Tenable Vulnerability Management Logs

Connecting Tenable Vulnerability Management logs in your Panther Console

Overview

Panther supports pulling vulnerability logs directly from Tenable.

How to onboard Tenable Vulnerability Management logs to Panther

To onboard Tenable logs, you will generate an API key in Tenable, then set up a source in Panther.

Step 1: Create an API key in Tenable

  1. Log in to Tenable.

  2. Click Settings > My Account.

  3. Click API Keys > Generate > Continue.

    • Make note of your access key and secret key, as you will use them in the next step.

Step 2: Create a Tenable Log Source in Panther

  1. In the left-side navigation bar of your Panther Console, click Configure > Log Sources.

  2. Click Create New.

  3. Search for "Tenable Nessus," then click its tile.

  4. Enter a descriptive name, then click Setup.

  5. Enter the Access Key and Secret Key you generated in the previous step.

  6. Click Setup. You will be directed to a success screen:

    • You can optionally enable one or more Detection Packs.

    • The Trigger an alert when no events are processed setting defaults to YES. We recommend leaving this enabled, as you will be alerted if data stops flowing from the log source after a certain period of time. The timeframe is configurable, with a default of 24 hours.

Supported log types

Tenable.Vulnerability

The following defines the Tenable Vulnerability log schema:

schema: Tenable.Vulnerability
description: Vulnerability logs from Tenable.io
referenceURL: https://developer.tenable.com/reference/exports-vulns-download-chunk
fields:
  - name: asset
    type: object
    description: Information about the asset where the scan detected the vulnerability.
    fields:
      - name: agent_uuid
        type: string
        description: The UUID of the agent that performed the scan where the vulnerability was found.
      - name: bios_uuid
        type: string
        description: The BIOS UUID of the asset where the vulnerability was found.
      - name: device_type
        type: string
        description: The type of asset where the vulnerability was found.
      - name: fqdn
        type: string
        indicators: [hostname]
        description: The fully-qualified domain name of the asset where a scan found the vulnerability.
      - name: hostname
        indicators: [hostname]
        type: string
        description: The host name of the asset where a scan found the vulnerability.
      - name: uuid
        type: string
        description: The UUID of the asset where a scan found the vulnerability.
      - name: ipv6
        type: string
        indicators: [ip]
        description: The IPv6 address of the asset where a scan found the vulnerability.
      - name: ipv4
        indicators: [ip]
        type: string
        description: The IPv4 address of the asset where a scan found the vulnerability.
      - name: last_authenticated_results
        type: timestamp
        timeFormats: [rfc3339]
        description: The last date credentials were used successfully to scan the asset.
      - name: last_unauthenticated_results
        type: timestamp
        timeFormats: [rfc3339]
        description: The last date when the asset was scanned without using credentials
      - name: mac_address
        indicators: [mac]
        type: string
        description: The MAC address of the asset where a scan found the vulnerability.
      - name: netbios_name
        type: string
        description: The NETBIOS name of the asset where a scan found the vulnerability.
      - name: netbios_workgroup
        type: string
        description: The NETBIOS workgroup of the asset where a scan found the vulnerability.
      - name: operating_system
        type: json
        description: The operating system of the asset where a scan found the vulnerability.
      - name: network_id
        type: string
        description: The ID of the network object associated with scanners that identified the asset. The default network ID is 00000000-0000-0000-0000-000000000000. For more information about network objects, see Manage Networks.
      - name: tracked
        type: boolean
        description: A value specifying whether Tenable.io tracks the asset in the asset management system. Tenable.io still assigns untracked assets identifiers in scan results, but these identifiers change with each new scan of the asset. This parameter is relevant to PCI-type scans and in certain cases where there is not enough information in a scan to identify the asset. Untracked assets appear in the scan history, but do not appear in workbenches or reports.
  - name: output
    type: string
    description: The text output of the Nessus scanner.
  - name: plugin
    type: json
    description: Information about the plugin that detected the vulnerability.
  - name: port
    type: json
    description: Information about the port the scanner used to connect to the asset.
  - name: recast_reason
    type: string
    description: The text that appears in the Comment field of the recast rule in the Tenable.io user interface.
  - name: recast_rule_uuid
    type: string
    description: The UUID of the recast rule that applies to the plugin.
  - name: scan
    type: json
    description: Information about the latest scan that detected the vulnerability.
  - name: severity
    type: string
    description: The severity of the vulnerability as defined using the Common Vulnerability Scoring System (CVSS) base score. Possible values include info (CVSS score of 0), low (CVSS score between 0.1 and 3.9), medium (CVSS score between 4.0 and 6.9), high (CVSS score between 7.0 and 9.9), and critical (CVSS score of 10.0).
  - name: severity_id
    type: string
    description: |
      The code for the severity assigned when a user recast the risk associated with the vulnerability. Possible values include:
      0—The vulnerability has a CVSS score of 0, which corresponds to the "info" severity level.
      1—The vulnerability has a CVSS score between 0.1 and 3.9, which corresponds to the "low" severity level.
      2—The vulnerability has a CVSS score between 4.0 and 6.9, which corresponds to the "medium" severity level.
      3—The vulnerability has a CVSS score between 7.0 and 9.9, which corresponds to the "high" severity level.
      4—The vulnerability has a CVSS score of 10.0, which corresponds to the "critical" severity level.
  - name: severity_default_id
    type: string
    description: The code for the severity originally assigned to a vulnerability before a user recast the risk associated with the vulnerability. Possible values are the same as for the severity_id attribute.
  - name: severity_modification_type
    type: string
    description: |
      The type of modification a user made to the vulnerability's severity. Possible values include:
      none—No modification has been made.
      recasted—A user in the Tenable.io user interface has recast the risk associated with the vulnerability.
      accepted—A user in the Tenable.io user interface has accepted the risk associated with the vulnerability.
  - name: first_found
    type: timestamp
    isEventTime: true
    required: true
    description: The ISO date when a scan first detected the vulnerability on the asset.
    timeFormats:
      - rfc3339
  - name: last_found
    type: timestamp
    isEventTime: true
    required: true
    description: The ISO date when a scan last detected the vulnerability on the asset.
    timeFormats:
      - rfc3339
  - name: last_fixed
    type: timestamp
    description: The ISO date when a scan no longer detects the previously detected vulnerability on the asset.
    timeFormats:
      - rfc3339
  - name: state
    type: string
    description: |
      The state of the vulnerability as determined by the Tenable.io state service. Possible values include:
      open—The vulnerability is currently present on an asset.
      reopened—The vulnerability was previously marked as fixed on an asset, but has been detected again by a new scan.
      fixed—The vulnerability was present on an asset, but is no longer detected.
  - name: indexed
    type: timestamp
    description: The date and time (in Unix time) when the vulnerability was indexed into Tenable.io.
    timeFormats:
      - rfc3339
      - unix

Last updated