Tenable and IBM QRadar SIEM Integration Guide
Tenable and IBM QRadar SIEM Integration Guide
0 Integration
Guide
Last Revised: December 15, 2023
Copyright © 2023 Tenable, Inc. All rights reserved. Tenable, Tenable Nessus, Tenable Lumin, Assure, and the Tenable logo are registered trademarks of Tenable, Inc. or its affiliates. All other
products or services are trademarks of their respective owners.
Table of Contents
Configuration 6
View Offenses 39
Uninstall 40
Troubleshooting 41
-2-
Welcome to Tenable for IBM QRadar SIEM
This document provides information and steps for integrating Tenable Vulnerability Management,
Tenable Identity Exposure, Tenable OT Security, and Tenable Security Center applications with
IBM QRadar Security Information and Event Management (SIEM).
IBM QRadar SIEM (QRadar) is a network security management platform that provides situational
awareness and compliance support. It collects, processes, aggregates, and stores network data in
real time. QRadar has a modular architecture that provides real-time visibility of your IT
infrastructure that you can use for threat detection and prioritization.
You can use the customized Tenable applications in QRadar. to obtain vulnerability summaries for
Tenable Vulnerability Management, Tenable Identity Exposure, Tenable OT Security, or Tenable
Security Center that correspond to the source IP address for each offense.
For additional information about IBM QRadar SIEM, see the IBM QRadar SIEM website.
Install Tenable App for QRadar
Complete the following steps to install the Tenable App For QRadar.
l Download the Tenable App For QRadar v4.2.1 from the IBM App Exchange website.
3. Click Admin.
5. Click Add.
6. Click Browse and select the Tenable App For QRadar file.
7. Click Add.
8. Click Install.
9. After the validation completes, the Tenable App For QRadar window appears.
10. Click Install.
After the validation completes, the Tenable App appears in the list of Applications Packages
on the Tenable App For QRadar window.
The Tenable App For QRadar appears on the Extensions Management page.
Configuration
You can configure QRadar with Tenable Vulnerability Management or Tenable Security Center. Click
the corresponding link for configuration steps.
Note: In Tenable App for QRadar v2 and later, you must authenticate using an API Access Key and Secret
Key. For more information, see the Generate API section in the Tenable Security Center User Guide.
3. Click Admin.
b. In the Access Key box, enter your generated Tenable Security Center access key. For
more information, see Enable API Key Authentication and Generate API Keys.
c. In the Secret Key box, enter your generated Tenable Security Center secret key. For
more information, see Enable API Key Authentication and Generate API Keys.
d. In the Rule based Scan Name box, enter a scan name that exists in Tenable Security
Center.
Note: If a scan does not exist, you must create one. The scan needs to be associated to the
Tenable user that Qradar logs into the Tenable product with. This scan is used for the rule-
based scan function.
e. In the Right Click Scan Name box, enter a scan name that exists in Tenable Security
Center.
Note: If a scan does not exist, you must create one. The scan needs to be associated to the
Tenable user that Qradar logs into the Tenable product with. This scan is used for the right-
click scan function.
Note: This scan can be the same as the Rule Based Scan Name.
f. In the Authorized Service Token box, enter your Qradar authorized service token.
Authorized tokens are found under User Management in the Authorized Services
section.
See the IBM QRadar SIEM website for steps on creating an authorized service token.
g. (Optional) Click the toggle to enable or disable SSL verification. It may be required to
enter the hostname of the machine hosting Tenable Security Center in the Address box.
l Type an IP/Hostname.
l Type a Port.
l If you required authentication for proxy, type the proxy Username, Password, and
Confirm Password.
8. Click Save.
9. Create an Offense Rule to generate offenses for the offense rule. For steps on creating
offense rules, see the IBM QRadar SIEM documentation.
Configure QRadar with Tenable Vulnerability Management
Required Tenable Vulnerability Management User Role: Basic, VM Scan Operator, VM Standard, VM Scan
Manager, or Administrator
Complete the following steps to configure the Tenable App For QRadar to sync data from Tenable
Vulnerability Management to QRadar.
3. Click Admin.
b. In the Access Key box, enter the API access key for Tenable Vulnerability Management.
For information on generating API keys see the Generate API Key section in the Tenable
Vulnerability Management User Guide.
c. In the Secret Key box, enter the API secret key for Tenable Vulnerability Management.
For information on generating API keys see the Generate API Key section in the Tenable
Vulnerability Management User Guide.
d. In the Rule based Scan Name box, enter a scan name that exists in Tenable Vulnerability
Management.
Note: If a scan does not exist, you must create one. The scan needs to be associated to the
Tenable user that Qradar logs into the Tenable product with. This scan is used for the rule-
based scan function.
e. In the Right Click Scan Name box, enter a scan name that exists in Tenable Vulnerability
Management.
Note: If a scan does not exist, you must create one. The scan needs to be associated to the
Tenable user that Qradar logs into the Tenable product with. This scan is used for the right-
click scan function.
Note: This scan can be the same as the Rule Based Scan Name.
f. In the Authorized Service Token box, enter your QRadar authorized service token.
Authorized tokens are found under User Management in the Authorized Services
section.
See the IBM QRadar SIEM website for steps on creating an authorized service token.
l Type an IP/Hostname.
l Type a Port.
l If you required authentication for proxy, type the proxy Username, Password, and
Confirm Password.
8. Click Save.
9. Create an Offense Rule to generate offenses for the offense rule. For steps on creating
offense rules, see the IBM QRadar SIEM documentation.
Install the OT Security Log Extension for QRadar
In order to integrate OT Security with your QRadar system, you need to download the OT Security
extension from the IBM X-Force Exchange and install it.
3. In the Extension Management window, click Add and select the TenableotCustom_ext archive
file.
4. Select the Install Immediately checkbox to install the extension immediately. Before the
extension is installed, a preview list of the content items is displayed.
What to do next:
l Configure QRadar with Tenable.ot Security
Overview
OT Security enables operational engineers and cybersecurity personnel to gain visibility into, and
control over, Industrial Control System (ICS) networks. Through its policies and alerts mechanism,
OT Security generates real-time alerts that are accurate, actionable, and customized for each
network and its unique needs. OT Security detects unauthorized changes made to industrial
processes in ICS networks. It can produce various alerts on changes in the configuration of
controllers (PLC, DCS, IED), details, communications, and alert on a range of network attack vectors
that may threaten industrial processes. OT Security also actively verifies the controllers’
configuration and alerts on changes made to them. OT Security reports these alerts to QRadar via
Syslog. For each individual policy, users can decide whether an alert should be sent to QRadar via
Syslog; this offers them maximum control over which information is being sent.
To configure QRadar with OT Security you must create a log source through the Log Source
Management application for ingesting data from the Tenable platform.
Complete the following steps to configure the OT Security App For QRadar v2.0:
6. In the Configure Protocol Parameters section, enter the Log Source Identifier. This Identifier
is the hostname/IP address from the data to be forwarded.
7. Click Finish.
What to do next:
l Send Alerts to QRadar
Send OT Security Alerts to QRadar
In order to send OT Security alerts to QRadar, you first need to configure OT Security for your
QRadar system. Then, for each relevant policy, you can specify QRadar as a target for receiving
alerts.
1. In the OT Security console, under Local Settings, go to the Servers > Syslog Servers screen.
2. Click + Add Syslog Server. The Syslog Server configuration window is displayed.
3. In the Server Name field, enter a name for your QRadar system.
6. In the Transport field, select from the drop-down list the transport protocol to be used.
(Options are TCP or UDP)
7. Click Send Test Message to send a test message to verify that the configuration was
successful, and check if the message has arrived. If the message did not arrive, then
troubleshoot to discover the cause of the problem and correct it.
8. Click Save.
3. On the Policy Actions page, under Syslog, select your QRadar system.
4. Click Create (or Save if you are editing a Policy).
1. On the Policies screen, select the check box next each of the desired Policies.
2. Click on the Bulk Actions menu and select Edit from the drop-down list.
3. The Bulk Edit screen is shown with the Policy Actions available for bulk editing.
4. Under Syslog, select the check box next to your QRadar system.
5. Click Save.
3. In the Extension Management window, click Add and select the TenableadCustom_ext
archive file.
Before the extension is installed, a preview list of the content items appears.
What to do next:
l Configure QRadar with Tenable Identity Exposure Security
Overview
Tenable Identity Exposure features allow users to anticipate threats, detect breaches, and respond
to incidents and attacks. Through its policies and alerts mechanism, Tenable Identity Exposure
generates real-time alerts that are accurate, actionable, and customized for each network and its
unique needs. Tenable Identity Exposure reports these alerts to QRadar via Syslog. For each
individual policy, users can decide whether an alert should be sent to QRadar via Syslog; this offers
them maximum control over which information is being sent.
To configure QRadar with Tenable Identity Exposure you must create a log source through the Log
Source Management application for ingesting data from the Tenable platform.
Complete the following steps to configure the Tenable Identity Exposure App For QRadar:
6. In the Configure Protocol Parameters section, enter the Log Source Identifier. This Identifier
is the hostname/IP address from the data to be forwarded.
7. Click Finish.
What to do next:
l Send Alerts to QRadar
Send Tenable Identity Exposure Alerts to QRadar
In order to send Tenable Identity Exposure alerts to QRadar, you first need to configure Tenable
Identity Exposure for your QRadar system. Then, for each relevant policy, you can specify QRadar as
a target for receiving alerts.
5. In the Profiles box, click to select the profile to use for this Syslog alert (if applicable).
6. Send alerts when deviances are detected during the initial analysis phase: do one of the
following (if applicable):
o Select the checkbox: Tenable Identity Exposure sends out a large volume of email
notifications when a system reboot triggers alerts.
o Unselect the checkbox: Tenable Identity Exposure does not send out email notifications
when a system reboot triggers alerts.
7. Severity threshold: click the arrow of the drop-down box to select the threshold at which
Tenable Identity Exposure sends alerts (if applicable).
You can either click on the icon to use the search wizard or type a query expression
in the search box and click Validate. For more information, see Customize Trail Flow
Queries.
o Indicators of Exposure: If you set alerts to trigger on each deviance, click the arrow
next to each severity level to expand the list of Indicators of Exposure and select the
ones for which to send alerts.
o Indicators of Attack: If you set alerts to trigger on each attack, click the arrow next to
each severity level to expand the list of Indicators of Attack and select the ones for
which to send alerts.
o Health check status changes: Click Health Checks to select the health check type to
trigger an alert, and click Filter on selection.
9. Click the Domains box to select the domains for which Tenable Identity Exposure sends out
alerts.
A message confirms that Tenable Identity Exposure sent a Syslog alert to the server.
A message confirms that Tenable Identity Exposure created the Syslog alert.
2. In the list of Syslog alerts, hover over the one you want to modify and click the icon at the
end of the line.
4. Click Edit.
2. In the list of Syslog alerts, hover over the one you want to delete and click the icon at the
end of the line.
3. Click Delete.
A background script runs periodically to launch scans on the IP address. The default time for run is
1200 seconds.
Complete the following steps to create a rule in your Tenable application for IBM QRadar SIEM .
To create a rule:
2. Click Offenses.
6. Click Next.
Note: If you experience difficulties with user interface elements, problems may exist with your
browser. Try again from a different browser.
A drop-down appears.
Caution: Without the Ensure the detected event is part of an offense and Add to a Reference Set
settings enabled, QRadar cannot create an event in the All Offenses category of the Offenses tab of
the dashboard. The All Offenses category is where you can review the vulnerabilities you set the
rules for.
Note:
If you want to launch a scan for source IP and destination for both Tenable Vulnerability
Management and Tenable Security Center, you must create four rules:
l Scan source IP with Tenable Vulnerability Management
l Scan source IP with Tenable Security Center
l Scan destination IP with Tenable Vulnerability Management
l Scan destination IP with Tenable Security Center.
Tip: You can check your active scans launched from the IBM QRadar SIEM integration in the Tenable App
Dashboard tab in the QRadar user interface.
Configure Right-Click Scanning
QRadar users and administrators can initiate a scan against an IP address by right-clicking on it. In
the right-click menu, two buttons, “Tenable.sc scan” and “Tenable.io scan”, initiate a scan against
that IP on Tenable Security Center or Tenable Vulnerability Management. The user can see the
latest scan status of the initiated scan in the dashboard.
1. In the QRadar dashboard, click the Log Activity tab in the upper-left.
A Tenable Scan Details pop-up window opens and the scan initiates.
After successfully initiating, the pop-up window shows information such as:
Scan Name, Scan ID, Scan Description, Scan Result ID or History ID, Platform, IP Address, and
Scan Status.
Tip: You can check your active scans launched from the IBM QRadar SIEM integration in the Tenable App
Dashboard tab in the QRadar user interface.
View Offenses
After you create an offense rule, the offenses are added to the All Offenses table. Use the Tenable
IO: Vulnerability Summary and Tenable SC: Vulnerability Summary buttons to view enriched
offense data. Complete the following steps to view the offenses.
For additional information on viewing offenses, see the IBM QRadar SIEM documentation.
Uninstall
2. Click Admin.
5. Click Uninstall.
Troubleshooting
l After clicking the action buttons for Tenable Vulnerability Management or Tenable Security
Center, you get an alert with the message: “Check if the configuration page details are
filled."
This occurs if you did not configure an account on the Configuration page. See the Configure
QRadar with Tenable Vulnerability Management page for steps on how to configure an
account.
l Offense note shows the configuration error message: “Error while reading configurations.”
This can also occur if you upgraded the application to v2.0. from a previous version and you
did not reconfigure your files. If you did this, delete the configurations from the configurations
page and reconfigure the credentials.
d. In the top section, click Actions and select Collect Log Files.
f. Click the check box to select Debug Logs, Application Extension Logs, and Setup Logs.
Verify that you entered valid credentials for the configuration or proxy.
l New configuration shows the error message: “Failed due to network connection timeout or
Failed Proxy Authentication or invalid server address. Check logs for more details.”
This occurs when either the internet for the virtual machine (VM) is down, proxy
authentication needs more credentials to proceed, or the provided server address is Invalid.
Verify that the internet for your VM is operational, the entered proxy credentials are valid, and
the server address is correct.
l New configuration shows the error message: “401 - Authorization service token is not
valid.”
You entered an incorrect authorization service token. Enter the correct service token.
l An alert pop-up shows the error message: “Check if the configuration page details are
filled.”
Check that you correctly configured your Tenable Vulnerability Management or Tenable
Security Center account.
l An alert pop-up shows the error message “Failed due to network connection timeout or
Failed Proxy Authentication. Check logs for more details.”
This occurs when you have an internet connectivity problem on the VM or proxy
authentication failed. Verify the Internet is on and valid proxy credentials are entered.
l An alert pop-up shows the error message “Please enter a valid Address or configure valid
proxy settings or verify SSL certificate.”
If you have verified that the Address is set to the IP/FQDN of your Tenable Security Center
configuration, try disabling the Enable/Disable SSL Verification option and resubmitting. If
the error persists, open a case with Tenable Tech Support.
l An alert pop-up shows the error message “Failed due to invalid credentials or connection
error.”
This occurs when Tenable Vulnerability Management or Tenable Security Center credentials
are updated in the Tenable system, but the updates are not made in the QRadar configuration
page. Add the updated credentials to the configuration page.
l Container proxy settings were overridden, causing the application to stop working as
expected.
The configuration must be updated to allow the local proxy on the application to make
tunneled connections. For steps on updating the proxy connections, see the IBM QRadar
Support Documentation.
l An alert pop up shows the error message: "Failed to connect flask server."
When there are multiple IP addresses or multiple vulnerabilities for all of the IP addresses
present in the offense, it may take more than one minute to fetch vulnerability data from
Tenable and populate notes. The dashboard displays "Failed to connect flask server." If the
total time of initiating a scan exceeds one minute for Tenable Vulnerability Management and
Tenable Security Center both, the "Failed to connect flask server" message shows in the
backend.
The scan initiates and ingests the event with the scan status "In progress" in QRadar. You can
see this scan event in the dashboard.
6. Click Upload and select the modified XML file. Select Default Log Source Type as
Tenable.
7. Click Save.
l After upgrading from v2.0.0 (QRadar app framework v1 app) to v3.0.0 (QRadar app
framework v2), unable to launch scan, unable to populate offense notes in the back end.
There are multiple errors which contain the "EncryptionError" exception in the log files. To
check the logs:
1. Go to the Admin tab of the QRadar console. Open the configuration page and click the
Edit icon.
3. If that does not work, delete the configurations and save again.
Yes, rule base scan can initialize scan for multiple IPs.
l "Error while initiating socket connection with IBM QRadar” observed in log files.
This issue might be observed in QRadar v2 app framework (< v7.4.2 P2).
l Error message: "Unable to Launch scan. Error while creating socket connection with
Qradar. Check logs for more details."
This issue was observed when port 514 was not enabled in QRadar.
If the user is using self-signed certificates and keeping the SSL toggle button on and is
receiving “Please enter valid Address or configure valid proxy settings or verify SSL
certificate.” error messages in the user interface, the probable cause is that the SSL
certificate is not present on QRadar.
If you want to use self-signed SSL certificates for Tenable Security Center, before installing
the app (or upgrade from v2.0.0 app), perform the following steps:
2. Run the following commands at the SSH command line on the console.
l /opt/qradar/support/all_servers.sh -p /etc/pki/ca-
trust/source/anchors/<root_certificate> -r /etc/pki/ca-
trust/source/anchors
l /opt/qradar/support/all_servers.sh -C update-ca-trust
Continue with the standard installation steps. For more information, see the IBM
documentation.
If the app is already installed, restart the Docker container of the app:
4. From the configuration window, copy the app ID found within the URL. The app ID is the
number after /console/plugins/ within the URL. For example, if the URL is:
https://198.51.100.0/console/plugins/1062/app_proxy/index, copy the
number "1062."
To get into the Docker container, run the following commands on your QRadar instance via
SSH:
1. Run the command docker pson your Qradar instance via SSH.
2. Find the container ID of Tenable App. This is under the Image column containing the
previous copied number. For example, "qapp-1062."
3. To open the docker, run the command docker exec -it <container-id>
/bin/bash.
2. Run the following query in Log Activity to see if there are any scans initiated:
3. If this query result returns the events, open any event and check if all of the CEPs are
getting extracted. If the query returns nothing, or CEPs are not getting parsed, check
the After upgrading from v2.0.0 (QRadar app framework v1 app) to v3.0.0 (QRadar app
framework v2), unable to launch scan, unable to populate offense notes in the back end.
troubleshooting topic in this document.
l You have scanned an IP address once and are trying to scan the same IP again, but Scan
Result ID is not updated for the second scan.
4. Open QRadar.
5. Save the configuration with the newly created and launched scan on Tenable
Vulnerability Management.
6. You can now launch the right-click scan for Tenable Vulnerability Management.