASP 2021 The Open Web Application Security Project (OWASP) 2021 category for the
vulnerability targeted by the plugin.
OWASP The Open Web Application Security Project (OWASP) 2019 category for the
API 2019 API vulnerability targeted by the plugin. Possible options are:
- 684 -
l API4:2019 Lack of Resources & Rate Limiting
l API8:2019 Injection
Plugin The description of the Tenable plugin that identified the vulnerability.
Description
Plugin Family The family of the plugin that identified the vulnerability.
Plugin Name The name of the plugin that identified the audit finding.
Plugin The date on which the plugin that identified the vulnerability was published.
Published
Risk Modified The risk modification applied to the vulnerability's severity. Possible options
are:
l Recast
l Accepted
l None
- 685 -
See Also Links to external websites that contain helpful information about the
vulnerability.
Severity The CVSS score-based severity. For more information, see CVSS Scores vs.
VPR in the Tenable Vulnerability Management User Guide.
This filter appears in the filters plane by default, with Critical, High,
Medium, and Low selected.
State The state of the vulnerability detected in the finding. Appears in the filters
plane by default, with Active, Resurfaced, and New selected. For more
information, see Vulnerability States.
Url The complete URL on which the scanner detected the vulnerability.
WASC The Web Application Security Consortium (WASC) category associated with
the vulnerability targeted by the plugin.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
On the Findings workbench, you can group your findings by specific attributes. You can group host
vulnerabilities, cloud misconfigurations, and web application findings, but you cannot group host
audit findings.
The Findings page appears, showing a table that lists your findings. By default, the
Vulnerabilities tab is active.
- 686 -
3. Do one of the following:
The Findings table displays your findings grouped by the selected attribute.
b. View the following details about your grouped findings. These vary depending on the
attribute you select:
Column Description
Asset
Asset Name The name of the asset where a scan detected the
vulnerability. This value is unique to Tenable Vulnerability
Management.
Asset Tags Asset tags for the affected asset. Hover over the first tag
to view any additional tags.
Last Seen The date and time when a scan last found the vulnerability
on the asset.
Asset IP The IPv4 or IPv6 address associated with the asset record.
- 687 -
High The number of vulnerabilities with a high CVSS-based
severity rating on each set of grouped findings. For more
information, see CVSS vs. VPR.
Plugin
Policy Group — The unique ID for the cloud policy associated with the affected
asset.
l Resource Type — The name of the cloud resource type (for example, a resource
group or virtual machine).
The Findings table displays your findings grouped by the selected attribute.
b. View the following details about your grouped findings. These vary depending on the
attribute you select:
Column Description
Policy
Policy Name The name of the policy associated with the affected asset.
- 688 -
information, see CVSS vs. VPR.
l Cloud
Last Seen The last date the vulnerability was identified in a scan.
Policy Group
Policy ID The unique ID for the cloud policy associated with the
affected asset.
Policy Group The group associated with the security policy that governs
the affected asset.
Exists in IAC Indicates whether the affected asset was created via
Infrastructure as Code (IaC).
Resource Type
- 689 -
grouped findings. For more information, see CVSS vs. VPR.
l Asset — The unique name for the web application associated with the affected
asset.
l Plugin — The ID of the web application resource type (for example, a resource
group or virtual machine).
The web application findings table appears with your findings grouped by the selected
attribute.
b. View the following details about your grouped findings. These vary depending on the
attribute you select:
Column Description
Asset
Asset Name The name of the asset where a scan detected the
vulnerability. This value is unique to Tenable Vulnerability
Management.
- 690 -
Critical The number of vulnerabilities with a critical CVSS-based
severity rating on each set of grouped findings. For more
information, see CVSS vs. VPR.
Last Seen The date and time when a scan last found the vulnerability
on the asset.
Actions The actions you can perform with each set of grouped
findings.
Plugin
CVSSv2 Base Score The CVSSv2 base score (intrinsic and fundamental
characteristics of a vulnerability that are constant over
time and user environments).
- 691 -
Vuln Count The number of vulnerabilities that Tenable Vulnerability
Management identified on each set of grouped findings.
Actions The actions you can perform with each set of grouped
findings.
Tip: This topic describes how to create rules from the Findings workbench, but you can also create rules
from the Tenable Vulnerability Management Settings. For more information, including examples on when
to create rules, see Recast/Accept Rules.
Note: If a rule is targeted by IP address, that rule applies to the specified IP in each network in which it is
found. For more information, see Networks.
2. In the left navigation plane and the Explore section, click Findings.
The Findings page appears with the Vulnerabilities tab active and your findings shown in a
table view.
4. In the row for the finding to create a rule for, click the button.
5. Click Recast.
- 692 -
The Add Rule plane appears.
Note: If the plugin ID corresponds to a Tenable Nessus plugin, the Original Severity indicator
changes to match the default severity of the vulnerability.
b. New Severity – Select the desired severity level for the vulnerability.
c. Targets – Select All to target all assets or Custom to specify targets that you want the
rule to run against.
Note: If you set the Targets drop-down to All, a warning appears indicating that this option
may override existing rules.
d. Target Hosts – Type one or more custom targets for the rule, if necessary. You can type
a comma-separated list that includes any combination of IP addresses, IP ranges, CIDR,
and hostnames.
Caution: You can only specify 1000 comma-separated custom entries. If you want to target a
larger number of custom entries, create multiple rules.
f. (Optional) Comments – Type a description of the rule. This option is only visible when the
rule is modified.
7. Click Save.
Tenable Vulnerability Management starts applying the rule to existing findings. This process
may take some time, depending on the system load and the number of matching findings.
Tenable Vulnerability Management updates your dashboards, where a label appears to indicate
how many instances of affected findings were recast.
Note: A recast rule does not affect the historical results of a scan.
- 693 -
To create an Accept rule from the Findings workbench:
2. In the left navigation plane and the Explore section, click Findings.
The Findings page appears with the Vulnerabilities tab active and your findings shown in a
table view.
4. In the row for the finding to create a rule for, click the button.
5. Click Recast.
6. On the Add Recast Rule plane, in the Action section, click Accept.
Note: If the plugin ID corresponds to a Tenable Nessus plugin, the Original Severity indicator
changes to match the default severity of the vulnerability.
b. Targets – Select All to target all assets or Custom to specify targets that you want the
rule to run against.
c. Target Hosts – Type one or more custom targets for the rule, if necessary. You can type
a comma-separated list that includes any combination of IP addresses, IP ranges, CIDR,
and hostnames.
Caution: You can only specify 1000 comma-separated custom entries. If you want to target a
larger number of custom entries, create multiple rules.
- 694 -
d. (Optional) Expires – Select when you want the rule to expire.
e. (Optional) Comments – Type a description of the rule. This option is only visible when the
rule is modified.
9. Click Save.
Tenable Vulnerability Management starts applying the rule to existing findings. This process
may take some time, depending on the system load and the number of matching findings.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
In Tenable Vulnerability Management, on the Findings workbench, you can generate a report to PDF
from a template. You can schedule this report and email it.
Note: You cannot generate a report for more than 10,000 findings. When you select more than that number
of findings and generate a report, an error appears.
Note: You can only generate reports for vulnerabilities findings, not other finding types.
To generate a report:
- 695 -
Note: You can apply a maximum of 5 filters to a report.
4. Select the check box or check boxes next to the findings to report on.
Tip: Select the check box at the top of the list to select all findings.
Option Description
Templates Select a template for the report. Choose from the following templates:
a. In the Start Date and Time section, choose the date and time
when the report will run.
d. In the Repeat Ends drop-down, choose the date when the report
will stop running.
- 696 -
Add (Optional) Type the emails where you want Tenable Vulnerability
Recipients Management to send the finished report.
Password (Optional) Enable this toggle to password-protect your report with AES
Protection 128-bit encryption. In the Encryption Password field, type a password
to provide to the recipients.
A confirmation message appears and Tenable Vulnerability Management starts to build the
report. Click the link in the message to view the report. Or, go to the Act > Reports > Report
Results page.
Assets
On the Assets workbench, you can get insight into your organization's assets. These include host
assets, cloud resources, web applications, and domain inventory.
Assets are entities of value on a network that can be exploited. They include laptops, desktops,
servers, routers, mobile phones, virtual machines, software containers, and cloud instances. By
- 697 -
providing comprehensive information about your assets, Tenable Vulnerability Management helps to
eliminate potential security risks, identify under-utilized resources, and support compliance efforts.
Tenable Vulnerability Management automatically creates or updates assets when a scan completes
or scan results are imported. Tenable Vulnerability Management attempts to match incoming scan
data to existing assets through a complex algorithm which looks at host attributes and employs
heuristics to choose the best possible match. If Tenable Vulnerability Management cannot find a
match, it assumes this is the first time it has encountered the asset and creates a new record. If
Tenable Vulnerability Management finds a matching asset, it updates any newly changed properties.
l DNS names
l NetBIOS names
l Operating System(s)
l Installed software
- 698 -
3. (Optional) Do one of the following:
l Host Assets
l Cloud Resources
l Web Applications
l Domain Inventory
l In the Search box, search by Agent Name, NetBios Name, DNS (FQDN), or IP Address.
Use (*) as a wildcard.
l Filter the displayed assets and customize your view, as described in Filter Findings or
Assets.
Tip: To view definitions for all Asset filters, see Asset Filters.
l Save filters as a custom search, as described in Saved Filters for Findings or Assets.
l Filter the displayed assets by time period with a drop-down in the upper-right corner.
l View visualizations for the displayed assets, as described in View Asset Visualizations.
Host Assets
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
On the Assets workbench, to view only your host assets, select the Hosts tile and deselect other
tiles. Common host assets include workstations, servers, virtual machines, printers, network
switches, routers, and wireless access points.
The Hosts tile contains a table with the following columns. To show or hide columns, see Customize
Explore Tables.
Column Description
- 699 -
Asset ID The UUID of the asset. This value is unique to Tenable Vulnerability
Management.
Operating System The operating system that a scan identified as installed on the asset.
First Seen The date and time when a scan first identified the asset.
Last Seen The date when a scan last found the vulnerability on an asset.
Last Licensed The date and time of the last scan in which the asset was considered
Scan "licensed" and counted towards Tenable's license limit. A licensed scan
uses non-discovery plugins and can identify vulnerabilities.
Unauthenticated scans that run non-discovery plugins update the Last
Licensed Scan field, but not the Last Authenticated Scan field. For more
information on licensed assets, see Tenable Vulnerability Management
Licenses.
Last The date and time of the last authenticated scan run against the asset.
Authenticated An authenticated scan that only uses discovery plugins updates the Last
Scan Authenticated Scan field, but not the Last Licensed Scan field.
- 700 -
NetBIOS Name The asset's NetBIOS name.
DNS (FQDN) The fully qualified domain name of the asset host.
Note: When processing fully qualified domain names (FQDNs) for host assets,
Tenable Vulnerability Management normalizes all FQDNs to lowercase and
then merges any duplicates.
MAC Address A MAC address that a scan has associated with the asset record.
ServiceNow Sys Where applicable, the unique record identifier of the asset in
ID ServiceNow. For more information, see the ServiceNow documentation.
Agent Name The name of the Tenable Nessus agent that scanned and identified the
asset.
Created Date The date and time when Tenable Vulnerability Management created the
asset record.
Updated Date The date and time when Tenable Vulnerability Management last updated
the asset record.
Has Plugin Specifies whether the asset has plugin results associated with it.
Results
Note: A public asset is within the public IP space and identified by the is_
public attribute in the Tenable Vulnerability Management query namespace.
AWS Availability Where applicable, the AWS availability zone of the asset, as described in
Zone the Tenable Vulnerability Management AWS documentation.
AWS EC2 AMI ID Where applicable, the AWS EC2 AMI ID of the asset, as described in the
Tenable Vulnerability Management AWS documentation.
AWS EC2 Where applicable, the AWS EC2 instance ID of the asset, as described in
Instance ID the Tenable Vulnerability Management AWS documentation.
AWS Security Where applicable, the AWS security group of the asset, as described in
Group the Tenable Vulnerability Management AWS documentation.
- 701 -
AWS Instance Where applicable, the AWS instance state of the asset, as described in
State the Tenable Vulnerability Management AWS documentation.
AWS Instance Where applicable, the AWS instance type of the asset, as described in the
Type Tenable Vulnerability Management AWS documentation.
AWS EC2 Name Where applicable, the AWS EC2 name of the asset, as described in the
Tenable Vulnerability Management AWS documentation.
AWS EC2 Product Where applicable, the AWS EC2 product code of the asset, as described
Code in the Tenable Vulnerability Management AWS documentation.
AWS Owner ID Where applicable, the AWS owner ID of the asset, as described in the
Tenable Vulnerability Management AWS documentation.
AWS Region Where applicable, the AWS region of the asset, as described in the
Tenable Vulnerability Management AWS documentation.
AWS Subnet ID Where applicable, the AWS subnet ID of the asset, as described in the
Tenable Vulnerability Management AWS documentation.
AWS VPC ID Where applicable, the AWS VPC ID of the asset, as described in the
Tenable Vulnerability Management AWS documentation.
Azure Resource Where applicable, the AWS resource ID of the asset, as described in the
ID Tenable Vulnerability Management AWS documentation.
Google Cloud Where applicable, the Google cloud instance ID of the asset, as described
Instance ID in the Tenable Vulnerability Management Google Cloud Platform
documentation.
Google Cloud Where applicable, the Google cloud project ID of the asset, as described
Project ID in the Tenable Vulnerability Management Google Cloud Platform
documentation.
Google Cloud Where applicable, the Google cloud zone of the asset, as described in the
Zone Tenable Vulnerability Management Google Cloud Platform
- 702 -
documentation.
Resource Tags Specifies the tags or labels that have been imported from the cloud
provider. This field appears for assets with source as Cloud Discovery
Connector.
Note: Tenable Vulnerability Management imports tags and labels with the
following considerations:
Cloud Provider Indicates whether the asset is from AWS, Azure, or GCP.
Actions In this column, click the button to view a drop-down where you can:
l Add Tags — Add new tags. In the dialog that appears, choose a
Category and Value, as described in Tags.
l View All Details in New Tab — View complete details for an asset in
a new browser tab.
- 703 -
vulnerabilities, as described in Solutions.
Cloud Resources
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
On the Assets workbench, to view only your cloud resources, select the Cloud Resources tile and
deselect other tiles. A cloud resource can be any compute instance, storage object, networking
device, or object you can create or configure within a cloud platform. Examples of cloud resources
include assets such as virtual servers, buckets, databases, disks, and containers. Other examples of
cloud resources are configurable items such as resource groups, policies, users, and roles.
The Cloud Resources tile contains a table with the following columns. To show or hide columns, see
Customize Explore Tables.
Column Description
Asset ID The UUID of the asset where a scan detected the finding. This value is unique
to Tenable Vulnerability Management.
Name Indicates the asset identifier, assigned based on the availability of specific
attributes in logical order.
Resource The name of the cloud resource type (for example, a resource group or virtual
Type machine).
Resource The name of the category to which your cloud resource type belongs (for
Category example, object storage or virtual network).
Resource Tags synced from a cloud source such as Amazon Web Services (AWS). Only
Tags the first tag is shown. Hover on the displayed tag to view a complete list.
Cloud The name of the cloud provider that hosts the asset.
Provider
- 704 -
Licensed Indicates if the asset is licensed within Tenable Vulnerability Management. For
more information, see Tenable Vulnerability Management Licenses.
First Seen The date and time when a scan first identified the asset.
Last Seen The date when a scan last found the vulnerability on an asset.
Created Date The date and time when Tenable Vulnerability Management created the asset
record.
Updated The date and time when Tenable Vulnerability Management last updated the
Date asset record.
Actions In this column, click the button to view a drop-down where you can:
l Add Tags — Add new tags. In the dialog that appears, choose a Category
and Value, as described in Tags.
l Remove Tags — Remove existing tags. In the dialog that appears, click a
tag and click Remove.
Web Applications
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
On the Assets workbench, to view only your web application assets, select the Web Applications
tile and deselect other tiles. A web application is software that runs in a browser. Examples of web
applications are: workplace collaboration apps, ecommerce apps, email apps, and banking apps.
The Web Applications tile contains a table with the following columns. To show or hide columns,
see Customize Explore Tables.
Column Description
- 705 -
Asset ID The UUID of the asset where a scan detected the finding. This value is
unique to Tenable Vulnerability Management.
SSL/TLS Specifies whether the application on which the asset is hosted uses
SSL/TLS public-key encryption.
First Seen The date and time when a scan first identified the asset.
Last Seen The date when a scan last found the vulnerability on an asset.
Last Licensed The date and time of the last scan in which the asset was considered
Scan "licensed" and counted towards Tenable's license limit. A licensed scan
uses non-discovery plugins and can identify vulnerabilities.
Unauthenticated scans that run non-discovery plugins update the Last
Licensed Scan field, but not the Last Authenticated Scan field. For more
information on licensed assets, see Tenable Vulnerability Management
Licenses.
Last The date and time of the last authenticated scan run against the asset.
Authenticated An authenticated scan that only uses discovery plugins updates the Last
Scan Authenticated Scan field, but not the Last Licensed Scan field.
Note: A public asset is within the public IP space and identified by the is_
public attribute in the Tenable Vulnerability Management query namespace.
- 706 -
Source The source of the scan that identified the asset.
Created Date The date and time when Tenable Vulnerability Management created the
asset record.
Updated Date The date and time when Tenable Vulnerability Management last updated
the asset record.
Actions In this column, click the button to view a drop-down where you can:
l Add Tags — Add new tags. In the dialog that appears, choose a
Category and Value, as described in Tags.
Domain Inventory
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
On the Assets workbench, to view only your domain inventory assets, select the Domain Inventory
tile and deselect other tiles. A domain inventory is a complete account of every domain owned by
your organization. Domains are associated with a wide range of assets: databases, applications,
directory services, and identity or access management platforms.
The Domain Inventory tile contains a table with the following columns. To show or hide columns,
see Customize Explore Tables.
Column Description
- 707 -
Asset ID The UUID of the asset where a scan detected the finding. This value is unique
to Tenable Vulnerability Management.
Name Indicates the asset identifier, assigned based on the availability of specific
attributes in logical order.
DNS (FQDN) The fully qualified domain name of the asset host.
(ASM)
Licensed Indicates if the asset is licensed within Tenable Vulnerability Management. For
more information, see Tenable Vulnerability Management Licenses.
First Seen The date and time when a scan first identified the asset.
Last Seen The date when a scan last found the vulnerability on an asset.
- 708 -
Created The date and time when Tenable Vulnerability Management created the asset
Date record.
Updated The date and time when Tenable Vulnerability Management last updated the
Date asset record.
Actions In this column, click the button to view a drop-down where you can:
l Add Tags — Add new tags. In the dialog that appears, choose a Category
and Value, as described in Tags.
l Remove Tags — Remove existing tags. In the dialog that appears, click a
tag and click Remove.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Required Tenable Vulnerability Management Permission: Can View permission for applicable assets.
From the Assets workbench, you can drill down into a single asset to view it on the Asset Details
page. Tenable Vulnerability Management customizes this page by asset type.
Note: Domain Inventory assets do not have an Asset Details page, but you can view them in a preview, as
described in Domain Inventory Preview.
- 709 -
1. In the upper-left corner, click the button.
The assets for that tile appear. Each asset type has different default columns.
4. Filter the displayed assets and customize your view, as described in Filter Findings or Assets.
The Asset Details page appears. Its layout varies by asset type as follows:
- 710 -
The Asset Details page for host assets contains the following sections.
Note: Tenable Vulnerability Management hides empty sections, so these may not appear in some cases.
Section Description
Header The asset header; based on the presence of certain attributes in the
following logical order:
1. Agent name
2. NetBIOS name
3. Local hostname
5. IPv4 address
6. IPv6 address
- 711 -
Information l Asset ID — The UUID of the asset.
l Agent Name — The name of the Tenable Nessus Agent that scanned
and identified the asset.
l DNS (FQDN) — The fully qualified domain name of the asset host.
- 712 -
information, see the Tenable Developer Portal.
Findings Click the Findings tab to view all findings associated with the asset:
l Click the Show All Vulnerabilities toggle to hide Fixed and Accepted
vulnerabilities or host audits.
l In a finding row, click to show a menu where you can view findings
details, export a finding, or launch a remediation scan.
Open Ports Click the Open Ports tab to view open ports on the asset:
l First Detected Open – The date and time the port was first detected
as open.
l Last Detected Open – The date and time the port was last detected as
open.
l Service – The service running on the open port, such as HTTPS, SSH,
or FTP. To learn more about possible services, see Service Name and
Transport Protocol on the Internet Assigned Numbers Authority
website.
Activity Click the Activity tab to view activity for the asset:
- 713 -
Mitigations Click the Mitigations tab to view information about any mitigation software
that a scan identified on the asset.
Asset (Requires Tenable Lumin license) An icon indicating the Asset Exposure
Exposure Score (AES) calculated for the asset.
Score
Asset (Requires Tenable Lumin license) An icon indicating the asset's Asset
Criticality Criticality Rating.
Rating
l AWS EC2 Product Code — The AWS EC2 product code of the asset.
- 714 -
l Google Cloud Project ID —The Google cloud project ID of the asset.
Tags Tags applied to the asset. To add a tag, click the button. To remove a
tag, click the button on the tag label. For more information, see Tags.
l Last Seen — The date and time of the scan that most recently
identified the asset.
l Last Licensed Scan — The date and time of the last scan in which the
asset was considered "licensed" and counted towards Tenable's
license limit. A licensed scan uses non-discovery plugins and can
identify vulnerabilities. Unauthenticated scans that run non-discovery
plugins update the Last Licensed Scan field, but not the Last
Authenticated Scan field. For more information on licensed assets,
see Tenable Vulnerability Management Licenses.
Actions In the upper-right corner, click the Actions button to view a drop-down
where you can:
l Add Tags — Add new tags. In the dialog that appears, choose a
Category and Value, as described in Tags.
l Remove Tags — Remove existing tags. In the dialog that appears, click
a tag and click Remove.
- 715 -
l Edit ACR – (Tenable Lumin-only). Edit the Asset Criticality Rating, as
described in Edit the ACR for Host Assets.
The Asset Details page for cloud resources contains the following sections.
Note: Tenable Vulnerability Management hides empty sections, so these may not appear in some cases.
Section Description
Header The asset header; based on the presence of certain attributes in the
following logical order:
1. Agent name
- 716 -
2. NetBIOS name
3. Local hostname
5. IPv4 address
6. IPv6 address
l Cloud Provider — The name of the cloud provider that hosts the asset.
l VPC — Virtual Private Cloud; the unique identifier of the public cloud
that hosts the AWS virtual machine instance.
l Resource Tag - The labels associated with the resource by the cloud
provider.
- 717 -
the Infrastructure as Code (IaC) cloud resource asset.
l Has Drift — Indicates whether the asset has any drifts. For more
information, see Set up Drift Analysis in the Legacy Tenable Cloud
Security User Guide.
l Network — The name of the network to which the scanner that scans
the asset belongs. For more information, see Networks.
l Availability Zone — The name of the availability zone where the virtual
machine instance is hosted.
Findings A table that lists all the findings associated with the resource. Click Open in
Findings to view the Vulnerabilities page.
Asset (Requires Tenable Lumin license) An icon indicating the Asset Exposure
Exposure Score calculated for the asset.
Score
Asset (Requires Tenable Lumin license) An icon indicating the asset's Asset
Criticality Criticality Rating.
Rating
Tags Tags applied to the asset. To add a tag, click the button. To remove a
tag, click the button on the tag label. For more information, see Tags.
Asset Scan l First Seen — The time and date when a scan first identified the asset.
Information l Last Seen — The date and time of the scan that most recently
identified the asset.
l Last Licensed Scan — The date and time of the last scan in which the
asset was considered "licensed" and counted towards Tenable's
- 718 -
license limit. A licensed scan uses non-discovery plugins and can
identify vulnerabilities. Unauthenticated scans that run non-discovery
plugins update the Last Licensed Scan field, but not the Last
Authenticated Scan field. For more information on licensed assets,
see Tenable Vulnerability Management Licenses.
Actions In the upper-right corner, click the Actions button to view a drop-down
where you can:
l Add Tags — Add new tags. In the dialog that appears, choose a
Category and Value, as described in Tags.
l Remove Tags — Remove existing tags. In the dialog that appears, click
a tag and click Remove.
l View All Details in New Tab — View complete details for an asset in a
new browser tab.
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
When you View Asset Details, the Asset Details page varies by asset type. For web application
assets, it includes asset information, a list of associated findings, the AES, and the ACR.
- 719 -
The Asset Details page for web application assets contains the following sections.
Note: Tenable Vulnerability Management hides empty sections, so these may not appear in some cases.
Section Description
Header The asset header; based on the presence of certain attributes in the
following logical order:
1. Agent name
2. NetBIOS name
3. Local hostname
5. IPv4 address
6. IPv6 address
- 720 -
more information, see Tenable Plugins.
l IPv4 Address — The first IPv4 address for the asset. If there is no IPv4
address, then the first IPv6 for the asset.
l MAC Address — The static Media Access Control (MAC) address for the
asset.
Findings A table that lists all the findings associated with the asset. In this section,
you can perform the following actions:
l Click Open in Findings to view the Vulnerabilities page for the asset.
Asset (Requires Tenable Lumin license) An icon indicating the Asset Exposure
Exposure Score for the asset.
Score
- 721 -
Asset (Requires Tenable Lumin license) An icon indicating the asset's Asset
Criticality Criticality Rating.
Rating
Tags Tags applied to the asset. To add a tag, click the button. To remove a
tag, click the button on the tag label. For more information, see Tags.
l Last Seen — The date and time at which the asset was last observed
as part of a scan.
Actions In the upper-right corner, click the Actions button to view a drop-down
where you can:
l Add Tags — Add new tags. In the dialog that appears, choose a
Category and Value, as described in Tags.
l Remove Tags — Remove existing tags. In the dialog that appears, click
a tag and click Remove.
l View All Details in New Tab — View complete details for an asset in a
new browser tab.
- 722 -
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
On the Assets workbench, click a domain inventory asset to preview its details.
Section Description
Header The asset header; based on the presence of certain attributes in the
following logical order:
1. Agent name
2. NetBIOS name
3. Local hostname
5. IPv4 address
6. IPv6 address
Tags Tags applied to the asset. To add a tag, click the button. To remove a
tag, click the button on the tag label. For more information, see Tags.
l Last Seen — The date and time at which the asset was last observed
as part of a scan.
l Updated Date — The date and time when the asset record was last
- 723 -
updated.
Related Assets Links to filtered lists of assets, showing the other times Tenable
Vulnerability Management scans identified the asset.
Asset Filters
Note: This topic describes filters available for assets within the Explore section. To view filters available
for assets in legacy workbenches, see Asset Filters.
On the Assets page, you can filter your assets via standard filters that apply to all assets or by
asset-specific filters.
You can save a set of commonly used filters as a saved filter to access later or share with other
members of your team.
Note: To optimize performance, Tenable limits the number of filters that you can apply to any Explore >
Assets views (including Group By tables) to 35.
Note: You can right-click on values within a table cell to use the Filter By option. For more information,
see Right-Click Filtering.
All
The following table describes the filters that apply to all assets:
Filter Description
Account ID The unique identifier assigned to the asset resource in the cloud service
that hosts the asset.
ACR Severity (Requires Tenable Lumin license) The ACR category of the ACR calculated
for the asset.
- 724 -
AES (Requires Tenable Lumin license)The Asset Exposure Score (AES)
calculated for the asset.
AES Severity (Requires Tenable Lumin license) The AES category of the AES calculated
for the asset.
Agent Name The name of the Tenable Nessus agent that scanned and identified the
asset.
Assessed vs. Specifies whether Tenable Vulnerability Management scanned the asset
Discovered for vulnerabilities or if Tenable Vulnerability Management only discovered
the asset via a discovery scan. Possible values are:
l Assessed
l Discovered Only
AWS Availability The name of the Availability Zone where AWS hosts the virtual machine
Zone instance. For more information, see Regions and Availability Zones in the
AWS documentation.
AWS EC2 AMI ID The unique identifier of the Linux AMI image in Amazon Elastic Compute
Cloud (Amazon EC2). For more information, see the Amazon Elastic
Compute Cloud Documentation.
AWS EC2 The unique identifier of the Linux instance in Amazon EC2. For more
Instance ID information, see the Amazon Elastic Compute Cloud Documentation.
AWS EC2 Name The name of the virtual machine instance in Amazon EC2.
AWS EC2 Product The product code associated with the AMI used to launch the virtual
Code machine instance in Amazon EC2.
- 725 -
AWS Instance The state of the virtual machine instance in AWS at the time of the scan.
State For possible values, see API Instance State in the Amazon Elastic
Compute Cloud Documentation.
AWS Instance The type of virtual machine instance in Amazon EC2. Amazon EC2
Type instance types dictate the specifications of the instance (for example,
how much RAM it has). For a list of possible values, see Amazon EC2
Instance Types in the AWS documentation.
AWS Owner ID A UUID for the Amazon AWS account that created the virtual machine
instance. For more information, see AWS Account Identifiers in the AWS
documentation.
This attribute contains a value for Amazon EC2 instances only. For other
asset types, this attribute is empty.
AWS Region The region where AWS hosts the virtual machine instance, for example,
us-east-1. For more information, see Regions and Availability Zones in
the AWS documentation.
AWS Security The AWS security group (SG) associated with the Amazon EC2 instance.
Group
AWS Subnet ID The unique identifier of the AWS subnet where the virtual machine
instance was running at the time of the scan.
AWS VPC ID The unique identifier of the public cloud that hosts the AWS virtual
machine instance. For more information, see the Amazon Virtual Private
Cloud User Guide.
Azure Location The location of the resource in the Azure Resource Manager. For more
information, see the Azure Resource Manager Documentation.
Azure Resource The name of the resource group in the Azure Resource Manager. For
Group more information, see the Azure Resource Manager Documentation.
Azure Resource The unique identifier of the resource in the Azure Resource Manager. For
ID more information, see the Azure Resource Manager Documentation.
- 726 -
Azure Resource The resource type of the resource in the Azure Resource Manager. For
Type more information, see the Azure Resource Manager Documentation.
Azure The unique subscription identifier of the resource in the Azure Resource
Subscription ID Manager. For more information, see the Azure Resource Manager
Documentation.
Azure VM ID The unique identifier of the Microsoft Azure virtual machine instance. For
more information, see Accessing and Using Azure VM Unique ID in the
Microsoft Azure documentation.
Cloud Provider The name of the cloud provider that hosts the asset.
Created Date The date and time when Tenable Vulnerability Management created the
asset record.
Custom Attribute A filter that searches for custom attributes via a category-value pair. For
more information about custom attributes, see the Tenable Developer
Portal.
DNS The fully-qualified domain name of the host that the vulnerability was
detected on.
First Seen The date and time when a scan first identified the asset.
Google Cloud The unique identifier of the virtual machine instance in Google Cloud
Instance Platform (GCP).
Google Cloud The customized name of the project to which the virtual machine
Project ID instance belongs in GCP. For more information, see Creating and
Managing Projects in the GCP documentation.
Google Cloud The zone where the virtual machine instance runs in GCP. For more
Zone information, see Regions and Zones in the GCP documentation.
Has Plugin Specifies whether the asset has plugin results associated with it.
- 727 -
Results
Host Name The host name for assets found during attack surface management
(Domain scans; only for use with Domain Inventory assets.
Inventory)
IaC Resource The Infrastructure as Code (IAC) resource type of the asset.
Type
IPV4 Address The IPv4 address associated with the asset record.
IPV6 Address The IPv6 address associated with the asset record.
Last Audited The time and date at which the asset was last audited.
Last The date and time of the last authenticated scan run against the asset.
Authenticated An authenticated scan that only uses discovery plugins updates the Last
- 728 -
Scan Authenticated Scan field, but not the Last Licensed Scan field.
Port Last Filter for all assets that had detected open ports as of a date or a date
Detected Open range you specify. For the best results, combine with the Ports filter.
Last Licensed The date and time of the last scan in which the asset was considered
Scan "licensed" and counted towards Tenable's license limit. A licensed scan
uses non-discovery plugins and can identify vulnerabilities.
Unauthenticated scans that run non-discovery plugins update the Last
Licensed Scan field, but not the Last Authenticated Scan field. For more
information on licensed assets, see Tenable Vulnerability Management
Licenses.
Last Scan Time The date when a scan was last run against the asset.
Last Seen The date and time at which the asset was last observed as part of a scan.
Licensed Specifies whether the asset is included in the asset count for the Tenable
Vulnerability Management instance.
MAC Address A MAC address that a scan has associated with the asset record.
Mitigated Specifies whether a scan has identified mitigation software on the asset.
Mitigation Last The date and time of the scan that last identified mitigation software on
Detection the asset.
Mitigation The name of the mitigation software identified on the asset. Tenable
Product Name Lumin defines mitigations as security agent software running on
endpoint assets, which include antivirus software, Endpoint Protection
Platforms (EPPs), or Endpoint Detection and Response (EDR) solutions.
Mitigation Vendor The name of the vendor for the mitigation that a scan identified on the
Name asset.
Mitigation The version of the mitigation that a scan identified on the asset.
Version
- 729 -
Note: This filter is selected by default.
Network The name of the network object associated with scanners that identified
the asset. The default name is Default. For more information, see
Networks.
Operating System The operating system that a scan identified as installed on the asset.
Operating System The Tenable Web App Scanning (Tenable Web App Scanning) operating
(WAS) system that a scan identified as installed on the asset.
Port Search your hosts or domain inventory by port values or ranges for assets
with a relationship to that port. For example, assets with port 80. If you
import data from Tenable Attack Surface Management, those ports also
appear.
Resource Type The asset's cloud resource type (for example, network, virtual machine).
Scan Frequency The number of times the asset was scanned within the past 90 days.
ServiceNow Sys Where applicable, the unique record identifier of the asset in
ID ServiceNow. For more information, see the ServiceNow documentation.
Source The source of the scan that identified the asset. Possible values are:
- 730 -
l AWS
l AWS FA
l Azure
l AZURE FA
l Cloud Connector
l Cloud IAC
l Cloud Runtime
l GCP
l Nessus Agent
l Nessus Scan
l NNM
l ServiceNow
l WAS
SSL/TLS Specifies whether the application on which the asset is hosted uses
SSL/TLS public-key encryption.
System Type The system types as reported by Plugin ID 54615. For more information,
see Tenable Plugins.
Tags A unique filter that searches tag (category: value) pairs. When you type a
tag value, you must use the category: value syntax, including the space
after the colon (:). You can use commas (,) to separate values. If there is a
comma in the tag name, insert a backslash (\) before the comma. You can
add a maximum of 100 tags.
- 731 -
Note: If your tag name includes double quotation marks (" "), you must use the
UUID instead.
Target Groups The target group to which the asset belongs. This attribute is empty if
the asset does not belong to a target group. For more information, see
Target Groups.
Type The system type on which the asset is managed. Possible options are:
l Cloud Resource
l Container
l Host
l Cloud
Host Assets
The following table describes the Host asset filters:
Filter Description
ACR Severity (Requires Tenable Lumin license) The ACR category of the ACR
calculated for the asset.
AES Severity (Requires Tenable Lumin license) The AES category of the AES
calculated for the asset.
- 732 -
Agent Name The name of the Tenable Nessus agent that scanned and identified the
asset.
AWS Availability The name of the Availability Zone where AWS hosts the virtual machine
Zone instance. For more information, see Regions and Availability Zones in
the AWS documentation.
AWS EC2 AMI ID The unique identifier of the Linux AMI image in Amazon Elastic
Compute Cloud (Amazon EC2). For more information, see the Amazon
Elastic Compute Cloud Documentation.
AWS EC2 Instance The unique identifier of the Linux instance in Amazon EC2. For more
ID information, see the Amazon Elastic Compute Cloud Documentation.
AWS EC2 Name The name of the virtual machine instance in Amazon EC2.
AWS EC2 Product The product code associated with the AMI used to launch the virtual
Code machine instance in Amazon EC2.
AWS Instance State The state of the virtual machine instance in AWS at the time of the
scan. For possible values, see API Instance State in the Amazon Elastic
Compute Cloud Documentation.
AWS Instance Type The type of virtual machine instance in Amazon EC2. Amazon EC2
instance types dictate the specifications of the instance (for example,
how much RAM it has). For a list of possible values, see Amazon EC2
Instance Types in the AWS documentation.
AWS Owner ID A UUID for the Amazon AWS account that created the virtual machine
instance. For more information, see AWS Account Identifiers in the
AWS documentation.
This attribute contains a value for Amazon EC2 instances only. For
other asset types, this attribute is empty.
AWS Region The region where AWS hosts the virtual machine instance, for example,
us-east-1. For more information, see Regions and Availability Zones
- 733 -
in the AWS documentation.
AWS Security The AWS security group (SG) associated with the Amazon EC2 instance.
Group
AWS Subnet ID The unique identifier of the AWS subnet where the virtual machine
instance was running at the time of the scan.
AWS VPC ID The unique identifier of the public cloud that hosts the AWS virtual
machine instance. For more information, see the Amazon Virtual
Private Cloud User Guide.
Azure Location The location of the resource in the Azure Resource Manager. For more
information, see the Azure Resource Manager Documentation.
Azure Resource The name of the resource group in the Azure Resource Manager. For
Group more information, see the Azure Resource Manager Documentation.
Azure Resource ID The unique identifier of the resource in the Azure Resource Manager.
For more information, see the Azure Resource Manager
Documentation.
Azure Resource The resource type of the resource in the Azure Resource Manager. For
Type more information, see the Azure Resource Manager Documentation.
Azure Subscription The unique subscription identifier of the resource in the Azure
ID Resource Manager. For more information, see the Azure Resource
Manager Documentation.
Azure VM ID The unique identifier of the Microsoft Azure virtual machine instance.
For more information, see Accessing and Using Azure VM Unique ID in
the Microsoft Azure documentation.
Cloud Provider The cloud provider for the asset — AWS, Azure, or GCP.
Note: Filter with the Cloud Provider instead of Source to search for
resources with imported tags.
- 734 -
Created Date The date and time when Tenable Vulnerability Management created the
asset record.
Custom Attribute A filter that searches for custom attributes via a category-value pair.
For more information about custom attributes, see the Tenable
Developer Portal.
DNS The fully-qualified domain name of the host that the vulnerability was
detected on.
First Seen The date and time when a scan first identified the asset.
Google Cloud The unique identifier of the virtual machine instance in Google Cloud
Instance Platform (GCP).
Google Cloud The customized name of the project to which the virtual machine
Project ID instance belongs in GCP. For more information, see Creating and
Managing Projects in the GCP documentation.
Google Cloud Zone The zone where the virtual machine instance runs in GCP. For more
information, see Regions and Zones in the GCP documentation.
Has Plugin Results Specifies whether the asset has plugin results associated with it.
Installed Software A list of Common Platform Enumeration (CPE) values that represent
software applications a scan identified as present on an asset. This
field supports the CPE 2.2 format. For more information, see the
Component Syntax section of the CPE Specification documentation,
Version 2.2. For assets identified in Tenable scans, this field contains
data only if a scan using Tenable Nessus Plugin ID 45590 has evaluated
the asset.
- 735 -
activity is logged as a remove type of attribute change in the asset activity
log.
IPv4 Address The IPv4 address associated with the asset record.
IPv6 Address An IPv6 address that a scan has associated with the asset record.
Last Authenticated The date and time of the last credentialed scan run on the asset.
Scan
Last Licensed Scan The date and time of the last scan that identified the asset as licensed.
For more information about licensed assets, see Tenable Vulnerability
Management Licenses.
Last Seen The date and time at which the asset was last observed as part of a
scan.
- 736 -
Licensed Specifies whether the asset is included in the asset count for the
Tenable Vulnerability Management instance.
MAC Address A MAC address that a scan has associated with the asset record.
Mitigation Last The date and time of the scan that last identified mitigation software
Detection on the asset.
Mitigation Product The name of the mitigation software identified on the asset. Tenable
Name Lumin defines mitigations as security agent software running on
endpoint assets, which include antivirus software, Endpoint Protection
Platforms (EPPs), or Endpoint Detection and Response (EDR) solutions.
Mitigation Vendor The name of the vendor for the mitigation that a scan identified on the
Name asset.
Mitigation Version The version of the mitigation that a scan identified on the asset.
Network The name of the network object associated with scanners that
identified the asset. The default name is Default. For more information,
see Networks.
Operating System The operating system that a scan identified as installed on the asset.
- 737 -
Resource Tags (By The key in the key-value pair of the tags or labels imported from the
Key cloud provider.
Resource Tags (By The value in the key-value pair of the tags or labels imported from the
Value cloud provider.
Scan Frequency The number of times the asset was scanned within the past 90 days.
ServiceNow Sys ID Where applicable, the unique record identifier of the asset in
ServiceNow. For more information, see the ServiceNow
documentation.
Source The source of the scan that identified the asset. Possible values are:
l AWS
l AWS FA
l Azure
l Azure FA
Connector.
See the Cloud Provider column to view from where the asset is
imported from.
l Cloud IaC
- 738 -
l Cloud Runtime
l GCP
l Nessus Agent
l Nessus Scan
l NNM
l ServiceNow
l WAS
System Type The system types as reported by Plugin ID 54615. For more information,
see Tenable Plugins.
Tags A unique filter that searches tag (category: value) pairs. When you type
a tag value, you must use the category: value syntax, including the
space after the colon (:). You can use commas (,) to separate values. If
there is a comma in the tag name, insert a backslash (\) before the
comma. You can add a maximum of 100 tags.
Note: If your tag name includes double quotation marks (" "), you must use
the UUID instead.
Target Groups The target group to which the asset belongs. This attribute is empty if
the asset does not belong to a target group. For more information, see
Target Groups.
Updated Date The time and date when the asset record was last updated.
- 739 -
Cloud Resources Assets
The following table describes the cloud resources asset filters:
Option Description
Cloud Provider The name of the cloud provider that hosts the asset.
Created Date The time and date when Tenable Vulnerability Management created the
asset record.
First Seen The date and time when a scan first identified the asset.
IaC Resource The Infrastructure as Code (IAC) resource type of the asset.
Type
Last Audited The time and date when Tenable Vulnerability Management last audited the
asset.
Last Licensed The date and time of the last scan in which the asset was considered
Scan "licensed" and counted towards Tenable's license limit. A licensed scan
uses non-discovery plugins and can identify vulnerabilities.
Unauthenticated scans that run non-discovery plugins update the Last
Licensed Scan field, but not the Last Authenticated Scan field. For more
information on licensed assets, see Tenable Vulnerability Management
Licenses.
Last Seen The date and time at which the asset was last observed as part of a scan.
- 740 -
Licensed Specifies whether the asset is included in the asset count for the Tenable
Vulnerability Management instance.
Name Indicates the asset identifier, assigned based on the availability of specific
attributes in logical order.
Resource The category of the asset resource in the cloud service that hosts the
Category asset.
Resource Tags Tags synced from a cloud source such as Amazon Web Services (AWS),
(By Key) matched by the tag key (for example, Name). Separate individual search
items with commas and use wildcards (*) to locate keys that equal, begin
with, end with, or contain part of a string. Alternately, search for Assets
with or without tags.
Resource Tags Tags synced from a cloud source such as Amazon Web Services (AWS),
(By Value) matched by the tag value. Separate individual search items with commas
and use wildcards (*) to locate values that equal, begin with, end with, or
contain part of a string. Alternately, search for Assets with or without tags.
Resource Type The asset's cloud resource type (for example, network, virtual machine).
Source The source of the scan that identified the asset. Possible values are:
l Cloud IaC
l Cloud Runtime
Tags A unique filter that searches tag (category: value) pairs. When you type a
- 741 -
tag value, you must use the category: value syntax, including the space
after the colon (:). You can use commas (,) to separate values. If there is a
comma in the tag name, insert a backslash (\) before the comma. You can
add a maximum of 100 tags.
Note: If your tag name includes double quotation marks (" "), you must use the
UUID instead.
Filter Description
ACR Severity (Requires Tenable Lumin license) The ACR category of the ACR calculated
for the asset.
AES (Requires Tenable Lumin license) The AES category of the AES calculated
for the asset.
AES Severity (Requires Tenable Lumin license) The AES category of the AES calculated
for the asset.
Created Date The date and time when Tenable Vulnerability Management created the
asset record.
Custom Attribute A filter that searches for custom attributes via a category-value pair. For
more information about custom attributes, see the Tenable Developer
Portal.
First Seen The date and time when a scan first identified the asset.
- 742 -
Last The date and time of the last authenticated scan run against the asset.
Authenticated An authenticated scan that only uses discovery plugins updates the Last
Scan Authenticated Scan field, but not the Last Licensed Scan field.
Last Licensed The time and date of the last scan that identified the asset as licensed.
Scan For more information about licensed assets, see License Information.
Last Seen The date and time at which the asset was last observed as part of a scan.
Licensed Specifies whether the asset is included in the asset count for the Tenable
Web App Scanning instance.
l The scan results for the asset do not include discovery plugin
results.
l The scan results for the asset do not include Tenable Web App
Scanning sources (e.g., results from Tenable Nessus scanners,
Agents, Tenable Nessus Network Monitor).
Mitigated Specifies whether a scan has identified mitigation software on the asset.
Mitigation Last The date and time of the scan that last identified mitigation software on
Detected the asset.
Mitigation The name of the mitigation software identified on the asset. Tenable
Product Name Lumin defines mitigations as security agent software running on
endpoint assets, which include antivirus software, Endpoint Protection
Platforms (EPPs), or Endpoint Detection and Response (EDR) solutions.
Mitigation The version of the mitigation software that a scan identified on the asset.
Version
- 743 -
Note: This filter is selected by default.
Operating System The operating system that a scan identified as installed on the asset.
(WAS)
Note: A public asset is within the public IP space and identified by the is_
public attribute in the Tenable Vulnerability Management query namespace.
Source The source of the scan that identified the asset. Possible values are:
l ASM
l AWS
l AWS FA
l Azure
l Azure FA
l Cloud IAC
SSL/TLS Specifies whether the application on which the asset is hosted uses
SSL/TLS public-key encryption.
Tags A unique filter that searches tag (category: value) pairs. When you type a
tag value, you must use the category: value syntax, including the space
after the colon (:). You can use commas (,) to separate values. If there is a
comma in the tag name, insert a backslash (\) before the comma. You can
add a maximum of 100 tags.
Note: If your tag name includes double quotation marks (" "), you must use the
UUID instead.
- 744 -
Note: This filter is selected by default.
Updated Date The time and date when the asset record was last updated.
Filter Description
Created The date and time when Tenable Vulnerability Management created the asset
Date record.
DNS (FQDN) The fully-qualified domain name of the host that the vulnerability was detected
on.
Host Name The hostname of the asset. This string is determined by information reported
by target plugins, and is dependent on the user's environment and
configuration.
Note: Tenable Vulnerability Management does not support a CIDR mask of /0 for
this parameter, because that value would match all IP addresses. If you submit a /0
value for this parameter, Tenable Vulnerability Management returns a 400 Bad
Request error message.
- 745 -
Note: Ensure the filter value does not end in a period.
IPv6 An IPv6 address that a scan has associated with the asset record.
Address
This filter supports multiple asset identifiers as a comma-separated list. The
IPV6 address must be an exact match. (for example, 0:0:0:0:0:ffff:c0a8:0).
Last Seen The date and time at which the asset was last observed as part of a scan.
Licensed Specifies whether the asset is included in the asset count for the Tenable
Vulnerability Management instance.
Name Indicates the asset identifier, assigned based on the availability of specific
attributes in logical order.
Port A port associated with the asset, open or closed. Only applies to Domain
Inventory assets.
Source The source of the scan that identified the asset. Possible values are:
l ASM
l AWS
l AWS FA
l Azure
l Azure FA
l Cloud IAC
Tags A unique filter that searches tag (category: value) pairs. When you type a tag
- 746 -
value, you must use the category: value syntax, including the space after the
colon (:). You can use commas (,) to separate values. If there is a comma in the
tag name, insert a backslash (\) before the comma. You can add a maximum of
100 tags.
Note: If your tag name includes double quotation marks (" "), you must use the UUID
instead.
Updated The time and date when the asset record was last updated.
Date
Tip: For more information about open ports and the Tenable Vulnerability Management API, see the API
changelog in the Tenable Developer Portal. For more information, contact Tenable Customer Support.
Tenable Vulnerability Management displays open port findings on the Asset Details page, which
appears when you click a host asset on the Assets workbench and then click See All Details. On the
Asset Details page, the Open Ports tab shows open ports on an asset and includes the port
protocol, when the port was first and last detected open, and the service running on the port.
- 747 -
Working with Ports
Use the following features to search for, manage, and export your port data:
l Ports — On the Assets workbench, search for ports on your host assets (or your domain
inventory if you have imported data from Tenable Attack Surface Management.
l Port tag rule — On the Assets workbench, add tags to your ports.
l Port export field — With a custom field, export port data from the Assets workbench.
Supported Plugins
The Open Ports tab shows output from the following high-traffic plugins:
- 748 -
l 14272 - Netstat Portscanner (SSH)
l To view asset visualizations, on the right side of the Assets page, click Show Visualization.
l To hide asset visualizations, on the right side of the Assets page, click Hide Visualization.
Visualization Types
The following table describes the visualizations on the Assets page.
Widget Description
Assets by Groups assets by type and shows if they are or Live or Terminated. This metric
Live Status is particularly relevant for cloud assets.
Assets by Groups assets by type and shows if they are Discovered but not scanned,
Scan Scanned without authentication, or have received an Authenticated Scan.
- 749 -
Status
Assets by Groups assets by type and shows if they are Licensed or Un-Licensed. For more
License information on licensed assets, see Tenable Vulnerability Management Licenses.
Status
Export a Visualization
You can export a visualization to PDF, JPG, or PNG.
To export a visualization:
2. In the left navigation plane and the Explore section, click Assets.
4. In the top right corner of the visualization you want to export, click the button with three dots.
A menu appears.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
In the Explore section of Tenable Vulnerability Management, you can manually override the Asset
Criticality Rating (ACR) of Host assets to better reflect the unique infrastructure or needs of your
organization.
- 750 -
To edit an Explore asset's ACR:
3. In the Host assets table, in the Actions column, click the button in the row for the host asset
whose ACR you want to edit.
A menu appears.
- 751 -
5. On the Asset Criticality Rating slider, click the number of the score to which you want to
change the ACR.
6. In the Overwrite Reasoning section, select the check box next to the reason that best
matches why you want to edit the ACR.
7. (Optional) In the Notes section, type any additional notes you want to add.
8. Click Save.
- 752 -
Tenable Vulnerability Management may take up to 24 hours to apply the new ACR to the asset.
While the update processes, in the host assets table, the ACR may show as Processing.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
Tenable Vulnerability Management automatically assigns scanned assets to a network based on the
scanner's network ID. However, you may need to manually move assets to another network in some
scenarios. For example, you might have multiple assets with the same IP address which belong on
different subnets so they can be identified as separate entities.
You can move assets to another network from the Assets workbench. If you first need to create the
network to move assets to, see Create a Network.
Tip: You can also move assets to a network via the Settings section.
When you move assets, be sure to move the scanner as well as the asset. Otherwise, the scanner
will create the same asset again. For more information, see Add a Scanner to a Network.
Note: Move assets before you run scans on a new network. If you move assets to a network where scans
have already run, Tenable Vulnerability Management may create duplicate records that count against your
license.
Tip: On the Assets workbench, you can move host assets, cloud resources, or web applications to another
network. You cannot move domain inventory assets.
2. In the left navigation plane and the Explore section, click Assets.
The Assets workbench appears with the Hosts tile active and your assets shown in a table
view.
3. (Optional) Refine the table data. For more information, see Filter Findings or Assets.
- 753 -
4. Select the check boxes for the asset or assets you want to move.
A dialog appears.
6. In the dialog, under Choose a New Destination Network, select the network you want to move
the assets to.
7. Click Move.
The assets are moved to the destination network. Depending on the number of assets
selected, it may take some time for Tenable Vulnerability Management to complete the move.
Once an asset is deleted, Tenable Vulnerability Management immediately returns the license
to your available license count.
- 754 -
we never recommend scanning assets with uncredentialed and credentialed or agent scans.
Instead, pick one or the other.
While there are different use cases for each scan type, generally, Tenable recommends prioritizing
the types of scans you run in the following order:
3. Uncredentialed Scans
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Required Tenable Vulnerability Management Permission: Can Edit, Can Use permission for applicable
asset tags
When you open a support case related to a Tenable Vulnerability Management-managed asset, you
can download the asset's inventory data (a .zip file containing the asset's scan data) and attach it to
the support ticket.
l Explore > Assets > Asset Details > Actions drop-down menu
Note: The scan data included in the .zip file is only intended for support cases and may change without
notice.
Note: The Download Inventory Debug Data action is only available for assets that Tenable Vulnerability
Management scanned in the last 90 days and have one of the following source types: SSM, AZURE_FA, or
NESSUS_AGENT scans with enabled inventory collection plugins (hybrid agents).
- 755 -
To download asset scan data from the Explore > Assets page:
l In the assets table, right-click the row for the asset whose scan data you want to
download.
l In the assets table, in the Actions column, click the button in the row for the asset
who's scan data you want to download.
Delete Assets
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
On the Assets workbench, you can delete host assets, web application assets, or domain inventory
assets. When you delete an asset, Tenable Vulnerability Management removes it from the Assets
workbench, deletes all associated findings, and stops matching scan results to the asset. Within 24
hours, Tenable Vulnerability Management also removes the asset from your license count.
Note: On a network with Asset Age Out enabled, assets expire on a schedule. For more information, see
View or Edit a Network and Create a Network.
Caution: Deleting assets quickly removes decommissioned hosts or other irrelevant assets from your
license count and reports, but it is permanent! Be careful with this feature.
- 756 -
Caution: If you see deleted assets when using the Asset ID filter, these are temporary. Deleted assets do
not count against your license and have no associated findings. Deleted assets are labeled as Deleted.
To delete assets:
l
Delete a single asset with the button
A menu appears.
Tip: You can also delete single assets from the Asset Details page.
l
Delete multiple assets from the action bar
Tip: To delete all assets, click Select all. You can only delete 1,000 assets at a time.
- 757 -
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
The Findings and Assets workbenches use Explore tables to present your organization's data. You
can filter these tables to view specific assets or findings.
Use Filters
In Explore tables on the Findings and Assets workbenches, you can use filters to view specific
findings or assets.
Note: To optimize performance, Tenable limits the number of Findings filters that you can apply to 18 and
the number of Asset filters that you can apply to 35.
Tip: For a list of available filters, see Findings Filters or Asset Filters.
Note: When filtering findings to generate a Findings Report, you can apply a maximum of 5 filters to each
report.
- 758 -
d. Click outside the Select Filters box.
e. For each filter, choose the appropriate operator and option. For example, to return
vulnerabilities with Critical Severity, select an operator of is equal to and the Critical
option, as shown in the following image:
Search operators are contextual, depending on the filter you select. For a complete
reference, see the following table:
Operator Description
exists Filters for items for which the selected filter exists.
does not Filters for items for which the selected filter does not exist.
exist
is not equal Filters for items that do not include the filter value.
to
is greater Filters for items with a value greater than the specified filter value.
- 759 -
Operator Description
than If you want to include the value you specify in the filter, then use
the is greater than or equal to operator.
is greater
than or
equal to
is less than Filters for items with a value less than the specified filter value. If
you want to include the value you specify in the filter, then use the
is less than
is less than or equal to operator.
or equal to
within last Filters for items with a date within a number of hours, days,
months, or years before today. Type a number, then select a unit of
time.
after Filters for items with a date after the specified filter value.
before Filters for items with a date before the specified filter value.
older than Filters for items with a date more than a number of hours, days,
months, or years before today. Type a number, then select a unit of
time.
between Filters for items with a date between two specified dates.
contains Filters for items that contain the specified filter value.
does not Filters for items that do not contain the specified filter value.
contain
l Begin or end with – Filters for values that begin or end with
text you specify. For example, to find all values that begin
with "1", type 1*. To find all values that end in "1", type *1.
- 760 -
Operator Description
l Contains –Filters for values that contain text you specify. For
example, to find all values with a "1" between the first and last
characters, type *1*.
l To clear the values for a filter, hover on the right side of the filter and click Clear.
l To remove a filter, hover on the right side of the filter and click Remove.
l On the Findings workbench, to reset filters to the default set, at the top of the
filters plane, click Reset.
l On the Assets workbench, to remove all filters, at the top of the filters plane, click
Clear All.
g. Click Apply.
- 761 -
A drop-down appears.
c. In the drop-down, select the AND or OR conditions or type them in the box.
e. In the drop-down, select one of the following operators or type it in the box.
Note: If you want to filter on a value that starts with (') or ("), or includes (*) or (,), then you
must wrap the value in quotation marks (").
Operator Description
exists Filters for items for which the selected filter exists.
does not Filters for items for which the selected filter does not exist.
exist
is not equal Filters for items that do not include the filter value.
to
is greater Filters for items with a value greater than the specified filter value.
than If you want to include the value you specify in the filter, then use
the is greater than or equal to operator.
is greater
than or
equal to
is less than Filters for items with a value less than the specified filter value. If
you want to include the value you specify in the filter, then use the
is less than
is less than or equal to operator.
or equal to
within last Filters for items with a date within a number of hours, days,
months, or years before today. Type a number, then select a unit of
- 762 -
Operator Description
time.
after Filters for items with a date after the specified filter value.
before Filters for items with a date before the specified filter value.
older than Filters for items with a date more than a number of hours, days,
months, or years before today. Type a number, then select a unit of
time.
between Filters for items with a date between two specified dates.
contains Filters for items that contain the specified filter value.
does not Filters for items that do not contain the specified filter value.
contain
l Begin or end with – Filters for values that begin or end with
text you specify. For example, to find all values that begin
with "1", type 1*. To find all values that end in "1", type *1.
l Contains –Filters for values that contain text you specify. For
example, to find all values with a "1" between the first and last
characters, type *1*.
- 763 -
l To add multiple filters, press Space and then select another condition, operator,
filter, and value.
l To remove one filter, click the button on the right side of the filter.
l To remove all filters, on the right side of the text box, click the button.
h. Click Apply.
4. (Optional) Save the filters to access later or share with other team members.
Tip: Tenable Vulnerability Management runs Findings searches in the background so that you can
navigate away from the Findings page and return when a complex search is complete. You can also
Cancel a search. Finally, Tenable Vulnerability Management caches your most recent search for 30
minutes, notes the date and time in the top toolbar, and saves the state of the Findings page for
your next visit.
Option Description
View Open the details page for the finding or asset in a new browser tab.
All Details in
New Tab
Copy to Get any value from an Explore table. For example, when creating a tag, copy
Clipboard an operating system value from a field on the Assets workbench and paste it
into your tag.
Filter by Filter an Explore table by any value. For example, on the Findings workbench,
Value right-click on an IPv4 address and click this option to view all findings with
that IPv4 address.
- 764 -
Option Description
Filter Out Remove all entries with a certain value from an Explore table. For example, on
Value the Assets workbench, right click an operating system type to filter out all
assets with that operating system.
- 765 -
Action Description
Add or remove a In the Customize Columns dialog, select or clear the check
column box next to the column.
Find a column to add In the Customize Columns dialog, search for a column and
select its check box.
Reorder columns In the Customize Columns dialog, click and drag columns
from top to bottom.
Change column width In the Assets or Findings tables, hover on the separator
between column headings and drag left or right.
Reset column width to In the Customize Columns dialog, click Reset Column Width.
default
Reset all column In the Customize Columns dialog, click Reset to Defaults.
customizations to
default
- 766 -
l To export your organization's scanned assets, click Assets.
Note: On the Findings workbench, when using the Group By filter to group findings, you can only
export five findings at a time.
4. Select the check box or check boxes next to the findings or assets to export.
Note: You can manually select up to 200 findings or assets. Otherwise, you must select them all.
Tip: Select the check box at the top of the list to select all findings or assets.
Option Description
Note: If your export file contains a cell that starts with any of
the following characters (=, +, -, @), Tenable Vulnerability
Management adds a single quote (') at the beginning of the cell.
For more information, see the Knowledge Base.
- 767 -
Configurations Select the fields to include:
l Under Select Field Set, search for or select the fields to add
to your export.
a. In the Start Date and Time section, choose the date and time
for the export.
6. Click Export.
Depending on its size, the export file may take several minutes to process. When processing
completes, Tenable Vulnerability Management downloads the file to your computer.
Tip: If you close the Export plane before the download completes, you can access the export file in
Settings > Exports.
- 768 -
On the Findings or Assets workbenches, you can apply filters and then save the exact combination
of those filters for later. You can also share saved filters with your team.
Note: Saved filters are specific to a finding or asset type. For example, you cannot use a saved filter
created for Host Vulnerability findings on Host Audit findings.
Tip: For a list of available filters, see Findings Filters or Asset Filters.
2. To the left of the search bar, click the Saved Filters drop-down.
1. On the Findings or Assets workbenches, to the left of the search bar, click the Saved Filters
drop-down.
- 769 -
You can edit a filter. After you have made changes, you can update the existing filter or save your
changes as a new filter.
1. On the Findings or Assets workbenches, to the left of the search bar, click the Saved Filters
drop-down.
3. Add or remove filters. For more information, see Filter Findings or Assets.
Tip: To discard your changes, to the right of the filter name, click the button.
1. On the Findings or Assets workbenches, to the left of the search bar, click the Saved Filters
drop-down.
A drop-down appears.
- 770 -
Share a Saved Filter
You can share a saved filter with your team through a link.
Note: If your team has a different access level in Tenable Vulnerability Management, they cannot view the
same findings or assets. For more information, see Permissions.
1. On the Findings or Assets workbenches, to the left of the search bar, click the Saved Filters
drop-down.
A drop-down appears.
1. On the Findings or Assets workbenches, to the left of the search bar, click the Saved Filters
drop-down.
A drop-down appears.
3. Click Delete.
- 771 -
4. To confirm you want to delete the saved filter, click Delete again.
In Tenable Vulnerability Management's left navigation plane, two workbenches appear in the Explore
section:
l Findings workbench — Single location for vulnerabilities, cloud misconfigurations, host audits,
and web application findings
The following table compares the Explore workbenches with the legacy workbenches and links to
supporting documentation.
l View asset
visualizations
- 772 -
not supported l Open Ports and
the Assets
l Vulnerabilities tab
workbench
renamed to Findings
l Customize the
Findings workbench
by adding columns
l Findings
visualizations not
supported
- 773 -
assets CSV, or JSON CSV Assets
exports l For PDF, in the
menu on the right
side of each row on
the Findings
workbench, click
Generate Report.
Vulnerabilities
The following feature is only available in Tenable FedRAMP Moderate environments.
This page contains top-level widgets that provide a snapshot of the vulnerabilities on your assets
and a table that lists vulnerabilities that scans have identified in your network.
- 774 -
1. In the upper-left corner, click the button.
2. In the left navigation plane, in the Vulnerability Management section, click Vulnerabilities.
Widget Description
Unique Vulnerability by This widget summarizes vulnerabilities by New, Active, Fixed, and
State Resurfaced state.
The Vulnerabilities page provides insight into your organization's vulnerabilities and the assets
where scans found the vulnerabilities. The Vulnerabilities page shows vulnerabilities grouped by
plugin and by asset.
- 775 -
View Vulnerabilities by Plugin
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Note: By default, Tenable Vulnerability Management does not filter for informational level plugin IDs. For
more information, see the knowledge base article.
- 776 -
By default, this page displays the By Plugin tab. The tab contains the plugins table. The
plugins table lists plugins by decreasing severity.
l CVSS — The CVSSv2 or CVSSv3 score associated with the vulnerability. For
more information, see CVSS vs. VPR.
l Refine the data in the plugins table. For more information, see Tenable
Vulnerability Management Tables.
- 777 -
l Create, edit, or apply a saved search.
Note: If you apply a saved search in the By Plugins tab, Tenable Vulnerability
Management also applies the saved search to the By Assets tab.
By default, this page displays the By Plugin tab. The tab contains the plugins table. The
plugins table lists plugins by decreasing severity.
- 778 -
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
2. In the left navigation plane, in the Vulnerability Management section, click Vulnerabilities.
The By Asset tab appears. This tab contains the assets table.
- 779 -
l Refine the data in the assets table. For more information, see Tenable Vulnerability
Management Tables.
l View the number of assets in the table, next to the Search box.
l Delete an asset.
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
2. In the left navigation plane, in the Web App Scanning section, click Vulnerabilities.
- 780 -
3. Click the By Application tab.
The By Application tab appears. This tab contains the applications table.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
- 781 -
To view vulnerability details:
2. In the left navigation plane, in the Vulnerability Management section, click Vulnerabilities.
By default, this page displays the By Plugin tab. The tab contains the plugins table. The
plugins table lists plugins by decreasing severity.
3. (Optional) Refine the plugins listed in the table. For more information, see Tenable
Vulnerability Management Tables.
4. In the plugins table, click the plugin where you want to view details.
- 782 -
The Vulnerability Details page appears.
Section Action
Right section
Plugin Details View information about the plugin that identified the vulnerability. Details
include:
l Publication Date — The date on which the plugin that identified the
vulnerability was published.
l Modification Date — The date on which the plugin was last modified.
Exploitability View information about the vulnerability when the Exploit Available filter is
Information applied. See Vulnerability Filters for more information.
- 783 -
discovered the vulnerability. Details include:
l First Seen — The date when a scan first found the vulnerability on an
asset.
l Last Seen — The date when a scan last found the vulnerability on an
asset.
l Age — The number of days since a scan first found the vulnerability
on an asset in your network.
VPR Key Drivers View details about the key drivers Tenable used to calculate a VPR for the
vulnerability. For more information about VPR key drivers, see CVSS vs.
VPR.
Risk Information View information about the risk that the vulnerability poses to your
network. Details include:
l Risk Factor — The CVSS-based risk factor associated with the plugin.
l CVSS Vector — The raw CVSSv2 metrics for the vulnerability. For
more information, see CVSSv2 documentation.
Vulnerability View information about the vulnerability that the plugin identified. Details
Information include:
l Vuln Published — The date when the vulnerability definition was first
published (for example, the date that the CVE was published).
- 784 -
l Patch Published — The date on which the vendor published a patch
for the vulnerability.
Upper-right corner
Date range Change the date range for data showing on the tabs.For more information,
selector see Tenable Vulnerability Management Tables.
Bottom section
Assets Affected View information about vulnerability instances on assets in your network.
Details include:
l Time Since First Seen widgets for the vulnerability instances in your
network.
- 785 -
such as "192.0.2.202" and "192.0.2.50."
l Copy output for the plugin that identified the vulnerability instance.
Output View more details about the plugin that identified the vulnerability. This
tab contains information about the vulnerability and a table listing
vulnerability instances on your network.
When you access the Vulnerability Details page, this tab is active by
default.
Note: Tenable Vulnerability Management shows only the first 500 vulnerability
instances in the table.
l Output — The text output of the Nessus scanner that identified the
vulnerability.
- 786 -
l Export vulnerability instance data.
You can create accept rules via the Settings page, or via the Vulnerability Details page.
2. In the Assets Affected table, select one or more check boxes next to the assets for which you
want to create an accept rule.
- 787 -
5. In the Action section, select Accept.
- 788 -
7. In the Targets section, confirm the target populated by Tenable Vulnerability Management.
For example:
Note: Tenable Vulnerability Management does not support bulk actions for recast or accept rules.
You must select each target individually to populate your list of targets.
l If you select only some of the assets on the Vulnerability Details page, Tenable
Vulnerability Management sets the target to Custom.
8. (Optional) In the Expires box, set an expiration date for the rule.
This action is only necessary if you want the rule to age out. By default, the rule applies
indefinitely.
9. (Optional) In the Comments box, type a description of the rule. The text you type in this box is
only visible if the rule is modified and has no functional effect.
b. In the Message to Tenable box, type a description of the false positive to send to
Tenable.
Tenable Vulnerability Management starts applying the rule to the appropriate vulnerabilities.
This process may take some time, depending on the system load and the number of matching
vulnerabilities. Tenable Vulnerability Management hides the affected vulnerability on your
dashboards.
Note: To view vulnerabilities hidden from your dashboards, use the Recast & Accept filter.
- 789 -
You can create recast rules via the Settings page, or via the Vulnerability Details page.
2. In the Assets Affected table, select the check boxes next to the assets for which you want to
create a recast rule.
- 790 -
5. In the Action section, select Recast.
7. From the New Severity drop-down box, select the severity level for the vulnerability.
- 791 -
8. In the Targets section, confirm the target populated by Tenable Vulnerability Management.
For example:
Note: Tenable Vulnerability Management does not support bulk actions for recast or accept rules.
You must select each target individually to populate your list of targets.
l If you select only some of the assets on the Vulnerability Details page, the target is set
to Custom, and Tenable Vulnerability Management populates the Target Hosts box with
the appropriate targets.
Tip: If you encounter an error with the targets listed in the Target Hosts box, check that the
target hosts match your existing assets. Tenable recommends using FQDN targets for extra
reliability.
9. (Optional) In the Expires box, set an expiration date for the rule.
This action is only necessary if you want the rule to age out. By default, the rule applies
indefinitely.
The text you type in this box is only visible if the rule is modified and has no functional effect.
Tenable Vulnerability Management starts applying the rule to the appropriate vulnerabilities.
This process may take some time, depending on the system load and the number of matching
vulnerabilities. Tenable Vulnerability Management updates your dashboards, where a label
appears to indicate how many affected vulnerabilities Tenable Vulnerability Management
recasted.
Note: A recast rule does not affect the historical results of a scan.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
- 792 -
Required Access Group Permissions: Can View
Note: Tenable Vulnerability Management limits output for an individual plugin to 1,024 KB (1 MB).
2. In the left navigation plane, in the Vulnerability Management section, click Vulnerabilities.
By default, this page displays the By Plugin tab. The tab contains the plugins table. The
plugins table lists plugins by decreasing severity.
3. (Optional) Refine the plugins listed in the table. For more information, see Tenable
Vulnerability Management Tables.
4. In the vulnerabilities table, click the vulnerability where you want to view details.
- 793 -
5. Click the Output tab.
Note: Tenable Vulnerability Management limits output for an individual plugin to 1,024 KB (1 MB).
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
- 794 -
Note: Tenable Vulnerability Management limits the output for an individual plugin to 1,024 KB (1 MB).
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Certain plugins include attachments that provide more details about specific vulnerabilities. For
example, Plugin ID 92365 collects the hosts file from a remote host. After a scan is complete, you
can view and save the attachment.
- 795 -
To view plugin attachments for Tenable Vulnerability Management scans:
1. View individual scan details for a scan that includes plugin attachments.
2. On the Vulns by Plugin tab, click a vulnerability row with a plugin that includes attachments.
4. In the output table, in the row for the plugin that includes attachments, click the button.
The attachment plane appears. This plane contains a table that lists available attachments.
2. In the left navigation plane, in the Web App Scanning section, click Scans.
- 796 -
Note: If your Tenable Web App Scanning license expires, your web application scans no longer
appear in the scans table.
3. In the scans table, click the scan that has a plugin attachment you want to view.
4. In the Vulns by Plugin tab, click the plugin you want to view.
Note: The Attachments tab appears only if the plugin instance includes an attachment.
- 797 -
The following feature is only available in Tenable FedRAMP Moderate environments.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
2. (Optional) Refine the table data. For more information, see Tenable Vulnerability Management
Tables.
All vulnerabilities on all In the upper-right corner of the page, click the Export
affected assets button.
- 798 -
each asset you want to export.
An individual vulnerability on To export from the By Plugin tab, click the button in
all affected assets an individual row of the plugins table.
- 799 -
the button.
- 800 -
multiple assets a. Click the By Asset tab.
l A brief description of the export scope you selected under the Export label. This
description specifies the number of vulnerabilities you selected for the export, whether
you added more filters to the data, and the number of affected assets you selected for
the export.
For example, All Vulns indicates that you selected all vulnerabilities on all affected
assets, and All Filtered Vulns for 5 Assets indicates that you selected all vulnerabilities
- 801 -
on multiple assets and also filtered the data.
Format Description
PDF -
Executive
Summary
HTML -
Executive
Summary
Tenable Nessus file. Tenable Nessus exports are the only file format that you can
Nessus import into Tenable Vulnerability Management.
If you chose this format, a list of export fields appears. You can select
which fields the export includes by selecting the check box next to any
field. To view only the selected fields, click View Selected. To view all
possible fields, click View All.
Note: Tenable Vulnerability Management supports tag filters in the CSV export format only.
Tenable Vulnerability Management begins processing the report. Depending on the size of the
exported data, Tenable Vulnerability Management may take several minutes to process the
report.
- 802 -
When processing completes, Tenable Vulnerability Management downloads the export file to
your computer. Depending on your browser settings, your browser may notify you that the
download is complete.
Each line in the .csv file is composed of the fields described in the following table. On the
Vulnerabilities page, you can export vulnerabilities as a .csv file.
Field Description
Asset UUID The UUID of the asset where a scan detected the vulnerability. This value is
unique to Tenable Vulnerability Management.
CVE The Common Vulnerability and Exposure (CVE) ID for the plugin that
identified the vulnerability.
CVSS Base The CVSSv2 base score (intrinsic and fundamental characteristics of a
Score vulnerability that are constant over time and user environments).
CVSS Temporal The CVSSv2 temporal score (characteristics of a vulnerability that change
Score over time but not among user environments).
CVSS3 Base The CVSSv3 base score (intrinsic and fundamental characteristics of a
Score vulnerability that are constant over time and user environments).
CVSS3 Temporal The CVSSv3 temporal score (characteristics of a vulnerability that change
Score over time but not among user environments).
- 803 -
CVSS3 Vector More CVSSv3 metrics for the vulnerability.
FQDN The fully qualified domain name of the host that the vulnerability was
detected on.
Host The hostname of the asset where a scan found the vulnerability.
Host End The UNIX timestamp for when the scan completed.
Host Start The UNIX timestamp for when the scan began.
IP Address The hostname of the asset where a scan found the vulnerability.
MAC Address The MAC address of the host where a scan found the vulnerability.
NetBios The NetBios name of the host where a scan found the vulnerability.
OS The operating system of the host where a scan found the vulnerability.
Plugin Output The text output of the plugin that identified the vulnerability.
Port Information about the port the scanner used to connect to the asset where
the scan found the vulnerability.
Protocol The protocol the scanner used to communicate with the asset where the
scan found the vulnerability.
See Also Links to external websites that contain helpful information about the
vulnerability.
- 804 -
System Type Device type.
Vulnerability The VPR that Tenable calculates for the vulnerability. For more
Priority Rating information, see Risk Metrics.
(VPR)
Vulnerability The state of the vulnerability. For more information, see Vulnerability
State States.
Vulnerability Filters
On the Vulnerabilities page, you can filter vulnerabilities using Tenable-provided filters and filters
based on asset tags.
Tenable-provided Filters
Tenable Vulnerability Management provides the following vulnerability filters:
Filter Description
Asset ID The UUID of the asset where a scan detected the vulnerability. This value
is unique to Tenable Vulnerability Management.
Bugtraq ID The Bugtraq ID for the plugin that identified the vulnerability.
CANVAS Exploit Indicates whether an exploit for the vulnerability exists in the Immunity
Framework CANVAS framework.
CANVAS Package The name of the CANVAS exploit pack that includes the vulnerability.
CERT Vulnerability The ID of the vulnerability in the CERT Vulnerability Notes Database.
ID
Check Name The description of the compliance check that detected the vulnerability.
Compliance The name of the reference file the scan used for the compliance check.
Reference
- 805 -
CORE Exploit Indicates whether an exploit for the vulnerability exists in the CORE
Framework Impact framework.
CVE The Common Vulnerability and Exposure (CVE) IDs for the vulnerabilities
that the plugin identifies.
CVSS Base Score The CVSSv2 base score (intrinsic and fundamental characteristics of a
vulnerability that are constant over time and user environments).
CVSS Temporal The CVSSv2 temporal score (characteristics of a vulnerability that change
Score over time but not among user environments).
CVSS v3.0 Base The CVSSv3 base score (intrinsic and fundamental characteristics of a
Score vulnerability that are constant over time and user environments).
CVSS v3.0 The CVSSv3 temporal score (characteristics of a vulnerability that change
Temporal Score over time but not among user environments).
CVSS Vector The raw CVSSv2 metrics for the vulnerability. For more information, see
CVSSv2 documentation.
Check Name The description of the compliance check that detected the vulnerability.
Compliance The name of the reference file the scan used for the compliance check.
Reference
Default/Known Indicates whether the plugin that identified the vulnerability checks for
Accounts default accounts.
- 806 -
Elliot Exploit Indicates whether an exploit for the vulnerability exists in the D2 Elliot
Framework Web Exploitation framework.
Elliot Exploit The name of the exploit for the vulnerability in the D2 Elliot Web
Name Exploitation framework.
Exploit Available Indicates whether a public exploit exists for the vulnerability.
ExploitHub Indicates whether an exploit for the vulnerability exists in the ExploitHub
framework.
Exploited by Indicates whether Tenable Nessus exploited the vulnerability during the
Nessus process of identification.
ExploitHub Indicates whether an exploit for the vulnerability exists in the ExploitHub
framework.
Hostname/IP The hostname of the asset where a scan found the vulnerability.
Address
Note: Ensure the search query does not end in a period.
IAVA ID The ID of the information assurance vulnerability alert (IAVA) for the
vulnerability.
IAVB ID The ID of the information assurance vulnerability bulletin (IAVB) for the
vulnerability.
- 807 -
In the News Indicates whether this plugin has received media attention (for example,
ShellShock, Meltdown).
Malware Indicates whether the plugin that identified the vulnerability checks for
malware.
Metasploit Exploit Indicates whether an exploit for the vulnerability exists in the Metasploit
Framework framework.
Metasploit Name The name of the related exploit in the Metasploit framework.
Microsoft Bulletin The Microsoft security bulletin the plugin that identified the vulnerability
covers.
Patch Publication The date on which the vendor published a patch for the vulnerability.
Date
Plugin Description The description of the Tenable plugin that identified the vulnerability.
Plugin Family The family of the plugin that identified the vulnerability.
Plugin Name The name of the plugin that identified the vulnerability.
Plugin Output The text output of the Nessus scanner that identified the vulnerability.
Plugin Publication The date on which the plugin that identified the vulnerability was
Date published.
Plugin Type The general type of plugin check (for example, local or remote).
Port Information about the port the scanner used to connect to the asset
where the scan detected the vulnerability.
Protocol The protocol the scanner used to communicate with the asset where the
- 808 -
scan detected the vulnerability.
Recast & Accept Indicates whether the vulnerability is affected by a recast or accept rule.
Risk Modified Indicates whether you have accepted or recasted (or both) the severity of
a vulnerability. For more information, see Create Recast/Accept Rules in
Findings.
See Also Links to external websites that contain helpful information about the
vulnerability.
Severity The vulnerability's CVSS-based severity. For more information, see CVSS
vs. VPR.
Tag (Category: A unique filter that searches tags (category: value) pairs. For more
Value) information, see tags.
Target Group A target group. For more information, see Target Groups.
Vulnerability First The date when a scan first found the vulnerability on an asset.
Seen
Vulnerability Last The date when a scan last found the vulnerability on an asset.
Seen
- 809 -
Vulnerability The date when the vulnerability definition was first published (for
Publication Date example, the date that the CVE was published).
Vulnerability State The state of the vulnerability. For more information, see Vulnerability
States.
Bugtraq Id The Bugtraq ID for the plugin that identified the vulnerability.
CPE The Common Platform Enumeration (CPE) numbers for vulnerabilities that
the plugin identifies.
CVE The Common Vulnerability and Exposure (CVE) IDs for the vulnerabilities
that the plugin identifies.
CVSS Base The CVSSv2 base score (intrinsic and fundamental characteristics of a
Score vulnerability that are constant over time and user environments).
CVSS v3.0 Base The CVSSv3 base score (intrinsic and fundamental characteristics of a
Score vulnerability that are constant over time and user environments).
CVSS Vector The raw CVSSv2 metrics for the vulnerability. For more information, see
CVSSv2 documentation.
First Seen The date on which the first instance of the vulnerability was detected.
Host The host of the URL where the vulnerability was detected.
OWASP Top 10 The Open Web Application Security Project (OWASP) 2010 category for the
2010 vulnerability targeted by the plugin.
- 810 -
OWASP Top 10 The Open Web Application Security Project (OWASP) 2013 category for the
2013 vulnerability targeted by the plugin.
OWASP Top 10 The Open Web Application Security Project (OWASP) 2017 category for the
2017 vulnerability targeted by the plugin.
Plugin The description of the Tenable plugin that identified the vulnerability.
Description
Plugin Family The family of the plugin that identified the vulnerability.
Plugin Name The name of the plugin that identified the vulnerability.
Plugin The date on which the plugin that identified the vulnerability was published.
Publication
Date
See Also Links to external websites that contain helpful information about the
vulnerability.
Severity The CVSS score-based severity. For more information, see CVSS Scores vs.
VPR in the Tenable Vulnerability Management User Guide.
WASC The Web Application Security Consortium (WASC) category associated with
the vulnerability targeted by the plugin.
Tag Filters
In Tenable Vulnerability Management, tags allow you to add descriptive metadata to assets that
helps you group assets by business context. For more information, see Tags.
On both the By Plugin and By Asset tabs of the Vulnerabilities page, you can filter vulnerabilities by
tags applied to the related assets.
- 811 -
Note: When using the contains or does not contain operators, use the following best practices:
l For the most accurate and complete search results, use full words in your search value.
l Do not use periods in your search value.
l Remember that when filtering assets, the search values are case-sensitive.
l Filter by only one value per filter. For example, to filter by two different IP addresses, add two
separate filters for each IP address.
l Where applicable, Tenable recommends using the contains or does not contain instead of the is
equal to or is not equal to operators.
In the Category drop-down box for a filter, your organization's tags appear at the bottom of the list,
after the Tenable-provided filters.
If you want to export vulnerabilities filtered by tag, use the .csv export format. Tag filters are not
supported in other export formats.
Note: If you exceed the current asset query limitation of 5,000, a message appears in your interface. You
should refine the query to a smaller set of asset tags.
On the Vulnerabilities page, on the By Applications tab, you can filter applications using Tenable-
provided filters.
Tenable-provided Filters
Tenable Web App Scanning provides the following application filters:
Filter Description
Finding The number of Vulnerabilities detected on the application across all scans.
Count
First Seen The date on which the application was first scanned successfully.
Host The host name of the asset where a scan found the vulnerability.
- 812 -
Last Seen The date on which the application was last scanned successfully.
Severity The CVSS score-based severity. For more information, see CVSS Scores vs. VPR
in the Tenable Vulnerability Management User Guide.
Assets
The following feature is only available in Tenable FedRAMP Moderate environments.
The Assets page provides insight into your organization's assets and their vulnerabilities.
This page contains top-level widgets that provide a snapshot of the asset scanning status, and a
table that lists assets scans have identified in your network. The top-level widgets include:
Widget Description
Asset by This widget lists the top 5 tags applied to the highest number of assets. For
Tags more information, see Tags.
Asset This widget summarizes how thoroughly your scans assessed your
Coverage environment during the past 90 days.
- 813 -
configured to find vulnerabilities on assets.
Statistics This widget summarizes any licensed asset (in that Tenable Vulnerability
Management scanned the asset in the last 90 days).
About Assets
Tenable Vulnerability Management includes the ability to track assets that belong to your
organization. Assets are entities of value on a network that can be exploited. This includes laptops,
desktops, servers, routers, mobile phones, virtual machines, software containers, and cloud
instances. By providing comprehensive information about the assets that belong to your
organization, Tenable Vulnerability Management helps to eliminate potential security risks, identify
under-utilized resources, and support compliance efforts.
Tenable Vulnerability Management automatically creates or updates assets when a scan completes
or scan results are imported. Tenable Vulnerability Management attempts to match incoming scan
data to existing assets using a complex algorithm. This algorithm looks at attributes of the scanned
hosts and employs various heuristics to choose the best possible match. If Tenable Vulnerability
Management cannot find a match, the system assumes this is the first time Tenable Vulnerability
Management has encountered the asset and creates a new record for it. Otherwise, if Tenable
Vulnerability Management finds a matching asset, the system updates any properties that have
changed since the last time Tenable Vulnerability Management encountered the asset.
l DNS Names
l NetBIOS Name
l Operating System
l Installed Software
- 814 -
l UUIDS (Tenable, ePO, BIOS)
View Assets
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
To view assets:
2. In the left navigation plane, in the Asset View section, click Assets.
Section Action
- 815 -
information, see Tenable Vulnerability
Management Tables.
Search box Search the assets table. For more information, see
Tenable Vulnerability Management Tables.
Saved Searches box Create a saved search, edit an existing saved search,
or apply an existing saved search.
l Name —
- 816 -
l (Requires Tenable Lumin license) Edit an ACR.
l Delete an asset.
Asset View
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
The Asset View page provides a single view of all the assets in your environment. This can help
security teams understand their full attack surface. On the Asset View page, you can view the
following types of assets:
l Managed assets that Tenable Vulnerability Management has assessed for vulnerabilities
l Unmanaged assets that Tenable Vulnerability Management discovered, but did not yet assess
for vulnerabilities
- 817 -
This Tenable-provided dashboard visualizes actionable insights for your Tenable Vulnerability
Management assets. You can roll over individual items to reveal additional information or click on
items to drill down into details behind the data.
Note: The access group to which you belong determines the assets shown on the Asset View. For more
information, see Access Groups.
Note: The Asset View page does not include assets from Tenable Web App Scanning or Tenable Container
Security.
On the Asset View page, you can interact with the following widgets:
- 818 -
Widget Action
Statistics This widget summarizes the actionable metrics for your inventory during the
past 90 days.
To view a list of assets, click the assets count or one of the recent discovery
metrics. For more information, see View Asset Details.
Asset This widget summarizes how thoroughly your scans assessed your
Coverage environment during the last 90 days.
Most Common This widget summarizes the most common operating systems running on
Operating your assets, organized by percentage of your assets running each operating
Systems system.
Assets by This widget lists the top 50 tags applied to the highest number of assets.
Tags For more information, see Tags.
Assets This widget lists assets found by Tenable Nessus Plugins running on web
Running Web servers.
Servers
Assets This widget lists assets found by Tenable Nessus Plugins running on docker
Running hosts.
Docker Hosts
For more information about how to Discover and Assess in Tenable Vulnerability Management, in
the upper-right corner, click the Discover and Assess button.
- 819 -
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
The Discover and Assess page highlights the asset discovery options available in Tenable
Vulnerability Management. On the Discovery page, user role permissions determine the access to
certain widgets. For example, an administrator can access the Cloud Connectors widget, but a
standard user cannot.
2. In the left navigation plane, in the Asset View section, click Discovery.
Widget Action
- 820 -
b. Create a scan. For
more information,
see Create a Scan.
a. Click Set Up
Connectors.
The Connectors
page appears.
b. Configure a
connector. For more
information, see
Connectors.
b. Configure a two-way
sync between
Tenable
Vulnerability
Management and
ServiceNow. For
more information,
see the ServiceNow
Integration Guide.
- 821 -
a. Click Learn More.
The Add a
Nessus Network
Monitor plane
appears.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
2. In the left navigation plane, in the Asset View section, click Assets.
3. In the assets table, click the asset where you want to view details.
- 822 -
The Asset Details page appears.
Section Action
Top section
Asset Name Indicates the asset identifier, assigned based on the availability of
specific attributes in logical order.
Right section
- 823 -
Vulnerability l View the number of vulnerabilities associated with the asset.
Information l View the number of exploitable vulnerabilities associated with the
asset.
Tags l View asset tags applied to the asset: manual application ( ) and
dynamic application ( ).
l First Seen — The date and time when a scan first identified the
asset.
l Last Seen — The date and time at which the asset was last
observed as part of a scan.
l Last Auth Scan — The date and time of the last authenticated scan
run against the asset. An authenticated scan that only uses
discovery plugins updates the Last Authenticated Scan field, but
not the Last Licensed Scan field.
- 824 -
The scan DB shows the scan's settings, plugin outputs, plugin audit trail,
KB, and other attachments. In most cases, you only need to download the
scan DB when Tenable Support requests it for support cases.
ACR Key Drivers View information about the key driversTenable used to calculate the ACR
for this asset.
Lower section
Vulnerabilities l Refine the data in the vulnerabilities table. For more information,
see Tenable Vulnerability Management Tables.
l Delete an asset.
- 825 -
l To sort, increase or decrease the number of rows per page, or
navigate to another page of the table, see Tenable Vulnerability
Management Tables.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
In the asset Activity tab, you can view asset history to help you troubleshoot issues. You can see
when your asset was discovered, seen, updated, tagged, or deleted, and relevant metadata about
the activity. You can also search the asset activity log.
2. In the left navigation plane, in the Asset View section, click Assets.
3. In the assets table, click the asset where you want to view details.
5. Do the following:
- 826 -
a. (Optional) Search for specific events by Event value. For more information, see Tenable
Vulnerability Management Tables.
The Activity details plane appears and shows metadata for the event. Depending on the
event, the metadata can include information such as:
Tip: To view the scan that generated an Asset Discovered, Asset Seen, or Asset Updated event,
click the link to the scan under Seen by.
Add your own business context to assets by tagging them with descriptive metadata in Tenable
Vulnerability Management.
You can manually apply a tag to create a static group of assets. An asset tag is primarily composed
of a Category:Value pair. For example, if you want to group your assets by location, create a
Location category with the value Headquarters. For more information about tags, see Tags.
Tip: Applying or removing a tag generates an entry in the asset's activity log. You can view the activity log in
the Activity tab of the Asset Details page.
Note: Tenable Vulnerability Management applies dynamic tags to any assets, regardless of access group
scoping. As a result, it may apply tags you create to assets outside of access groups to which you belong.
- 827 -
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Required Tenable Vulnerability Management Permission: Can Use permission for applicable asset tags.
When you view an asset's tags, you can search by a specific tag to create a filter for assets with the
same tag. For more information on filters in the new interface, see Filter a Table.
You can also search for assets by the tags table, as described in Search for Assets by Tag from the
Tags Table.
2. In the right panel, in the Tags section, click the tag you want to search by.
The Assets page appears. Tenable Vulnerability Management shows the Assets and filters the
table for assets where the selected tag is applied.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
- 828 -
Required Access Group Permissions: Can View, Can Edit
This procedure describes how to remove tags from assets from the Assets page. You can also
remove asset tags from the Vulnerabilities by Assets page.
If an asset matches a dynamic tag's rules but you do not want the tag applied, you can manually
remove the tag from the asset. If you later want to re-apply the tag to the asset, you can remove
the asset from the excluded assets list, as described in Edit Tag Rules.
2. In the left navigation plane, in the Asset View section, click Assets.
Location Action
Assets page a. In the assets table, select the check box for each asset from which
you want to remove a tag.
Asset a. In the assets table, click the asset where you want to remove the
Details page tag.
b. In the right panel, in the Tags section, click the name of the tag you
want to remove from the asset.
A menu appears.
- 829 -
4. Under Current Tags, click each tag you want to remove.
Tip: To remove a tag from Tags to be Removed, roll over the tag and click the button.
5. Click Remove.
Tenable Vulnerability Management removes the tags specified in Tags to be Removed from
the asset.
2. In the left navigation plane, in the Asset View section, click Assets.
3. In the assets table, click the check box next to each asset for which you want to remove the
tag.
- 830 -
5. Under Current Tags, click each tag you want to remove.
Tip: To remove a tag from Tags to be Removed, roll over the tag and click the button.
6. Click Remove.
Tenable Vulnerability Management removes the tags specified in Tags to be Removed from
the selected assets.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
2. In the left navigation plane, in the Asset View section, click Assets.
- 831 -
The Assets page appears.
3. (Optional) Refine the table data. For more information, see Tenable Vulnerability Management
Tables.
Export
Action
Scope
All assets To export all assets, in the upper-right corner of the page, click the
Export button.
A menu appears.
b. Click Export.
- 832 -
This plane contains:
l A brief description of the export scope you selected under the Export label. This
description specifies the number of assets you selected for the export.
Format Description
A list of export fields appears. You can select which fields the export
includes by selecting the check box next to any field. To view only the
selected fields, click View Selected.
- 833 -
Format Description
Note: When you export assets for the first time, Tenable Vulnerability
Management selects all fields. If you modify the field selection, Tenable
Vulnerability Management retains your selections as the default the next time
you generate an export file.
Tenable Vulnerability Management begins processing the export. Depending on the size of the
exported data, Tenable Vulnerability Management may take several minutes to process the
export.
When processing completes, Tenable Vulnerability Management downloads the export file to
your computer. Depending on your browser settings, your browser may notify you that the
download is complete.
Each line in the .csv file is composed of the fields described in the following table. On the Assets
page, you can export assets as a .csv file.
Field Description
Agent Name The name of the Tenable Nessus agent that scanned and identified the
asset.
AWS Availability The name of the Availability Zone where AWS hosts the virtual machine
Zone instance. For more information, see Regions and Availability Zones in
the AWS documentation.
AWS EC2 Instance The unique identifier of the Linux AMI image in Amazon Elastic
AMI ID Compute Cloud (Amazon EC2). For more information, see the Amazon
Elastic Compute Cloud Documentation.
- 834 -
AWS EC2 Instance The unique identifier of the Linux instance in Amazon EC2. For more
ID information, see the Amazon Elastic Compute Cloud Documentation.
AWS EC2 Instance The state of the virtual machine instance in AWS at the time of the
State Name scan. For possible values, see API Instance State in the Amazon Elastic
Compute Cloud Documentation.
AWS EC2 Instance The type of virtual machine instance in Amazon EC2. Amazon EC2
Type instance types dictate the specifications of the instance (for example,
how much RAM it has). For a list of possible values, see Amazon EC2
Instance Types in the AWS documentation.
AWS EC2 Name The name of the virtual machine instance in Amazon EC2.
AWS EC2 Product The product code associated with the AMI used to launch the virtual
Code machine instance in Amazon EC2.
AWS Owner ID A UUID for the Amazon AWS account that created the virtual machine
instance. For more information, see AWS Account Identifiers in the
AWS documentation.
This attribute contains a value for Amazon EC2 instances only. For
other asset types, this attribute is empty.
AWS Region The region where AWS hosts the virtual machine instance, for example,
us-east-1. For more information, see Regions and Availability Zones in
the AWS documentation.
AWS Subnet ID The unique identifier of the AWS subnet where the virtual machine
instance was running at the time of the scan.
AWS VPC ID The unique identifier of the public cloud that hosts the AWS virtual
machine instance. For more information, see the Amazon Virtual
Private Cloud User Guide.
Azure VM ID The unique identifier of the Microsoft Azure virtual machine instance.
For more information, see Accessing and Using Azure VM Unique ID in
the Microsoft Azure documentation.
BigFix Asset ID The unique identifiers of the asset in IBM BigFix. For more information,
- 835 -
see the IBM BigFix documentation.
Created At The date and time when Tenable Vulnerability Management created the
asset record.
Deleted At The time and date when a user deleted the asset record. When a user
deletes an asset record, Tenable Vulnerability Management retains the
record until the asset ages out of the license count.
Exposure Score The Asset Exposure Score (AES) calculated for the asset.
First Scan Time The time and date of the first scan run against the asset.
First Seen The date and time when a scan first identified the asset.
FQDN The fully-qualified domain name of the host that the vulnerability was
detected on.
GCP Instance ID The unique identifier of the virtual machine instance in Google Cloud
Platform (GCP).
GCP Project ID The customized name of the project to which the virtual machine
instance belongs in GCP. For more information, see Creating and
Managing Projects in the GCP documentation.
GCP Zone The zone where the virtual machine instance runs in GCP. For more
information, see Regions and Zones in the GCP documentation.
Has Agent Specifies whether a Tenable Nessus agent scan identified the asset.
Has Plugin Results Specifies whether the asset has plugin results associated with it.
- 836 -
Installed Software A list of Common Platform Enumeration (CPE) values that represent
software applications a scan identified as present on an asset. This
field supports the CPE 2.2 format. For more information, see the
Component Syntax section of the CPE Specification documentation,
Version 2.2. For assets identified in Tenable scans, this field contains
data only if a scan using Tenable Nessus Plugin ID 45590 has evaluated
the asset.
Last Authenticated The date and time of the last authenticated scan run against the asset.
An authenticated scan that only uses discovery plugins updates the
Last Authenticated Scan field, but not the Last Licensed Scan field.
Last Licensed Scan The date and time of the last scan in which the asset was considered
Date "licensed" and counted towards Tenable's license limit. A licensed scan
uses non-discovery plugins and can identify vulnerabilities.
Unauthenticated scans that run non-discovery plugins update the Last
Licensed Scan field, but not the Last Authenticated Scan field. For
more information on licensed assets, see Tenable Vulnerability
Management Licenses.
Last Scan Target The FQDN, IPv4 address, or IPv6 address that the scanner last used to
target the asset.
Last Scan Time The time and date of the last scan run against the asset.
- 837 -
Last Seen The date and time at which the asset was last observed as part of a
scan.
MAC Address A MAC address that a scan has associated with the asset record.
McAfee Epo Agent The unique identifier of the McAfee ePO agent that identified the asset.
Guid For more information, see the McAfee documentation.
McAfee EpoGuid The unique identifier of the asset in McAfee ePolicy Orchestrator (ePO).
For more information, see the McAfee documentation.
Mitigations (Requires Tenable Lumin license) The mitigations that scans have
identified as present on the asset. Tenable Lumin defines mitigations
as endpoint protection agents, which include antivirus software,
Endpoint Protection Platforms (EPPs), or Endpoint Detection and
Response (EDR) solutions
Network Id The ID of the network object associated with scanners that identified
the asset. The default network ID is 00000000-0000-0000-0000-
000000000000. For more information about networks, see Networks.
Operating System The operating system that a scan identified as installed on the asset.
Qualys Asset ID The Asset ID of the asset in Qualys. For more information, see the
Qualys documentation
This field contains a value only for assets associated with Qualys
vulnerabilities you import via the Tenable Vulnerability Management API.
For more information, see the Tenable Developer Portal.
Qualys Host ID The Host ID of the asset in Qualys. For more information, see the Qualys
documentation.
This field contains a value only for assets associated with Qualys
vulnerabilities you import via the Tenable Vulnerability Management API.
- 838 -
For more information, see Tenable Developer Portal.
Scan Frequency The number of times the asset was scanned within the past 90 days.
ServiceNow Sys ID Where applicable, the unique record identifier of the asset in
ServiceNow. For more information, see the ServiceNow documentation.
Sources The source of the scan that identified the asset. Possible values are:
l AWS Connector
l Azure Connector
l GCP Connector
l Qualys Connector
SSH Fingerprint The SSH key fingerprints that scans have associated with the asset
record.
Symantec EP The hardware keys for the asset in Symantec Endpoint Protection.
Hardware Key
System Type The system types as reported by Plugin ID 54615. For more information,
see Tenable Plugins.
Tenable UUID The UUID of the agent present on the asset. This attribute is empty if
no agent is present on the asset.
Terminated At The time and date when a user terminated the virtual machine instance
of the asset (for example, in AWS).
- 839 -
Terminated By The user who terminated the virtual machine instance of the asset.
Updated At The time and date when the asset record was last updated.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Required Tenable Vulnerability Management Permission: Can Edit, Can Use permission for applicable
asset tags
When you open a support case related to a Tenable Vulnerability Management-managed asset, you
can download the asset's inventory data (a .zip file containing the asset's scan data) and attach it to
the support ticket.
l Assets View > Assets > Asset Details > Actions drop-down menu
Note: The scan data included in the .zip file is only intended for support cases and may change without
notice.
Note: The Download Inventory Debug Data action is only available for assets that Tenable Vulnerability
Management scanned in the last 90 days and have one of the following source types: SSM, NESSUS_
AGENT, or AZURE_FA.
To download asset scan data from the Assets View > Assets page:
2. In the left navigation plane, in the Asset View section, click Assets.
- 840 -
The Assets page appears. By default, the assets dashboard and assets table are visible.
3. (Optional) Refine the asset table data. For more information, see Tenable Vulnerability
Management Workbench Tables.
4. In the assets table, in the Actions column, click the button in the row for the asset who's
scan data you want to download.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
3. (Optional) Refine the vulnerabilities table data. For more information, see Tenable Vulnerability
Management Tables.
l
Select an individual vulnerability to export.
a. In the vulnerabilities table, in the row for the vulnerability you want to export, click
the button.
b. Click Export.
- 841 -
The Export plane appears.
l
Select multiple vulnerabilities to export.
a. In the vulnerabilities table, click the check box next to any vulnerability you want to
export.
5. In the Export plane, click the export format you want to use:
Format Description
PDF -
Executive
Summary
HTML -
Executive
- 842 -
Format Description
Summary
Tenable Nessus file. Tenable Nessus exports are the only file format that you
Nessus can import into Tenable Vulnerability Management.
6. Click Export.
Tenable Vulnerability Management begins processing the report. Depending on the size of the
exported data, Tenable Vulnerability Management may take several minutes to process the
report.
When processing completes, Tenable Vulnerability Management downloads the export file to
your computer. Depending on your browser settings, your browser may notify you that the
download is complete.
Delete Assets
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
When you delete an asset, Tenable Vulnerability Management deletes the asset from the default
view of the assets table, deletes vulnerability data associated with the asset, and stops matching
scan results to the asset.
- 843 -
Note: You can only delete 1,000 assets at a time.
If the asset is an Explore asset, then Tenable Vulnerability Management removes the asset from
your asset count within 24 hours. All other assets remain on your license count until 90 days after
Tenable Vulnerability Management last sees the asset in a scan.
Note: If an asset is part of a network with an Asset Age Out setting, this setting overrides these default
settings. For more information, see View or Edit a Network.
Location Action
A menu appears.
e. Click Delete.
- 844 -
A confirmation window appears.
Explore Overview See Delete Assets in the Explore section for more
information.
3. In the assets table, click the check box next to each asset you want to delete.
- 845 -
4. In the action bar, click the button.
A menu appears.
5. Click Delete.
2. In the asset table header row, select the check box to select all assets on the current page.
- 846 -
The following feature is only available in Tenable FedRAMP Moderate environments.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
You can view information about deleted assets until they age out of your licensed assets count
after 14 days.
When you delete an asset, you cannot view the asset in the default view of the asset table.
However, you can apply a filter to the asset table to view deleted assets.
2. In the left navigation plane, in the Asset View section, click Assets.
3. Click Filters.
- 847 -
l Category: Is Licensed (VM)
l Operator: is equal to
l Value: true
5. Click Apply.
The assets table updates to show all assets with active licenses. Deleted assets appear
grayed out.
Asset Filters
Note: This topic describes filters available for assets within the legacy workbench Assets section. To view
filters available for assets in the Explore section, see Asset Filters.
You can use asset attributes to filter data in asset views and dashboards. For more information,
see:
l Tenable-provided Filters
l Tag Filters
In Tenable Vulnerability Management, you can use asset filters in tables and dashboards, and to
create tag rules, as follows:
- 848 -
Tenable-provided Filters
Note: To optimize performance, Tenable limits the number of filters that you can apply to any Explore >
Findings or Assets views (including Group By tables) to 18.
Supported in
Attribute Description
Tag Rules?
Asset Assessed Specifies whether the asset has been assessed Yes
for vulnerabilities. For a list of conditions that
cause an asset to be assessed, see How Assets
are Counted. Once assessed, the asset is always
categorized as assessed, even if it ages out of
the license count.
AWS Availability Zone The name of the Availability Zone where Yes
AWS hosts the virtual machine instance. For
more information, see Regions and Availability
Zones in the AWS documentation.
AWS EC2 AMI ID The unique identifier of the Linux AMI image in Yes
Amazon Elastic Compute Cloud (Amazon EC2).
For more information, see the Amazon Elastic
Compute Cloud Documentation.
AWS EC2 Instance ID The unique identifier of the Linux instance in Yes
- 849 -
Amazon EC2. For more information, see the
Amazon Elastic Compute Cloud Documentation.
AWS EC2 Name The name of the virtual machine instance in Yes
Amazon EC2.
AWS EC2 Product Code The product code associated with the AMI used Yes
to launch the virtual machine instance in
Amazon EC2.
AWS Instance State The state of the virtual machine instance in Yes
AWS at the time of the scan. For possible
values, see API Instance State in the Amazon
Elastic Compute Cloud Documentation.
AWS Instance Type The type of virtual machine instance in Amazon Yes
EC2. Amazon EC2 instance types dictate the
specifications of the instance (for example, how
much RAM it has). For a list of possible values,
see Amazon EC2 Instance Types in the AWS
documentation.
AWS Owner A UUID for the Amazon AWS account that Yes
created the virtual machine instance. For more
information, see AWS Account Identifiers in the
AWS documentation.
AWS Region The region where AWS hosts the virtual Yes
machine instance, for example, us-east-1. For
more information, see Regions and Availability
Zones in the AWS documentation.
AWS Security Group The AWS security group (SG) associated with Yes
the Amazon EC2 instance.
- 850 -
AWS Subnet ID The unique identifier of the AWS subnet where Yes
the virtual machine instance was running at the
time of the scan.
AWS VPC ID The unique identifier of the public cloud that Yes
hosts the AWS virtual machine instance. For
more information, see the Amazon Virtual
Private Cloud User Guide.
Azure Resource Group The name of the resource group in the Azure
Resource Manager. For more information, see
the Azure Resource Manager Documentation.
Azure Resource Type The resource type of the resource in the Azure
Resource Manager. For more information, see
the Azure Resource Manager Documentation.
- 851 -
BigFix Asset ID The unique identifiers of the asset in IBM BigFix. No
For more information, see the IBM BigFix
documentation.
Deleted Date The time and date when a user deleted the
asset record. When a user deletes an asset
record, Tenable Vulnerability Management
retains the record until the asset ages out of the
license count.
First Seen The date and time when a scan first identified No
the asset.
Google Cloud Instance ID The unique identifier of the virtual machine Yes
instance in Google Cloud Platform (GCP).
Google Cloud Project ID The customized name of the project to which Yes
the virtual machine instance belongs in GCP. For
more information, see Creating and Managing
Projects in the GCP documentation.
Google Cloud Zone The zone where the virtual machine instance Yes
runs in GCP. For more information, see Regions
and Zones in the GCP documentation.
Has Plugin Results Specifies whether the asset has plugin results Yes
associated with it.
l hostname
- 852 -
l FQDN
l IPv4 address
- 853 -
IPv4 Address An IPv4 address that a scan has associated with Yes
the asset record.
IPv6 Address An IPv6 address that a scan has associated with Yes
the asset record.
- 854 -
Is Licensed (Tenable Web Specifies whether the asset is included in the No
App Scanning) asset count for the Tenable Web App Scanning
instance.
l 7 Days Ago
l 14 Days Ago
l 30 Days Ago
l 90 Days Ago
Last Authenticated Scan The date and time of the last authenticated No
scan run against the asset. An authenticated
scan that only uses discovery plugins updates
- 855 -
the Last Authenticated Scan field, but not the
Last Licensed Scan field.
Last Seen The date and time at which the asset was last No
observed as part of a scan.
- 856 -
MAC Address A MAC address that a scan has associated with Yes
the asset record.
- 857 -
NetBIOS Name The NetBIOS name for the asset. Yes
Network Name The name of the network object associated with Yes
scanners that identified the asset. The default
name is Default. For more information, see
Networks.
Qualys Asset ID The Asset ID of the asset in Qualys. For more Yes
information, see the Qualys documentation
Qualys Host ID The Host ID of the asset in Qualys. For more Yes
information, see the Qualys documentation.
Source The source of the scan that identified the asset. Yes
- 858 -
Possible values are:
l AWS Connector
l Azure Connector
l GCP Connector
l Qualys Connector
Tenable UUID The UUID of the agent present on the asset. Yes
This attribute is empty if no agent is present on
the asset.
- 859 -
l ACR Drivers
l DNS (FQDN)
l Hostname/IP Address
l Installed Software
l NetBIOS Name
l Operating System
Note: When using the contains or does not contain operators, do not use periods in your search values.
Also, the search values are case-sensitive.
For example, when filtering on Operating System, use "Windows" instead of "Win." Tenable also
recommends filtering on characters at the beginning of search strings, instead of characters in the
middle or end of search strings. For example, when trying to match on an asset with the hostname
"localhost", filtering on "local," instead of "host" or "h," returns better results.
Tag Filters
In Tenable Vulnerability Management, tags allow you to add descriptive metadata to assets that
helps you group assets by business context. For more information, see Tags.
On the Assets page, you can filter vulnerabilities by tags applied to the related assets.
In the Category drop-down box for a filter, your organization's tags appear at the bottom of the list,
after the Tenable-provided filters.
If you want to export vulnerabilities for assets filtered by tag, use the CSV export format. Tenable
Vulnerability Management does not support tag filters in other export formats.
Note: If you exceed the current asset query limitation of 25,000, a message appears in your interface.
Refine the query to a tag that returns fewer than 25,000 assets.
- 860 -
Act
The Act section allows you to view and manage:
l Remediation efforts.
l Click Reports.
l Click Remediation.
Reports
Reports consist of two parts: the report, and the report results. On the Reports page, you can
create a report from a template, run existing reports, and view the results of those reports.
Note: Reports show data from the last 30 days. Tenable recommends scanning at least monthly to
maintain security hygiene and to keep report data up-to-date.
- 861 -
l The My Report Templates folder is the default folder that appears when you access the
Reports page. Reports that you create appear in this folder.
l The All Report Templates folder shows all reports that you have permission to interact with.
All reports are user-specific.
l The Report Results folder shows all the results from reports that you have permissions to
view. Results are displayed in chronological order based on when the reports were run. All
results from reports under Report Results are user-specific.
Using Tenable Vulnerability Management, you can generate thematic, informative reports to help
you find information that you might otherwise overlook. For example, the Credentialed Scan
Failures report delivers a straightforward, organized list of failed credentialed scans that analysts
can use to address scanning issues quickly, making it simpler to troubleshoot problems with
credentialed scans. For a complete list of report templates included with Tenable Vulnerability
Management, see Tenable Vulnerability Management Report Templates.
Note: PCI Quarterly External scan data is excluded from dashboards, reports, and workbenches
intentionally. This is due to the scan's paranoid nature, which may lead to false positives that would
otherwise not be detected. For more information, see Tenable PCI ASV Scans.
The Reports page appears with the My Report Templates tab selected.
Report Templates
- 862 -
Tenable Vulnerability Management provides a selection of report templates and customizable report
formats. You can configure a Tenable-provided report template or you can create a fully customized
report from one of the available formats.
For a complete index of Tenable-provided report templates, see Tenable Vulnerability Management
Report Templates.
Tip: For more information on the specific data included in each individual report, see View Report Details.
l The report cannot be edited in any way. This ensures underwriters can be confident their metrics
are 100% accurate.
l This report only includes Explore data from the previous 180 days.
l This report is only available for customers with Explore reports enabled on their container.
l The report name does not change upon subsequent generations of the report. For
example, the date/time stamp in the report name does not update the next time you run
the report, however the report data itself includes the date on which the report was most
recently run.
l Severities are reported using CVSSv3 base scores only.
For more information, see the Cyber Insurance Report blog post.
Report Settings
When you create a new report or modify an existing report, the following options are available:
Option Description
General
Name This text box shows the name of the report template you selected. You
can edit this text box to rename the report.
Description This text box shows a default description based on the report template
you selected. You can edit this text box to modify the description of the
report.
Update Logo Click Update Logo to add a new logo to your report or select from a list of
- 863 -
Option Description
Select the Set as default for all reports check box to set a logo as the
default.
Executive Summary
Click Widget Library to select from a list of Tenable-provided widgets to include in the
results of the report.
Additional Chapters
Click Chapter Library to select from a list of paragraphs and components to include in the
results of the report.
Create a Report
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
The Reports page appears with the My Report Templates tab selected.
- 864 -
The Report Templates page appears, with reports organized by category.
Category Description
Center for CIS Benchmarks are best practices for the secure configuration of a
Internet target system. Be sure to use the proper audit file for scans. For
Security (CIS) example: CIS PostgreSQL 12 v1.1.0 Audit Details, CIS Debian 8 v2.0.2
Audit Details, CIS Amazon Web Services Three-tier Web Architecture
v1.0.0 Audit Details, and so on.
Host Audit Organizations such as CIS, DISA, and some vendors create golden
Plugin Type configurations standards, known as benchmarks. Tenable creates
audit files that perform a detailed configuration review. Scanning the
assets with the Host Audit Compliance Check plugins allows you to
do detailed configuration checks. These reports provide summary
and detailed information for all the Host Audit Compliance Check
plugins.
Tenable Best Allows you to implement best practice audits for new technologies.
Practice Audits Make sure that the proper audit file is used for scans.
- 865 -
NetApp, VMware and others. Be sure to use the proper audit file for
scans.
Web App Web application security provides the ability to detect and mitigate
Scanning threats and vulnerabilities that may compromise the confidentiality,
integrity, and availability of web applications. These reports leverage
data from Tenable Web App Scanning, a comprehensive and
automated vulnerability scanning tool for modern web applications.
l In the Executive Summary section, select from the available widgets or click Add New
Widget and select a widget from the Widget Library.
l In the Additional Chapters section, select from the available chapters or click Add New
Chapter to select one from the Chapter Library.
l (Optional) Add a filter to the reports. For more information, see Filter Reports.
l (Optional) Update the report logo. For more information, see Report Settings.
7. Click Save.
- 866 -
Tenable Vulnerability Management creates a new report and it appears on the My Report
Templates page.
Tip: Once created, you can generate an initial report and download a copy. For more information, see
Generate Reports.
Generate a Report
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
Important: Disabling a user account does not disable scheduled reports for that user. Additionally, if the
disabled user shared a report with other users, these other users can still generate that report. For more
information, see Disable a User Account.
To generate a report:
The Reports page appears with the My Report Templates tab selected.
Scope Action
- 867 -
-or-
Select the check box next to the report you want to generate.
-or-
Tenable Vulnerability Management starts to generate the report. You can track the report
status on the Report Results tab.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
Note: Non-administrator users can only view report details for reports that they created or that have been
shared with them by another user.
The Reports page appears with the My Report Templates tab selected.
- 868 -
3. In the My Report Templates tab, click the row for the report for which you want to view the
details.
The Report Details page shows the following details about your report:
Section Description
Targets This section shows that all assets are included in the report.
History This section shows the time when the report was generated, the time of
report completion, and the current status of the report.
l Select the check box next to the report you want to download or
delete. Tenable Vulnerability Management enables Download and
Delete options in the action bar.
l In the Actions column, click the button. From the action options,
select one of the following:
Report Details The report details include a brief summary of the report:
- 869 -
l Status — The status of the report.
l Start Time — The time when the report generation was started.
l End Time — The time when the report generation was complete.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
You can share report templates with other users within the organization.
The Reports page appears. By default, the My Report Templates tab is visible.
Scope Action
- 870 -
single a. On the My Report Templates tab, right-click the row for the report
report template you want to share.
-or-
-or-
On the My Report Templates tab, select the check box next to the
report template you want to share.
b. Click Share.
4. In the Select Users or Groups section, select All Users or search for specific user or groups.
5. Click Share.
- 871 -
Tenable Vulnerability Management shares the report template with the users who can view
them in the Shared Report Templates tab. Each user receives an email notification with
details of the shared report, the email address of the sender, and a link to the shared report.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
You can only modify a report if you are the owner, a user with an administrator account, or you have
been given the Can configure permission for that report.
To edit a report:
The Reports page appears with the My Report Templates tab selected.
Scope Action
- 872 -
-or-
b. Click Edit.
6. Click Save.
Tenable Vulnerability Management saves the report and the Reports page appears.
Filter Reports
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
- 873 -
You can add filters to widgets when you create or edit a report. Filters allow you to display details
specific to filtered assets in the reports. You can filter by all assets, assets by tags, and custom
assets.
Note: Filtering for reports is currently available only for VM and Explore VM widgets.
Note: Tenable Web App Scanning does not support filtering vulnerabilities by tags.
The Reports page appears with the My Report Templates tab selected.
5. From the Select Filter Type drop-down box, select one of the filters:
l All Assets — Select this to include the data for all assets in the reports. The All Assets
filter is selected by default.
l Custom Assets — Type the IP addresses to filter the data by custom assets.
- 874 -
Note: When using the Custom Assets filter, you can filter by no more than 100 individual
IP addresses.
6. Click Confirm.
Tenable Vulnerability Management applies the filters to all widgets. You can hover over the
filter icon to view the applied filters.
Note: Tenable Vulnerability Management disables the filter icon when there are no associated
filters.
7. (Optional) To edit a filter for a widget, click the icon in the widget, then click Configure to
open the Filters plane.
a. In the widget for which you want to remove the filter, click the icon, then click Delete.
9. Click Save.
Schedule a Report
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
You can only schedule a report if you are the owner, a user with an administrator account, or you
have been given the Can configure permission for that report.
Important: Disabling a user account does not disable scheduled reports for that user. Additionally, if the
disabled user shared a report with other users, these other users can still generate that report. For more
information, see Disable a User Account.
To schedule a report:
- 875 -
1. In the upper-left corner, click the button.
The Reports page appears with the My Report Templates tab selected.
Scope Action
-or-
b. Click Schedule.
- 876 -
4. Modify the report schedule settings.
- 877 -
Setting Default Description
Start Date varies Specifies the exact date and time when Tenable
and Time Vulnerability Management launches the report.
Time Zone varies The time zone of the value set for Start Date and Time.
- 878 -
l Monthly: Schedule the report to run on a monthly
basis.
Repeat Ends Never l On: If you select this option, the End Date setting
appears, where you can select the date you want
the report schedule to end.
Add In this box, type one or more email addresses with whom
Recipients you want to schedule the report.
5. Click Schedule.
- 879 -
Tenable Vulnerability Management schedules the report and the recipients receive the report
as an email. If you enable the password protection toggle, the recipient must provide the
password when prompted.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
The Reports page appears with the My Report Templates tab selected.
Scope Action
-or-
On the Report Results tab, in the Actions column, click the button
in the row for the report results you want to share.
- 880 -
The action buttons appear in the row.
b. Click Email.
4. In the Add Recipients box, select from the list of existing email addresses or type one or more
email recipients for the report results.
The recipients you select receive an email with a PDF of the report results.
5. In the Encryption Password box, type the password for the generated report.
Important: Make sure that you provide this password to the recipients to open the report.
- 881 -
Note: If you provide a password at the time of scheduling the report, Tenable Vulnerability
Management applies the same password when emailing the report. For reports for which passwords
are applied at the time of scheduling, the Encryption Password box appears disabled with a
message at the bottom that states that the password is the same as one created during the
schedule process.
6. Click Email.
The report results are shared as an email and the Reports page appears. If you add a
password for the report, the recipient must enter the password when prompted.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
You can only edit a report schedule if you are the owner, a user with an administrator account, or
you have been given the Can configure permission for that report.
The Reports page appears with the My Report Templates tab selected.
3. Select the report for which you want to edit the schedule:
- 882 -
Scope Action
-or-
b. Click Schedule.
5. Click Schedule.
Tenable Vulnerability Management saves the report schedule and the Reports page appears.
Delete a Report
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
You can only delete a report if you are the owner or a user with an administrator account.
To delete a report:
- 883 -
1. In the upper-left corner, click the button.
The Reports page appears with the My Report Templates tab selected.
Note: This procedure is applicable for both Report Results and Report Templates.
Scope Action
-or-
Select the check box next to the report you want to delete.
-or-
- 884 -
In the Actions column, click the button in the row for the
report you want to delete.
b. Click Delete.
4. Click Delete.
Remediation
Tracking all the items that need remediation can be a major effort. To facilitate the tracking of
items to remediate, you can use the Remediation page to create two different methods to
prioritize, distribute, and track vulnerability tasks in the environment.
View Remediations
Required Tenable Vulnerability Management User Role: Basic User, Scan Operator, Standard, Scan
Manager, or Administrator
On the Remediation page, you can view your remediation projects or remediation goals.
- 885 -
1. In the upper-left corner, click the button.
The Remediation page appears. By default, the Remediation Projects tab is active.
l
View your remediation projects.
The Remediation Projects tab is shown by default. The following table defines its
columns:
Column Description
Asset Tags Asset tag(s) associated with the remediation project, which are
added at project creation.
Start Date The date and time on which the assigned user started the
remediation project.
Due Date The date and time on which the assigned user is expected to
complete the remediation project.
- 886 -
Actions The actions you can take with the remediation project.
l
View your remediation goals.
To view your remediation goals, click the Remediation Goals tab. The following table
defines its columns:
Column Description
Type Whether the goal is static or dynamic. The goal type depends on the
due date option configured when you created the remediation goal.
Start Date The date and time on which the remediation goal was started.
Due Date The date and time on which the remediation goal must be complete.
Asset Tags Asset tag(s) associated with the remediation project, which are
added at project creation.
Actions The actions you can take with the remediation goal.
Remediation Filters
Required Tenable Vulnerability Management User Role: Basic User, Scan Operator, Standard, Scan
Manager, or Administrator
On the Remediation page, you can use filters to refine the remediation projects goals displayed.
Remediation Projects
The following table defines the Remediation Project filters:
Filter Description
Asset Tags Asset tag(s) associated with the project, which are added at project creation.
Tenable Vulnerability Management only returns tags with a positive match,
- 887 -
such as Asset Tag is equal to Operating System: Windows.
Remediation Goals
The following table defines the Remediation Goals filters:
Filter Description
Asset Asset tag(s) associated with the project, which are added at project creation.
Tags Tenable Vulnerability Management only returns tags with a positive match, such
as Asset Tag is equal to Operating System: Windows.
Goal Type Whether the goal is static or dynamic. The goal type depends on the due date
option configured when you created the remediation goal.
Remediation Projects
A remediation project helps you organize and manage your remediation program. Remediation
projects allow you to define the scope of work, prioritize your findings, assign projects to owners,
and track the progress of your remediation tasks. The status of your remediation project lets you
quickly visualize all your in-progress or closed remediation activities.
l By fixed date — A remediation project with a fixed scope that must be completed by the
specified date.
- 888 -
l Within number of days — An open-scope or ongoing remediation project that must be
completed within a specific period. This type of remediation project ensures that you always
assign and track a certain type of critical vulnerability.
On the Remediation Projects page, you can perform the following tasks:
Required Tenable Vulnerability Management User Role: Basic User, Scan Operator, Standard, Scan
Manager, or Administrator
Note: You can also create a remediation project from Explore > Findings. For more information, see Create
a remediation project from Findings.
You can create remediation projects to define the scope of work, prioritize your findings, assign
projects to owners, and track the progress of your remediation tasks.
- 889 -
The Remediation page appears. By default, the Remediation Projects tab is active.
On the left side of the page, you can select from the following and click Next after each
selection:
Option Action
Name l In the Project Name box, type a name for the project.
Scope In the Findings Filters section, the following filters are selected by
default.
Note: When the State: is not equal to Fixed filter is applied, the
progress bar shows 0%. To view the progress percentage of the
remediation project, remove this filter.
- 890 -
You can modify the existing filters or add new filters to the list with AND
and OR options.
For each filter you want to use to specify the project scope, do the
following:
4. In the first drop-down box, select the operator you want to apply to
the filter.
Assign In the Select Users or User Groups drop-down box, select the users or
groups to which you want to assign the remediation project.
Schedule l In the Start Date box, select the date on which you want the
assigned users and groups to be in the remediation project.
- 891 -
Note: For any remediation project with this option selected, the
right-hand progress bar does not appear on the Project Details
page.
4. Click Save.
Note: Remediation projects do not automatically close even if all the tasks are complete or if the
projects reach their due date. You have to close the project manually by changing the project status
to Closed once it is complete.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
The Findings page appears, showing a table that lists your findings. By default, the
Vulnerabilities tab is active.
Note: The Create Remediation Project option is available when you have three or less than three
selected filters. If you select more than three filters, Tenable Vulnerability Management does not
show the Create Remediation Project option.
- 892 -
Create Action
l Select the check box for the finding for which you
want to create the remediation project.
Remediation project a. Select the check box for the findings for which you want
for multiple findings to create the remediation project.
On the left side of the page, you can select from the following and click Next after each
selection:
Option Action
Name l In the Project Name box, type a name for the project.
- 893 -
l (Optional) In the Description box, type a description for the
remediation project.
Scope In the Findings Filters section, the following filters are selected by
default. You can modify the existing filters or add new filters to the list
with AND and OR options.
For each filter you want to use to specify the project scope, do the
following:
4. In the first drop-down box, select the operator you want to apply to
the filter.
Assign In the Select Users or User Groups drop-down box, select the users or
- 894 -
groups to which you want to assign the remediation project.
Schedule l In the Start Date box, select the date on which you want the
assigned users and groups to be in the remediation project.
5. Click Save.
Note: Remediation projects do not automatically close even if all the tasks are complete or if the
projects reach their due date. You have to close the project manually by changing the project status
to Closed once it is complete.
Required Tenable Vulnerability Management User Role: Basic User, Scan Operator, Standard, Scan
Manager, or Administrator
The Remediation page appears. By default, the Remediation Projects tab is active.
- 895 -
3. In the Remediation Project table, click the row for the remediation project whose details you
want to view.
The Project Details page for remediations shows a high-level view of your remediation projects,
details about the vulnerability findings specified in the remediation project configurations, and the
current progress for each remediation project.
- 896 -
Note: Data on the Project Details page updates when you navigate away from or refresh the page.
Project Details
The Project Details page shows the following details about your remediation project:
Section Description
Project This section provides basic information about the remediation project
Information including the Start Date and Due Date of the project.
Scope This section shows the active filters applied to the remediation project. For
more information, see Remediation Filters.
Findings This section includes a table that lists all of your findings related to the
remediation project. In this table, you can view the following information:
l Port — The port that the scanner used to connect to the asset where
the scan detected the vulnerability.
l Last Updated — The date when a scan last found the vulnerability on
an asset.
l Asset Name — The name of the asset where a scan detected the
vulnerability. This value is unique to Tenable Vulnerability
- 897 -
Management.
1. Select the check box next to the Finding(s) you want to export.
Required Tenable Vulnerability Management User Role: Basic User, Scan Operator, Standard, Scan
Manager, or Administrator
The Remediation page appears. By default, the Remediation Projects tab is active.
- 898 -
3. To edit a remediation project:
l In the Remediation Projects table, right-click the row for the remediation project
you want to edit.
l In the Remediation Projects table, select the check box for the remediation
project that you want to edit.
l In the Remediation Projects table, in the Actions column, click the button in
the row for the project that you want to edit.
4. Click Edit.
6. Click Save.
Tenable Vulnerability Management saves the remediation project and the Remediation
Projects page appears.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
- 899 -
When you create a remediation project, it is in the Pending state. You must activate the project for
it to start tracking the progress of the remediation project.
Note: To activate a project, you must define the scope and assignee.
The Remediation page appears. By default, the Remediation Projects tab is active.
l In the Remediation Projects table, right-click the row for the remediation project you
want to activate.
l In the Remediation Projects table, select the check box for the remediation project that
you want to activate.
l In the Remediation Projects table, in the Actions column, click the button in the row
for the project that you want to activate.
4. Click Activate.
- 900 -
Tenable Vulnerability Management activates the remediation project.
The Remediation Projects page appears and the Status column shows the project as Active.
Required Tenable Vulnerability Management User Role: Basic User, Scan Operator, Standard, Scan
Manager, or Administrator
Suspending a remediation project temporarily stops the project from tracking the progress of the
project. When you suspend a project, the status of the project remains the same until the project is
activated.
The Remediation page appears. By default, the Remediation Projects tab is active.
l In the Remediation Projects table, right-click the row for the remediation project you
want to suspend.
- 901 -
l In the Remediation Projects table, select the check box for the remediation project that
you want to suspend.
In the action bar, Tenable Vulnerability Management enables More > Suspend.
l In the Remediation Projects table, in the Actions column, click the button in the row
for the project that you want to suspend.
4. Click Suspend.
The Remediation Projects page appears and the Status column shows the project as
Suspended.
Required Tenable Vulnerability Management User Role: Basic User, Scan Operator, Standard, Scan
Manager, or Administrator
A closed remediation project means that it has ended. But you can activate a closed project, if
needed. Projects do not automatically close even if all the tasks are complete or if the projects
reach their due date. You have to close the project manually by changing the project status to
Closed once it is complete.
The Remediation page appears. By default, the Remediation Projects tab is active.
- 902 -
3. Do one of the following:
l In the Remediation Projects table, right-click the row for the remediation project you
want to close.
l In the Remediation Projects table, select the check box for the remediation project that
you want to close.
In the action bar, Tenable Vulnerability Management enables More > Close.
l In the Remediation Projects table, in the Actions column, click the button in the row
for the project that you want to close.
4. Click Close.
The Remediation Projects page appears and the Status column shows the project as Closed.
- 903 -
The Remediation page appears. By default, the Remediation Projects tab is active.
3. (Optional) Refine the table data. For more information, see Tenable Vulnerability Management
Workbench Tables.
-or-
In the remediation projects table, in the Actions column, click the button in the row
for the remediation project you want to export.
b. Click Export.
- 904 -
Note: You can individually select and export up to 200 remediation projects. If you want to
export more than 200 remediation projects, you must select all the remediation projects on
your Tenable Vulnerability Management instance by selecting the check box at the top of the
Projects table and then click Export.
Format Description
CSV A CSV text file that contains a list of tag categories or values.
Note: If your .csv export file includes a cell that begins with any of the following
characters (=, +, -, @), Tenable Vulnerability Management automatically inputs a
single quote (') at the beginning of the cell. For more information, see the
related knowledge base article.
JSON A JSON file that contains a nested list of tag categories or values.
7. (Optional) Deselect any fields you do not want to appear in the export file.
8. In the Expiration box, type the number of days before the export file ages out.
Note: Tenable Vulnerability Management allows you to set a maximum of 30 calendar days for export
expiration.
l In the Start Date and Time section, select the date and time on which you want the
export schedule to start.
- 905 -
l In the Time Zone drop-down box, select the time zone to which you want the schedule
to adhere.
l In the Repeat drop-down box, select how often you want the export to repeat.
l In the Repeat Ends drop-down, select the date on which you want the schedule to end.
Note: If you select never, the schedule repeats until you modify or delete the export schedule.
Note: You can enable email notifications with or without scheduling exports.
l In the Add Recipients box, type the email addresses to which you want to send the
export notification.
l (Required) In the Password box, type a password for the export file. You must share this
password with the recipients to allow them to download the file.
Note: Tenable Vulnerability Management sends an email to the recipients and from the link in
the email, the recipients can download the file by providing the correct password.
Tenable Vulnerability Management begins processing the export. Depending on the size of the
exported data, Tenable Vulnerability Management may take several minutes to process the
export.
When processing completes, Tenable Vulnerability Management downloads the export file to
your computer. Depending on your browser settings, your browser may notify you that the
download is complete.
12. Access the export file via your browser's downloads directory. If you close the export plane
before the download finishes, then you can access your export file in the Export Management
View.
- 906 -
Required Tenable Vulnerability Management User Role: Basic User, Scan Operator, Standard, Scan
Manager, or Administrator
The Remediation page appears. By default, the Remediation Projects tab is active.
- 907 -
3. To delete one or more remediation projects:
Delete Action
b. Click Delete.
Delete multiple a. In the Remediation Projects table, select more than one
remediation remediation projects that you want to delete.
projects
Tenable Vulnerability Management enables the Delete button in
the action bar.
b. Click Delete.
Remediation Goals
A remediation goal allows you to measure the effectiveness of your remediation program. By
setting a remediation goal, you can track whether your remediation projects are aptly tracking and
closing critical findings within a specific period.
- 908 -
l By fixed date — A remediation goal that must be met by the specified date. Otherwise, the
goal fails.
l Within the number of days — A remediation goal that must be met within a specific number of
days. Tenable Vulnerability Management classifies this type of goal as a dynamic goal or a
continuous goal.
l Ongoing — A continuous or dynamic goal that remains open until all findings of a specific
scope are fixed.
On the Remediation Goals page, you can perform the following tasks:
Required Tenable Vulnerability Management User Role:Basic User, Scan Operator, Standard, Scan
Manager, or Administrator
When creating a remediation goal, you can set the scope to be fixed or ongoing.
Fixed-scope goals — Applies to scenarios where a group of vulnerabilities or even just one
vulnerability needs remediation in a certain period of time.
Ongoing (open-scope) goals — Applies to a scenario where you have to ensure that there is always
an assigned owner to track a certain type of vulnerability, such as assigning all critical Tenable PCI
ASV vulnerabilities needing remediation to owners.
- 909 -
Required Tenable Vulnerability Management User Role: Basic User, Scan Operator, Standard, Scan
Manager, or Administrator
Remediation goals can be static or dynamic. Static remediation goals have a fixed due date,
whereas dynamic goals do not have a fixed due date, but you must meet the goal within a specified
time period or must be in an ongoing state.
For example, configure a dynamic remediation goal to ensure that Log4J findings must not exist in
the system. You can configure this remediation goal as Ongoing and if the count of Log4J findings
becomes greater than zero, then the goal fails.
The Remediation page appears. By default, the Remediation Projects tab is active.
- 910 -
4. In the upper-right corner, click Create Remediation Goal.
On the left side of the page, you can select from the following and click Next after each
selection:
Option Actions
Name l In the Goal Name box, type a name for the remediation goal.
Conditions In the Findings Filters section, the following filters are selected by
default.
You can modify the existing filters or add new filters to the list with
AND and OR options.
- 911 -
1. Under Findings Filters, click Select Filters.
4. In the first drop-down box, select the operator you want to apply
to the filter.
Goal Due Date Select and configure one of the following options:
l By fixed date — The date by when you must complete the goal.
5. Click Save.
- 912 -
Tenable Vulnerability Management saves the remediation goal.
Required Tenable Vulnerability Management User Role: Basic User, Scan Operator, Standard, Scan
Manager, or Administrator
The Remediation page appears. By default, the Remediation Projects tab is active.
- 913 -
4. In the Remediation Goals table, click any row for which you want to view the details.
The Goal Details page shows the following details about your remediation goal:
Section Description
Goal The type, start date, and due date of the remediation goal.
Information
Measure of The filters assigned for findings. If the number of instances that match the
Success filter is zero, it indicates that the remediation goal is a success.
Progress The overall progress of the remediation goal. You can view the following
information in this section:
Note: These parameters are applicable only for goals that have a fixed due date
(Static goals). For dynamic remediation goals, Tenable Vulnerability Management
does not show the progress bar.
Required Tenable Vulnerability Management User Role: Basic User, Scan Operator, Standard, Scan
Manager, or Administrator
- 914 -
1. In the upper-left corner, click the button.
The Remediation page appears. By default, the Remediation Projects tab is active.
l In the Remediation Goals table, right-click the row for the remediation goal you want to
edit.
- 915 -
l In the Remediation Goals table, select the check box for the remediation goal you want
to edit.
l In the Remediation Goals table, in the Actions column, click the button in the row for
the goal you want to edit.
5. Click Edit.
7. Click Save.
Required Tenable Vulnerability Management User Role:Scan Operator, Standard, Scan Manager, or
Administrator
The Remediation page appears. By default, the Remediation Projects tab is active.
- 916 -
3. Click the Remediation Goals tab.
l In the Remediation Goals table, right-click the row for the remediation goal you want to
activate.
l In the Remediation Goals table, select the check box for the remediation goal you want
to activate.
l In the Remediation Goals table, in the Actions column, click the button in the row for
the goal you want to activate.
5. Click Activate.
- 917 -
The Remediation Goals page appears and the Status column shows the project as Active.
Required Tenable Vulnerability Management User Role: Basic User, Scan Operator, Standard, Scan
Manager, or Administrator
You can temporarily suspend a goal and reactivate it any point of time.
The Remediation page appears. By default, the Remediation Projects tab is active.
- 918 -
4. Do one of the following:
l In the Remediation Goals table, right-click the row for the remediation goal you want to
suspend.
l In the Remediation Goals table, select the check box for the remediation goal you want
to suspend.
In the action bar, Tenable Vulnerability Management enables More > Suspend.
l In the Remediation Goals table, in the Actions column, click the button in the row for
the goal you want to suspend.
5. Click Suspend.
The Remediation Goals page appears and the Status column shows the goal as Suspended.
Required Tenable Vulnerability Management User Role: Basic User, Scan Operator, Standard, Scan
Manager, or Administrator
A closed remediation goal means that it has ended. But you can activate a closed goal, if needed.
The Remediation page appears. By default, the Remediation Projects tab is active.
- 919 -
3. Click the Remediation Goals tab.
l In the Remediation Goals table, right-click the row for the remediation goal you want to
close.
l In the Remediation Goals table, select the check box for the remediation goal you want
to close.
In the action bar, Tenable Vulnerability Management enables More > Close.
l In the Remediation Goals table, in the Actions column, click the button in the row for
the goal you want to close.
5. Click Close.
- 920 -
Tenable Vulnerability Management closes the remediation goal.
The Remediation Goals page appears and the Status column shows the project as Closed.
The Remediation page appears. By default, the Remediation Projects tab is active.
- 921 -
4. (Optional) Refine the table data. For more information, see Tenable Vulnerability Management
Workbench Tables.
-or-
In the remediation goals table, in the Actions column, click the button in the row for
the remediation goal you want to export.
b. Click Export.
Note: You can individually select and export up to 200 remediation goals. If you want to export
more than 200 remediation goals, you must select all the remediation goals on your Tenable
Vulnerability Management instance by selecting the check box at the top of the Goals table
and then click Export.
- 922 -
Note: By default, Tenable Vulnerability Management selects all fields.
l A text box to set the number of days before the export age outs.
Format Description
CSV A CSV text file that contains a list of tag categories or values.
Note: If your .csv export file includes a cell that begins with any of the following
characters (=, +, -, @), Tenable Vulnerability Management automatically inputs a
single quote (') at the beginning of the cell. For more information, see the
related knowledge base article.
8. (Optional) Deselect any fields you do not want to appear in the export file.
9. In the Expiration box, type the number of days before the export file age outs.
Note: Tenable Vulnerability Management allows you to set a maximum of 30 calendar days for export
expiration.
l In the Start Date and Time section, select the date and time on which you want the
export schedule to start.
l In the Time Zone drop-down box, select the time zone to which you want the schedule
to adhere.
l In the Repeat drop-down box, select how often you want the export to repeat.
- 923 -
l In the Repeat Ends drop-down, select the date on which you want the schedule to end.
Note: If you select never, the schedule repeats until you modify or delete the export schedule.
Note: You can enable email notifications with or without scheduling exports.
l In the Add Recipients box, type the email addresses to which you want to send the
export notification.
l (Required) In the Password box, type a password for the export file. You must share this
password with the recipients to allow them to download the file.
Note: Tenable Vulnerability Management sends an email to the recipients and from the link in
the email, the recipients can download the file by providing the correct password.
Tenable Vulnerability Management begins processing the export. Depending on the size of the
exported data, Tenable Vulnerability Management may take several minutes to process the
export.
When processing completes, Tenable Vulnerability Management downloads the export file to
your computer. Depending on your browser settings, your browser may notify you that the
download is complete.
13. Access the export file via your browser's downloads directory. If you close the export plane
before the download finishes, then you can access your export file in the Export Management
View.
Required Tenable Vulnerability Management User Role: Basic User, Scan Operator, Standard, Scan
Manager, or Administrator
- 924 -
1. In the upper-left corner, click the button.
The Remediation page appears. By default, the Remediation Projects tab is active.
Delete Action
- 925 -
The action buttons appear in the row.
b. Click Delete.
b. Click Delete.
Solutions
Tenable provides recommended solutions for all vulnerabilities on your network. You can sort
recommended solutions by VPR to identify your highest priority solutions, then drill into the solution
details to understand the steps to address the vulnerability on your network.
Note: You cannot view solution details without a Tenable Lumin license. For more information, see
Welcome to Tenable Lumin.
View Solutions
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
- 926 -
Tenable provides recommended solutions for all vulnerabilities on your network. You can sort
recommended solutions by Vulnerability Priority Rating (VPR) to identify your highest priority
solutions, then drill into the solution details to understand the steps to address the vulnerability on
your network.
Tip: A vulnerability instance is a single instance of a vulnerability appearing on an asset, identified uniquely
by plugin ID, port, and protocol.
2. In the left navigation plane, in the Vulnerability Management section, click Solutions.
Note: All Tenable Lumin data reflects all assets within the organization's Tenable Vulnerability
Management instance.
Section Action
- 927 -
l CVE Count — The CVEs included in the solution.
Solutions Filters
On the Solutions page, you can filter vulnerabilities using Tenable-provided filters and filters based
on asset tags.
Tenable-provided Filters
Tenable Vulnerability Management provides the following solutions filters:
Filter Description
ACR Severity The ACR severity of assets associated with the solution.
AES Severity The AES severity of assets associated with the solution.
Asset ID The UUID of assets associated with the solution. This value is unique to
Tenable Vulnerability Management.
CVE Count The Common Vulnerability and Exposure (CVE) count associated with the
- 928 -
solution.
CVSS Severity The Common Vulnerability Scoring System (CVSS) severity of vulnerabilities
associated with the solution.
License Status The licensing status of assets associated with the solution.
VPR The Vulnerability Priority Rating (VPR) of vulnerabilities associated with the
solution.
Tag Filters
In Tenable Vulnerability Management, tags allow you to add descriptive metadata to assets that
helps you group assets by business context. For more information, see Tags.
In the Category drop-down box for a filter, your organization's tags appear at the bottom of the list,
after the Tenable-provided filters.
Export Solutions
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
In the new interface, the export feature allows you to export solution data .csv file format.
- 929 -
To export solutions as a .csv file:
2. In the left navigation plane, in the Vulnerability Management section, click Solutions.
5. Click the check box next to the Data option you want included in the export file.
Data Description
Details Includes solutions data and data for assets affected where Tenable
recommends the solutions.
6. Click Export.
Tenable Vulnerability Management begins processing the report. Depending on the size of the
exported data, Tenable Vulnerability Management may take several minutes to process the
report.
When processing completes, Tenable Vulnerability Management downloads the export file to
your computer. Depending on your browser settings, your browser may notify you that the
download is complete.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
- 930 -
You can use this page to view details for a solution, including asset and vulnerability information.
2. In the left navigation plane, in the Vulnerability Management section, click Solutions.
Section Action
Summary panel
- 931 -
l VPR — The VPR for the vulnerability.
ACR tiles View the ACR severity tiles, which summarize the number of
affected assets in the Low, Medium, High, or Critical, or
Unclassified ACR category.
- 932 -
l ACR — The asset's ACR.
- 933 -
Tenable Container Security Dashboard
Important: Tenable has announced the End of Life for Legacy Container Security. You can continue to
access the application and receive support through September 30, 2024. Tenable recommends that you
move to the current version of Container Security immediately (available through the new Cloud Security
tile). For more information, see the End of Life bulletin.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
The Container Security dashboard acts as landing page for Tenable Container Security. This
dashboard contains widgets that show high-level information about your containers, images and
image repositories, and policies. Click a widget on the dashboard to view details about the item
type or to import data items (for example, images) into Tenable Container Security.
Note: For information about how Tenable Container Security evaluates risks for your assets, see Risk
Metrics in Tenable Container Security.
Configure Tenable Container Security scans to collect data about your containers for analysis.
Depending on your organization, one person may perform all the steps, or several people may share
the steps.
l If you want to upload a specific image to Tenable Container Security for scanning,
download the image from your external registry and push the image to Tenable
- 934 -
Container Security.
l If you want to import all the images from a registry to Tenable Container Security for
scanning, configure a connector to import images from a registry.
Note: If you use a connector to import and scan your images, Tenable Container
Security may take up to several hours to display your images on the dashboard.
If your images do not appear on the dashboard within 24 hours of when you begin
the import, contact Tenable Support.
l If you want to scan an image directly from your organization's local registry, or from your
machine, download and run the Tenable Container Security Scanner.
The amount of time Tenable Container Security takes to scan the images in your registry and
display the results depends on the size and number of images you scan.
Note: The data Tenable Container Security retains when you import an image depends on the import
method you use.
l Docker command or connector — Tenable Container Security retains the image itself, as
well as all metadata associated with the image (e.g., image layers, software packages on the
image., etc.).
l Container Security Scanner — Tenable Container Security retains only the metadata
associated with the image.
When you delete the image, Tenable Container Security removes the entire image and all
image metadata.
2. Navigate the Tenable Container Security dashboard to view and manage your scan data.
Note: Tenable Container Security imports and rescans your images at regular intervals, beginning when
you first import and scan the images.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
- 935 -
You can use a Docker command to log in to Tenable Container Security Scanner to push images via
the Docker command-line interface (CLI).
To navigate the interface and use other features, log in via the Tenable Vulnerability Management
interface. For more information, see Log in to Tenable Vulnerability Management.
Note: If you are an administrator logging in to your Tenable Vulnerability Management instance for
the first time, Tenable provides your first-time credentials during setup. After you log in for the first
time, you can set your new password. If you are logging in to Tenable Vulnerability Management after
initial setup, your username is the email address you used to register for your Tenable Vulnerability
Management account.
l Review the System Requirements in the General Requirements User Guide and confirm that
your computer and browser meet the requirements.
4. Press Enter.
6. Press Enter.
The Docker CLI logs you in to the Tenable Container Security registry.
- 936 -
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
Use Docker commands to download the image from the external registry where it resides and
import it to Tenable Container Security.
The amount of time Tenable Container Security takes to scan the images in your registry and
display the results depends on the size and number of images you scan.
1. In the CLI, run the following command to download the image from an external registry:
2. In the CLI, run the following command to add the registry.cloud.tenable.com tag.
Note: The registry.cloud.tenable.com tag prompts Docker to push the image to Tenable
Container Security. If you do not add the registry.cloud.tenable.com tag, Docker automatically
pushes the image to the Docker central repository.
3. In the CLI, run the following command to push the tagged image to Tenable Container
Security.
- 937 -
Docker pushes the image to Tenable Container Security. Tenable Container Security scans the
images for vulnerabilities.
Note: When you import container images to scan, Tenable Container Security may abort
the scan if the scan has been running for 60 minutes. If this happen, Scan Failed appears
on the Images page in the Vulnerabilities and Malware columns for the aborted images.
If Tenable Container Security aborts your scan, try simplifying your images before you
import them, as described in the Docker Documentation. Alternatively, you can use the
Tenable Container Security Scanner to scan your images without importing them to
Tenable Container Security.
If Tenable Container Security still aborts your scan, contact Tenable Support.
What to do next:
l View the results of your scan, as described in View Scan Results for Container Images.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
These steps assume you are already comfortable using Bamboo and are already pushing Docker
images to a public or private registry. If you are already using Bamboo, but have not built Docker
container images, familiarize yourself with the Bamboo documentation Configuring the Docker task
in Bamboo.
Steps
1. Create a new Docker task for the relevant job.
- 938 -
3. Depending on whether you want the task to run, select or clear the Disable this task check
box.
4. Select Push a Docker image to a Docker registry command and complete the settings.
Tenable Vulnerability Management sends the Bamboo builds to Tenable Container Security for
storage, distribution, vulnerability scanning, and malicious code scanning.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
These steps assume you are already comfortable using CircleCI and are already pushing Docker
images to a public or private registry. If you are already using CircleCI, but have not built Docker
container images, familiarize yourself with the CircleCI documentation Continuous Integration and
Delivery with Docker.
machine:
services:
- docker
dependencies:
override:
- docker info
- docker build -t circleci/elasticsearch .
test:
- 939 -
override:
- docker run -d -p 9200:9200 circleci/elasticsearch; sleep 10
- curl --retry 10 --retry-delay 5 -v http://localhost:9200
deployment:
hub:
branch: master
commands:
- docker push circleci/elasticsearch
The following lines in circle.yml instruct CircleCI to use Docker for the build process:
machine:
services:
- docker
The following lines in circle.yml instruct CircleCI to build the elasticsearch image in the
circleci/ repository:
dependencies:
override:
- docker info
- docker build -t circleci/elasticsearch .
The following are the most important lines for adding Tenable Container Security integration to
CircleCI environments. These lines instruct CircleCI to use Docker to log in to the registry (in this
case to Docker Hub, since no private registry is specified) and push cicleci/elasticsearch to
the registry:
deployment:
hub:
branch: master
commands:
- docker login -u $DOCKER_USER -p $DOCKER_PASS
- docker push circleci/elasticsearch
Steps
- 940 -
1. To add environment variables for the project in the CircleCI console, open the project, click
Project Settings, then click Environment Variables.
Variable Description
TENABLE_IO_ The email that you use to log in to Tenable Container Security.
CONTAINER_
SECURITY_EMAIL
TENABLE_IO_ For hosted cloud users of Tenable Container Security, this value
CONTAINER_ is registry.cloud.tenable.com.
SECURITY_ENDPOINT
3. To add support for Tenable Container Security, update the circle.yml file as follows:
machine:
environment:
VERSION: 2.1.1
TAG: ${VERSION}
services:
- docker
dependencies:
override:
- docker info
- docker version
- docker build -t $TENABLE_IO_CONTAINER_SECURITY_ENDPOINT/circleci/elasticsearch .
test:
override:
- docker run -d -p 9200:9200 $TENABLE_IO_CONTAINER_SECURITY_
ENDPOINT/circleci/elasticsearch; sleep 10
- curl --retry 10 --retry-delay 5 -v registry.cloud.tenable.com
- 941 -
deployment:
hub:
branch: master
commands:
- docker login -u $TENABLE_IO_ACCESS_KEY -p $TENABLE_IO_SECRET_KEY
- docker tag $TENABLE_IO_CONTAINER_SECURITY_ENDPOINT/circleci/elasticsearch
$TENABLE_IO_CONTAINER_SECURITY_ENDPOINT/circleci/elasticsearch:${TAG}
- docker push $TENABLE_IO_CONTAINER_SECURITY_
ENDPOINT/circleci/elasticsearch:${TAG}
- docker logout
Tenable Vulnerability Management sends the CircleCI builds to Tenable Container Security for
storage, distribution, vulnerability scanning, and malicious code scanning.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
These steps assume you are already comfortable using Codeship and are already pushing Docker
images to a public or private registry. If you are already using Codeship, but have not built Docker
container images, familiarize yourself with the Codeship documentation Pushing to a remote
registry.
Steps
1. Edit the codeship-services.yml file to use the repository name and image name specified
in Tenable Container Security.
- 942 -
app:
build:
image: repository_name/image_name
dockerfile_path: Dockerfile
Note: If this is the first time you are pushing an image into the repository, there is not a
preconfigured image name. The image name is added automatically after the push from Codeship.
2. Edit the service section of the codeship-steps.yml file to look similar to the following
example:
service:
app type: push
image_name: repository_name/image_name
registry: registry.cloud.tenable.com
encrypted_dockercfg_path: dockercfg.encrypted
Tenable Vulnerability Management sends the Codeship builds to Tenable Container Security
for storage, distribution, vulnerability scanning, and malicious code scanning.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
These steps assume you are already comfortable using Distelli and are already pushing Docker
images to a public or private registry. If you are already using Distelli, but have not built Docker
container images, familiarize yourself with the Distelli documentation on the Distelli Manifest. You
can use the Distelli manifest file by either using the Distelli WebUI Manifest, or by editing the
distelli-manifest.yml file directly.
- 943 -
Steps
1. Log in to Distelli and navigate to an application.
3. To add support for Tenable Container Security, modify the Build section to look like the
following example:
This modification adds the Tenable Container Security URI to docker login.
Tenable Vulnerability Management sends Distelli builds to Tenable Container Security for
storage, distribution, vulnerability scanning, and malicious code scanning.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
- 944 -
These steps assume you are already comfortable using Drone.io and are already pushing Docker
images to a public or private registry. For more information about Drone.io, see the Drone.io
Documentation.
If you use Drone.io to build Docker container images, you should already have a build script (usually
a build.sh file) that looks like the following:
Steps
1. Open the build.sh file.
2. Append a docker login directive before the docker push directive in the script, as in the
following example:
Tenable Vulnerability Management sends Drone.io builds for this project to Tenable Container
Security for storage, distribution, vulnerability scanning, and malicious code scanning.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
- 945 -
These steps assume you are already comfortable using Jenkins and are already pushing Docker
images to a public or private registry. If you are already using Jenkins, but have not built Docker
container images, familiarize yourself with the documentation for the Jenkins CloudBees Docker
Build and Publish plugin.
Click here for instructions on how to install the CloudBees Docker Build and Publish
plugin.
1. Log in to Jenkins.
3. Click Installed.
4. Click Available.
5. In the Filter box, type CloudBees Docker Build and Publish plugin.
The CloudBees Docker Build and Publish plugin is installed and ready for use by Jenkins jobs.
Steps
1. On the Jenkins dashboard, select the job you want to modify.
2. Click Configure.
l Repository Name: The repository name and image name. For example, if you build a
rabbitmq container image, you can name the repository rabbitmq and the image
rabbitmq. In this example, in the Repository Name box, type rabbitmq/rabbitmq.
l Tag: The tag name. The simplest tag name to use is latest.
- 946 -
l Docker Host URI: The Jenkins path to the Docker Host. If the Docker Host is running on
localhost, then in the Docker Host URI box, type tcp://127.0.0.1:4243.
l Docker registry URL: The Tenable Container Security API endpoint, which in this case is
registry.cloud.tenable.com.
l Registry credentials: The registry credentials that you select from the box.
5. Click Add.
6. Click Save.
Tenable Vulnerability Management sends the Jenkins builds to Tenable Container Security for
storage, distribution, vulnerability scanning, and malicious code scanning.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
These steps assume you are already comfortable using Shippable and are already pushing Docker
images to a public or private registry. If you are already using Shippable, but have not built Docker
container images, familiarize yourself with the Shippable documentation.
- 947 -
Steps
1. Log in to Shippable.
2. In the upper-right corner of the screen, click the Account Settings button.
9. In the Email box, type the email address associated with your Tenable Container Security
account.
Your Tenable Container Security account is now available for hosting container images built
by Shippable.
12. Click Hub, and select the Tenable Container Security integration that you created.
14. In the Push image to box, type the name of your repository and image in Tenable Container
Security (for example, testrepo/nodejs).
15. In the Push Image Tag box, select from the following options: default, commitsha, or latest.
Tenable Vulnerability Management sends Shippable builds to Tenable Container Security for
storage, distribution, vulnerability scanning, and malicious code scanning.
- 948 -
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
These steps assume you are already comfortable using Solano Labs and are already pushing Docker
images to a public or private registry. If you are already using Solano Labs, but have not built Docker
container images, familiarize yourself with the Solano Labs documentation.
Note: Solano Labs support for building Docker container images is in private beta. For customers
interested in participating, Solano Labs recommends contacting Solano Labs support.
Steps
1. Open the solano.yml file, which should look similar to the following example:
- 949 -
# Use docker-enabled workers (currently private beta - contact
[email protected])
system:
docker: true
python:
python_version: 2.7
hooks:
pre_setup: |
set -ex
sudo apt-get update -qq
sudo docker pull jenkins
sudo docker build -t myrepo/jenkins-dsl-ready .
post_build: |
docker login -u $TENABLE_IO_ACCESS_KEY -p $TENABLE_IO_SECRET_KEY
registry.cloud.tenable.com
docker push myrepo/jenkins-dsl-ready
tests:
- python -m doctest build/resolve_jenkins_plugins_dependencies.py
Tenable Vulnerability Management sends the Solano Labs builds to Tenable Container Security
for storage, distribution, vulnerability scanning, and malicious code scanning.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
These steps assume you are already comfortable using Travis CI and are already pushing Docker
images to a public or private registry. If you are already using Travis CI, but have not built Docker
container images, familiarize yourself with the Travis CI documentation Using Docker in Builds.
- 950 -
If you are using Travis CI to build Docker container images, you should have a travis.yml file in
your project source control repository that looks similar to:
sudo: required
language: ruby
services:
- docker
before_install:
- docker build -t carlad/sinatra .
- docker run -d -p 127.0.0.1:80:4567 carlad/sinatra /bin/sh -c "cd /root/sinatra; bundle exec
foreman start;"
- docker ps -a
- docker run carlad/sinatra /bin/sh -c "cd /root/sinatra; bundle exec rake test"
script:
- bundle exec rake test
The following lines in travis.yml instruct Travis CI to use Docker for the build process:
sudo: required
services:
- docker
The following lines in travis.yml instruct Travis CI to build the sinatra image in the carlad/
repository:
before_install:
- docker build -t carlad/sinatra .
Steps
1. Open the travis.yml file.
env:
global:
- 951 -
- secure: "UkF2CHX0lUZ...VI/LE=" # TENABLE_IO_CONTAINER_SECURITY_EMAIL
- secure: "Z3fdBNPt5hR...VI/LE=" # TENABLE_IO_CONTAINER_SECURITY_USER
- secure: "F4XbD6WybHC...VI/LE=" # TENABLE_IO_CONTAINER_SECURITY_PASSWORD
- COMMIT=${TRAVIS_COMMIT::8}
after_success:
- docker login -u $TENABLE_IO_CONTAINER_SECURITY_EMAIL -p $TENABLE_IO_CONTAINER_SECURITY_
PASSWORD registry.cloud.tenable.com
- export REPO=web-login-site/web-login-site
- export TAG=`if [ "$TRAVIS_BRANCH" == "master" ]; then echo "latest"; else echo $TRAVIS_
BRANCH; fi`
- docker build -f Dockerfile -t $REPO:$COMMIT .
- docker tag $REPO:$COMMIT registry.cloud.tenable.com/$REPO:$TAG
- docker tag $REPO:$COMMIT registry.cloud.tenable.com/$REPO:travis-$TRAVIS_BUILD_NUMBER
- docker push registry.cloud.tenable.com/$REPO:travis-$TRAVIS_BUILD_NUMBER
- docker push registry.cloud.tenable.com/$REPO:$TAG
Tenable Vulnerability Management sends the Travis CI builds to Tenable Container Security for
storage, distribution, vulnerability scanning, and malicious code scanning.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
These steps assume you are already comfortable using Wercker and are already pushing Docker
images to a public or private registry. If you are already using Wercker, but have not built Docker
container images, familiarize yourself with the Wercker documentation.
Steps
1. In your project source control repository, open the wercker.yml file.
2. Add support for Tenable Container Security by changing the deploy directive as follows:
- 952 -
deploy:
steps:
- internal/docker-push:
username: $USERNAME
password: $PASSWORD
tag: my-amazing-tag
repository: turing/bar
registry: registry.cloud.tenable.com
Tenable Vulnerability Management sends the Wercker builds to Tenable Container Security for
storage, distribution, vulnerability scanning, and malicious code scanning.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
You can run the Tenable Container Security Scanner with Kubernetes to scan container images
securely without sending the images outside your organization's network. For more information, see
Tenable Container Security Scanner.
l Prepare Kubernetes Objects to Configure and Run the Tenable Container Security Scanner
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
The machine where you want to run the Tenable Container Security Scanner with Kubernetes must
meet the following requirements:
- 953 -
Internet
The machine where you want to run the Container Security Scanner must have access when you
download and run the scanner.
Note: Mozilla's CA Certificate Store is the Tenable Container Security Scanner's trusted certificate
authority.
Note: If you want the Container Security Scanner to scan the registry without verifying that a trusted CA
signed the certificate, you must include the ALLOW_INSECURE_SSL_REGISTRY variable when you run the
scanner. For more information, see Environment Variables.
Prepare Kubernetes Objects to Configure and Run the Tenable Container Security Scanner
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
You must prepare your Kubernetes namespace and secret objects before you can configure and run
the Container Security Scanner in Kubernetes. The Container Security Scanner refers to these
objects when it scans an image in Kubernetes.
For more information about how to create objects in Kubernetes, see the Kubernetes
documentation at kubernetes.io.
- 954 -
Before you begin:
l Download the Container Security Scanner, as described in Download the CS Scanner.
To prepare Google Kubernetes Engine (GKE) to configure and run the Container
Security Scanner:
1. Log in to the CLI on the machine where you want to configure and run the Container
Security Scanner.
tiocsscanner-namespace.yaml
apiVersion: v1
kind: Namespace
metadata:
name: tiocsscanner
labels:
name: tiocsscanner
4. In the CLI, run the following command to deploy the tiocsscanner-namespace.yaml file to
GKE:
Note: The above command works only if you save the file to the current working directory.
If you save the file somewhere other than the working directory, include the full path
directory in the command. For example:
kubectl apply -f /home/jsmith/images/tiocsscanner-namespace.yaml
5. Configure secrets for your Tenable Vulnerability Management access and secret keys. For
example:
- 955 -
kubectl create secret generic tio \
--from-literal=username=<Your Tenable Vulnerabiltiy Management access key> \
--from-literal=password=<Your Tenable Vulnerability Management secret key> \
--namespace=tiocsscanner
6. Configure secrets for your Google Container Registry (GCR) registry username and password
(obtained from step 3 and 4 in Prepare your GCP GCR) for the image you want the scanner to
pull. For example:
7. Deploy your secrets to the registry where the image you want to scan is stored. For example:
Configure secrets for the registry where the Tenable Container Security scanner image is
stored. For example:
What to do next:
l Configure and run the Container Security Scanner in Kubernetes, as described in Configure
and Run the CS Scanner in Kubernetes.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
- 956 -
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
To scan images with the Container Security Scanner in Kubernetes, create a Kubernetes
deployment file and deploy the file via the CLI on the machine where you want to run the scan.
l Download the Container Security Scanner, as described in Download the Tenable Container
Security Scanner.
l Prepare Kubernetes to configure and run the Container Security Scanner, as described in the
Prepare Kubernetes Objects to Configure and Run the Tenable Container Security Scanner.
3. Copy and paste the following text into the tiocsscanner-deployment.yaml file, typing your
specific variables where applicable. For information about the following variables, see
Environment Variables.
Note: The following sample tiocsscanner-deployment.yaml file generally works for Google
Kubernetes Engine (GKR) with Google Cloud Registry (GCR). You may need to change the value of
apiVersion, depending on which version of Kubernetes you are using.
tiocsscanner-deployment.yaml
apiVersion: v1
kind: Service
metadata:
name: tiocsscanner
namespace: tiocsscanner
labels:
app: tiocsscanner
spec:
selector:
- 957 -
app: tiocsscanner
type: ClusterIP
ports:
- name: http
protocol: TCP
port: 5000
---
apiVersion: extensions/v1beta1
kind: Deployment
metadata:
labels:
app: tiocsscanner
name: tiocsscanner
namespace: tiocsscanner
spec:
minReadySeconds: 10
replicas: 1
selector:
matchLabels:
app: tiocsscanner
strategy:
rollingUpdate:
maxSurge: 1
maxUnavailable: 1
type: RollingUpdate
template:
metadata:
labels:
app: tiocsscanner
spec:
imagePullSecrets:
- name: jfrog-tio
containers:
- image: "tenableio-docker-consec-local.jfrog.io/cs-scanner:latest"
name: tiocsscanner
resources:
limits:
cpu: "3"
requests:
cpu: "1.5"
memory: "2Gi"
args:
- import-registry
env:
- name: TENABLE_ACCESS_KEY
valueFrom:
secretKeyRef:
name: tio
key: username
- name: TENABLE_SECRET_KEY
valueFrom:
secretKeyRef:
name: tio
key: password
- name: REGISTRY_USERNAME
valueFrom:
- 958 -
secretKeyRef:
name: gcr-registry
key: username
- name: REGISTRY_PASSWORD
valueFrom:
secretKeyRef:
name: gcr-registry
key: password
- name: IMPORT_REPO_NAME
value: "<variable>"
- name: REGISTRY_URI
value: "https://[gcr-domain]/[project]"
- name: IMPORT_INTERVAL_MINUTES
value: "<variable>"
Note: If your project name in GCP is myapigw and the registry is in the gcr.io domain, the value of
REGISTRY_URI is "https://gcr.io/myapigw".
5. In the command-line interface on the machine where you want to run the scan, run the
following command to deploy the file:
Note: The above command works only if you save the file to the current working directory.
If you save the file somewhere other than the working directory, include the full path
directory in the command. For example:
/home/jsmith/images/tiocsscanner-namespace.yaml
6. Press Enter.
7. In the command-line interface, run the following command to confirm the scan ran
successfully:
Note: If you receive error messages in the scan data, follow the error prompts to correct the issue.
- 959 -
What to do next:
l View the results of your scan, as described in View Scan Results for Container Images.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
The Tenable Container Security Scanner (Container Security Scanner) allows you to scan container
images securely without sending the images outside your organization's network. The Container
Security Scanner takes an initial inventory, or snapshot, of the images you want to scan and sends
the inventory to Tenable Vulnerability Management for analysis. You can then view scan data for the
images alongside data for images imported normally to Tenable Vulnerability Management. With the
Container Security Scanner, you can scan:
l A specific image exported from a registry and stored locally on the machine where you install
the scanner.
You can configure and run the Container Security Scanner on any machine that meets the system
requirements.
First, download the Container Security Scanner to your machine. Then, configure and run the
Container Security Scanner. After your scan completes, you can view the scan results in the
Tenable Container Security dashboard.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
The machine where you want to run the Tenable Container Security Scanner must meet the
following requirements.
- 960 -
Type Requirements Storage
Internet
The machine where you want to run the Container Security Scanner must have access to the
Internet when you download and run the scanner. The machine must allow outbound HTTPS traffic
for communications with the cloud.tenable.com server.
Note: Mozilla's CA Certificate Store is the Tenable Container Security Scanner's trusted certificate
authority.
Note: If you want the Container Security Scanner to scan the registry without verifying that a trusted CA
signed the certificate, you must include the ALLOW_INSECURE_SSL_REGISTRY variable when you run the
scanner. For more information, see Environment Variables.
l Docker images
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
- 961 -
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
Download the Container Security Scanner Docker image to the machine where you want to
configure and run the Container Security Scanner.
3. Copy or take a screenshot of the credentials to use later in the download process.
4. In the command-line interface (CLI) on the machine where you want to download the
Container Security Scanner, run the following command:
5. Press Enter.
6. Update the fields using the credentials provided on the CS Scanner plane.
7. Press Enter.
- 962 -
8. Type the following to pull the latest version of the Container Security Scanner image:
9. Press Enter.
What to do next:
l Configure and run the Container Security Scanner, as described in Configure and Run the
Tenable Container Security Scanner.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
You must use the CLI on your computer to configure your environment variables and run the
Container Security Scanner.
You can configure and run the Container Security Scanner as many times as necessary, using any
combination of registries and registry sources.
Environment Variables
Require Supporte
Variable Description Type
d d Mode
Registry
Import
- 963 -
Registry
Import
REGISTRY_ The URI of the registry from which you String No Registry
URI want to import the image. Import
- 964 -
l Azure registry — Type your service
principal ID for the registry. For
more information about how to
create a service principal, see
Azure Documentation.
- 965 -
Documentation.
TENABLE_ The URL for the HTTP proxy the String No Image
PROXY Container Security Scanner uses to Inspect
connect to Tenable Vulnerability
or
Management.
Registry
Set this variable if the machine where
Import
you deployed the Container
Security Scanner requires a proxy server
to connect to Tenable Vulnerability
Management.
- 966 -
Tenable Vulnerability Management, you
can apply both the REGISTRY_PROXY
variable and the TENABLE_PROXY
variable to your configuration. Run the
Container Security Scanner in Registry
Import mode if you apply both variables.
<username>:<password>@<ho-
st>:<port>
<host>:<port>
REGISTRY_ The URL for the HTTP proxy the String No Registry
PROXY Container Security Scanner uses to Import
connect to your registry.
- 967 -
scan.
<username>:<password>@<ho-
st>:<port>
<host>:<port>
- 968 -
the Tenable Container Security Scanner
in Registry Import mode and you want
the scanner to include only images with a
certain name or tag in the scan.
- 969 -
tag set assigned to images that you
want included in <image>:<name>
format.
- 970 -
Note: You cannot include an IMAGE_
NAME_BLACKLIST variable and an IMAGE_
NAME_WHITELIST variable in the same
scan configuration.
- 971 -
the latest tag are excluded from the
scan.
- 972 -
l Policy check timed out — Tenable
Container Security Scanner
provides the following message:
Fatal error: Timed out
trying to retrieve report.
- 973 -
By default, the Container
Security Scanner times out unanswered
request for a policy after 600 seconds.
- 974 -
Support requests it.
- 975 -
(times out) the request.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
When you run the Tenable Container Security Scanner, you can configure it to scan a single image
or all images hosted in a repository.
l To scan a single image, configure and run the Container Security Scanner in Image Inspect
mode.
l To scan all images in a registry, configure and run the Container Security Scanner in Registry
Import mode.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
- 976 -
Required Additional License: Tenable Container Security
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
Run the Container Security Scanner in Image Inspect mode to scan a single image.
l Confirm your local machine meets the system requirements, as described in CS Scanner
System Requirements.
1. In the command-line interface of the machine where you want to run the scanner, run the
customized configuration and command for your deployment type using the following
parameters:
Note: Some of the following variables are not required to run the scanner. For information about
these variables and their definitions, see Environment Variables.
docker save <your image name as it appears in the repository> | docker run \
-e TENABLE_ACCESS_KEY=<variable> \
-e TENABLE_SECRET_KEY=<variable> \
-e IMPORT_REPO_NAME=<variable> \
-i tenableio-docker-consec-local.jfrog.io/cs-scanner:latest inspect-image <Image name as you
want it to appear in Tenable Vulnerability Management
2. Press Enter.
What to do next:
l View the results of your scan, as described in View Scan Results for Container Images.
- 977 -
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
Run the Container Security Scanner in Registry Import mode to scan all images in a registry.
l (Optional) To scan images hosted in an Amazon Web Services (AWS) Elastic Container Registry
(ECR), an Azure registry, or a Google Container Registry (GCR), prepare your registry as
described in Prepare your Registry.
1. In the command-line interface of the machine where you want to run the scanner, run the
customized configuration and command for your deployment type using the following
parameters:
Note: Some of the following variables are not required to run the scanner. For information about
these variables and their definitions, see Environment Variables.
docker run \
-e TENABLE_ACCESS_KEY=<variable> \
-e TENABLE_SECRET_KEY=<variable> \
-e IMPORT_REPO_NAME=<variable> \
-e REGISTRY_URI=<variable> \
-e REGISTRY_USERNAME=<variable> \
- 978 -
-e REGISTRY_PASSWORD=<variable> \
-e IMPORT_INTERVAL_MINUTES=<variable> \
-i tenableio-docker-consec-local.jfrog.io/cs-scanner:latest import-registry
2. Press Enter.
What to do next:
l View the results of your scan, as described in View Scan Results for Container Images.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
You must prepare the following registries before you scan the registries via the Container
Security Scanner.
l Azure Registry
- 979 -
1. Obtain your AWS access keys.
Note: Your AWS access keys consist of two parts: an access key ID and an access secret key. The
access key ID is your registry username variable, and the secret access key is your registry password
variable. For more information, see Tenable Container Security Scanner Environment Variables.
What to do next:
l Scan your repository, as described in Scan a Registry via the Tenable Container Security
Scanner.
Azure Registry
For information about how to make specific configurations to your Azure registry, see the Azure
Documentation.
1. Create a service principal for your Azure registry and assign the AcrPull role to the service
principal.
What to do next:
l Scan your repository, as described in Scan a Registry via the Tenable Container Security
Scanner.
2. Authenticate to your registry by creating and downloading a service account key as a JSON
file (see the following example).
- 980 -
{
"type": "service_account",
"project_id": "my-gcp-lab",
"private_key_id": "d21bbxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx",
"private_key": "-----BEGIN PRIVATE KEY-----
\nMIIEvAAAAAAAA\nBBBBBBBB\nCCCCCCCC\nDDDDDDDD\nEEEEEEEE\nFFFFFFFF\nGGGGGGGG==\n-----END PRIVATE
KEY-----\n",
"client_email": "[email protected]",
"client_id": "111111111111111111111",
"auth_uri": "https://accounts.google.com/o/oauth2/auth",
"token_uri": "https://oauth2.googleapis.com/token",
"auth_provider_x509_cert_url": "https://www.googleapis.com/oauth2/v1/certs",
"client_x509_cert_url": "https://www.googleapis.com/robot/v1/metadata/x509/cs-scanner%40dh-
lab.iam.gserviceaccount.com"
}
3. Mount the service account JSON file to the path /serviceAccount.json using the docker -v
flag:
What to do next:
l Scan your repository, as described in Scan a Registry via the Tenable Container Security
Scanner.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Term Description
- 981 -
Term Description
Container A running instance of a container image. A container image that has been
started or otherwise executed.
Image Tag A specific release or version of an application hosted inside a container (for
example, 14.04).
Organization The role assigned to the first user registering for Tenable Container
- 982 -
Term Description
Admin Security, at the time the Organization is created. If you have registered
without an invitation, you were automatically assigned the role of
Organization Admin and a new Organization was created for your account.
Repository A storage location or namespace, within the registry, for an image (for
example, /org/tenable_io_container_security/approved/).
User The role assigned to invited users registering for Tenable Container
Security, for pre-existing Organizations. If you have registered via an
invitation, you were automatically assigned the role of User and you were
added to the same Organization of the user who invited you.
Connectors act as links to local or third-party registries. You can use connectors to access these
registries and then import image data from them to Tenable Container Security.
To import and analyze container images, you must configure a connector to a registry or, in certain
cases, to the registry's own connector.
After you configure your connectors, you can view and manage your connectors from the Settings
page in Tenable Vulnerability Management. For more information about connectors, see Connectors
in the Tenable Vulnerability Management User Guide.
The amount of time Tenable Container Security takes to scan the images in your registry and
display the results depends on the size and number of images you scan.
- 983 -
Note: If you use a connector to import and scan your images, Tenable Container Security may
take up to several hours to display your images on the dashboard.
If your images do not appear on the dashboard within 24 hours of when you begin the import,
contact Tenable Support.
Tenable Container Security supports image imports via the following connectors.
Connector Description
Tenable Command line operated, on-premises scanning tool that allows you to
Container scan images without importing them into Tenable Container Security. To
Security Scanner configure the Tenable Container Security Scanner, see Tenable Container
Security Scanner.
Amazon Web Connector for assets hosted in an AWS Elastic Container Registry. To
Service (AWS) configure an AWS ECR connector and import assets, see Configure an
Elastic Container AWS ECR Connector to Import Images in Tenable Container Security.
Registry (ECR)
Note: To import assets from an AWS ECR, Tenable Container Security requires
read-only access to your AWS account.
Note: If your registry is not listed but is compatible with Docker Registry API
version 2.0, select this connector. For information about Docker-compatible
connectors, see the Docker Documentation.
Docker EE Connector for assets hosted in a Docker Enterprise Edition (EE) registry.
To configure a connector for a Docker EE registry, see Configure a Local
Connector to Import Images in Tenable Container Security.
- 984 -
JFrog Artifactory Connector for assets hosted in a JFrog Artifactory registry. To configure a
connector for a JFrog Artifactory registry, see Configure a Local
Connector to Import Images in Tenable Container Security.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
To import and analyze images hosted in an Amazon Web Service (AWS) Elastic Container Registry
(ECR), you must configure your AWS ECR connector. Tenable Container Security then imports the
images from your registry and scans the images for vulnerabilities.
The amount of time Tenable Container Security takes to scan the images in your registry and
display the results depends on the size and number of images you scan.
Note: If you use a connector to import and scan your images, Tenable Container Security may
take up to several hours to display your images on the dashboard.
If your images do not appear on the dashboard within 24 hours of when you begin the import,
contact Tenable Support.
l Confirm the images you want to import are stored in your organization's container registry.
- 985 -
1. In the Connectors section of the Container Security dashboard, click Create.
Tenable Vulnerability Management opens the Cloud Connectors page, and the Cloud
Connectors plane appears.
3. In the URL box, type the fully qualified domain name of your ECR deployment (for example,
https://579133718396.dkr.ecr.us-east-2.amazonaws.com).
5. In the Password box, type the base 64-encoded password used in the docker login
command generated by the AWS CLI.
Tip: If your ECR is in the us-east-2 region, you can run the aws ecr get-login-password --
region us-east-2 command to get the docker login command.
Note: If you click Save, Tenable Container Security saves your configured connector but does
not import your assets. To launch a manual import for the connector, see Launch a Connector
Import Manually.
l To save the connector and import your assets from the registry, click Save & Import.
Note: When you import container images to scan, Tenable Container Security may
abort the scan if the scan has been running for 60 minutes. If this happen, Scan
Failed appears on the Images page in the Vulnerabilities and Malware columns for
the aborted images.
If Tenable Container Security aborts your scan, try simplifying your images before
you import them, as described in the Docker Documentation. Alternatively, you can
use the Tenable Container Security Scanner to scan your images without importing
them to Tenable Container Security.
If Tenable Container Security still aborts your scan, contact Tenable Support.
What to do next:
- 986 -
l View the results of your scan, as described in View Scan Results for Container Images.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
To import and analyze images hosted in a local registry, you must configure your registry's
connector. Tenable Container Security then imports the images from your registry and scans the
images for vulnerabilities.
The amount of time Tenable Container Security takes to scan the images in your registry and
display the results depends on the size and number of images you scan.
Note: If you use a connector to import and scan your images, Tenable Container Security may
take up to several hours to display your images on the dashboard.
If your images do not appear on the dashboard within 24 hours of when you begin the import,
contact Tenable Support.
l Confirm the images you want to import are stored in your organization's container registry.
Tenable Vulnerability Management opens the Cloud Connectors page, and the Cloud
Connectors plane appears.
- 987 -
2. In the Container Security section, click the type of container registry you want to use and
type a Connector Name. Alternatively, type the name of the registry in the search box.
Note: If you want to connect to a registry that is not listed, contact Tenable Support and let them
know that you want your container registry to be officially supported. If your registry is not listed but
is Docker-compatible, select Docker. For information about Docker-compatible connectors, see the
Docker Documentation.
Note: By default, Tenable Container Security requests new and updated asset records every 12
hours.
If enabled, in the Import drop-down box, select Day or Week as the frequency with which
Tenable Container Security sends data requests to the registry.
Note: If you click Save, Tenable Container Security saves your configured connector but does
not import your assets. To launch a manual import for the connector, see Launch a Connector
Import Manually in the Tenable Vulnerability Management User Guide.
l To save the connector and import your assets from the registry, click Save & Import.
Note: When you import container images to scan, Tenable Container Security may
abort the scan if the scan has been running for 60 minutes. If this happen, Scan
Failed appears on the Images page in the Vulnerabilities and Malware columns for
the aborted images.
If Tenable Container Security aborts your scan, try simplifying your images before
you import them, as described in the Docker Documentation. Alternatively, you can
- 988 -
use the Tenable Container Security Scanner to scan your images without importing
them to Tenable Container Security.
If Tenable Container Security still aborts your scan, contact Tenable Support.
What to do next:
l View the results of your scan, as described in View Scan Results for Container Images.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
A container is a running instance of an image. You create containers from an image each time you
run the image on your application. You can create multiple containers from a single image, and you
can change those containers without affecting the image from which you created them.
After you perform a credentialed Tenable Nessus scan on your system, Tenable Container Security
uses the scan results to identify images and containers and analyze each container for risk.
Tenable Container Security then shows the containers by scan status and risk level in the Identified
Containers widget on the Tenable Container Security dashboard based on the results of the most
recent scan.
Note: Tenable Container Security identifies and analyzes only the images and containers found via
credentialed Tenable Nessus scans.
Note: Tenable Container Security imports and rescans your images at regular intervals, beginning when
you first import and scan the images.
- 989 -
l If Tenable Container Security has not yet scanned the source image used to create the
container you want to analyze, use one of the following methods to import the image for
scanning:
l Configure Tenable Container Security Connectors to Import and Scan Images stored in
your organization's local registry.
l Use the Tenable Container Security Scanner to scan your images directly from your
organization's local registry or your machine.
l Run a Tenable Nessus scan on the network where your containers run, selecting the Basic
Network Scan template and providing your network authentication credentials. For more
information about Tenable Nessus scan templates, see Scan and Policy Templates in the
Tenable Nessus User Guide.
Note: Tenable Container Security imports data from Tenable Nessus to determine if there have ever
been any changes made to files on the container. If Tenable Nessus detects file changes, Tenable
recommends that you check your images and repositories and confirm that no one has accessed
them without authorization.
Tip: Alternatively, you can run a Tenable Nessus Agent scan on the network where the container
runs. For more information, see the Tenable Nessus Agent User Guide.
1. In the Container Security dashboard, find the Identified Containers widget. This widget
categorizes your containers by risk and scan status.
Note: For information about how Tenable Container Security calculates container risk, see Container
Risk.
- 990 -
l Filter the identified containers table.
l View the summary for your identified containers in the identified containers table.
Column Description
Repository/Image:Tag The repository name, image name, and image tag (for
example, latest).
- 991 -
accessed them without authorization.
a. In the identified containers table, click the row for the container you want to view.
The identified containers details page appears.
Tab Action
- 992 -
Note: The authority that identifies a given
vulnerability determines the vulnerability’s ID
format.
- 993 -
l In the Image Name column, view the image
name as it appears in the repository.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
After Tenable Container Security scans your container images, you can view the detailed scan
results on the Tenable Container Security dashboard.
l Configure your connectors to import and scan images stored in your organization's local
registry.
- 994 -
l Use the Tenable Container Security Scanner to scan your images directly from your
organization's local registry or your machine.
1. In the Statistics section of the Container Security dashboard, click the Images widget.
Tab Action
- 995 -
l In the Risk Score column, view the CVSSv2
score.
Layer Digest View the digest IDs for each layer in the image.
- 996 -
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
You automatically create an image repository when you push an image to the registry.
1. In the Statistics section of the Container Security dashboard, click the Repositories widget.
l
Search the table.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
Tip: In the top navigation bar, click a link in the breadcrumb trail to return to a previous
page.
l
View details for an image in the repository.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
a. In the repositories table, click the row of the repository that contains the image
you want to view.
- 997 -
b. In the Container Images table, click an image row to view more details.
c. In the Container Tag table, click a row to expand the Activity Log details plane for
that tag.
Tip: In the top navigation bar, click a link in the breadcrumb trail to return to a previous
page.
l
Delete an image repository.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan
Manager, or Administrator
a. In the repositories table, click the row of the repository you want to delete.
Tip: In the top navigation bar, click a link in the breadcrumb trail to return to a previous
page.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
Note: The data Tenable Container Security retains when you import an image depends on the import
method you use.
- 998 -
l Docker command or connector — Tenable Container Security retains the image itself, as well as
all metadata associated with the image (e.g., image layers, software packages on the image., etc.).
l Container Security Scanner — Tenable Container Security retains only the metadata associated
with the image.
When you delete the image, Tenable Container Security removes the entire image and all image
metadata.
To delete an image:
1. In the Statistics section of the Container Security dashboard, click the Images widget.
The Images page appears. This page contains a table that lists the images Tenable Container
Security has imported and scanned.
2. In the images table, click the button next to the image you want to delete.
Tenable Container Security removes the image and all the vulnerabilities associated with that
image.
Tenable Container Security policies allow you to configure the rules that Tenable Container Security
refers to when it identifies the severity of vulnerabilities in your container images.
When you set a policy in Tenable Container Security, the scanner detects any images that meet the
conditions set in that policy and labels those images as false.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
- 999 -
Required Tenable Vulnerability Management User Role: Scan Manager or Administrator
2. In the left navigation plane, in the Container Security section, click Policies.
Note: The policies table lists your policies in order of priority, as determined by Tenable Container
Security.
4. In the policy name text box, type a meaningful name for the policy.
5. In the Repositories section, select the repositories where Tenable Container Security applies
the policy:
b. In the drop-down box, type the name of the repository where you want to apply the
policy.
6. In the Conditions section, set the condition that triggers the policy.
The new policy appears on the Policies page in the policies table.
Note: By default, the system assigns the policy the highest priority (1). If you want to modify the
- 1000 -
priority setting, edit the policy.
Tip: In the top navigation bar, click a link in the breadcrumb trail to return to a previous page.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
2. In the left navigation plane, in the Container Security section, click Policies.
Note: The policies table lists your policies in order of priority, as determined by Tenable Container
Security.
4. In the Priority box, type a number representing the priority for the policy.
Tenable Container Security evaluates container images against policies in the priority order
you specify.
If you type a priority number that is already associated to another policy, the system accepts
the new priority number and lowers the priority numbers for all policies below it.
- 1001 -
5. In the Repositories section, select the repositories where Tenable Container Security applies
the policy:
b. In the drop-down box, type the name of the repository where you want to apply the
policy.
6. In the Conditions section, set the condition that triggers the policy.
7. Click Save.
Tenable Container Security saves your changes and shows the updated information on the
Policies page.
Tip: In the top navigation bar, click a link in the breadcrumb trail to return to a previous page.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
The Policies page appears. This page contains a table that lists the policies Tenable Container
Security uses to evaluate container images.
The table lists the policies in order of priority, as determined by Tenable Container Security.
2. In the policies table, click the button next to the policy you want to delete.
- 1002 -
Tip: Roll over the policy row to reveal the button for that policy.
The Policies page appears. This page contains a table that lists the policies Tenable Container
Security uses to evaluate container images.
The table lists the policies in order of priority, as determined by Tenable Container Security.
2. In the policies table, click the row of the policy you want to delete.
Tip: In the top navigation bar, click a link in the breadcrumb trail to return to a previous page.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
You can set one of the following conditions to trigger a policy in Tenable Container Security:
Option Description
CVSS To set the maximum CVSS value that triggers the policy:
- 1003 -
CVE To set a CVE or CVEs that trigger the policy:
1. Click CVE.
2. In the text box, type one or more CVE values in decimal format (0.0) in a
comma-separated list.
1. Click Malware.
Tenable Container Security uses the metrics described in the following topic to categorize your
images and containers on the Tenable Container Security dashboard.
Image Risk
Tenable Container Security assigns all vulnerabilities in an image a static severity category based on
the vulnerability's CVSSv2 score.
Severity Description
Unscored Tenable Container Security has not yet determined the vulnerability's risk
score.
Container Risk
- 1004 -
Tenable Container Security calculates a container's overall risk score by determining which
vulnerability on the container has the highest CVSSv2 score, then rounding that score to the
nearest whole number.
For example, if the highest risk score for a vulnerability on a container is 9.2, Tenable Container
Security assigns the entire container a risk score of 9.
Category Description
Unscanned The container was created from an image that Tenable Container Security
has never scanned for vulnerabilities.
Low/Medium Tenable Container Security scanned the image and container and assigned
Risk a risk score of 0–7.
High Risk Tenable Container Security scanned the image and container and assigned
a risk score of 8–10.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Tenable Container Security shows your data capacity by used and available data in the Usage
widget on the Container Security dashboard.
Note: The Usage widget is not available if you have Tenable Cloud Security license. To view your license
usage, go to the Settings > License page and view the Container Images under Cloud Security Resources.
For more information, see View your License Information.
The Usage widget categorizes your data by licensed container images or gigabytes (GB), depending
on which metric your license specifies. For more information about your license metrics, contact
your Tenable representative.
- 1005 -
To view your data usage:
Space used or Licensed Images The amount of licensed data already in use, displayed
used, depending on your as a percentage of your licensed data limit.
licensing scheme
To calculate the data in use, Tenable Container
Security:
- 1006 -
Tenable PCI ASV
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Tenable PCI ASV is now an independent application available on the Workspace page. Tenable
PCI ASV allows you to take comprehensive scans of your networks so you can identify and address
vulnerabilities and ensure your organization complies with Payment Card Industry Data Security
Standards (PCI DSS). For more information about Tenable PCI ASV, see the Tenable PCI ASV User
Guide.
- 1007 -
Settings
On the Settings page, you can manage settings that affect your Tenable Vulnerability Management
experience across a range of categories.
For example, in My Account, you can enable two-factor authentication or change your
organization's user groups and permissions. In Tags, you can view and edit Tenable Vulnerability
Management tags and tagging rules. Finally, in Cloud Connectors, you can manage the third-party
data connectors that integrate Tenable Vulnerability Management with other platforms.
This section contains complete documentation for the Settings page and is organized to match the
Tenable Vulnerability Management interface. It contains the following topics:
General Settings
My Account
SAML
License Information
Access Control
Activity Logs
- 1008 -
Access Groups
Language
Exports
Recast/Accept Rules
Tags
Sensors
Credentials
Exclusions
Connectors
General Settings
On the General page, you can configure general settings for your Tenable Vulnerability Management
instance.
Severity
By default, Tenable Vulnerability Management uses CVSSv2 scores to calculate severity for
individual vulnerability instances. If you want Tenable Vulnerability Management to calculate the
- 1009 -
severity of vulnerabilities using CVSSv3 scores (when available), you can configure your severity
metric setting.
Tip: A vulnerability instance is a single instance of a vulnerability appearing on an asset, identified uniquely
by plugin ID, port, and protocol.
For information about severity and the ranges for CVSSv2 and CVSSv3, see CVSS vs. VPR.
Caution: When changing your CVSS severity metric setting, the new setting is only reflected in new
findings that come into your system. Any existing findings only reflect the previous severity setting (unless
otherwise recasted). For more information on recast rules, see Recast/Accept Rules.
1. On the Severity tab, select the metric that you want Tenable Vulnerability Management to use
for severity calculations.
- 1010 -
l CVSSv2 — Use CVSSv2 scores for all severity calculations.
l CVSSv3 — Use CVSSv3 scores, when available, for all severity calculations. Use CVSSv2
only if a CVSSv3 score is not available.
2. Click Save.
3. The system saves your change and begins calculating severity based on your selection.
All vulnerabilities seen before the change retain their severity. After the change, all
vulnerabilities seen during scans receive severities based on your new selection. Because of
this, you could see two sightings of the same vulnerability have two different CVSS scores and
severities.
You can configure Service Level Agreement (SLA) settings to modify how Tenable calculates your
SLA data.
You can view this data in the SLA Progress: Vulnerability Age widget on the Vulnerability
Management Overview dashboard. For more information, see Vulnerability Management Dashboard.
- 1011 -
2. Configure the following options:
l Medium 60
days
- 1012 -
l Low 180
days
3. Click Save.
Language
On the General page, you can change the plugin language in your Tenable Vulnerability Management
container to English, Japanese, Simplified Chinese, or Traditional Chinese. This setting affects all
users in the container.
- 1013 -
4. Click the Language tab.
Tenable Vulnerability Management updates the plugin language for your container.
Exports
When you create an export, you can set an expiration delay for the export file up to 30 calendar
days, which is the maximum number of days that Tenable Vulnerability Management allows before
your export files expire.
By default, any exports you create in Tenable Vulnerability Management have an expiration date of
30 days. If you want to decrease the number of days that Tenable Vulnerability Management allows
before your export files expire, you can configure your default export expiration days.
2. In the Default Expiration box, type the number of days you want to Tenable Vulnerability
Management to allow before your exports expire.
Note: Tenable Vulnerability Management allows you to set a maximum of 30 calendar days for export
expiration.
- 1014 -
Note: You must type the number of days as an integer between 1 and 30.
3. Click Save.
Tenable Vulnerability Management saves your settings and updates the number of allowable
days before your exports expire.
Search
Enabling plugin output data retention allows Tenable Vulnerability Management to store your plugin
output data each time you launch a scan. You can then filter your vulnerability findings by plugin
output. For more information, see Findings Filters.
Note: Tenable automatically disables this setting if it is unused for 35 days. Re-enable the setting to
conduct a search on plugin output for all scans from that point onward. Only use this setting if you need to
perform regular searches within the Explore user interface.
Once you have enabled plugin output data retention, you must launch a scan so that Tenable
Vulnerability Management can identify and store your plugin output data.
Caution: You cannot disable plugin output data retention once you have enabled it.
- 1015 -
2. Click the Enable Regex Search on Plugin Output toggle.
3. Click Save.
Tenable Vulnerability Management enables plugin output data retention on your account.
What to do next:
l Launch a scan for your host assets.
My Account
From the My Account page, you can make changes to your own user account.
- 1016 -
You can navigate to the My Account page via one of the following methods:
The My Account page appears, where you can view and update your account details.
l To access the My Account page from the top navigation menu of any page:
- 1017 -
a. In the upper-right corner, click the blue user circle.
b. Click My Profile.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
On the My Account page, you can view details about your account, including your log in
details, user role, and the groups and permissions assigned to you.
- 1018 -
a. In the left navigation plane, click Settings.
The My Account page appears, where you can view and update your account
details.
a. Click My Profile.
- 1019 -
2. On the left side of the page, you can select from the following:
Option Action
- 1020 -
Note: You cannot change your username or role.
- 1021 -
l View a description of API keys.
Caution: Any existing API keys are replaced when you click the
Generate button. You must update the applications where the
previous API keys were used.
Caution: Be sure to copy the access and secret keys before you
close the API Keys tab. After you close this tab, you cannot retrieve
the keys from Tenable Vulnerability Management.
Note: User accounts expire according to when the Tenable Vulnerability Management container they
belong to was created. Tenable controls this setting directly. For more information, contact Tenable
Support.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
The My Account page appears, where you can view and update your account
details.
- 1022 -
l In the upper-right corner, click the blue user circle.
a. Click My Profile.
name@domain
where domain corresponds to a domain approved for your Tenable Vulnerability Management
instance.
This email address overrides the email address set as your Username. If you leave this option
empty, Tenable Vulnerability Management uses the Username value as your email address.
Note: During initial setup, Tenable configures approved domains for your Tenable Vulnerability
Management instance. To add domains to your instance, contact Tenable Support.
4. Click Save.
- 1023 -
5. (Optional) Change your password.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
You can change the password for your own account as any type of user. The method of changing
your password varies slightly based on the role assigned to your user account.
The My Account page appears, where you can view and update your account
details.
- 1024 -
a. Click My Profile.
3. In the New Password box, type a new password. See Tenable Vulnerability Management
Password Requirements for more information.
Tenable Vulnerability Management saves the new password and terminates any currently
active sessions for your account. Tenable Vulnerability Management then prompts you to re-
authenticate.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
On the My Account page, you can configure two-factor authentication for your account.
- 1025 -
Tip: Administrators can also enforce two-factor authentication for other accounts when creating or editing
a user account.
Note: Before configuring two-factor authentication, check the International Phone Availability list to ensure
you are able to receive text messages from Tenable Vulnerability Management.
The My Account page appears, where you can view and update your account
details.
- 1026 -
a. Click My Profile.
d. Click Next.
The Verification Code plane appears and Tenable Vulnerability Management sends
a text message with a verification code to the phone number.
e. In the Verification Code box, type the verification code you received.
f. Click Next.
b. Click Update.
- 1027 -
Note: Once you save the phone number for this configuration, you cannot edit or change the
phone number. You must configure a new authentication setup for any additional phone
numbers you want to use.
c. Click Next.
e. In the Verification Code box, type the code provided by your authenticator
application.
Note: If you do not type the correct verification code, Tenable Vulnerability
Management locks the QR code. Delete the setup from your authenticator application
and scan a new QR code.
f. Click Next.
- 1028 -
a. In the left navigation plane, click Settings.
The My Account page appears, where you can view and update your account
details.
a. Click My Profile.
2. In the Change Password section, in the Current Password box, type your current password.
- 1029 -
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
The API keys associated with your user account enable you to access the API for all Tenable
Vulnerability Management products for which your organization is licensed.
Note: Tenable Vulnerability Management API access and secret keys are required to authenticate with the
Tenable Vulnerability Management API.
Note: The API keys associated with your user account enable you to access the API for all Tenable
Vulnerability Management products for which your organization is licensed. You cannot set separate keys
for individual products. For example, if you generate API keys in Tenable Vulnerability Management, this
action also changes the API keys for Tenable Web App Scanning and Tenable Container Security.
Note: Be sure to use one API key per application. Examples include, but are not limited to:
l Tenable Vulnerability Management integration
l Third-party integration
l Other custom applications, including those from Tenable Professional Services
The method to generate API keys varies depending on the role assigned to your user account.
Administrators can generate API keys for any user account. For more information, see Generate
Another User's API Keys. Other roles can generate API keys for their own account.
- 1030 -
b. Click the My Account tile.
The My Account page appears, where you can view and update your account
details.
a. Click My Profile.
3. Click Generate.
Caution: Any existing API keys are replaced when you click the Generate button. You must update
the applications where the previous API keys were used.
- 1031 -
Tenable Vulnerability Management generates new access and secret keys, and displays the
new keys in the Custom API Keys section of the page.
Tip: If the Generate button is inactive, contact your administrator to ensure they've enabled
API access for your account. For more information, see Edit a User Account.
Caution: Be sure to copy the access and secret keys before you close the API Keys tab. After you
close this tab, you cannot retrieve the keys from Tenable Vulnerability Management.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Tenable Vulnerability Management locks you out if you attempt to log in and fail 5 consecutive
times.
Note: If you no longer no longer have access to the email address specified in your account, an
administrator for your Tenable Vulnerability Management instance can reset your password instead.
Note: A user can be locked out of the user interface but still submit API requests if they are assigned the
appropriate authorizations (api_permitted). For more information, see the Tenable Developer Portal.
1. On the Tenable Vulnerability Management login page, click the Forgot your password? link.
4. Click Send.
- 1032 -
Tenable Vulnerability Management sends password recovery instructions to the email address
specified in your user account.
5. Reset your password using the instructions in the email message. See Password
Requirements for more information.
SAML
You can configure Tenable Vulnerability Management to accept credentials from your SAML identity
provider (for example, Okta). This allows for an additional layer of security, where the SAML
credentials are certified for use within Tenable Vulnerability Management. Once you enable
SAML for a user, they can log in to Tenable Vulnerability Management directly through their identity
provider, which automatically signs them in and redirects them to the Tenable Vulnerability
Management landing page.
On the SAML page, you can view and manage your SAML credentials. You can also enable, disable,
and add new configurations for users within your Tenable Vulnerability Management instance.
Tip: Review the Tenable SAML Configuration Quick-Reference guide for a step-by-step guide of how to
configure SAML for use with Tenable Vulnerability Management.
Note: Once SAML is configured for a user, they must log in using the IdP Tile or the URL provided in the SP
metadata file (for example, cloud.tenable.com/SAML/XXXXXX) and log back out before they can access the
Sign in via SSO link on the Tenable Vulnerability Management login page.
SAML Details
On the SAML page, you can view a table that includes the following details about your
SAML configurations:
Column Description
- 1033 -
Last Login The date and time on which a user on your instance last successfully logged
in via the SAML configuration.
Note: The Last Login column shows a value only if Tenable Vulnerability
Management has login data for the SAML identity provider.
Last The date and time on which a user on your instance last attempted to log in
Attempted via the SAML configuration.
Login
Note: The Last Attempted Login column shows a value only if Tenable
Vulnerability Management has attempted login data for the SAML identity
provider.
Note: Your identity provider determines the expiration date for your
certificate.
Actions An interactive column from which you can download the metadata.xml file
that contains one or more security certificates for the configuration.
a. In the Actions column for the configuration from which you want to
download a metadata.xml file, click the button.
- 1034 -
To view your SAML configurations:
Tip: Review the Tenable SAML Configuration Quick-Reference guide for a step-by-step guide of how to
configure SAML for use with Tenable Vulnerability Management.
4. (Optional) Refine the table data. For more information, see Tables.
Column Description
Last Login The date and time on which a user on your instance last successfully
logged in via the SAML configuration.
Note: The Last Login column displays a value only if Tenable Vulnerability
Management has login data for the SAML identity provider.
Last The date and time on which a user on your instance last attempted to
Attempted log in via the SAML configuration.
Login
Note: The Last Attempted Login column displays a value only if Tenable
Vulnerability Management has attempted login data for the SAML identity
provider.
- 1035 -
In the certificate column, you can complete the following tasks.
Note: Your identity provider determines the expiration date for your
certificate.
Actions An interactive column from which you can download the metadata.xml
file that contains one or more security certificates for the
configuration.
You can manually enter the details for your SAML configuration or you can upload a metadata.xml
file that you download from your identity provider (IdP).
Note: Once SAML is configured for a user, they must log in using the IdP Tile or the URL provided in the SP
metadata file (for example, cloud.tenable.com/SAML/XXXXXX) and log back out before they can access the
Sign in via SSO link on the Tenable Vulnerability Management login page.
Review the Tenable SAML Configuration Quick-Reference guide for a step-by-step guide of how to
configure SAML for use with Tenable Vulnerability Management. This includes the following high-
level steps:
- 1036 -
l Follow the steps described in your IdP's documentation to set up a SAML application for
Tenable Vulnerability Management on your IdP account. Your IdP requires an entity ID and a
reply URL for Tenable Vulnerability Management to set up the SAML application:
o Entity ID/Audience URI— TENABLE_IO_PLACEHOLDER.
o ACS/SSO URL/Login URL/Reply URL—
https://cloud.tenable.com/SAML/login/placeholder.com.
Note: Tenable does not currently support a SP-Initiated SAML flow. Because it must be initiated from the
Identity Provider side, navigating directly to https://cloud.tenable.com does not allow SSO.
Important! All users must have an account configured in Tenable Vulnerability Management that matches
their SSO login. You must ensure the SSO login matches the FULL Tenable account name (i.e.,
[email protected]).
- 1037 -
a. In the first drop-down box, select Import XML.
b. The Type drop-down box specifies the type of identity provider you are using. Tenable
Vulnerability Management supports SAML 2.0 (for example, Okta, OneLogin, etc.).
This option is read-only.
To manually create your SAML configuration using data from the metadata.xml
file from your IdP:
a. In the first drop-down box, select Manual Entry.
Settings Description
Enabled toggle A toggle in the upper-right corner that indicates whether the
SAML configuration is enabled or disabled.
Type Specifies the type of identity provider you are using. Tenable
Vulnerability Management supports SAML 2.0 (for example,
Okta, OneLogin, etc.).
This option is read-only.
- 1038 -
IdP Entity ID The unique entity ID that your IdP provides.
IdP Assigns To assign a user role during provisioning, enable this toggle. In
User Role at your SAML identity provider, add an attribute statement with
Provisioning userRoleUuid as the attribute name and the user role UUID as
the attribute value.
IdP Resets User To assign a role each time a user logs in, overwriting the current
Role at Each role with the one chosen in your IdP, enable this toggle. In your
Login SAML identity provider, add an attribute statement with
userRoleUuid as the attribute name and the user role UUID as
the attribute value.
6. Click Save.
What to do next:
- 1039 -
l Download the metadata.xml from Tenable Vulnerability Management using the Download
SP Metadata option in the SAML Configurations table.
l Upload this file to the SAML application you created for Tenable Vulnerability Management
with your SAML provider.
Tip: If you are having trouble configuring SAML, Tenable recommends trying one of the various third-party
SAML debugging tools available online. You can also reach out to Tenable Support for further
troubleshooting assistance.
4. In the SAML table, click the SAML configuration that you want to edit.
5. (Optional) In the first drop-down box, select a different method to provide basic configuration
details.
l Import XML — Configure SAML authentication by uploading the metadata file your IdP
provided, as described in Add a New SAML Configuration.
- 1040 -
SAML Configuration.
6. Update any of the configurable SAML settings described in the following table.
Note: The configuration options you can update depend on the source you select in the first drop-
down box.
- 1041 -
Entity ID Manual A unique identifier that Tenable Vulnerability
Entry , Management generates when you create a
Import configuration.
XML
This box is read-only.
Last Updated Manual The time and date on which an administrator user
Entry , last updated the configuration.
Import
This box is read-only.
XML
IdP URL Manual The SAML URL for your identity provider.
Entry
- 1042 -
Autoprovisioning Entry account user creation is enabled or disabled
Enabled
IdP Assigns User Manual To assign a user role during provisioning, enable
Role at Provisioning Entry this toggle. In your SAML identity provider, add an
attribute statement with userRoleUuid as the
attribute name and the user role UUID as the
attribute value.
IdP Resets User Role Manual To assign a role each time a user logs in,
at Each Login Entry overwriting the current role with the one chosen
in your IdP, enable this toggle. In your SAML
identity provider, add an attribute statement with
userRoleUuid as the attribute name and the user
role UUID as the attribute value.
- 1043 -
Certificate column for the configuration on the
SAML page.
7. Click Save.
Disabling a SAML configuration prevents users on your instance from using the SAML credentials in
the configurations to log in to Tenable Vulnerability Management. You can enable a disabled SAML
configuration as described in Enable a SAML Configuration.
Caution: When you disable a SAML configuration, users can no longer log in to Tenable Vulnerability
Management using their SAML credentials. Make sure all users on your instance have an alternative method
to log in to Tenable Vulnerability Management before you disable a SAML configuration.
4. In the SAML table, click the SAML configuration that you want to disable.
5. At the bottom of the page, click the SAML Enable toggle to disable the configuration.
6. Click Save.
- 1044 -
Tenable Vulnerability Management disables the SAML configuration. On the SAML page, the
disabled configuration appears in light gray.
You can enable a disabled a SAML configuration. For more information about SAML authentication
in Tenable Vulnerability Management, see SAML.
Tip: Review the Tenable SAML Configuration Quick Reference Guide for a step-by-step guide of how to
configure SAML for use with Tenable Vulnerability Management.
Note: Once SAML is configured for a user, they must log in using the IdP Tile or the URL provided in the SP
metadata file (for example, cloud.tenable.com/SAML/XXXXXX) and log back out before they can access the
Sign in via SSO link on the Tenable Vulnerability Management login page.
Configure your IdP to authenticate with Tenable Vulnerability Management. For more information,
see the Tenable SAML Configuration Quick Reference Guide.
4. In the SAML table, click the SAML configuration that you want to enable.
- 1045 -
The SAML Settings page appears.
5. At the bottom of the page, click the SAML Enable toggle to enable the configuration.
6. Click Save.
Tenable Vulnerability Management enables the SAML configuration. On the SAML page, the
enabled configuration appears in black.
When you manually configure or edit a SAML configuration, you can enable automatic user account
provisioning. Automatic account provisioning allows users with credentials for the IdP named in the
SAML configuration to create a Tenable Vulnerability Management account the first time they log in
via the IdP.
Tip: Review the Tenable SAML Configuration Quick-Reference guide for a step-by-step guide of how to
configure SAML for use with Tenable Vulnerability Management.
Tenable Vulnerability Management creates automatically provisioned accounts with the following
defaults:
l Username — NameID
l Email — NameID
Tenable Vulnerability Management does not currently support any other claim types.
Configure your IdP to authenticate with Tenable Vulnerability Management. For more information,
see the Tenable SAML Configuration Quick Reference Guide.
- 1046 -
1. In the upper-left corner, click the button.
4. In the SAML table, click the SAML configuration for which you want to enable automatic
account provisioning.
5. At the bottom of the page, click the User Autoprovisioning Enabled toggle to enable
automatic account provisioning.
6. Click Save.
Disabling automatic account provisioning prevents users from automatically creating Tenable
Vulnerability Management account the first time they access the platform via their IdP. You can
enable automatic account provisioning on a SAML configuration, as described in Enable Automatic
Account Creation.
- 1047 -
3. Click the SAML tile.
4. In the SAML table, click the SAML configuration for which you want to disable automatic
account provisioning.
6. At the bottom of the page, click the User Autoprovisioning Enabled toggle to disable
automatic account provisioning.
7. Click Save.
You can delete a SAML configuration on the SAML page. For more information about SAML
authentication in Tenable Vulnerability Management, see SAML .
- 1048 -
4. In the SAML table, select the check box for the SAML configuration that you want to delete.
Note: Ensure that when you delete a SAML configuration, you also remove the related configuration
in your IdP.
What to do next:
l Remove the related configuration from your identity provider's application.
License Information
On the License Information page, you can view a complete breakdown of your Tenable products
and their license usage. You can view this information in multiple ways, including visual overviews
by product or time period that enable you to spot trends such as temporary usage spikes or product
misconfigurations.
Tip: For details on how Tenable licenses work in each product that appears on the License Information
page, see Licensing Tenable Products. To learn about license overages, see Tenable Cloud Overage Process.
- 1049 -
The License Information page shows license usage for all products in your current
Tenable container.
Section Description
Purchased On the left, click a product tile to view details. If a product is still being
Products evaluated or has expired, a label appears.
Product At the top of the page, view a summary of the selected product:
Summary
l Product Name — The name of the product.
l Last Updated — The date and time the product was last updated.
- 1050 -
l Site Name — The cluster containing your installed products in
Tenable's cloud.
l Plugin Set — The version for the product's Nessus plugin set.
l Plugin Updated — The date and time the Nessus plugin set was last
updated.
Note: If you have the new version of Tenable Cloud Security, your
licensed asset count is calculated by multiplying your Compute,
Serverless, and Container Repositories assets against any ratio and
adding your Container Images (if you have Tenable Container Security). If
your organization has a ratio, it appears in the Cloud Security section, in
the License Ratio field. To learn more about the ratio Tenable may apply
to your cloud resources, contact your Tenable representative.
l Usage Over Time – View your license use over time in a line chart
where the X-axis is the time period and the Y-axis is the number of
assets used. With the filters at the top of the chart, switch between
- 1051 -
time periods on the left, or specify a custom date range on the right.
Tip: (Tenable One-only) Click the tiles above the chart to select or
deselect products.
Vulnerability View the number of Tenable Vulnerability Management assets that count
Management towards your license:
Hosts
l Hosts — The number of hosts that count towards your license.
Cloud Security View the number of cloud resources in your environment identified by
Resources Tenable Cloud Security.
Note Tenable Cloud Security has two versions. If you have the latest version,
your licensed cloud asset counts appear in the Compute, Serverless, and
Container Repositories fields, as well as the Container Images field if you have
Tenable Container Security. To view your total licensed cloud assets, see the
Usage Breakdown & Trend section.
- 1052 -
any ratio is applied.
Tip: If you have the new version of Tenable Cloud Security, these assets
do not count towards your license.
Web App View the number of Tenable Web App Scanning resources that count
Scanning FQDNs towards your license:
Note: Tenable Web App Scanning determines asset count by the number of
fully qualified domain names (FQDNs) that are scanned for your user account. An
asset does not count against your license limit until it has been successfully
scanned for vulnerabilities.
Note: If you are a Tenable One Standard customer, these resources do not
count towards your asset license.
Active Directory View the number of Tenable Identity Exposure resources that count
Users towards your license:
- 1053 -
Access Control
From the Access Control page, you can view and configure the list of users and groups on your
account and the permissions assigned to them.
Users
Topics in this section have been modified to reflect feature updates in Tenable Vulnerability Management
Key Enhancements. For more information, see Tenable Vulnerability Management Key Enhancements.
On the Access Control page, in the Users tab, administrator users can create and manage user
accounts for an organization's resources in Tenable Vulnerability Management.
Users Table
Column Description
- 1054 -
Full Name The full name of the user.
Last Login The date on which the user last successfully logged in to the Tenable
Vulnerability Management interface.
Last Failed The date on which the user failed to log in to the Tenable Vulnerability
Management interface.
Total The total number of failed login attempts for the user.
Failed
This number resets when either an administrator or the user resets the
password for the user account.
Last API The date on which the user last generated API keys.
Access
Role The role assigned to the user. For more information, see Roles.
Actions The actions an administrator user can take with the user (e.g. export a user).
- 1055 -
l Export Users
On the Users page, you can create an account for a new user.
Tip: Looking for account creation via a SAML IdP? See the SAML documentation.
Note: User accounts expire according to when the Tenable Vulnerability Management container they
belong to was created. Tenable controls this setting directly. For more information, contact Tenable
Support.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Vulnerability Management account.
- 1056 -
5. Configure the following options:
Note: To view and configure options in each section, you must select the section in the left menu.
Option Action
General Section
Full Name Type the first and family name of the user.
name@domain
- 1057 -
comma "," itself.
l An uppercase letter
l A lowercase letter
l A number
l A special character
Role In the drop-down box, select the role that you want to
assign to the user.
- 1058 -
Note: If you enable the Password Access or SAML
options for a user with a custom role, the user
automatically has basic access to your dashboards and
widgets.
User Groups Select the user group or groups to which you want to
assign the user.
- 1059 -
l Click anywhere in the User Groups box.
Permission Section
6. Click Save.
Note: If you assign permissions to the user, the button appears as Add & Save.
Tenable Vulnerability Management lists the new user account on the users table.
- 1060 -
The Settings page appears.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Vulnerability Management account.
4. In the users table, click the name of the user that you want to edit.
Option Action
Account Settings
Full Name Edit the first and last name of the user.
This email address overrides the email address set in the Username
box. If you leave this option empty, Tenable Vulnerability Management
uses the Username value as the user's email address.
l An uppercase letter
- 1061 -
l A lowercase letter
l A number
l A special character
Role In the drop-down box, select the role that you want to assign to the
user.
Groups
User Groups Select the user group or groups to which you want to assign the user.
The user inherits the roles and permissions associated with the user
group.
security Select or deselect the available security setting options. When selected,
settings these settings:
Tip: You can select only this setting to create an API-only user
account.
Note: If you deselect this option, you cannot select the MFA option.
Tip: You can configure two-factor authentication for you own account on
the My Account page.
7. Click Save.
- 1062 -
Tenable Vulnerability Management saves the changes to the account.
On the Access Control page, in the Users tab, you can view a list of all the users on your Tenable
Vulnerability Management instance.
To view users and user data for your Tenable Vulnerability Management instance:
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Vulnerability Management account.
The Users tab appears, containing a table of all Tenable Vulnerability Management user
accounts on your Tenable Vulnerability Management instance. This documentation refers to
that table as the users table.
Users Table
On the users table, you can view the following information about users on your Tenable Vulnerability
Management instance.
Column Description
Last Login The date on which the user last successfully logged in to the Tenable
Vulnerability Management interface.
Last Failed The date on which the user failed to log in to the Tenable Vulnerability
Management interface.
Total The total number of failed login attempts for the user.
- 1063 -
Failed This number resets when either an administrator or the user resets the
password for the user account.
Last API The date on which the user last generated API keys.
Access
Role The role assigned to the user. For more information, see Roles.
Actions The actions an administrator user can take with the user (e.g. export a user).
Tenable Vulnerability Management enforces the following password requirements for all accounts:
Password Criteria
l An uppercase letter
l A lowercase letter
l A number
l A special character
Password Expiration
Account Lockout
By default, after 5 failed login attempts, Tenable Vulnerability Management locks the user out of
their account. When a user is locked out of their account, they can unlock their own account, or an
administrator can reset their password.
Password History
- 1064 -
To change the password for another user's account, you must be an administrator. To change your
own password, see Change Your Password.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Vulnerability Management account.
4. In the users table, click the name of the user that you want to edit.
5. In the New Password box, type a new password. See Password Requirements for more
information.
6. Click Save.
Tenable Vulnerability Management saves the new password for the user account.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
As an administrator, you can use the user assist functionality to simulate being logged in as another
account. While assisting a user account, you can perform operations in Tenable Vulnerability
Management as that user without needing to obtain their password or having to log out of your
administrator account.
Note: User Assist is available only for user accounts that have one or both of these authentication settings
enabled:
- 1065 -
l Username/Password
l SAML
To enable these security settings, see Edit a User Account.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Vulnerability Management account.
4. In the users table, click the check box for the user account you want to assist.
Tenable Vulnerability Management refreshes and displays the default dashboard for the user
you are assisting. While you are assisting the user, Tenable Vulnerability Management displays
an overlay at the top of each page with the role of the user you are assisting.
- 1066 -
The API keys associated with your user account enable you to access the API for all Tenable
Vulnerability Management products for which your organization is licensed. These keys must be
used to authenticate with the Tenable Vulnerability Management REST API.
Administrators can generate API keys for any user account. Other roles can generate API keys for
their own accounts. For more information, see Generate API Keys.
Note: The API keys associated with your user account enable you to access the API for all Tenable
Vulnerability Management products for which your organization is licensed. You cannot set separate keys
for individual products. For example, if you generate API keys in Tenable Vulnerability Management, this
action also changes the API keys for Tenable Web App Scanning and Tenable Container Security.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Vulnerability Management account.
4. In the users table, click the name of the user that you want to edit.
Caution: Any existing API keys are replaced when you generate new API keys. You must update the
applications where the previous API keys were used.
The new access and secret keys for the account appear in the text box.
- 1067 -
7. (Optional) Click Re-generate API Keys.
Caution: Be sure to copy the access and secret keys before you navigate away from the Edit User
page. After you close this page, you cannot retrieve the keys from Tenable Vulnerability
Management.
Tenable Vulnerability Management locks you out if you attempt to log in and fail 5 consecutive
times.
Note: A user can be locked out of the user interface but still submit API requests if they are assigned the
appropriate authorizations (api_permitted). For more information, see the Tenable Developer Portal.
l If a user has access to the email address specified in the user account, they can unlock their
own account.
l If a user no longer has access to that email address, another user with administrator
privileges can reset the user's password.
Disabling a user account prevents the user from logging in and prevents their scans from running.
You can enable a disabled user account as described in Enable a User Account.
Important: Disabling a user account does not disable scheduled reports for that user. Additionally, if the
disabled user shared a report with other users, these other users can still generate that report. For more
information, see Reports.
- 1068 -
2. In the left navigation plane, click Settings.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Vulnerability Management account.
l
Select a single user:
a. In the users table, in the row for the user account you want to disable, click the
button.
l
Select multiple users:
a. In the users table, click the check box for each user you want to disable.
Tenable Vulnerability Management disables the selected user or users. In the users table, a
disabled user appears in light gray.
Note: If the user you disable has a session in progress, they may continue to have limited access.
However, once they log out, they cannot log back in.
- 1069 -
When you disable a user account, you can enable an account again to restore a user's access.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Vulnerability Management account.
- 1070 -
Tenable Vulnerability Management enables the selected user or users. In the users table, an
enabled user appears in black.
Users can access Tenable Vulnerability Management using the following methods:
l Tenable Vulnerability Management REST API with API keys. For more information, see
Generate Another User's API Keys.
When you create a new user, all access methods are authorized by default. Depending on your
organization's security policies, you may need to disable certain access methods, for example,
disable username and password login to enforce SSO.
Use the Tenable Vulnerability Management Platform API to view, grant, and revoke access
authorizations for a user. For more information, see Get User Authorizations and Update User
Authorizations in the Tenable Developer Portal.
In Tenable Vulnerability Management, the audit log records user events that take place in your
organization's Tenable Vulnerability Management account. For each event, the log includes
information about:
l The user ID
The audit log provides visibility into the actions that users in your organization take in Tenable
Vulnerability Management, and can be helpful for identifying security issues and other potential
problems.
To view the audit log for your organization's Tenable Vulnerability Management account:
- 1071 -
l Use the Audit Log endpoint as documented in the Tenable Developer Portal.
Logged Events
Audit log events include the following:
Action Description
session.create The system created a session for the user. A user login
triggers this event.
Export Users
On the Users page, you can export one or more users in CSV or JSON format.
- 1072 -
To export your users:
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Vulnerability Management account.
The Users page appears. This page contains a table that lists all users for your Tenable
Vulnerability Management instance.
5. (Optional) Refine the table data. For more information, see Tenable Vulnerability Management
Workbench Tables.
Export
Action
Scope
- 1073 -
user a. In the users table, right-click the row for the user you want to
export.
-or-
In the users table, in the Actions column, click the button in the
row for the user you want to export.
b. Click Export.
l A text box to set the number of days before the export expires.
Format Description
Note: If your .csv export file includes a cell that begins with any of the following
characters (=, +, -, @), Tenable Vulnerability Management automatically inputs a
single quote (') at the beginning of the cell. For more information, see the
related knowledge base article.
- 1074 -
JSON A JSON file that contains a nested list of users.
9. (Optional) Deselect any fields you do not want to appear in the export file.
10. In the Expiration box, type the number of days before the export file expires.
Note: Tenable Vulnerability Management allows you to set a maximum of 30 calendar days for export
expiration.
l In the Start Date and Time section, select the date and time on which you want the
export schedule to start.
l In the Time Zone drop-down box, select the time zone to which you want the schedule
to adhere.
l In the Repeat drop-down box, select how often you want the export to repeat.
l In the Repeat Ends drop-down, select the date on which you want the schedule to end.
Note: If you select never, the schedule repeats until you modify or delete the export schedule.
Note: You can enable email notifications with or without scheduling exports.
l In the Add Recipients box, type the email addresses to which you want to send the
export notification.
- 1075 -
l (Required) In the Password box, type a password for the export file. You must share this
password with the recipients to allow them to download the file.
Note: Tenable Vulnerability Management sends an email to the recipients and from the link in
the email, the recipients can download the file by providing the correct password.
Tenable Vulnerability Management begins processing the export. Depending on the size of the
exported data, Tenable Vulnerability Management may take several minutes to process the
export.
When processing completes, Tenable Vulnerability Management downloads the export file to
your computer. Depending on your browser settings, your browser may notify you that the
download is complete.
14. Access the export file via your browser's downloads directory. If you close the export plane
before the download finishes, then you can access your export file in the Export Management
View.
Before you delete a user account, you must first disable the user account.
Caution: Once you delete a user account, the account cannot be recovered and the action cannot be
reversed.
Caution: Tenable Web App Scanning does not support object migration. When you delete a Tenable Web
App Scanning user, the application does not reassign objects belonging to the deleted users. Note that you
cannot reassign a Tenable Web App Scanning scan to a new owner if its owner is deleted.
Caution: Before you delete a user account, reassign any associated Remediation projects. These will not be
reassigned automatically.
The following table describes what objects are migrated, retained, or permanently deleted upon
user deletion:
- 1076 -
Object Type Deleted Notes
Exclusions No Retained
Connectors No Retained
Sensors No Retained
- 1077 -
1. In the upper-left corner, click the button.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Vulnerability Management account.
4. In the users table, in the row for the user account you want to delete, click the button.
A menu appears.
Note: If a user is not disabled, then the button does not appear. Disable the user before deleting
them.
Note: You cannot delete the Default Administrator account. If you want to delete the Default
Administrator account, you must contact Tenable Support.
6. In the Select New Object Owner drop-down box, select the user to which you want to transfer
any of the user's objects (e.g., scan results, user-defined scan templates).
7. Click Delete.
8. Click Delete.
Tenable Vulnerability Management deletes the user and transfers any user objects to the user
you designated.
User Groups
User groups allow you to manage user permissions for various resources in Tenable Vulnerability
Management. When you assign users to a group, the users inherit the permissions assigned to the
- 1078 -
group. Your organization may utilize groups to provide permissions to batches of users based on
the roles of those users and your organization's security posture.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Vulnerability Management account.
The User Groups page displays a table of all user groups in your Tenable Vulnerability Management
instance. This documentation refers to that table as the user groups table.
Column Description
Name The group name. You can define this name for all user groups except the
Tenable-provided All Users and Administrator groups.
l Create a Group
l Edit a Group
- 1079 -
l Export Groups
l Delete a Group
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Vulnerability Management account.
4. At the top of the user group table, click the Create User Group button.
5. In the User Group Name box, type a name for the new group.
- 1080 -
a. For each user you want to add, click the Users drop-down box and begin typing a
username.
As you type, Tenable Vulnerability Management filters the list of users in the drop-down
box to match your search.
Tenable Vulnerability Management adds the user to the list of users to be added to the
user group.
Tip: To remove a user from the list of users to be added, roll over the user and click the
button.
7. Click Save.
Tenable Vulnerability Management creates the user group and adds the listed users as
members.
The Groups page appears, where you can view the new group listed in the user groups table.
To edit a group:
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Vulnerability Management account.
4. In the user groups table, click the user group that you want to edit.
- 1081 -
5. Do any of the following:
l
Add users to the group:
a. For each user you want to add, click the Users drop-down box and begin typing a
username.
As you type, Tenable Vulnerability Management filters the list of users in the drop-
down box to match your search.
Tenable Vulnerability Management adds the user to the list of users to be added to
the user group.
l
Remove a user from the group:
a. In the Users list, click the button next to the user account you want to remove.
Tenable Vulnerability Management removes the user from the Users list.
6. Click Save.
Tenable Vulnerability Management saves the user group with any changes you made.
Export Groups
On the Access Control page, in the Groups tab, you can export one or more user groups in CSV or
JSON format.
- 1082 -
The Settings page appears.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Vulnerability Management account.
The Groups tab appears, containing a table that lists all user groups in your Tenable
Vulnerability Management instance.
5. (Optional) Refine the table data. For more information, see Tenable Vulnerability Management
Workbench Tables.
-or-
In the groups table, in the Actions column, click the button in the row for the group
you want to export.
b. Click Export.
l A text box to set the number of days before the export expires.
- 1083 -
To export multiple groups:
a. In the groups table, select the check box for each group you want to export.
Note: You can individually select and export up to 200 groups. If you want to export more than
200 groups, you must select all the groups on your Tenable Vulnerability Management instance
by selecting the check box at the top of the groups table and then click Export.
l A text box to set the number of days before the export expires.
l A text box to set the number of days before the export expires.
- 1084 -
Format Description
Note: If your .csv export file includes a cell that begins with any of the following
characters (=, +, -, @), Tenable Vulnerability Management automatically inputs a
single quote (') at the beginning of the cell. For more information, see the
related knowledge base article.
9. (Optional) Deselect any fields you do not want to appear in the export file.
10. In the Expiration box, type the number of days before the export file expires.
Note: Tenable Vulnerability Management allows you to set a maximum of 30 calendar days for export
expiration.
l In the Start Date and Time section, select the date and time on which you want the
export schedule to start.
l In the Time Zone drop-down box, select the time zone to which you want the schedule
to adhere.
l In the Repeat drop-down box, select how often you want the export to repeat.
l In the Repeat Ends drop-down, select the date on which you want the schedule to end.
Note: If you select never, the schedule repeats until you modify or delete the export schedule.
Note: You can enable email notifications with or without scheduling exports.
- 1085 -
l Click the Email Notification toggle.
l In the Add Recipients box, type the email addresses to which you want to send the
export notification.
l (Required) In the Password box, type a password for the export file. You must share this
password with the recipients to allow them to download the file.
Note: Tenable Vulnerability Management sends an email to the recipients and from the link in
the email, the recipients can download the file by providing the correct password.
Tenable Vulnerability Management begins processing the export. Depending on the size of the
exported data, Tenable Vulnerability Management may take several minutes to process the
export.
When processing completes, Tenable Vulnerability Management downloads the export file to
your computer. Depending on your browser settings, your browser may notify you that the
download is complete.
14. Access the export file via your browser's downloads directory. If you close the export plane
before the download finishes, then you can access your export file in the Export Management
View.
Delete a Group
Note: You cannot delete the Tenable-provided Administrator or All Users user group.
- 1086 -
1. In the upper-left corner, click the button.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Vulnerability Management account.
The Groups page appears. This page displays a table with all the user groups on your Tenable
Vulnerability Management account.
l
To delete a single user group:
a. In the user groups table, click the button for the user group you want to delete.
A menu appears.
l
To delete multiple user groups.
a. In the user groups table, select the check box for each user group you want to
delete.
Tenable Vulnerability Management deletes the selected user group or groups. The deleted
group or groups no longer appear in the user groups table.
- 1087 -
Permissions
Tenable Vulnerability Management allows you to create and manage configurations that determine
which users on your organization's account can perform specific actions with the organization's
resources and data. This documentation refers to these configurations as permission
configurations1.
On the My Accounts page, each user can view the permission configurations assigned to them.
However, only administrator users can view or manage permission configurations for other users.
For more information, see Tenable-Provided Roles and Privileges.
When you create a user or user group, you can assign existing permission configurations to them
for assets that meet the criteria specified by a previously created tag. In Tenable Vulnerability
Management, these assets and the tags that define them are called objects2.
l Roles — Roles allow you to manage privileges for major functions in Tenable Vulnerability
Management and control which Tenable Vulnerability Management modules and functions users can
access.
l Permissions — Permissions allow you to manage access to your own data, such as Tags, Assets,
and their Findings.
1A configuration that administrators can create to determine what actions certain users and groups
- 1088 -
When you create a permission configuration, you must select one or more of the following
predefined permissions. These permissions determine the actions users can take with the object or
objects defined in the permission configuration.
Permission Description
Can View Allows a user or group with this permission to view the assets defined by the
object.
Can Scan Allows a user or group with this permission to scan the assets defined by the
object.
Note: For a manually entered target to be considered valid, it must meet the
following criteria:
Can Edit Allows a user or group with this permission to edit the tag that defines the
object.
Can Use Allows a user or group with this permission to use the tag that defines the
object.
- 1089 -
2. In the left navigation plane, click Settings.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Vulnerability Management account.
The Permissions tab appears. This tab contains a table that lists all of the permission
configurations on your Tenable Vulnerability Management instance.
Note:The first row of the permissions table contains a read-only entry for Administrators. This entry
exists to remind you that Administrators have all permissions for every resource on your account.
For more information, see Roles.
- 1090 -
Required User Role: Administrator
When you create a permission configuration in Tenable Vulnerability Management, you can apply
that configuration to one or more users or groups.
l Create a tag for the object for which you want to create a permission.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Vulnerability Management account.
The Permissions tab appears. This tab contains a table that lists all of the permission
configurations on your Tenable Vulnerability Management instance.
- 1091 -
6. In the Permission Name box, type a name for the permission configuration.
Note: Although the Users box is optional, you cannot save the permission configuration unless at
least one user or user group is selected.
8. (Optional) In the Groups drop-down box, select one or more user groups.
Note: Although the Groups box is optional, you cannot save the permission configuration unless at
least one user or user group is selected.
Note: You can select All Users in the Groups drop-down box to assign the permission configuration
to all users on your Tenable Vulnerability Management instance. However, Tenable recommends that
you use caution when assigning the permission configuration to all users because doing so goes
against security best practices.
- 1092 -
Caution: Adding the Can Edit permission to your permission configuration along with the Can View
or Can Scan permission allows assigned users to change the scope of the assets they can view and
scan. Tenable recommends that you combine the Can Edit permission with the Can View or Can
Scan permission only for administrator users.
Note: If you select the Can Edit permission, Tenable Vulnerability Management automatically adds
the Can Use permission.
10. In the Objects drop-down box, select one or more objects to which to apply the permission
configuration.
Note: The objects in the drop-down box are previously created tags that identify and define your
assets. For more information, see Permissions.
Tip: You can select All Assets to allow users and group to view or scan all the assets on your
instance, regardless of whether the assets match any existing objects. You can also select All Tags
to allow users and groups on your instance to edit or use all objects on your instance. For more
information about objects, see Permissions.
Tenable Vulnerability Management saves your changes. The permission configuration appears
on the Permissions tab.
- 1093 -
1. In the upper-left corner, click the button.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Vulnerability Management account.
l
Add a permission configuration to a user:
a. Click the Users tab.
The Users tab appears. This tab contains a list of all the users on your Tenable
Vulnerability Management instance.
b. In the users table, click the user to which you want to add a permission
configuration.
c. In the Permissions section, at the top of the table, click Add Permissions.
e. Click Add.
The permission configuration appears in the Permissions table on the Edit User
page.
l
Add a permission configuration to a user group:
- 1094 -
a. Click the Groups tab.
The Groups tab appears. This tab contains a list of all the user groups on your
Tenable Vulnerability Management instance.
b. In the groups table, click the group to which you want to add a permission
configuration.
c. In the Permissions section, at the top of the table, click Add Permissions.
e. Click Add.
The permission configuration appears in the Permissions table on the Edit User
Group page.
5. Click Save.
Tenable Vulnerability Management saves your changes and adds the permission configuration
to the user or group.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Vulnerability Management account.
- 1095 -
4. Click the Permissions tab.
The Permissions tab appears. This tab contains a list of all the permission configurations on
your Tenable Vulnerability Management instance.
6. (Optional) In the Permission Name box, type a new name for the permission configuration.
Caution: Adding the Can Edit permission to your permission configuration along with the Can View or
Can Scan permission allows the users selected in the permission configuration to change the scope
of the assets they can view and scan. Tenable recommends that you combine the Can Edit
permission with the Can View or Can Scan permission only for administrator users.
Note: If you select the Can Edit permission, Tenable Vulnerability Management automatically adds
the Can Use permission.
Note: You cannot assign permissions to user or groups for a given object that overlap with
permissions assigned to them via another permission configuration. For example, if you selected the
Can Edit permission for an object, but a user listed under Users already has the ability to edit that
object based on an existing permission configuration, Tenable Vulnerability Management generates
an error message and prevents you from saving the current permission configuration until you
modify your selections to remove the redundancy.
b. To remove a permission, in the Permissions drop-down box, click the button next to
each permission you want to remove.
- 1096 -
a. To add an object, in the Objects drop-down box, select one or more objects.
b. To remove an object, in the Objects drop-down box, click the button next to each
object you want to remove.
Tenable Vulnerability Management saves your changes. The updated permission configuration
appears on the Permissions tab.
On the Permissions page, you can export one or more permission configurations in CSV or JSON
format.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Vulnerability Management account.
The Permissions tab appears. This tab contains a table that lists all of the permission
configurations on your Tenable Vulnerability Management instance.
Note:The first row of the permissions table contains a read-only entry for Administrators. This entry
exists to remind you that Administrators have all permissions for every resource on your account.
For more information, see Roles.
- 1097 -
5. (Optional) Refine the table data. For more information, see Tenable Vulnerability Management
Workbench Tables.
-or-
In the permission configurations table, in the Actions column, click the button in the
row for the permission configuration you want to export.
b. Click Export.
A menu appears.
c. Click Export.
Note: You can individually select and export up to 200 permission configurations. If you want
to export more than 200 permission configurations, you must select all the permission
configurations on your Tenable Vulnerability Management instance by selecting the check box
at the top of the permission configurations table and then click Export.
- 1098 -
l A text box to configure the export file name.
l A text box to set the number of days before the export expires.
Format Description
Note: If your .csv export file includes a cell that begins with any of the following
characters (=, +, -, @), Tenable Vulnerability Management automatically inputs a
single quote (') at the beginning of the cell. For more information, see the
related knowledge base article.
9. (Optional) Deselect any fields you do not want to appear in the export file.
10. In the Expiration box, type the number of days before the export file expires.
Note: Tenable Vulnerability Management allows you to set a maximum of 30 calendar days for export
expiration.
- 1099 -
l In the Start Date and Time section, select the date and time on which you want the
export schedule to start.
l In the Time Zone drop-down box, select the time zone to which you want the schedule
to adhere.
l In the Repeat drop-down box, select how often you want the export to repeat.
l In the Repeat Ends drop-down, select the date on which you want the schedule to end.
Note: If you select never, the schedule repeats until you modify or delete the export schedule.
Note: You can enable email notifications with or without scheduling exports.
l In the Add Recipients box, type the email addresses to which you want to send the
export notification.
l (Required) In the Password box, type a password for the export file. You must share this
password with the recipients to allow them to download the file.
Note: Tenable Vulnerability Management sends an email to the recipients and from the link in
the email, the recipients can download the file by providing the correct password.
Tenable Vulnerability Management begins processing the export. Depending on the size of the
exported data, Tenable Vulnerability Management may take several minutes to process the
export.
When processing completes, Tenable Vulnerability Management downloads the export file to
your computer. Depending on your browser settings, your browser may notify you that the
download is complete.
- 1100 -
14. Access the export file via your browser's downloads directory. If you close the export plane
before the download finishes, then you can access your export file in the Export Management
View.
Note: You cannot remove a permission configuration from the Tenable-provided Administrator or All
Users user groups.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Vulnerability Management account.
o
Remove the permission configuration via the Users tab:
a. Click the Users tab.
The Users tab appears. This tab contains a list of all the users on your
Tenable Vulnerability Management instance.
b. In the users table, click the user from which you want to remove a
permission configuration.
- 1101 -
c. In the Permissions table, in the Actions column, click the button next to
the permission configuration you want to remove.
e. (Optional) Repeat for each user from which you want to remove a permission
configuration.
o
Remove the permission via the Permissions tab:
a. Click the Permissions tab.
The Permissions tab appears. This tab contains a table that lists all of the
permission configurations on your Tenable Vulnerability Management
instance.
c. Under Users, click the button next to each user from which you want to
remove the permission configuration.
o
Remove the permission configuration via the Groups tab:
a. Click the Groups tab.
The Groups tab appears. This tab contains a list of all the user groups on
your Tenable Vulnerability Management instance.
- 1102 -
b. In the user groups table, click the group from which you want to remove a
permission configuration.
c. In the Permissions table, in the Actions column, click the button next to
the permission configuration you want to remove.
e. (Optional) Repeat for each user group from which you want to remove a
permission configuration.
o
Remove the permission configuration via the Permissions tab:
a. Click the Permissions tab.
The Permissions tab appears. This tab contains a table that lists all of the
permission configurations on your Tenable Vulnerability Management
instance.
c. Under Groups, click the button next to each user group from which you
want to remove the permission configuration.
6. Click Save.
Tenable Vulnerability Management saves your changes and removes the permission from the
user or group.
- 1103 -
Note: You cannot delete the default permission configuration.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Vulnerability Management account.
The Permissions tab appears. This tab contains a table that lists all of the permission
configurations on your Tenable Vulnerability Management instance.
5. In the table, in the Actions column, click the button next to the permission configuration you
want to delete.
Roles
Roles allow you to manage privileges for major functions in Tenable Vulnerability Management and
control which Tenable Vulnerability Management resources users can access in Tenable
Vulnerability Management.
When you create a user, you must select a role for that user that broadly determine the actions the
user can perform.
Note: You can further refine user access to specific resources by assigning permissions to individual users
or groups. For more information, see Permissions.
- 1104 -
Roles vs. Permissions: What's the difference?
l Roles — Roles allow you to manage privileges for major functions in Tenable Vulnerability
Management and control which Tenable Vulnerability Management modules and functions users can
access.
l Permissions — Permissions allow you to manage access to your own data, such as Tags, Assets,
and their Findings.
On the Roles page, you can view all Tenable-provided roles and any custom roles created on your
Tenable Vulnerability Management instance.
Custom Contains a custom set of privileges that allow you to tailor user privileges and
Roles access to resources on your Tenable Vulnerability Management instance.
- 1105 -
2. In the left navigation plane, click Settings.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Vulnerability Management account.
The Roles page appears. This page contains a table that lists all the user roles available on
your Tenable Vulnerability Management instance.
l Duplicate a Role
l Export Roles
The following tables describe privileges associated with each Tenable-provided user role, organized
by function in their respective product.
Note: You can further refine user access to specific resources by assigning permissions to individual users
or groups. For more information, see Permissions.
- 1106 -
Tenable Vulnerability Management-Provided Roles and Privileges
Area Administrator Scan Standard Scan Basic
Manager Operator
- 1107 -
Tenable Vulnerability Management-Provided Roles and Privileges
Area Administrator Scan Standard Scan Basic
Manager Operator
Reports view, run, view, run, view, run, view, run, view
create, modify, create, create, create,
delete modify, modify, modify,
delete delete delete
- 1108 -
Tenable Vulnerability Management-Provided Roles and Privileges
Area Administrator Scan Standard Scan Basic
Manager Operator
1User roles determine a user's abilities, but the permissions that a user has for a particular scan are
- 1109 -
Tenable Vulnerability Management-Provided Roles and Privileges
Area Administrator Scan Standard Scan Basic
Manager Operator
- 1110 -
Tenable Web App Scanning-Provided Roles and Privileges
Area Administrator Scan Standard Scan Basic
Manager Operator
1Can create scans using existing user-defined policies that are shared with the user.
2Administrator users can create, modify, and delete permissions for scans that any user on the
account owns.
3Scan Manager users can create, modify, or delete permissions only on scans they own.
4Standard users can create, modify, or delete permissions only on scans they own.
5Scan Operator users can create, modify, or delete permissions only on scans they own.
- 1111 -
Tenable Web App Scanning-Provided Roles and Privileges
Area Administrator Scan Standard Scan Basic
Manager Operator
permissions)
Export manage own manage own manage own manage own manage own
- 1112 -
Tenable Inventory-Provided Roles and Privileges
Area Administrator Scan Standard Scan Basic
Manager Operator
Export manage own manage own manage own manage own manage own
- 1113 -
delete delete
Note: By default, Tenable Attack Surface Management users created within Tenable One are given the
Active User role.
Custom Roles
You can create custom roles for users on your Tenable Vulnerability Management instance to give
those users privileges that are specific to your organization's needs.
When you create a custom role, you can add all or some of the following privileges. You can also
edit a custom role to remove privileges. Which privileges you can add to or remove from a role
depend on the area of Tenable Vulnerability Management where each privilege applies.
- 1114 -
Note: A user's access to resources on the account may be limited by their permissions, regardless of their
role.
l Create — Allows users to create an exposure card or a tag. This privilege is specific to Lumin
Exposure View and Tenable Inventory, respectively.
l Manage — Allows the user to create, modify, and delete in the area where the privilege
applies.
Note: When you add the Manage privilege to a custom role, Tenable automatically adds the Read
privilege as well. You cannot disable the Read privilege unless you first disable the Manage privilege.
l Manage All — Allows the user to view, modify, and delete exports, including exports that
others created.
l Manage Own — Allows the user to view, modify, and delete only exports that the user created.
l Share — Allows the user to share objects with other users or groups.
Note: If a custom role does not also have the Read permission enabled, they cannot access a list of
other users with which to share objects.
l Read — Allows the user to view items in the area where the privilege applies.
l Use — Allows the user to use Tenable-provided scan templates during scan creation.
l Submit PCI — Allows the user to submit the scan for PCI validation. For more information, see
the Tenable PCI ASV User Guide.
l Search — Allows the user to search for a query where the privilege applies. This privilege is
specific to Attack Path Analysis.
l Save — Allows the user to save a query where the privilege applies. This privilege is specific to
Attack Path Analysis.
l Cloud Resource — Allows the user to access assets from Cloud Resource data sources. This
privilege is specific to Lumin Exposure View and Tenable Inventory.
l Computing Resource — Allows the user to access assets from Computing Resource data
sources. This privilege is specific to Lumin Exposure View and Tenable Inventory.
- 1115 -
l Identity — Allows the user to access assets from Identity data sources. This privilege is
specific to Lumin Exposure View and Tenable Inventory.
l Web Application — Allows the user to access assets from Web Application data sources. This
privilege is specific to Lumin Exposure View and Tenable Inventory.
The following table describes the privilege options available for custom roles in different sections
of Tenable Vulnerability Management.
Note: When you create a custom role, you must include Read privileges for the General Settings, License,
and My Account sections. If you do not include Read privileges for these sections, users assigned to the
role cannot log in to Tenable Vulnerability Management.
Platform Settings
Asset Read
Findings Read
Caution: Adding the Manage privilege in Access Control allows any user with
that custom role to create an Administrator user, log in as that user, and
change the privileges or permissions for any user on your Tenable
Vulnerability Management instance, including their own. If you want to
create a user account with the ability to manage your Access Control
configurations, Tenable recommends that you assign that user the
Administrator role. For more information, see Tenable-Provided Roles and
Privileges.
License Read
Information
Vulnerability Management
- 1116 -
Dashboard Manage, Share
Note: Custom role privileges in the Dashboards section do not include the
ability to export a dashboard. Assign a Tenable-provided role to a user if you
want the user to be able to export dashboards.
Note: All users can view the dashboards they create or that others share with
them regardless of the privileges you assign to them.
Asset Inventory
Inventory Read
- 1117 -
Scan
Tenable-Provided Use
Scan Template
Note: Tenable applications do not currently support managing scans and sensors via Custom Roles.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Vulnerability Management account.
- 1118 -
The Roles page appears. This page contains a table that lists all the user roles available on
your Tenable Vulnerability Management instance.
l
Add a new role:
a. At the top of the table, click Add Role.
c. (Optional) In the Description box, type a description for your custom role.
- 1119 -
i. In the left panel, click the application name.
ii. Click the Enable toggle to enable or disable access to this application for the
custom role you're creating.
iii. Select the checkbox for each privilege you want to add to your custom role.
For more information about available privileges, see Custom Roles.
e. Click Save.
Tenable Vulnerability Management saves the role and adds it to the roles table.
Duplicate a Role
- 1120 -
Required User Role: Administrator
You can create a custom role by duplicating any existing custom role and then modifying
the new role configurations as desired.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Vulnerability Management account.
The Roles page appears. This page contains a table that lists all the user roles available on
your Tenable Vulnerability Management instance.
5. In the roles table, select the check box next to the role you want to duplicate.
A menu appears.
7. Click Duplicate.
A copy of the role appears in the table, with the prefix Copy of [role name].
The Roles Details page appears. The name, description, and selected privileges for the
duplicate role are copied from the original role.
- 1121 -
9. Update one or more of the following configurations:
l Name — In the Name box, type a new name for the role.
l Privileges — Under each Tenable Vulnerability Management area, select or deselect the
check box next to each privilege you want to add to or remove from the role.
Note: Tenable applications do not currently support managing scans and sensors via Custom Roles.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Vulnerability Management account.
The Roles page appears. This page contains a table that lists all the user roles available on
your Tenable Vulnerability Management instance.
- 1122 -
l Name — In the Name box, type a new name for the role.
l Privileges — Under each Tenable Vulnerability Management area, select or deselect the
check box next to each privilege you want to add to or remove from the role.
7. Click Save.
Note: You can delete only custom roles. You cannot delete Tenable-Provided Roles and Privileges.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Vulnerability Management account.
The Roles page appears. This page contains a table that lists all the user roles available on
your Tenable Vulnerability Management instance.
5. In the table, in the Actions column, click the button next to the role you want to delete.
Tenable Vulnerability Management deletes the role and removes it from the roles table.
Export Roles
- 1123 -
Required User Role: Administrator
On the Roles page, you can export one or more user groups in CSV or JSON format.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Vulnerability Management account.
The Roles page appears. This page contains a table that lists all the Tenable-provided and
custom roles on your Tenable Vulnerability Management instance.
5. (Optional) Refine the table data. For more information, see Tenable Vulnerability Management
Workbench Tables.
-or-
In the roles table, in the Actions column, click the button in the row for the role you
want to export.
b. Click Export.
- 1124 -
To export multiple roles:
a. In the roles table, select the check box for each role you want to export.
Note: You can individually select and export up to 200 roles. If you want to export more than
200 roles, you must select all the roles on your Tenable Vulnerability Management instance by
selecting the check box at the top of the roles table and then click Export.
l A text box to set the number of days before the export expires.
Format Description
Note: If your .csv export file includes a cell that begins with any of the following
characters (=, +, -, @), Tenable Vulnerability Management automatically inputs a
single quote (') at the beginning of the cell. For more information, see the
related knowledge base article.
- 1125 -
Empty fields are not included in the JSON file.
9. (Optional) Deselect any fields you do not want to appear in the export file.
10. In the Expiration box, type the number of days before the export file expires.
Note: Tenable Vulnerability Management allows you to set a maximum of 30 calendar days for export
expiration.
l In the Start Date and Time section, select the date and time on which you want the
export schedule to start.
l In the Time Zone drop-down box, select the time zone to which you want the schedule
to adhere.
l In the Repeat drop-down box, select how often you want the export to repeat.
l In the Repeat Ends drop-down, select the date on which you want the schedule to end.
Note: If you select never, the schedule repeats until you modify or delete the export schedule.
Note: You can enable email notifications with or without scheduling exports.
l In the Add Recipients box, type the email addresses to which you want to send the
export notification.
l (Required) In the Password box, type a password for the export file. You must share this
password with the recipients to allow them to download the file.
- 1126 -
Note: Tenable Vulnerability Management sends an email to the recipients and from the link in
the email, the recipients can download the file by providing the correct password.
Tenable Vulnerability Management begins processing the export. Depending on the size of the
exported data, Tenable Vulnerability Management may take several minutes to process the
export.
When processing completes, Tenable Vulnerability Management downloads the export file to
your computer. Depending on your browser settings, your browser may notify you that the
download is complete.
14. Access the export file via your browser's downloads directory. If you close the export plane
before the download finishes, then you can access your export file in the Export Management
View.
Caution: Unless your network assignments are restricted to only IPv4 addresses or only IPv6 addresses,
you must specify allowed ranges for both IPv4 and IPv6 in order to avoid blocking some API traffic. It is not
always predictable whether a given client will connect via IPv4 or IPv6.
- 1127 -
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Vulnerability Management account.
5. In the text box, type the IPv4 addresses to which you want to grant Tenable Vulnerability
Management API access.
Tip: The list can include discrete IP addresses, IP address ranges, and IP subnets. For example,
192.0.2.0, 198.51.100.4-198.51.100.10, 203.0.113.0/24 or
2001:db8:2e92:75f2:d40a:e290:10b3:c0f, 2001:db8:1e1f:46a1:e3cb:2110:22c6:0000-
2001:db8:1e1f:46a1:e3cb:2110:22c6:ffff, 2001:0DB8::/32.
6. Click Save.
Tenable Vulnerability Management allows only the specified IPv4 addresses to access the
Tenable Vulnerability Management API.
Activity Logs
- 1128 -
On the Activity Logs page, you can view a list of events for all users in your organization's Tenable
Vulnerability Management account. You can see when each activity took place, the action, the
actor, and other relevant information about the activity.
Important: Tenable currently retains activity log data for 3 years, after which it is deleted from the Tenable
database.
The Activity Logs page appears. This page shows a list of activities associated with your
organization's Tenable Vulnerability Management account.
4. (Optional) Refine the table data. For more information, see Tenable Vulnerability Management
Tables.
Filter Description
- 1129 -
Actor ID The ID of the account performing the action.
6. (Optional) To refresh the activity logs table, in the upper-right corner, click the Refresh
button.
l Last 7 Days
l Last 14 Days
l Last 30 Days
l Last 90 Days
l All
What to do next:
l (Optional) Export one or more activity logs.
On the Activity Logs page, you can export one or more activity logs in CSV or JSON format.
- 1130 -
The Activity Logs page appears. This page shows a list of activities associated with your
organization's Tenable Vulnerability Management account.
4. (Optional) Refine the table data. For more information, see Filter a Table.
Export
Action
Scope
-or-
In the activity logs table, in the Actions column, click the button
in the row for the activity log you want to export.
b. Click Export.
- 1131 -
l A text box to configure the export file name.
l A text box to set the number of days before the export ages out.
Format Description
Note: If your .csv export file includes a cell that begins with any of the following
characters (=, +, -, @), Tenable Vulnerability Management automatically inputs a
single quote (') at the beginning of the cell. For more information, see the
related knowledge base article.
8. (Optional) Deselect any fields you do not want to appear in the export file.
9. In the Expiration box, type the number of days before the export file ages out.
Note: Tenable Vulnerability Management allows you to set a maximum of 30 calendar days for export
expiration.
- 1132 -
l In the Start Date and Time section, select the date and time on which you want the
export schedule to start.
l In the Time Zone drop-down box, select the time zone to which you want the schedule
to adhere.
l In the Repeat drop-down box, select how often you want the export to repeat.
l In the Repeat Ends drop-down, select the date on which you want the schedule to end.
Note: If you select never, the schedule repeats until you modify or delete the export schedule.
Note: You can enable email notifications with or without scheduling exports.
l In the Add Recipients box, type the email addresses to which you want to send the
export notification.
l (Required) In the Password box, type a password for the export file. You must share this
password with the recipients to allow them to download the file.
Note: Tenable Vulnerability Management sends an email to the recipients and from the link in
the email, the recipients can download the file by providing the correct password.
Tenable Vulnerability Management begins processing the export. Depending on the size of the
exported data, Tenable Vulnerability Management may take several minutes to process the
export.
When processing completes, Tenable Vulnerability Management downloads the export file to
your computer. Depending on your browser settings, your browser may notify you that the
download is complete.
13. Access the export file via your browser's downloads directory. If you close the export plane
before the download finishes, then you can access your export file from the Exports page.
Access Groups
- 1133 -
Tenable is retiring access groups. Moving forward, Tenable recommends that you use permissions to
manage user and group access to resources on your Tenable Vulnerability Management instance and that
you convert your existing access groups into permission configurations. For more information, see
Transition to Permission Configurations.
Note: System target group permissions that controlled viewing scan results and scanning specified targets
have been migrated to access groups. For more information, see Scan Permissions Migration.
With access groups, you can control which users or groups in your organization can:
l View specific assets and related vulnerabilities in aggregated scan result views.
l Run scans against specific targets and view individual scan results for the targets.
An access group contains assets or targets as defined by the rules you set. Access group rules
specify identifying attributes that Tenable Vulnerability Management uses to associate assets or
targets with the group (for example, an AWS Account ID, FQDN, or IP address). By assigning
permissions in the access group to users or user groups, you grant the users view or scan
permissions for assets or targets associated with the access group.
Note: When you create or edit an access group, Tenable Vulnerability Management may take
some time to assign assets to the access group, depending on the system load, the number of
matching assets, and the number of vulnerabilities.
You can view the status of this assignment process in the Status column of the access groups
table on the Access Groups page.
Only administrators can view, create, and edit access groups. As a user assigned any other role, you
can see the access groups to which you belong and the related rules, but not the other users that
are in the access group.
Note: The Access Group tile appears only if you have one or more assigned access groups or if you are an
administrator and users on your Tenable Vulnerability Management are assigned to access groups. Once
you convert all your access groups to permission configurations, the Access Group tile will no longer
appear on your account.
By default, all users have No Access to all assets on your Tenable Vulnerability Management
instance. Therefore, if you want to assign permissions for assets, you must create an access group
and configure user permissions for the group.
- 1134 -
Note: Tenable Vulnerability Management applies dynamic tags to any assets, regardless of access group
scoping. As a result, it may apply tags you create to assets outside of the access groups to which you
belong.
Tenable is converting all access groups into permission configurations. As this conversion runs, you may
notice your existing access groups undergoing changes. Moving forward, Tenable recommends that you
use permissions to manage user and group access to resources on your Tenable Vulnerability Management
instance. For more information, see Transition to Permission Configurations.
Tenable Vulnerability Management has consolidated and moved user and group management to the
Access Control page to make access management more intuitive and efficient.
As part of this effort, Tenable Vulnerability Management is replacing Access Groups with
Permissions, a feature that allows you to create permission configurations. These permission
configurations use tags to determine which users and groups on your Tenable Vulnerability
Management instance can perform specific tasks with your organization's resources.
Previously, you had to create access groups to customize access settings for users on your
instance. When you create a permission configuration, you can view and manage access settings
for users and groups on the Access Control page, where you manage users and groups.
Tenable Vulnerability Management plans to retire access groups once all existing access groups are
converted into permissible configurations. Tenable Vulnerability Management encourages you to
use permission configurations to manage user access to your resources.
What to Expect
As Tenable Vulnerability Management converts your access group data into permission
configurations, you may notice the following changes:
l Tenable Vulnerability Management has split up your access groups that have more than one
access group type and recreated them as separate groups based on type. For more
- 1135 -
information about access group types, see Access Group Types.
l Tenable Vulnerability Management has converted all your Scan Target type access groups into
Manage Assets type access groups.
l Tenable Vulnerability Management has updated access group rule filters to match tag rule
filters and operators.
l For each access group on your instance that is based on rules instead of tags, Tenable
Vulnerability Management has created tags based on the access group rules and updated the
groups to reference the new tags. For more information about tag rules, see Tag Rules.
l For each access group on your install, Tenable Vulnerability Management has created
permission configurations based on the rules and user permissions defined in that access
group.
Task Parity
The following table lists common tasks you may perform on the Access Groups page and their
equivalent tasks on the Permissions page.
- 1136 -
Tenable is converting all access groups into permission configurations. As this conversion runs, you may
notice your existing access groups undergoing changes. Moving forward, Tenable recommends that you
use permissions to manage user and group access to resources on your Tenable Vulnerability Management
instance. For more information, see Transition to Permission Configurations.
On the Access Groups page, you can convert your existing access groups into permission
configurations.
Note: Once you convert an access group into a permission configuration, you cannot revert the converted
permission configuration into an access group.
Note: The Access Group tile appears only if you have one or more assigned access groups or if you are an
administrator and users on your Tenable Vulnerability Management are assigned to access groups. Once
you convert all your access groups to permission configurations, the Access Group tile will no longer
appear on your account.
The Access Groups page appears. This page contains a table that lists the access groups to
which you have access.
4. In the access groups table, select the check box for the access group you want to convert.
Tenable Vulnerability Management begins converting your access group into a permission
configuration.
- 1137 -
Tenable Vulnerability Management updates the Status column for the access group to reflect
the current migration status.
Tenable is retiring access groups. Moving forward, Tenable recommends that you use permissions to
manage user and group access to resources on your Tenable Vulnerability Management instance and that
you convert your existing access groups into permission configurations. For more information, see
Transition to Permission Configurations.
You can create the following types of access groups. Select an access group type based on the
identifiers for the targets you want to scan.
Type Description
Manage Users can view the asset records created during previous scans and scan the
Assets associated targets for those assets.
Use this type of access group if the targets you want to view and scan have
been scanned before and can be best identified using tags based on asset
attributes (for example, operating system or AWS Account ID).
Scan Users can scan targets associated with the access group and view the results of
Targets those scans.
Use this type of access group if the targets you want to view and scan have
never been scanned before and can only be identified using certain asset
identifiers (specifically, FQDN, IPv4 address, or IPv6 address).
Note: The access group type names do not represent a limitation on the user actions that each group
controls in relation to the specified targets. For both Manage Assets and Scan Targets groups, you can
grant user permissions to view analytical results for the specified targets in dashboards, to scan the
specified targets, or to both view and scan. For more information on user permissions, see Configure User
Permissions for an Access Group.
Tip: You can add a user to both access group types if you want to allow the user to scan both types of scan
targets.
- 1138 -
Tenable is retiring access groups. Moving forward, Tenable recommends that you use permissions to
manage user and group access to resources on your Tenable Vulnerability Management instance and that
you convert your existing access groups into permission configurations. For more information, see
Transition to Permission Configurations.
The All Assets group is the default, system-generated access group to which all assets belong.
l The All Users user group, which contains all users in your organization, is assigned to the All
Assets access group.
l The permissions for the All Users group are set to Can View and Can Scan.
If you do not want all users to scan all assets and view the individual and aggregated results, you
must set the permissions for the All Users group to No Access. Optionally, you can then add
specific users or to provide individuals with access to all assets.
Note: When you create or edit an access group, Tenable Vulnerability Management may take
some time to assign assets to the access group, depending on the system load, the number of
matching assets, and the number of vulnerabilities.
You can view the status of this assignment process in the Status column of the access groups
table on the Access Groups page.
The Access Groups page appears. This page contains a table that lists the access groups to
which you have access.
- 1139 -
The Edit All Assets Access Group page appears.
5. In the Users & Groups section, locate the listing for the All Users group.
6. Remove both the Can Edit and Can Scan labels from the All Users group listing:
Note: When configuring permissions for the All Users user group, Tenable recommends
keeping the following in mind:
l If you retain the permissions for All Assets as Can View, all users can view scan results for all
assets or targets for your organization.
l If you set the permissions for All Assets to Can Scan, all users can scan all assets or targets
for your organization and view the related scan results.
7. (Optional) Configure user permissions for each user or group you want to add to the All Assets
group.
8. Click Save.
The Access Groups page appears. Access to the All Assets group is restricted to the user(s)
or group(s) you added.
Tenable is retiring access groups. Moving forward, Tenable recommends that you use permissions to
manage user and group access to resources on your Tenable Vulnerability Management instance and that
you convert your existing access groups into permission configurations. For more information, see
Transition to Permission Configurations.
You can create an access group to group assets based on rules, using information such as an AWS
Account ID, FQDN, IP address, and other identifying attributes. You can then assign permissions for
users or user groups to view or scan the assets in the access group.
- 1140 -
To create an access group:
The Access Groups page appears. This page contains a table that lists the access groups to
which you have access.
4. In the upper-right corner of the page, click the Create Access Group button.
5. In the General section, in the Name box, type a name for the access group.
6. In the Type section, select the appropriate access group type based on the type of targets
you want to scan.
If you create an access group of one type, then change the type during configuration, Tenable
Vulnerability Management prompts you to confirm the action. If you confirm, Tenable
Vulnerability Management clears any previously added rule filters.
- 1141 -
• is equal to: Tenable Vulnerability Management matches the rule to assets or targets
based on an exact match of the specified term.
Note: Tenable Vulnerability Management interprets the operator as 'equals' for rules that
specify a single IPv4 address, but interprets the operator as 'contains' for rules that specify an
IPv4 range or CIDR range.
• starts with: Tenable Vulnerability Management matches the rule to assets or targets
that start with the specified term.
• ends with: Tenable Vulnerability Management matches the rule to assets or targets
that end with the specified term.
c. In the text box, type a valid value for the selected category.
Tip: You can enter multiple values separated by commas. For IPV4 Address, you can use CIDR
notation (e.g., 192.168.0.0/24), a range (e.g., 192.168.0.1-192.168.0.255), or a comma-separated
list (e.g., 192.168.0.0, 192.168.0.1).
Note: If you configure multiple rules for an access group, the access group includes assets or
targets that match any of the rules. For example, if you configure two rules -- one that
matches on the Network Name attribute and one that matches on IPv4 Address, the access
group includes any assets in the specified network, plus any asset with the specified IPv4
address, regardless of whether that asset belongs to the specified network.
8. In the Users & Groups section, configure user permissions for the access group.
9. Click Save.
Tenable Vulnerability Management creates the access group. The Access Groups page
appears.
Note: When you create or edit an access group, Tenable Vulnerability Management may
take some time to assign assets to the access group, depending on the system load, the
number of matching assets, and the number of vulnerabilities.
- 1142 -
You can view the status of this assignment process in the Status column of the access
groups table on the Access Groups page.
Tenable is retiring access groups. Moving forward, Tenable recommends that you use permissions to
manage user and group access to resources on your Tenable Vulnerability Management instance and that
you convert your existing access groups into permission configurations. For more information, see
Transition to Permission Configurations.
You can configure access group permissions for individual users or a user group. If you configure
access group permissions for a group, you assign all users in that group the same permissions. For
more information, see User Groups.
You can assign the following access group permissions to a user or user group:
l No Access — (All Users user group only) No users (except for users or groups you specifically
assign permissions) can scan the assets or targets specified in the access group. Also, no
users can view related individual or aggregated scan results for the specified assets or
targets.
l Can View — The user's view in aggregated scan results (workbenches/dashboards) includes
data from scans of the assets or targets specified in the access group. If you assign this
permission to the All Users group for the access group, all users can view aggregated scan
results for the assets or targets in the access group.
l Can Scan — Users can scan assets or targets specified in the access group and view individual
scan results for the assets or targets. If you do not have this permission, Tenable Vulnerability
Management does not prevent you from configuring a scan using assets or targets specified
in the access group; however, the scanner does not scan the assets or targets. If you assign
this permission to the All Users group for the access group, all users can scan the assets or
targets in the access group and view the related individual scan results.
User permissions in an access group are cumulative, rather than hierarchical. To allow a user to
scan an asset or target and view results for that asset or target in aggregated results, you must set
the user's permissions in the access group to both Can View and Can Scan.
- 1143 -
Tip: To run scans auditing cloud infrastructure, configure a Scan Target access group that includes the
target 127.0.0.1, and set user permissions to Can Scan.
l
Edit permissions for the All Users user group.
The default values for the All Users user group depends on the access group:
l For the All Assets access group, Tenable Vulnerability Management assigns Can
View and Can Scan permissions to the All Users group by default. Tenable
recommends you restrict these permissions during initial configuration.
l For all other access groups, Tenable Vulnerability Management assigns No Access
permissions to the All Users group by default. For these access groups, set
permissions for the All Users group as follows:
a. Next to the permission drop-down for the All Users group, click the
button.
e. Click Save.
Tenable Vulnerability Management allows any user to view or scan the assets
or targets in the group.
l
Add a user to the access group.
a. In the search box, type the name of a user or group.
- 1144 -
b. Select a user or group from the search results.
Tenable Vulnerability Management adds the user to the access group with the
default Can View permissions and adds the related label to the user listing.
i. Next to the permission drop-down for the user or group, click the button.
Tenable Vulnerability Management adds a Can Scan label to the user listing.
d. Click Save.
l
Add permissions for an existing user.
a. Locate the user or group you want to edit.
b. Next to the permission drop-down for the user or group, click the button.
d. Click Save.
l
Remove permissions from an existing user.
a. Locate the user or group you want to edit.
b. In the label representing the permission you want to remove, click the button.
Tenable Vulnerability Management removes the permission label from the user
listing.
If you remove the last permission for the All Users group, Tenable Vulnerability
Management sets the group permissions to No Access.
- 1145 -
If you remove the last permission for an individual user or group, Tenable
Vulnerability Management prompts you to remove the user from the access group.
l
Remove a user from the access group.
a. Click the button next to the user or user group you want to delete.
The user or group disappears from the Users & Groups list.
b. Click Save.
Tenable is retiring access groups. Moving forward, Tenable recommends that you use permissions to
manage user and group access to resources on your Tenable Vulnerability Management instance and that
you convert your existing access groups into permission configurations. For more information, see
Transition to Permission Configurations.
You can edit rules for an existing access group, as well as add or remove users and user groups
assigned to the access group.
Note: You cannot edit the name or rules for the system-generated All Assets access group.
The Access Groups page appears. This page contains a table that lists the access groups to
which you have access.
- 1146 -
4. In the access groups table, click the access group you want to edit.
5. In the General section, in the Name box, type a new name for the access group.
b. Click Confirm.
l To edit an existing rule, modify the category, operator, and/or value as needed.
8. In the Users & Groups section, configure user permissions for the access group.
9. Click Save.
Tenable Vulnerability Management updates the access group with your changes. The Access
Groups page appears.
Note: When you create or edit an access group, Tenable Vulnerability Management may
take some time to assign assets to the access group, depending on the system load, the
number of matching assets, and the number of vulnerabilities.
You can view the status of this assignment process in the Status column of the access
groups table on the Access Groups page.
Tenable is retiring access groups. Moving forward, Tenable recommends that you use permissions to
manage user and group access to resources on your Tenable Vulnerability Management instance and that
- 1147 -
you convert your existing access groups into permission configurations. For more information, see
Transition to Permission Configurations.
If an asset does not match any access group rules, Tenable Vulnerability Management does not
assign the asset to any access group. These unassigned assets are only visible to users in the All
Assets group. If your organization limits membership in the All Assets group, users who are not
members of the All Assets group are unable to see these unassigned assets, but this limited
visibility may not be immediately obvious to them. If you are a member of the All Assets group, you
can use a filter to identify these unassigned assets.
2. In the left navigation plane, in the Asset View section, click Assets.
l Operator: is equal to
l Value: false
4. Click Apply.
The assets table updates to display all assets that are not assigned to an access group.
Tenable is retiring access groups. Moving forward, Tenable recommends that you use permissions to
manage user and group access to resources on your Tenable Vulnerability Management instance and that
you convert your existing access groups into permission configurations. For more information, see
Transition to Permission Configurations.
- 1148 -
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
As an administrator, you can view the rules and assigned users and user groups for any access
group. You can also edit access group parameters.
As a user in any other role, you can view your assigned access groups. This view includes the rules
associated with each access group, but excludes the other users or user groups assigned to the
access group. You cannot edit any access group settings.
Note: The Access Group tile appears only if you have one or more assigned access groups or if you are an
administrator and users on your Tenable Vulnerability Management are assigned to access groups. Once
you convert all your access groups to permission configurations, the Access Group tile will no longer
appear on your account.
The Access Groups page appears. This page contains a table that lists the access groups to
which you have access.
4. The Access Groups page contains a table that includes the following information:
l Last Modified — The date on which a user in your organization last changed the access
group configuration.
- 1149 -
l Last Modified By — The user in your organization who last changed the access group
configuration.
l Status — The status of the Tenable Vulnerability Management process matching assets
to the access group. Possible values are Processing or Completed. To view the
percentage complete for an ongoing process, roll over the Processing status.
For administrators, this page contains both rules and assigned users and user groups, and you
can edit all access group parameters.
For users in any other role, this page contains rules only, and you cannot edit the rules.
Tenable is retiring access groups. Moving forward, Tenable recommends that you use permissions to
manage user and group access to resources on your Tenable Vulnerability Management instance and that
you convert your existing access groups into permission configurations. For more information, see
Transition to Permission Configurations.
The Access Groups page appears. This page contains a table that lists the access groups to
which you have access.
- 1150 -
4. Select the access groups you want to delete:
l
Select a single access group:
a. In the access groups table, roll over the access group you want to delete.
l
Select multiple access groups:
a. In the access groups table, select the check boxes next to the access groups you
want to delete.
Tenable Vulnerability Management deletes the selected access group or groups and updates
the access group table.
Tenable is retiring access groups. Moving forward, Tenable recommends that you use permissions to
manage user and group access to resources on your Tenable Vulnerability Management instance and that
you convert your existing access groups into permission configurations. For more information, see
Transition to Permission Configurations.
You can use the filters described in the following sections to create rules for access groups. For
more information, see:
l Tenable-provided Filters
l Tag Filters
Tenable-provided Filters
- 1151 -
The last two columns in the following table indicate whether you can use the filter with the Manage
Assets or Scan Targets group type.
Manage Scan
Filter Description
Assets Targets
AWS EC2 AMI ID The unique identifier of the Linux AMI yes no
image in Amazon Elastic Compute Cloud
(Amazon EC2). For more information, see
the Amazon Elastic Compute Cloud
Documentation.
AWS EC2 Product The product code associated with the yes no
Code AMI used to launch the virtual machine
instance in Amazon EC2.
AWS Region The region where AWS hosts the virtual yes no
machine instance, for example, 'us-east-
1'. For more information, see "Regions
- 1152 -
and Availability Zones" in the AWS
documentation.
AWS Security Group The security group to which you have yes no
assigned the virtual machine instance in
Amazon EC2. For more information, see
Security Groups in the Amazon Virtual
Private Cloud User Guide.
- 1153 -
Google Cloud The customized name of the project to yes no
Project ID which the virtual machine instance
belongs in GCP. For more information,
see "Creating and Managing Projects" in
the GCP documentation.
Google Cloud Zone The zone where the virtual machine yes no
instance runs in GCP. For more
information, see "Regions and Zones" in
the GCP documentation.
IPv4 Address An IPv4 address for the asset. For this yes yes
filter, you can use CIDR notation (e.g.,
192.168.0.0/24), a range (e.g., 192.168.0.1-
192.168.0.255), or a comma-separated
list (e.g., 192.168.0.0, 192.168.0.1).
- 1154 -
Guidelines for Tenable-provided Filters
l When configuring rules for Scan Targets access groups, the asset attribute type must match
the target format used in the related scan. For example, if a Scan Targets access group rule
filters on the FQDN/Hostname attribute, the related scan succeeds if the scan target is
specified in FQDN or hostname format, but fails if the scan target is specified in IPv4 address
format.
Tag Filters
In Tenable Vulnerability Management, tags allow you to add descriptive metadata to assets that
helps you group assets by business context. For more information, see Tags.
You can use the tags you create to assign assets to Manage Assets access groups.
3. In the text box, type the tag category and value you want to search for in the following format:
4. Continue creating rules and/or save the access group as described in Create an Access Group.
Note: Tag categories with 100,000 or more associated values cannot be applied as a rule to access groups.
Note: Tenable plans to deprecate access groups in the near future. Currently, you can still create and
manage access groups. However, Tenable recommends that you instead use permissions to manage user
and group access to resources on your Tenable Vulnerability Management instance.
This migration affects your existing Tenable Vulnerability Management configuration as follows:
Component Action
- 1155 -
Existing access Tenable Vulnerability Management:
group
l Updates any existing access group to an access group of the
Manage Assets type.
l Replaces the All Users toggle with a default All Users group.
Existing system For each existing system target group, Tenable Vulnerability
target groups Management:
l Moves any user with Can Scan permissions in the system target
group to the new access group, and assigns the user Can Scan
permissions for that access group. To ensure users can view
results for the targets, configure Can View permissions for users in
the access group.
Note: This migration does not delete existing system target groups. The
migration removes only the Can Scan permissions from the system target
groups.
Note: If, at the time of migration, an existing target group includes scan
permissions, a Scan label may appear for the group in the Permissions
column of the target groups table in the new Tenable Vulnerability
Management user interface. This label indicates historical scan permissions
only; access groups specify the current scan permissions.
Existing scan Existing scan configurations retain the system target group as a target
configurations, setting. Existing dashboard filters and saved searches retain the system
dashboard filters, target group as a filter setting. If you have Can Use permissions for a
and saved system target group, you can continue to use the system target group to
searches specify a group of targets in a scan configuration and to use the system
- 1156 -
target group in filters for dashboards and searches. However, to specify
which users can view scan results for the targets, configure Can View
permissions in the appropriate access group.
Language
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
On the Language page, you can change the user interface language in your Tenable Vulnerability
Management container to English, French, or Japanese. This setting only affects your own user
account.
4. Under User Interface Language, select the language you want to switch to.
Tenable Vulnerability Management updates the user interface language for your account.
Exports
From the Exports page, you can view and configure your Scheduled Exports and Export Activity.
- 1157 -
Export information on this page comes from the following sources:
l Assets — Information about all assets included on your Tenable Vulnerability Management
license. For more information, see Export Findings or Assets.
l Assets Host —Information about assets Tenable Vulnerability Management identified on your
host during a scan. For more information, see Host Assets and Export Findings or Assets.
l Users — Information about the users assigned to your account. For more information, see
Export Users.
Scheduled Exports
The Scheduled Export page displays details about the exports on your account that include a
schedule.
Note: You can retain up to 1000 export schedules on your Tenable Vulnerability Management instance.
l Assets — Information about all assets included on your Tenable Vulnerability Management
license. For more information, see Export Findings or Assets.
l Assets Host —Information about assets Tenable Vulnerability Management identified on your
host during a scan. For more information, see Host Assets and Export Findings or Assets.
- 1158 -
l Findings - Vulnerabilities - Host — Information about the vulnerability findings Tenable
Vulnerability Management identified on your host during a scan. For more information, see
Export Findings or Assets.
l Users — Information about the users assigned to your account. For more information, see
Export Users.
Note: Export expiration is set via the Settings section. For more information, see General Settings.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
On the Exports page, you can view all the scheduled exports on your account.
Note: You can retain up to 1000 export schedules on your Tenable Vulnerability Management instance.
- 1159 -
1. In the upper-left corner, click the button.
4. (Optional) Refine the table data. For more information, see Tenable Vulnerability Management
Workbench Tables.
Schedules Table
The Schedules table contains the following information about your scheduled exports:
Column Description
Source The data source for the scheduled export in Tenable Vulnerability
Management. Possible sources include:
Schedule The date, time, and frequency on which your export runs.
Next Run The date and time when the export is scheduled to run next.
- 1160 -
Last Run The date and time when Tenable Vulnerability Management last began the
Start Date export.
Actions The actions you can perform with the scheduled export, including the
following:
Note: Disabling a scheduled export does not remove the scheduled export from the Schedules table or
from the list of exports that count against your 1000 scheduled export limit. To remove a scheduled export
from your account, you must delete the scheduled export.
4. (Optional) Refine the table data. For more information, see Tenable Vulnerability Management
Workbench Tables.
- 1161 -
5. Do one of the following:
When you disable a scheduled export, you can enable the scheduled export again to resume the
export cadence specified in the schedule.
- 1162 -
3. Click the Exports tile.
4. (Optional) Refine the table data. For more information, see Tenable Vulnerability Management
Workbench Tables.
On the Exports page, you can delete one or more scheduled exports from your Tenable Vulnerability
Management instance.
Note: Deleting a scheduled export removes the schedule from your Tenable Vulnerability Management
instance entirely. If you want to instead suspend a scheduled export, you can disable the schedule.
- 1163 -
To delete a scheduled export:
4. (Optional) Refine the table data. For more information, see Tenable Vulnerability Management
Workbench Tables.
A menu appears.
Tenable Vulnerability Management deletes the selected scheduled export or exports. Deleted
scheduled exports no longer appear in the Schedules table.
Export Activity
- 1164 -
On the Export Activity tab, you can view all the exports created on your account. You can see the
source, type, format, status, size, creation date, and author for each export.
Note: Export expiration is set via the Settings section. For more information, see General Settings.
Note: By default, Tenable Vulnerability Management allows you to store up to 500 MB of export data at a
time. Once you reach this limit, you cannot create new exports until you delete some of your existing export
data. To increase your export storage limit, contact your Tenable representative.
The Activity page appears. This page displays a table with all the exports on your Tenable
Vulnerability Management account.
Activity Table
The Activity table contains the following information about your exports:
Column Description
- 1165 -
Name The name of the export file.
Source The data source for the export in Tenable Vulnerability Management. The
possible sources are:
By default, the Reason column is hidden. For information about how to add
- 1166 -
the column to the table, see Interact with a Customizable Table.
Creation Date The date and time a user initiated the export.
Completion The date and time when the export process completed.
Date
Note: Export expiration is set via the Settings section. For more information,
see .
Actions The actions you can perform with the export, including the following:
On the Export Activity page, you can perform the following actions:
l Stop an Export
l Delete an Export
- 1167 -
Note: Export expiration is set via the Settings section. For more information, see .
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
On the Exports page, you can filter the export data for your Tenable Vulnerability Management
instance.
4. (Optional) To filter your export activity data, click the Activity tab.
The Activity page appears. This page displays a table with all the exports on your Tenable
Vulnerability Management account.
The filters plane expands. The plane displays a list of default filter options.
7. Select or deselect the filters you want to add or remove. For detailed list of available filters,
see Export Filters.
- 1168 -
9. For each selected filter, in the first text box, select an operator.
10. In the second text box, select or type a value for the filter.
Note: You can select up to five different values for each filter to apply to your exports.
Note: If a filter you select has generic options, those options appear below the filter. If the filter
requires a specific, unique value, you must type the value.
Tip: When you type a value for your filter, you can use a wild card character (*) to stand in for a
section of text anywhere in the value. For example, if you want the filter to include all values that
end in 1, type *1. If you want the filter to include all values that begin with 1, type 1*. If you want the
filter to include all values with a 1 somewhere between the first and last characters, type *1*.
b. In the window, click Clear to remove the value provided in the filter box.
Export Filters
On the Exports page, you can filter your export data using following filters:
Note: The available filters vary based on the type of data you want to export.
- 1169 -
Export Data
Filter Description
Type
Status scheduled The current status of the export. Possible options are:
exports,
l Pending
export
activity l Running
l Canceled
l Failed
l Completed
Creation Date scheduled The date on which a user on your instance created the
exports, export.
export
activity
- 1170 -
Expires On export Indicates when the export file expires. The filter value can
activity be a date, date range, or number of days until the export
file expires.
Reason export The reason the export failed. This filter applies only to
activity exports with a Failed status.
Next Run scheduled The date and time on which the next export is scheduled.
exports
Last Run Start scheduled The date and time on which Tenable Vulnerability
Date exports Management last initiated the export.
Last Run scheduled The date and time on which Tenable Vulnerability
Completion exports Management last completed the export.
Date
Updated Date scheduled The date and time on which a user last updated the export.
exports
On the Exports page, you can reset the expiration date for any export on your Tenable Vulnerability
Management instance.
- 1171 -
Note: You can reset the expiration date for only one export at a time.
Tip: You can also configure your default export expiration settings on the General Settings page.
The Activity page appears. This page displays a table with all the exports on your Tenable
Vulnerability Management account.
5. (Optional) Refine the table data. For more information, see Tenable Vulnerability Management
Workbench Tables.
l In the exports table, right-click the row for the export for which you want to reset the
expiration date.
l In the exports table, in the Actions column, click the button in the row for the export
for which you want to reset the expiration date.
7. Click Renew.
Tenable Vulnerability Management resets the export expiration date for 30 days from today's
date.
Stop an Export
- 1172 -
Required User Role: Administrator
On the Exports page, you can stop one or more pending or running exports on your Tenable
Vulnerability Management instance.
Note:You cannot stop an export that has already been completed, canceled, or failed.
The Activity page appears. This page displays a table with all the exports on your Tenable
Vulnerability Management account.
5. (Optional) Refine the table data. For more information, see Tenable Vulnerability Management
Workbench Tables.
a. In the exports table, select the check box for each export you want
to stop.
- 1173 -
A single To stop a single export:
export
a. In the exports table, right-click the row for the export you want to
stop.
-or-
b. Click Stop.
On the Exports page, you can download an export file on your Tenable Vulnerability Management
instance.
Note:You can download the export file only if the export's status is Completed.
- 1174 -
The Activity page appears. This page displays a table with all the exports on your Tenable
Vulnerability Management account.
5. (Optional) Refine the table data. For more information, see Tenable Vulnerability Management
Workbench Tables.
l In the exports table, right-click the row for the export file you want to download.
l In the exports table, in the Actions column, click the button in the row for the export
file you want to download.
7. Click Download.
On the Exports page, you can export data for the export activity on your Tenable Vulnerability
Management instance.
- 1175 -
The Activity page appears. This page displays a table with all the exports on your Tenable
Vulnerability Management account.
5. (Optional) Refine the table data. For more information, see Tenable Vulnerability Management
Workbench Tables.
Export
Action
Scope
-or-
b. Click Export.
- 1176 -
l A text box to configure the export file name.
l A text box to set the number of days before the export expires.
Format Description
Note: If your .csv export file includes a cell that begins with any of the following
characters (=, +, -, @), Tenable Vulnerability Management automatically inputs a
single quote (') at the beginning of the cell. For more information, see the
related knowledge base article.
9. In the Configurations section, select the fields you want to include in the export file by
selecting the check box next to any field. Use the text box to search for a field.
10. In the Expiration box, type the number of days before the export file expires.
Note: Tenable Vulnerability Management allows you to set a maximum of 30 calendar days for export
expiration.
- 1177 -
l Click the Schedule toggle.
l In the Start Date and Time section, select the date and time on which you want the
export schedule to start.
l In the Time Zone drop-down box, select the time zone to which you want the schedule
to adhere.
l In the Repeat drop-down box, select how often you want the export to repeat.
l In the Repeat Ends drop-down, select the date on which you want the schedule to end.
Note: If you select never, the schedule repeats until you modify or delete the export schedule.
Note: You can enable email notifications with or without scheduling exports.
l In the Add Recipients box, type the email addresses to which you want to send the
export notification.
l (Required) In the Password box, type a password for the export file. You must share this
password with the recipients to allow them to download the file.
Note: Tenable Vulnerability Management sends an email to the recipients and from the link in
the email, the recipients can download the file by providing the correct password.
Tenable Vulnerability Management begins processing the export. Depending on the size of the
exported data, Tenable Vulnerability Management may take several minutes to process the
export.
- 1178 -
When processing completes, Tenable Vulnerability Management downloads the export file to
your computer. Depending on your browser settings, your browser may notify you that the
download is complete.
14. Access the export file via your browser's downloads directory. If you close the export plane
before the download finishes, then you can access your export file in the Export Management
View.
Delete an Export
On the Exports page, you can delete one or more exports from your Tenable Vulnerability
Management instance.
Note:You can delete an export file only if the export's status is Completed, Canceled, or Failed.
To delete an export:
The Activity page appears. This page displays a table with all the exports on your Tenable
Vulnerability Management account.
- 1179 -
6. Select the exports that you want to delete:
Delete
Action
Scope
a. In the exports table, select the check box for each export you want
to delete.
-or-
b. Click Delete.
Recast/Accept Rules
Note: If a rule is targeted by IP address, that rule applies to the specified IP in each network in which it is
found. For more information, see networks.
Recast Rules
You can use recast rules to modify the severity of vulnerabilities. Vulnerabilities that you recast are
identified as such on the Findings Details page. If you specify an expiration date for a recast rule,
- 1180 -
upon expiration Tenable Vulnerability Management reverts existing dashboards back to their original
severity. Historical scan results, however, remain unchanged.
For Tenable Vulnerability Management standalone customers, recasted severities do not affect
scores such as VPR, CES, or AES. Tenable One and Tenable Lumin customers, however, may notice
updated scores if a recasted severity is included in their score calculations.
Note: When recasting custom scan targets, Tenable Vulnerability Management supports only the following
asset values:
l IPv4
l IPv6
l Hostname
l FQDN
For example, you may have a set of internal servers that you scan regularly. These internal servers
use self-signed certificates for SSL connections. Since the certificates are self-signed, your scans
have been reporting vulnerabilities from plugin 51192, SSL Certificate Cannot Be Trusted, which has
a Medium severity. Since you are aware that the servers use self-signed certificates, you create a
recast rule to change the severity level of plugin 51192 from Medium to Info, and set the target to
those internal servers.
The dashboards reflect the effect of a recast rule. A tag appears to indicate when vulnerabilities
have been recast. The rule applies to all assets or a specific asset based on the rule's parameters.
As long as the rule remains in effect, the rule applies to the corresponding data and scan results.
Note: While recasting Tenable Nessus Network Monitor plugins, the original severity is unknown.
Important:
l Because Tenable PCI ASV scans using the PCI Quarterly External Scan template have their own
set of rules, any recast rules do not apply to the scan results.
l Frictionless Assessment connectors do not support recast rules.
Accept Rules
You can use accept rules to accept the risk of a vulnerability without modifying the severity level of
the plugin. Vulnerabilities that have been accepted are still identified by a scan, but hidden in the
- 1181 -
results of the scan. To view accepted vulnerabilities, you can use the Recast & Accept filter. If you
specify an expiration date for an accept rule, upon expiration Tenable Vulnerability Management no
longer accepts the risk of the vulnerability. Historical scan results, however, remain unchanged.
Accepted severities do not affect scores such as VPR, AES, or CES.
Consider the previous example. Rather than recasting the severity level from Medium to Info, you
acknowledge that there is a risk associated with using self-signed certificates, but you do not want
to see the vulnerability appearing for those servers any longer. You create an accept rule to accept
the risk of plugin 51192, which hides that vulnerability for the targets you specified. If the same
vulnerability is identified on other assets during the scan, those still appear in the scan results.
Tenable Vulnerability Management reflects the effect of an accept rule. Accepted vulnerabilities are
hidden, and can be viewed using the Recast & Accepted filter.
False Positives
Additionally, you can use an accept rule to report false positives. Tenable reviews reported false
positives in order to identify potential issues with a plugin.
Consider again the previous example. In this case, you know the servers in question are in fact
using certificates from a proper Certificate Authority. However, plugin 51192 continues to report
vulnerabilities for those servers. To hide the false results and report the issue, you create an accept
rule that accepts the vulnerability as a false positive.
The Recast/Accept Rules page displays all configured recast and accept rules in your Tenable
Vulnerability Management instance.
- 1182 -
1. In the upper-left corner, click the button.
The Accept/Recast Rules page appears. This page contains a table that lists all your recast
rules.
Important: The time it takes to apply a recast/accept rule depends on the system load and the number of
matching vulnerabilities.
- 1183 -
Note: The form can only be submitted after the user changes the N/A value, under the New Severity
drop-down, to some other value.
4. In the Vulnerability box, type the ID of the plugin that you want to recast. For example, 51192.
Note: If the plugin ID corresponds to a Tenable Nessus plugin, the Original Severity indicator
changes to match the default severity of the vulnerability. The Original Severity indicator does not
change if another type of plugin is used.
5. In the New Severity drop-down box, select the severity level for the vulnerability.
- 1184 -
l To target all assets, select All. This is the default target.
Note: If the Targets drop-down is set to All, a warning appears indicating that this option may
override existing rules.
a. Select Custom.
b. In the Target Hosts box, type one or more targets for the rule. You can type a
comma-delimited list that includes any combination of IP addresses, IP ranges,
CIDR, and hostnames.
Caution: You can only specify 1000 comma-separated custom entries. If you want to
target a larger number of custom entries, create multiple rules.
7. (Optional) In the Expires box, set an expiration date for the rule. This action is only necessary
if you want the rule to expire. By default, the rule applies indefinitely.
8. (Optional) In the Comments box, type a description of the rule. The text you type in this box is
only visible if the rule is modified and has no functional effect.
9. Click Save.
Tenable Vulnerability Management starts applying the rule to existing vulnerabilities. This
process may take some time, depending on the system load and the number of matching
vulnerabilities. The change is reflected on dashboards, where a label appears to indicate how
many instances of affected vulnerabilities have been recast.
Note: A recast rule does not affect the historical results of a scan.
Important: The time it takes to apply a recast/accept rule depends on the system load and the number of
matching vulnerabilities.
- 1185 -
1. View the Recast/Accept Rules page.
4. In the Vulnerability box, type the ID of the plugin that you want to recast. For example, 51192.
Note: If the plugin ID corresponds to a Tenable Nessus plugin, the Original Severity indicator
changes to match the default severity of the vulnerability. The Original Severity indicator does not
change if another type of plugin is used.
- 1186 -
l To target all assets, select All. This is the default target.
a. Select Custom.
b. In the Target Hosts box, type one or more targets for the rule. You can type a
comma-delimited list that includes any combination of IP addresses, IP ranges,
CIDR, and hostnames.
Caution: You can only specify 1000 comma-separated custom entries. If you want to
target a larger number of custom entries, create multiple rules.
6. (Optional) In the Expires box, set an expiration date for the rule. This action is only necessary
if you want the rule to expire. By default, the rule applies indefinitely.
7. (Optional) In the Comments box, type a description of the rule. The text you type in this box is
only visible if the rule is modified and has no functional effect.
b. In the Message to Tenable box, type a description of the false positive to send to
Tenable.
9. Click Save.
Tenable Vulnerability Management starts applying the rule to existing vulnerabilities. This
process may take some time, depending on the system load and the number of matching
vulnerabilities. The affected vulnerability is hidden on your workbench.
Note: To view vulnerabilities hidden from your workbench, use the Recast & Accept advanced filter.
- 1187 -
1. View the Recast/Accept Rules page.
2. In the Recast/Accept Rules table, click the row of the rule you want to edit.
For more information about configuration options, see Create a Recast Rule or Create an
Accept Rule for a Plugin.
4. Click Save.
Tenable Vulnerability Management applies your changes to the rule. This process may take
some time, depending on the system load and the number of matching vulnerabilities.
On the Accept/Recast Rules page, you can export one or more recast rules in CSV or JSON format.
The Accept/Recast Rules page appears. This page contains a table that lists all your recast
rules.
4. (Optional) Refine the table data. For more information, see Filter a Table.
Export
Action
Scope
- 1188 -
Selected To export selected recast rules:
recast rules
a. In the recast rules table, select the check box for each recast rule
you want to export.
-or-
In the recast rules table, in the Actions column, click the button
in the row for the recast rule you want to export.
b. Click Export.
l A text box to set the number of days before the export expires.
- 1189 -
l A toggle to configure the export schedule.
Format Description
Note: If your .csv export file includes a cell that begins with any of the following
characters (=, +, -, @), Tenable Vulnerability Management automatically inputs a
single quote (') at the beginning of the cell. For more information, see the
related knowledge base article.
8. (Optional) Deselect any fields you do not want to appear in the export file.
9. In the Expiration box, type the number of days before the export file expires.
Note: Tenable Vulnerability Management allows you to set a maximum of 30 calendar days for export
expiration.
l In the Start Date and Time section, select the date and time on which you want the
export schedule to start.
l In the Time Zone drop-down box, select the time zone to which you want the schedule
to adhere.
l In the Repeat drop-down box, select how often you want the export to repeat.
- 1190 -
l In the Repeat Ends drop-down, select the date on which you want the schedule to end.
Note: If you select never, the schedule repeats until you modify or delete the export schedule.
Note: You can enable email notifications with or without scheduling exports.
l In the Add Recipients box, type the email addresses to which you want to send the
export notification.
l (Required) In the Password box, type a password for the export file. You must share this
password with the recipients to allow them to download the file.
Note: Tenable Vulnerability Management sends an email to the recipients and from the link in
the email, the recipients can download the file by providing the correct password.
Tenable Vulnerability Management begins processing the export. Depending on the size of the
exported data, Tenable Vulnerability Management may take several minutes to process the
export.
When processing completes, Tenable Vulnerability Management downloads the export file to
your computer. Depending on your browser settings, your browser may notify you that the
download is complete.
13. Access the export file via your browser's downloads directory. If you close the export plane
before the download finishes, then you can access your export file in the Export Management
View.
- 1191 -
1. View the Recast/Accept Rules page.
l
Select a single rule.
a. In the Recast/Accept Rules table, roll over the row of the rule you want to delete.
l
Select multiple rules.
a. In the Recast/Accept Rules table, select the check boxes next to the rules you
want to delete.
3. Click Delete.
Tenable Vulnerability Management deletes the selected rule or rules. Tenable Vulnerability
Management may take some time to remove the rule or rules from existing vulnerabilities,
depending on the system load and the number of matching vulnerabilities.
Tags
You can add your own business context to assets by tagging them with descriptive metadata in
Tenable Vulnerability Management. An asset tag is primarily composed of a Category:Value pair. For
example, if you want to group your assets by location, create a Location category with the value
Headquarters. You can then manually apply the tag to individual assets, or you can add rules to the
tag that enable Tenable Vulnerability Management to apply the tag automatically to matching
assets.
For more information about tag structure and related best practices, see:
- 1192 -
l Tag Format and Application
Note: If you want to create tags without individual categories, Tenable recommends that you add the
generic category Category, which you can use for all your tags.
Adding your own business context to assets using tags allows you to filter analysis views by tag.
The Tags page appears. On this page, you can view your asset tag categories and values.
To view the categories to which all the tags in your Tenable Vulnerability
Management instance are assigned:
- 1193 -
a. View your tag categories and relevant data about them in the Categories table:
Column Description
Last Used The username of the user who most recently created or edited the
By tag value or category.
# of Values The number of tag values associated with the tag category.
The Values page appears, containing a table of all the tags on your Tenable Vulnerability
Management instance.
b. View your tags and relevant data about them in the Values table:
Column Description
Updated By The username of the user who last updated the tag category or
value.
Last Processed The date and time when Tenable Vulnerability Management last
processed the scan and applied it to all relevant assets.
- 1194 -
Assessment Indicates whether Tenable Vulnerability Management has
finished identifying and apply the tag to all matching assets.
As an administrator, you can create an automatic tag for each software type. Then, employees can
search for assets by the Installed Software tag and filter Tenable Vulnerability Management assets
by the software type they manage.
Note: For more precise results, set the tag value to the appropriate NVD Common Platform Enumeration
(CPE), for example, cpe:/a:microsoft:office.
- 1195 -
1. Create and automatically apply a tag for Oracle assets using the following settings:
Option Value
Value Oracle
l Match All
l Operator: is equal to
l Value: Oracle
2. Create and automatically apply a tag for Wireshark assets using the following settings:
Option Value
Value Wireshark
l Match All
l Operator: is equal to
l Value: Wireshark
3. Instruct employees to use the new tags to filter assets in the assets table or to search for
assets from the tags table.
- 1196 -
To make sure employees view and mediate these sensitive assets first, you can create a High
Priority tag and manually add it to assets that you want employees to prioritize. Then, employees
can search for assets using the High Priority tag to filter by the highest priority assets they
manage.
1. Create a tag for your highest priority assets using the following settings:
Option Value
Category Priority
3. Instruct employees to use the new tag to filter assets in the assets table or to search for
assets from the tags table.
Note: If you want to create tags without individual categories, Tenable recommends that you add the
generic category Category, which you can use for all your tags.
l Every 12 hours
- 1197 -
When you create a tag, Tenable Vulnerability Management automatically applies it to the assets on
your instance that match the tags rules. These automatically applied tags are sometimes called
dynamic tags. When you create an automatic tag, Tenable Vulnerability Management applies that
tag to all your current assets and any new assets added to your organization's account. Tenable
Vulnerability Management also regularly reviews your assets for changes to their attributes and
adds or removes automatic tags accordingly.
Note: When you create or edit an automatic tag, Tenable Vulnerability Management may take some time to
apply the tag to existing assets, depending on the system load and the number of matching assets.
You can also create a tag without rules and then manually apply the tag to individual assets.
Alternatively, you can manually apply an automatic tag to additional assets that may not meet the
rules criteria for that tag. These manually applied tags are sometimes called static tags.
Manual tags appear with the icon, whereas automatic tags appear with the icon.
Tag
Scenarios Tag Type
Icon
Note: When you create a tag from the Tagging page, you can select from a list of generic asset filters to
create tag rules. If you want to create a tag based on filters that are specific to certain asset types,
Tenable recommends that you create a tag from the Assets page, where you can select additional filters
that are specific to each asset type.
- 1198 -
On the Create Tag page, you can create one of the following types of tags:
l Manual — You can create and save a tag to manually apply to individual assets at any time.
Tenable does not automatically apply manual tags to assets.
l Automatic — You can create a tag and add Tag Rules that Tenable Vulnerability Management
uses to identify and tag matching assets. Tenable Vulnerability Management automatically
applies the tag to assets identified by the rule at specific intervals.
Important: You must add a tag rule to the tag in order for Tenable Vulnerability Management to
identify and tag the appropriate assets.
Tip: If your tags fail to apply, the tag rules you configured likely returned too many assets for
Tenable Vulnerability Management to process. For example, a long list of Fully Qualified Domain
Names (FQDNs) with wildcards would cover a large number of assets. When this happens, Tenable
recommends reducing the number of assets through stricter tag rules. If needed, you can then use
an additional tag to join each list.
Note: You can create up to 100 tag categories, and each category can have up to 100,000 tags.
The Tags page appears. On this page, you can view your asset tag categories and values.
4. In the upper-right corner of the page, click the Create Tag button.
- 1199 -
5. Click the Category drop-down box.
7. From the drop-down box, select an existing category, or if the category is new, click Create
"category name".
Note: You can create a maximum of 100 categories for your Tenable Vulnerability Management
instance.
8. (Optional) In the Category Description box, type a description of the tag category.
Note: Tag names cannot include commas or be more than 50 characters in length.
Tip: Tenable recommends that you provide a tag name that directly corresponds with the tag
category. For example, if the category is Location, Headquarters would be an appropriate value.
10. (Optional) In the Value Description box, type a description for the new tag.
- 1200 -
b. (Optional) Manually add the tag to one or more assets.
b. Click Save.
Tenable Vulnerability Management creates the tag, evaluates existing assets, and
automatically applies the tag to assets that match the tag rules.
Note: When you create an automatic tag, Tenable Vulnerability Management may take a few
minutes to apply the tag and update any excluded assets, depending on the system load and
the number of assets.
Automatic Application
Tenable Vulnerability Management evaluates assets against tag rules in the following situations:
l When you add a new asset (via scan, connector import, or leveraging the Tenable Vulnerability
Management API), Tenable Vulnerability Management evaluates the asset against your tag
rules.
l When you create or update a tag rule, Tenable Vulnerability Management evaluates your
assets against the tag rule.
Note: When you create or edit a tag rule, Tenable Vulnerability Management may take some time to
apply the tag to existing assets, depending on the system load and the number of matching assets.
l When you update an existing asset, Tenable Vulnerability Management re-evaluates the asset
and removes the tag if the asset's attributes no longer match the tag rules.
Manual Application
If you manually apply a tag that has been configured with rules, Tenable Vulnerability Management
excludes that asset from any further evaluation against the rules.
Tag Rules
- 1201 -
Tag rules allow Tenable Vulnerability Management to automatically apply tags you create to the
assets on your instance that match the tags rules. These automatically applied tags are called
dynamic or automatic tags.
Tag rules are composed of one or more filter-value pairs based on asset attributes. When you
create a rule and add it to a tag, Tenable Vulnerability Management applies the tag to all assets on
your instance that match the tag rule.
Note: Tenable Vulnerability Management supports a maximum of 1,000 rules per tag. This limit means that
you can specify a maximum of 1,000 and or or conditions for a single tag value. Additionally, Tenable
Vulnerability Management supports a maximum of 1,024 values per individual tag rule.
In the Tags section, you can complete the following tasks with tag rules:
Required Tenable Vulnerability Management Permission: Can Edit, Can Use permission for applicable
asset tags.
When you create or edit a tag to apply automatically, you must create and apply rules to the tag
using tag rules filters. You can create a tag rule in either Basic or Advanced mode.
Caution: If you create a tag rule in Basic mode and then switch to Advanced mode, the rules you created
appear in the Advanced mode format. However, if you switch from Advanced mode to Basic mode,
Tenable Vulnerability Management removes all rules from the rules section.
Note: When you create a tag from the Tagging page, you can select from a list of generic asset filters to
create tag rules. If you want to create a tag based on filters that are specific to certain asset types,
- 1202 -
Tenable recommends that you create a tag from the Assets page, where you can select additional filters
that are specific to each asset type.
For more information about applying tags automatically, see Considerations for Tags with Rules.
The Tags page appears. On this page, you can view your asset tag categories and values.
The Values page appears, containing a table of all the tags on your Tenable Vulnerability
Management instance.
6. For each tag rule you want to create, do one of the following:
- 1203 -
Note: Each tag rule filter has different limits on the number of values you can apply to a single
filter. For information about those limits, see Tag Rules Filters.
b. Select a filter.
e. In the first drop-down box, select the operator you want to apply to the filter.
f. In the second drop-down box, select or type one or more values for the filter.
In the Rules section, in the Match Any drop-down box, do one of the following:
l To apply the tag to assets that match any one of the defined rules, select Match
Any.
If an asset matches one or more of the filters defined in the tag rule, Tenable
Vulnerability Management applies the tag to that asset.
l To apply the tag only to assets that match all of the filters defined in the tag rule,
select Match All.
If an asset matches every individual filter defined within the rule, Tenable
Vulnerability Management applies the tag to that asset.
- 1204 -
Important: If you select Match All and separate the values by commas, Tenable
Vulnerability Management processes the string using OR logic, similar to the Match Any
option.
h. (Optional) To create another rule, repeat the steps to create a tag rule in Basic mode.
Note: Each tag rule filter has different limits on the number of values you can apply to a single
filter. For information about those limits, see Tag Rules Filters.
Note: If there is a typo in the tag rule, an error appears in the Rules box with a description of
the issue.
Tip: You can use the arrow keys to navigate filter drop-down boxes, and press the Enter key
to select an option.
d. Select one of the following operators. Available operators depend on the filter you
select:
Note: If you want to filter on a value that starts with (') or ("), or includes (*) or (,), then you
must wrap the value in quotation marks (").
- 1205 -
Operator Description
exists Filters for items for which the selected filter exists.
does not Filters for items for which the selected filter does not exist.
exist
is not equal Filters for items that do not include the filter value.
to
is greater Filters for items with a value greater than the specified filter value.
than If you want to include the value you specify in the filter, then use
the is greater than or equal to operator.
is greater
than or
equal to
is less than Filters for items with a value less than the specified filter value. If
you want to include the value you specify in the filter, then use the
is less than
is less than or equal to operator.
or equal to
within last Filters for items with a date within a number of hours, days,
months, or years before today. Type a number, then select a unit of
time.
after Filters for items with a date after the specified filter value.
before Filters for items with a date before the specified filter value.
older than Filters for items with a date more than a number of hours, days,
months, or years before today. Type a number, then select a unit of
time.
between Filters for items with a date between two specified dates.
- 1206 -
Operator Description
contains Filters for items that contain the specified filter value.
does not Filters for items that do not contain the specified filter value.
contain
l Begin or end with – Filters for values that begin or end with
text you specify. For example, to find all values that begin
with "1", type 1*. To find all values that end in "1", type *1.
l Contains –Filters for values that contain text you specify. For
example, to find all values with a "1" between the first and last
characters, type *1*.
e. Where applicable, to the right of the operator, select or type a value for the filter.
Tip: Some text filters support the character (*) as a wildcard to stand in for a section
of text in the filter value. For example, if you want the filter to include all values that
end in 1, type *1. If you want the filter to include all values that begin with 1, type 1*.
You can also use the wildcard operator to filter for values that contains certain text.
For example, if you want the filter to include all values with a 1 somewhere between
the first and last characters, type *1*.
l Select OR to "match any" assets tagged by the rule. If an asset matches one or
more of the filters defined in the tag rule, Tenable Vulnerability Management
- 1207 -
applies the tag to that asset.
l Select AND to "match all" assets tagged by the rule. If an asset matches every
individual filter defined within the rule, Tenable Vulnerability Management applies
the tag to that asset.
Important: If you select AND and separate the values by commas, Tenable Vulnerability
Management processes the string using OR logic, similar to the OR option.
g. (Optional) To create more rules for the tag, repeat steps c-f.
7. Click Save.
Tenable Vulnerability Management creates the rule and applies it to the tag.
Required Tenable Vulnerability Management Permission: Can Edit, Can Use permission for applicable
asset tags.
Once you create an automatic tag, you can edit the rules that apply to the tag from the Edit Value
page.
Note: When you edit rules from the Tagging page, you can select from a list generic asset filters to create
tag rules. However, if you want to add filters that are specific to a certain asset type (e.g., web application
assets), Tenable recommends that you edit the tag from the Assets page, where you can select filters that
are specific to each asset type.
- 1208 -
The Settings page appears.
The Tags page appears. On this page, you can view your asset tag categories and values.
The Values page appears, containing a table of all the tags on your Tenable Vulnerability
Management instance.
5. In the tags table, click the tag for which you want to edit a tag rule.
Tip: You can also navigate to the Edit Value page from the Edit Category page by clicking the tag
you want to review in the Values table.
7. In the Rules section, in the rule filter you want to edit, click the button.
A drop-down box appears with the lists of rule values previously selected for that filter.
Note: If the rule filter has selectable options (e.g., dates ranges), those options appear below the
filter. Otherwise, you must type the value.
- 1209 -
Tenable Vulnerability Management save your changes, evaluates existing assets, and
automatically applies the tag to assets that match the updated tag rules.
Note: Tenable Vulnerability Management may take some time to apply the tag to assets, depending
on the system load and the number of assets.
Required Tenable Vulnerability Management Permission: Can Edit, Can Use permission for applicable
asset tags.
When you delete a rule from an automatic tag, Tenable Vulnerability Management removes the tag
from any assets that match the tag rule. When you delete all rules from an automatic tag, the tag
becomes a manual tag.
The Tags page appears. On this page, you can view your asset tag categories and values.
The Values page appears, containing a table with all the tags on your Tenable Vulnerability
Management instance.
5. In the tags table, click the tag from which you want to delete a tag rule.
- 1210 -
Tip: You can also navigate to the Edit Value page from the Edit Category page by clicking the tag
you want to review in the Values table.
6. In the Rules section, in the rule you want to delete, click the button.
7. Click Save.
Note: If there is a typo in the tag rule, an error appears in the Rules box with a description of the issue.
Note: Tenable Vulnerability Management supports a maximum of 1,000 rules per tag. This limit means that
you can specify a maximum of 1,000 and or or conditions for a single tag value. Additionally, Tenable
Vulnerability Management supports a maximum of 1,024 values per individual tag rule.
On the Tags page, you can select from the following filters to create rules for an automatic tag:
Filter Description
Account ID The unique identifier assigned to the asset resource in the cloud
service that hosts the asset.
ACR (Requires Tenable Lumin license) The asset's ACR (Asset Criticality
Rating).
ACR Severity (Requires Tenable Lumin license) The ACR category of the ACR
calculated for the asset.
AES Severity (Requires Tenable Lumin license) The AES category of the AES
calculated for the asset.
Agent Name The name of the Tenable Nessus agent that scanned and identified the
asset.
- 1211 -
ARN The Amazon Resource Name (ARN) for the asset.
Assessed vs. Specifies whether Tenable Vulnerability Management scanned the asset
Discovered for vulnerabilities or if Tenable Vulnerability Management only
discovered the asset via a discovery scan. Possible values are:
l Assessed
l Discovered Only
AWS Availability The name of the Availability Zone where AWS hosts the virtual machine
Zone instance. For more information, see Regions and Availability Zones in
the AWS documentation.
AWS EC2 AMI ID The unique identifier of the Linux AMI image in Amazon Elastic
Compute Cloud (Amazon EC2). For more information, see the Amazon
Elastic Compute Cloud Documentation.
AWS EC2 Instance The unique identifier of the Linux instance in Amazon EC2. For more
ID information, see the Amazon Elastic Compute Cloud Documentation.
AWS EC2 Name The name of the virtual machine instance in Amazon EC2.
AWS EC2 Product The product code associated with the AMI used to launch the virtual
Code machine instance in Amazon EC2.
AWS Instance State The state of the virtual machine instance in AWS at the time of the
scan. For possible values, see API Instance State in the Amazon Elastic
Compute Cloud Documentation.
AWS Instance Type The type of virtual machine instance in Amazon EC2. Amazon EC2
instance types dictate the specifications of the instance (for example,
how much RAM it has). For a list of possible values, see Amazon EC2
Instance Types in the AWS documentation.
AWS Owner ID A UUID for the Amazon AWS account that created the virtual machine
instance. For more information, see AWS Account Identifiers in the
- 1212 -
AWS documentation.
This attribute contains a value for Amazon EC2 instances only. For
other asset types, this attribute is empty.
AWS Region The region where AWS hosts the virtual machine instance, for example,
us-east-1. For more information, see Regions and Availability Zones
in the AWS documentation.
AWS Security The AWS security group (SG) associated with the Amazon EC2 instance.
Group
AWS Subnet ID The unique identifier of the AWS subnet where the virtual machine
instance was running at the time of the scan.
AWS VPC ID The unique identifier of the public cloud that hosts the AWS virtual
machine instance. For more information, see the Amazon Virtual
Private Cloud User Guide.
Azure Resource The name of the resource group in the Azure Resource Manager. For
Group more information, see the Azure Resource Manager Documentation.
Azure Resource ID The unique identifier of the resource in the Azure Resource Manager.
For more information, see the Azure Resource Manager
Documentation.
Azure Resource The resource type of the resource in the Azure Resource Manager. For
Type more information, see the Azure Resource Manager Documentation.
Azure Subscription The unique subscription identifier of the resource in the Azure
ID Resource Manager. For more information, see the Azure Resource
Manager Documentation.
Azure VM ID The unique identifier of the Microsoft Azure virtual machine instance.
For more information, see Accessing and Using Azure VM Unique ID in
the Microsoft Azure documentation.
Cloud Provider The name of the cloud provider that hosts the asset.
- 1213 -
Created Date The time and date when Tenable Vulnerability Management created the
asset record.
Custom Attribute A filter that searches for custom attributes via a category-value pair.
For more information about custom attributes, see the Tenable
Developer Portal.
Deleted Date The date when a user deleted the asset record or the number of days
since a user deleted the asset. When a user deletes an asset record,
Tenable Vulnerability Management retains the record until the asset
ages out of the license count.
Note: This does not apply to Web Application assets, for which you must
use the Name filter.
Domain The domain which has been added as a source or discovered by ASM as
belonging to a user.
First Seen The date and time when a scan first identified the asset.
Google Cloud The unique identifier of the virtual machine instance in Google Cloud
Instance ID Platform (GCP).
Google Cloud The customized name of the project to which the virtual machine
Project ID instance belongs in GCP. For more information, see Creating and
Managing Projects in the GCP documentation.
Google Cloud Zone The zone where the virtual machine instance runs in GCP. For more
information, see Regions and Zones in the GCP documentation.
Has Plugin Results Specifies whether the asset has plugin results associated with it.
Host Name (Domain The host name for assets found during attack surface management
Inventory) scans; only for use with Domain Inventory assets.
- 1214 -
IaC Resource Type The Infrastructure as Code (IAC) resource type of the asset.
Installed Software A list of Common Platform Enumeration (CPE) values that represent
software applications a scan identified as present on an asset. This
field supports the CPE 2.2 format. For more information, see the
Component Syntax section of the CPE Specification documentation,
Version 2.2. For assets identified in Tenable scans, this field contains
data only if a scan using Tenable Nessus Plugin ID 45590 has evaluated
the asset.
IPv4 Address The IPv4 address associated with the asset record..
Note: A CIDR mask of /0 is not supported for this parameter, because that
value would match all IP addresses. If you submit a /0 value for this
parameter, Tenable Vulnerability Management returns a 400 Bad Request
error message.
Note: Ensure the tag filter value does not end in a period.
IPv6 Address An IPv6 address that a scan has associated with the asset record.
- 1215 -
Note: Ensure the tag filter value does not end in a period.
Last Audited The time and date at which the asset was last audited.
Last Authenticated The date and time of the last authenticated scan run against the asset.
Scan An authenticated scan that only uses discovery plugins updates the
Last Authenticated Scan field, but not the Last Licensed Scan field.
Last Licensed Scan The date and time of the last scan in which the asset was considered
"licensed" and counted towards Tenable's license limit. A licensed scan
uses non-discovery plugins and can identify vulnerabilities.
Unauthenticated scans that run non-discovery plugins update the Last
Licensed Scan field, but not the Last Authenticated Scan field. For
more information on licensed assets, see Tenable Vulnerability
Management Licenses.
Last Seen The date and time of the scan that most recently identified the asset.
Licensed Specifies whether the asset is included in the asset count for the
Tenable Vulnerability Management instance.
MAC Address A MAC address that a scan has associated with the asset record.
Mitigation Last The date and time of the scan that last identified mitigation software
Detected on the asset.
2. NetBIOS Name
- 1216 -
3. FQDN
4. IPv6 address
5. IPv4 address
For example, if scans identify a NetBIOS name and an IPv4 address for
an asset, the NetBIOS name appears as the Asset Name.
Network The name of the network object associated with scanners that
identified the asset. The default name is Default. For more information,
see Networks.
Operating System The operating system that a scan identified as installed on the asset.
Resource Category The name of the category to which the cloud resource type belongs (for
example, object storage or virtual network).
Resource Tags (By Tags synced from a cloud source, such as Amazon Web Services (AWS),
Key) matched by the tag key (for example, Name).
Resource Tags (By Tags synced from a cloud source, such as Amazon Web Services (AWS),
Value) matched by the tag value.
Resource Type The asset's cloud resource type (for example, network, virtual machine).
ServiceNow Sys ID Where applicable, the unique record identifier of the asset in
ServiceNow. For more information, see the ServiceNow
documentation.
- 1217 -
Source The source of the scan that identified the asset. Possible filter values
are:
l AWS
l AWS FA
l Azure
l AZURE FA
l Cloud Connector
l Cloud IAC
l Cloud Runtime
l GCP
l Nessus Agent
l Nessus Scan
l NNM
l ServiceNow
l WAS
SSL/TLS Specifies whether the application on which the asset is hosted uses
SSL/TLS public-key encryption.
System Type The system types as reported by Plugin ID 54615. For more information,
see Tenable Plugins.
Tags A unique filter that searches tag (category: value) pairs. When you type
a tag value, you must use the category: value syntax, including the
space after the colon (:). You can use commas (,) to separate values. If
there is a comma in the tag name, insert a backslash (\) before the
comma. You can add a maximum of 100 tags.
- 1218 -
Note: If your tag name includes double quotation marks (" "), you must use
the UUID instead.
Target Groups The target group to which the asset belongs. This attribute is empty if
the asset does not belong to a target group. For more information, see
Target Groups.
Type The system type on which the asset is managed. Possible filter values
are:
l Cloud Resource
l Container
l Host
l Cloud
Updated Date The time and date when a user last updated the asset.
VPC The unique identifier of the public cloud that hosts the AWS virtual
machine instance. For more information, see the Amazon Virtual
Private Cloud User Guide.
When you filter your assets, you can use the filters as tag rules to create a new automatic tag.
After you create the tag, Tenable Vulnerability Management automatically applies the tag to any
assets identified through those filters.
You can also create a manual or automatic tag for your assets from the Tagging page.
- 1219 -
1. In the upper-left corner, click the button.
3. Filter the table, selecting and deselecting filters based on the rules you want to add to or
remove from your tag.
The filters you selected appear in the header above the filter plane.
4. In the header, to the left of the first filter, click Add Tags.
6. In the drop-down box, select an existing category, or if the category is new, click Create
"category ".
- 1220 -
Tip: You can create a generic tag category and apply to different tag values to group your tags. For
example, if you create a Location category, you can apply it to multiple values such as Headquarters
or Offshore to create a group of location tags.
7. Under Create/Select Tag, in the second drop-down box, type a value for your new tag.
9. Click Save.
Tenable Vulnerability Management saves the tag and applies it to applicable assets on your
account.
Note: It can take up to several minutes for Tenable Vulnerability Management to apply a tag to the
applicable assets.
Required Tenable Vulnerability Management Permission: Can Edit, Can Use permission for applicable
asset tags.
In the Tagging section, you can edit one or more components of a tag, including the category to
which the tag belongs as well as the tag's name and description and any rules applied to the tag.
The Tags page appears. On this page, you can view your asset tag categories and values.
- 1221 -
4. To edit an individual tag:
a. On the Tags page, click the Values tab.
The Values page appears, containing a table with all the tags on your Tenable
Vulnerability Management instance.
Tip: You can also navigate to the Edit Value page from the Edit Category page by clicking the
tag you want to review in the Values table.
d. (Optional) In the Value Description (Optional) box, edit the tag description.
Note: When you edit a tag category, Tenable Vulnerability Management changes the category for all
the tags in that category.
a. In the tag categories table, click the category you want to edit.
b. In the tag categories table, click the category you want to edit.
c. (Optional) To edit the name, in the Category box, type a new name.
d. (Optional) To edit the description, in the Category Description box, type a new
description.
6. Click Save.
- 1222 -
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Required Tenable Vulnerability Management Permission: Can Edit, Can Use permission for applicable
asset tags.
On the Assets page, you can use asset filters to edit a tag's rules, category, and value.
3. Filter the table, selecting and deselecting filters based on the rules you want to add to or
remove from your tag.
The filters you applied appear in the header above the filter plane.
4. In the header, to the left of the first filter, click the button.
a. Under Recently Used Tags, click the tag you want to edit.
The tag category appears in the Select or create Category drop-down box.
The tag value appears in the Select or create Value drop-down box.
- 1223 -
c. In the Select or create Value drop-down box, type a value name.
d. In the drop-down box, select the value for the tag you want to edit.
a. In the Select or create Category drop-down box, type a new name for your category.
a. In the Select or create Value drop-down box, type a new value for your tag.
8. (Optional) In the Chosen Search Filters for Tag box, click the inside any filters you want to
remove from the tag.
9. Click Save.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Required Tenable Vulnerability Management Permission: Can Use permission for applicable asset tags.
After you create a tag, you can manually apply it to one or more assets on your Tenable Vulnerability
Management instance.
- 1224 -
1. In the upper-left corner, click the button.
4. (Optional) Refine the table data. For more information, see Tenable Vulnerability Management
Workbench Tables.
- 1225 -
a. Select the page where you want to add the tag:
Location Action
-or-
- 1226 -
The actions menu appears.
-or-
b. Click Add.
The assets table appears. A confirmation message also appears. Tenable Vulnerability
Management adds the tags specified in Tags to be Added to the assets.
The assets table appears. A confirmation message also appears. Tenable Vulnerability
Management adds the tags specified in Tags to be Added to the assets.
Tip: To remove a tag from Tags to be Added, roll over the tag and click the button.
- 1227 -
b. From the drop-down box, select an existing category, or if the category is new, click
Create "category name".
Tip: You can create a generic tag category and apply to different tag values to group your
tags. For example, if you create a Location category, you can apply it to multiple values such
as Headquarters or Offshore to create a group of location tags.
d. From the drop-down box, select an existing value, or if the value is new, click Create
"value".
Note: The system does not save new tags you create by this method until you add the new tags to
the asset.
Tip: To remove a tag from Tags to be Added, roll over the tag and click the button.
7. Click Add.
The assets table appears. A confirmation message also appears. Tenable Vulnerability
Management adds the tags specified in Tags to be Added to the assets.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
When you manually add a tag to an asset or create a tag that Tenable Vulnerability Management
automatically applies to that asset based on the tag's rules, you can manually remove from the
asset if you want to exclude the asset from the tag's scope.
- 1228 -
1. In the upper-left corner, click the button.
3. (Optional) Refine the table data. For more information, see Tenable Vulnerability Management
Workbench Tables.
Location Action
-or-
In the assets table, in the Actions column, click the button for
the asset from which you want to remove a tag.
c. Under Current Tags, roll over the tag you want to remove and click
the button.
- 1229 -
Tip: To remove a tag from Tags to be Removed, roll over the tag and
click the button.
l On the left side of the page, in the Tags section, roll over the
tag you want to remove and click the button.
iii. Under Current Tags, roll over the tag you want to
remove and click the button.
l To remove the tag from selected assets, in the assets table, select the check box
next to each asset from which you want to remove the tag.
- 1230 -
i. In the assets table header row, select the check box next to the total number
of assets.
Note: If you do not select all the tagged assets, Tenable Vulnerability
Management removes the tag from the assets on only the current page.
A menu appears.
e. Under Current Tags, roll over the tag you want to remove and click the button.
Tip: To remove a tag from Tags to be Removed, roll over the tag and click the button.
5. Click Remove.
Tenable Vulnerability Management removes the selected tag from the assets.
Export Tags
On the Tags page, you can export tag categories and values in CSV or JSON format.
- 1231 -
The Settings page appears.
The Tags page appears. On this page, you can view your asset tag categories and values.
4. (Optional) Refine the table data. For more information, see Tenable Vulnerability Management
Workbench Tables.
- 1232 -
a. Select the tag categories that you want to export:
-or-
b. Click Export.
The Values tab appears. This tab consists of a table that contains all your tag values.
- 1233 -
Export
Action
Scope
-or-
b. Click Export.
- 1234 -
l A text box to set the number of days before the export expires.
Format Description
CSV A CSV text file that contains a list of tag categories or values.
Note: If your .csv export file includes a cell that begins with any of the following
characters (=, +, -, @), Tenable Vulnerability Management automatically inputs a
single quote (') at the beginning of the cell. For more information, see the
related knowledge base article.
JSON A JSON file that contains a nested list of tag categories or values.
8. (Optional) Deselect any fields you do not want to appear in the export file.
9. In the Expiration box, type the number of days before the export file expires.
Note: Tenable Vulnerability Management allows you to set a maximum of 30 calendar days for export
expiration.
l In the Start Date and Time section, select the date and time on which you want the
export schedule to start.
l In the Time Zone drop-down box, select the time zone to which you want the schedule
to adhere.
l In the Repeat drop-down box, select how often you want the export to repeat.
- 1235 -
l In the Repeat Ends drop-down, select the date on which you want the schedule to end.
Note: If you select never, the schedule repeats until you modify or delete the export schedule.
Note: You can enable email notifications with or without scheduling exports.
l In the Add Recipients box, type the email addresses to which you want to send the
export notification.
l (Required) In the Password box, type a password for the export file. You must share this
password with the recipients to allow them to download the file.
Note: Tenable Vulnerability Management sends an email to the recipients and from the link in
the email, the recipients can download the file by providing the correct password.
Tenable Vulnerability Management begins processing the export. Depending on the size of the
exported data, Tenable Vulnerability Management may take several minutes to process the
export.
When processing completes, Tenable Vulnerability Management downloads the export file to
your computer. Depending on your browser settings, your browser may notify you that the
download is complete.
13. Access the export file via your browser's downloads directory. If you close the export plane
before the download finishes, then you can access your export file in the Export Management
View.
Required Tenable Vulnerability Management Permission: Can Edit, Can Use permission for applicable
asset tags.
- 1236 -
When you delete a tag category, Tenable Vulnerability Management deletes any tags created under
that category and removes those tags from all assets where they were applied.
Caution: When you delete a tag category, all associated values and assignments are also deleted. If you
want to remove a specific tag, see Delete a Tag .
The Tags page appears. On this page, you can view your asset tag categories and values.
A menu appears.
A confirmation window appears, asking if you are sure that you want to delete the
category and all associated tags and assignments.
- 1237 -
A confirmation window appears, asking if you are sure that you want to delete the
category and all associated tags and assignments..
6. Click Delete.
Tenable Vulnerability Management deletes the tag category and any associated tags, and
removes those tags from all assets where you applied them.
Delete a Tag
Required Tenable Vulnerability Management Permission: Can Edit, Can Use permission for applicable
asset tags.
When you delete a tag, Tenable Vulnerability Management removes that specific tag from all assets
where you applied the tag.
The Tags page appears. On this page, you can view your asset tag categories and values.
Scope of
Action
Deletion
- 1238 -
The Values tab appears, displaying a table with all the tags on your
Tenable Vulnerability Management instance in Category:Value
format.
b. In the tags table, right-click the row for the tag you want to delete.
-or-
In the tags table, in the Actions column, click the button for the
tag you want to delete.
c. Click Delete.
The Values tab appears, displaying a table with all the tags on your
Tenable Vulnerability Management instance in Category:Value
format.
b. In the tags table, select the check box for each tag you want to
delete.
-or-
- 1239 -
a. In the tags table, roll over the tag you want to delete.
7. Click Confirm.
Tenable Vulnerability Management deletes the tag and removes it from all assets where you
applied the tag.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
You can see which assets have a specific tag applied by searching for assets by tag.
The Tags page appears. On this page, you can view your asset tag categories and values.
- 1240 -
4. Click the Values tab.
The Assets page appears and displays the assets table filtered by the tag you selected.
Sensors
Tenable Vulnerability Management supports the following sensor types:
l Tenable-provided regional cloud sensors. For more information, see Cloud Sensors.
l Manually configured linked sensors (Tenable Nessus scanners, Tenable Nessus Network
Monitor instances, Tenable Web App Scanning sensors, and Tenable Nessus Agents). For
more information, see Linked Sensors.
Tip: For information on other ways to ingest data into Tenable Vulnerability Management, see the Data
Ingestion in Tenable Vulnerability Management quick reference guide.
Agents
Agents increase scan flexibility by making it easy to scan assets without needing ongoing host
credentials or assets that are offline. Agents allow for large-scale concurrent scanning with little
network impact.
After you install a Tenable Nessus Agent on a host and link the agent to Tenable Vulnerability
Management, the agent appears on the Tenable Vulnerability Management Linked Agents page.
- 1241 -
Note: If you assign one or more agents to a network and any of those agents are already assigned to
another custom network, a confirmation message appears indicating that, by adding agents to this
network, they are reassigned from their previous networks.
l Network interface information (network interface names, MAC addresses, IPv4 and IPv6
addresses, hostnames and DNS information if available)
l Hostname if update_hostname is set to yes (see Tenable Nessus Agent Advanced Settings
for more information)
Note: Tenable Nessus Agent connect to 169.254.169.254 to provide AWS metadata to Tenable
Vulnerability Management; traffic between Tenable Nessus Agent and 169.254.169.254 is normal and
expected behavior.
l privatelp
l accountId
l imageId
l region
l instanceType
l availabilityZone
l architecture
l instanceId
- 1242 -
l local-hostname
l public-hostname
l public-ipv4
l mac
l iam/security-credentials/
l public-keys/0/openssh-key
l security-groups
Note: For agents versions 8.3.1 and older, agents check in on start and after a restart.
For agents version 10.0.0 and later, agents check in on start, after a restart, and whenever the
metadata is updated (no more than every 10 minutes).
Tip: For information on other ways to ingest data into Tenable Vulnerability Management, see the Data
Ingestion in Tenable Tenable Vulnerability Management quick reference guide.
Before you begin the Tenable Nessus Agents installation process, you must retrieve the agent
linking key from Tenable Vulnerability Management.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
- 1243 -
4. Click the Nessus Agents tab.
The list of agents appears and Linked Agents is selected in the drop-down box.
What to do next:
l Install Tenable Nessus Agent
In Tenable Vulnerability Management, you can request and download a log file containing logs and
system configuration data from any of your linked agents. This information can help you
troubleshoot system problems and easily provide data for Tenable Support.
You can store a maximum of five log files from each agent. Once the limit is reached, you must
remove an old log file to download a new one. After you request an agent log file, Tenable
Vulnerability Management retains the log file for seven days.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
- 1244 -
The list of agents appears and Linked Agents is selected in the drop-down box.
5. In the agents table, click the agent for which you want to download logs.
Note: If you have reached the maximum of five log files, the Request Logs button is disabled.
Remove an existing log before downloading a new one.
Tenable Vulnerability Management requests the logs from the agent the next time it checks in,
which may take several minutes. You can view the status of the request in the user interface
until the download is complete.
Once you request agent logs, Tenable Vulnerability Management retains the logs for seven
days.
1. In the row of the log you want to remove, click the button.
Tenable Vulnerability Management deletes the log and removes it from the table.
l In the row of the pending or failed log request that you want to cancel, click the button.
Tenable Vulnerability Management cancels the log request and removes it from the table.
Restart an Agent
- 1245 -
In Tenable Vulnerability Management, you can restart linked agents (versions 7.6 and later) on the
Linked Agents tab.
To restart an agent:
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
The list of agents appears and Linked Agents is selected in the drop-down box.
5. (Optional) Search for a specific agent or filter the agents in the table.
Restart
Description
Type
Idle Restart the agent backend and service when the agent is not running
a scan.
c. Click Save.
- 1246 -
Tenable Vulnerability Management saves your settings, and the changes take effect the
next time the agent checks in. For online agents, this can take up to 45 minutes.
l In the agents table, select the check box next to each agent you want to restart.
l In the table header, select the check box to select the entire page.
Tip: In the action bar, select Select All Pages to select all linked agents.
Restart
Description
Type
Idle Restart the agent backend and service when the agent is not running
a scan.
d. Click Save.
Tenable Vulnerability Management saves your settings, and the changes take effect the
next time the agent checks in. For online agents, this can take up to 45 minutes.
Unlink an Agent
When you manually unlink an agent, the agent is removed from the Agents page, but the system
retains related data for the period of time specified in agent settings. When you manually unlink an
agent, the agent does not automatically relink to Tenable Vulnerability Management.
- 1247 -
Tip: You can configure agents to automatically unlink if they are inactive for a certain number of days, as
described in agent settings.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
The list of agents appears and Linked Agents is selected in the drop-down box.
5. (Optional) Search for a specific agent or filter the agents in the table. For filter descriptions,
see Agent Filters.
- 1248 -
6. Select the agent you want to unlink:
Scope Action
-or-
-or-
Select the check box next to the agent you want to unlink.
Unlink multiple To unlink multiple agents from the Nessus Agents tab:
agents
a. Select the check box next to the agents you want to unlink.
Rename an Agent
You can rename your linked agents from the Sensors menu. This can be helpful for making agents
more recognizable to other users.
To rename an agent:
- 1249 -
1. In the upper-left corner, click the button.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
The list of agents appears and Linked Agents is selected in the drop-down box.
Tenable Vulnerability Management saves the new agent name and updates any related tables
with the new name.
Agent Settings
On your agent's manager, you can configure global agent settings to specify agent and freeze
window settings for all your linked agents. For more information on creating, modifying, and
deleting freeze windows, see Freeze Windows.
You can also adjust log level, performance level, automatic hostname update, and automatic version
update settings for individual agents. For more information, see Modify Remote Agent Settings .
- 1250 -
In Tenable Vulnerability Management, you can modify settings for individual agents (versions 7.6 and
later) on the Linked Agents tab. For information on editing similar settings in the command line
interface, see Advanced Settings in the Tenable Nessus Agent User Guide.
Note: In addition to using the following procedure, you can manually update agents through the command
line. For more information, see the Tenable Nessus Agent User Guide.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
The list of agents appears and Linked Agents is selected in the drop-down box.
5. (Optional) Search for a specific agent or filter the agents in the table, as described in Filter
Agents in the Tenable Nessus Agent Deployment and User Guide.
- 1251 -
file, as indicated by a backend.log
set of log tags that logging level to
determine what normal and
information to include sets log tags
in the log. to "log",
"info",
If you manually edited
"warn",
log.json to set a
"error",
custom set of log
"trace"
tags for
backend.log, this l debug -
setting overwrites Changes the
that content. backend.log
logging level to
For more information,
debug and
see log.json Format in
sets log tags
the Tenable Nessus
to "log",
User Guide.
"info",
"warn",
"error",
"trace",
"debug"
l verbose -
Changes the
backend.log
logging level to
verboseand
sets log tags
to "log",
"info",
"warn",
"error",
- 1252 -
"trace",
"debug",
"verbose"
- 1253 -
slows down scans,
but reduces the
agent's
CPU consumption.
Setting the
performance to
medium or high
means that scans
complete more
quickly, but the agent
consumes more CPU.
For more information,
see Agent CPU
Resource Control in
the Tenable Nessus
Agent Deployment and
User Guide.
- 1254 -
agent a freeze
window, the
freeze window
overrides both the
Nessus Agent
Update Plan and
the agent profile.
In this case, the
agent remains on
its current version
and no software
updates occur for
that agent as long
as the agent is
assigned to the
freeze window.
- 1255 -
Maximum Scans Specifies the 10 Integers 1 or more
Per Day maximum number of
scans to run on the
agent per day.
c. Click Save.
Tenable Vulnerability Management saves your settings, and the changes take effect the
next time the agent checks in. For online agents, this can take up to 45 minutes.
If necessary for the setting changed, the agent restarts the next time it becomes idle.
l In the agents table, select the check box next to each agent you want to edit.
l In the table header, select the check box to select the entire page.
Tip: In the action bar, select Select All Pages to select all linked agents.
- 1256 -
If you manually edited l debug - Sets
log.json to set a log tags to
custom set of log tags "log",
for backend.log, this "info",
setting overwrites "warn",
that content. "error",
"trace",
For more information,
"debug"
see log.json Format in
the Tenable Nessus l verbose -
User Guide. Sets log tags
to "log",
"info",
"warn",
"error",
"trace",
"debug",
"verbose"
- 1257 -
completes more
quickly, but the agent
consumes more CPU.
For more information,
see Agent CPU
Resource Control in
the Tenable Nessus
Agent Deployment and
User Guide.
- 1258 -
Update endpoint is modified
the new hostname will
be updated in the
agent's manager. This
feature is disabled by
default to prevent
custom agent names
from being
overridden.
- 1259 -
and no software
updates occur for
that agent as long
as the agent is
assigned to the
freeze window.
d. Click Save.
Tenable Vulnerability Management saves your settings, and the changes take effect the
next time the agent checks in. For online agents, this can take up to 45 minutes.
If necessary for the setting changed, the agents restart the next time they become idle.
- 1260 -
3. Click the Sensors tile.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
The list of agents appears and Linked Agents is selected in the drop-down box.
Option Description
Inactive Agents
Unlink agents Specifies the number of days an agent can be inactive before the
that have manager unlinks the agent. After the specified number of days, the
been inactive agent is unlinked, but the corresponding agent data is not removed from
for X days the manager.
Exclude all Enable this option to prevent all linked agents from receiving software
agents from updates at any time. This option takes precedence over any existing
software freeze windows.
updates
Agents continue to receive plugin updates and perform scheduled scans
if you enable this setting.
7. Click Save.
- 1261 -
Tenable Vulnerability Management saves your changes.
Agent Profiles
You can use agent profiles to apply a specific version to your linked agents. This can be helpful for
testing; for example, you may want to schedule a testing period on a subset of your agents before
upgrading all your agents to a new version.
An agent profile allows you to apply a newer version to a subset of your agents for a limited time,
and more broadly, allows you to upgrade and downgrade agents to different versions easily. You can
only assign an agent to one profile.
l Default — The profile to which an agent or agent group belongs to unless you assign it to a
custom profile. You cannot copy, delete, or edit the name and description of the Default
profile.
l Custom profiles — A custom profile that you create. Custom networks allow you to associate
and configure different agents and agent groups based on your business needs.
Note: You cannot set agent profiles to versions earlier than 10.4.1. Agent profiles do not affect agents on
versions earlier than 10.4.1.
Note: The agent profile version overrides the agent's Nessus Agent update plan setting. If you assign the
agent a freeze window, the freeze window overrides both the Nessus Agent update plan and the agent
profile. In this case, the agent remains on its current version and no software updates occur for that agent
as long as the agent is assigned to the freeze window.
- 1262 -
3. Click the Sensors tile.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
The list of agents appears and Linked Agents is selected in the drop-down box.
Note: You cannot create an agent profile for an end-of-life (EOL) Tenable Nessus Agent version.
4. Select the agent profile's Sensor Version. This is the version that agents assigned to the
profile are upgraded or downgraded to.
You can set the agent profile to stay on the latest major version release (for example, 10.x) or
the latest minor version release (for example, 10.4.x), or you can set the agent profile to a
specific patch release (for example, 10.4.1).
5. (Optional) Select the Open Agent Port checkbox and enter the open agent port of your
targets. The port must be between 1025 and 65535.
Selecting Open Agent Port allows Tenable scanners to identify scan targets that host the
agents assigned to this profile. These hosts then appear as a single asset regardless of
whether they are the target of a scanner's network scan or are generating agent scans. This
helps minimize asset duplication in your network. To learn more about the Open Agent Port,
- 1263 -
see Configure Agent Profiles to Avoid Asset Duplication in Tenable Vulnerability Management
in the Tenable Nessus Agent User Guide.
Note: Configuring the Open Agent Port permits your network scanners to probe each target system
on the port you select.
Note: Only agents version 10.6.0 and later can use the Open Agent Port setting. The setting does not
apply to any agent on an earlier version.
6. Under Assign Agents, select the checkboxes next to the agents you want to assign.
7. Click Create.
You can link an agent to a profile by running the nessuscli agent link command and specifying
the optional --profile-uuid argument. You can also link an agent to a profile during deployment
by specifying the profile-uuid in the config.json file. Use the following procedure to view a
profile's --profile-uuid.
1. On the Profiles page, double-click the agent profile that you want to view the ID of.
2. In the Details tab, view the --profile-uuid under Agent Profile ID. You can click to copy
the ID to your clipboard.
1. On the Profiles page, double-click the profile that you want to edit.
- 1264 -
l To edit the agent profile name, click next to the agent name.
l In the Details tab, you can edit the profile description and the agent version that the
profile sets linked agents to.
l In the Details tab, you can edit the profile description, the agent version, and the Open
Agent Port of the profile.
l In the Agents tab, you can add or remove linked agents from the agent profile.
3. Click Save.
Tenable Vulnerability Management saves your changes. If you added or removed agents from
the profile, the agents' versions update within 24 hours of your edit.
Copy an agent profile to create a duplicate of the existing agent profile. You can then use the
duplicate to set up a new agent profile.
1. On the Profiles page, click in the row of the profile that you want to copy.
A menu appears.
2. Click Copy.
Tenable Vulnerability Management creates a new profile with "Copy of" appended to the profile
name.
Delete an agent profile if you no longer need the agent profile. You cannot undo an agent profile
deletion.
1. On the Profiles page, click in the row of the profile that you want to delete.
A menu appears.
- 1265 -
2. Click Delete.
Tenable Vulnerability Management deletes the agent profile and removes all the linked agents
from the profile.
What to do next:
l Add or Remove Agents from Agent Profiles
Use the following procedures to add an agent to an agent profile or remove an agent from an agent
profile in Tenable Vulnerability Management. You can also add and remove agents from profiles
from the Sensor Profile Details page. For more information, see Edit an agent profile.
In addition to using the Tenable Vulnerability Management user interface, you can link an agent to a
profile by running the nessuscli agent link command and specifying the optional --profile-
uuid argument. You can link an agent to a profile during deployment by specifying the profile-
uuid in the config.json file. To find a profile's profile-uuid, see View an agent profile ID.
Note: The agent profile version overrides the agent's Nessus Agent update plan setting. If you assign the
agent a freeze window, the freeze window overrides both the Nessus Agent update plan and the agent
profile. In this case, the agent remains on its current version and no software updates occur for that agent
as long as the agent is assigned to the freeze window.
- 1266 -
3. Click the Sensors tile.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
The list of agents appears and Linked Agents is selected in the drop-down box.
a. Click in the row of the agent that you want to assign to the profile.
c. In the table, select the checkbox of the agent profile that you want to assign the
agent to.
d. Click Apply.
l In the agents table, select the check box next to each agent you want to add.
l In the table header, select the check box to select the entire page.
Tip: In the action bar, select Select All Pages to select all linked agents.
- 1267 -
b. In the table, select the checkbox of the agent profile that you want to assign the
agents to.
c. Click Apply.
Tenable Vulnerability Management assigns the agents to the agent profile. The
agents' versions update within 24 hours of the profile application.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
The list of agents appears and Linked Agents is selected in the drop-down box.
a. Click in the row of the agent that you want to assign to the profile.
Tenable Vulnerability Management removes the agent from the agent profile.
- 1268 -
l To remove multiple agents from an agent profile, do one of the following:
l In the agents table, select the check box next to each agent you want to add.
l In the table header, select the check box to select the entire page.
Tip: In the action bar, select Select All Pages to select all linked agents.
Tenable Vulnerability Management removes the agents from the agent profile or
profiles. The agents' versions update within 24 hours of the profile removal.
What to do next:
l Manage agent profiles
Agent Status
Status Description
Online The host that contains the Tenable Nessus Agent is currently connected and
in communication with Tenable Vulnerability Management.
Offline The host that contains the Tenable Nessus Agent is currently powered down
or not connected to a network.
Initializing The Tenable Nessus Agent is in the process of checking in with Tenable
Vulnerability Management.
Export Agents
- 1269 -
1. In the upper-left corner, click the button.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
The list of agents appears and Linked Agents is selected in the drop-down box.
5. Select the agents that you want to export by clicking each agent's checkbox.
The Export plane appears and shows the number of agents that will be exported.
Note: If your .csv export file includes a cell that begins with any of the following characters (=, +, -,
@), Tenable Vulnerability Management automatically inputs a single quote (') at the beginning of the
cell. For more information, see the related knowledge base article.
The agents.csv file exported from Tenable Vulnerability Management contains the following data:
Field Description
Status The status of the agent at the time of export. Possible values are unlinked,
online, or offline.
- 1270 -
Platform The platform the agent is installed on.
Group IDs The group IDs of any groups the agent belongs to.
Last Plugin The date (in ISO-8601 format) the agent's plugin set was last updated.
Update
Linked On The date (in ISO-8601 format) the agent was linked to Tenable Vulnerability
Management.
Last Connect The date (in ISO-8601 format) of the agent's last check-in.
Last Scanned The date (in ISO-8601 format) the agent was last scanned.
On the Sensor Management page, you can export one or more linked agents in CSV or JSON format.
- 1271 -
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
The list of agents appears and Linked Agents is selected in the drop-down box.
6. (Optional) Refine the table data. For more information, see Tenable Vulnerability Management
Workbench Tables.
Export
Action
Scope
-or-
In the linked agents table, in the Actions column, click the button
in the row for the linked agent you want to export.
-or-
In the linked agents table, select the check box of the agent you
want to export.
b. Click Export.
- 1272 -
agents you want to export.
l A text box to set the number of days before the export expires.
Format Description
10. (Optional) Deselect any fields you do not want to appear in the export file.
11. In the Expiration box, type the number of days before the export file expires.
Note: Tenable Vulnerability Management allows you to set a maximum of 30 calendar days for export
expiration.
- 1273 -
12. (Optional) To send email notifications on completion of the export:
Note: You can enable email notifications with or without scheduling exports.
l In the Add Recipients box, type the email addresses to which you want to send the
export notification.
l (Required) In the Password box, type a password for the export file. You must share this
password with the recipients to allow them to download the file.
Note: Tenable Vulnerability Management sends an email to the recipients and from the link in
the email, the recipients can download the file by providing the correct password.
Tenable Vulnerability Management begins processing the export. Depending on the size of the
exported data, Tenable Vulnerability Management may take several minutes to process the
export.
When processing completes, Tenable Vulnerability Management downloads the export file to
your computer. Depending on your browser settings, your browser may notify you that the
download is complete.
14. Access the export file via your browser's downloads directory. If you close the export plane
before the download finishes, then you can access your export file in the Export Management
View.
On the Details page for any linked agent, you can export details about your linked agent in CSV or
JSON format.
- 1274 -
1. In the upper-left corner, click the button.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
The list of agents appears and Linked Agents is selected in the drop-down box.
5. (Optional) Refine the table data. For more information, see Tenable Vulnerability Management
Workbench Tables.
6. In the linked agents table, click the linked agent for which you want to export details.
l A text box to set the number of days before the export expires.
- 1275 -
Format Description
CSV A CSV text file that contains a list of your linked agent details, organized by
fields.
JSON A JSON file that contains a nested list of your linked agent details,
organized by fields.
10. (Optional) Deselect any fields you do not want to appear in the export file.
11. In the Expiration box, type the number of days before the export file expires.
Note: Tenable Vulnerability Management allows you to set a maximum of 30 calendar days for export
expiration.
Note: You can enable email notifications with or without scheduling exports.
l In the Add Recipients box, type the email addresses to which you want to send the
export notification.
l (Required) In the Password box, type a password for the export file. You must share this
password with the recipients to allow them to download the file.
Note: Tenable Vulnerability Management sends an email to the recipients and from the link in
the email, the recipients can download the file by providing the correct password.
Tenable Vulnerability Management begins processing the export. Depending on the size of the
exported data, Tenable Vulnerability Management may take several minutes to process the
export.
- 1276 -
When processing completes, Tenable Vulnerability Management downloads the export file to
your computer. Depending on your browser settings, your browser may notify you that the
download is complete.
14. Access the export file via your browser's downloads directory. If you close the export plane
before the download finishes, then you can access your export file in the Export Management
View.
Filter Agents
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
6. Configure the options as necessary. Depending on the parameter you select, different options
appear:
Distro contains In the text box, type the distribution name on which
you want to filter.
does not
contain
- 1277 -
Category Operator Value
IP Address is equal to In the text box, type the IPv4 or IPv6 addresses on
which you want to filter.
is not equal
to
contains
does not
contain
Last earlier than In the text box, type the date on which you want to
Connection filter.
later than
Last Plugin
on
Update
not on
Last Scanned
Member of is equal to From the drop-down list, select from your existing
Group agent groups.
is not equal
to
Name is equal to In the text box, type the agent name on which you
want to filter.
is not equal
to
contains
does not
contain
Platform contains In the text box, type the platform name on which you
want to filter.
does not
contain
- 1278 -
Category Operator Value
is not equal
to
Version is equal to In the text box, type the version you want to filter.
is not equal
to
contains
does not
contain
7. Click Apply.
The manager filters the list of agents to include only those that match your configured
options.
Agent Filters
Distro contains In the text box, type the distribution name on which you
want to filter.
does not
contain
IP Address is equal to In the text box, type the IPv4 or IPv6 addresses on which you
want to filter.
is not equal
to
contains
does not
contain
Last earlier than In the text box, type the date on which you want to filter.
Connection
later than
- 1279 -
Category Operator Value
Last Plugin on
Update
not on
Last Scanned
Member of is equal to From the drop-down list, select from your existing agent
Group groups.
is not equal
to
Name is equal to In the text box, type the agent name on which you want to
filter.
is not equal
to
contains
does not
contain
Platform contains In the text box, type the platform name on which you want
to filter.
does not
contain
is not equal
to
UUID is equal to In the text box, type the agent UUID that you want to filter.
is not equal You can use either of the following agent UUID formats:
to
l xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx (for example,
885c5f3e-aca3-42bf-9355-ace1c71bfe9a)
You can find the agent's UUID by viewing the agent's details
- 1280 -
Category Operator Value
Version is equal to In the text box, type the version you want to filter.
is not equal
to
contains
does not
contain
Agent Groups
You can use agent groups to organize and manage the agents linked to Tenable Vulnerability
Management. You can add an agent to more than one group, and configure scans to use these
groups as targets.
You can use agent groups to organize and manage the agents linked to your account. You can add
an agent to more than one group and configure scans to use these groups as targets.
- 1281 -
Use this procedure to create an agent group in Tenable Vulnerability Management.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
The list of agents appears and Linked Agents is selected in the drop-down box.
7. In the Group Name box, type a name for the new agent group.
9. Click Save.
What to do next:
l Use the agent group in an agent scan configuration.
- 1282 -
Use this procedure to add an agent to an agent group in Tenable Vulnerability Management. You can
also add agents to a group when you modify an agent group.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
The list of agents appears and Linked Agents is selected in the drop-down box.
6. (Optional) Search for a specific agent or filter the agents in the table. For filter descriptions,
see Agent Filters.
a. In the agents table, roll over the agent you want to add.
- 1283 -
l In the agents table, select the check box next to each agent you want to add.
l In the table header, select the check box to select the entire page.
Tip: In the action bar, select Select All Pages to select all linked agents.
c. In the Users & Groups section, set the user permissions for the new group.
d. Click Save.
The Add to Groups plane reappears. The new group appears in the selection list.
Tenable Vulnerability Management adds the agent to the selected group or groups.
- 1284 -
1. In the upper-left corner, click the button.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
The list of agents appears and Linked Agents is selected in the drop-down box.
6. (Optional) Search for a specific agent group or filter the agent groups in the table. For filter
descriptions, see Agent Group Filters.
l In the Actions column, click the icon for the agent you want to edit.
l Select the check box next to the agent you want to edit.
- 1285 -
d. Configure user permissions for the agent group.
a. Click the row of the agent group where you want to add agents.
c. (Optional) Search for a specific agent or filter the agents in the table. For filter
descriptions, see Agent Filters.
d. In the agents table, select the check boxes next to the agents you want to add to the
agent group.
e. Click Assign.
Tenable Vulnerability Management adds the agents to the agent group, and the details
page appears.
- 1286 -
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
The list of agents appears and Linked Agents is selected in the drop-down box.
6. (Optional) Search for a specific agent group or filter the agent groups in the table. For filter
descriptions, see Agent Group Filters.
l In the row for the agent group you want to delete, in the Actions column, click the
button.
l Select the check box for the agent you want to delete.
8. Click Delete.
9. Click Delete.
Use this procedure to remove an agent or agents from an agent group in Tenable Vulnerability
Management.
- 1287 -
1. In the upper-left corner, click the button.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
The list of agents appears and Linked Agents is selected in the drop-down box.
6. (Optional) Search for a specific agent group or filter the agent groups in the table. For filter
descriptions, see Agent Group Filters.
7. In the agent groups table, click the agent group you want to modify.
To remove Action
- 1288 -
l Select the check box next to the agent group you want to
remove.
Tenable Vulnerability Management removes the agent or agents from the group.
Use this procedure to view agents in an agent group in Tenable Vulnerability Management.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
- 1289 -
4. Click the Nessus Agents tab.
The list of agents appears and Linked Agents is selected in the drop-down box.
6. (Optional) Search for a specific agent or filter the agents in the table. For filter descriptions,
see Agent Filters.
7. In the agent groups table, click the agent group you want to view.
The Group Details page appears. This page contains a table listing the agents assigned to the
group.
You can use the filters listed below to filter agent groups in the Agent Groups tab.
Name is equal to In the text box, type the name of the agent group.
is not equal
to
contains
does not
contain
Creation earlier than In the text box, type the date on which the agent group was
Date created.
later than
on
not on
Last earlier than In the text box, type the date on which the agent group was
Modified last modified.
later than
Modifications include:
on
l You modified the agent name or description.
- 1290 -
not on l You added an agent to the group.
Freeze Windows
Freeze windows allow you to schedule times where certain agent activities are suspended for all
linked agents. This activity includes:
Note: Freeze windows override both agent profiles and the Nessus Agent update plan. If you assign an agent
to a freeze window and enable the freeze window, any version updates that would normally occur due to an
agent's agent profile or the agent's update plan are blocked.
Freeze windows will apply to all linked agents and will prevent the agents from receiving and
applying software updates during scheduled windows. Agents still receive plugin updates and
continue performing scheduled scans during these windows.
- 1291 -
1. In the upper-left corner, click the button.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
The list of agents appears and Linked Agents is selected in the drop-down box.
8. Click Save.
The freeze window is saved and appears on the Freeze Windows psge.
Use this procedure to manage a freeze window for agent scanning in Tenable Vulnerability
Management.
- 1292 -
3. Click the Sensors tile.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
The list of agents appears and Linked Agents is selected in the drop-down box.
6. In the freeze window table, click the freeze window you want to modify.
Use this procedure to enable or disable a freeze window for linked agents in Tenable Vulnerability
Management.
To enable or disable a freeze window for linked agents in the new interface:
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
- 1293 -
The list of agents appears and Linked Agents is selected in the drop-down box.
7. In the row for the freeze window you want to enable or disable, click the Status toggle.
On the Sensors page, you can export one or more freeze windows in CSV or JSON format.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
The list of agents appears and Linked Agents is selected in the drop-down box.
6. (Optional) Refine the table data. For more information, see Tenable Vulnerability Management
Workbench Tables.
- 1294 -
Scope Action
l In the Actions column, click the button in the row for the
freeze window you want to export.
l Select the check box for the freeze window you want to export
b. Click Export.
To export a. In the freeze windows table, select the check box for each freeze
multiple window you want to export.
freeze
The action bar appears at the top of the table.
windows
b. In the action bar, click Export.
Note: You can individually select and export up to 200 freeze windows.
If you want to export more than 200 freeze windows, you must select all
the freeze windows on your Tenable Vulnerability Management instance
by selecting the check box at the top of the freeze windows table and
then click Export.
- 1295 -
l A text box to set the number of days before the export expires.
Format Description
Note: If your .csv export file includes a cell that begins with any of the following
characters (=, +, -, @), Tenable Vulnerability Management automatically inputs a
single quote (') at the beginning of the cell. For more information, see the
related knowledge base article.
10. (Optional) Deselect any fields you do not want to appear in the export file.
11. In the Expiration box, type the number of days before the export file expires.
Note: Tenable Vulnerability Management allows you to set a maximum of 30 calendar days for export
expiration.
Note: You can enable email notifications with or without scheduling exports.
l In the Add Recipients box, type the email addresses to which you want to send the
export notification.
l (Required) In the Password box, type a password for the export file. You must share this
password with the recipients to allow them to download the file.
- 1296 -
Note: Tenable Vulnerability Management sends an email to the recipients and from the link in
the email, the recipients can download the file by providing the correct password.
Tenable Vulnerability Management begins processing the export. Depending on the size of the
exported data, Tenable Vulnerability Management may take several minutes to process the
export.
When processing completes, Tenable Vulnerability Management downloads the export file to
your computer. Depending on your browser settings, your browser may notify you that the
download is complete.
14. Access the export file via your browser's downloads directory. If you close the export plane
before the download finishes, then you can access your export file in the Export Management
View.
Use this procedure to delete a freeze window for agent scanning in Tenable Vulnerability
Management.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
The list of agents appears and Linked Agents is selected in the drop-down box.
- 1297 -
5. In the drop-down box, select Freeze Windows.
Scope Action
l Select the check box for the freeze window you want
to delete.
b. Click Delete.
Delete multiple a. In the freeze windows table, select the check box next to
freeze windows each window you want to delete.
b. Click Delete.
Plugin Updates
- 1298 -
The following table describes the behavior of differential plugin updates for agents linked to
Tenable Vulnerability Management:
Differential
Linked Full Update
Update
Tenable The agent The agent performs a full plugin update at scan time
Vulnerability requests whenever the agent needs all plugin sets for certain
Management differential scan policies.
updates from
The agent also deletes unused plugin sets after a
Tenable
configurable amount of time. After the amount of
Vulnerability
time passes, the agent performs a full update and
Management once
deletes the unused plugin sets. For more
every 24 hours.
information, see the days_to_keep_unused_
plugins advanced setting.
Connection Disruptions
In the event of agent connectivity disruption in Tenable Vulnerability Management, the agent tests
connectivity approximately every 30 minutes.
Once connectivity is restored, the agent attempts to upload the scan result. After three failed
upload attempts, the agent stops attempting.
l When using a scan window, once an agent completes a scan, it uploads its scan results. As
long as the window is active, Tenable Vulnerability Management accepts the results. If the
agent fails to upload its scan results during the window, the results are discarded. The agent
re-scans and re-uploads during the next window.
l When using a triggered scan, once an agent completes a scan, it uploads its scan results. If
there are connectivity interruptions during transmission, the agent waits until connectivity is
restored and attempts to upload the scan result. If the agent fails to upload the result three
times, the agent re-scans and re-uploads the results upon the next trigger.
An agent that is offline for an extended time continues to scan if the trigger is met, replaces
the previous scan results, and uploads the results once connectivity is restored.
- 1299 -
Tip: You can use the Offline Agent Scan Trigger Execution Threshold agent setting configure the
number of days an agent can be offline before it stops executing triggered scans. For more
information, see Modify Remote Agent Settings .
Networks
In larger enterprises, you can reduce the time and cost of setting up and maintaining locations by
deploying environments with the same internal IP addresses. To disambiguate between assets that
have the same IP addresses across environments, use networks in Tenable Vulnerability
Management. Networks can also be used to logically separate assets for reporting, Role-Based
Access Control (RBAC), and Tagging purposes.
If you deploy environments with the same internal IP addresses, create a network for each
environment you have, and assign scanners and scanner groups to each network. When a scanner
scans an asset, the associated network is added to the asset's details. You can filter assets by
network or create dynamic tags based on a network. Recast rules and access groups do not support
networks.
l Default network — The network to which a scanner or scanner group belongs unless you
assign it to a custom network.
You can view scanners in the default network, but you cannot add or remove scanners from
the default network. If you remove a scanner or scanner group from a custom network, or if
you delete a custom network, Tenable Vulnerability Management returns the scanner or
scanner groups to the default network. Imported scans always belong to the default network.
Note: Assets from AWS pre-authorized scanners can only appear in the Default network.
Note: If you move agents from a custom network to the Default network, you need to move the
agents' associated assets to the Default network manually. Assets do not revert back to the Default
network automatically. For more information, see Add an Agent to a Network and Move Assets to a
Network via Settings.
l Custom network — A custom network that you create. Custom networks allow you to group
and separate different scanners and assets based on your business needs. For example, you
- 1300 -
can create networks for different sub-organizations, external versus internal scanning, or
ephemeral versus static scanning.
Caution: Any scanner that scans an asset that is not in the same network as the scanner will create
a duplicate asset record. Therefore, you need to ensure that any new scanner or scanner group is
part of the correct network before you begin scanning.
Create a Network
Create a custom network only if you want to scan targets in separate environments that contain
overlapping IP ranges. If your scans do not involve separate environments with overlapping IP
ranges, keep all scanners in the Default network.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
- 1301 -
5. Click Add Network.
Note: By default, the Asset Age Out toggle is enabled and the value is set to 180 days. At that point,
Tenable Vulnerability Management deletes all asset records and associated vulnerabilities. These
cannot be recovered, and the deleted assets no longer count towards your license.
l To change the number of days after which Tenable Vulnerability Management deletes
unseen assets, in the Delete Assets Not Seen in the Last text box, type the number of
days.
Tenable Vulnerability Management creates the new network. The Manage Scanners page
appears.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
- 1302 -
4. Click the Networks tab.
The Network Details page appears with the Settings tab active.
a. Edit the network Name or Description. The name can contain any alphanumeric and
special characters except < and >.
b. Turn on Asset Age Out to permanently delete network assets that have not been seen
on a scan for a specific number of days.
c. In the text box that appears, type the number of days. The minimum value is 14 and the
maximum value is 450.
Caution: When you enable and save this option, Tenable Vulnerability Management
immediately deletes assets. All asset records and associated vulnerabilities are deleted and
cannot be recovered. The deleted assets no longer count towards your license.
Note: You cannot age out assets which are older than 15 months (456 days). To delete these
assets, filter for them on the Assets workbench and then delete them manually. For more
information, see Delete Assets.
7. Click Save.
A scanner or scanner group is part of the default network unless you add it to a custom network. A
scanner or scanner group can only be part of one network at a time.
You can only add a scanner group to a custom network if all scanners in that group belong to either
the default network or the same custom network. If you try to add a scanner group that contains a
scanner already assigned to a different custom network, Tenable Vulnerability Management
prevents you from adding the scanner group to the network until you resolve the conflict.
- 1303 -
Before you begin:
l Create a new network.
Note: Tenable recommends moving scanners to a new network, rather than an existing network, to
prevent unwanted asset merges. If the network where you move a scanner already contains asset
records, and the identifiers for assets from the moved scanner match the identifiers already existing
in the network, Tenable Vulnerability Management automatically merges those assets.
l If you want to move a scanner from one existing network to another existing network:
l Note the IP addresses of the assets identified by the scanner you want to move.
l Use the IP addresses to move the assets from the first network to the second network.
l Add the scanner from the first network to the second network. Use the steps below to
add a scanner.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
5. In the networks table, click the network you want to add a scanner or scanner group to.
- 1304 -
7. In the row of the scanner or scanner group you want to add to the network, click the
button.
Tenable Vulnerability Management determines whether there are any scanner group conflicts:
If no conflicts are present, Tenable Vulnerability Management adds the scanner or scanner
group to the network and moves it to the Member Scanners table.
If any conflicts are present, Tenable Vulnerability Management displays a message. You need
to remove a scanner from the scanner group to resolve the conflict. For more information
about removing scanners from scanner groups, see Edit a Scanner Group.
If you remove a scanner or a scanner group from a custom network, Tenable Vulnerability
Management reassigns it to the default network.
Tip: If you want to delete a scanner group or remove a sensor from a scanner group, see Delete a Scanner
Group and Remove a Sensor from a Scanner Group.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
- 1305 -
5. In the networks table, click the network where you want to remove a scanner or scanner
group.
7. In the row of the scanner or scanner group you want to remove from the network, click the
button.
Tenable Vulnerability Management moves the scanner or scanner group to the default
network. The scanner or scanner group appears in the Available Scanners list.
An agent is part of the Default network unless you add it to a custom network. An agent can only be
part of one network at a time.
Note: If you assign one or more agents to a network and any of those agents are already assigned to
another custom network, a confirmation message appears indicating that, by adding agents to this
network, they are reassigned from their previous networks.
Note: Tenable recommends moving agents to a new network, rather than an existing network, to
prevent unwanted asset merges. If the network where you move an agent already contains asset
records, and the identifiers for assets from the moved agent match the identifiers already existing in
the network, Tenable Vulnerability Management merges those assets automatically.
l If you want to move an agent from one existing network to another existing network:
l Note the IP addresses of the assets identified by the agent you want to move.
l Use the IP addresses to move the assets from the first network to the second network.
l Add the agent from the first network to the second network.
- 1306 -
To add an agent to a network:
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
l
To add agents from the Linked Agents tab:
a. Click the Nessus Agents tab.
The list of agents appears and Linked Agents is selected in the drop-down box.
l In the agents table, right-click the row for the agent you want to add.
l In the Actions column, click the button in the row for the freeze window
you want to delete.
l In the agents table, select the check box next to each agent you want to add.
l In the table header, select the check box to select the entire page.
- 1307 -
d. In the drop-down list, select the network to which you want to add the agent or
agents.
e. Click Assign.
l
To add agents from the Networks page:
a. Click the Networks tab.
b. In the networks table, click the network you want to add an agent to.
Lists of both Available Agents to Add and Member Agents in Network appear.
d. In the row of the agent to add to the network, click the button.
Tenable Vulnerability Management determines whether there are any agent group
conflicts. Once you manually resolve the conflict, repeat the steps above.
If there are no group conflicts, Tenable Vulnerability Management adds the agent
to the network.
If you moved the agents from a custom network to the Default network, you need to move the
agents' associated assets to the Default network manually. Assets do not revert back to the
Default network automatically. For more information, see Move Assets to a Network via
Settings.
- 1308 -
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
The list of agents appears and Linked Agents is selected in the drop-down box.
5. Filter the agent table to view the agent group you want to add to a network:
a. Click Filters.
d. Click Apply.
6. In the agent table header, select the check box to select the entire page.
8. In the drop-down, select the network to which you want to add the agent or agents.
9. Click Assign.
If you moved the agents from a custom network to the Default network, you need to move the
agents' associated assets to the Default network manually. Assets do not revert back to the
Default network automatically. For more information, see Move Assets to a Network via
Settings.
- 1309 -
l If you want to move an agent from one existing network to another existing network:
l Note the IP addresses of the assets identified by the agent you want to move.
l Use the IP addresses to move the assets from the first network to the second network.
l Add the agent from the first network to the second network.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
l
To remove agents from the Linked Agents tab:
a. Click the Nessus Agents tab.
The list of agents appears and Linked Agents is selected in the drop-down box.
l In the agents table, right-click the row for the agent you want to remove.
l In the agents table, select the check box for the agent you want to remove.
l In the table header, select the check box to select the entire page.
- 1310 -
c. Click Remove from network or Remove selected from network, as applicable.
Tenable Vulnerability Management removes the agents from their networks and
adds them to the Default network.
l
To remove agents from the Networks tab:
a. Click the Networks tab.
b. In the networks table, select the network from which you want to remove an agent
or agents.
Lists of both Available Agents to Add and Member Agents in Network appear.
d. In the row of the agent to remove from the network, click the button.
Tenable Vulnerability Management removes the agent from the network and adds
it to the Default network. <<ASK SME if same as scanner group conflicts -- refer to
that doc if so.>>
When a scanner scans assets, the scanner automatically adds the network to which it belongs to
the scanned assets' identifying details. However, if you want to change the network assets are
assigned to, you can also manually move assets to a network.
Move assets to a new network before you run scans on the new network. If you move assets to a
network where scans have already run, Tenable Vulnerability Management may create duplicate
asset records that count against your license.
Tip: You can also move assets to a network via the Explore > Assets workbench.
- 1311 -
Note: If you moved agents or agent groups from a custom network to the Default network, you need to
move the agents' associated assets to the Default network manually. Assets do not revert back to the
Default network automatically.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
l In the Actions column, click the button in the row for the freeze window you want to
delete.
7. In the Source Network drop-down box, select the network you want to move an asset or
assets to.
- 1312 -
l To search for a single asset, enter an IP address.
l To search for multiple assets, enter a CIDR range or individual IP addresses separated by
commas.
Tenable Vulnerability Management shows the asset or assets that match your search criteria.
l
Move a single asset:
a. In the assets table, do one of the following:
l Right-click the asset you want to move. The action buttons appear in the
row.
l In the Actions column, click the button in the row for the asset you want
to move. The action buttons appear in the row.
l
Move selected assets:
a. For each asset you want to select, roll over the icon.
Tenable Vulnerability Management moves the selected asset or assets from the
source network to the destination network.
l
Move all assets on the current page:
- 1313 -
a. In the assets table header, click the check box.
Tenable Vulnerability Management selects all assets on the current page. The
action bar appears at the bottom of the page.
Tenable Vulnerability Management moves the selected assets from the source
network to the destination network.
l
Move all assets in the source network:
a. Roll over the icon of an asset.
Tenable Vulnerability Management moves all assets from the source network to
the destination network.
3. (Optional) Refine the table data. For more information, see Tenable Vulnerability Management
Tables.
- 1314 -
l
Move a single asset:
a. Roll over the asset you want to move.
d. In the Default drop-down box, select the network you want to move the asset to.
l
To move selected assets:
a. For each asset you want to move, click the check box in the asset row.
c. In the Default drop-down box, select the network you want to move the asset to.
l
To move all assets on the current page:
a. Click the check box in the table header.
c. In the Default drop-down box, select the network you want to move the asset to.
- 1315 -
Tenable Vulnerability Management moves the assets to the selected network.
l
To move all assets:
a. Click the check box in the table header.
Note: If you click Select All Assets, all assets on the current page and any additional
pages are selected.
f. In the Default drop-down box, select the network you want to move the assets to.
Note: Depending on the filter applied and the number of assets selected, it may take some time for
Tenable Vulnerability Management to move all assets to the destination network.
Tip: If you want to remove an asset from a network but not delete the asset, see Move Assets to a Network
via Settings.
If you manually delete an asset, Tenable Vulnerability Management no longer displays the asset in
the default view of the assets table, deletes vulnerability data associated with the asset, and stops
matching scan results to the asset. Manually deleted assets continue to count against your Tenable
Vulnerability Management license until the assets age out after 14 days.
- 1316 -
l Delete an individual asset. For more information, see Delete Assets.
l Delete multiple assets using the Tenable Vulnerability Management API. For more information,
see the Tenable Developer Portal.
To automatically delete assets, enable the Asset Age Out feature when you create or edit the
network.
Export Networks
To export a network:
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
5. (Optional) Refine the table data. For more information, see Tenable Vulnerability Management
Workbench Tables.
- 1317 -
Export
Action
Scope
b. Click Export.
-or-
-or-
Select the check box for the network you want to export.
b. Click Export.
- 1318 -
l A text box to configure the export file name.
l A text box to set the number of days before the export expires.
Format Description
Note: If your .csv export file includes a cell that begins with any of the following
characters (=, +, -, @), Tenable Vulnerability Management automatically inputs a
single quote (') at the beginning of the cell. For more information, see the
related knowledge base article.
9. (Optional) Deselect any fields you do not want to appear in the export file.
10. In the Expiration box, type the number of days before the export file expires.
Note: Tenable Vulnerability Management allows you to set a maximum of 30 calendar days for export
expiration.
- 1319 -
l In the Start Date and Time section, select the date and time on which you want the
export schedule to start.
l In the Time Zone drop-down box, select the time zone to which you want the schedule
to adhere.
l In the Repeat drop-down box, select how often you want the export to repeat.
l In the Repeat Ends drop-down, select the date on which you want the schedule to end.
Note: If you select never, the schedule repeats until you modify or delete the export schedule.
Note: You can enable email notifications with or without scheduling exports.
l In the Add Recipients box, type the email addresses to which you want to send the
export notification.
l (Required) In the Password box, type a password for the export file. You must share this
password with the recipients to allow them to download the file.
Note: Tenable Vulnerability Management sends an email to the recipients and from the link in
the email, the recipients can download the file by providing the correct password.
Tenable Vulnerability Management begins processing the export. Depending on the size of the
exported data, Tenable Vulnerability Management may take several minutes to process the
export.
When processing completes, Tenable Vulnerability Management downloads the export file to
your computer. Depending on your browser settings, your browser may notify you that the
download is complete.
14. Access the export file via your browser's downloads directory. If you close the export plane
before the download finishes, then you can access your export file from the Exports page.
Delete a Network
- 1320 -
Required Tenable Vulnerability Management User Role: Scan Manager or Administrator
l If you delete a network, assets that were in the deleted network still retain the network
attribute.
l Tenable Vulnerability Management retains any asset records for the deleted network until the
assets age out of your licensed assets count. You can still filter for assets that use the
deleted network.
l You cannot create a new network that has the same name as a deleted network.
l Consider moving assets to a different network before you delete the network. To move assets
from a deleted network to another network, you must use the Tenable Vulnerability
Management API.
l Tenable Vulnerability Management re-assigns any scanners or scanner groups in the deleted
network to the default network. If you want to delete the scanners or scanner groups, see
Remove a Sensor from a Scanner Group and Delete a Scanner Group.
To delete a network:
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
- 1321 -
5. Delete selected networks.
-or-
-or-
Select the check box for the network you want to delete.
b. Click Delete.
b. Click Delete.
Linked Scanners
After you install a Tenable Nessus scanner, Tenable Nessus Network Monitor instance, Tenable Web
App Scanning sensor, or Tenable Nessus Agent sensor, you can link it to Tenable Vulnerability
Management.
Before you can use linked scanners in Tenable Vulnerability Management scans, you must:
- 1322 -
1. Install the appropriate Tenable product on the sensor or the host you want to scan.
- 1323 -
1. In the upper-left corner, click the button.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
4. To view a different type of linked scanners, in the top navigation bar, click the type of linked
scanners you want to view.
You can rename your linked scanners from the Sensors menu. This can be helpful for making linked
scanners more recognizable to other users.
Note: You cannot rename a cloud scanner. The cloud scanner names are managed by Tenable.
- 1324 -
3. Click the Sensors tile.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
Tenable Vulnerability Management saves the new scanner name and updates any related
tables with the new name.
In Tenable Vulnerability Management, you can request and download a log file containing logs and
system configuration data from any of your linked scanners. This information can help you
troubleshoot system problems and easily provide data for Tenable Support.
You can store a maximum of five log files from each scanner. Once the limit is reached, you must
remove an old log file to download a new one.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
- 1325 -
4. In the linked scanners table, click the scanner for which you want to download logs.
Note: If you have reached the maximum of five log files, the Request Logs button is disabled.
Remove an existing log before downloading a new one.
The pending log appears as a row in the logs table. Tenable Vulnerability Management
requests the logs from the scanner the next time it checks in, which may take several
minutes.
1. In the row of the log you want to remove, click the button.
Tenable Vulnerability Management deletes the log and removes it from the table.
l In the row of the pending or failed log request that you want to cancel, click the button.
Tenable Vulnerability Management cancels the log request and removes it from the table.
On the Sensors page, you can export one or more linked scanners in CSV or JSON format.
- 1326 -
1. In the upper-left corner, click the button.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
l To export Tenable Nessus linked scanners, in the drop-down box, select the Linked
Scanners tab.
The Linked Scanners page appears, displaying a table with all your Tenable Nessus
linked scanners.
l To export Tenable Nessus Network Monitor linked scanners, click the Nessus Network
Monitors tab.
A table with all your Tenable Nessus Network Monitor linked scanners appears.
l To export Tenable Web App Scanning linked scanners, click the Web App Scanners tab.
A table with your Tenable Web App Scanning linked scanners appears.
5. (Optional) Refine the table data. For more information, see Tenable Vulnerability Management
Workbench Tables.
Export
Action
Scope
A single To export a single linked scanner from the Linked Scanners page:
linked
a. In the linked scanners table, right-click the row for the linked
scanner
scanner you want to export.
- 1327 -
-or-
-or-
Select the check box for the linked scanner you want to export.
b. Click Export.
a. In the linked scanners table, click the row for the linked scanner you
want to export.
- 1328 -
l A table of configuration options for fields to include in the exported file.
l A text box to set the number of days before the export expires.
Format Description
Note: If your .csv export file includes a cell that begins with any of the following
characters (=, +, -, @), Tenable Vulnerability Management automatically inputs a
single quote (') at the beginning of the cell. For more information, see the
related knowledge base article.
9. In the Expiration box, type the number of days before the export file expires.
Note: Tenable Vulnerability Management allows you to set a maximum of 30 calendar days for export
expiration.
l In the Start Date and Time section, select the date and time on which you want the
export schedule to start.
- 1329 -
l In the Time Zone drop-down box, select the time zone to which you want the schedule
to adhere.
l In the Repeat drop-down box, select how often you want the export to repeat.
l In the Repeat Ends drop-down, select the date on which you want the schedule to end.
Note: If you select never, the schedule repeats until you modify or delete the export schedule.
Note: You can enable email notifications with or without scheduling exports.
l In the Add Recipients box, type the email addresses to which you want to send the
export notification.
l (Required) In the Password box, type a password for the export file. You must share this
password with the recipients to allow them to download the file.
Note: Tenable Vulnerability Management sends an email to the recipients and from the link in
the email, the recipients can download the file by providing the correct password.
Tenable Vulnerability Management begins processing the export. Depending on the size of the
exported data, Tenable Vulnerability Management may take several minutes to process the
export.
When processing completes, Tenable Vulnerability Management downloads the export file to
your computer. Depending on your browser settings, your browser may notify you that the
download is complete.
13. Access the export file via your browser's downloads directory. If you close the export plane
before the download finishes, then you can access your export file in the Export Management
View.
- 1330 -
Required Tenable Vulnerability Management User Role: Scan Manager or Administrator
On the Details page for any linked scanner, you can export details about your linked scanner in
CSV or JSON format.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
4. (Optional) Refine the table data. For more information, see Tenable Vulnerability Management
Workbench Tables.
5. In the linked scanners table, click the linked scanner for which you want to export details.
l A text box to set the number of days before the export expires.
- 1331 -
7. In the Name box, type a name for the export file.
Format Description
CSV A CSV text file that contains a list of your linked scanner details, organized
by fields.
Note: If your .csv export file includes a cell that begins with any of the following
characters (=, +, -, @), Tenable Vulnerability Management automatically inputs a
single quote (') at the beginning of the cell. For more information, see the
related knowledge base article.
JSON A JSON file that contains a nested list of your linked scanner details,
organized by fields.
9. (Optional) Deselect any fields you do not want to appear in the export file.
10. In the Expiration box, type the number of days before the export file expires.
Note: Tenable Vulnerability Management allows you to set a maximum of 30 calendar days for export
expiration.
Note: You can enable email notifications with or without scheduling exports.
l In the Add Recipients box, type the email addresses to which you want to send the
export notification.
l (Required) In the Password box, type a password for the export file. You must share this
password with the recipients to allow them to download the file.
- 1332 -
Note: Tenable Vulnerability Management sends an email to the recipients and from the link in
the email, the recipients can download the file by providing the correct password.
Tenable Vulnerability Management begins processing the export. Depending on the size of the
exported data, Tenable Vulnerability Management may take several minutes to process the
export.
When processing completes, Tenable Vulnerability Management downloads the export file to
your computer. Depending on your browser settings, your browser may notify you that the
download is complete.
13. Access the export file via your browser's downloads directory. If you close the export plane
before the download finishes, then you can access your export file in the Export Management
View.
The following table describes the behavior of differential plugin updates for Tenable Nessus
scanners linked to Tenable Vulnerability Management.
Tenable The scanner requests The scanner performs a full plugin update if
Vulnerability differential updates from it does not have plugins (for example,
Management Tenable Vulnerability immediately after you link the scanner to
Management once every 24 Tenable Vulnerability Management).
hours.
Scanner Groups
You can use scanner groups to organize and manage the scanners linked to your Tenable
Vulnerability Management instance. For example, you can add all sensors related to a specific
geographical location to a group, for example, a group named "East Coast Scanners."
- 1333 -
When you create a scan, you can select the scanner group to use to launch the scan. Alternatively,
you can select Auto-Select to enable scan routing for the scan, which assigns scans to scanners
based on the targets configured in scanner groups.
Tenable Vulnerability Management determines which scanner in a scanner group to use based on
the following criteria:
l The scanner is active and has communicated to Tenable Vulnerability Management within the
last 5 minutes.
l The scanner is running the lowest number of active scans and is scanning the lowest number
of hosts.
Note: If your organization uses scan networks, you can only add scanners to scanner groups that belong to
the same network. For more information, see Networks.
Note: If a remote scanner is part of a Scanner Group and is unlinked during its operations, the scan's
operations complete, but Tenable Vulnerability Management does not include the unlinked scanner for
future use.
- 1334 -
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
The list of existing scanner groups you have permission to use or manage appears.
7. (Optional) In the Targets for Scan Routing box, type a comma-separated list of scan routing
targets.
This list specifies the targets that scanners in this scanner group can scan if a scan is
configured to use the Auto-Select scanner. For more information, see Example: Scan
Routing.
Note: You can specify up to 10,000 individual scan routing targets for an individual scanner group.
For example, 192.168.0.1, example.com, *.example.net, 192.168.0.0/24 specifies four
scan routing targets. To condense a scan routing target list, Tenable recommends using wildcard
and range formats, instead of individual IP addresses.
By default, in any new scanner group, Tenable Vulnerability Management assigns the system-
generated All Users group Can Use permissions.
9. Click Save.
If Targets for Scan Routing specifies more than the maximum number of targets, an error
message appears. Condense the scan routing targets by using wildcard and range formats
instead of individual IP addresses, then try again to save the scanner group.
In all other cases, the new group appears in the Scanner Groups list.
- 1335 -
To modify a scanner group:
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
The list of existing scanner groups you have permission to use or manage appears.
5. (Optional) Search the table for the group you want to modify. For more information, see
Tenable Vulnerability Management Tables.
l In the Actions column of the scanner group you want to modify, click the button.
7. Click Edit.
Setting Action
User and Group Permissions Configure user permissions for the scanner group.
- 1336 -
9. (Optional) In the Targets for Scan Routing box, type a comma-separated list of scan routing
targets.
This list specifies the targets that scanners in this scanner group can scan if a scan is
configured to use the Auto-Select scanner. For more information, see Example: Scan
Routing.
Note: You can specify up to 10,000 individual scan routing targets for an individual scanner group.
For example, 192.168.0.1, example.com, *.example.net, 192.168.0.0/24 specifies four
scan routing targets. To condense a scan routing target list, Tenable recommends using wildcard
and range formats, instead of individual IP addresses.
If Targets for Scan Routing specifies more than the maximum number of targets, an error
message appears. Condense the scan routing targets by using wildcard and range formats
instead of individual IP addresses, then try again to save the scanner group.
In all other cases, Tenable Vulnerability Management updates the scanner group with your
changes.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
4. (Optional) For Tenable Web App Scanning, click the Web App Scanners tab.
The Web App Scanners tab appears and Linked Scanners is selected in the drop-down box.
- 1337 -
The list of existing scanner groups you have permission to use or manage appears.
6. In the scanner groups table, click the row of the scanner group where you want to add
scanners.
8. (Optional) Search the table for the scanner you want to assign. For more information, see
Tenable Vulnerability Management Tables.
9. In the scanners table, select the check boxes next to the scanner or scanners you want to add
to the scanner group.
If the assignment is successful, Tenable Vulnerability Management adds the scanner to the
scanner group, and the Group Details page appears.
If Tenable Vulnerability Management encounters any problems during processing, the Assign
Scanners page remains active, and one of the following messages appears in the Assignment
column of the affected scanner:
This sensor already exists in the scanner Click Cancel to close the page.
group.
An error occurred adding this sensor to Click Assign again. If the processing still
the scanner group. fails, contact Tenable Support.
You can configure scanner group permissions for individual users or a user group. If you configure
scanner group permissions for a user group, you assign all users in that group the same
permissions. For more information, see User Groups.
You can assign the following scanner group permissions to a user or user group:
- 1338 -
l No Access — (All Users user group only) No users (except for users or groups you specifically
assign permissions) can use the scanner group in scan configurations.
l Can Use — The user or user group can use the scanner group in scan configurations. The user
or user group can view but not edit the scanner group configuration.
l Can Manage — The user or user group can use the scanner group in scan configurations. The
user or user group can view and edit the scanner group configuration.
2. During scanner group configuration, in the Users & Groups section, do any of the following:
l
Edit permissions for the All Users user group.
a. Next to the permission drop-down for the All Users group, click the button.
l
Add a user or user group to the scanner group.
a. In the User & Groups heading, click the button.
b. In the Search field, type or click the drop-down to find and add a user or group.
Tip: Tenable recommends assigning permissions to user groups, rather than individual
users, to minimize maintenance as individual users leave or join your organization.
l
Edit permissions for an existing user or user group.
- 1339 -
a. Next to the permissions drop-down for the user or user group you want to edit,
click the button.
l
Remove a user or user group from the scanner group.
a. Roll over the user or group you want to remove.
The user or group disappears from the Users & Groups list.
3. Click Save.
What to do next:
l Use the scanner group in a scan configuration.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
The list of existing scanner groups you have permission to use or manage appears.
5. In the scanner groups table, select one or more scanner groups to delete:
- 1340 -
Scope Action
b. Click Delete.
To delete multiple a. In the scanner groups table, select the check boxes next to
scanner groups the scanner groups you want to delete.
- 1341 -
On-premises Tenable Web App Scanning yes
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
4. (Optional) Search for the scanner you want to add to a scanner group.
5. Select the scanners you want to add and the groups you want to add the scanners to:
Scope Action
Add a single scanner to a a. In the scanner group table, do one of the following:
group or groups l Right-click the sensor you want to add to a
scanner group.
- 1342 -
add to a scanner group.
Add multiple scanners to a. In the scanner table, select the check boxes next to the
a group or groups scanners you want to add to scanner groups.
Tenable Vulnerability Management adds the scanner or scanners to the selected group or
groups and closes the Add to Groups plane.
- 1343 -
Required Tenable Web App Scanning User Role: Scan Manager or Administrator
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
The list of existing scanner groups you have permission to use or manage appears.
5. (Optional) Search the table for the group you want to modify. For more information, see
Tenable Vulnerability Management Tables.
6. In the scanner group table, click the scanner group you want to modify.
The Group Details page appears. This page contains a table listing sensors assigned to this
group.
7. (Optional) Search for the sensor you want to remove. For more information, see Tenable
Vulnerability Management Tables.
Scope Action
- 1344 -
l In the Actions column, click the button for the sensor
you want to remove.
l Select the check box for the sensor you want to remove.
Remove multiple a. In the sensors table, select the check box for each sensor you
sensors want to remove from the group.
Tenable Vulnerability Management removes the sensor or sensors from the scanner group.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
- 1345 -
4. In the drop-down box, select Scanner Groups.
The list of existing scanner groups you have permission to use or manage appears.
5. (Optional) Search the table for the group you want to view. For more information, see Tenable
Vulnerability Management Tables.
6. In the scanner group table, click the scanner group you want to view.
The Group Details page appears. This page contains a table listing sensors assigned to this
group.
Note: You can only view all scans for sensors in Tenable Nessus scanner groups.
2. In the sensors table, click the sensor for which you want to view all scans.
Tenable Vulnerability Management shows a list of all scans the sensor is currently running.
OT Connectors
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
If your organization has OT Security and Tenable Vulnerability Management, you can allow
OT Security to transmit assets and findings data to Tenable Vulnerability Management by setting up
OT connectors. You can manage OT connectors from the Tenable Vulnerability Management
Sensors page.
- 1346 -
1. In the upper-left corner, click the button.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
Add an OT connector:
To add an OT connector:
2. Click Generate.
Tenable Vulnerability Management shows the appropriate cloud site to link the OT connector
to and generates an OT linking key.
Note: You can use the linking key to link one OT connector, and you must use the linking key within
two hours of generation. To link additional OT connectors, generate and use a new linking key for
each connector.
3. Use the cloud site and linking key to link the connector to Tenable Vulnerability Management
from the OT Security user interface. For more information, see the OT Security User Guide.
- 1347 -
Required Tenable Vulnerability Management User Role: Scan Manager or Administrator
To ensure that your OT connectors are recognizable and represent the correct types, you may need
to modify the OT connector names and types in Tenable Vulnerability Management. You can choose
from two types: ICP and EM (Enterprise Manager). For more information about the types, see the
OT Security User Guide.
Note: Updating an OT connector name or type in Tenable Vulnerability Management does not cause any
changes in OT Security.
1. In the OT Connectors table, double-click the Name or Type cell to edit it.
2. Enter the new name or select the new type (ICP or EM).
There may be some cases where you want to disable an OT connector temporarily and enable it at a
later time. For example, you may want to disable an OT connector if OT Security begins sending
data from an unwanted network to Tenable Vulnerability Management. Once the issue is resolved,
you can re-enable the connector.
1. In the OT Connectors table, click in the row of the connector that you want to enable or
disable.
2. If the connector is currently enabled, click Disable. If the connector is currently disabled,
click Enable.
- 1348 -
If you enabled the connector, Tenable Vulnerability Management bolds the connector row text
and updates the Enabled column to Yes. If you disabled the connector, Tenable Vulnerability
Management grays the connector row text and updates the Enabled column to No.
Delete an OT connector:
Delete an OT connector from Tenable Vulnerability Management if you no longer want the OT
connector to send data to Tenable Vulnerability Management. For example, if you need to redeploy
OT Security, you would need to delete any connector associated with the old deployment.
Tenable recommends that whenever you delete an OT connector from Tenable Vulnerability
Management, you also delete the related connector in OT Security to ensure that Tenable
Vulnerability Management and OT Security stay aligned.
Note: You cannot undo an OT connector deletion; if you want to relink the OT connector, you have to
repeat the Add an OT connector process.
1. In the OT Connectors table, click in the row of the connector that you want to delete.
2. Click Delete.
3. Click Delete.
Cloud Sensors
By default, Tenable provides regional cloud sensors for use in Tenable Vulnerability Management.
You can select these sensors when you create and launch scans.
The following table identifies each regional cloud sensor and, for allow list purposes, its IP address
ranges. These IP address ranges are exclusive to Tenable.
- 1349 -
Note: If you use cloud connectors, Tenable recommends allowlisting the IP addresses for the region in which
the site resides.
Note: While these IP addresses are for outbound requests, they are also used for inbound
cloud.tenable.com requests.
Tip: The cloud sensor and IP address information contained in the table below is also provided in JSON
format for users that want to parse the data programmatically.
For Cloud IPs associated with Tenable Attack Surface Management, see Cloud Sensors in the
Tenable Attack Surface Management User Guide.
- 1350 -
Sensor Region IPv4 Range IPv6 Range
35.93.174.0/24
- 1351 -
Sensor Region IPv4 Range IPv6 Range
162.159.130.83/32 2606:4700:7::a29f:8253
Note: For troubleshooting Tenable Web App Scanning issues with Tenable Support, you may be asked to
add the following IP range to your allow list:
l 13.59.250.76/32
l US East Cloud Scanners: A group of scanners from the us-east-1 (Virginia) or the us-east-2
(Ohio) ranges.
l US West Cloud Scanners: A group of scanners from the us-west-1 (California) or the us-west-
2 (Oregon) ranges.
l AP Sydney Cloud Scanners: A group of scanners from the ap-southeast-2 (Sydney) range.
l AP Tokyo Cloud Scanners: A group of scanners from the ap-northeast-1 (Tokyo) range.
l CA Central Cloud Scanners: A group of scanners from the ca-central-1 (Canada) range.
l EU Frankfurt Cloud Scanners: A group of scanners from the eu-central-1 (Frankfurt) range.
l Brazil Cloud Scanners: A group of scanners from the sa-east-1 (São Paulo) range.
l India Cloud Scanners: A group of scanners from the ap-south-1 (Mumbai) range.
l Amazon GOV-CLOUD: A group of scanners available for Federal Risk and Authorization
Management Program (FedRAMP) environments.
l us-east-1 (Virginia)
l us-east-2 (Ohio)
- 1352 -
l us-west-1 (California)
l us-west-2 (Oregon)
l APAC Cloud Scanners: A group of scanners from the following AWS ranges:
o ap-northeast-1 (Tokyo)
o ap-southeast-1 (Singapore)
o ap-southeast-2 (Sydney)
o ap-south-1 (Mumbai)
l EMEA Cloud Scanners: A group of scanners from the following AWS ranges:
o eu-west-1 (Ireland)
o eu-west-2 (London)
o eu-central-1 (Frankfurt)
Note: If you are connecting to Tenable Vulnerability Management through Tenable Nessus scanners,
Tenable Nessus Agents, Tenable Web App Scanning scanners, or Tenable Nessus Network Monitors (NNM)
located in mainland China, you must connect through sensor.cloud.tenablecloud.cn instead of
sensor.cloud.tenable.com.
l For internal scanner or agent communications, add the following IP ranges to your allow list:
o 52.61.37.84
o 15.200.117.191
o 162.159.140.154
o 172.66.0.152
- 1353 -
o 2606:4700:7::98
o 2a06:98c1:58::98
o 162.159.140.155
o 172.66.0.153
o 2606:4700:7::99
o 2a06:98c1:58::99
Sensor Security
See the following sections to learn more about sensor security and encryption when using the
Tenable Vulnerability Management platform:
l Sensor Overview
l Linking Keys
l Data Encryption
Sensor Overview
Sensors access Tenable Vulnerability Management through the following site: <port> -
sensor.cloud.tenable.com:443. All sensors (Tenable Nessus scanners, Tenable Nessus Agents,
Tenable Nessus Network Monitor) need access to cloud.tenable.com:443.
Note: If you are connecting to Tenable Vulnerability Management through Tenable Nessus scanners,
Tenable Nessus Agents, Tenable Web App Scanning scanners, or Tenable Nessus Network Monitors (NNM)
located in mainland China, you must connect through sensor.cloud.tenablecloud.cn instead of
sensor.cloud.tenable.com.
Depending on how you deploy and set up Tenable Nessus scanners and Tenable Nessus Network
Monitor - you need to access their respective user interfaces for initial setup:
Note: If you are deploying Tenable Nessus or Tenable Nessus Network Monitor with Tenable Core,
you also need access to the underlying virtual appliance interface: <IP>:8000.
- 1354 -
Tenable Vulnerability Management uses a user interface, driven by Tenable's customer-facing APIs,
for all operations. The sensors that connect to Tenable Vulnerability Management play a major role
in your security, collecting vulnerability and asset information. Protecting this data and ensuring the
communication paths are secure is a core function of Tenable Vulnerability Management.
Nessus sensors connect to the Tenable Vulnerability Management platform after securely
authenticating and linking to Tenable Vulnerability Management (see Linking Keys in the following
section to learn more). Once linked, Tenable Vulnerability Management manages all updates to
ensure the sensors are always up to date.
Sensors always initial the traffic between sensors and Tenable Vulnerability Management, and the
traffic is outbound-only over port 443. Traffic is encrypted via SSL communication using TLS 1.2+
(or version 1.2 when in NIAP mode) with a 4096-bit key. This removes the need for firewall changes
and allows you to control the connections via firewall rules.
Note: To learn more about NIAP mode, see the following topics in their respective product user
guides:
l Configure Tenable Nessus for NIAP Compliance
l Configure Tenable Nessus Agent for NIAP Compliance
l Configure Tenable Nessus Network Monitor for NIAP Compliance
Linking Keys
Tenable Vulnerability Management uses a linking key as an initial authentication token for sensors.
The linking key allows you to create the initial link between your sensor (a Nessus scanner, Nessus
Agent, or Tenable Nessus Network Monitor) and Tenable Vulnerability Management.
When the Tenable Vulnerability Management platform receives a link request from a sensor, it
validates the presented linking key with valid linking keys. If it finds that it matches a valid linking
key, Tenable Vulnerability Management allows the sensor to link.
Upon linking, Tenable Vulnerability Management randomly generates, saves, and sends a 256-bit
length key to the sensor. This key is unique to the sensor.
Once the link process is complete, the sensor no longer needs or uses the linking key. Any future
authentication is performed in the following ways:
- 1355 -
l Sensor-to-platform authentication
After the initial linking process, the sensor provides the 256-bit key to identify and
authenticate its requests. These requests include, but are not limited to, requesting jobs,
scan policies, plugin updates, scanner binary updates, and providing information back to
Tenable Vulnerability Management, such as scan results or sensor health data.
Sensors check in to Tenable Vulnerability Management every so often (different sensor types
have different check-in frequencies). When a scan job is launched, Tenable Vulnerability
Management generates a policy and encrypts it with a randomly generated 128-bit key. The
sensor requests the policy from the platform. The policy is stored on disk, but the key resides
only in memory. The controller uses the key to encrypt the policy, which includes the scan
credentials.
Data Encryption
Tenable Vulnerability Management encrypts all data in all states with at least one level, using no less
than AES-256:
l Data at rest — Tenable Vulnerability Management stores data on encrypted media using at
least one level of AES-256 encryption. Some data classes include a second level of per-file
encryption.
l Data in transport — Tenable Vulnerability Management uses TLS version 1.2+ with a 4096-bit
key to encrypt data during transportation (including internal transports).
l Index data — Tenable Vulnerability Management stores index data on encrypted media using at
least one level of AES-256 encryption.
Tenable can rotate all the stored, encrypted data to a new key. Alternatively, you can switch to a
new site to use a new key (in other words, Tenable does not reuse keys when provisioning a new
site). Tenable manages the keys with AWS Key Management.
Link a Sensor
- 1356 -
Required Tenable Vulnerability Management User Role: Scan Manager or Administrator
Required Tenable Web App Scanning User Role: Scan Manager or Administrator
Once you copy the linking key in Tenable Vulnerability Management, you must paste the linking key
in the appropriate location of the sensor user interface (for example, the Tenable Nessus Agent CLI
or the Tenable Nessus Network Monitor Cloud Settings section). Expand the following sections for
specific details.
Note: If you use domain allowlists for firewalls, Tenable recommends adding:
l * cloud.tenable.com (Commercial)
l *.fedcloud.tenable.com (FedRAMP)
(with the wildcard character) to the allowlist. This ensures communication with
sensor.fed/cloud.tenable.com, which the scanner uses to communicate with Tenable Vulnerability
Management. If you are connecting to Tenable Vulnerability Management through Tenable Nessus
scanners, Tenable Nessus Agents, Tenable Web App Scanning scanners, or Tenable Nessus Network
Monitors (NNM) located in mainland China, you must connect through sensor.cloud.tenablecloud.cn instead of
sensor.cloud.tenable.com.
Note: Under certain circumstances, you may need to regenerate the linking key. See Regenerate a Linking
Key for more information. To learn more about the sensor security and linking keys, see Sensor Security.
To link a sensor:
- 1357 -
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
4. Then:
To link a Tenable Nessus Agent sensor, click the Nessus Agents tab.
a. Click Add Agent.
b. Access the Tenable Nessus Agent instance that you want to link to Tenable
Vulnerability Management.
c. Use the copied linking key in the Tenable Nessus Agent CLI to link the
sensor. For more information, see Install Tenable Nessus Agent in the
Tenable Nessus Agent Deployment and User Guide.
l (Windows only) To use a single command to install and link Tenable Nessus Agent:
The command contains the linking key and syntax required to install the
agent, link the agent to Tenable Vulnerability Management, change the agent
name, and add the agent to an agent group. For example:
- 1358 -
Tip: For Tenable FedRAMP Moderate environments, use "fedcloud.tenable.com".
Tip: If you do not want to set a custom agent name, remove -name
"<agent name>". If you do not set a custom name, Tenable names the
agent using the hostname of the machine on which you installed the
agent.
c. In the command, replace <list of groups> with the agent group name or
names.
Note: The agent group name is case-sensitive and must match exactly. You must
encase the agent group name in quotation marks (for example, --groups="My
Group").
Tip: If you do not want to add the agent to an agent group, remove -
groups "<list of groups>".
l (Linux only) To use a single command to install and link Tenable Nessus Agent:
a. Under the Installing Agent on Linux platforms header, copy the command.
The command contains the linking key and syntax required to install the
agent, link the agent to Tenable Vulnerability Management, change the agent
name, and add the agent to an agent group. For example:
- 1359 -
curl -H 'X-Key:
abcd1234efgh5678ijkl9012mnop3456qrst7890uvwx1234yz5678abcd1234ef'
'https://cloud.tenable.com/install/agent?name=agent-
name&groups=agent-group' | bash
Note: The agent group name is case-sensitive and must match exactly. You must
encase the agent group name in quotation marks (for example, --groups="My
Group").
Tip: If you do not want to add the agent to an agent group, remove
groups=agent-group.
d. As a user with administrative privileges, access the CLI of the Linux machine
on which you want to install the agent.
Tenable Nessus Agent installs on your Linux machine, links to your instance
of Tenable Vulnerability Management, and updates the agent name and agent
group if necessary.
- 1360 -
b. In the Linking Key section, click Copy.
c. Access the Tenable Nessus Network Monitor instance that you want to link to Tenable
Vulnerability Management.
d. Use the copied linking key in the Tenable Nessus Network Monitor user interface to link
the sensor. For more information, see the NNM User Guide.
b. Access the Tenable Nessus instance that you want to link to Tenable
Vulnerability Management.
c. Use the copied linking key in the Tenable Nessus user interface to link the
sensor. For more information, see the Link to Tenable Vulnerability
Management in the Tenable Nessus User Guide.
l (Windows only) To use a single command to install and link a Tenable Nessus
scanner:
The command contains the linking key and syntax required to install the
scanner, link the scanner to Tenable Vulnerability Management, change the
scanner name, and add the scanner to a scanner group. For example:
- 1361 -
Invoke-WebRequest -Uri
"https://cloud.tenable.com/install/scanner/installer/ms-install-
script.ps1" -OutFile "./ms-install-script.ps1"; & "./ms-install-
script.ps1" -key
"51cc161bfa7c62dd7fc90a63561a256306cda982e3edba9d7ebadc05f6a2118c"
-type "scanner" -name "<scanner name>" -groups "<list of groups>";
Remove-Item -Path "./ms-install-script.ps1"
Tip: If you do not want to set a custom scanner name, remove -name
"<scanner-name>". If you do not set a custom name, Tenable names
the scanner using the hostname of the machine on which you installed
the scanner.
c. In the command, replace <list of groups> with the scanner group name.
Note: The scanner group name is case-sensitive and must match exactly.
Tip: If you do not want to add the scanner to a scanner group, remove -
groups "<list of groups>".
l (Linux only) To use a single command to install and link a Tenable Nessus scanner:
- 1362 -
a. Under the One-Line Installation instructions, copy the command.
The command contains the linking key and syntax required to install the
scanner, link the scanner to Tenable Vulnerability Management, change the
scanner name, and add the scanner to a scanner group. For example:
curl -H 'X-Key:
abcd1234efgh5678ijkl9012mnop3456qrst7890uvwx1234yz5678abcd1234ef'
'https://cloud.tenable.com/install/scanner?name=scanner-
name&groups=scanner-group'| bash
Note: The scanner group name is case-sensitive and must match exactly.
Tip: If you do not want to add the scanner to a scanner group, remove
groups=scanner-group.
d. As a user with administrative privileges, access the CLI of the Linux machine
on which you want to install the scanner.
To link a Tenable Core + Tenable Web App Scanning instance, in the left
navigation menu, click Web App Scanners.
- 1363 -
a. Click Add Web Application Scanner.
c. Access the Tenable Core + Tenable Web App Scanning instance that you want to link to
Tenable Vulnerability Management.
d. Use the copied linking key in the Tenable Core + Tenable Web App Scanning user
interface to link the sensor. For more information, see the Tenable Core+Tenable Web
App Scanning User Guide.
What to do next:
l Manage the sensor in Tenable Vulnerability Management (including disabling or re-enabling the
sensor link).
Under certain circumstances, you may need to regenerate the linking key for your Tenable
Vulnerability Management instance. For example, you may regenerate the key for security reasons if
an employee with knowledge of the linking key leaves your organization.
Regenerating a linking key does not affect sensors that are currently linked to Tenable Vulnerability
Management, because the linking key is only used to establish the initial link. After you link a sensor,
the sensor connects to Tenable Vulnerability Management using unique credentials.
If your organization has hard-coded a linking key into implementation scripts, keep in mind the
following:
l Be sure to replace the original key with the regenerated key to prevent script failure.
l Each Tenable Vulnerability Management instance uses a single linking key for all sensor types.
If you regenerate the linking key while working with one type of sensor (for example, Tenable
Nessus scanners), you also regenerate the linking key for the other sensor types. If you
- 1364 -
regenerate the linking key, be sure to update the implementation for scripts involving all types
of sensors.
Note: To learn more about Tenable Vulnerability Management linking keys, see Sensor Security.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
5. Click the Add [Sensor Type] button (for example, Add NNM).
The Regenerated Linking Key message appears, and the new linking key replaces the original
linking key in the Add [Sensor Type] plane.
What to do next:
l Link a sensor.
- 1365 -
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
On the Sensors page, you can view your linked sensors: Tenable Vulnerability Management cloud
sensors, your Tenable Nessus Scanners, Tenable Nessus Agents, Tenable Nessus Network Monitors,
and Tenable Web App Scanning Scanners. You can also view your scanner groups and agent groups.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
l Web Application Scanners — Linked Tenable Web App Scanning Scanners, Tenable Web
App Scanning Scanner Groups
Each sensor page shows a list of your linked sensors or groups, along the basic information
listed in the following table. Depending on what sensor you are viewing, you may not see all
the columns described.
Column Description
- 1366 -
Name The name of the sensor.
Linked On The date on which the sensor was linked to Tenable Vulnerability
Management.
Scan Count The number of scans that the sensor or sensor group is currently
running.
Updated The date on which the sensor group was last updated.
Actions The actions that you can perform for each sensor.
You can view details for both cloud sensors and linked sensors.
- 1367 -
1. In the upper-left corner, click the button.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
l In the drop-down box, select the Cloud Scanners tab to view cloud scanners connected
to Tenable Vulnerability Management. For more information, see Cloud Sensors.
l In the drop-down box, click the Linked Scanners tab to view on-premises scanners
linked to Tenable Vulnerability Management. For more information, see Linked Scanners.
6. In the sensors table, click the sensor where you want to view details.
Depending on the sensor type, you can do the following in the Details page:
You can edit certain settings for the following types of linked sensors:
- 1368 -
1. In the upper-left corner, click the button.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
l In the drop-down box, select the Cloud Scanners tab to view cloud scanners connected
to Tenable Vulnerability Management. For more information, see Cloud Sensors.
l In the drop-down box, select the Linked Scanners tab to view scanners linked to
Tenable Vulnerability Management. For more information, see Linked Scanners
6. In the table of linked sensors, click the sensor for which you want to edit settings.
Software Update NNM (5.6.1 and later Specifies which components, if any, you
Type only) want Tenable Nessus Network Monitor to
- 1369 -
automatically update.
You can set the following Tenable Vulnerability Management user permissions levels in your sensor
configuration:
l No Access — The user or group cannot use the scanner in scan configurations or edit the
scanner configuration.
l Can Use — The user or group can use the scanner in scan configurations, but cannot edit the
scanner configuration.
l Can Manage — The user or group can use the scanner in scan configurations and edit the
scanner configuration.
Note: Cloud scanners always have the Can Use permission regardless of how you configure them.
- 1370 -
3. Click the Sensors tile.
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
5. If the sensor is a Nessus Scanner, click the Linked Scanners tab to view on-premises
scanners linked to Tenable Vulnerability Management. For more information, see Linked
Scanners.
6. In the table of linked sensors, click the sensor for which you want to set permissions.
The Details page appears. For all sensors except agents, the Overview tab is active by
default.
Note: By default, any user in your Tenable Vulnerability Management instance can use the scanner.
l To select a permissions level from the drop-down box for the Default user.
l
To specify permissions for an individual user or user group:
a. In the Add users or user groups text box, type the name of a user or user group.
c. In the permissions drop-down, select a permissions level for the user or user
group you added.
- 1371 -
To enable or disable a sensor:
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
5. (Optional) If the sensor is a Nessus Scanner, select Linked Scanners in the drop-down box to
view on-premises scanners linked to Tenable Vulnerability Management. For more
information, see Linked Scanners.
l In the Actions column, click the button you want to enable or disable.
Remove a Sensor
- 1372 -
To remove a sensor:
The Sensors page appears. By default, the Nessus Scanners tab is active and Linked
Scanners is selected in the drop-down box.
5. For Nessus Scanners, select Linked Scanners in the drop-down box to view on-premises
scanners linked to Tenable Vulnerability Management. For more information, see Linked
Scanners.
6. In the table of linked sensors, do one of the following roll over the sensor you want to remove.
Scope Action
l In the Actions column, click the button for the sensor you
want to remove.
l Select the check box next to the sensor you want to remove.
b. Click Delete.
- 1373 -
A confirmation window appears.
Remove a. In the sensors table, select the check box for the sensors you want
multiple to remove. The action bar appears at the top of the table.
sensors
b. Click Delete.
Credentials
Note: This section describes creating and maintaining managed credentials. For more information about
scan-specific or policy-specific credentials, see Credentials in Tenable Vulnerability Management Scans or
Credentials in Tenable Web App Scanning Scans.
Managed credentials allow you to store credential settings centrally in a credential manager. You
can then add those credential settings to multiple scan configurations instead of configuring
credential settings for each individual scan.
You and users to whom you grant permissions can use managed credentials in scans. Credential
user permissions control which users can use and edit managed credentials.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
- 1374 -
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
This topic describes creating a managed credential in the Tenable Vulnerability Management
credential manager.
You can also create a managed credential during scan configuration, as well as convert a scan-
specific credential to a managed credential. For more information, see Add a Credential to a Scan
or Configure Credentials Settings in Tenable Web App Scanning.
The Credentials page appears. The credentials table lists the managed credentials you have
permission to view.
4. In the upper-right corner of the page, click the Create Credential button.
- 1375 -
5. Do one of the following:
- 1376 -
7. (Optional) In the Description box, type a description for the credential.
For more information about credential settings, see Credentials (Tenable Vulnerability
Management) or Credentials (Tenable Web App Scanning).
Tenable Vulnerability Management adds the credential to the credentials table in the
Credentials page.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
This topic describes editing a credential in the Tenable Vulnerability Management credential
manager.
You can also edit managed credentials during scan configuration. For more information, see Add a
Credential to a Scan for Tenable Vulnerability Management or Configure Credentials Settings in a
Tenable Web App Scanning Scan for Tenable Web App Scanning.
You can edit any credentials where you have Can Edit permission.
- 1377 -
The Credentials page appears. The credentials table lists the managed credentials you have
permission to view.
4. Filter or search the credentials table for the credential you want to edit. For more information,
see Tenable Vulnerability Management Tables.
5. In the credentials table, click the name of the credential you want to edit.
l
Edit the credential name or description.
a. Roll over the name or description box.
d. Click the button at the lower right corner of the box to save your changes.
l Edit the settings for the credential type. For more information about these settings, see
Credentials (Tenable Vulnerability Management) or Credentials (Tenable Web App
Scanning).
7. Click Save.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
You configure user permissions for a managed credential separately from the permissions you
configure for the scans where you use the credential.
You can configure credential permissions for individual users or a user group. If you configure
credential permissions for a group, you assign all users in that group the same permissions. You
- 1378 -
may want to create the equivalent of a credential manager role by creating a group for the users
you want to manage credentials. For more information, see User Groups.
If you create a managed credential, Tenable Vulnerability Management automatically assigns you
Can Edit permissions.
Location Action
l
Add permissions for a user or user group.
a. In the credential settings plane, click the button next to the User Permissions
title.
d. Click the button next to the permission drop-down for the user or group.
l Can Use — The user can view the credential in the managed credentials table
and use the credential in scans.
l Can Edit — The user can view and edit credential settings, delete the
credential, and use the credential in scans.
f. Click Add.
g. Click Save.
- 1379 -
l
Edit permissions for a user or user group.
a. In the User Permissions section of the credential settings plane, click the
button next to the permission drop-down for the user or group.
l Can Use — The user can view the credential in the managed credentials table
and use the credential in scans.
l Can Edit — The user can view and edit credential settings, delete the
credential, and use the credential in scans.
c. Click Save.
l
Delete permissions for a user or user group.
a. In the User Permissions section of the credential settings plane, roll over the user
or group you want to delete.
c. Click Save.
Export Credentials
On the Credentials page, you can export the data for one or more managed credentials.
Note: When you export credential data, authentication details such as usernames, passwords, or keys are
not included in the export.
- 1380 -
The Settings page appears.
The Credentials page appears. The credentials table lists the managed credentials you have
permission to view.
4. (Optional) Refine the table data. For more information, see Tenable Vulnerability Management
Workbench Tables.
-or-
b. Click Export.
- 1381 -
The Export plane appears. This plane contains:
l A text box to set the number of days before the export expires.
Format Description
Note: If your .csv export file includes a cell that begins with any of the following
characters (=, +, -, @), Tenable Vulnerability Management automatically inputs a
single quote (') at the beginning of the cell. For more information, see the
related knowledge base article.
8. (Optional) Deselect any fields you do not want to appear in the export file.
9. In the Expiration box, type the number of days before the export file expires.
Note: Tenable Vulnerability Management allows you to set a maximum of 30 calendar days for export
expiration.
- 1382 -
l Click the Schedule toggle.
l In the Start Date and Time section, select the date and time on which you want the
export schedule to start.
l In the Time Zone drop-down box, select the time zone to which you want the schedule
to adhere.
l In the Repeat drop-down box, select how often you want the export to repeat.
l In the Repeat Ends drop-down, select the date on which you want the schedule to end.
Note: If you select never, the schedule repeats until you modify or delete the export schedule.
Note: You can enable email notifications with or without scheduling exports.
l In the Add Recipients box, type the email addresses to which you want to send the
export notification.
l (Required) In the Password box, type a password for the export file. You must share this
password with the recipients to allow them to download the file.
Note: Tenable Vulnerability Management sends an email to the recipients and from the link in
the email, the recipients can download the file by providing the correct password.
Tenable Vulnerability Management begins processing the export. Depending on the size of the
exported data, Tenable Vulnerability Management may take several minutes to process the
export.
- 1383 -
When processing completes, Tenable Vulnerability Management downloads the export file to
your computer. Depending on your browser settings, your browser may notify you that the
download is complete.
13. Access the export file via your browser's downloads directory. If you close the export plane
before the download finishes, then you can access your export file from the Exports page.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
You can delete any credentials where you have Can Edit permission.
The Credentials page appears. The credentials table lists the managed credentials you have
permission to view.
4. Filter or search the credentials table for the credential you want to delete. For more
information, see Tenable Vulnerability Management Tables.
- 1384 -
l If no scans use the credential, click Delete.
l
If any scans use the credential:
a. Click View Scans.
Exclusions
You can use exclusions to restrict the scanning of specific hosts based on a selected schedule.
Create an Exclusion
To create an exclusion:
- 1385 -
4. In the upper-right corner of the page, click the Create Exclusion button.
6. Click Save.
Tenable Vulnerability Management saves the exclusion and applies the exclusion to the
selected scan targets.
Edit an Exclusion
To edit an exclusion:
- 1386 -
The Update an Exclusion page appears.
6. Click Save.
Tenable Vulnerability Management saves the exclusion, and the Exclusions page appears.
Import an Exclusion
Note: When you import an exclusion, Tenable Vulnerability Management automatically assigns it to the
default network. After import, you can move the exclusion to a custom network.
To import an exclusion:
Tenable Vulnerability Management imports the file and adds the exclusions to the exclusions
table.
- 1387 -
You can import one or more exclusions as a .csv file.
Note:Tenable does not recommend opening the .csv file in Microsoft Excel, as Excel can add additional
characters to the file that Tenable Vulnerability Management cannot recognize.
This file is composed of a header and at least one line of data. Each line in the file must be
separated by a new line break.
Header (Optional)
A header line in the file is optional. If included, the header must be the first line in the file and be
formatted as follows:
id,name,description,members,creation_date,last_modification_date
Data (Required)
Each data line in the file represents one exclusion configuration. Data lines must be separated from
each other by a new line break. The file must include at least one data line.
Each data line is a comma-separated string of fields described in the table below.
Note: Optional fields can be blank, but the associated comma separator must be present in the data line.
name The name of the exclusion. You can use any combination Yes
of alpha-numeric characters or symbols.
members The target or targets where you want the scan exclusion Yes
to apply.
- 1388 -
l A hostname (example.com)
l An IP address (192.0.2.57)
l An IP range (192.0.2.57-192.0.2.67)
Example
id,name,description,members,creation_date,last_modification_date
1,Exclusion Rule 1,routers,"192.0.2.57,192.0.21.177,192.0.28",1561643735,1561643785,Exclusion Rule
2,workstations,192.0.257-192.0.267,,
Export an Exclusion
On the Exclusions page, you can export one or more scanning exclusions.
To export an exclusion:
- 1389 -
The Exclusions page appears. This page displays a list of exclusions configured on your
Tenable Vulnerability Management account.
4. (Optional) Refine the table data. For more information, see Tenable Vulnerability Management
Workbench Tables.
-or-
b. Click Export.
- 1390 -
l A text box to configure the export file name.
l A text box to set the number of days before the export expires.
Format Description
Note: If your .csv export file includes a cell that begins with any of the following
characters (=, +, -, @), Tenable Vulnerability Management automatically inputs a
single quote (') at the beginning of the cell. For more information, see the
related knowledge base article.
8. (Optional) Deselect any fields you do not want to appear in the export file.
9. In the Expiration box, type the number of days before the export file expires.
Note: Tenable Vulnerability Management allows you to set a maximum of 30 calendar days for export
expiration.
- 1391 -
l In the Start Date and Time section, select the date and time on which you want the
export schedule to start.
l In the Time Zone drop-down box, select the time zone to which you want the schedule
to adhere.
l In the Repeat drop-down box, select how often you want the export to repeat.
l In the Repeat Ends drop-down, select the date on which you want the schedule to end.
Note: If you select never, the schedule repeats until you modify or delete the export schedule.
Note: You can enable email notifications with or without scheduling exports.
l In the Add Recipients box, type the email addresses to which you want to send the
export notification.
l (Required) In the Password box, type a password for the export file. You must share this
password with the recipients to allow them to download the file.
Note: Tenable Vulnerability Management sends an email to the recipients and from the link in
the email, the recipients can download the file by providing the correct password.
Tenable Vulnerability Management begins processing the export. Depending on the size of the
exported data, Tenable Vulnerability Management may take several minutes to process the
export.
When processing completes, Tenable Vulnerability Management downloads the export file to
your computer. Depending on your browser settings, your browser may notify you that the
download is complete.
13. Access the export file via your browser's downloads directory. If you close the export plane
before the download finishes, then you can access your export file from the Exports page.
Delete an Exclusion
- 1392 -
Required Tenable Vulnerability Management User Role: Scan Manager or Administrator
To delete an exclusion:
l
Select a single exclusion.
a. In the exclusions table, roll over the exclusion you want to delete.
l
Select multiple exclusions.
a. In the exclusions table, select the check box for each exclusion you want to delete.
Exclusion Settings
- 1393 -
Setting Description
Settings
Targets Specifies targets that you want excluded from scans. Add targets as host
names or IP ranges, separated by commas.
You cannot use the Targets setting if you already specified targets with the
Upload Targets setting.
Tip: The Targets setting supports excluding specific ports per IP address by
typing IP:Port entries.
Network Specifies the network that the targets belong to: either Default or a custom
network.
Upload Targets Uploads a text file with host names or IP ranges, separated by commas, that
you want excluded from scans.
You cannot use the Upload Targets setting if you already specified targets
with the Targets setting.
Schedule
Enabled Enables or disables a schedule for when the exclusion is enabled. When
disabled, the exclusion is set to Always On. When enabled, you can
configure the following settings, which set a frequency and schedule for
when the exclusion is enabled.
Summary A summary of the selections for the Frequency, Starts, and Ends settings.
Frequency A drop-down box that contains the following options: Once, Daily, Weekly,
Monthly, and Yearly.
Starts Two drop-down boxes in which you can select a date and time when the
exclusion begins.
- 1394 -
Setting Description
Tip: To select a more granular start time, manually type the desired time in the
box, then click Create.
Ends Two drop-down boxes in which you can select a date and time when the
exclusion ends.
Tip: To select a more granular end time, manually type the desired time in the
box, then click Create.
Time Zone A drop-down box with a search bar in which you can select a time zone for
the selected dates and times.
- 1395 -
Connectors
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
l Microsoft Azure
After you configure platforms and create connectors, you can manage connectors from the
Settings page in Tenable Vulnerability Management.
Note: When using cloud connectors. Tenable recommends allowlisting the IP addresses for the region in
which the Tenable Vulnerability Management site resides.
l Assets discovered through the connectors do not count against the license until and unless
the asset is scanned for vulnerabilities. Discovery through the connector is free.
l Assets discovered through the connectors that did become licensed fall off the license the
day after the asset was terminated. This event can be observed via the connector.
l When an asset is terminated, Tenable Vulnerability Management stops matching scan results
to the asset. The asset is also deleted from the default view of the assets table.
l When an asset is deleted, Tenable Vulnerability Management purges the asset and any
associated findings in Explore, and releases the asset’s license. For more information, see
Delete Assets.
Tip: For information on other ways to ingest data into Tenable Vulnerability Management, see the Data
Ingestion in Tenable Vulnerability Management quick reference guide.
Supported Plugins
To view the supported plugins for AWS and Azure, see the Tenable Plugins page. Use the filter
Supported Sensors to view the Frictionless Assessment plugins.
Frictionless Assessment is now End of Provisioning (starting May 15, 2023), and new users will not be able
to deploy Frictionless Assessment connectors. Frictionless Assessment will reach End-of-Support on
December 31, 2023, and will no longer receive support or updates. However, existing Frictionless
Assessment connectors will continue to function until the feature is End-of-Life on December 31, 2024.
Tenable recommends that you transition to Tenable Cloud Security with Agentless Assessment for scanning
your cloud resources. For more information, see the Tenable Vulnerability Management Release Notes.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
The Amazon Web Services (AWS) connector provides real-time visibility and inventory of EC2
instances in your AWS account.
To import and analyze information about EC2 instances in AWS, you must first configure AWS to
support your connector configuration, then create an AWS connector in Tenable Vulnerability
Management.
You can create an AWS connector to discover AWS assets and import them to Tenable Vulnerability
Management. Assets discovered through the connectors do not count against the license until and
unless the asset is scanned for vulnerabilities.
To assess AWS assets for vulnerabilities, Tenable recommends that you use Frictionless
Assessment to assess for vulnerabilities in the cloud. Alternatively, you can run a Tenable Nessus
scanner or agent scan, which runs plugins locally on the host.
l Full Sync: Occurs when the AWS connector describes all EC2 instances in your account
and imports them to Tenable Vulnerability Management.
l Partial Sync: Occurs when the AWS connector reads all cloud trail events and imports any
created or terminated EC2 instances since the previous sync.
The AWS connector performs up to 47 partial syncs and one full sync in a 24-hour period. When
you set a new schedule, the AWS resets and triggers another full sync.
Tip: For descriptions of common connector errors, see Connectors in the Tenable Developer Portal.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Note: Frictionless Assessment reports on Asset information even if it is in a "stopped" state. The AWS
Systems Manager Agent (SSM Agent), which Frictionless Assessment leverages to collect data from a host
and create an inventory of data points on your AWS EC2 instances, also collects data even in "stopped"
state.
Frictionless Assessment uses the AWS Systems Manager Inventory and AWS Systems Manager
Agent (SSM Agent) to collect the required data. For more information on AWS configuration
requirements, see Configure AWS for Frictionless Assessment.
You do not need to configure scanners, Tenable Nessus Agents, scans, or scan schedules to assess
hosts with Frictionless Assessment.
Frictionless Assessment has vulnerability coverage for EC2 instances created from the following
Amazon Machine Images:
l Amazon Linux 1 / 2
l CentOS 6 / 7 / 8
l Red Hat 6 / 7 / 8
l Windows Server 2012, Windows Server 2012 R2, Windows Server 2016, Windows Server 2019,
Windows Server 2022
Licensing Considerations
In general in Tenable Vulnerability Management, assets count towards your license when they are
assessed for vulnerabilities. Therefore, EC2 hosts that are assessed by Frictionless Assessment
count against your license. For more information, see Tenable Vulnerability Management Licenses.
When you select AWS tags for hosts to be assessed by Frictionless Assessment, note that all hosts
with any of those tags count towards your license. Hosts that are only discovered by the connector,
and not assessed by Frictionless Assessment (for example, hosts that do not have a tag you
selected for Frictionless Assessment), do not count towards your license.
Supported Regions
l eu-central-1, EU (Frankfurt)
l eu-west-1, EU (Ireland)
l eu-west-2, EU (London)
l eu-west-3, EU (Paris)
Limitations
l Frictionless Assessment does not run informational plugins, run remote vulnerability plugins,
or gather compliance data.
l A connector configured with Frictionless Assessment only supports one AWS account. If you
want to assess hosts across multiple AWS accounts, you must configure a separate connector
for each AWS account.
l You must use a single AWS tag key to identify the assets you want Frictionless Assessment to
access.
l The limit for Frictionless Assessment scans is one per day, whereas existing Frictionless
Assessment connectors created before May 1, 2023 transmit inventory data more frequently.
Frictionless Assessment drops data exceeding the frequency limit and does not scan it.
Note: The limitation does not apply to Tenable Container Security, Agentless Assessment, or
Tenable Nessus Agent-based inventory scans.
Get Started
1. Determine who in your organization has the appropriate AWS credentials to access the
AWS console.
l If you are setting up the Tenable Vulnerability Management cloud connector, but
someone other than you in your organization has the necessary AWS credentials:
a. The person with AWS credentials must ensure the AWS configuration meets the
requirements for Frictionless Assessment, as described in Configure AWS for
Frictionless Assessment.
b. The person with AWS credentials must manually configure AWS roles and policies
for use with Frictionless Assessment.
4. If you delete a connector, manually delete the CloudFormation stack in AWS, as described in
Manually Delete Connector Artifacts in AWS.
Frictionless Assessment is now End of Provisioning (starting May 15, 2023), and new users will not be able
to deploy Frictionless Assessment connectors. Frictionless Assessment will reach End-of-Support on
December 31, 2023, and will no longer receive support or updates. However, existing Frictionless
Assessment connectors will continue to function until the feature is End-of-Life on December 31, 2024.
Tenable recommends that you transition to Tenable Cloud Security with Agentless Assessment for scanning
your cloud resources. For more information, see the Tenable Vulnerability Management Release Notes.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Frictionless Assessment leverages the AWS Systems Manager Inventory and AWS Systems Manager
Agent (SSM Agent) to collect data from a host and create an inventory of data points on your AWS
EC2 instances. You do not need to configure scanners, Tenable Nessus Agents, scans, or scan
schedules to assess hosts with Frictionless Assessment.
If you have access to your organization's AWS console, ensure your AWS configuration meets the
following requirements before creating the Tenable Vulnerability Management cloud connector.
If someone other than you has access to your organization's AWS console, ensure they configure
AWS to meet the following requirements before you create the Tenable Vulnerability Management
cloud connector.
1. Set up AWS Systems Manager for your account, as described in the AWS Systems
Manager documentation.
2. Ensure that you have access to AWS Systems Manager Inventory. For more information, see
AWS Systems Manager Inventory in the AWS Systems Manager documentation.
l Most EC2 instance distributions come with SSM Agent preinstalled. For more
information, see About SSM Agent in the AWS Systems Manager documentation.
l If your distribution does not have SSM installed, manually install the SSM Agent as
described in the AWS Systems Manager documentation.
4. Ensure the target EC2 instances you want to assess with Frictionless Assessment are tagged
with a single AWS tag key. For example, you can use the tag key Tenable.
Later, you will select this AWS tag key to identify instances you want to assess with
Frictionless Assessment.
What to do next:
l Depending on who has the AWS credentials for your organization, do the following:
l If you are setting up the Tenable Vulnerability Management cloud connector and also
have the appropriate AWS credentials for your organization:
Frictionless Assessment is now End of Provisioning (starting May 15, 2023), and new users will not be able
to deploy Frictionless Assessment connectors. Frictionless Assessment will reach End-of-Support on
December 31, 2023, and will no longer receive support or updates. However, existing Frictionless
Assessment connectors will continue to function until the feature is End-of-Life on December 31, 2024.
Tenable recommends that you transition to Tenable Cloud Security with Agentless Assessment for scanning
your cloud resources. For more information, see the Tenable Vulnerability Management Release Notes.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
When you configure an Amazon Web Services (AWS) cloud connector with keyless authentication
for Frictionless Assessment, Tenable Vulnerability Management uses a Cloud Formation template
(CFT) to configure the required roles and policies for your AWS account automatically. This
configuration sets up the regular cloud connector and Frictionless Assessment.
To use Frictionless Assessment with your AWS connector, you must enter an AWS tag key to
identify hosts to be assessed by Frictionless Assessment. If you do not enter a tag key, the
connector functions as discovery-only and assets are not assessed for vulnerabilities.
Note: Create a separate cloud connector for each AWS account that owns hosts you want to evaluate for
Frictionless Assessment.
Note: To use Legacy Tenable Cloud Security Preview or Legacy Tenable Cloud Security, you must
update or create new roles that support Legacy Tenable Cloud Security. Tenable Vulnerability
Management cloud connector roles do not support Agentless Assessment.
l In another window or tab of the same browser with which you are accessing Tenable
Vulnerability Management, log in to the AWS console with the AWS account that you want to
target with Frictionless Assessment.
4. In the Cloud Provider step, select AWS and enter a Connector Name.
Click Next.
5. In the Enable Features step, ensure the check box to Identify vulnerabilities using
frictionless assessment is selected.
Click Next.
For example, in the AWS tag Tenable:FA, the tag key is Tenable.
For example, in the AWS tag Tenable:FA, the tag value is FA.
Tip: You can only specify one tag for AWSFrictionless Assessment.
Note: The tag key and value are case sensitive and must match what is in AWS exactly.
Note: To use Frictionless Assessment with your AWS connector, you must enter an AWS tag
key to identify hosts to be assessed by Frictionless Assessment. If you do not enter a tag key,
the connector functions as discovery-only and assets are not assessed for vulnerabilities.
c. Select the Network to target. You can select an existing network or create a new
network using the Network drop-down menu. If you do not specify a network, your
default network is selected.
Click Next.
The CFT downloads in .yml format, and the new connector shows on the Cloud Connectors
page.
If you need to deploy to more than one region, Tenable recommends deploying the template as a
stack set (for more information, see the AWS stack set documentation).
What to do next:
l Create an AWS Connector with Keyless Authentication (Discovery Only) for your AWS account
if you do not already have one. Your AWS account needs a keyless connector for Tenable
Vulnerability Management to track asset states and asset terminations.
Note: The keyless connector needs to be set up for the same account that AWS Frictionless
Assessment is set up for.
l Edit the AWS Frictionless Assessment connector's tags when needed. For more information,
see Edit an AWS Frictionless Assessment Connector.
l View Assets to see hosts discovered by the connector. Hosts found by an AWS connector
using Frictionless Assessment appear with the source SSM.
Frictionless Assessment is now End of Provisioning (starting May 15, 2023), and new users will not be able
to deploy Frictionless Assessment connectors. Frictionless Assessment will reach End-of-Support on
December 31, 2023, and will no longer receive support or updates. However, existing Frictionless
Assessment connectors will continue to function until the feature is End-of-Life on December 31, 2024.
Tenable recommends that you transition to Tenable Cloud Security with Agentless Assessment for scanning
your cloud resources. For more information, see the Tenable Vulnerability Management Release Notes.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
You can edit the name, tags, and network of an Amazon Web Services (AWS) Frictionless
Assessment connector.
Note: If you edit an AWS Frictionless Assessment connector's tags, you have to redeploy the connector to
your AWS accounts to update the tag information in AWS.
1. Log in to your Tenable Vulnerability Management user interface and go to Settings > Cloud
Connectors.
2. From the Cloud Connectors table, click the AWS_FA connector that you want to edit tags for.
For example, in the AWS tag Tenable:FA, the tag key is Tenable.
For example, in the AWS tag Tenable:FA, the tag value is FA.
Tip: You can only specify one tag for AWS Frictionless Assessment.
Note: The tag key and value are case sensitive and must match what is in AWS exactly.
Note: To use Frictionless Assessment with your AWS connector, you must enter an AWS tag
key to identify hosts to be assessed by Frictionless Assessment. If you do not enter a tag key,
the connector functions as discovery-only and assets are not assessed for vulnerabilities.
l To edit the change the network the connector is linked to, select an existing network or
create a new network using the Network drop-down menu. If you do not specify a
network, Tenable Vulnerability Management selects your default network.
Note: If you edited the connector tags, the button shows as Download CFT & Save.
The CFT downloads in .yml format and the Cloud Connectors page appears with the updated
connector information.
5. If you edited the connector tags, redeploy the CFT to your AWS accounts (for more
information, see the AWS documentation).
If you need to deploy to more than one region, Tenable recommends deploying the template
as a stack set (for more information, see the AWS stack set documentation).
Frictionless Assessment is now End of Provisioning (starting May 15, 2023), and new users will not be able
to deploy Frictionless Assessment connectors. Frictionless Assessment will reach End-of-Support on
December 31, 2023, and will no longer receive support or updates. However, existing Frictionless
Assessment connectors will continue to function until the feature is End-of-Life on December 31, 2024.
Tenable recommends that you transition to Tenable Cloud Security with Agentless Assessment for scanning
your cloud resources. For more information, see the Tenable Vulnerability Management Release Notes.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
After you delete your last AWS connector, Tenable Vulnerability Management triggers an automatic
deletion of most AWS artifacts associated with the connector and the Frictionless Assessment
configuration.
However, the CloudFormation stack or stack set is not automatically deleted. You must manually
delete the CloudFormation stack or stack set in the AWS CloudFormation console.
Frictionless Assessment is now End of Provisioning (starting May 15, 2023), and new users will not be able
to deploy Frictionless Assessment connectors. Frictionless Assessment will reach End-of-Support on
December 31, 2023, and will no longer receive support or updates. However, existing Frictionless
Assessment connectors will continue to function until the feature is End-of-Life on December 31, 2024.
Tenable recommends that you transition to Tenable Cloud Security with Agentless Assessment for scanning
your cloud resources. For more information, see the Tenable Vulnerability Management Release Notes.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
To ensure that your AWS Frictionless Assessment connectors can detect the Log4j vulnerability,
update the TenableInventoryCollection script in each AWS region where the script is installed.
Note: If you have multiple AWS accounts, you need to complete the steps below for all the relevant regions
within each account.
Note: To verify that the AWS region is updated to detect Log4j, open the
TenableInventoryCollection document, go to the Contents tab, and search (Ctrl + F) for "log4j". If the
code contains "log4j", it is updated.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
The Amazon Web Services (AWS) cloud connector provides real-time visibility and inventory of EC2
assets in AWS accounts.
You can create an AWS connector to discover AWS assets and import them to Tenable Vulnerability
Management. Assets discovered through the connectors do not count against the license until and
unless the asset is scanned for vulnerabilities.
Tip: To configure an AWS connector with Frictionless Assessment, which allows you to assess EC2
instances for vulnerabilities without configuring agents or scans, see Frictionless Assessment for AWS.
You can create AWS connectors for discovery with either of the following configurations:
Supported Regions
The following regions are supported for AWS Discovery Connectors:
l eu-central-1, EU (Frankfurt)
l eu-west-1, EU (Ireland)
l eu-west-2, EU (London)
l eu-west-3, EU (Paris)
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
The Amazon Web Services (AWS) Connector provides real-time visibility and inventory of EC2
assets in AWS accounts.
You can create an AWS connector to discover AWS assets and import them to Tenable Vulnerability
Management. Assets discovered through the connectors do not count against the license until and
unless the asset is scanned for vulnerabilities.
Tip: To configure an AWS connector with Frictionless Assessment, which allows you to assess EC2
instances for vulnerabilities without configuring agents or scans, see Frictionless Assessment for AWS.
Keyless Authentication
Tenable Vulnerability Management AWS connectors support keyless authentication via AWS role
delegation. Keyless authentication via AWS role delegation allows the automatic discovery of your
AWS assets. To use keyless authentication, you must establish a trust relationship between your
AWS accounts and the Tenable AWS account. In this scenario, your AWS accounts communicate
with a trusted Tenable AWS account that communicates with your AWS connector.
For more information about setting up AWS Organizations, see the AWS documentation.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Before you create a discovery-only connector with keyless authentication, you must first configure
AWS. For more information on linking AWS accounts and establishing trust relationships, see AWS
Connector with Keyless Authentication (Discovery Only)
3. In the trail, turn on All or Write Only Management Events, as well as logging.
Note: When an AWS connector is used to import assets, Tenable queries all the CloudTrails for that
connector and determine the set of all regions that those CloudTrails receive events for. That set of
regions is then used when making calls to the EC2 and CloudTrail APIs.
a. In the navigation pane of the AWS console, click Roles > Create role.
Note: 012615275169 is the account ID of the Tenable AWS account that you will be
establishing a trust relationship with to support AWS role delegation.
d. Select the Require external ID check box, and type the Tenable Vulnerability
Management container ID that you obtained in step 1.
l GetEventSelectors
l GetTrailStatus
l ListTags
l LookupEvents
AWS l ListAccounts
Organizations
Note: The ListAccounts permission is required for
Tenable Vulnerability Management to automatically discover
AWS accounts. If you do not use auto account discovery,
you do not need this permission.
Note: Tenable recommends that you set Amazon Resource Name to * (all resources) for each
AWS Service.
c. Create Policy.
Caution: The role must be named tenableio-connector for the connector to work.
i. Review the role, ensuring that the role name is tenableio-connector, and then click
Create role.
j. Viewing the new tenableio-connector role, click the Trust Relationship tab.
What to do next:
l Create an AWS Connector with Keyless Authentication (Discovery Only)
Create an AWS Connector with Keyless Authentication
(Discovery Only)
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
You can create an AWS connector to discover AWS assets and import them to Tenable Vulnerability
Management. Assets discovered through the connectors do not count against the license until and
unless the asset is scanned for vulnerabilities.
Note: To use Legacy Tenable Cloud Security Preview or Legacy Tenable Cloud Security, you must update
or create new roles that support Legacy Tenable Cloud Security. Tenable Vulnerability Management cloud
connector roles do not support Agentless Assessment.
The Cloud Connectors page appears and displays the configured connectors table.
4. In the upper-right corner of the page, click the Create Cloud Connector button.
8. (Optional) Click Create Stack to deploy a Cloud Formation Template (CFT) to your
AWS account.
Note: For discovery-only connectors, skip the stack creation steps in the user interface only if you
have manually configured tenableio-connector role in your AWS account. The stack configures
parameters, policies, and roles required for using the Tenable Vulnerability Management connector.
9. (Optional) To expand more cloud connector settings, click Cloud Connector Advanced
Settings.
a. (Optional) Use the Auto Account Discovery toggle to enable or disable automatic
discovery of linked accounts and CloudTrails.
Note: Make sure that you create a tenableio-connector role either manually or via CFT for each
linked account.
l To manually add AWS accounts, next to Accounts for Cloud Assessment, click .
l To manually add AWS CloudTrails, next to AWS CloudTrails for Cloud Assessment,
click .
c. (Optional) In the Select or Create Network drop-down box, select an existing network to
which the connector should be added.
When the connector discovers an asset, the associated network is added to the asset's
details. For more information, see Networks.
d. (Optional) Use the Cloud Connector Schedule toggle to enable or disable scheduled
imports.
By default, Tenable Vulnerability Management requests new and updated asset records
every 1 day.
If enabled:
i. In the text box, type the frequency with which Tenable Vulnerability Management
sends data requests to the AWS server.
ii. In the drop-down box select Minutes, Hours, or Days.
l To save the connector and import your assets from AWS, click Save & Import.
Tenable Vulnerability Management imports your assets from AWS. There may be a short delay
before your assets appear.
What to do next:
l View Assets to see assets that were discovered by the connector.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
The Amazon Web Services (AWS) Connector provides real-time visibility and inventory of EC2
assets in AWS accounts.
You can create an AWS connector to discover AWS assets and import them to Tenable Vulnerability
Management. Assets discovered through the connectors do not count against the license until and
unless the asset is scanned for vulnerabilities.
Key-based Authentication
Tenable Vulnerability Management AWS connectors support key-based authentication that uses an
IAM user with permissions and a secret key and access key. In this scenario, the Tenable
Vulnerability Management AWS connector authenticates with your primary AWS account via a
secret key and an access key. Additionally, you can manually configure secondary linked AWS
accounts with trust relationships to your primary AWS account., as shown in the diagram below.
For more information about other AWS authentication options, see Amazon Web Services
Connector.
Note: AWS connectors configured with key-based authentication do not support the automatic discovery
of AWS accounts. Additionally, key-based authentication is not recommended.
1. In AWS, configure your primary AWS account to support key-based authentication for your
connectors, as described in Configure AWS for Key-based Authentication.
2. (Optional) In AWS, manually configure linked AWS accounts, as described in Configure Linked
AWS Accounts (Key-based).
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Note: You must turn on All or Write Only Management Events, as well as logging for the trail.
1. Use the Policy Generator to create an IAM permission policy for integration with Tenable
Vulnerability Management.
EC2 l DescribeInstances
CloudTrail l DescribeTrails
l GetEventSelectors
l GetTrailStatus
l ListTags
l LookupEvents
Tenable recommends that you set Amazon Resource Name to * (all resources) for each AWS
Service.
What to do next:
l Create an AWS connector with Keyed Authentication.
Configure Linked AWS Accounts for Key-based Authentication
This section assumes that access keys have already been generated for the primary account, and
explains how to configure linked AWS accounts as depicted in the diagram below.
a. In the navigation pane of the console, click Roles > Create role.
c. For Account ID, type the AWS account ID of the primary AWS account.
d. Select the Require external ID check box, and type the Tenable container ID that you
obtained in Step 1.
l GetEventSelectors
l GetTrailStatus
l ListTags
l LookupEvents
Tenable recommends that you set Amazon Resource Name to * (all resources) for each
AWS Service.
Caution: The role must be named tenableio-connector for the connector to work.
k. Review the role, ensuring that the role name is tenableio-connector, and then click
Create role.
l. Record the Role ARN for the created role. You need the Role ARN for the next section of
the configuration.
Note: For more detailed steps, see the Amazon documentation: Accessing and Administering the Member
Accounts in Your Organization.
1. Create a policy that has permission to use the AWS Security Token Service (AWS STS)
AssumeRole API (sts:AssumeRole) action.
c. For Actions, type AssumeRole in the Filter box and then select the check box next to it
when it appears.
d. Click You chose actions that require the role resource type.
f. In the Specify ARN for role field, paste the ARN recorded for the role created in the
linked account(s).
g. Click Add.
2. Add the policy created in step 1 to a user or group associated with the access keys used when
you created your connector.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
The Cloud Connectors page appears and displays the configured connectors table.
4. In the upper-right corner of the page, click the Create Cloud Connector button.
7. In the Access Key box, type the access key that you obtained when configuring AWS.
8. In the Secret Key box, type the secret key that corresponds to the access key you used.
9. In the Select or Create Network drop-down box, select an existing network for your
connector or click the button to create a new network.
Note: Networks help to avoid IP address collisions between cloud assets and Nessus-discovered
assets. Tenable recommends creating a network for each connector type in use to prevent asset
records in different cloud environments from overwriting each other. For more information about
the network feature, see Networks.
10. Use the Cloud Connector Schedule toggle to enable or disable scheduled imports.
Note: By default, Tenable Vulnerability Management requests new and updated asset records every 1
hour.
If enabled:
l In the Import text box, type the frequency with which Tenable Vulnerability Management
sends data requests to the AWS server.
Note: When you schedule a connector configuration to sync every 30 minutes, a discovery job
is placed in a queue every 30 minutes. The results of the discovery job become available in the
Tenable Vulnerability Management interface and logs depending on the workload for the
connector services. So, the results of the discovery job can take more than 30 minutes
depending on the queue.
l To save the connector and import your assets from AWS, click Save & Import.
Note: There may be a short delay before your assets appear in Tenable Vulnerability Management.
Frictionless Assessment is now End of Provisioning (starting May 15, 2023), and new users will not be able
to deploy Frictionless Assessment connectors. Frictionless Assessment will reach End-of-Support on
December 31, 2023, and will no longer receive support or updates. However, existing Frictionless
Assessment connectors will continue to function until the feature is End-of-Life on December 31, 2024.
Tenable recommends that you transition to Tenable Cloud Security with Agentless Assessment for scanning
your cloud resources. For more information, see the Tenable Vulnerability Management Release Notes.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
The Microsoft Azure Connector provides real-time visibility and inventory of assets in Microsoft
Azure accounts.
To import and analyze information about assets in Microsoft Azure, you must configure Azure to
support connectors and then create an Azure connector in Tenable Vulnerability Management.
Note: If your Azure deployment includes Azure instances in the Azure China or Azure Government regions,
Tenable Vulnerability Management cannot connect to those instances.
To assess Azure assets for vulnerabilities, Tenable recommends that you use Frictionless
Assessment to assess for vulnerabilities in the cloud. Alternatively, you can run a Nessus scanner or
agent scan, both of which run plugins locally on the host.
Connector
Goal
Type
Discover Microsoft Azure assets and assess for vulnerabilities using Frictionless
Frictionless Assessment Assessment
The cloud connector discovers Azure assets, then assesses the hosts for
vulnerabilities in the cloud, rather than running plugins locally on the host.
Note: To manage existing Microsoft Azure connectors, see Manage Connectors. in the Tenable Vulnerability
Management User Guide.
Tip: For common connector errors, see Connectors in the Tenable Developer Portal.
Frictionless Assessment for Azure
Frictionless Assessment is now End of Provisioning (starting May 15, 2023), and new users will not be able
to deploy Frictionless Assessment connectors. Frictionless Assessment will reach End-of-Support on
December 31, 2023, and will no longer receive support or updates. However, existing Frictionless
Assessment connectors will continue to function until the feature is End-of-Life on December 31, 2024.
Tenable recommends that you transition to Tenable Cloud Security with Agentless Assessment for scanning
your cloud resources. For more information, see the Tenable Vulnerability Management Release Notes.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Frictionless Assessment uses a custom automation runbook to collect the required data from VMs
and VM scale sets in your selected resource groups. You do not need to configure a Microsoft Azure
discovery connector, scanners, Tenable Nessus Agents, scans, or scan schedules to assess hosts
with Frictionless Assessment.
The Azure Frictionless Assessment runbook collects data from each VM with basic commands to
gather information such as installed packages and the existence of specific files. This information
is then securely sent to Tenable using Azure's Public Blob Resource API. This connection is made
using a customer-specific, regularly rotating shared access signature (SAS) token. For more
information about the data that the runbook collects from VMs, see Azure Runbook Information .
Note: Virtual machines scanned by Azure Frictionless Assessment need outbound network access to push
information to Azure's Public Blob Resource API. This can be accomplished by adding an outbound security
rule using the "Storage" service tag. Without this access, the result of Runbook collection will not be
received by Tenable and no assets or vulnerabilities will be assessed.
l Amazon Linux 1 / 2
l CentOS 6 / 7 / 8
l Red Hat 6 / 7 / 8
l Windows Server 2012, Windows Server 2012 R2, Windows Server 2016, Windows Server 2019,
Windows Server 2022
Licensing Considerations
In general in Tenable Vulnerability Management, assets count towards your license when they are
assessed for vulnerabilities. Therefore, hosts that are assessed by Frictionless Assessment count
against your license. For more information, see Tenable Vulnerability Management Licenses.
When you select Azure tags for hosts to be assessed by Frictionless Assessment, note that all hosts
with any of those tags count towards your license. Hosts that are only discovered by the connector,
and not assessed by Frictionless Assessment (for example, hosts that do not have a tag you
selected for Frictionless Assessment), do not count towards your license.
Limitations
l Frictionless Assessment does not run informational plugins, run remote vulnerability plugins,
or gather compliance data.
l A connector configured with Frictionless Assessment only supports one Azure subscription. If
you want to assess hosts across multiple Azure subscriptions, you must configure a separate
connector for each subscription.
l You must have the Microsoft.ContainerInstance resource provider registered for each Azure
subscription you plan to deploy the ARM template to.
l The limit for Frictionless Assessment scans is one per day, whereas existing Frictionless
Assessment connectors created before May 1, 2023 transmit inventory data more frequently.
Frictionless Assessment drops data exceeding the frequency limit and does not scan it.
Note: The limitation does not apply to Tenable Container Security, Agentless Assessment, or
Tenable NessusAgent-based inventory scans.
Get Started
1. Create an Azure Connector for Frictionless Assessment.
Note: If you delete a Frictionless Assessment Azure connector, manually delete the remaining Azure
artifacts as described in Manually Delete Connector Artifacts from Azure Frictionless Assessment.
2. Verify that the Runbook in the automation account used for Frictionless Assessment Azure
completes successfully. If it does not, contact your Azure administrator or support
representative to resolve the issue.
You can find the Runbook in Microsoft Azure > Automation Accounts > Tenable FA
Automation Account > Process Automation > Runbooks/Job.
Frictionless Assessment is now End of Provisioning (starting May 15, 2023), and new users will not be able
to deploy Frictionless Assessment connectors. Frictionless Assessment will reach End-of-Support on
December 31, 2023, and will no longer receive support or updates. However, existing Frictionless
Assessment connectors will continue to function until the feature is End-of-Life on December 31, 2024.
Tenable recommends that you transition to Tenable Cloud Security with Agentless Assessment for scanning
your cloud resources. For more information, see the Tenable Vulnerability Management Release Notes.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
When you configure an Azure cloud connector for Frictionless Assessment, Tenable Vulnerability
Management uses an Azure Resource Manager (ARM) template. ARM is Azure's method for
organizing, updating, provisioning resources in an Azure resource group or subscription. It allows
users to define resources, dependencies, and networking for their application or use cases.
Follow the steps below to create a Microsoft Azure Frictionless Assessment connector in Tenable
Vulnerability Management. This process also creates the ARM template that you will need to deploy
to each of your Azure subscriptions that you want to evaluate for Frictionless Assessment.
Before you begin:
l In another window or tab of the same browser with which you are accessing Tenable
Vulnerability Management, log in to the Azure console with the Azure account that you want to
target with Frictionless Assessment.
Note: To use Legacy Tenable Cloud Security Preview or Legacy Tenable Cloud Security, you must update
or create new roles that support Legacy Tenable Cloud Security. Tenable Vulnerability Management cloud
connector roles do not support Agentless Assessment.
Create the Microsoft Azure Frictionless Assessment connector and ARM template:
1. In the upper-left corner, click the button.
The Cloud Connectors page appears and displays the configured connectors table.
Click Next.
7. In the Enable Features step, ensure the check box to Identify vulnerabilities using
frictionless assessment is selected.
Click Next.
8. In the Configuration step, either select the Scan all check box, or select specific target
parameters.
Note: To target a more specific subset of resources, you can target your connector on a specific
resource group, a specific tag key, a specific tag value, or a combination of all three.
Note: Use the ANY input from the drop-down as a wild card to target all values for a resource group,
tag key, or tag value.
Click Next.
The new ARM template downloads in .json format, and the new connector shows on the Cloud
Connectors page.
Note: You must have the Microsoft.ContainerInstance resource provider registered for each Azure
subscription you are deploying the ARM template.
Note: When deploying Azure Frictionless Assessment through the Azure CLI, use subscription
deployment with the ARM template produced by the steps above.
Example:
You can add --debug to the command generate verbose logging during deployment.
Frictionless Assessment is now End of Provisioning (starting May 15, 2023), and new users will not be able
to deploy Frictionless Assessment connectors. Frictionless Assessment will reach End-of-Support on
December 31, 2023, and will no longer receive support or updates. However, existing Frictionless
Assessment connectors will continue to function until the feature is End-of-Life on December 31, 2024.
Tenable recommends that you transition to Tenable Cloud Security with Agentless Assessment for scanning
your cloud resources. For more information, see the Tenable Vulnerability Management Release Notes.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Delete the following Azure Frictionless Assessment artifacts in the Azure portal:
l The Automation account role assignment related to the custom role definition (e.g. Tenable-
FA-Automation-Account)
l The custom role definition (e.g. Tenable FA Role (Subscription: [UUID] | Connector: [UUID]))
Note: The resource group can also be deleted from the Azure CLI with the following
command, given that the Azure client has Contributor permissions or greater:
az group list --tag Tenable=AzureFa --query "[].name" -o tsv | xargs -ot az group delete
--no-wait -n
For more information on the listed Azure artifacts, see the Microsoft Azure documentation.
Frictionless Assessment is now End of Provisioning (starting May 15, 2023), and new users will not be able
to deploy Frictionless Assessment connectors. Frictionless Assessment will reach End-of-Support on
December 31, 2023, and will no longer receive support or updates. However, existing Frictionless
Assessment connectors will continue to function until the feature is End-of-Life on December 31, 2024.
Tenable recommends that you transition to Tenable Cloud Security with Agentless Assessment for scanning
your cloud resources. For more information, see the Tenable Vulnerability Management Release Notes.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Frictionless Assessment uses a custom automation runbook and collects the following data from
VMs and VM scale sets in your selected resource groups.
Some intermediary resources show up after the first few minutes of deploying an arm template.
These resources are deployment scripts that Tenable Vulnerability Management uses to deploy the
following resources. Tenable Vulnerability Management removes the scripts once the deployments
are complete.
l Resource group:
l Automation Account:
l Runbooks:
l Name: TenableFATerminatedInstances
l Name: TenableFACollector
l Storage Account:
l Role Definitions:
l Actions:
"Microsoft.ClassicCompute/operatingSystems/read",
"Microsoft.ClassicCompute/operatingSystemFamilies/read",
"Microsoft.ClassicCompute/virtualMachines/read",
"Microsoft.Compute/virtualMachines/read",
"Microsoft.Compute/virtualMachineScaleSets/read",
"Microsoft.Compute/virtualMachines/runCommand/action",
"Microsoft.Compute/virtualMachineScaleSets/virtualMachines/read",
"Microsoft.Compute/virtualMachineScaleSets/virtualMachines/runCommand/action"
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Before you can use Tenable Vulnerability Management Azure connectors, you must perform several
steps in Microsoft Azure.
Note: If your Azure deployment includes Azure instances in the Azure China or Azure Government regions,
Tenable Vulnerability Management cannot connect to those instances.
Note: The Azure Application ID and Client Secret are obtained during this step.
What to do next:
l Create an Azure connector.
7. (Optional) In the Redirect URI section, select either Web or Public client (mobile & desktop)
from the drop-down, and then enter the URI in the text box.
A success message appears at the top of the page stating that the new application has been
created, and the page is redirected to the Overview page for the application.
9. Copy the Application (client) ID. This information is used to configure a connector with
Tenable Vulnerability Management.
10. In the Manage section for the application, click Certificates & secrets.
11. In the Client Secrets section, click + New client secret.
12. In the Description box, type a description for the client secret.
What to do next:
l Obtain the Azure Tenant ID (Directory ID)
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
What to do next:
l Obtain the Azure Subscription ID.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
What to do next:
l Grant the Azure Application reader role permissions.
Grant the Azure Application Reader Role Permissions
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
To grant an Azure application reader role permissions for an Azure Tenable Vulnerability
Management connector:
Note: For more information, see the Microsoft Azure documentation: Manage access to Azure resources using
RBAC and the Azure portal.
8. In the Add role assignment window, in the Role tab, search and select Reader.
9. In the Members tab, in the Assign access to section, select User, group, or service principal.
12. In the Review + assign tab, review the selected role and members.
What to do next:
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Grant the secondary subscription reader role permissions for the application you created for your
primary Azure subscription.
8. In the Add role assignment window, in the Role tab, search and select Reader.
9. In the Members tab, in the Assign access to section, select User, group, or service principal.
12. In the Review + assign tab, review the selected role and members.
What to do next:
l Create an Azure connector.
The Cloud Connectors page appears and displays the configured connectors table.
4. In the upper-right corner of the page, click the Create Cloud Connector button.
7. In the Application ID box, type the Azure application ID that you obtained when configuring
Microsoft Azure.
8. In the Tenant ID box, type the Azure Tenant ID obtained when configuring Microsoft Azure.
9. In the Client Secret box, type the client secret obtained when configuring Microsoft Azure.
10. Use the Auto Account Discovery toggle to enable or disable automatic discovery of Azure
subscription ID(s).
Note: Auto account discovery is enabled by default. The Azure connector automatically discovers
your subscription ID and any linked subscription ID(s).
11. (Optional) If Auto Account Discovery is disabled, manually add one or more subscription IDs:
a. In the Subscription IDs section, click the button next to Subscription IDs.
b. In the Subscription ID box, type the subscription ID obtained when configuring Microsoft
Azure.
c. (Optional) Click the button next to Add Another Subscription ID to add additional
linked Azure accounts.
d. In the Subscription ID box, type the subscription ID for the Azure account that you want
to link. For information about configuring linked subscriptions, see Link Azure
Subscription.
Tenable Vulnerability Management displays the Microsoft Azure settings plane, and the
Subscription ID(s) you linked are listed under Subscription IDs.
12. In the Select or Create Network drop-down box, select an existing network for your
connector or click the button to create a new network.
Note: Networks help to avoid IP address collisions between cloud assets and Nessus-discovered
assets. Tenable recommends creating a network for each connector type in use to prevent asset
records in different cloud environments from overwriting each other. For more information about
the network feature, see Networks.
13. Use the Schedule Import toggle to enable or disable scheduled imports.
Note: By default, Tenable Vulnerability Management requests new and updated asset records every
(1) days.
When enabled:
l In the Import text box, type the frequency with which Tenable Vulnerability Management
sends data requests to the Azure server.
l In the drop-down box select Minutes, Hours, or Days.
Note: When you schedule a connector configuration to sync every 30 minutes, a discovery job
is placed in a queue every 30 minutes. The results of the discovery job become available in the
Tenable Vulnerability Management interface and logs depending on the workload for the
connector services. So, the results of the discovery job can take more than 30 minutes
depending on the queue.
l To save the connector and import your assets from Azure, click Save & Import.
Note: There may be a short delay before your assets appear in Tenable Vulnerability Management.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
The Google Cloud Platform (GCP) Connector provides real-time visibility and inventory of assets in
Google Cloud Platform. The GCP connector refreshes according to a schedule set by the user.
To import and analyze information about assets in Google Cloud Platform, you must configure GCP
to support connectors and then create a GCP connector in Tenable Vulnerability Management.
1. Configure your GCP account to support your connectors, as described in Configure Google
Cloud Platform (GCP).
2. Create your GCP connector, as described in Create a Google Cloud Platform Connector
(Discovery Only).
Tip: For common connector errors, see Connectors in the Tenable Developer Portal.
Before you can use Tenable Vulnerability Management GCP connectors, you must configure GCP to
support your connectors.
Note: Before configuring, you must enable the compute engine API for each project you want scanned
from within Google Cloud Platform. See the Google API documentation for more information.
3. In the Select a project drop-down box in the upper-left, select the applicable GCP project.
8. In the Service account description box, describe what the service account will do.
10. In the drop-down box on the Service account permissions (optional) page, add the Logging ->
Logs Viewer role.
Note: The service accounts must have the Logging -> Log Viewer role for discovery sync
(incremental syncs after initial full sync).
11. Click + ADD ANOTHER ROLE on the Service account permissions (optional) page.
15. Under Key type, select JSON to create a key in JSON format.
(Optional) To configure a GCP service account that can access multiple projects:
You may have dozens of GCP accounts that are added and removed regularly. Instead of adding
each GCP account as a different connector, you can configure the top-level service account to
access multiple projects. The GCP connector automatically discovers all linked projects and pulls
assets from those projects.
Note: The top-level service account must have the Cloud Resource Manager API enabled in order to access
multiple projects.
Caution: The GCP connector pulls assets from any project that is configured with access to the top-level
service account. Only add projects that you want the GCP connector to pull data from.
3. In the drop-down menu in the upper-left corner, select the second GCP project.
5. In the New Members box, type the name of the top-level service account that you created in
step 6 of the first section.
6. In the Select a role drop-down box, select the Logging > Logs Viewer role.
8. In the Select a role drop-down box, select the Compute Engine > Compute Viewer role.
9. (Optional) Click the + ADD ANOTHER ROLE button to add additional roles.
What to do next:
l Create a GCP Connector, as described in Create a Google Cloud Platform Connector (Discovery
Only).
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
The Cloud Connectors page appears and displays the configured connectors table.
4. In the upper-right corner of the page, click the Create Connector button.
7. In the Service Account Key section, click Add File to upload your service account key that
you obtained when configuring GCP.
8. The Auto Account Discovery toggle is always enabled and cannot be disabled. Any Project ID
(s) associated with the service account you provided are auto-discovered and assets will be
pulled from those projects.
9. In the Select or Create Network drop-down box, select an existing network for your
connector or click the button to create a new network.
Note: Networks help to avoid IP address collisions between cloud assets and Nessus-discovered
assets. Tenable recommends creating a network for each connector type in use to prevent asset
records in different cloud environments from overwriting each other. For more information about
the network feature, see Networks.
10. Use the Schedule Import: toggle to enable or disable scheduled imports.
Note: By default, Tenable Vulnerability Management requests new and updated asset records every 1
day.
If enabled:
l In the Import text box, type the frequency with which Tenable Vulnerability Management
sends data requests to the GCP server.
Note: When you schedule a connector configuration to sync every 30 minutes, a discovery job
is placed in a queue every 30 minutes. The results of the discovery job become available in the
Tenable Vulnerability Management interface and logs depending on the workload for the
connector services. So, the results of the discovery job can take more than 30 minutes
depending on the queue.
l To save the connector and import your assets from GCP, click Save & Import.
Note: There may be a short delay before your assets appear in Tenable Vulnerability Management.
Frictionless Assessment is now End of Provisioning (starting May 15, 2023), and new users will not be able
to deploy Frictionless Assessment connectors. Frictionless Assessment will reach End-of-Support on
December 31, 2023, and will no longer receive support or updates. However, existing Frictionless
Assessment connectors will continue to function until the feature is End-of-Life on December 31, 2024.
Tenable recommends that you transition to Tenable Cloud Security with Agentless Assessment for scanning
your cloud resources. For more information, see the Tenable Vulnerability Management Release Notes.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
The Cloud Connectors page displays the Connectors table, which lists all your configured
connectors.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
The Cloud Connectors page appears and displays the configured connectors table.
4. In the row of the connector from which you want to launch a manual import, in the Actions
column, click > Import.
Tenable Vulnerability Management sends a request for data to the source. During the request
processing, the import button appears as a check mark. You cannot launch another manual
import for that connector until the request process completes.
Frictionless Assessment is now End of Provisioning (starting May 15, 2023), and new users will not be able
to deploy Frictionless Assessment connectors. Frictionless Assessment will reach End-of-Support on
December 31, 2023, and will no longer receive support or updates. However, existing Frictionless
Assessment connectors will continue to function until the feature is End-of-Life on December 31, 2024.
Tenable recommends that you transition to Tenable Cloud Security with Agentless Assessment for scanning
your cloud resources. For more information, see the Tenable Vulnerability Management Release Notes.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
On the Connectors page, you can view details about your connectors and imports.
Note: You can also complete connector management tasks from the Connectors page, including launching
an import manually, editing a connector, and deleting a connector. For more information, see Manage
Existing Connectors.
The Cloud Connectors page appears and displays the configured connectors table.
Column Action
Type View the platform or registry type from which your connector pulls
assets.
Status View the status for your most recent asset import.
Last View the date for the most recent asset import.
Import
Note: If your connector is a Tenable Container Security connector, a
green icon appears next the date after the import starts. You can
hover over the icon to view details for each asset the connector
imports. As the import progresses, the details update in real time.
Frictionless Assessment is now End of Provisioning (starting May 15, 2023), and new users will not be able
to deploy Frictionless Assessment connectors. Frictionless Assessment will reach End-of-Support on
December 31, 2023, and will no longer receive support or updates. However, existing Frictionless
Assessment connectors will continue to function until the feature is End-of-Life on December 31, 2024.
Tenable recommends that you transition to Tenable Cloud Security with Agentless Assessment for scanning
your cloud resources. For more information, see the Tenable Vulnerability Management Release Notes.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
For Microsoft Azure connectors and AWS connectors configured with keyless authentication, you
can view connector event history to help you troubleshoot issues. You can see events such as when
Tenable Vulnerability Management synced with the connector, imported assets, or checked for
terminated assets.
The Cloud Connectors page appears and displays the configured connectors table.
4. In the connector table, click the connector for which you want to view event history.
Note: You can view event history for Microsoft Azure connectors and AWS connectors configured
with keyless authentication.
The connector plane expands and displays the Connector Event History table. The table
displays events sent by the connector to Tenable Vulnerability Management, such as when
Tenable Vulnerability Management synced with the connector, imported assets, or checked
for terminated assets. For information on connector errors, see Connectors as documented in
the Tenable Developer Portal.
Edit a Connector
Frictionless Assessment is now End of Provisioning (starting May 15, 2023), and new users will not be able
to deploy Frictionless Assessment connectors. Frictionless Assessment will reach End-of-Support on
December 31, 2023, and will no longer receive support or updates. However, existing Frictionless
Assessment connectors will continue to function until the feature is End-of-Life on December 31, 2024.
Tenable recommends that you transition to Tenable Cloud Security with Agentless Assessment for scanning
your cloud resources. For more information, see the Tenable Vulnerability Management Release Notes.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Required User Role: Administrator
From the Settings page, you can edit your connector details, including the asset import schedule.
The steps to edit a connector vary depending on the platform.
The Cloud Connectors page appears and displays the configured connectors table.
4. In the connector table, click the connector that you want to edit.
l In the Select or Create Network drop-down box, change the existing network for your
connector or click the button to create a new network.
l Use the Auto Account Discovery toggle to enable or disable automatic discovery of
subscription IDs.
l If Auto Account Discovery is disabled, add or remove subscription IDs.
6. Click Save.
Tenable Vulnerability Management saves the connector. There may be a short delay before
your assets appear in Tenable Vulnerability Management.
The Cloud Connectors page appears and displays the configured connectors table.
4. In the connector table, click the connector that you want to edit.
l Use the Auto Account Discovery toggle to enable or disable automatic discovery of
linked accounts and CloudTrails.
l In the Secret Key box, change the secret key that corresponds to the access key.
l Click Refresh CloudTrails to query the AWS regions and update the AWS CloudTrails
table.
The number of assets to be imported into Tenable Vulnerability Management appears next to
the Find Assets button. This number may include assets that were previously imported. No
duplicate is created if an asset was previously imported.
7. Click Save.
The connector saves. If you selected different trails, your assets from AWS import. There may
be a short delay before your assets appear in Tenable Vulnerability Management.
The Cloud Connectors page appears and displays the configured connectors table.
4. In the connector table, click the connector that you want to edit.
l In the Select or Create Network drop-down box, change the existing network for your
connector or click the button to create a new network.
l In the Connector Name box, change the name of the connector.
l Under Service Account Key, click Add File to change your service account key.
6. Click Save.
Tenable Vulnerability Management saves the connector. There may be a short delay before
your assets appear in Tenable Vulnerability Management.
2. In the Connectors section of the Container Security dashboard, click View Connectors.
5. Click Save.
The connector saves. There may be a short delay before your assets appear in Tenable
Vulnerability Management.
Note: For more information about Tenable Container Security connectors, see Configure Connectors to
Import Images in the Tenable Vulnerability Management Container Security User Guide.
Delete a Connector
Frictionless Assessment is now End of Provisioning (starting May 15, 2023), and new users will not be able
to deploy Frictionless Assessment connectors. Frictionless Assessment will reach End-of-Support on
December 31, 2023, and will no longer receive support or updates. However, existing Frictionless
Assessment connectors will continue to function until the feature is End-of-Life on December 31, 2024.
Tenable recommends that you transition to Tenable Cloud Security with Agentless Assessment for scanning
your cloud resources. For more information, see the Tenable Vulnerability Management Release Notes.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
To delete a connector:
The Cloud Connectors page appears and displays the configured connectors table.
4. In the connector table, click the button next to the connector that you want to delete.
5. Click Delete.
What to do next:
l If you deleted an AWS connector with keyless authentication, see Manually Delete Connector
Artifacts in AWS.
Frictionless Assessment is now End of Provisioning (starting May 15, 2023), and new users will not be able
to deploy Frictionless Assessment connectors. Frictionless Assessment will reach End-of-Support on
December 31, 2023, and will no longer receive support or updates. However, existing Frictionless
Assessment connectors will continue to function until the feature is End-of-Life on December 31, 2024.
Tenable recommends that you transition to Tenable Cloud Security with Agentless Assessment for scanning
your cloud resources. For more information, see the Tenable Vulnerability Management Release Notes.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
You can remove or offboard your existing AWS and Azure connectors from your Tenable container
when you upgrade to Agentless Assessment.
Considerations before removing the AWS Frictionless Assessment connector with keyless
authentication:
l This connector includes both discovery and Frictionless Assessment functionality.
l After deletion, you must create another discovery connector to continue the discovery
functionality.
l Check if the connector deployed one of the following CloudFormation templates during the
creation process.
l AWS Keyless Frictionless Assessment single tag CloudFormation template
1. Delete the AWS connector. For more information, see Delete a Connector.
Tenable removes the following AWS Systems Manager resources from your account:
l tenb-inv-upload-<customerRegionName>-<clusterName>-sync —
ResourceDataSync.
2. In AWS, verify if the AWS Systems Manager resources are removed from your account.
This removes the permissions that Tenable required to perform the Frictionless Assessment
inventory scanning and discovery.
4. (Optional) Remove the tags for AWS EC2 instances used for Frictionless Assessment.
l The CloudFormation StackSet deployed the AWS Systems Manager resources for this
connector. Therefore, when you delete the stack instances and the StackSet from your AWS
Account, the AWS Systems Manager resources are removed.
l Check if you have set up a separate discovery connector for the same account as the one for
the Frictionless Assessment connector. This discovery connector detects terminated assets.
There is no need to remove this discovery connector as it continues to discover and import
assets from your AWS account.
Tenable removes the backend configuration for the connector so that the inventory for your
account is no longer processed.
2. In AWS, remove the StackSet that you deployed with this CloudFormation template from your
AWS account.
This removes the AWS Systems Manager association, AWS Systems Manager document, and
ResourceDataSync from your account. When this step is complete, Tenable no longer receives
your inventory for scanning.
3. (Optional) Remove the tags for EC2 instances scanned by Frictionless Assessment.
2. In the Azure portal, locate and delete the Tenable-FA-Connector-* resource group.
This is the resource group deployed by the ARM template when you created the Azure
Frictionless Assessment connector.