Tenable Security Center-User Guide
Tenable Security Center-User Guide
x User Guide
Last Revised: June 24, 2024
Copyright © 2024 Tenable, Inc. All rights reserved. Tenable, Tenable Nessus, Tenable Lumin, Assure, and the Tenable logo are registered trademarks of Tenable, Inc. or its affiliates. All other
products or services are trademarks of their respective owners.
Table of Contents
Requirements 28
Hardware Requirements 29
Cloud Requirements 31
System Requirements 37
License Requirements 47
Port Requirements 56
Browser Requirements 62
-2-
Quick Setup 66
User Access 80
User Roles 84
Organizations 94
Add an Organization 99
Groups 103
-3-
User Accounts 107
-4-
Configure SAML Authentication Automatically via the User Interface 156
Configure Tenable Security Center to Allow SSL Client Certificate Authentication 170
Search 176
-5-
Disable Picture in Picture 202
Notifications 221
-6-
Upload the Custom Plugin Package 231
Resources 258
-7-
Download Tenable Nessus Scanner Logs 276
Repositories 289
-8-
External Repositories 318
Assets 349
-9-
Export Hosts 362
Credentials 367
Informix/DRDA 376
MySQL 376
PostgreSQL 378
MongoDB 381
- 10 -
Windows Credentials 429
Host 511
Miscellaneous 512
- 11 -
Share or Revoke Access to a Scan Policy 533
Tags 568
- 12 -
Remove or Delete a Tag 569
Dashboards 571
- 13 -
Manage Scan Results 610
CVSS 628
- 14 -
Web App Scanning Analysis Tools 665
Reports 694
- 15 -
Configure a Table Element in a Report 725
- 16 -
Report Images 751
Filters 765
Queries 771
Alerts 778
- 17 -
View Alert Details 784
Tickets 789
- 18 -
File and Process Allow List 808
Offline Plugin and Feed Updates for Tenable Security Center 826
Configure Tenable Nessus + Tenable Web App Scanning for Tenable Security Center
Offline 834
Troubleshooting 835
- 19 -
Welcome to Tenable Security Center
This user guide describes how to install, configure, and manage Tenable Security Center™ 6.3.x.
For additional information on Tenable Security Center, review the following customer education
materials:
1. Prepare
2. Install
3. Configure Scans
4. Refine
5. Expand
Tip: For additional information on Tenable Security Center, review the following customer education
materials:
Prepare
- 20 -
Before you begin, learn about Tenable Security Center and establish a deployment plan and analysis
workflow to guide your configurations.
l Access Tenable Support and training resources for Tenable Security Center, including:
l Design a deployment plan by identifying your organization's objectives and analyzing your
network topology. Consider Tenable-recommended best practices for your environment. For
more information about environment requirements, see Requirements. For information about
scan types, see Scanning Overview.
l Design an analysis workflow. Identify key stakeholders in your management and operational
groups, considering the data you intend to share with each stakeholder.
For more information about planning a large enterprise deployment of Tenable Security Center, see
the Tenable Security Center Large Enterprise Deployment Guide.
For more information about the basic architecture of a Tenable Security Center deployment, see
Tenable Security Center Architecture.
Install
Install Tenable Security Center and perform initial configuration.
1. Depending on your environment, install in your environment or deploy or install with Tenable
Core.
For complete information about Tenable Core + Tenable Security Center, see the Tenable
Core User Guide.
l Upload licenses
l Configure one Tenable Nessus Network Monitor scanner (requires a Tenable Nessus
Network Monitor activation license)
- 21 -
l Configure one Tenable Log Correlation Engine server (requires an Tenable Log
Correlation Engine® activation license)
l Create one administrator user account and one security manager account
Tenable recommends following the quick setup wizard, but you can configure these features
later. For example, do not configure LDAP until you have easy access to all necessary LDAP
parameters.
3. Configure SMTP settings, as described in The Mail option designates SMTP settings for all
email-related Tenable Security Center functions. Available options include SMTP host, port,
authentication method, encryption, and return address. In addition, you can use the Test
SMTP Settings in the upper left corner of the page to validate the settings..
7. Configure security settings (e.g., password complexity requirements and custom banners), as
described in Use the Security section to define the Tenable Security Center user interface
login parameters and options for account logins. You can also configure banners, headers,
and classification headers and footers..
Configure Scans
Configure and run basic scans to begin evaluating the effectiveness of your deployment plan and
analysis workflow.
- 22 -
1. Configure credentials, as described in Credentials.
2. Create static assets, as described in Add a Custom Asset. For more information about asset
types, see Assets.
3. Configure a Host Discovery policy and a Basic Network Scan policy from Tenable-provided
scan policy templates, as described in Add a Scan Policy.
4. Configure and run scans for those policies, as described in Add an Active Scan and Add an
Agent Scan.
5. Confirm that the scans can access all areas of your network with no credential issues.
7. When the scans complete, create template-based dashboards and reports, as described in
Dashboards and Reports.
Tenable recommends frequently reviewing your scan results and scan coverage. You may need to
modify your scan configurations to suit your organization's objectives and reach all areas of your
network.
Refine
Configure other features, if necessary, and refine your existing configurations.
l Create additional user accounts and share objects with users, as described in User Accounts.
l Create dynamic assets and combination assets, as described in Add a Custom Asset. For
more information about asset types, see Assets.
- 23 -
l Review the plugin update schedule, as described in Edit Plugin and Feed Settings and
Schedules. Consider editing the schedules to suit your needs. For example, you may want to
schedule plugin and feed updates to run a few hours before your scheduled scans.
l Add queries and use filters, as described in Add or Save a Query and Apply a Filter.
l Configure alerts, ticketing, accept risk rules, and recast risk rules, as described in Workflow
Actions.
l View vulnerability data and use the built-in analysis tools, as described in Vulnerability
Analysis.
Expand
Review and mature your deployment plan and analysis workflow.
l Conduct weekly management meetings to oversee your teams executing the analysis
workflow.
l Review your scan results and scan coverage. You may need to modify your scan
configurations to suit your organization's objectives and reach all areas of your network.
l Optimize and operationalize your custom dashboards to meet the needs of individual user
account holders.
l Optimize and operationalize your custom reports to prepare them for distribution.
l Consider configuring API integrations, as described in the Tenable Security Center API Guide
and the Tenable Security Center API Best Practices Guide.
l Consider synchronizing Tenable Security Center with Tenable Lumin to take advantage of
Cyber Exposure features, as described in Tenable Lumin Synchronization.
- 24 -
Physical Architecture
At a high level, a Tenable Security Center deployment has two parts:
l A central Tenable Security Center console to manage scans, reports, user access, and other
application tools.
l One or more scanners to collect data and report results to the Tenable Security Center
console.
Logical Architecture
Tenable Security Center is divided into organizations. Each organization has access to one or more
repositories that store scan data. For example, users in Organization 1 can only see repositories
that are assigned to Organization 1, however, a repository can be assigned to more than one
organization.
The highest-level user in an organization is the Security Manager. For more information about user
permissions, see User Roles.
Very broadly, the logical layout / architecture of Tenable Security Center looks like this:
- 25 -
Many environments have just one organization. The following are some common use cases for
multiple organizations:
l Environments where there are multiple departments or entities in a business that are logically
independent, but that are all governed by the same structure.
l Acquisitions – there may be a reason to keep the acquiring company and acquired company
separate.
Architecture
You must deploy a Tenable Security Center and a set of scanners within each air-gapped network.
- 26 -
If you want to consolidate data from other networks with the data generated in your air-gapped
network, you can use offline repositories to export data from your air-gapped Tenable Security
Center to your other instance of Tenable Security Center. This supports both consolidated and
federated reporting structures.
Note: A few plugins require internet access and cannot run in an air-gapped environment. For example,
Tenable Nessus plugin 52669 checks to see if a host is part of a botnet.
After you perform a plugin update or feed update, verify the files as described in the knowledge
base article.
Tip: You can use the API to automate some Tenable Security Center upgrade and plugin update
process.
l Tenable Security Center upgrade: Compare the download checksum with the checksum
on the Tenable downloads page
- 27 -
If you deployed Tenable Nessus Manager to manage Tenable Nessus Agents in an air-gapped
environment, perform an offline software update (nessus-agent-updates-X.X.X.tar.gz on the
Tenable Downloads site) on your Tenable Nessus Manager. Tenable Nessus Manager pushes the
update to the managed Tenable Nessus Agents.
Requirements
You can run Tenable Security Center in the following environments.
Hardware
For general information about other requirements to run Tenable Security Center, see:
Hardware Requirements
Cloud Requirements
System Requirements
License Requirements
Port Requirements
Browser Requirements
- 28 -
Hardware Requirements
You can run Tenable Security Center on hardware, with or without Tenable Core. For more
information about Tenable Core, see the Tenable Core User Guide.
Note:Tenable strongly discourages running Tenable Security Center or Tenable Core + Tenable Security
Center in an environment shared with other Tenable applications.
Storage Requirements
Tenable recommends installing Tenable Security Center on direct-attached storage (DAS) devices
(or storage area networks [SANs], if necessary) with a storage latency of 10 milliseconds or less.
Tenable does not support installing Tenable Security Center on network-attached storage (NAS).
An important consideration is that Tenable Security Center can be configured to save a snapshot of
vulnerability archives each day. In addition, the size of the vulnerability data stored by Tenable
Security Center depends on the number and types of vulnerabilities, not just the number of hosts.
For example, 100 hosts with 100 vulnerabilities each could consume as much data as 1,000 hosts
with 10 vulnerabilities each. In addition, the output for vulnerability check plugins that do directory
listings, etc. is larger than Open Port plugins from discovery scans.
For networks of 35,000 to 50,000 hosts, Tenable has encountered data sizes of up to 25 GB. That
number is based on storage of 50,000 hosts and approximately 500 KB per host.
Additionally, during active scanning sessions, large scans, and multiple smaller scans have been
reported to consume as much as 150 GB of disk space as results are acquired. Once a scan has
completed and its results are imported, that disk space is freed up.
- 29 -
# of Hosts Managed by Tenable CPU Disk Space used for
Memory
Security Center Cores Vulnerability Trending
Requirements When Running Basic Network Scans + Local Checks + 1 Configuration Audit
Note: Tenable Security Center is a memory and disk I/O-intensive application. If you deploy Tenable
Security Center in a virtualized infrastructure, take care to avoid running Tenable Security Center in a
manner in which it may attempt to draw on oversubscribed resources, especially memory and disk I/O.
Refer to your vendor-specific virtualized infrastructure documentation for guidance on optimizing virtual
- 30 -
infrastructure resource allocation, such as Best Practices for Oversubscription of CPU, Memory and Storage in
vSphere Virtual Environments for VMware.
Tenable strongly recommends using high-performance disks. Tenable Security Center is a disk-
intensive application and using disks with high read/write speeds, such as SSDs, results in the best
performance.
If required disk space exists outside of the /opt file system, mount the desired target directory
using the command mount –-bind <olddir> <newdir>. Make sure that the file system is
automatically mounted on reboot by editing the /etc/fstab file appropriately.
Note: Tenable Security Center does not support using symbolic links for /opt/sc/. You can use symbolic
links within /opt/sc/ subdirectories if instructed by Tenable Security Center documentation or Tenable
Support.
Deploying Tenable Security Center on a server configured with RAID disks can also dramatically
boost performance.
Tip:Tenable does not require RAID disks for even our largest customers. However, in one instance,
response times for queries with a faster RAID disk for a customer with more than 1 million managed
vulnerabilities moved from a few seconds to less than a second.
Gigabit or faster network cards are recommended for use on the Tenable Security Center server.
This is to increase the overall performance of web sessions, emails, Tenable Log Correlation Engine
queries, and other network activities.
Cloud Requirements
- 31 -
The primary method to deploy Tenable Security Center in a cloud environment is with Tenable Core
+ Tenable Security Center. For more information, see the Tenable Core User Guide.
However, you can install Tenable Security Center in vendor-supported version of your cloud
environment that meets the operating system requirements to run Tenable Security Center.
The following guidelines can help you install Tenable Security Center in an Amazon Elastic Compute
Cloud (Amazon EC2) cloud-based environment or an Azure Virtual Machine (Azure Virtual Image)
cloud-based environment, but they do not cover all deployment scenarios or cloud environments.
For assistance with a different cloud environment, contact Tenable Professional Services.
Tenable Security Center uses a balance of networking and compute resources and requires
persistent storage for proper operation. To meet these requirements, Tenable supports installing
Tenable Security Center on M5 instances with General Purpose SSD (gp2) EBS storage.
Tenable recommends the following Amazon EC2 instance types based on your Tenable Security
Center deployment size.
- 32 -
2,501 to 10,000 m5.4xlarge 90 days: 450 GB
180 days: 9 TB
50,001 or more For assistance with large enterprise deployments greater than
50,000 active IP addresses, contact your Tenable representative.
Requirements When Running Basic Network Scans + Local Checks + 1 Configuration Audit
180 days: 18 TB
50,001 or more For assistance with large enterprise deployments greater than
50,000 active IP addresses, contact your Tenable representative.
- 33 -
Tenable provides an AMI for Tenable Core, but not for other cloud deployments without Tenable
Core. Tenable supports using the following Amazon Marketplace AMI for Tenable Security Center
without Tenable Core:
CentOS 7 (x86_ l This AMI does not include Java, but Tenable Security Center requires
64) - with OpenJDK or the Oracle Java JRE to export PDF reports.
Updates HVM
You must install OpenJDK or the Oracle Java JRE onto your AMI before
hosting Tenable Security Center. For more information, see
Dependencies.
You must use the SELinux sealert tool to identify errors and
solutions. For more information, see Customize SELinux Enforcing
Mode Policies for Tenable Security Center.
l You must confirm this AMI meets all other standard requirements for
operating systems. For more information, see Operating System
Requirements.
Tenable recommends the following virtual machine instance types based on your Tenable Security
Center deployment size. You may need to increase the storage allocated to the virtual machine
instance depending on usage.
- 34 -
180 days: 250 GB
180 days: 9 TB
50,001 or more For assistance with large enterprise deployments greater than
50,000 active IP addresses, contact your Tenable representative.
Requirements When Running Basic Network Scans + Local Checks + 1 Configuration Audit
180 days: 18 TB
50,001 or more For assistance with large enterprise deployments greater than
50,000 active IP addresses, contact your Tenable representative.
- 35 -
Tenable provides an Azure image for Tenable Core, but not for other cloud deployments without
Tenable Core. Tenable supports using the following Azure image for Tenable Security Center:
CIS CentOS l This image does not include Java, but Tenable Security Center requires
Linux 7 OpenJDK or the Oracle Java JRE to export PDF reports.
Benchmark L1
You must install OpenJDK or the Oracle Java JRE onto your image
before hosting Tenable Security Center. For more information, see
Dependencies.
You must use the SELinux sealert tool to identify errors and
solutions. For more information, see Customize SELinux Enforcing
Mode Policies for Tenable Security Center.
l You must confirm this image meets all other standard requirements for
operating systems. For more information, see Operating System
Requirements.
Tenable strongly recommends using high-performance disks when you deploy Tenable Security
Center in a Kubernetes cluster. Tenable Security Center is a disk-intensive application and using
disks with high read/write speeds (for example, SSDs or NVMe SSDs) results in the best
performance. The requirements in the following tables are based on AWS M5 or better processor
specifications. Using slower processors, like those found in AWS M5a instances, will impact
performance for your Tenable Security Center in Kubernetes deployment.
For supported Kubernetes environments and installation instructions, see Tenable Security Center
in Kubernetes.
- 36 -
# of Hosts Managed by Tenable Disk Space used for
CPU Memory
Security Center Vulnerability Trending
180 days: 9 TB
Requirements When Running Basic Network Scans + Local Checks + 1 Configuration Audit
180 days: 18 TB
System Requirements
- 37 -
l Operating System Requirements
l SELinux Requirements
l Dependencies
l CentOS 7, 64-bit
SELinux Requirements
Tenable Security Center supports disabled, permissive, and enforcing mode Security-Enhanced
Linux (SELinux) policy configurations.
l Disabled and permissive mode policies typically do not require customization to interact with
Tenable Security Center.
l Enforcing mode policies require customization to interact with Tenable Security Center. For
more information, see Customize SELinux Enforcing Mode Policies for Tenable Security
Center.
Note: Tenable recommends testing your SELinux configurations before deploying on a live network.
- 38 -
Tenable recommends adhering to security best practices, including:
l Configure the operating system to ensure that security controls cannot be bypassed.
l Configure the network to ensure that the Tenable Security Center system resides in a secure
network segment that is not accessible from the Internet.
l Configure network time synchronization to ensure that accurate time stamps are recorded in
reports and log files.
Note: The time zone is set automatically during the installation process with no user interaction. The
time zone configured in php.ini must be synchronized with the system time zone in
/etc/sysconfig/clock.
l Configure access control to ensure that only authorized users have access to the operating
system platform.
l Monitor system resources to ensure that adequate disk space and memory are available, as
described in Hardware Requirements. If system resources are exhausted, Tenable Security
Center may not log audit data during system administrator troubleshooting or other activities.
For more information about troubleshooting resource exhaustion, see General Tenable
Security Center Troubleshooting.
For information about secure administration of a Red Hat installation, see the Red Hat Enterprise
Linux Security Guide for your version.
Note: As with any application, the security and reliability of the installation is dependent on the
environment that supports it. It is strongly recommended that organizations deploying Tenable Security
Center have an established and applied IT management policy that covers system administration integrity,
resource monitoring, physical security, and disaster recovery.
Dependencies
Note: Either OpenJDK or the Oracle Java JRE along with their accompanying dependencies must be
installed on the system along with any additional Java installations removed for reporting to function
properly.
Note: If you are running Tenable Security Center 5.20.0, you must upgrade pyTenable to version 1.4.2 or
later.
- 39 -
Note: Tenable does not recommend forcing the installation without all required dependencies. If your
version of Red Hat or CentOS is missing certain dependencies, it will cause problems that are not readily
apparent with a wide variety of functions. Tenable Support has observed different types of failure modes
for Tenable Security Center when dependencies are missing.
Note: To run Tenable Security Center 6.0.0, you must install binutils and initscripts. If you try to migrate
from an earlier version of Tenable Security Center to Tenable Security Center 6.0.0 on a system that does
not have binutils or initscripts installed, the migration will fail.
All dependencies must be installed on the system prior to installing the Tenable Security Center
package. While they are not all required by the installation RPM file, some functionality of Tenable
Security Center may not work properly if the packages are not installed.
Note: Tenable recommends using the latest stable production version of each package.
For a list of required packages, run the following command against the Tenable Security Center
RPM file:
- or -
To determine which version of a dependency is installed on your system, run the following
command for each of the packages (replace “libtool” with the appropriate package):
- or -
If one of the prerequisite packages is missing, it can be installed using the “yum” or “dnf” package
managers. For example, install Java 1.8.0 with “yum” using the command below:
- 40 -
Tenable Security Center Communications and Directories
The following table summarizes the components’ primary directories and communication methods.
Note: Tenable Security Center does not support using symbolic links for /opt/sc/. You can use symbolic
links within /opt/sc/ subdirectories if instructed by Tenable Security Center documentation or Tenable
Support.
Installation /opt/sc
Directory
For information about data encryption in Tenable Security Center, see Encryption Strength.
Tenable Support does not assist with customizing SELinux policies, but Tenable recommends
monitoring your SELinux logs to identify errors and solutions for your policy configuration.
- 41 -
l Install the SELinux sealert tool in a test environment that resembles your production
environment.
1. Run the sealert tool, where /var/log/audit/audit.log is the location of your SELinux
audit log:
sealert -a /var/log/audit/audit.log
The tool runs and generates a summary of error alerts and solutions. For example:
3. Restart Tenable Security Center, as described in Start, Stop, or Restart Tenable Security
Center.
4. Run the sealert tool again to confirm you resolved the error alerts.
Unlike /dev/urandom, /dev/random blocks HTTPS and SSL/TLS functions if there is not enough
entropy to perform the functions. The functions resume after the system generates enough
entropy.
Note: If /dev/random blocks during an installation or upgrade, the system waits up to 10 minutes for more
entropy to be generated before halting the operation.
Tenable does not recommend using /dev/random unless required by your organization.
- 42 -
To use /dev/random for random number data generation in Tenable Security Center:
1. Log in to Tenable Security Center via the command line interface (CLI).
export TSC_ENTROPY_CHECK=true
Tenable Security Center recognizes the environment variable and uses /dev/random.
What to do next:
l Install or upgrade Tenable Security Center in order for your changes to take effect, as
described in Install Tenable Security Center or Upgrade Tenable Security Center.
For Tenable Security Center installations where WAL is not enabled, enabling WAL may resolve
issues with excessive database locks. If your Tenable Security Center does not experience database
locking issues, Tenable recommends leaving your Tenable Security Center databases in the default
journaling mode.
Tenable strongly recommends performing a backup before converting database journaling modes
and performing regular backups after converting database journaling modes. For more information,
see Backup and Restore.
For general information about SQLite3 database journaling modes, see the SQLite3 documentation.
Note: If you previously converted one or more Tenable Security Center databases to WAL journaling mode
without using the convertDatabaseMode.php script, you must use the convertDatabaseMode.php
script to ensure your Tenable Security Center databases are fully converted to WAL journaling mode.
- 43 -
WAL Requirements
In addition to the requirements to run Tenable Security Center, your Tenable Security Center
installation must be running Tenable Security Center 5.19.x or later.
Databases Affected
Enabling or disabling WAL converts the database journaling mode for the following Tenable Security
Center databases:
l /opt/sc/application.db
l /opt/sc/hosts.db
l /opt/sc/jobqueue.db
l /opt/sc/plugins.db
l /opt/sc/remediationHierarchy.db
The convertDatabaseMode.php script only converts the database journaling mode for Tenable
Security Center databases that can significantly impact performance.
You can use the convertDatabaseMode.php script to enable write-ahead logging (WAL) journaling
mode for Tenable Security Center databases. Enabling WAL may resolve issues with excessive
database locks. If your Tenable Security Center does not experience database locking issues,
Tenable recommends leaving your Tenable Security Center databases in the default DELETE
journaling mode.
For more information, see Tenable Security Center Database Journaling Modes.
- 44 -
Before you begin:
l Confirm your Tenable Security Center installation meets the requirements to enable WAL. For
more information, see WAL Requirements.
To enable WAL:
1. Log in to Tenable Security Center via the command line interface (CLI).
2. Stop Tenable Security Center, as described in Start, Stop, or Restart Tenable Security Center.
3. In the CLI in Tenable Security Center, run the following command to start the
converDatabaseMode.php script:
4. If the script detects any running tns user processes, repeat the following steps for each tns
user process detected:
a. Follow the prompts in the error output to halt the tns user process.
Error! The Tenable Security Center process with PID '10135' is still running
and needs to be halted before this script can be executed successfully.
Command: /opt/sc/support/bin/php -f /opt/sc/daemons/Jobd.php
Bailing with 146.
Tenable Security Center converts supported databases to WAL journaling mode. For more
information, see Databases Affected.
5. Start Tenable Security Center, as described in Start, Stop, or Restart Tenable Security Center.
- 45 -
What to do next:
l Perform regular backups of Tenable Security Center, as described in Perform a Backup.
If you experience issues with write-ahead logging (WAL), disable WAL by reverting your Tenable
Security Center databases to DELETE journaling mode. For more information, see Tenable Security
Center Database Journaling Modes.
To disable WAL:
1. Log in to Tenable Security Center via the command line interface (CLI).
2. Stop Tenable Security Center, as described in Start, Stop, or Restart Tenable Security Center.
3. In the CLI in Tenable Security Center, run the following command to start the
converDatabaseMode.php script:
4. If the script detects any running tns user processes, repeat the following steps for each tns
user process detected:
a. Follow the prompts in the error output to halt the tns user process.
- 46 -
Error! The Tenable Security Center process with PID '10135' is still running
and needs to be halted before this script can be executed successfully.
Command: /opt/sc/support/bin/php -f /opt/sc/daemons/Jobd.php
Bailing with 146.
Tenable Security Center converts supported databases to DELETE journaling mode. For more
information, see Databases Affected.
5. Start Tenable Security Center, as described in Start, Stop, or Restart Tenable Security Center.
What to do next:
l Perform regular backups of Tenable Security Center, as described in Perform a Backup.
License Requirements
This topic breaks down the licensing process for Tenable Security Center as a standalone product.
It also explains how assets are counted, lists add-on components you can purchase, and describes
what happens during license overages or expirations.
l Tenable Security Center — Includes Tenable Nessus Network Monitor in discovery mode and
unlimited Tenable Nessus scanners.
l Tenable Security Center+ — Includes all of the above plus Tenable Nessus Network Monitor
with vulnerability detection and metrics such as Asset Exposure Score (AES) and Asset
Criticality Rating (ACR).
Tenable Security Center Director is available for both versions. Tenable Security Center Director is
an add-on with which you can manage multiple Tenable Security Center instances from one
location. For more information, see the Tenable Security Center Director User Guide.
- 47 -
Note: You cannot upgrade a Tenable Security Center license to a Tenable Security Center
Director license or downgrade a Tenable Tenable Security Center Director license to a Tenable
Security Center license.
When your environment expands, so does your asset count, so you purchase more licenses to
account for the change. Tenable licenses use progressive pricing, so the more you purchase, the
lower the per-unit price. For prices, contact your Tenable representative.
Note: Tenable offers simplified pricing to managed security service providers (MSSPs). To learn more,
contact your Tenable representative.
For example, if you purchase a 500 asset license, you can perform host discovery on your network,
but you cannot assess more than 500 assets. For more information about discovery and
assessment scanning, see Scanning Overview in the Tenable Security Center User Guide.
The following table explains when assets count towards your license.
- 48 -
Counted Towards Your License Not Counted Towards Your License
Included with
Version Add-on Component
Purchase
- 49 -
l Tenable Nessus l (Subscription-only) Additional consoles.
Network Monitor l (Subscription-only) Security Center Lab
in discovery
License.
mode.
l (Subscription-only) Tenable Lumin connector.
l Tenable Nessus
scanners. l Tenable Web App Scanning, to scan web
applications with a Tenable Nessus scanner in
l (Subscription-
Tenable Security Center. Scan up to your
only) The same
number of licensed fully qualified domain
number of on-
names (FQDNs). For more information, see
premises Tenable
Web App Scans in the Tenable Security Center
Nessus Agents as
User Guide.
your licensed
assets, provided Note: Tenable Security Center does not
on request. support web application scans in offline
and air-gapped deployments.
l Vulnerability
Probability Rating
Note: If you already have a Tenable
(VPR).
Security Center license and you upgrade to
Tenable Security Center version 6.2.x or
later, there are two ways to enable web
application scans. Either update your
Tenable Web App Scanning plugins
manually in Tenable Security Center or
wait for the nightly plugin update to run.
- 50 -
Tip: Synchronized assets that count
toward your Tenable Security Center
license also count toward your Tenable
Vulnerability Management license.
- 51 -
l (Subscription- application scans. Either update your
only) The same Tenable Web App Scanning plugins
number of on- manually in Tenable Security Center or
premises Tenable wait for the nightly plugin update to run.
Nessus Agents as
l (Subscription-only) Tenable Security Center
your licensed
Director.
assets, provided
on request. l (Perpetual-only) On-Premises Tenable Nessus
Agents, which Perpetual customers must
purchase separately.
Reclaiming Licenses
Tenable Security Center's license count updates when you delete a repository, run a license report,
or upload a new license. If you set assets to age out, they are removed during nightly cleanup. If you
configure your scan settings to remove unresponsive hosts, they are removed at scan import.
For more information, see License Count in the Tenable Security Center Best Practices Guide.
- 52 -
To allow for usage spikes due to hardware refreshes, sudden environment growth, or unanticipated
threats, you can temporarily exceed your licensed IP address count by 10%. If you exceed this
number, Tenable Security Center is disabled.
Tenable Security Center generates a warning in the user interface when you approach or exceed
the license limit. To monitor your license limit, use the Licensing Status widget, as described in
Overview Dashboard. To upgrade your license, contact your Tenable representative.
Expired Licenses
The Tenable Security Center licenses you purchase are valid for the length of your contract. 30 days
before your license expires, a warning appears in the user interface. During this renewal period,
work with your Tenable representative to add or remove products or change your license count.
After your license expires, your Tenable products and components are affected as follows:
l Tenable Security Center Console (Perpetual license) — The software remains fully functional.
All user data is accessible.
l Tenable Security Center Console (Subscription license) — To access the console, you must
enter a new license key. Once you enter a new license key, normal operation resumes.
l Tenable Nessus (Perpetual license) — When your maintenance period expires, plugin updates
are no longer available. After 90 days, Tenable Nessus stops working and you cannot perform
new scans. Because Tenable Security Center stops receiving feeds, the Tenable Nessus
scanners managed by Tenable Security Center no longer receive updates and also stop
working.
l Tenable Nessus Network Monitor (Perpetual license) — After 30 days with no updates, new
data is no longer processed.
l Tenable Log Correlation Engine — On the day of license expiration, new logs are no longer
processed.
- 53 -
To get a Tenable Security Center license key, enter the hostname of the installation machine in a
form on the Tenable Community site, as described in the Tenable Community Guide. You can also
email the key to licenses@tenable.com. In both cases, you receive a Tenable Security Center
license key to use when activating your products.
Tip: To obtain the hostname of the installation machine, in a system shell prompt, type
hostname .
Tip: To learn which Tenable sites to allow through your firewall, see the Tenable Knowledge
Base.
Note: For instructions to use in offline or air-gapped environments, see Offline Plugin and Feed
Updates for Tenable Security Center.
See the following topics for instructions to upload a new license key or update an existing one:
l Quick Setup — Upload a new Tenable Security Center license and add activation codes for any
attached products.
l Apply a New License — Upload a new license for attached Tenable products only.
l Update an Existing License — Update an existing Tenable Security Center license or existing
attached Tenable product licenses.
To apply a license for an additional Tenable product, add the license activation code. To update a
license for an existing Tenable product, see Update an Existing License.
For general information about licensing, see License Requirements. For information about adding a
license during quick setup, see Quick Setup.
To download Tenable Security Center, see the Tenable Security Center downloads page.
- 54 -
To apply a new Tenable Nessus, Tenable Nessus Network Monitor, or Log Correlation
Engine license:
4. Click the product box for the license you want to apply.
6. Click Register.
Tenable Security Center updates the page to reflect the activation code status:
Tip: Tenable rebranded Tenable Security Center Continuous View as Tenable Security Center+.
If you need to replace your Tenable Security Center or Tenable Security Center+ license or the
license activation code for your Tenable Nessus, Tenable Nessus Network Monitor, or Tenable Log
Correlation Engine license, update the license.
To apply a new license for another Tenable product for the first time, see Apply a New License.
You can update your Tenable Security Center license in an externally connected or air-gapped
environment. Tenable Security Center requires an internet connection to validate product licenses
for Tenable Nessus, Tenable Nessus Network Monitor, or Log Correlation Engine.
- 55 -
For instructions on how to install a Tenable Security Center patch, see Install a Tenable Security
Center Patch.
To download Tenable Security Center, see the Tenable Security Center Downloads page.
To update a license:
4. To replace your Tenable Security Center license, in the Tenable Security Center License
section:
b. Click Choose File and browse to the license file you want to upload.
5. To replace an activation code for an integrated product license, in the Activation Codes
section:
d. Click Register.
Tenable Security Center communicates with the Tenable product registration server to
validate your license activation code.
If the code is valid, Tenable Security Center applies the new license and initiates a
plugin download.
Port Requirements
- 56 -
Tenable Security Center port requirements include Tenable Security Center-specific and
application-specific requirements.
Inbound Traffic
Port Traffic
Performing the initial key push for remote repository synchronization with another
Tenable Security Center.
Outbound Traffic
- 57 -
Port Traffic
Inbound Traffic
Port Traffic
Outbound Traffic
Port Traffic
- 58 -
Port Traffic
Outbound Traffic
Port Traffic
Inbound Traffic
Port Traffic
Outbound Traffic
- 59 -
You must allow outbound traffic to the following ports.
Port Traffic
Inbound Traffic
Port Traffic
TCP 22 Communicating with Tenable Security Center for Log Correlation Engine event
query.
TCP 1243 Communicating with Tenable Security Center for Log Correlation Engine event
vulnerability import.
UDP 162 Communicating with SNMP server for receiving SNMP traps.
- 60 -
Port Traffic
TCP 1468 Communications between network devices and the Tenable Network Monitor.
TCP 9800 Communications between Splunk and the Log Correlation Engine Splunk Client.
TCP 18185 Communications between Check Point firewalls and the Log Correlation Engine
OPSEC Client.
UDP 514 Communications between network devices and the Tenable Network Monitor.
UDP 2055 Communications between routers and the Tenable NetFlow Monitor.
Outbound Traffic
Port Traffic
TCP 135 Communicating with the targets of the Log Correlation Engine WMI Monitor Client.
TCP 443 Communicating with the web host of the Log Correlation Engine Web Query Client.
TCP 445 Communicating with the targets of the Log Correlation Engine WMI Monitor Client.
- 61 -
Port Traffic
Browser Requirements
Note: Tenable recommends using the newest available version of your browser.
You can access the Tenable Security Center user interface using the following browsers:
Tip: Tenable Security Center versions 5.22 and later do not support Internet Explorer.
- 62 -
To perform an upgrade of Tenable Security Center, see Before You Upgrade and Upgrade Tenable
Security Center.
Note: A basic understanding of Linux is assumed throughout the installation, upgrade, and removal
processes.
Identify which services, if any, are listening on port 443 by running the following command:
If there are any services listening on port 443, you must either disable or run them on a different
port.
- 63 -
l All files in /opt/sc/support/logs matching *log
l /opt/sc/admin/logs/sc-error.log
Log files are rotated on a monthly basis. This file is owned by root/root.
Note: A basic understanding of Linux is assumed throughout the installation, upgrade, and removal
processes.
Caution: When performing sudo installs, use sudo –i to ensure the proper use of environmental variables.
Caution: During the installation process, Tenable Security Center produces a log file in a temporary
location: /tmp/sc.install.log. Once the installation process finishes, the file is stored here:
/opt/sc/admin/logs/install.log. Do not remove or modify these files; they are important for
debugging in case of a failed installation.
For information about new features, resolved issues, third-party product updates, and supported
upgrade paths, see the release notes for Tenable Security Center 6.3.x.
Note: If your Tenable Security Center will manage more than 10,000 active IPs, you must update the Apache
configuration file after you install and before you use Tenable Security Center.
- 64 -
l Complete system prerequisites, as described in Before You Install.
l Download the installation RPM file from the Tenable Security Center downloads page. If
necessary, depending on the operating system of the host, move the installation RPM file onto
the host.
l Confirm the integrity of the installation RPM file by comparing the download checksum with
the checksum on the Tenable Security Center downloads page, as described in the knowledge
base article.
1. On the host where you want to install Tenable Security Center, open the command line
interface (CLI).
- or -
- 65 -
Starting SecurityCenter services
[ OK ] SecurityCenter services: [ OK ]
#
The system installs the package into /opt/sc and attempts to start all required daemons and
web server services.
Tip: In rare cases, a system restart is required after installation in order to start all services. For
more information, see Start, Stop, or Restart Tenable Security Center.
What to do next:
l If you are scanning more than 10,000 hosts, update the Apache configuration file before using
Tenable Security Center.
Quick Setup
The Tenable Security Center Quick Setup Guide walks through the following configurations:
l License
l Repository
l Organization
l LDAP
l User
l Additional Settings
License
Upload your Tenable Security Center license and apply additional product licenses.
- 66 -
1. Click Choose File to upload the Tenable Security Center license file you received from
Tenable.
<CompanyName>_SC<IP Count>-<#>-<#>.key
2. Click Activate.
Activation Codes
l Tenable Security Center license activation code — required before adding any Tenable Nessus
scanners. The Tenable Security Center license activation code allows Tenable Security Center
to download plugins and update Tenable Nessus scanner plugins.
In the Tenable Nessus section, type the Tenable Security Center activation code and click
Register.
l Tenable Nessus Network Monitor license activation code — required before using and
managing attached Tenable Nessus Network Monitor scanners.
In the Tenable Nessus Network Monitor section, type the Tenable Nessus Network Monitor
activation code and click Register.
l Log Correlation Engine Activation Code — required before downloading Log Correlation Engine
Event vulnerability plugins to Tenable Security Center. The Log Correlation Engine Activation
Code allows Tenable Security Center to download event plugins, but it does not manage plugin
updates for Log Correlation Engine servers.
In the Log Correlation Engine section, type the Tenable Log Correlation Engine activation
code and click Register.
A plus (+) sign indicates that no license is applied for the product. A box with an X indicates an
invalid activation code. Click on the plus (+) or X to add or reset a license activation code.
A box with a checkmark indicates a valid license is applied and that Tenable Security Center
initiated a plugin download in the background.
- 67 -
The download may take several minutes and must complete before initiating any Tenable Nessus
scans. After the download completes, the Last Updated date and time update on the Plugins page.
l Agent Capable: If you use a Tenable Vulnerability Management or Tenable Nessus Manager
scanner for Tenable Nessus Agent scan imports, do not configure that scanner during the
Quick Start.
l Zones: If you want to grant scan zones access to this scanner, you must configure the Zones
option after the Quick Start.
l Repositories: If you want to select repositories to store the scanner's data, you must
configure the Repositories option after the Quick Start.
l Organizations: If you want to select organizations that can access the scanner's data, you
must configure the Organizations option after the Quick Start.
l Repositories: If you want to select repositories to store the scanner's data, you must
configure the Repositories option after the Quick Start.
- 68 -
Repository
You can configure your first local IPv4 or IPv6 repository.
Caution: When creating repositories, note that IPv4 and IPv6 addresses must be stored separately.
Additional repositories may be created once the initial configuration is complete.
Caution: When creating Tenable Security Center repositories, Tenable Log Correlation Engine event
source IP address ranges must be included along with the vulnerability IP address ranges or the event data
is not accessible from the Tenable Security Center UI.
Local repositories are based on the IP addresses specified in the IP Ranges option on this page
during the initial setup. Remote repositories use addressing information pulled over the network
from a remote Tenable Security Center. Remote repositories are useful in multi-Tenable Security
Center configurations where security installations are separate but reports are shared. Offline
repositories also contain addressing information from another Tenable Security Center. However,
the information is imported to the new installation via a configuration file and not via a direct
network connection. For information about how this works in air-gapped environments, see
Considerations for Air-Gapped Environments.
For information about the options you can configure, see Local Repositories. There are some
limitations on the repositories and repository options you can configure during Quick Start:
l Organizations: If you want to select organizations that can access the repository's data, you
must configure the Organizations option after the Quick Start.
- 69 -
l Log Correlation Engine Correlation: If you want to select Log Correlation Engine servers
where you want Tenable Security Center to retrieve data, you must configure the Log
Correlation Engine Correlation option after the Quick Start.
Organization
An organization is a set of distinct users and groups and the resources they have available to them.
For information about the options you can configure, see Organizations.
You can configure one organization during initial setup. If you want to use multiple organizations,
you must configure other organizations after the Quick Start.
LDAP
Configuring LDAP allows you to use external LDAP servers for the Tenable Security Center user
account authentication or as LDAP query assets. Type all required LDAP server settings and click
Next. Click Skip if you do not want to configure LDAP during initial configuration.
You can configure one LDAP server connection during initial setup. If you want to use multiple
LDAP servers, or if you want to configure additional options, you must continue configuring
LDAP after the Quick Start.
For information about the options you can configure, see LDAP Authentication.
User
You must create one administrator and one security manager during initial setup. For more
information, see User Roles.
l Security manager — a user to manage the organization you just created. After you finish initial
setup, the security manager can create other user accounts within the organization.
l Administrator — a user to manage Tenable Security Center. After you finish initial setup, the
administrator can create other organizations and user accounts.
If you already configured an LDAP server, you have the option to create an LDAP user account. For
more information about user account options, see User Accounts.
- 70 -
After creating the security manager user and setting the administrator password, click Next to
finish initial setup. The Admin Dashboard page appears, where you can review login configuration
data.
Additional Settings
The Enable Usage Statistics option specifies whether Tenable collects anonymous telemetry data
about your Tenable Security Center deployment.
When enabled, Tenable collects usage statistics that cannot be attributed to a specific user or
customer. Tenable does not collect personal data or personally identifying information (PII).
Usage statistics include, but are not limited to, data about your visited pages, your used reports and
dashboards, your Tenable Security Center license, and your configured features. Tenable uses the
data to improve your user experience in future Tenable Security Center releases. You can disable
this option at any time to stop sharing usage statistics with Tenable.
For more information about enabling or disabling this option after initial setup, see Configuration
Settings.
Review
The review page displays your currently selected configurations. If you want to make further
changes, click the links in the left navigation bar.
For information about new patches, see the release notes for Tenable Security Center.
Some patches are available through the Tenable Security Center feed. For more information, see
Configuration Settings.
- 71 -
1. Download the patch TGZ file from the Tenable downloads page. If necessary, depending on
the operating system of the host, move the upgrade TGZ file onto the host.
2. Confirm the integrity of the patch TGZ file by comparing the download checksum with the
checksum on the Tenable downloads page.
5. Run the following command to untar the patch file, where [patch file name] is the name of the
TGZ patch file you downloaded:
6. Run the following command to change the directory to the extracted directory, where
[directory] is the extracted directory:
cd [directory]
sh ./install.sh
The installation begins and Tenable Security Center stops. After the installation finishes,
Tenable Security Center automatically restarts.
8. (Optional) Confirm the patch successfully applied to Tenable Security Center, as described in
the knowledge base article.
- 72 -
4. On the Plugins/Feed Configuration page, in the Tenable Security Center Software Updates
section, enable the Enable Updates Through the Tenable Security Center Feed option.
During the next scheduled feed update, Tenable Security Center applies the patch. In the
Tenable Security Center Software Updates table, a timestamp appears in the row for the
patch in the Last Updated column.
Note: A basic understanding of Linux is assumed throughout the installation, upgrade, and removal
processes.
[WARNING] SecurityCenter has determined that Oracle Java JRE and OpenJDK is not
installed. One of two must be installed for SecurityCenter reporting to
function properly.
You must install the latest version of Oracle Java JRE or OpenJDK to take full advantage of Tenable
Security Center reporting.
- 73 -
Tenable recommends stopping all running Tenable Security Center processes before beginning an
upgrade. If processes are running (for example, Tenable Nessus scans), Tenable Security Center
displays the following message along with the related process names and their PIDs:
SecurityCenter has determined that the following jobs are still running. Please
wait a few minutes before performing the upgrade again. This will allow the
running jobs to complete their tasks.
Stop the processes manually or retry the upgrade after the processes complete.
Caution: During the upgrade process, Tenable Security Center produces a log file in a temporary location:
/tmp/sc.install.log. Once the installation process finishes, the file is stored here:
/opt/sc/admin/logs/install.log. Do not remove or modify these files; they are important for
debugging in case of a failed upgrade.
Caution: If your plugin set is more than 30 days old, the upgrade will fail. Ensure you have updated your
plugin set within the last 30 days before you upgrade Tenable Security Center.
For information about new features, resolved issues, third-party product updates, and supported
upgrade paths, see the release notes for Tenable Security Center 6.3.x.
- 74 -
These steps describe how to upgrade to the latest version of Tenable Security Center from a
previous version. You can also use these steps to upgrade from an early access version of Tenable
Security Center.
Note: If you are upgrading from Tenable Security Center version 6.2.1 or earlier to version 6.3.x or later, you
must update the Apache configuration file after you upgrade and before you use Tenable Security Center.
Note: Tenable recommends creating a backup of your Tenable Security Center data before
upgrading, as described in Perform a Backup.
2. Download the upgrade RPM file from the Tenable downloads page. If necessary, depending on
the operating system of the host, move the upgrade RPM file onto the host.
3. Confirm the integrity of the upgrade RPM file by comparing the download checksum with the
checksum on the Tenable downloads page.
l Use yum or dnf with the upgrade switch from the command line of the Tenable Security
Center server.
l Use “sudo -i” when performing sudo upgrades of Tenable Security Center to ensure
the proper use of environmental variables.
For example:
- 75 -
# yum upgrade SecurityCenter-x.x.x-el6.x86_64.rpm
- or -
The upgrade begins. Tenable Security Center is not available until the upgrade finishes.
What to do next:
l If you are upgrading from Tenable Security Center version 6.2.1 or earlier to Tenable Security
Center version 6.3.x or later, update the Apache configuration file before using Tenable
Security Center.
l (Optional) If you used custom Apache SSL certificates before upgrading Tenable Security
Center, restore the custom SSL certificates, as described in Restore Custom SSL Certificates.
- 76 -
If you used custom Apache SSL certificates before upgrading Tenable Security Center, you must
restore the custom Apache SSL certificates after you upgrade Tenable Security Center.
Tenable Security Center creates a backup of the certificates during the upgrade process. Tenable
Security Center copies the existing custom SSL certificates to the Apache configuration backup
directory that the upgrade process creates in the /tmp/[version].apache.conf-########
directory. The exact name of the directory varies, but the system displays the name during the
upgrade process and reports it in the /opt/sc/admin/log/install.log file.
1. Log in to Tenable Security Center via the command line interface (CLI).
# cp /tmp/[version].apache.conf-########/SecurityCenter.cert
/opt/sc/support/conf/SecurityCenter.crt
# cp /tmp/[version].apache.conf-########/SecurityCenter.pem
/opt/sc/support/conf/SecurityCenter.key
Caution: Ensure that the newly copied files have permissions of 0640 and ownership of tns:tns.
Tip: To obtain the CN, run the following command and note the CN= portion of the result.
- 77 -
# /opt/sc/support/bin/openssl verify /opt/sc/support/conf/SecurityCenter.crt
7. In the CLI in Tenable Security Center, run one of the following commands to restart the
Apache server:
# /opt/sc/support/bin/apachectl restart
-or-
Tenable Security Center 6.3.x updated the Apache web server configuration to resolve a memory
leak issue. When your Tenable Security Center instance meets the following criteria, you must
update some values in the Apache configuration file located at
/opt/sc/support/conf/mpm.conf:
l Your Tenable Security Center instance manages more than 10,000 active IPs.
-or-
l You are upgrading from Tenable Security Center version 6.3.x or later from version 6.2.1 or
earlier.
For Tenable Security Center instances managing fewer than 10,000 active IPs, the default settings
in the Apache configuration file are sufficient.
- 78 -
1. Navigate to the Apache configuration file, located at /opt/sc/support/conf/mpm.conf
2. Update the values in the configuration file. Tenable recommends the following settings based
on the size of your deployment:
MinSpareServers 10
MaxSpareServers 20
MaxRequestWorkers 64
MinSpareServers 20
MaxSpareServers 40
MaxRequestWorkers 128
MinSpareServers 40
MaxSpareServers 80
MaxRequestWorkers 256
3. Restart Tenable Security Center, as described in Start, Stop, or Restart Tenable Security
Center.
What to do next:
l After the Tenable Security Center build has run for a period of time, check the log located at
/opt/sc/support/logs/error_log for any errors related to the MaxRequestWorkers
setting. For more information, see Generate a Diagnostics File.
- 79 -
1. On the host where you want to uninstall Tenable Security Center, open the command line
interface (CLI).
2. In the CLI, run the following command to stop Tenable Security Center:
rm -rf /opt/sc
User Access
The Users page provides the ability to add, edit, delete, or view the details of Tenable Security
Center user accounts. When you view the Users page, you see a list of users and actions, limited by
your account privileges. Your user role, organization membership, and/or group membership
determine your account privileges. For more information, see User Roles and Organizations and
Groups.
l Administrator users have the system-provided administrator role and do not belong to
organizations.
l Organizational users have the system-provided security manager, auditor, credential manager,
executive, security analyst, security manager, or vulnerability analyst role, or a custom role,
and belong to an organization.
Tenable Security Center supports three types of user account authentication: TNS, LDAP, and
SAML. For more information, see User Accounts.
To log in to the Tenable Security Center web interface with a user account, see Log In to the Web
Interface or Log in to the Web Interface via SSL Client Certificate.
- 80 -
Log In to the Web Interface
1. Open a supported web browser on a system that has access to the system’s network address
space.
Note: You must access the Tenable Security Center web interface using a secure web
connection (HTTPS) with SSL/TLS 1.2 enabled. Tenable Security Center recommends
configuring the strongest encryption supported by your browser.
For more information, see Encryption Strength.
3. Navigate to the URL for your Tenable Security Center: https://<SERVER ADDRESS OR NAME>/.
Where <SERVER ADDRESS OR NAME> is the IPv4 or IPv6 address or hostname for your Tenable
Security Center.
Note: If you are the first administrator user logging in to Tenable Security Center, see Initial Login
Considerations.
l To log in via a username and password, type your Tenable Security Center credentials
and click Log In.
l To log in via SAML authentication, click Sign In Using Identity Provider. When presented
with your identity provider login page, type your identity provider credentials.
For more information about SAML authentication, see Configure SAML Authentication
Manually via the User Interface.
l To log in via certificate, see Log in to the Web Interface via SSL Client Certificate.
Tenable Security Center logs you in and displays the dashboard with different elements
depending on your user role.
- 81 -
Initial Login Considerations
When you log in to Tenable Security Center for the first time, Tenable Security Center displays the
Quick Setup Guide welcome page to begin a multi-step setup process for initial configuration. For
more information about quick setup, see Quick Setup.
If you prefer to configure the system manually, click Exit Quick Setup Guide. For more information
about getting started with Tenable Security Center, see Get Started With Tenable Security Center.
Note: The following information is provided with the understanding that your browser is configured for
SSL certificate authentication. Please refer to your browser’s help files or other documentation to
configure this feature.
- 82 -
For information about Tenable Security Center-browser communications encryption, see
Encryption Strength.
2. Select a certificate.
3. Click OK.
5. Click OK.
- 83 -
6. Log in using the username to be associated with the selected certificate.
Caution: Only one Tenable Security Center user may be associated with a single certificate. If one
user holds multiple user names and roles, a unique certificate must be provided for each login name.
7. When prompted, specify whether the current certificate is to be used to authenticate the
current user.
Subsequent Logins
After you log out of Tenable Security Center, the login page appears. If you want to log in again with
the same certificate, refresh your browser window. If you want to use a different certificate, you
must start a new browser session.
After you perform your second certificate login, edit your account from the Profile page to view
your certificate details. If your certificate changes or you need to revoke it, click the Clear
Certification Details button to disassociate the certificate from your account.
User Roles
Roles determine what a user can or cannot access from their account. Tenable Security Center
comes with eight system-provided roles, but you can also create custom roles to satisfy complex
security policy needs. You can customize the permissions on some, but not all, system-provided
user roles.
You can create linked user accounts and linked non-admin user accounts to allow users to switch
between accounts without logging out and logging back in to Tenable Security Center. For more
information, see Linked User Accounts.
For more information about user roles in Tenable Security Center, see Create a User Role, Edit a
User Role, View User Role Details, and Delete a User Role.
Roles
- 84 -
Customizable
User Role Description
Permissions?
- 85 -
Security Managers have complete access to all data
collected by their organization.
Vulnerability Yes An account that can perform basic tasks within the
Analyst application. A Vulnerability Analyst is allowed to view
- 86 -
security data, perform scans, share objects, view
logs, and work with tickets.
Role Options
Permissions Option Description
General
Scanning Permissions
Create Scans Allows the user to create policy-based scans. Disabling Create Policies
while enabling this permission allows you to lock user into specific set
of policies for scanning.
Create Plugin (Appears when Create Scans is enabled) Allows the user to create
Scans single plugin remediation scans.
Create Agent Allows the user to add agent synchronization jobs that fetch agent scan
Synchronization results from Tenable Vulnerability Management or Tenable Nessus
Jobs Manager.
Create Agent Allows the user to add agent scans that create and launch parallel scans
Scans in Tenable Nessus Manager, then import the scan results to Tenable
Security Center.
Create Audit Files Allows the user to upload audit files, which can be used for
configuration audit scans.
Create Policies Allows the user to set scan parameters and select plugins for scanning.
- 87 -
Permissions Option Description
Upload Nessus Allows the user to import results from an external Nessus scanner.
Scan Results Result upload will be limited to user’s repositories and restricted by
user’s IP address ranges.
Manage Freeze Allows the user to add, edit, and delete organization-wide freeze
Windows windows. Freeze windows prevent scans from launching and stop any
scans in progress.
Asset Permissions
Create LDAP Query Allows the user to create LDAP Query Assets, which update a list of
Assets hosts based on a user-defined LDAP query.
Analysis Permissions
Accept Risks Allows the user to accept risks for vulnerabilities, which removes them
from the default view for analysis, dashboards, and reports.
Recast Risks Allows the user to change the severity for vulnerabilities.
Manage Risks (Appears when Accept Risks or Recast Risks is enabled) Allows the
user to modify accept and recast risk rules created by other users.
Organizational Permissions
Share Objects Allows the user to share assets, audit files, credentials, queries, and
Between Groups policies with any group. Users in groups to which these objects have
been shared can use the objects for filtering and scan creation.
View Organization Allows the user to view logs for entire organization.
Logs
User Permissions
Manage Roles Allows the user to create new roles and edit and delete organizational
roles. Any roles added must have permissions equal to or lesser than
the user’s role.
Manage Groups Allows the user to add, edit, and delete groups. Users with this
- 88 -
Permissions Option Description
Manage Group Allows the user to set other user’s relationship with any other groups.
Relationships Group relationships allow for a user to view and manage objects and
users in other groups.
Report Permissions
Manage Images Allows the user to upload images, so anyone in the organization can use
the images in reports.
Manage Attribute Allows the user to add, edit, and delete attribute sets.
Sets
System Permissions
Update Feeds Allows the user to request a plugin update or a Tenable Security Center
feed update.
Workflow Permissions
Create Alerts Allows the user to create alerts which are used to trigger actions (e.g.,
launch scans, run reports, send emails) when specified vulnerability or
event conditions occur.
Create Tickets Allows the user to create tickets, which are typically used to delegate
work to other users.
Manage Attack Allows the user to manage Attack Surface Discovery Domains.
Surface Discovery
Domains
- 89 -
Permissions Option Description
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
For more information about user role options, see User Roles.
3. Click Add.
l Scanning Permissions
l Asset Permissions
l Analysis Permissions
l Domain Permissions
l Organization Permissions
l User Permissions
l Reporting Permissions
- 90 -
l System Permissions
l Workflow Permissions
7. Click Submit.
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
For more information about user role options, see User Roles.
3. Right-click the row for the user role you want to edit.
-or-
Select the check box for the user role you want to edit.
l Scanning Permissions
l Asset Permissions
- 91 -
l Analysis Permissions
l Domain Permissions
l Organization Permissions
l User Permissions
l Reporting Permissions
l System Permissions
l Workflow Permissions
8. Click Submit.
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
You can view details for any user role. For more information, see User Roles.
3. Right-click the row for the user role you want to view.
-or-
Select the check box for the user role you want to view.
4. Click View.
- 92 -
Section Action
l Last Modified — The date the user role was last modified.
Asset Permissions
Analysis
Permissions
Organization
Permissions
User Permissions
Reporting
Permissions
System
Permissions
Workflow
Permissions
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
- 93 -
To delete a custom or system-provided user role:
Note: Deleting a role will cause all users with that role to lose all assigned permissions.
b. Click Delete.
4. Click Delete.
Organizations
- 94 -
An organization is a set of distinct users and groups and the resources (for example, scanners,
repositories, and LDAP servers) they have available to them.
The organization is managed primarily by the administrator users and security manager users. The
administrator user creates the organization and creates, assigns, and maintains the security
manager user account. The security manager user (or any organizational user with appropriate
permissions) creates other users within the organization. Groups allow you to manage users and
share permissions to resources and objects among the group. For more information, see User
Access.
Multiple organizations can share the same repositories, and the vulnerability data associated with
the overlapping ranges is shared between each organization. Conversely, organizations can be
configured with their own discrete repositories to facilitate situations where data must be kept
confidential between different organizational units.
To view the users in an organization, filter by the organization on the Users page. For more
information about filters, see Apply a Filter.
Organization Options
Option Description
General
Contact Information The relevant contact information for the organization including
address, city, state, country, and phone number.
Password Expiration
Enable Password Expiration When enabled, passwords for users in the organization will
expire after the number of days specified in the Expiration
- 95 -
Option Description
Days box.
Expiration Days The number of days before the user's password expires. You
can enter a number between 1 and 365.
Scanning
Distribution Method The scan distribution mode you want to use for this
organization:
- 96 -
Option Description
Available Zones One or more scan zones that you want organizational users to
have access to when configuring scans.
Allow for Automatic Enable or disable this option to specify whether you want
Distribution Tenable Security Center to select one or more scan zones
automatically if an organizational user does not specify a scan
zone when configuring a scan.
Restricted Scan Ranges The IP address ranges you do not want users in this
- 97 -
Option Description
organization to scan.
Analysis
Accessible LCEs The Log Correlation Engines that you want this organization to
have access to. You can search for the Log Correlation Engines
by name or scroll through the list.
Accessible Repositories The repositories that you want this organization to have
access to. You can search for the repositories by name or
scroll through the list.
Accessible Agent Capable The Tenable Nessus scanners (with Tenable Nessus Agents
Scanners enabled) that you want this organization to have access to.
Select one or more of the available scanners to allow the
organization to import Tenable Nessus Agent results from the
selected scanner.
Accessible LDAP Servers The LDAP servers that you want this organization to have
access to. An organization must have access to an
LDAP server to perform LDAP authentication on user accounts
within that organization, and to configure LDAP query assets.
A list of custom analysis links provided to users within the host vulnerability details when
analyzing data outside of Tenable Security Center is desired. Click Add Custom Link to create a
new option to type the link name and URL to look up additional data external to Tenable
Security Center.
The %ip% reference is a variable that inserts the IP address of the current host into the
specified URI.
- 98 -
Option Description
Vulnerability Weights
Scoring System The scoring system Tenable Security Center uses to assess the
severity of vulnerabilities: CVSS v2 or CVSS v3.
Add an Organization
To add an organization:
- 99 -
1. Log in to Tenable Security Center via the user interface.
2. Click Organizations.
3. Click Add.
l General
l Password Expiration
l Scanning
l Analysis
l Vulnerability Weights
5. Click Submit.
You can view details for any organization. For more information, see Organizations.
2. Click Organizations.
- 100 -
The actions menu appears.
-or-
Select the check box for the organization you want to view.
4. Click View.
Section Action
Scanning View a summary of your scanning settings for the organization. For
more information about a setting, see Organizations.
Analysis View a summary of your analysis settings for the organization. For
more information about a setting, see Organizations.
Custom View a summary of your custom analysis link settings for the
Analysis Links organization. For more information about a setting, see
Organizations.
- 101 -
Section Action
Vulnerability View the vulnerability scoring system selected for the organization.
Scoring System For more information, see Organizations.
Delete an Organization
To delete an organization:
2. Click Organizations.
b. Click Delete.
- 102 -
A confirmation window appears.
4. Click Delete.
5. Click Delete.
Groups
User groups are a way to group rights to objects within an organization, and then quickly assign
these rights to one or more users. A user's group membership determines their access to security
data. When a user creates various objects such as reports, scan policies, dashboards, and other
similar items, these objects are automatically shared among the group members if the group
permissions allow view and control.
For more information, see Add a Group, View Group Details, and Delete a Group.
Group Options
Option Description
General tab
Description A description for the group (e.g., security team at the central office or
executives on the east coast).
Viewable Hosts The IP addresses and agent IDs that are viewable by the group. The
selection is made by all defined assets or the selection of one or more
asset lists.
Log Correlation The Log Correlation Engines you want to assign to the group.
Engines
Sample Content When enabled, Tenable provides sample content objects to users in the
group:
- 103 -
Option Description
After enabling Sample Content, you must add a new user to the group
before all users in the group can access the sample content.
Note: If a user in a group deletes a sample content object, the object is deleted
for all other users in that group.
Note: If you move a sample content object owner (e.g., move the first
user in group A to group B), Tenable Security Center:
1. Assigns their dashboards and ARCs to a new sample content
object owner in group A. Tenable Security Center does not
reassign reports or assets.
2. Recreates their dashboards, ARCs, and assets required for ARCs
in group B. Tenable Security Center does not recreate reports.
Available The list of available objects to be shared with the group on creation or edit
Objects in a bulk operation.
Add a Group
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
- 104 -
To add a group:
3. Click Add.
6. Click Submit.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can view details for any group. For more information, see Groups.
-or-
Select the check box for the group you want to view.
- 105 -
4. Click View.
Section Action
l Last Modified — The date the group options were last modified.
Access View the lists of Viewable Hosts, Repositories, and LCEs users in the
group can access. For more information, see Group Options.
Preferences View whether you enabled Sample Content for the group. For more
information, see Group Options.
Delete a Group
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
To delete a group:
- 106 -
a. In the table, right-click the row for the group you want to delete.
b. Click Delete.
4. Click Delete.
User Accounts
The Users page displays the user accounts on Tenable Security Center, limited by your account
privileges. You can sort the columns or apply filters to locate specific user accounts. You can also
add a user (Add a TNS-Authenticated User, Add an LDAP-Authenticated User, or Add a SAML-
Authenticated User) or Delete a User.
You can create one or more administrator accounts on Tenable Security Center. You can create one
or more organizational users (security managers and custom roles) per organization. Tenable
recommends you make at least one TNS-authenticated administrator and security manager user
per organization so that you can still log in if the LDAP or SAML service becomes unavailable. For
more information about user account types, see User Access.
For more information about options available when configuring user accounts, see User Account
Options.
- 107 -
API Keys
You can generate API keys to authenticate as a specific user for Tenable Security Center API
requests. For more information, see API Key Authentication.
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
For more information about user account configuration options, see TNS User Account Options.
3. Click Add.
4. Select a Role.
- 108 -
15. (Optional) Type Contact Information for the user.
1. Log in to Tenable Security Center via the user interface. You must log in with a user account
belonging to the organization where you want to create a new user.
3. Click Add.
4. (Optional) Type a First Name and Last Name for the user.
13. Select a Group. For more information, see Organizations and Groups.
14. (Optional) If you want to customize the group-related permissions for the user, modify the
Group Permissions as described in Custom Group Permissions.
15. (Optional) If you want to share an asset list with the user, select an Asset. For more
information, see Assets.
- 109 -
17. (Optional) Type Contact Information for the user.
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
For more information about user account configuration options, see User Accounts To
automatically add LDAP-authenticated users by importing users from your LDAP identity provider,
see Configure LDAP User Provisioning.
2. Configure an LDAP server, as described in LDAP Authentication. If you want the new user to
be a member of an organization, associate the LDAP server with an organization.
4. Click Add.
6. If you selected Security Manager as the Role, select an Organization for the user account.
You must select an organization with an associated LDAP server.
7. (Optional) Type a First Name and Last Name for the user.
8. In the Type drop-down list, select LDAP. If LDAP does not appear in the drop-down list, add
an LDAP server as described in Add an LDAP Server.
9. Select the LDAP Server where you want to authenticate the user.
10. Type a Search String to find existing users on the LDAP server.
- 110 -
11. Click Search.
The page displays the LDAP Users Found by the LDAP search string.
12. Select an LDAP user from the LDAP Users Found drop-down box.
13. View the Username. Tenable does not recommend modifying the Username since it must
match the username on the LDAP server.
1. Log in to Tenable Security Center via the user interface. You must log in with a user account
belonging to the organization where you want to create a new user.
2. Confirm that an administrator user configured an LDAP server, and that the LDAP server was
associated with the organization where you want to create a user account.
4. Click Add.
5. (Optional) Type a First Name and Last Name for the user.
6. In the Type drop-down list, select LDAP. If LDAP does not appear in the drop-down list, add
an LDAP server as described in Add an LDAP Server.
- 111 -
7. Select the LDAP Server where you want to authenticate the user.
8. Select an LDAP user from the LDAP Users Found drop-down box.
9. View the Username. Tenable does not recommend modifying the Username since it must
match the username on the LDAP server.
14. Select a Group. For more information, see Organizations and Groups.
15. (Optional) If you want to customize the group-related permissions for the user, modify the
Group Permissions as described in Custom Group Permissions.
16. (Optional) If you want to share an asset list with the user, select an Asset. For more
information, see Assets.
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
For more information about user account configuration options, see SAML User Account Options.
To automatically add SAML-authenticated users by importing users from your SAML identity
provider, see Configure SAML User Provisioning.
- 112 -
l Review the Tenable SAML Configuration Quick-Reference guide for a step-by-step guide of
how to configure SAML for use with Tenable Security Center.
3. Click Add.
4. (Optional) Type a First Name and Last Name for the user.
5. In the Type drop-down box, select SAML. If SAML does not appear in the drop-down box,
configure SAML authentication as described in Configure SAML Authentication Manually via
the User Interface.
6. In the Username box, type the user's SAML username exactly as it appears in your identity
provider SAML configuration for this user.
- 113 -
1. Log in to Tenable Security Center via the user interface. You must log in with a user account
belonging to the organization where you want to create a new user.
3. Click Add.
4. (Optional) Type a First Name and Last Name for the user.
5. In the Type drop-down list, select SAML. If SAML does not appear in the drop-down list,
configure SAML authentication as described in Configure SAML Authentication Manually via
the User Interface.
6. In the Username box, type the user's SAML username exactly as it appears in your identity
provider SAML configuration for this user.
11. Select a Group. For more information, see Organizations and Groups.
12. (Optional) To customize the user's object and user account management permissions, modify
the Group Permissions as described in Custom Group Permissions.
13. (Optional) To share an asset list with the user, select an Asset. For more information, see
Assets.
- 114 -
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
3. To filter the users that appear on the page, apply a filter as described in Apply a Filter.
Note: If you are logged in with an administrator account, the Organization filter is set to System by
default. To view users from other organizations, select a different organization for the Organization
filter.
5. To edit a user:
a. Right-click the row for the user you want to edit.
-or-
Select the check box for the user you want to edit.
b. Click Edit.
Note: If you want to edit a Tenable Security Center user that was created via user provisioning
and you enabled User Data Sync, edit the user in your SAML or LDAP identity provider.
Otherwise, the Tenable Security Center user data synchronization overwrites your changes the
next time the user logs in to Tenable Security Center using your SAML or LDAP identity
- 115 -
provider. For more information about User Data Sync, see SAML Authentication Options or
LDAP Authentication Options.
d. Click Submit.
You can edit your user account to update your password, contact information, display preferences,
and other settings depending on your user role. If you want to edit a linked user account, see Edit a
Linked User Account.
-or-
5. Modify your user account settings. For more information, see User Account Options.
6. Click Submit.
- 116 -
1. Log in to Tenable Security Center via the user interface.
3. Modify your user account settings. For more information, see User Account Options.
4. Click Submit.
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
-or-
Select the check box for the user you want to view.
4. Click View.
Section Action
- 117 -
l Created — The date the user was created.
Membership View role and organization information for the user. For more
information, see User Account Options.
Password View password expiration settings for the user. For more information,
Expiration see User Account Options.
Display Options View dark mode settings for the user. For more information, see User
Account Options.
Contact View contact information for the user. For more information, see User
Information Account Options.
API Key If the user has API keys, view the access key for the user. For more
information, see Enable API Key Authentication.
Delete a User
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
- 118 -
If you want to migrate a user's objects, you must use a Security Manager account in the user's
organization to delete the user. Other roles cannot migrate user objects.
Note: You cannot delete the first user created in any of your organizations. For more information, contact
Tenable Support.
Note: If you want to delete an Administrator or Security Manager with linked user accounts, you must
delete the linked accounts associated with the Administrator or Security Manager before deleting the
Administrator or Security Manager, as described in Delete a Linked User Account. For more information
about linked user accounts, see Linked User Accounts.
Note: If you want to delete a Tenable Security Center user that was created via user provisioning, delete
the user from your SAML or LDAP identity provider. If you delete a user in Tenable Security Center that was
created via user provisioning without deleting the user in your SAML or LDAP identity provider, Tenable
Security Center automatically re-creates the user in Tenable Security Center the next time they log in
using your SAML or LDAP identity provider. For more information, see SAML User Provisioning or LDAP
User Provisioning.
To delete a user:
b. Click Delete.
- 119 -
A confirmation window appears.
4. (Optional) If you want to migrate the user's objects, click the toggle to migrate the user's
objects to another user. Tenable Security Center supports migrating:
l Freeze windows
l Queries
l ARCs
l Dashboards
If you do not migrate the user's objects, Tenable Security Center deletes the user's objects.
Note: You cannot migrate objects when deleting an Administrator user because all Administrator-
created objects are shared across Tenable Security Center and remain accessible after user
deletion.
Note: If you delete a linked non-admin user, the user's objects can only be migrated to the linked
Security Manager account. For more information about linked user accounts, see Linked User
Accounts.
5. Click Delete.
l Linked User Account - A Security Manager user account that is linked to an Administrator
user account.
- 120 -
l Linked Non-Admin User Account - An SM-Linked user account that is linked to a Security
Manager user account.
On the Users page, a tooltip appears next to linked and linked non-admin users that displays the
username for the associated Administrator or Security Manager account.
Linked User
Users with linked user accounts can use a single set of login credentials to log in to Tenable
Security Center as an Administrator, then switch to a linked Security Manager, from one linked
Security Manager to another, or from a linked Security Manager to the linked Administrator. You do
not need to re-authenticate to switch between linked user accounts after logging in as the linked
Administrator.
l Each Administrator can have one linked Security Manager per organization.
l Each linked Security Manager can be associated with only one Administrator user account.
l Linked Security Managers cannot log in to Tenable Security Center directly. You must log in to
the Administrator account associated with the linked Security Manager, then switch users.
l You cannot convert a linked user account to a standalone user account. To unlink a Security
Manager user from an Administrator user, delete the linked Security Manager, then create a
standalone Security Manager.
Note: You must have more than one organization to create a linked non-admin user. For more information
about organizations, see Organizations.
- 121 -
l Each Security Manager can have one linked SM-Linked user account per organization.
l Each SM-Linked user account can be associated with only one Security Manager user
account.
l SM-Linked user accounts cannot create, edit, or delete user accounts in the organization.
l SM-Linked users do not have access to the Profile page to edit their own accounts.
l SM-Linked users cannot log in to Tenable Security Center directly. You must log in to the
Security Manager account associated with the SM-Linked account, then switch users.
l You can only create linked non-admin user accounts for TNS user accounts. Linked non-
admin user accounts are not supported for LDAP or SAML user accounts.
l You cannot convert a standalone user account to a linked non-admin user account.
l You cannot convert an SM-Linked user to a standalone user account. To unlink an SM-Linked
user from a Security Manager user, delete the SM-Linked user account.
For more information about user accounts in Tenable Security Center, see User Access and User
Roles.
You can create linked user accounts and linked non-admin user accounts to allow users to switch
between accounts without logging out and logging back in to Tenable Security Center. You can add
a linked Security Manager to an Administrator account, or you can add an SM-Linked user to a
Security Manager account. The following restrictions apply to linked accounts:
- 122 -
l You cannot convert a standalone user account to a linked user account.
l Each Administrator can have one linked Security Manager per organization.
l Each Security Manager can have one linked SM-Linked user per organization.
l Each linked Security Manager user can be associated with only one Administrator user
account.
l Each SM-Linked user can be associated with only one Security Manager user account.
For more information about linked user accounts, see Linked User Accounts. For more information
about user account configuration options, see User Account Options.
3. Right-click the row for the Administrator or Security Manager to which you want to add a
linked user.
-or-
Select the check box for the Administrator or Security Manager to which you want to add a
linked user.
The Add User page appears. Tenable Security Center pre-populates the First Name, Last
Name, and Contact Information fields with values from the Administrator or Security Manager
user account.
5. Select an Organization. If you create a linked non-admin user, you can select more than one
organization and Tenable Security Center will create one linked non-admin user for each
- 123 -
organization.
6. (Optional) Modify the First Name and Last Name for the user.
7. Type a Username for the user. If you create a linked non-admin user, Tenable Security Center
adds the orgID to the end of the username.
What to do next:
l Switch between a linked user account and its associated Administrator or Security Manager
user account, as described in Switch to a Linked User Account.
You can create linked user accounts and linked non-admin user accounts to allow users to switch
between accounts without logging out and logging back in to Tenable Security Center.
Linked users can switch from the linked Administrator to a linked Security Manager, from one linked
Security Manager to another, or from a linked Security Manager to the linked Administrator user.
Linked non-admin users can switch from the linked Security Manager to an SM-Linked user, from
one SM-Linked user to another, or from an SM-Linked user to the linked Security Manager. For more
information about linked user accounts, see Linked User Accounts.
- 124 -
1. Log in to Tenable Security Center via the user interface.
Note: You must log in to the Administrator or Security Manager account associated with the linked
user, then switch between linked users. Linked Security Managers and SM-Linked users cannot log
in to Tenable Security Center directly.
2. Click your user profile icon > Switch User. This option appears only if the current logged-in
user already has a linked user account.
3. Click the name of the linked user you want to switch to.
4. Click Switch.
The username menu updates to show the linked user account name and associated
organization.
Administrators can edit linked user accounts. Linked Security Manager users and SM-Linked users
can edit their own account details. For more information, see Linked User Accounts.
3. Filter the Users page to show user accounts for the linked user's organization, as described in
Apply a Filter.
4. Right-click the row for the linked user account you want to edit.
-or-
Select the check box for the linked user account you want to edit.
- 125 -
The available actions appear at the top of the table.
6. Modify the user account settings. For more information, see User Account Options.
7. Click Submit.
4. Modify the user account settings. For more information, see User Account Options.
5. Click Submit.
If you want to remove a linked user account, you must delete the linked account. You cannot
convert a linked user account into a standalone user account. For more information about linked
user accounts, see Linked User Accounts.
Note: If you want to delete an Administrator or Security Manager with linked user accounts, you must
delete the linked accounts associated with the Administrator or Security Manager before deleting the
Administrator or Security Manager.
- 126 -
1. Log in to Tenable Security Center via the user interface.
3. Apply a filter to view the organization for the user you want to delete, as described in Apply a
Filter.
b. Click Delete.
5. (Optional) If you want to migrate the user's objects, click the toggle to migrate the user's
objects to another user. Tenable Security Center supports migrating:
l Freeze windows
l Queries
l ARCs
- 127 -
l Dashboards
If you do not migrate the user's objects, Tenable Security Center deletes the user's objects.
Note: You cannot migrate objects when deleting an Administrator user because all Administrator-
created objects are shared across Tenable Security Center and remain accessible after user
deletion.
6. Click Delete.
l Your selections in the Group Permissions section grant the user resource (user and object)
permissions in their assigned group and other groups.
For more information about organizations and groups, see Organizations and Groups.
In the Group Permissions section, the Manage All Users and Manage All Objects sliders enable or
disable all of the settings in the User Permission and Object Permission columns, respectively. By
default, the system enables all permissions for all groups. You can clear the check boxes in each
group row to restrict the user's ability to perform the following actions on the resources within a
group.
Resources Controlled by
Resources Controlled by Manage Objects/Object
Manage Users/User
Permissions
Permissions
l Users (edit and delete) l Reports (launch, stop, copy, delete, and sometimes
edit)
l Groups (edit and delete)
Note: A user can only edit reports within their assigned
group, even if you grant them Object Permissions for
another group.
- 128 -
Resources Controlled by
Resources Controlled by Manage Objects/Object
Manage Users/User
Permissions
Permissions
Examples
Consider the following examples for a user assigned to Group1.
- 129 -
l If you clear the User Permissions and/or Object Permissions check boxes in the Group1 row,
the user cannot perform actions on resources owned by other users in Group1.
Note: Although the user receives many permissions for resources in Group2, the user cannot edit
reports owned by Group2 users. Users must be assigned to Group2 and have Object Permissions
selected in order to edit reports, active scans, and agent scans.
l If you clear the User Permissions and/or Object Permissions check boxes in the Group2 row,
the user cannot perform actions on resources owned by other users in Group2.
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
API keys allow you to authenticate as a specific user for Tenable Security Center API requests.
Administrators can generate API keys for any user account. Other roles can generate API keys for
user accounts with the same role. For more information, see API Key Authentication.
Note: If you generate API keys for a user that already has API keys, the old keys will be replaced. If you
delete existing keys or generate new API keys for a user, Tenable Security Center deauthorizes API
requests attempted with the old keys.
- 130 -
3. Right-click the row for the user for which you want to generate an API key.
-or-
Select the check box for the user for which you want to generate an API key.
5. Click Generate.
The Your API Key window appears, displaying the access key and secret key for the user.
Note: You cannot view API secret keys in the Tenable Security Center interface after initial
generation. If you lose your existing secret key, you must generate new API keys.
What to do next:
l Use the API keys to perform API requests, as described in API Key Authorization in the
Tenable Security Center API Best Practices Guide.
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
After you delete a user's API keys, the deleted keys cannot be used for authentication in Tenable
Security Center API requests. To generate new API keys for a user, see Generate API Keys. For more
information, see API Key Authentication.
- 131 -
3. Right-click the row for the user for which you want to delete API keys.
-or-
Select the check box for the user for which you want to delete API keys.
5. Click Delete.
For more information about user accounts in Tenable Security Center, see User Accounts.
Option Description
Type (If LDAP or SAML are configured) The type of authentication you want to
perform on the user:
l Tenable (TNS)
- 132 -
l Lightweight Directory Access Protocol (LDAP)
When editing a user, type a new password to change the password for the
user account.
Confirm (Required) When creating a user or changing a user's password, re-type the
Password password for the user account.
Password Click Change Password to change the password for the user account.
Change
To change a user password:
3. In the Current Password box, type your password. If you do not have
a password (for example, you have a SAML-authenticated or LDAP-
authenticated user account), type any string of characters in this
field.
- 133 -
6. Click Submit.
Current (If you click Change Password) Type your password. If you do not have a
Password password (for example, you have a SAML-authenticated or LDAP-
authenticated user account), type any string of characters in this field.
User Must When enabled, the user must change their password upon initial login.
Change
Password
Account When enabled, the user cannot log in to Tenable Security Center. An
Locked administrator must unlock the user's account to allow them to log in.
Scan Result The default Completion Time filter applied when the user accesses or
Default refreshes the scan results page.
Timeframe
Cached When enabled, Tenable Security Center caches plugin policy information
Fetching and performs plugin policy downloads once per page load.
Password Expiration
Password When enabled, the user's password will never expire. Any password
Never Expires expiration settings at the user or organization level will not apply to this
user.
Enable When enabled, the user's password will expire after the number of days
Password specified in the Expiration Days box.
Expiration or
When disabled, the user's password expiration settings will default to the
Custom
organization settings. For more information about organization options,
Password
see Organizations.
Expiration
The user will receive daily password expiration notifications at login,
starting 14 days before the password expires. After the password expires,
the user must change their password at the next login. For more
- 134 -
information about Tenable Security Center notifications, see Notifications.
Expiration Days The number of days before the user's password expires. You can enter a
number between 1 and 365.
Membership
Role (Required) The role assigned to the user. For more information, see User
Roles.
l If a custom user has the Create Policies privilege but not the Update
Feeds privilege, that user can create users with the Create Policies
privilege, but not the Update Feeds privilege.
Organization (Required) The organization where you want to assign the user account.
Group (Required) The group where you want to assign the user account. A user's
group determines their access to Tenable Security Center resources. For
more information about groups, see Groups.
Group Permissions
Manage All When enabled, allows the user to manage users in all of the user's assigned
Users groups. For more information, see Custom Group Permissions.
Manage All When enabled, allows the user to manage objects in all of the user's
Objects assigned groups. For more information, see Custom Group Permissions.
Responsibility
Asset Assigns a user to an asset list for which the user is responsible. Assigning a
- 135 -
user to an asset list makes it easier to determine who in a group or
organization should be assigned tickets, notifications, and other tasks to
resolve particular issues. Selecting an asset updates the User
Responsibility Summary in the Vulnerability Analysis section.
Display Options
Dark Mode When enabled, sets the Tenable Security Center user interface to dark
mode for the user.
Contact Information
Title
Address
City
Country
Phone
Option Description
Type (If LDAP or SAML are configured) The type of authentication you want to
perform on the user:
l Tenable (TNS)
- 136 -
l Lightweight Directory Access Protocol (LDAP)
LDAP Server The LDAP server you want to use to authenticate the user.
Search String The LDAP search string you want to use to filter your user search. Use the
format: attribute=<filter text>. You can use wildcards, and the option
accepts up to 1024 characters.
Examples
sAMAccountName=*
mail=a*
displayName=C*
LDAP Users A filtered list of LDAP user accounts retrieved by the Search String. Your
Found selection in this option populates the Username option.
The Username If the user was created via LDAP user provisioning, the username on the
for this account LDAP server associated with the Tenable Security Center user account. If
must match a you select a username in the drop-down, Tenable Security Center
user on the LDAP overwrites the Tenable Security Center user account using information
server in order to from the new LDAP user you selected. By default, this option is blank.
authenticate.
You do not need to configure this option to enable user provisioning or
automatic synchronization of user data between your LDAP server and
Tenable Security Center.
Username (Required) The username, populated by your LDAP Users Found selection.
This username must match a user on the LDAP server in order to
authenticate successfully.
- 137 -
Scan Result The default Completion Time filter applied when the user accesses or
Default refreshes the scan results page.
Timeframe
Cached Fetching When enabled, Tenable Security Center caches plugin policy information
and performs plugin policy downloads once per page load.
Membership
Role (Required) The role assigned to the user. For more information, see User
Roles.
l If a custom user has the Create Policies privilege but not the Update
Feeds privilege, that user can create users with the Create Policies
privilege, but not the Update Feeds privilege.
Organization (Required) The organization where you want to assign the user account.
Group (Required) The group where you want to assign the user account. A user's
group determines their access to Tenable Security Center resources. For
more information about groups, see Groups.
Group Permissions
Manage All Users When enabled, allows the user to manage users in all of the user's
assigned groups. For more information, see Custom Group Permissions.
Manage All When enabled, allows the user to manage objects in all of the user's
Objects assigned groups. For more information, see Custom Group Permissions.
Responsibility
- 138 -
Asset Assigns a user to an asset list for which the user is responsible. Assigning
a user to an asset list makes it easier to determine who in a group or
organization should be assigned tickets, notifications, and other tasks to
resolve particular issues. Selecting an asset updates the User
Responsibility Summary in the Vulnerability Analysis section.
Display Options
Dark Mode When enabled, sets the Tenable Security Center user interface to dark
mode for the user.
Contact Information
Title
Address
City
Country
Phone
Option Description
Type (If LDAP or SAML are configured) The type of authentication you want to
perform on the user:
- 139 -
l Tenable (TNS)
Username (Required) The user's SAML username. Type the username exactly as it
appears in your identity provider SAML configuration for this user.
Scan Result The default Completion Time filter applied when the user accesses or
Default refreshes the scan results page.
Timeframe
Cached When enabled, Tenable Security Center caches plugin policy information
Fetching and performs plugin policy downloads once per page load.
Membership
Role (Required) The role assigned to the user. For more information, see User
Roles.
l If a custom user has the Create Policies privilege but not the Update
Feeds privilege, that user can create users with the Create Policies
privilege, but not the Update Feeds privilege.
Organization (Required) The organization where you want to assign the user account.
Group (Required) The group where you want to assign the user account. A user's
group determines their access to Tenable Security Center resources. For
more information about groups, see Groups.
- 140 -
To grant a user limited privileges to other groups' resources, see Custom
Group Permissions.
Group Permissions
Manage All When enabled, allows the user to manage users in all of the user's assigned
Users groups. For more information, see Custom Group Permissions.
Manage All When enabled, allows the user to manage objects in all of the user's
Objects assigned groups. For more information, see Custom Group Permissions.
Responsibility
Asset Assigns a user to an asset list for which the user is responsible. Assigning a
user to an asset list makes it easier to determine who in a group or
organization should be assigned tickets, notifications, and other tasks to
resolve particular issues. Selecting an asset updates the User
Responsibility Summary in the Vulnerability Analysis section.
Display Options
Dark Mode When enabled, sets the Tenable Security Center user interface to dark
mode for the user.
Contact Information
Title
Address
City
Country
Phone
LDAP Authentication
- 141 -
Adding LDAP servers allows you to use one or more external LDAP servers for Tenable Security
Center user account authentication. LDAP authentication enhances the security of Tenable Security
Center by inheriting password complexity requirements from environments mandated by security
policy.
After you configure an LDAP server, create Tenable Security Center user accounts for each
LDAP user you want to grant access.
l To manually add LDAP-authenticated users in Tenable Security Center, see Add an LDAP-
Authenticated User.
l To automatically add LDAP-authenticated users by importing users from your LDAP identity
provider, see LDAP User Provisioning.
Then, users with LDAP-authenticated accounts can log in to Tenable Security Center using the Sign
In Using Identity Provider button, as described in Log In to the Web Interface.
You can also use configured LDAP servers as LDAP query assets. For more information, see Assets.
Note: Tenable Security Center does not support Microsoft Active Directory Lightweight Directory Services
(AD LDS) servers for LDAP authentication.
Note: Tenable Security Center cannot retrieve more than one page of LDAP results. If Tenable Security
Center asset list or user authentication queries are not retrieving all expected results, consider modifying
your LDAP pagination control settings to increase the results per page.
For more information, see Add an LDAP Server and Delete an LDAP Server.
Option Description
Server Settings
- 142 -
Option Description
Port (Required) The remote LDAP port. Confirm the selection with your LDAP
server administrators.
Username / (Required) The username and password for an account on the LDAP server
Password with credentials to search for user data. For example, Active Directory
servers require an authenticated search.
Note: If you want to delete a Tenable Security Center user that was created via
LDAP user provisioning, delete the user from your LDAP identity provider. If
you delete a user in Tenable Security Center that was created via LDAP user
- 143 -
Option Description
provisioning without deleting the user in your LDAP identity provider, Tenable
Security Center automatically re-creates the user in Tenable Security Center
the next time they log in using your LDAP identity provider.
User Data Sync If you enable User Provisioning, you can enable User Data Sync to allow
Tenable Security Center to automatically synchronize contact information
(first name, last name, email address, and phone number) from your LDAP
identity provider for Tenable Security Center users created via LDAP user
provisioning. For more information, see LDAP User Provisioning.
Note: If you want to edit a Tenable Security Center user that was created via
LDAP user provisioning and you enabled User Data Sync, edit the user in your
LDAP identity provider. Otherwise, the Tenable Security Center user data
synchronization overwrites your changes the next time the user logs in to
Tenable Security Center using your LDAP identity provider.
Base DN (Required) The LDAP search base used as the starting point to search for
the user data.
User Object The string you want to use to create a search based on a location or filter
Filter other than the default search base or attribute.
User Schema Settings (Optional, if you plan to use the LDAP server only as an LDAP query
asset.)
Username The attribute name on the LDAP server that contains the username for the
Attribute account. This is often specified by the string sAMAccountName in Active
Directory servers that may be used by LDAP. Contact your LDAP server
administrator for the correct value.
E-mail Attribute The attribute name on the LDAP server that contains the email address for
the account. This is often specified by the string mail in Active Directory
servers that may be used by LDAP. Contact your LDAP server
administrator for the correct value.
- 144 -
Option Description
Phone Attribute The attribute name on the LDAP server that contains the telephone
number for the account. This is often specified by the string
telephoneNumber in Active Directory servers that may be used by LDAP.
Contact your LDAP server administrator for the correct value.
Name Attribute The attribute name on the LDAP server that contains the name associated
with the account. This is often specified by the string CN in Active
Directory servers that may be used by LDAP. Contact your LDAP
administrator for the correct value.
Access Settings
Organizations The Tenable Security Center organizations you want to authenticate using
this LDAP server.
Advanced Settings
Lowercase When enabled, Tenable Security Center modifies the usernames sent by
the LDAP server to use only lowercase characters.
DNS Field The LDAP server parameter used in LDAP server requests to filter the
returned asset data.
Time Limit The number of seconds you want Tenable Security Center to wait for
search results from the LDAP server.
Note: Access to Active Directory is performed via AD’s LDAP mode. When using multiple AD domains,
LDAP access may be configured to go through the Global Catalog. Port 3268 is the default non-SSL/TLS
setting, while port 3269 is used for SSL/TLS connections by default. More general information about LDAP
searches via the Global Catalog may be found at: http://technet.microsoft.com/en-us/library/cc728188
(v=ws.10).aspx.
- 145 -
Add an LDAP Server
For more information about LDAP server options, see LDAP Authentication.
3. Click Add.
l Server Settings
l Access Settings
7. Click Submit.
What to do next:
l Add LDAP-authenticated user accounts.
- 146 -
provisioning is enabled, users who log in to your LDAP identity provider are automatically created in
Tenable Security Center.
Tenable Security Center supports the following LDAP authentication systems for user provisioning:
For more information about LDAP authentication in Tenable Security Center, see LDAP
Authentication.
If you enable user provisioning and a user who does not have a Tenable Security Center user
account logs in using your LDAP identity provider, Tenable Security Center automatically creates a
user account for them in Tenable Security Center.
Tenable Security Center creates users using data from attribute fields you map to the
corresponding fields in your LDAP identity provider. If you enable User Data Sync for an
LDAP server, each time a user logs into Tenable Security Center using your LDAP identity provider,
Tenable Security Center updates any mapped attribute fields in Tenable Security Center with values
from the fields in your LDAP identity provider. For more information about User Data Sync, see
LDAP Authentication Options.
Note: If you want to edit a Tenable Security Center user that was created via LDAP user provisioning and
you enabled User Data Sync, edit the user in your LDAP identity provider. Otherwise, the Tenable Security
Center user data synchronization overwrites your changes the next time the user logs in to Tenable
Security Center using your LDAP identity provider.
Note: If you want to delete a Tenable Security Center user that was created via LDAP user provisioning,
delete the user from your LDAP identity provider. If you delete a user in Tenable Security Center that was
created via LDAP user provisioning without deleting the user in your LDAP identity provider, Tenable
Security Center automatically re-creates the user in Tenable Security Center the next time they log in
using your LDAP identity provider.
- 147 -
You can enable user provisioning to automatically create LDAP-authenticated users in Tenable
Security Center by importing user accounts from your LDAP identity provider. When user
provisioning is enabled, users who log in to your LDAP identity provider are automatically created in
Tenable Security Center.
Tenable Security Center supports the following LDAP authentication systems for user provisioning:
To manually create LDAP-authenticated users in Tenable Security Center, see Add an LDAP-
Authenticated User.
For more information about user account configuration options, see LDAP User Account Options.
1. (Recommended) Create a backup of your user directory in your LDAP identity provider.
2. In Tenable Security Center, add an LDAP server, as described in Add an LDAP Server.
3. In your LDAP identity provider, create the following custom user attributes: tenableRoleID,
tenableGroupID, and tenableOrgID.
4. In your LDAP identity provider, specify the role, group, and organization you want to assign the
user in Tenable Security Center:
a. In the tenableRoleID attribute field, type the ID for the Tenable Security Center role you
want to assign to the user. To locate the ID for a role, see View User Role Details.
b. In the tenableGroupID attribute field, type the ID for the Tenable Security Center group
you want to assign to the user. To locate the ID for a group, see View Group Details.
c. In the tenableOrgID attribute field, type the ID for the Tenable Security Center
organization you want to assign to the user. To locate the ID for an organization, see
View Organization Details.
- 148 -
1. Log in to Tenable Security Center via the user interface.
3. Right-click the row for the LDAP server where you want to enable user provisioning.
-or-
Select the check box for the LDAP server where you want to enable user provisioning.
4. Click Edit.
5. In the Server Settings section, click the toggle to enable User Provisioning.
6. (Optional) To automatically update contact information (first name, last name, email address,
and phone number) for users created via LDAP user provisioning, click the User Data Sync
toggle. For more information about User Data Sync, see LDAP Authentication Options.
7. (Optional) In the User Schema Settings section, type the names of the attributes in your LDAP
identity provider you want to use to populate the Username, Email, Phone, First Name, and
Last Name for users created via LDAP user provisioning. For more information about user
account options, see LDAP User Account Options.
Note: If you enable User Data Sync and configure the options in the User Schema Settings section,
Tenable Security Center automatically updates the attributes in the User Schema Settings section
with values from your LDAP identity provider. For more information, see LDAP Authentication
Options.
8. Click Submit.
- 149 -
To delete an LDAP server connection:
Note: If you delete a connection to an LDAP server, the users associated with that server cannot log in to
Tenable Security Center. Tenable recommends reconfiguring associated user accounts before deleting
LDAP server connections.
b. Click Delete.
4. Click Delete.
Option 1 (Recommended)
- 150 -
When you complete these changes, new users who are members of this group can log in
immediately. No restart is required.
l In LDAP, allow existing Active Directory users to become members of the new group.
Note: Use the Distinguished Name (DN) of the new group as the Search Base (e.g.,
CN=Tenablesc,DC=target,DC=example,DC=com).
5. Log in to Tenable Security Center as the organizational user you want to manage the users.
6. Create a user account for each Active Directory user in the new group, as described in Add an
LDAP-Authenticated User.
Option 2
Use a high level Search Base in the LDAP configuration. For example:
DC=target,DC=example,DC=com.
The example above could be used along with a Search String for global usage. As another example,
you might use this search string, when used in the configuration, applies to all LDAP searches:
memberOf=CN=nested1,OU=cftest1,DC=target,DC=example,DC=com
- 151 -
1. Log in to Tenable Security Center via the user interface.
6. Log in to Tenable Security Center as the organizational user you want to manage the users.
7. Create a user account for each Active Directory user, as described in Add an LDAP-
Authenticated User.
- 152 -
In the Search String box, type =*.
SAML Authentication
You can configure SAML authentication so that Tenable Security Center users can use identity
provider-initiated single sign-on (SSO) when logging in to Tenable Security Center. Tenable Security
Center supports SAML 2.0-based authentication (for example, Okta, OneLogin, Microsoft ADFS, or
Shibboleth 2.0).
After you configure SAML authentication, create Tenable Security Center user accounts for each
SAML user you want to grant access.
l To manually add SAML-authenticated users in Tenable Security Center, see Add a SAML-
Authenticated User.
l To automatically add SAML-authenticated users by importing users from your SAML identity
provider, see SAML User Provisioning.
Then, users with SAML-authenticated accounts can log in to Tenable Security Center using the Sign
In Using Identity Provider button, as described in Log In to the Web Interface.
For information about Tenable Security Center communications encryption, see Encryption
Strength.
Note: Tenable Support does not assist with configuring or troubleshooting advanced SAML features.
- 153 -
SAML Authentication Options
Option Description
If you disable SAML, the system clears your SAML configuration settings
and prevents SAML-authenticated user accounts from accessing Tenable
Security Center.
Type Specifies the identity provider you are using: SAML 2.0 (e.g., Okta,
OneLogin, Shibboleth 2.0, etc.).
Entity ID The name of the Entity ID attribute. Type the attribute exactly as it appears
in your identity provider SAML configuration.
Username The name of the SAML username attribute. Type the attribute exactly as it
Attribute appears in your identity provider SAML configuration.
- 154 -
Option Description
format NameID=username.
Single Sign-on The identity provider URL where users log in via single sign-on. Type the
Service URL exactly as it appears in your identity provider SAML metadata.
Single Logout The identity provider URL where users log out. Type the URL exactly as it
Service appears in your identity provider SAML metadata.
Certificate Data The text of the identity provider's X.509 SSL certificate, without the
===BEGIN CERT=== and the ===END CERT=== strings.
Note: If you want to delete a Tenable Security Center user that was created via
SAML user provisioning, delete the user from your SAML identity provider. If you
delete a user in Tenable Security Center that was created via SAML user
provisioning without deleting the user in your SAML identity provider, Tenable
Security Center automatically re-creates the user in Tenable Security Center
the next time they log in using your SAML identity provider.
User Data Sync If you enabled User Provisioning, you can enable User Data Sync to allow
Tenable Security Center to automatically synchronize contact information
from your SAML identity provider for Tenable Security Center users created
via SAML user provisioning. For more information, see SAML User
Provisioning.
Note: If you want to edit a Tenable Security Center user that was created via
SAML user provisioning and you enabled User Data Sync, edit the user in your
SAML identity provider. Otherwise, the Tenable Security Center user data sync
overwrites your changes the next time the user logs in to Tenable Security
Center using your SAML identity provider.
- 155 -
Option Description
Note: Tenable Security Center does not update required fields (Organization ID,
Group ID, and Role ID). To change the organization, group, or role for a user
created via SAML user provisioning, see Manage User Accounts.
You can use this method to configure most types of SAML authentication via the Tenable Security
Center user interface. If you encounter issues with this method (for example, when configuring
Microsoft ADFS), try the module method described in Configure SAML Authentication via
the SimpleSAML Module.
For more information about SAML authentication and SAML authentication options, see
SAML Authentication.
l Save your identity provider SAML metadata file to a directory on your local computer.
If you want to disable SAML authentication for Tenable Security Center users, click the toggle.
- 156 -
The page updates to display additional options.
6. In the Type drop-down box, select SAML 2.0 (e.g., Okta, OneLogin, Shibboleth 2.0, etc.).
7. Click Choose File and browse to the SAML metadata file from your identity provider.
Note: The metadata file must match the Type you selected. If Tenable Security Center rejects the
file, contact your identity provider for assistance.
8. Click Submit.
What to do next:
l Click Download SAML Configuration XML, save the .xml file locally, and use it to configure
your identity provider SAML configuration. For more information, see SAML Authentication
XML Configuration Examples.
l To manually add SAML-authenticated users in Tenable Security Center, see Add a SAML-
Authenticated User.
l Instruct users to log in to Tenable Security Center using the Sign In Using Identity Provider
button, as described in Log In to the Web Interface.
You can use this method to configure most types of SAML authentication via the Tenable Security
Center interface. However, you may prefer a more streamlined method:
l If you encounter issues with either method (for example, when configuring Microsoft ADFS),
- 157 -
try the module method described in Configure SAML Authentication via
the SimpleSAML Module.
For more information about SAML authentication and SAML authentication options, see
SAML Authentication.
l Save your identity provider SAML metadata file to a directory on your local computer.
If you want to disable SAML authentication for Tenable Security Center users, click the toggle.
a. In the Type drop-down box, select SAML 2.0 (e.g., Okta, OneLogin, Shibboleth 2.0, etc.).
b. In the Entity ID box, type the name of the Entity ID attribute exactly as it appears in your
identity provider SAML configuration.
c. In the Identity Provider (IdP) box, type identity provider identifier string.
d. In the Username Attribute box, type the SAML username attribute exactly as it appears
in your identity provider SAML configuration.
- 158 -
e. In the Single Sign-on Service box, type the identity provider URL where users log in via
single sign-on exactly as it appears in your identity provider SAML metadata.
f. In the Single Logout Service box, type the identity provider URL where users log out
exactly as it appears in your identity provider SAML metadata.
g. In the Certificate Data box, paste the text of the identity provider's X.509
SSL certificate, without the ===BEGIN CERT=== and the ===END CERT=== strings.
7. Click Submit.
What to do next:
l Click Download SAML Configuration XML, save the .xml file locally, and use it to configure
your identity provider SAML configuration. For more information, see SAML Authentication
XML Configuration Examples.
l To manually add SAML-authenticated users in Tenable Security Center, see Add a SAML-
Authenticated User.
l Instruct users to log in to Tenable Security Center using the Sign In Using Identity Provider
button, as described in Log In to the Web Interface.
Tip: The recommended method for configuring SAML authentication is via the Tenable Security
Center interface:
l Configure SAML Authentication Automatically via the User Interface
l Configure SAML Authentication Manually via the User Interface
If you encounter issues configuring SAML via the Tenable Security Center interface, you can use a
hidden SimpleSAML module to automatically configure SAML authentication.
- 159 -
For general information, see SAML Authentication.
l Save your identity provider SAML metadata file to a directory on your local computer.
4. Type placeholder values into all SAML configuration options. You do not need to configure
valid values.
5. Click Submit.
6. Log in to Tenable Security Center via the command line interface (CLI).
8. Copy and paste the following text into the file, between the ), line and the ); line:
'core:AdminPassword',
),
- 160 -
10. In a browser, navigate to https://<Tenable Security Center IP address or
hostname>/saml/module.php/core/frontpage_config.php.
15. On the Federation tab, in the Tools section, click XML to SimpleSAML.php metadata
converter.
16. Click Choose File and select your identity provider SAML metadata file.
Tenable Security Center validates the identity provider SAML metadata file. If the metadata
file is supported, Tenable Security Center populates the XML metadata box with content from
your metadata file. If the metadata file is not supported, you cannot use it for
SAML authentication in Tenable Security Center.
19. Log in to Tenable Security Center via the command line interface (CLI).
21. Paste the text into the file, after the <?php line.
- 161 -
24. Confirm the idp URL in the authsources.php file matches the $metadata URL in the
saml20-idp-remote.php or shib13-idp-remote.php file:
$metadata['http://www.okta.com/abcdefghijKLmnopQr0s1']
27. Click 1.
The SAML 2.0 SP Demo Example page appears. If this page does not appear, the
configuration did not succeed.
What to do next:
l In the Tenable Security Center interface, on the SAML Configuration page, click Download
SAML Configuration XML, save the .xml file locally, and use it to configure your identity
provider SAML configuration. For more information, see SAML Authentication
XML Configuration Examples.
l To manually add SAML-authenticated users in Tenable Security Center, see Add a SAML-
Authenticated User.
- 162 -
l To automatically add SAML-authenticated users by importing users from your SAML
identity provider, see Configure SAML User Provisioning.
l Instruct users to log in to Tenable Security Center using the Sign In Using Identity Provider
button, as described in Log In to the Web Interface.
Tip: Review the Tenable SAML Configuration Quick-Reference guide for a step-by-step guide of how to
configure SAML for use with Tenable Security Center.
If you enable user provisioning and a user who does not have a Tenable Security Center user
account logs in using your SAML identity provider, Tenable Security Center automatically creates a
user account for them in Tenable Security Center.
Tenable Security Center creates users using data from attribute fields you map to the
corresponding fields in your SAML identity provider. If you enable User Data Sync, each time a user
logs into Tenable Security Center using your SAML identity provider, Tenable Security Center
updates any mapped attribute fields in Tenable Security Center with values from the fields in your
SAML identity provider. For more information about User Data Sync, see SAML Authentication
Options.
Note: If you want to edit a Tenable Security Center user that was created via SAML user provisioning and
you enabled User Data Sync, edit the user in your SAML identity provider. Otherwise, the Tenable Security
Center user data sync overwrites your changes the next time the user logs in to Tenable Security Center
using your SAML identity provider.
Note: If you want to delete a Tenable Security Center user that was created via SAML user provisioning,
delete the user from your SAML identity provider. If you delete a user in Tenable Security Center that was
created via SAML user provisioning without deleting the user in your SAML identity provider, Tenable
Security Center automatically re-creates the user in Tenable Security Center the next time they log in
using your SAML identity provider.
- 163 -
Configure SAML User Provisioning
You can enable user provisioning to automatically create SAML-authenticated users in Tenable
Security Center by importing user accounts from your SAML identity provider. When user
provisioning is enabled, users who log into your SAML identity provider are automatically created in
Tenable Security Center. For more information, see SAML User Provisioning.
To manually create SAML-authenticated users in Tenable Security Center, see Add a SAML-
Authenticated User.
For more information about user account configuration options, see SAML User Account Options.
4. In the SAML Settings section, click the toggle to enable User Provisioning.
6. Click Submit.
- 164 -
What to do next:
l In your SAML identity provider, map the required Tenable Security Center user attribute fields
to the corresponding fields for users in your identity provider: Organization ID, Group ID, and
Role ID.
Note: Tenable Security Center uses the fields listed in the Attribute Mapping section to create and
update users in Tenable Security Center. Any Tenable fields that you map to corresponding fields in
your SAML identity provider populate when Tenable Security Center imports SAML users into
Tenable Security Center. If you enable User Data Sync, each time a user logs into Tenable Security
Center using your SAML identity provider, Tenable Security Center updates any mapped attribute
fields in Tenable Security Center with values from the corresponding fields in your SAML identity
provider.
Tip: Review the Tenable SAML Configuration Quick-Reference guide for a step-by-step guide of how to
configure SAML for use with Tenable Security Center.
Identity provider SAML configurations vary widely, but you can use the following examples to guide
your SAML-side configurations.
l OneLogin Example
l Okta Example
OneLogin Example
In the OneLogin SAML configuration, paste data from your .xml download file.
- 165 -
OneLogin Field Description
Okta Example
In the Okta SAML configuration, paste data from your .xml download file.
General
- 166 -
Okta Field Description
Attribute Statements
- 167 -
Okta Field Description
Microsoft ADFS
Description
Configuration
Note: If you see a warning that some content was skipped, click Ok to
continue.
Specify Display In the Display Name box, type your Tenable Security Center FQDN.
Name section
Configure Browse to and select the encryption certificate you want to use.
Certificate
section
- 168 -
Microsoft ADFS
Description
Configuration
section
Ready to Add l On the Advanced tab, select SHA256 or the value dictated by your
Trust section security policy.
Finish section Select the Configure claims issuance policy for this application check
box.
Edit Claim Add one or more claim rules to specify the ADFS value you want Tenable
Issuance Policy Security Center to use when authenticating SAML users. For example:
window
To transform an incoming claim:
Certificate Authentication
You can use configure SSL client certificate authentication for Tenable Security Center user
account authentication. Tenable Security Center supports:
- 169 -
l SSL client certificates
l smart cards
To fully configure SSL client certificate authentication for Tenable Security Center user
accounts:
1. Configure Tenable Security Center to allow SSL client certificate authentication, as described
in Configure Tenable Security Center to Allow SSL Client Certificate Authentication.
2. Configure Tenable Security Center to trust certificates from your CA, as described in Trust a
Custom CA.
3. Add TNS-authenticated user accounts for the users you want to authenticate via certificate,
as described in Add a TNS-Authenticated User.
4. (Optional) If you want to validate client certificates against a certificate revocation list (CRL),
configure CRLs or OCSP in Tenable Security Center, as described in Configure a CRL in
Tenable Security Center or Configure OCSP Validation in Tenable Security Center.
What to do next:
l Instruct users to log in to Tenable Security Center via certificate, as described in Log in to the
Web Interface via SSL Client Certificate.
- 170 -
Value Description
none Tenable Security Center does not accept SSL certificates for user
(default) authentication.
require Tenable Security Center requires a valid SSL certificate for user
authentication.
optional Tenable Security Center accepts but does not require a valid SSL
certificate for user authentication.
If a user does not present a certificate, they can log in via username and
password.
Note: Some browsers may not connect to Tenable Security Center when you
use the optional setting.
optional_no_ Tenable Security Center accepts valid and invalid SSL certificates for
ca user authentication.
Tip: This setting does not configure reliable user authentication, but you can
use it to troubleshoot issues with your SSL connection and determine
whether there is an issue with the key or the CA.
3. Edit the SSLVerifyDepth setting to specify the length of the certificate chain you want
Tenable Security Center to accept for user authentication. For example:
l When set to 1, Tenable Security Center does not accept intermediate certificates.
Tenable Security Center accepts self-signed certificates or certificates signed by known
CAs.
- 171 -
Required User Role: Root user
You can enable a certificate revocation list (CRL) in Tenable Security Center to prevent users from
authenticating to Tenable Security Center if their certificate matches a revocation in the CRL.
Note: Tenable Support does not assist with CRL creation or configuration in Tenable Security Center.
l Back up the /opt/sc/data/CA/ directory in case you encounter issues and need to restore
the current version.
2. Restart Tenable Security Center, as described in Start, Stop, or Restart Tenable Security
Center.
3. Confirm that your CA root configuration file contains the following parameters:
l crl_dir
l database
l crl
l clr_extensions
l default_crl_days
For example:
- 172 -
...
# Directory and file locations.
dir = /opt/sc/data/CA
crl_dir = /opt/sc/support/conf/crl
database = /opt/sc/support/conf/index.txt
# The root key and root certificate.
private_key = /opt/sc/support/conf/TenableCA.key
certificate = /opt/sc/data/CA/TenableCA.crt
# For certificate revocation lists.
crl = /opt/sc/support/conf/crl/ca.crl
crl_extensions = crl_ext
default_crl_days = 30
...
5. Confirm the directories and files referenced in your YourCAname.conf file are present on
Tenable Security Center in a subdirectory of /opt/sc/support/conf/.
6. Configure Tenable Security Center to trust your CA, as described in Trust a Custom CA.
7. In the command line interface (CLI), run the following command to enable the CRL in Tenable
Security Center:
For example:
- 173 -
8. In a text editor, open the /opt/sc/support/conf/vhostssl.conf file.
SSLCARevocationCheck <value>
SSLCARevocationFile "<filepath>"
Content Description
SSLCARevocationCheck <value>
SSLCARevocationFile <filepath>
Specifies the file path for the CRL file in Tenable Security Center. For example,
/opt/sc/support/conf/crl/ca.crl.
9. In the CLI, run the following command to create a symbolic link for the CRL file:
For example:
- 174 -
Caution: Do not use a single quote character (') instead of a backtick character (`); this command
requires the backtick.
Tenable Security Center creates a symbolic link for the CRL file.
10. Restart Tenable Security Center, as described in Start, Stop, or Restart Tenable Security
Center.
You can configure Online Certificate Status Protocol (OCSP) validation in Tenable Security Center to
prevent users from authenticating to Tenable Security Center if their certificate matches a
revocation on your OCSP server.
Note: Tenable Support does not assist with OCSP configuration in Tenable Security Center.
SSLOCSPEnable on
- 175 -
SSLOCSPDefaultResponder <URI>
SSLOCSPOverrideResponder on
3. Restart Tenable Security Center, as described in Start, Stop, or Restart Tenable Security
Center.
Search
In Tenable Security Center, you can search for vulnerabilities (by CVE ID) and host assets (by IPv4
address) using the search box in the top navigation bar. Click the drop-down to change the
category. A list of suggestions appears after you type at least five characters or the first octet of an
IPv4 address.
Note: To search for host assets, you must have the View Host Assets permission enabled. For more
information, see User Roles.
Tenable Security Center saves your search history. To view your search history, click the search
box. To delete an item from your search history, click the icon next to the search term.
To view a search result, press Enter or click a suggestion in the drop-down box. The search results
page appears, which displays widgets with details about the vulnerability or host asset:
Widget Description
Vulnerabilities
Vulnerability A list of solutions for the vulnerability that correspond to the plugins
Information currently visible in the Tenable Coverage widget.
The top right corner displays the Vulnerability Priority Rating (VPR) for the
vulnerability. For more information about VPRs, see CVSS vs. VPR.
VPR Key Drivers Details about the history and severity of the vulnerability that contribute to
- 176 -
Widget Description
the VPR.
Risk Details about the risk associated with the vulnerability, as determined by
Information the National Vulnerability Database (NVD).
Hosts Impacted A list of assets in your system that are affected by the vulnerability. When
you scan your network, any discovered assets that are affected by the
vulnerability will appear in this list.
If you have a Tenable Security Center+ license, this widget also displays the
Asset Exposure Score (AES) and Asset Criticality Rating (ACR) for the
assets.
Click More Details to see the IP Summary page, where you can view the list
of hosts filtered by the CVE ID.
Click More Details to open a dialog box with the full list of CPEs.
Click More Details to open a dialog box with the full list of references.
Tenable A list of Tenable plugins that address the vulnerability. You can sort this list
Coverage by plugin ID.
When you sort plugins or navigate pages in the widget, the Vulnerability
Information and Related Links widgets update to correspond to the visible
plugins.
Click More Details to see the Vulnerability List page, where you can view
the list of plugins filtered by your assets. If none of the assets in your
network are affected by the list of plugins, then this page will not display
any plugins.
Related Links A list of links with information relevant to the plugins currently visible in the
Tenable Coverage widget.
- 177 -
Widget Description
Click More Details to open a dialog box with the full list of related links.
Host Assets
Repository The repository associated with the host asset. If the host asset appears in
more than one repository, click the drop-down to view the host asset in a
different repository.
Click More Details to open a dialog box with the full list of host details.
Findings A list of vulnerabilities in your system that correspond to the asset. When
you scan your network, any vulnerabilities associated with the host asset
will appear in this list.
Click More Details to see the Vulnerability List page, where you can view
the list of vulnerabilities filtered by the host asset.
- 178 -
However, you may want to upload your own CAs or certificates for advanced configurations or to
resolve scanning issues. For more information, see:
l Trust a Custom CA
l Certificate Authentication
If you replace the server certificate with a self-signed certificate, you may need to upload the
CA for your server certificate to Tenable Nessus or your browser.
Problem Solution
The default certificate Upload a certificate for theTenable Security Center server, as
for Tenable Security described in Upload a Server Certificate for Tenable Security Center.
Center is untrusted.
If the new server certificate is self-signed, plugin 51192 may report
that the Tenable Security Center server certificate is untrusted. To
configure Tenable Nessus to trust the server certificate, upload the
CA certificate to Tenable Nessus.
Your browser reports Upload a CA certificate for the Tenable Security Center server
that the Tenable certificate to your browser.
Security Center server
certificate is
untrusted.
Plugin 51192 reports Regenerate the Tenable Security Center server certificate, as
that the Tenable described in Regenerate the Tenable Security Center Server
Security Center server Certificate.
certificate expired.
- 179 -
Upload a Server Certificate for Tenable Security Center
For information about Tenable Security Center server certificates, see Tenable Security Center
Server Certificates.
Tip: The custom certificate email address must not be SecurityCenter@SecurityCenter or subsequent
upgrades cannot retain the new certificate.
For example:
# cp /opt/sc/support/conf/SecurityCenter.crt /tmp/SecurityCenter.crt.bak
# cp /opt/sc/support/conf/SecurityCenter.key /tmp/SecurityCenter.key.bak
3. To rename the host.crt and host.key files and copy them to the /opt/sc/support/conf
directory, run:
# cp host.crt /opt/sc/support/conf/SecurityCenter.crt
# cp host.key /opt/sc/support/conf/SecurityCenter.key
4. To confirm the files have the correct permissions (640) and ownership (tns), run:
# ls -l /opt/sc/support/conf/SecurityCenter.crt
-rw-r---- 1 tns tns 4389 May 15 15:12 SecurityCenter.crt
# ls -l /opt/sc/support/conf/SecurityCenter.key
- 180 -
-rw-r---- 1 tns tns 887 May 15 15:12 SecurityCenter.key
Note: If an intermediate certificate is required, it must also be copied to the system and given the
correct permissions (640) and ownership (tns). Additionally, you must remove the # from the line in
/opt/sc/support/conf/vhostssl.conf that begins with #SSLCertificateChainFile to enable
the setting. Modify the path and filename to match the uploaded certificate.
6. In a browser, log in to the Tenable Security Center user interface as a user with administrator
permissions.
What to do next:
l If you uploaded a self-signed server certificate and plugin 51192 reports that the CA for your
self-signed certificate is untrusted, upload the custom CA certificate to Tenable Nessus.
- 181 -
Required User Role: Root user
Tenable Security Center ships with a default server certificate that is valid for two years. After the
certificate expires, you must regenerate the SSL certificate.
1. Log in to Tenable Security Center via the command line interface (CLI).
2. In the CLI in Tenable Security Center, run the following command to switch to the tns user:
su - tns
/opt/sc/support/bin/php /opt/sc/src/tools/installSSLCertificate.php
(Optional) If you want to suppress the self-signed warning or specify a Common Name, include
an optional argument.
Argument Description
exit
5. As the root user, run the following command to restart the Tenable Security Center service:
- 182 -
# service SecurityCenter restart
The service restarts and Tenable Security Center applies the new certificate.
Trust a Custom CA
You can configure Tenable Security Center to trust a custom CA for certificate authentication or
other uses.
3. Run the installCA.php script to create the required files for each CA in /opt/sc/data/CA:
4. Restart Tenable Security Center, as described in Start, Stop, or Restart Tenable Security
Center.
System Settings
The System menu in the left navigation and the Username menus in the top navigation bar contain
several options to configure Tenable Security Center system settings. Administrator users can
configure more options than organizational users.
l Configuration Settings
l Diagnostics Settings
- 183 -
l Job Queue Events
l System Logs
l Keys Settings
Configuration Settings
The configuration menu includes the following settings:
l Mail Settings
l Miscellaneous Settings
l License Settings
l Plugins/Feed Settings
l SAML Settings
l Security Settings
Data expiration determines how long Tenable Security Center retains closed tickets, scan results,
and report results.
Option Description
Closed The number of days you want Tenable Security Center to retain closed tickets.
Tickets The default value of this option is 365 days.
- 184 -
Option Description
Scan The number of days you want Tenable Security Center to retain scan results. The
Results default value of this option is 365 days.
Report The number of days you want Tenable Security Center to retain report results.
Results The default value of this option is 365 days.
Tip: You can configure vulnerability data expiration for individual IPv4, IPv6, agent, and universal
repositories. For more information, see IPv4/IPv6 Repositories,Agent Repositories, and Universal
Repositories.
The Tenable Security Center external schedule settings determine the update schedule for the
common tasks of pulling Tenable Nessus Network Monitor data, IDS signature updates, and IDS
correlation updates.
Option Description
Pull Interval This option configures the interval that Tenable Security Center uses to
pull results from the attached Tenable Nessus Network Monitor
instances. The default setting is 1 hour. The timing is based from the
start of the Tenable Security Center service on the host system.
IDS Signatures Specifies the frequency to update Tenable Security Center IDS
signatures via third-party sources. The schedule appears along with the
specified time zone.
IDS Correlation Specifies the frequency to push vulnerability information to the Log
Databases Correlation Engine for correlation. The schedule appears along with the
specified time zone.
You can also configure each of the update schedule times to occur by time in a particular time zone
using the Time Zone link next to each hour selection.
- 185 -
Mail Settings
The Mail option designates SMTP settings for all email-related Tenable Security Center functions.
Available options include SMTP host, port, authentication method, encryption, and return address.
In addition, you can use the Test SMTP Settings in the upper left corner of the page to validate the
settings.
Note: The Return Address defaults to noreply@localhost. Use a valid return email address for this option. If
this option is empty or the email server requires emails from valid accounts, the email server cannot send
the email.
Note: Type the Username in a format supported by your SMTP server (for example, username@domain.com
or domain\username).
Miscellaneous Settings
The Miscellaneous Configuration section offers options to configure settings for web proxy, syslog,
notifications, and enable or disable some report types.
Web Proxy
From this configuration page, you can configure a web proxy by entering the host URL (proxy
hostname or IP address), port, authentication type, username, and password. The hostname used
must resolve properly from the Tenable Security Center host.
Syslog
In the Syslog section, you can configure options to allow Tenable Security Center to send
administrative log events to the local syslog service. For more information about the types of
Tenable Security Center logs, see the knowledge base article.
Option Description
Facility Type the facility you want to receive the log messages.
Severity Specifies which syslog message levels you want to forward: Informational,
- 186 -
Option Description
Warning, or Critical.
Scanning
The IP Randomization option specifies how you want Tenable Security Center to send active scan
target lists to Tenable Nessus and Tenable Vulnerability Management scanners.
You enable or disable IP randomization for all configured active scans; you cannot configure
IP randomization on a per-scan basis.
l When enabled, Tenable Security Center randomizes the targets in the active scan before
sending the target list to the scanners to reduce strain on network devices during large active
scans.
Scan Randomization
1,000 or fewer Tenable Security Center randomizes all the IP addresses in the target
targets list.
1,001 or more Tenable Security Center randomizes all the IP addresses in the target
targets list by:
If the active scan includes a Tenable Vulnerability Management scanner, Tenable Security
Center breaks the target list into smaller lists (256 IP addresses each) before sending to
Tenable Vulnerability Management.
- 187 -
Note: Some randomized target lists (such as small target lists) may still contain sequences of
increasing IP addresses. This is a possible outcome of randomization, not an indication that
randomization failed.
l When disabled, Tenable Security Center organizes the target list by increasing IP address.
Then, scanners scan targets, starting with the lowest IP address and finishing with the highest
IP address.
Tip: The Max simultaneous hosts per scan scan policy option specifies how many IP addresses Tenable
Security Center sends to each scanner at a time. For more information, see Scan Policy Options.
Notifications
In the Notifications section, you can configure options for Tenable Security Center notifications.
For more information, see Notifications.
Option Description
Tenable Security Defines the Tenable Security Center web address used when alerts
Center Location and tickets generate notifications.
Bell Notifications Enables notifications to appear in the menu in the top navigation
bar.
Report Generation
If your organization requires specialized reporting formats, such as DISA or CyberScope, you can
enable Report Generation options based on your organization's needs.
l Defense Information Systems Agency (DISA) reporting standards include the Assessment
Summary Results (ASR), Assessment Results Format (ARF), and Consolidated Assessment
Results Format (CARF) styles.
l CyberScope reports utilize Lightweight Asset Summary Results Schema (LASR) style reports,
which are used by some segments of governments and industry.
To allow users to choose these reports during report creation, you must enable the corresponding
toggles. For more information about reports in Tenable Security Center, see Reports.
- 188 -
Option Description
Enable DISA ARF Enable the DISA ARF report format, which meets the standards of the
Defense Information Systems Agency Assessment Results Format.
Enable Enable the DISA consolidated ARF report format, which meets the
DISA Consolidated standards of the Defense Information Systems Agency Consolidated
ARF Assessment Results Format.
Enable DISA ASR Enable the DISA ASR report format, which meets the standards of the
Defense Information Systems Agency Assessment Summary Results.
Enable CyberScope Enable the CyberScope report format, which meets CyberScope
reporting standards to support FISMA compliance.
For more information about recast risk rules and accept risk rules, see Recast Risk Rules and
Accept Risk Rules.
For more information about vulnerability analysis views, see View Vulnerability Instance Details and
View Vulnerabilities by Plugin.
Privacy
The Enable Usage Statistics option specifies whether Tenable collects anonymous telemetry data
about your Tenable Security Center deployment.
When enabled, Tenable collects usage statistics that cannot be attributed to a specific user or
customer. Tenable does not collect personal data or personally identifying information (PII).
Usage statistics include, but are not limited to, data about your visited pages, your used reports and
dashboards, your Tenable Security Center license, and your configured features. Tenable uses the
data to improve your user experience in future Tenable Security Center releases. You can disable
this option at any time to stop sharing usage statistics with Tenable.
- 189 -
After you enable or disable this option, all Tenable Security Center users must refresh their browser
window for the changes to take effect.
License Settings
The License Configuration section allows you to configure licensing and activation code settings
for Tenable Security Center and all attached Tenable products.
For information about the Tenable Security Center license count, see License Requirements. To
add or update a license, see Apply a New License or Update an Existing License.
Plugins/Feed Settings
The Plugins/Feed Configuration page displays the Plugin Detail Locale for Tenable Security Center
and the feed and plugin update (scanner update) schedules.
For more information, see Edit Plugin and Feed Settings and Schedules.
Update Description
Tenable Retrieves the latest Tenable Security Center feed from Tenable. This feed
Security includes data for general use, including templates (for example, dashboards,
Center ARCs, reports, policies, assets, and audit files), template-required objects,
Feed some general plugin information, and updated VPR values.
Active Retrieves the latest active plugins feed (for Tenable Nessus and Tenable
Plugins Vulnerability Management scanners) from Tenable. Tenable Security Center
pushes the feed to Tenable Nessus and Tenable Vulnerability Management
scanners.
Passive Retrieves the latest passive plugins feed from Tenable. Tenable Security Center
Plugins pushes the feed to Tenable Nessus Network Monitor instances.
Event Retrieves the latest event plugins feed from Tenable. Tenable Security Center
Plugins uses the feed locally with Log Correlation Engine data but does not push the
feed to Log Correlation Engine; Log Correlation Engine retrieves the feed
directly from Tenable.
For information about Tenable Security Center-Tenable plugins server communications encryption,
see Encryption Strength.
- 190 -
Plugin Detail Locale
The local language plugin feature allows you to display portions of plugin data in local languages.
When available, translated text displays on all pages where plugin details appear.
Note: Tenable Security Center cannot translate text within custom files. Upload a translated Active
Plugins.xml file to display the file content in a local language.
Schedules
Tenable Security Center automatically updates Tenable Security Center feeds, active plugins,
passive plugins, and event plugins. If you upload a custom feed or plugin file, the system merges the
custom file data with the data contained in the associated automatically updating feed or plugin.
You can upload tar.gz files with a maximum size of 1500 MB.
For more information, see Edit Plugin and Feed Settings and Schedules.
In the Authorization Token box, enter your authorization token. You can generate an authorization
token on the Tenable Downloads API page.
If you enable the Automatically Update Through the Security Center Feed option, then Tenable
Security Center automatically applies any available Tenable Security Center patches during
scheduled feed updates.
Note: Some patches cannot be applied through the feed, and must be installed manually.
- 191 -
The Install Now tab displays available software updates for download. You can install them
immediately by selecting the check box and clicking Install Now. If you enable the Automatically
Update Through the Security Center Feed option in the Security Center Software Updates
section, then Tenable Security Center will automatically apply these updates and patches during
scheduled feed updates.
The Install Manually tab includes software updates that must be installed manually. You can
download the files for these updates and patches from the Tenable Downloads page.
If you install a software update but the installation fails, the update will appear in the Available
Software Updates section with a warning icon. Click the software update in the table to view
details about the error.
SAML Settings
Use the SAML section to configure SAML 2.0-based SAML authentication (for example, Okta,
OneLogin, Shibboleth 2.0, etc.) for Tenable Security Center users. For more information, see
SAML Authentication.
Security Settings
Use the Security section to define the Tenable Security Center user interface login parameters and
options for account logins. You can also configure banners, headers, and classification headers and
footers.
Option Description
Authentication Settings
Maximum Login The maximum number of user login attempts Tenable Security Center
- 192 -
Option Description
Attempts allows before locking out the account (default: 20). To disable this
feature, set the value to 0.
Minimum Password This setting defines the minimum number of characters for passwords
Length of accounts created using the local TNS authentication access
(default: 3).
Password When enabled, user passwords must be at least 4 characters long and
Complexity contain at least one of each of the following:
l An uppercase letter
l A lowercase letter
l A numerical character
l A special character
Note: If you enable Password Complexity and set the Minimum Password
Length to a value greater than 4, Tenable Security Center enforces the
longer password requirement.
Startup Banner Text Type the text banner that appears before to the login interface.
User Text Adds custom text to the bottom of the user profile menu. You can use
the text to identify a company, group, or other organizational
information (maximum 128 characters).
Classification Type Adds a header and footer banner to Tenable Security Center to
indicate the classification of the data accessible via the software.
Current options are None, Custom, Unclassified, Confidential, Secret,
Top Secret, and Top Secret – No Foreign.
- 193 -
Option Description
l Custom Text - Type the text that you want to appear in the
banner (maximum 128 characters).
Note: Custom banners in reports are supported only for Arial Regular font.
Sample header:
Sample footer:
Note: If you set Classification Type to an option other than None, users
can only see the plain report styles. The Tenable report styles do not
support the classification banners.
Allow API Keys When enabled, allows users to generate API keys as an authentication
method for Tenable Security Center API requests. For more
information, see Enable API Key Authentication.
Allow Session This setting is disabled by default. When enabled, the Session Limit
Management option appears. This feature displays the option that allows
administrators to set a session limit for all users.
Disable Inactive When enabled, Tenable Security Center disables user accounts after a
Users set period of inactivity. You cannot use a disabled user account to log
in to Tenable Security Center, but other users can use and manage
objects owned by the disabled user account.
- 194 -
Option Description
Days Users Remain When you enable Disable Inactive Users, specify the number of
Enabled inactive days you want to allow before automatically disabling a user
account.
Session Limit Specifies the maximum number of sessions a user can have open at
once.
If you log in and the session limit has already been reached, Tenable
Security Center notifies you that the oldest session with that
username will be logged out automatically. You can cancel the login or
proceed with the login and end the oldest session.
Note: This behavior is different for Common Access Cards (CAC) logins.
Tenable Security Center does not check active sessions for
CAC authentication.
Login Notifications Sends notifications for each time a user logs in.
Caution: Before the user that enabled WebSEAL logs out of Tenable
Security Center, Tenable Security Center strongly recommends
confirming, in a separate session, that at least one user (preferably an
administrator user) is able to log in successfully via WebSEAL. Otherwise,
if there is an issue, no one will be able to access Tenable Security Center
to turn off WebSEAL.
Caution: Any user created while WebSEAL is enabled will not have a
password. An administrator must update the user account to establish a
password. Any user that existed before enabling WebSEAL must revert to
their old password.
PHP Serialization
- 195 -
Option Description
PHP Serialization Specifies whether you want to allow or prevent PHP serialization in
Mode Tenable Security Center.
l Assets
l Scan policies
l Reports
l Audit files
l Dashboards
Scanners
Picture in Picture When enabled, allows administrators to view and manage Tenable
Nessus scanner configurations from the Tenable Security Center user
interface. For more information, see Enable Picture in Picture.
Note: You cannot use Picture in Picture with a Tenable Nessus scanner if
you enabled Use Proxy for the scanner or if the scanner's Authentication
Type is SSL Certificate. For more information, see Tenable Nessus
Scanner Settings.
Operational Status Summarizes whether FIPS 140-2 mode is currently enabled or disabled.
FIPS 140-2 Mode Specifies whether you want to enable or disable FIPS mode for
communication. Switching from one mode to the other requires a
- 196 -
Option Description
If you have a Tenable Vulnerability Management license to use Tenable Lumin with Tenable Security
Center, you can configure your Tenable Security Center data to synchronize to Tenable Vulnerability
Management for Tenable Lumin analysis.
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
To view and edit plugin and feed settings and schedules as an administrator user:
4. View the Plugin Detail Locale section to see the local language configured for Tenable
Security Center.
5. Expand the Schedules section to show the settings for the Tenable Security Center Feed,
Active Plugins, Passive Plugins, or Event Plugins schedule.
a. If you want to update a plugin or feed on demand, click Update. You cannot update
feeds with invalid activation codes.
- 197 -
l If there is an update available, the Update link will be active.
l If your plugins or feed are already up to date, the Update link will be inactive.
c. Click Submit.
To view and edit plugin and feed settings and schedules as an organizational user:
2. In the top navigation bar, click your user profile icon > Feeds.
3. View the Plugin Detail Locale section to see the local language configured for Tenable
Security Center.
4. Expand the Schedules section to show the settings for the Tenable Security Center Feed,
Active Plugins, Passive Plugins, or Event Plugins schedule.
5. If you want to update a plugin or feed on demand, click Update. You cannot update feeds with
invalid activation codes.
7. Click Submit.
- 198 -
The Configuration page appears.
4. If you want plugin text to display in a local language, select a language from the Locale List
box.
5. Click Apply.
Tenable Security Center attributes actions performed with API keys to the user account associated
with the API keys. You can only perform actions allowed by the privileges granted to the user
account associated with the API keys.
You can enable the Allow API Keys toggle in your Security Settings to allow users to perform
API key authentication. Then, users can generate API keys for themselves or for other users. API
keys include an access key and secret key that must be used together for API key authentication.
For more information, see Enable API Key Authentication and Generate API Keys.
A user can use API keys for Tenable Security Center API request authentication by including the x-
apikey header element in your HTTP request messages, as described in API Key Authorization in the
Tenable Security Center API Best Practices Guide.
Deleting API keys prevents users from authenticating Tenable Security Center API requests with the
deleted keys. For more information, see Delete API Keys.
For more information about the Tenable Security Center API, see the Tenable Security Center API
Guide and the Tenable Security Center API Best Practices Guide.
- 199 -
Enable API Key Authentication
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
You can enable API key authentication to allow users to use API keys as an authentication method
for Tenable Security Center API requests. For more information, see API Key Authentication.
To allow users to authenticate to the Tenable Security Center API using API keys:
4. In the Authentication Settings section, click Allow API Keys to enable the toggle.
5. Click Submit.
What to do next:
l Generate API keys for a user, as described in Generate API Keys.
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
Caution: Disabling API keys prevents users from authenticating API requests with API keys. Disabling
API keys does not delete existing API keys. If you re-enable API keys, Tenable Security Center reauthorizes
any API keys they were active before you disabled API key authentication.
- 200 -
1. Log in to Tenable Security Center via the user interface.
4. In the Authentication Settings section, click Allow API Keys to disable the toggle.
5. Click Submit.
You can enable Picture in Picture to allow administrators to view and manage Tenable Nessus
scanner configurations from the Tenable Security Center user interface.
Note: You cannot use Picture in Picture with a Tenable Nessus scanner if you enabled Use Proxy for the
scanner or if the scanner's Authentication Type is SSL Certificate. For more information, see Tenable
Nessus Scanner Settings.
5. Click Submit.
What to do next:
- 201 -
l View and manage your Tenable Nessus instances in Tenable Security Center, as described in
View Tenable Nessus Instances in Tenable Security Center.
5. Click Submit.
Tenable Security Center logs all Tenable One synchronization activity. For more information about
the log contents, see View Tenable One Data Synchronization Logs.
Tenable Security Center retrieves your latest Cyber Exposure Score (CES), Assessment Maturity
grade, and Remediation Maturity grade daily from Tenable One in Tenable Vulnerability
Management. For more information about the metrics and timing, see View Tenable One Metrics.
- 202 -
Required Additional License: Tenable Lumin
After you configure Tenable Security Center data synchronization to Tenable One in Tenable
Vulnerability Management, you can view information about your Tenable One metrics.
Every day at 11:00 PM UTC, Tenable Security Center retrieves data from Tenable One in Tenable
Vulnerability Management.
Note: Newly transferred data does not immediately impact your Tenable Lumin metrics (for
example, your CES). Tenable requires 4 to 6 hours to recalculate your metrics. Recalculated
metrics appear in Tenable Security Center after the next daily retrieval.
For more information, see How long does synchronization take to complete?.
Tip: To view all Tenable Lumin data and take advantage of full Tenable Lumin functionality, see Tenable
Lumin.
2. To view your Cyber Exposure Score, Assessment Maturity grade, and Remediation Maturity
grade, do the following:
b. In the Metrics section, view data about your Tenable One metrics.
l An updated Cyber Exposure Score (CES) for the data you synchronized to Tenable
One. High CES values indicate higher risk.
l An updated Assessment Maturity grade for the data you synchronized to Tenable
One. A high grade indicates you are assessing your assets frequently and
thoroughly.
- 203 -
l An updated Remediation Maturity grade for the data you synchronized to Tenable
One. A high grade indicates you are remediating the vulnerabilities on your assets
quickly and thoroughly.
If a metric changed since the last retrieval, Tenable Security Center identifies if the
value increased ( ) or decreased ( ).
3. (Requires Tenable Security Center+ license) To view the Asset Criticality Rating for a host,
view details for the host, as described in View Hosts. For more information, see Asset
Criticality Rating in the Tenable Vulnerability Management User Guide.
4. (Requires Tenable Security Center+ license) To view the Asset Exposure Score for a host, view
details for the host, as described in View Hosts. For more information, see Asset Exposure
Score in the Tenable Vulnerability Management User Guide.
After you configure Tenable Security Center data synchronization to Tenable One in Tenable
Vulnerability Management, you can view the logs for past synchronizations.
For information about monitoring Tenable One synchronization status, see View Tenable One
Synchronization Status.
- 204 -
The Tenable One Data page appears.
Column Description
Timestamp The date and time of the logged activity, including the day of the week,
the date, and the time.
Object ID The repository ID, asset ID, or host UUID. To locate the ID or UUID for
an object, see View Repository Details, View Asset Details, or View
Host Details.
- 205 -
Column Description
Note: The transfer duration does not include the time required for all data
and recalculated metrics to appear in Tenable One. For more information,
see How long does synchronization take to complete?.
For more information about the time required for all data and
recalculated metrics to appear in Tenable One, see How long does
synchronization take to complete?.
4. To view additional details about your logged activity, click a row in the table.
Column Description
Repository or asset The organization ID. To locate the ID for an organization, see
Organization ID View Organization Details.
Repository Scan Result The scan result ID. To locate the ID for a scan result, see View
ID Scan Result Details.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can customize an individual host's Asset Criticality Rating (ACR) value to reflect the unique
infrastructure or needs of your organization.
- 206 -
For more information about ACR values, see Asset Criticality Rating in the Tenable Vulnerability
Management User Guide.
Tip: If you want to edit the ACR for a host you imported using a remote repository or by connecting a
managed Tenable Security Center instance to Tenable Security Center Director, log in to the Tenable
Security Center instance that contains the host's data.
Tip: Changes to an ACR value (and recalculations for your ACR values) take effect within 24 hours.
l Right-click the row for the host for which you want to edit the ACR.
l Select the check box for the host for which you want to edit the ACR.
l To modify the ACR value, click the Asset Criticality Rating slider to increase or decrease
the ACR.
- 207 -
l To reset an existing ACR value to the Tenable-provided ACR value, click Reset to
Tenable ACR.
5. In the Overwrite Reasoning section, select one or more options to include a justification for
your ACR change. For example, if a host in your development lab environment received a
Tenable-assigned ACR appropriate for a public host but not the development host, you can
select Dev Only. If you modify the ACR from the Tenable-provided value, this option is
required.
6. In the Notes box, type a note about your ACR change. If you select Other in the Overwrite
Reasoning section, you must type a note for the change.
7. Click Submit.
What to do next:
l View the ACR for each host, as described in View Hosts.
Diagnostics Settings
This page displays and creates information that assists in troubleshooting issues that may arise
while using Tenable Security Center.
System Status
You can use this section to view the current status of system functions.
Correct Java Indicates whether the minimum version of Java required to support
Version Tenable Security Center functionality is installed.
Sufficient Disk Indicates whether you have enough disk space to support Tenable Security
Space Center functionality. A red X indicates the disk is at 95% capacity or
higher.
- 208 -
System Function Description
Correct Indicates whether you have the correct Tenable Security Center RPM
RPM Package installed for your operating system.
Installed
For more information, see System Requirements.
Migration Errors Indicates whether an error occurred during a recent Tenable Security
Center update.
PHP Integrity Indicates whether any PHP files have been modified from the original
Errors version included in the Tenable Security Center RPM.
Diagnostics File
You can use this section to generate a diagnostics file for troubleshooting with Tenable Support.
For more information, see Generate a Diagnostics File.
Debugging Logs
You can use this section to enable or disable debugging logs for troubleshooting with Tenable
Support. For more information, see Enable Debugging Logs and Disable Debugging Logs.
Note: Tenable does not recommend leaving debugging enabled on Tenable Security Center after you send
the log files to Tenable Support. You may experience performance and storage issues if you leave
debugging enabled for extended periods of time.
Tenable Support may ask you to generate a diagnostics file to assist with troubleshooting. The
debug.zip diagnostics file contains files related to the selected chapters. For more information
about diagnostics file options, see Diagnostics File Options.
- 209 -
For more information about Tenable Security Center diagnostics, see Diagnostics Settings.
4. In the General section, if you want to omit IP addresses from the diagnostics file, click to
enable the Strip IPs from Chapters toggle.
5. In the Chapters section, click the toggles to enable or disable the chapters you want to
include in the diagnostics file.
What to do next:
l Share the debug.zip file with Tenable Support for troubleshooting.
General
Strip IPs from When enabled, Tenable Security Center omits IP addresses Disabled
Chapters from the following files:
l sc-configuration.txt
- 210 -
Option Description Default
l sc-scans.txt
l sc-setup.txt
l sc-logs.txt
l sc-error.log
l cert.log
l install.log
l upgrade.log
l schemaUpdates*.log
l sc-environment.txt
l sc-telemetry.txt
l /opt/sc/support/error_Log
l /opt/sc/support/*.conf
Chapters
System Include information about the Tenable Security Center host Enabled
Information system in the diagnostic file (sc-systeminfo.txt).
Scan Include information about scans, scan results, and freeze Enabled
Information windows in the diagnostic file (sc-sscaninfo.txt).
l Active users
- 211 -
Option Description Default
l Scan Zones
l Schedules
l Assets
l Repositories
l Organizations
l User Roles
l Reports
l Report results
l Audit Files
Environment Include information about the tns user environment in the Enabled
diagnostic file (sc-environment.txt).
Upgrade Log Include a log of Tenable Security Center upgrade events in Enabled
- 212 -
Option Description Default
Install Log Include a log of Tenable Security Center installation events Enabled
in the diagnostic file (install.log).
Apache Log Include a log of web server requests in the diagnostic file Enabled
(/opt/sc/support/error_Log).
Server Conf Include server configuration details in the diagnostic file Enabled
(/opt/sc/support/*.conf).
Include Names (If User Information is enabled) Include usernames and Disabled
user display names for each user in the diagnostic file.
Tip: The display name combine's the user's First Name and
Last Name.
You can enable debugging to generate logs for troubleshooting with Tenable Support.
To enable debugging:
- 213 -
1. Log in to Tenable Security Center via the user interface.
3. In the Debugging Logs section, select one or more debugging logs Tenable Support asked you
to enable.
Tenable Security Center enables the debugging logs you selected and saves the
corresponding log files to /opt/sc/admin/logs.
What to do next:
l Download the debugging logs, as described in Download Debugging Logs.
Note: Tenable does not recommend leaving debugging enabled on Tenable Security Center after you
send the log files to Tenable Support. You may experience performance and storage issues if you
leave debugging enabled for extended periods of time.
Note: Collected debug logs contained in the debug archive are automatically deleted during the
scheduled nightly cleanup.
You can download debugging logs for troubleshooting with Tenable Support.
- 214 -
1. Log in to Tenable Security Center via the user interface.
Tenable Security Center generates the debugging log files you selected.
What to do next:
l Share the files with Tenable Support.
Note: Tenable does not recommend leaving debugging enabled on Tenable Security Center after you
send the log files to Tenable Support. You may experience performance and storage issues if you
leave debugging enabled for extended periods of time.
Note: Collected debug logs contained in the debug archive are automatically deleted during the
scheduled nightly cleanup.
Tenable does not recommend leaving debugging enabled on Tenable Security Center after you send
the log files to Tenable Support. You may experience performance and storage issues if you leave
debugging enabled for extended periods of time.
To disable debugging:
- 215 -
The Diagnostics page appears.
What to do next:
l Follow Tenable Support's instructions to manually remove old debugging log files from
/opt/sc/admin/logs.
Job Queue is a Tenable Security Center feature that displays specified events in a list for review.
You can view and sort Job Queue notifications in several ways by clicking on the desired sort
column. Using the menu next to an item, that item may be viewed for more detail or, if the job is
running, the process may be killed. Killing a process should be done only as a last resort, as killing a
process may have undesirable effects on other Tenable Security Center processes.
System Logs
Tenable Security Center logs contain detailed information about functionality to troubleshoot
unusual system or user activity. You can use the system logs for debugging and for maintaining an
audit trail of users who access Tenable Security Center or perform basic functions (for example,
changing passwords, recasting risks, or running Nessus scans).
2. Click System > System Logs (Administrator users) or Username > System Logs
(Organizational users).
- 216 -
3. To filter the logs, see Apply a Filter.
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
2. Click System > System Logs (Administrator users) or Username > System Logs
(Organizational users).
Organizations may configure publishing sites as targets to send report results to a properly
configured web server or a Defense Information Systems Agency (DISA) Continuous Monitoring and
Risk Scoring (CMRS) site.
Option Description
Type The method Tenable Security Center uses to publish to the site.
Available options are HTTP Post or CMRS. Use the selection appropriate
for the configuration of the publishing site.
Max Chunk Size If the target is a CMRS site, Tenable sends the report in chunks sized
- 217 -
Option Description
Use Proxy When enabled, the publishing site leverages the web proxy defined in the
Web Proxy settings.
Authentication There are two methods of authentication available: SSL Certificate and
Password.
Organizations Select the organization(s) that are allowed to publish to the configured
site.
Verify Host When enabled, Tenable Security Center verifies that the target address
specified in the URI option matches the CommonName (CN) in the
SSL certificate from the target publishing server.
Keys Settings
Keys allow administrator users to use key-based authentication with a remote Tenable Security
Center (remote repository) or between a Tenable Security Center and a Tenable Log Correlation
Engine server. This also removes the need for Tenable Security Center administrators to know the
administrator login or password of the remote system.
Note: The public key from the local Tenable Security Center must be added to the Keys section of the
Tenable Security Center from which you wish to retrieve a repository. If the keys are not added properly,
the remote repository add process prompts for the root username and password of the remote host to
perform a key exchange before the repository add/sync occurs.
For more information, see Add a Key, Delete a Key, and Download the Tenable Security Center
SSH Key.
- 218 -
A manual key exchange between the Tenable Security Center and the Tenable Log Correlation
Engine is normally not required; however, in some cases where remote root login is prohibited or
key exchange debugging is required, you must manually exchange the keys.
For the remote Tenable Log Correlation Engine to recognize the Tenable Security Center, you need
to copy the SSH public key of the Tenable Security Center and append it to the
/opt/lce/.ssh/authorized_keys file. The /opt/lce/daemons/lce-install-key.sh script
performs this function. For more information, see Manual Log Correlation Engine Key Exchange.
Add a Key
6. In the Public Key box, type the text of your public key from your remote Tenable Security
Center.
7. Click Submit.
Delete a Key
- 219 -
To delete a key:
b. Click Delete.
4. Click Delete.
3. At the top of the table, click Download Tenable Security Center Key.
- 220 -
Notifications
To view your Tenable Security Center notifications, in the top navigation bar, click your user profile
icon > Notificationsor icon > Show More. Notifications are cleared after 30 days.
Note: If you upgrade from a previous version of Tenable Security Center to version 6.4.0 or
later, all existing notifications will be deleted.
In Tenable Security Center, certain events can display a pop-up in the lower right-hand corner of
the Tenable Security Center user interface. When you click on a notification, the Notifications page
appears.
The Notifications page displays a list of notifications for your Tenable Security Center instance.
You can filter these notifications by time frame. For general information about using filters, see
Filters.
Note: Depending on the screen resolution, the username may not appear next to the user icon in the top
navigation bar.
About
Path: Your user profile icon > About
The About menu item displays the Tenable Security Center version, Server Build ID, and copyright
information.
- 221 -
The Profile option launches the Edit User Profile page, where you can modify some of your user
account information and permissions. For more information about user account options, see User
Account Options.
The Feeds option displays information about the Tenable Security Center feeds and plugin sets and,
if permitted, a link to update the plugins either through Tenable Security Center or by manually
uploading plugins. The displayed feeds are for Tenable Security Center Feed, Active Plugins,
Passive Plugins, and Event Plugins. You can only update feeds with valid Activation Codes.
Plugins are scripts used by the Tenable Nessus, Tenable Nessus Network Monitor, and Log
Correlation Engine servers to interpret vulnerability data. For ease of operation, Tenable Security
Center centrally manages Tenable Nessus and Tenable Nessus Network Monitor plugins and pushes
the plugins out to their respective scanners. Log Correlation Engine servers download their own
event plugins and Tenable Security Center downloads event plugins for its local reference. Tenable
Security Center does not currently push event plugins to Log Correlation Engine servers.
For more information about plugin/feed settings, see Configuration Settings and Edit Plugin and
Feed Settings and Schedules.
Notifications
Path: Your user profile icon > Notifications or icon > Show More
In Tenable Security Center, specified events can display a pop-up in the lower right-hand corner of
the Tenable Security Center user interface.
Some events in Tenable Security Center will cause a notification to appear in the icon in the top
navigation bar.
Plugins
Path: Your user profile icon > Plugins
- 222 -
Plugins are scripts used by the Tenable Nessus, Tenable Nessus Network Monitor, and Log
Correlation Engine servers to interpret vulnerability data. For ease of operation, Tenable Nessus
and Tenable Nessus Network Monitor plugins are managed centrally by Tenable Security Center and
pushed out to their respective scanners. Log Correlation Engine servers download their own event
plugins and Tenable Security Center downloads event plugins for its local reference. Tenable
Security Center does not currently push event plugins to Log Correlation Engine servers.
Within the Plugins interface, click the information icon next to the Plugin ID and search for specific
plugins utilizing the filtering tools to view plugin details/source.
For more information about custom plugins, see Custom Plugin Packages for NASL and CA
Certificate Upload.
Help
Path: Your user profile icon > Help
The Help option opens the Tenable Security Center User Guide section for your page. To access
other Tenable documentation, see https://docs.tenable.com/.
Logout
To end your session in Tenable Security Center, click Your user profile icon > Logout. Tenable
recommends closing your browser window after logging out.
Filter
Description
Component
Cross Filters plugins based on a search against the cross reference information.
References
CVE ID Displays plugins based on one or more CVE IDs. Type multiple IDs as a
comma-separated list (e.g., CVE-2011-3348,CVE-2011-3268,CVE-2011-3267).
- 223 -
Filter
Description
Component
Exploit If set to yes, displays only plugins for vulnerabilities for which a known
Available public exploit exists.
MS Bulletin ID Displays plugins based on one or more Microsoft Bulletin IDs. Type multiple
IDs as a comma-separated list (e.g., MS10-012,MS10-054,MS11-020).
Name Type all or a portion of the actual plugin name. For example, entering
MS08-067 displays plugins named MS08-067: Microsoft Windows Server
Service Crafted RPC Request Handling Remote Code Execution (958644)
(uncredentialed check). Similarly, entering the string uncredentialed
displays a list of plugins with that string in the name.
Patch Modified Tenable plugins contain information about when a patch was last modified.
This filter allows users to search based on when a particular patch was
modified:
l Current Month
l Last Month
l Current Year
l Last Year
- 224 -
Filter
Description
Component
Patch Published Some plugins contain information about when a patch was published for a
vulnerability. This filter allows the user to search based on when a
vulnerability's patch became available:
l Current Month
l Last Month
l Current Year
l Last Year
Plugin ID Type the plugin ID desired or range based on a plugin ID. Available
operators are equal to (=), not equal to (!=), greater than or equal (>=) and
less than or equal to (<=).
Plugin Modified Tenable plugins contain information about when a plugin was last modified.
This filter allows users to search based on when a particular plugin was
- 225 -
Filter
Description
Component
modified:
l Current Month
l Last Month
l Current Year
l Last Year
Plugin Tenable plugins contain information about when a plugin was first
Published published. This filter allows users to search based on when a particular
plugin was created:
l Current Month
- 226 -
Filter
Description
Component
l Last Month
l Current Year
l Last Year
Plugin Type Select whether to filter plugin types by active, compliance, event, passive,
or WAS plugins.
l Current Month
l Last Month
l Current Year
l Last Year
- 227 -
Filter
Description
Component
Security End of When available, Tenable plugins contain information about software end of
Life Date life dates. This filter allows users to search based on when a particular
software is end of life:
l Current Month
l Last Month
l Current Year
l Last Year
Vulnerability Displays plugins for vulnerabilities within the chosen VPR range. For more
Priority Rating information, see CVSS vs. VPR.
(VPR)
Tip:The Vulnerabilities page displays vulnerabilities by plugin. The VPR that
appears is the highest VPR of all the vulnerabilities associated with that plugin.
- 228 -
Note: Tenable does not support troubleshooting custom plugin packages for NASL.
You can upload a custom plugin package as a .tar.gz or .tgz file. Depending on your needs, you
must include a combination of the following files:
l A custom_feed_info.inc file. Always include this file to time stamp your upload to Tenable
Security Center.
l (Optional) A custom_CA.inc file. Include this file if you are uploading one or more CA
certificates to solve a Tenable Nessus scanning issue.
After you Create the Custom Plugin Package and Upload the Custom Plugin Package, Tenable
Security Center pushes the package to Tenable Nessus for use when scanning.
Note: The system untars the files within your custom plugin package and overwrites any
identically named files already in Tenable Security Center or Tenable Nessus.
custom_feed_info.inc Guidelines
Always include this file to time stamp your upload to Tenable Security Center. This text file must
contain the following lines:
PLUGIN_SET = "YYYYMMDDHHMM";
PLUGIN_FEED = "Custom";
The PLUGIN_SET variable YYYYMMDDHHMM is the date and time 2 minutes in the future from when
you plan to upload the file to Tenable Security Center.
custom_nasl_archive.tar.gz or custom_nasl_archive.tgz
Guidelines
Include this file if you are uploading one or more custom plugins. This package must contain one or
more custom plugin NASL files.
All custom plugins must have unique Plugin ID numbers and have family associations based on
existing Tenable Security Center families.
- 229 -
Note: Tenable Support does not assist with creating custom plugin NASL files.
custom_CA.inc Guidelines
Include this file if you are uploading one or more CA certificates to solve a Tenable Nessus scanning
issue. This text file must contain PEM-encoded (Base64) CA certificate text.
For troubleshooting information, see Troubleshooting Issues with the custom_CA.inc File.
One CA Certificate
If you need to include a single CA certificate, paste the PEM-encoded (Base64) certificate directly
into the file.
-----BEGIN CERTIFICATE-----
certificatetext
certificatetext
certificatetext
certificatetext
-----END CERTIFICATE-----
Multiple CA Certificates
If you need to include two or more CA certificates, include the PEM-encoded (Base64) certificates
back-to-back.
-----BEGIN CERTIFICATE-----
certificate1text
certificate1text
certificate1text
certificate1text
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
certificate2text
certificate2text
certificate2text
certificate2text
-----END CERTIFICATE-----
- 230 -
Required User Role: Administrator
For complete information, see Custom Plugin Packages for NASL and CA Certificate Upload.
1. Prepare the individual text files you want to include in the custom plugins package.
l custom_nasl_archive.tar.gz or custom_nasl_archive.tgz
l custom_feed_info.inc
l custom_CA.inc
Confirm the files meet the requirements described in Custom Plugin Packages for NASL and
CA Certificate Upload.
Note: After upload, the system untars the files within your custom plugin package and overwrites
any identically named files already in Tenable Security Center or Tenable Nessus.
2. In the command line interface (CLI), tar and compress the files together. (7-Zip or running tar
on a Mac does not work for this.) For example:
What to do next:
l Upload the .tar.gz or .tgz file, as described in Upload the Custom Plugin Package.
For complete information, see Custom Plugin Packages for NASL and CA Certificate Upload.
- 231 -
Upload the .tar.gz or .tgz file to Tenable Security Center:
3. Click Upload Custom Plugins and select the .tar.gz or .tgz file.
4. Click Submit.
Tenable Security Center uploads the package and pushes it to Tenable Nessus.
What to do next:
l To verify the upload succeeded, click System > System Logs.
l To verify the upload resolved a validation issue, run another scan that includes plugin 51192.
Verify that Nessus has the custom plugin bundle by checking its plugin directory.
If uploading a custom_CA.inc file does not resolve your issue, confirm your file meets the
requirements described in custom_CA.inc Guidelines. Then, use these tips to continue
troubleshooting.
The output should match the custom_CA.inc file that you checked in a text editor in step T1 above.
If the file does not exist, the upload was not successful. If the file does not match, the most recent
upload may not have been successful. Go over the steps above for creating and uploading upload_
this.tar.gz and ensure it is done correctly.
The /opt/nessus/lib/nessus/plugins/custom_CA.inc or
\ProgramData\Tenable\Nessus\nessus\plugins\custom_CA.inc
file
- 232 -
If Nessus is not on the Appliance, navigate to the plugins folder and cat or type custom_CA.inc to
verify it exists and matches the custom_CA.inc file contents verified in steps 1 and 2 above. If
custom_CA.inc does not exist in the plugins folder, or does not match the most recent custom_
CA.inc in Tenable Security Center, it has not propagated to the scanner. Check Resources > Nessus
Scanners in Tenable Security Center to see if the scanner is still updating plugins. If it is in a
Working state, try updating the active plugins in Tenable Security Center to prompt a plugin push. If
the plugin feed version has not incremented and the customer must push plugins immediately, see
the following article: Force plugin update on scanner managed by Tenable Security Center
(Comparable to nessus-update-plugins -f).
Look at the detailed plugin output of 51192 to see exactly why the certificate is untrusted. If
custom_CA.inc can fix it, the output states that the certificate at the top of the certificate chain is
unrecognized, and the certificate it shows is either issued by the custom CA (matching the name
exactly) or the actual custom CA self-signed certificate.
l You must restore a backup file to a Tenable Security Center running the same version. For
example, you cannot restore a backup file created on version 6.0.0 to a Tenable Security
Center running Tenable Security Center 6.1.0.
l You must restore a backup file to the same Tenable Security Center where you created the
backup file. The hostname associated with the backup file must match the hostname on the
receiving Tenable Security Center. For example, you cannot restore a backup file created on a
- 233 -
Tenable Security Center with the hostname Example1 to a Tenable Security Center with the
hostname Example2.
Configuration Backups
Tenable recommends performing regular backups of your Tenable Security Center configuration in
addition to your Tenable Security Center data. You can restore a configuration backup to quickly
resume normal Tenable Security Center operation as part of your disaster recovery plan.
Configuration backups do not include data (such as vulnerability data, trend data, licenses, or
secure connection settings). When your repositories contain new vulnerability data, you can use
your dashboards, reports, and analysis tools to assess your network.
Note: After you restore a configuration backup, Tenable recommends performing discovery scans to re-
populate your repositories with vulnerability data. For more information, see Scanning Overview.
l You must restore a backup file to a Tenable Security Center running the same version. For
example, you cannot restore a backup file created on version 5.20.0 to a Tenable Security
Center running Tenable Security Center 5.21.0.
Note: For best performance, after restoring a configuration backup, ensure the hostname associated with
the configuration backup file matches the hostname on the receiving Tenable Security Center.
For more information, see Perform a Configuration Backup and Restore a Configuration Backup.
Category Configurations
Resources Tenable Nessus scanners, Tenable Nessus Network Monitor instances, Log
Correlation Engines, LDAP servers, and scan zones
- 234 -
license settings, plugins/feed settings, SAML settings, and security settings),
publishing sites settings, keys settings, and schedules
Scanning Active scans, agent synchronization jobs, agent scans, freeze windows,
credentials, scan policies, audit files, assets, repositories, and compliance
check plugin entries
Reporting Dashboards, Assurance Report Cards, report definitions, report images, and
CyberScope and DISA report attributes
Workflow Alerts
Analysis Queries
Automatic Backups
Tenable Security Center performs automatic nightly backups of the following databases:
l /opt/sc/application.db
l /opt/sc/hosts.db
l /opt/sc/jobqueue.db
l /opt/sc/plugins.db
l /opt/sc/remediationHierarchy.db
Automatic backups run nightly at 1:20 AM local time. This schedule cannot be changed.
Tenable Security Center stores backups in the same directory as the database.
Perform a Backup
For more information about the backup and restore process, see Backup and Restore.
- 235 -
To perform a backup of Tenable Security Center data:
1. Log in to Tenable Security Center via the command line interface (CLI).
2. Stop Tenable Security Center, as described in Start, Stop, or Restart Tenable Security Center.
3. In the CLI in Tenable Security Center, run the following command to view all running
processes:
# ps -fu tns
4. If any processes are listed, run the following commands to stop them:
# killall -u tns
# killall httpd
Note: These commands stop all jobs (including scans) running on Tenable Security Center.
6. Run the following command to create a .tar file for your /opt/sc directory:
7. Run the following command to confirm the backup file is not corrupted:
9. Start Tenable Security Center, as described in Start, Stop, or Restart Tenable Security Center.
- 236 -
What to do next:
l (Optional) Restore the backup file, as described in Restore a Backup.
Restore a Backup
For more information about the backup and restore process, see Backup and Restore.
l Confirm your receiving Tenable Security Center meets the requirements described in Backup
and Restore.
l Move the backup file to your receiving Tenable Security Center's /tmp directory.
1. Log in to Tenable Security Center via the command line interface (CLI).
2. Stop Tenable Security Center, as described in Start, Stop, or Restart Tenable Security Center.
3. In the CLI in Tenable Security Center, run the following command to view all running
processes:
# ps -fu tns
4. If any processes are listed, run the following commands to stop them:
# killall -u tns
# killall httpd
Note: These commands stop all jobs (including scans) running on Tenable Security Center.
- 237 -
5. If necessary, repeat step 4 to confirm all processes are stopped.
6. Run the following commands to decompress the .tar file and overwrite the existing /opt/sc
directory:
# cd /
7. Start Tenable Security Center, as described in Start, Stop, or Restart Tenable Security Center.
For more information about the backup and restore process and the configurations included in a
configuration backup, see Backup and Restore.
1. Log in to Tenable Security Center via the command line interface (CLI).
2. Stop Tenable Security Center, as described in Start, Stop, or Restart Tenable Security Center.
- 238 -
l To save the configuration backup file to a local directory, run the following command,
where [local directory path] is the local directory where you want to save the
backup file:
For example:
l To save the configuration backup file to a remote directory, run the following command,
where [remote directory absolute path] is the absolute path to the remote
directory where you want to save the backup file:
/opt/sc/support/bin/php /opt/sc/src/tools/backupSCConfiguration.php -r
[user]@[host]:[remote absolute path to configuration backups directory]
For example:
/opt/sc/support/bin/php /opt/sc/src/tools/backupSCConfiguration.php -r
tns@100.100.100.100:/tmp/
Tenable Security Center creates the configuration backup file and saves it to the specified
directory.
Tip: The configuration backup file name includes the backup date and time, the Tenable Security
Center hostname, and the Tenable Security Center version (for example, SC-config-20211101-
165111-sc-hostname-5_20_0.tar.gz).
4. Start Tenable Security Center, as described in Start, Stop, or Restart Tenable Security Center.
What to do next:
l (Optional) Restore the configuration backup file, as described in Restore a Configuration
Backup.
- 239 -
Restore a Configuration Backup
For more information about the backup and restore process and the configurations included in a
configuration backup, see Backup and Restore.
Note: For best performance, after restoring a configuration backup, ensure the hostname associated with
the configuration backup file matches the hostname on the receiving Tenable Security Center.
2. Confirm your receiving Tenable Security Center meets the requirements described in Backup
and Restore.
1. Log in to Tenable Security Center via the command line interface (CLI).
2. Stop Tenable Security Center, as described in Start, Stop, or Restart Tenable Security Center.
3. In the CLI in Tenable Security Center, run the following command to restore the configuration
backup, where [path to backup file] is the path to the backup file you want to restore:
For example:
- 240 -
4. Start Tenable Security Center, as described in Start, Stop, or Restart Tenable Security Center.
What to do next:
1. If you uploaded custom plugins before restoring your Tenable Security Center configuration,
re-upload the custom plugins. For more information, see Custom Plugin Packages for
NASL and CA Certificate Upload.
2. Perform discovery scans to re-populate your repositories with vulnerability data. For more
information, see Scanning Overview.
After you acquire a Tenable Lumin license for use with Tenable Security Center, you can configure
Tenable Security Center synchronization to send limited Tenable Security Center data to Tenable
Vulnerability Management for use in Tenable One analysis. Tenable Security Center communicates
with Tenable Vulnerability Management using an encrypted connection, as described in Encryption
Strength.
When you send data to Tenable Vulnerability Management, the system does not remove the data
from your Tenable Security Center. You can continue normal operation of Tenable Security Center.
- 241 -
l View Tenable One Metrics
Access Key The Tenable Vulnerability Management API access key for a Tenable
Vulnerability Management user with Administrator permissions.
Secret Key The Tenable Vulnerability Management API secret key for a Tenable
Vulnerability Management user with Administrator permissions.
Tip: The default setting for Network Support depends on the Tenable
Security Center version where you configured Tenable Lumin
synchronization. For the purpose of determining the default setting for
Network Support, Tenable Lumin synchronization is configured if you have
configured the Tenable Connection Settings and selected at least one
repository to synchronize.
l Tenable Security Center 5.18.x or earlier — Disabled by default if
Tenable Lumin is already configured.
l Tenable Security Center 5.19.x or later — Enabled by default and
cannot be disabled.
- 242 -
Option Description
If you purchase multiple Tenable Vulnerability Management instances, you can synchronize one
Tenable Security Center to each Tenable Vulnerability Management instance.
l IPv4 addresses within dynamic assets and IPv4 addresses within static assets.
Note: You cannot synchronize IPv6 addresses within static assets. If an asset contains a mix of IPv4
and IPv6 addresses, Tenable Security Center synchronizes only the IPv4 addresses.
- 243 -
Note: You cannot synchronize non-IPv4 assets within dynamic assets. If a dynamic asset contains
other asset types, Tenable Security Center synchronizes only the IPv4 addresses.
Note: You cannot synchronize DNS name list assets, LDAP query assets, combination assets,
watchlist assets, or import assets.
l Active or agent cumulative database and scan result vulnerability data stored in IPv4, IPv6,
agent, and universal repositories.
The initial synchronization includes all cumulative database data from the repository. All
subsequent synchronizations include only the new or modified scan result data imported to
the repository.
Note: You cannot synchronize passive scan result vulnerability data. Tenable Security Center
identifies vulnerability data by plugin family and excludes Tenable Nessus Network Monitor and LCE
plugin families from synchronization.
Caution: To avoid data merge issues in Tenable Vulnerability Management, Tenable recommends
enabling Network Support or resolving all repository overlaps before synchronizing data to Tenable
Vulnerability Management. You cannot resolve data merge issues after synchronizing a repository
with Tenable Vulnerability Management; you must enable Network Support or resolve overlapping
repositories in Tenable Security Center before synchronizing a repository for the first time. For more
information, see Network Support and Repository Overlap.
If you first configured Tenable Lumin synchronization in Tenable Security Center 5.18.x or earlier
and upgraded to Tenable Security Center 5.19.x or later, you can decide to enable Network Support
instead of resolving repository overlaps in the Tenable Security Center repositories you synchronize
- 244 -
with Tenable Vulnerability Management. Contact your Tenable representative to enable Network
Support.
Tip: For the purpose of determining the default setting for Network Support, Tenable Lumin
synchronization is configured if you have configured the Tenable Connection Settings and selected at
least one repository to synchronize.
For more information, see Network Support and Repository Overlap and Tenable One
Synchronization.
- 245 -
To monitor the success or failure of synchronizations, see View Tenable One Synchronization Status
and View Tenable One Data Synchronization Logs.
Vulnerability Management
View your synchronized data on the Assets page. For more information, see View Assets in Tenable
Vulnerability Management.
Tenable One
View your synchronized data on any Tenable One page. For more information, see Tenable Lumin.
Tip: To view limited metrics Tenable Security Center retrieves from Tenable Lumin in Tenable Vulnerability
Management, see View Tenable One Metrics.
While both methods avoid data merge issues, Tenable recommends enabling Network Support to
support accurate tracking of assets in repositories with overlapping IPv4 addresses without
manually resolving repository overlaps.
- 246 -
Synchronize Repositories to Individual Tenable Vulnerability
Management Networks
Tip: The default setting for Network Support depends on the Tenable Security Center version
where you configured Tenable Lumin synchronization. For the purpose of determining the
default setting for Network Support, Tenable Lumin synchronization is configured if you have
configured the Tenable Connection Settings and selected at least one repository to
synchronize.
l Tenable Security Center 5.18.x or earlier — Disabled by default if Tenable Lumin is already
configured.
l Tenable Security Center 5.19.x or later — Enabled by default and cannot be disabled.
Because Network Support synchronizes each IPv4 and agent repository to its own individual
network in Tenable Vulnerability Management, repositories with overlap do not cause data merge
issues in Tenable Vulnerability Management.
To resolve an overlap between two repositories, edit the repository configurations and reconfigure
the IP Ranges to avoid intersecting IP addresses, as described in IPv4/IPv6 Repositories.
Caution: You cannot resolve data merge issues after synchronizing a repository with Tenable Vulnerability
Management; you must enable Network Support or resolve overlapping repositories in Tenable Security
Center before synchronizing a repository for the first time.
If you cannot resolve all overlaps and you do not want to enable Network Support, plan to
synchronize a limited number of repositories to avoid conflicts. For example, to avoid a conflict
between two repositories, synchronize one repository but not the other repository.
- 247 -
Required Tenable Security Center User Role: Administrator
Required Tenable Vulnerability Management User Role: Administrator
You can configure Tenable Security Center to send limited Tenable Security Center data to Tenable
Vulnerability Management for use in Tenable One analysis. For more information, see Tenable One
Synchronization.
l Plan your synchronization strategy and review known limitations and dependencies, as
described in Plan Your Tenable One Synchronization.
l Note that Tenable Security Center repositories are not case-sensitive, but networks in
Tenable Vulnerability Management are case-sensitive. When you synchronize a repository,
ensure that the name is unique from any existing Tenable Vulnerability Management networks.
l Plan your strategy for avoiding data merge issues and perform any required cleanup, as
described in Network Support and Repository Overlap.
Caution:You cannot resolve data merge issues after synchronizing a repository with Tenable
Vulnerability Management; you must enable Network Support or resolve overlapping repositories in
Tenable Security Center before synchronizing a repository for the first time.
l Generate Tenable Vulnerability Management API keys for a Tenable Vulnerability Management
user with Administrator permissions, as described in Generate API Keys in the Tenable
Vulnerability Management User Guide.
l Share any assets you want to synchronize with the Full Access group, as described in Groups.
You cannot synchronize assets with more limited sharing.
To configure data synchronization between Tenable Security Center and Tenable One in
Tenable Vulnerability Management:
- 248 -
The Configuration page appears.
4. In the Tenable Vulnerability Management Connection Settings section, type an Access Key
and Secret Key for the Tenable Vulnerability Management user you want to have full access to
your data in Tenable Vulnerability Management. For more information, see Tenable One
Synchronization Options.
Tenable Security Center validates the connection to Tenable Vulnerability Management and
locks the key configuration.
5. (Optional) To test the connection to Tenable Vulnerability Management, click Test Connection.
Tenable Security Center tests the connection to Tenable Vulnerability Management using the
access key and secret key you provided.
Tenable Security Center displays a notification indicating the status of the connection to
Tenable Vulnerability Management.
a. (Optional) If you did not enable Network Support and you want to synchronize each
Tenable Security Center repository to its own network in Tenable Vulnerability
Management, contact your Tenable representative to enable Network Support. For
more information, see Tenable One Synchronization Options.
b. Select one or more repositories that contain the scan result data you want to
synchronize with Tenable Vulnerability Management.
The initial synchronization includes all cumulative database data from the repository. All
subsequent synchronizations include only the new or modified scan result data imported
to the repository.
- 249 -
Note: You cannot synchronize passive scan result vulnerability data. Tenable Security Center
identifies vulnerability data by plugin family and excludes Tenable Nessus Network Monitor
and LCE plugin families from synchronization.
Tip: Hover over the to view details for a repository (including information about unresolved
repository overlaps).
c. Click Synchronize.
d. Click Synchronize.
iii. Modify the Time and Timezone options to specify when you want synchronizations
to occur.
Tip: You cannot modify the Frequency or Repeat Every options; all Tenable One
synchronizations occur once daily.
- 250 -
b. If you want to filter the assets that appear in the Unstaged Assets section, do any of the
following:
l Select an organization from the Organization Filter drop-down list and click Apply
Filters.
l Select an asset type from the Asset Type Filter drop-down list and click Apply
Filters.
l Type an asset name in the Search Name box and press Enter.
Note: You can synchronize any assets shared with the Full Access group. You cannot
synchronize assets with more limited sharing.
Tenable Security Center applies your filter to the Unstaged Assets section.
l Click the Add All button to stage all visible assets for synchronization.
Tenable Security Center stages all visible assets for synchronization and displays
them in the Staged Assets section.
l In the rows for individual assets you want to stage for synchronization, click the
button.
Tenable Security Center stages your selected assets for synchronization and
displays them in the Staged Assets section.
Note: You cannot synchronize IPv6 addresses within static assets. If an asset contains a mix
of IPv4 and IPv6 addresses, Tenable Security Center synchronizes only the IPv4 addresses.
Note: You cannot synchronize non-IPv4 assets within dynamic assets. If a dynamic asset
contains other asset types, Tenable Security Center synchronizes only the IPv4 addresses.
Note: You cannot synchronize DNS name list assets, LDAP query assets, combination assets,
watchlist assets, or import assets.
- 251 -
d. Click Synchronize Staged Assets.
e. Click Synchronize.
8. Wait for data transfer and Tenable One data calculations to complete. For more information,
see How long does synchronization take to complete?.
9. Monitor the synchronization and confirm there were no errors, as described in View Tenable
One Synchronization Status or View Tenable One Data Synchronization Logs.
What to do next:
l Begin using Tenable Vulnerability Management and Tenable One, as described in Where will
I see synchronized data in Tenable Vulnerability Management?.
l View Tenable One metrics information within Tenable Security Center, as described in View
Tenable One Metrics.
After you configure Tenable Security Center data synchronization to Tenable One in Tenable
Vulnerability Management, you can view the status of your synchronizations.
For information about viewing logs for past synchronizations, see View Tenable One Data
Synchronization Logs.
- 252 -
l Configure Tenable One synchronization, as described in Configure Tenable One
Synchronization.
To monitor the status of your data synchronization between Tenable Security Center and
Tenable One in Tenable Vulnerability Management:
l View the Last Successful Sync date and time for data from any repository.
l View details for a repository by hovering over the that appears when you hover over a
repository name:
Data Description
First Successful The date and time of the first synchronization of this
Synchronization repository.
Last Successful The date and time of the most recent synchronization of this
Synchronization repository.
Last Failed The date and time of the most recent failed synchronization
Synchronization of this repository.
- 253 -
Data Description
Overlapping with this repository. For more information, see Network Support
<Repository Name> and Repository Overlap.
l In the Unstaged Assets or Staged Assets section, click an asset row to view details for
an asset:
Data Description
First Sync The date and time of the first synchronization of this asset.
Success
Last Sync The date and time of the most recent synchronization of this
Success asset.
Last Sync The date and time of the most recent failed synchronization of
Failure this asset.
l View the Last Successful Sync date and time for any asset data.
When you disable Tenable One synchronization, Tenable Security Center stops synchronizing new or
updated scan result and asset data with Tenable One in Tenable Vulnerability Management. Existing
Tenable Security Center data remains visible in Tenable Vulnerability Management.
- 254 -
1. Log in to Tenable Security Center via the user interface.
b. Click Synchronize.
- 255 -
Configure Scans
See the following sections to configure Tenable Security Center scans.
l Scanning Overview
l Resources
l Repositories
l Active Scans
l Agent Scans
l Agent Scanning
l Freeze Windows
l Patch Management
Scanning Overview
You can perform two types of scans using Tenable products: discovery scans and assessment
scans. Tenable recommends performing discovery scans to get an accurate picture of the assets on
your network and assessment scans to understand the vulnerabilities on your assets.
Configuring both methods provides a comprehensive view of the organization’s security posture and
reduces false positives. For more information about Tenable Security Center scanning strategies,
see the Tenable Security Center Scan Tuning Guide.
- 256 -
Assessment Find vulnerabilities on your assets. For example: In general,
Scan assets
l an authenticated or unauthenticated active scan
assessed by
using a Tenable Nessus or Tenable Vulnerability
assessment
Management scanner.
scans count
l an agent scan using an agent-capable Tenable toward your
Vulnerability Management or Tenable Nessus license.
Manager scanner.
For more information about how discovered and assessed assets are counted towards your license,
see License Requirements.
- 257 -
Resources
Administrator users can configure supporting resources.
l OT Security Instances
Scan zone resources are considered active scan objects. For more information, see Active Scan
Objects and Scan Zones.
LDAP server resources are part of user account configuration. For more information, see User
Accounts and LDAP Authentication.
In the Tenable Security Center framework, the Tenable Nessus scanner behaves as a server, while
Tenable Security Center serves as a client that schedules and initiates scans, retrieves results,
reports results, and performs a wide variety of other important functions.
You can add one or more Tenable Nessus or Tenable Vulnerability Management deployments to
Tenable Security Center as Tenable Nessus scanners in Tenable Security Center:
Note: Tenable Security Center cannot perform scans with or update plugins for scanners running
unsupported versions of Tenable Nessus. For minimum Tenable Nessus scanner version
requirements, see the Tenable Security Center Release Notes for your version.
- 258 -
Note: If you enabled clustering on Tenable Nessus Manager, add the parent node of the cluster to
Tenable Security Center. For more information, see Clustering in the Tenable Nessus User Guide.
For information about Tenable Security Center-Tenable Nessus and Tenable Security Center-
Tenable Vulnerability Management communications encryption, see Encryption Strength.
General
Port The TCP port that the scanner listens on for communications from
Tenable Security Center. The default is port 8834.
Verify Hostname Adds a check to verify that the hostname or IP address entered in the
Host option matches the CommonName (CN) presented in the SSL
- 259 -
Option Description
Note: Confirm that the correct CA certificate is configured for use by Tenable
Security Center. If you are using a custom CA, configure Tenable Security
Center to trust your custom CA, as described in Trust a Custom CA. You do not
need to perform this step when using the default certificates for Tenable
Nessus servers.
Use Proxy Instructs Tenable Security Center to use its configured proxy for
communication with the scanner.
Authentication
Type Select Password, SSL Certificate, or API Keys for the authentication type
to connect to the scanner.
Password The login password must be entered in this option. This option is only
available if the Authentication Type is set to Password.
Certificate If you selected SSL Certificate as the Authentication Type and the
Passphrase private key that decrypts your SSL certificate is encrypted with a
passphrase, the passphrase for the private key.
- 260 -
Option Description
Active Scans
Zones The scan zones that can use this scanner. For more information, see Scan
Zones.
Agents
Agent Capable Specifies whether you want this scanner to provide Tenable Nessus Agent
scan results to Tenable Security Center.
Organizations When the Agent Capable option is enabled, or you select API Keys as the
Authentication Type, specifies one or more organizations that you want
to grant access to import Tenable Nessus Agent data into Tenable
Security Center.
API Keys When the Agent Capable option is enabled, specifies whether you want to
use secure API keys when importing agent scan data from Tenable Nessus
or Tenable Vulnerability Management scanners.
For more information about retrieving your access key and secret key
from Tenable Nessus and Tenable Vulnerability Management, see
Generate a Nessus API Key in the Tenable Nessus User Guide and Generate
a Tenable Vulnerability Management API Key in the Tenable Vulnerability
Management User Guide.
Access Key When the API Keys option is enabled, specifies the access key for the
Tenable Nessus or Tenable Vulnerability Management scanner.
When you select API Keys as the Authentication Type, specifies the
access key for the Tenable Nessus Agent.
Secret Key When the API Keys option is enabled, specifies the secret key for the
Tenable Nessus or Tenable Vulnerability Management scanner.
- 261 -
Option Description
When you select API Keys as the Authentication Type, specifies the
secret key for the Tenable Nessus Agent.
Capable Specifies whether you want this scanner to provide Tenable Web App
Scanning scan results to Tenable Security Center.
Note: Tenable Security Center cannot perform scans with or update plugins for scanners running
unsupported versions of Tenable Nessus. For minimum Tenable Nessus scanner version requirements, see
the Tenable Security Center Release Notes for your version.
Note:Tenable Security Center does not send plugins to linked Nessus Managers. Nessus Manager pulls
plugins directly from Tenable's plugin sites. Therefore, to update plugin sets, Nessus Manager needs
access to the internet and Tenable's plugin sites (for more information, see the Which Tenable sites should I
allow? community article). If your Nessus Manager does not have internet access, you can manually update
its version and plugins offline (for more information, see Manage Nessus Offline in the Nessus User Guide).
- 262 -
a. In the Name box, type a name for the scanner.
c. In the Host box, type the hostname or IP address for the scanner.
d. In the Port box, view the default (8834) and modify, if necessary.
e. If you want to disable this scanner's connection to Tenable Security Center, click
Enabled to disable the connection.
f. If you want to verify that the hostname or IP address entered in the Host option matches
the CommonName (CN) presented in the SSL certificate from the Tenable Nessus
scanner, click Verify Hostname to enable the toggle.
g. If you want to use the proxy configured in Tenable Nessus for communication with the
scanner, click Use Proxy to enable the toggle.
i. In the Username box, type the username for the account generated during the
Tenable Nessus installation for daemon-to-client client communications.
ii. In the Password box, type the password associated with the username you
provided.
i. Click Choose File to upload the nessuscert.pem file you want to use for
authentication to the scanner. For more information, see Manual Tenable Nessus
SSL Certificate Exchange.
ii. (Optional) If the private key that decrypts your SSL certificate is encrypted with a
passphrase, in the Certificate Passphrase box, type the passphrase for the private
key.
k. Check the box for all active scan zones you want to use this scanner.
- 263 -
l. If you want this scanner to provide Tenable Nessus Agent scan results to Tenable
Security Center:
ii. Check the box for one or more Organizations that you want to grant access to
import Tenable Nessus Agent data into Tenable Security Center.
iii. If you want to use secure API keys when importing agent scan data from Tenable
Nessus scanners:
5. Click Submit.
What to do next:
l Configure a scan zone, repository, and active scan objects, as described in Active Scans.
Tenable Security Center supports the use of Tenable Vulnerability Management as a Tenable Nessus
scanner within Tenable Security Center. Tenable Vulnerability Management is an enterprise-class
remote vulnerability scanning service you can use to audit internet-facing IP addresses for both
network and web application vulnerabilities from the cloud. While Tenable Security Center does not
manage Tenable Vulnerability Management scanners (for example, Tenable Security Center does not
push plugins to the scanner), you can add Tenable Vulnerability Management scanners to Tenable
Security Center the same way you add internal, local, or remote Tenable Nessus scanners.
- 264 -
1. Log in to Tenable Security Center via the user interface.
- 265 -
4. Configure Tenable Nessus scanner options, as described in Tenable Nessus Scanners. You
use Tenable Vulnerability Management-specific values for some settings.
Port 443
Zones The zones within Tenable Security Center that use Tenable Vulnerability
Management as a scanner.
5. Click Submit.
Note: Existing scan reports from Tenable Vulnerability Management are not automatically available in
Tenable Security Center. However, you can manually download and import them into Tenable Security
Center.
Note: By default, Tenable Vulnerability Management selects the regional scanner that corresponds with the
location of your Tenable Vulnerability Management user account. For example, if you run a scan from a
user account located in the United States, Tenable Vulnerability Management selects the United States
scanner. If you run a scan from a user account in Germany, Tenable Vulnerability Management selects the
Germany scanner.
What to do next:
l Configure a scan zone, repository, and active scan objects, as described in Active Scans.
- 266 -
Status Description Recommended Action
Connection Error Tenable Security Center cannot Do one or both of the following:
connect to the scanner because
l Check your scanner
the scanner is unreachable or
configuration and confirm the
does not exist at the IP address
Host option specifies the
or hostname provided.
correct IP address or
hostname for the scanner.
- 267 -
Connection Tenable Security Center Contact your network administrator
Timeout connected to the scanner but for troubleshooting assistance.
timed out waiting for a reply.
Permission Error The provided API keys do not Check your scanner configuration
have the correct permissions to and confirm the Access Key and
run agent scans. Secret Key options specify valid
keys for the scanner.
Plugins Out of The plugin sets on the scanner For troubleshooting assistance, see
Sync do not match the plugin sets in the knowledge base article.
Tenable Security Center.
- 268 -
the scanner.
Updating Plugins Tenable Security Center is You may want to schedule plugin
performing a plugin update on updates to run a few hours before
the scanner. your scheduled scans. For more
information, see Edit Plugin and
Feed Settings and Schedules.
- 269 -
perform scans with or update
plugins for scanners running
unsupported versions of Tenable
Nessus. For minimum Tenable
Nessus scanner version
requirements, see the Tenable
Security Center Release Notes
for your version.
User Disabled A Tenable Security Center user Edit your scanner configuration and
disabled the scanner. click the Enabled toggle to re-
enable the scanner.
3. To filter the scanners that appear on the page, apply a filter as described in Apply a Filter.
4. To view the list of configured scanners, see View Your Nessus Scanners.
5. To view details for a scanner, see View Details for a Nessus Scanner.
- 270 -
6. To edit a scanner:
a. Right-click the row for the scanner.
-or-
c. Modify the scanner options. For more information about scanner options, see Tenable
Nessus Scanners.
d. Click Submit.
7. To download logs for a scanner, see Download Tenable Nessus Scanner Logs.
- 271 -
l Name — The name for the scanner.
l Status — The status of the scanner. For more information, see Tenable Nessus Scanner
Statuses.
Type Description
l Uptime — The length of time, in days, that the scanner has been running.
l Last Modified — The date and time the scanner was last modified.
- 272 -
4. To view details of a specific Tenable Nessus scanner, see View Details for a Nessus Scanner.
5. To filter the scanners that appear on the page, apply a filter as described in Apply a Filter.
6. To manually refresh the Status data, at the top of the table, click Update Status.
-or-
Select the check box for the scanner you want to view.
4. Click View.
Section Action
- 273 -
Section Action
Logs.
Data summary View metadata and performance metrics for the scanner.
Nessus Scanner If you are viewing details for a managed Tenable Nessus scanner
Health running version 8.2.0 or later, view scanner health summary data:
- 274 -
Section Action
Tenable Security Center refreshes the data when you load the View
Nessus Scanner page. To force a manual refresh, click the
button.
Administrators can view and manage Tenable Nessus scanner configurations from the Tenable
Security Center user interface. For more information about Tenable Nessus scanners in Tenable
Security Center, see Tenable Nessus Scanners.
Note: You cannot use Picture in Picture with a Tenable Nessus scanner if you enabled Use Proxy for the
scanner or if the scanner's Authentication Type is SSL Certificate. For more information, see Tenable
Nessus Scanner Settings.
To view Tenable Nessus instances inside the Tenable Security Center user interface:
- 275 -
3. Right-click the row for the Tenable Nessus scanner.
-or-
The Tenable Nessus instance opens inside the Tenable Security Center user interface.
What to do next:
l Manage your Tenable Nessus scanner configurations using the picture in picture window in
Tenable Security Center. For more information about Tenable Nessus and Tenable Nessus
settings, see the Tenable Nessus User Guide.
l To exit the Picture in Picture view, in the upper-right corner, click Back.
You can download a log file for Tenable Nessus scanners managed by Tenable Security Center. The
Tenable Nessus scanner must be running version 8.0.0 or later to send logs to Tenable Security
Center for download.
l System information (operating system version, CPU statistics, available memory, available
disk space, etc.)
l Troubleshooting data
If you include extended logs, the system also downloads recent Tenable Nessus web server log
records, system log data, and network configuration information.
- 276 -
1. Log in to Tenable Security Center via the user interface.
3. Right-click the row for the scanner for which you want to download logs.
-or-
Select the check box for the scanner for which you want to download logs.
5. To include recent Tenable Nessus web server log records, system log data, and network
configuration information, click to enable the Extended Logs toggle.
6. To hide the first two octets of IPv4 addresses within the logs, click to enable the Sanitize IPs
toggle.
7. Click Download.
Tip: If you use 7-Zip to extract the tar.gz file, you may see the following error message: There are
some data after the end of the payload data. You can safely ignore this error.
- 277 -
The Nessus Scanners page appears.
b. Click Delete.
4. Click Delete.
Tenable Security Center communicates with Tenable Nessus Network Monitor utilizing the XMLRPC
protocol on port 8835 by default. For information about Tenable Security Center-Tenable Nessus
Network Monitor communications encryption, see Encryption Strength.
Note: It is important for you to restrict the data Tenable Nessus Network Monitor collects to only the
desired IP address ranges. For example, if your attached Tenable Nessus Network Monitor collects
information on 1100 hosts and Tenable Security Center is licensed for 1000 hosts, Tenable Security Center
imports all of the Tenable Nessus Network Monitor data and indicates that you exceeded your host count.
For more information, see License Requirements.
- 278 -
Tenable Security Center will ask Tenable Nessus Network Monitor for the latest (if any) vulnerability
report once every hour by default. The pull interval may be changed under the System Configuration
page under the Update tab.
To fully configure passive scan data retrieval from Tenable Nessus Network Monitor:
1. Configure Tenable Nessus Network Monitor, as described in Get Started in the Tenable Nessus
Network Monitor User Guide.
2. Add your Tenable Nessus Network Monitor license to Tenable Security Center, as described in
Apply a New License.
3. Add an IPv4, IPv6, or Universal repository for Tenable Nessus Network Monitor data in Tenable
Security Center, as described in Add a Repository.
4. Add an Tenable Nessus Network Monitor instance in Tenable Security Center, as described in
Add an Tenable Nessus Network Monitor Instance.
5. (Optional) Configure Tenable Nessus Network Monitor plugin import schedules, as described in
Edit Plugin and Feed Settings and Schedules. By default, Tenable Security Center checks for
new passive vulnerability plugins every 24 hours and pushes them to your attached Tenable
Nessus Network Monitor instances.
What to do next:
l View vulnerability data filtered by your Tenable Nessus Network Monitor repository, as
described in Vulnerability Analysis.
For detailed information about plugins counted toward the Tenable Security Center license count,
see License Requirements.
- 279 -
Your Tenable Nessus Network Monitor instances can run in two modes: discovery mode disabled
and discovery mode enabled. For more information, see NNM Settings in the Tenable Nessus
Network Monitor User Guide.
If discovery mode is enabled on an Tenable Nessus Network Monitor instance, Tenable Security
Center stores discovery mode asset data to Tenable Security Center repositories. Since discovery
mode only discovers limited asset data, the repository data appears incomplete.
Tenable Security Center does not count IP addresses present only from Tenable Nessus Network
Monitor instances in discovery mode toward your license count.
4. Configure the settings, as described in Tenable Nessus Network Monitor Instance Settings.
c. In the Host box, type the hostname or IP address for the scanner.
d. In the Port box, view the default (8835) and modify, if necessary.
- 280 -
e. If you want to disable this scanner's connection to Tenable Security Center, click
Enabled to disable the connection.
f. If you want to verify that the hostname or IP address entered in the Host option matches
the CommonName (CN) presented in the SSL certificate from the Tenable Nessus
Network Monitor server, click Verify Hostname to enable the toggle.
g. If you want to use the proxy configured in Tenable Nessus Network Monitor for
communication with the scanner, click Use Proxy to enable the toggle.
i. In the Username box, type the username for the account generated during the
Tenable Nessus Network Monitor installation for daemon-to-client client
communications.
ii. In the Password box, type the password for the account generated during the
Tenable Nessus Network Monitor installation for daemon-to-client client
communications
j. If you selected SSL Certificate as the Type, click Choose File to upload a certificate.
ii. (Optional) If the private key that decrypts your SSL certificate is encrypted with a
passphrase, in the Certificate Passphrase box, type the passphrase for the private
key.
l. In the Repositories list, select one or more repositories where you want Tenable
Security Center to store the scanner data.
5. Click Submit.
- 281 -
To view your Tenable Nessus Network Monitor instances in Tenable Security Center:
l Uptime — The length of time, in days, that the instance has been running.
l Last Report — The date and time Tenable Nessus Network Monitor most recently
reported data to Tenable Security Center.
4. (Optional) To manually refresh the Status data, at the top of the table, click Update Status.
Option Description
Name Descriptive name for the Tenable Nessus Network Monitor instance.
Port TCP port that the Tenable Nessus Network Monitor instance listens on
for communications from Tenable Security Center. The default is port
8835.
- 282 -
Option Description
Username Username generated during the Tenable Nessus Network Monitor install
for daemon to client communications. This must be an administrator user
in order to send plugin updates to the Tenable Nessus Network Monitor
instance. This option is only available if the Authentication Type is set to
Password.
Password The login password must be entered in this option. This option is only
available if the Authentication Type is set to Password.
Certificate If you selected SSL Certificate as the Authentication Type and the
Passphrase private key that decrypts your SSL certificate is encrypted with a
passphrase, the passphrase for the private key.
Verify Hostname Adds a check to verify that the hostname or IP address entered in the
Host option matches the CommonName (CN) presented in the SSL
certificate from the Tenable Nessus Network Monitor server.
Use Proxy Instructs Tenable Security Center to use its configured proxy for
communication with the instance.
Repositories The repositories which this Tenable Nessus Network Monitor instance
will save its data to. If Tenable Nessus Network Monitor will be reporting
IPv4 and IPv6 data, at least two repositories (one for IPv4 and one for
IPv6 data) must be selected.
- 283 -
Tenable Tenable Log Correlation Engine (Log Correlation Engine) is a software module that
aggregates, normalizes, correlates, and analyzes event log data from the myriad of devices within
the infrastructure. Log Correlation Engine also has the ability to analyze logs for vulnerabilities.
Tenable Security Center performs vulnerability, compliance, and event management, but without
Log Correlation Engine integration it does not directly receive logs or IDS/IPS events. With Log
Correlation Engine integration, Log Correlation Engine processes the events and passes the results
to Tenable Security Center.
Log Correlation Engine's close integration with Tenable Security Center allows you to centralize log
analysis and vulnerability management for a complete view of your organization’s security posture.
Note: If you add an Log Correlation Engine server to Tenable Security Center and enable Import
Vulnerabilities, Log Correlation Engine data counts against your Tenable Security Center license. For more
information, see License Requirements.
For more information, see Add a Tenable Log Correlation Engine Server.
If remote root or root equivalent user login is prohibited in your environment, you can add the Log
Correlation Engine server using SSH key authentication. For more information, see Manual Log
Correlation Engine Key Exchange.
For information about Tenable Security Center-Tenable Log Correlation Engine communications
encryption, see Encryption Strength.
Description Descriptive text for the integrated Tenable Log Correlation Engine.
Organizations Organizations that can access data from the integrated Tenable Log
Correlation Engine.
- 284 -
Option Description
Repositories The repositories where you want Tenable Security Center to store the
imported Log Correlation Engine data.
Port The port where the Log Correlation Engine reporter is listening on the
Log Correlation Engine server.
Username and The username and password you want Tenable Security Center to use for
Password authentication to the Log Correlation Engine server to retrieve
vulnerability information.
This user account must be able to make changes on the remote system
to enable the SSH key exchange between Tenable Security Center and
Log Correlation Engine. The appropriate permissions level is typically
root, root equivalent, or other high-level user permissions on the Log
Correlation Engine system. Tenable Security Center uses these
credentials a single time to exchange SSH keys for secure
communication between Tenable Security Center and Log Correlation
Engine.
Tip: You can configure more than one Tenable Log Correlation Engine to work with Tenable Security
Center.
- 285 -
The LCE Servers page appears.
a. In the Name box, type a name for the Log Correlation Engine server.
b. In the Description box, type a description for the Log Correlation Engine server.
c. In the Host box, type the hostname or IP address for the Log Correlation Engine server.
d. In the Port box, view the default (1243) and modify, if necessary.
5. (Optional) To allow Tenable Security Center to log in to the Log Correlation Engine server and
retrieve vulnerability information:
Note: If you use an Log Correlation Engine server with Tenable Security Center, Tenable
Security Center counts the IP addresses associated with each imported instance against your
license. For more information, see License Requirements.
c. Type a Username and Password you want Tenable Security Center to use for access to
the Log Correlation Engine server.
6. Click Submit.
7. (Optional) If you enabled the Check Authentication option above, Tenable Security Center
checks its ability to authenticate with the Log Correlation Engine server.
l If authentication fails, Tenable Security Center prompts you for credentials to the Log
Correlation Engine server:
- 286 -
a. Type a username and password.
The default view for the Log Correlation Engine Clients page displays all of the available clients for
the selected Tenable Log Correlation Engine server in the Filters section, and may be changed by
updating the Log Correlation Engine Server filter. Use the other filter options, to narrow down the
displayed clients for the selected server by a mix of criteria based on combinations of the displayed
columns.
Current Log Correlation Engine Client versions display information in the table including their name,
host address, authorization status, client type, host OS, assigned policy file, date last updated, and
client version. Log Correlation Engine Client configurations can be managed from Tenable Security
Center.
Tip: Configured clients prior to version 5.x appear in the list without OS and policy information. However,
these clients cannot have their policy files centrally managed from Tenable Security Center.
Each client may have a name assigned to it to help easily identify the client. The currently assigned
name appears in the Name column. To change the name, click on the client to edit from the list, and
type the name. Client names may not contain spaces. Click the Submit button to save the change.
Log Correlation Engine Clients are initially configured to send their data to a particular Log
Correlation Engine server, but must be authorized by the Log Correlation Engine sever for the
server to accept the data. The client’s authorization status appears in the left-side column. If there
is no icon, the client is authorized to send data to the Log Correlation Engine server. If there is a
broken link icon, the client is not authorized to send data to the Log Correlation Engine server. To
do this, right-click the row for the client or select the check box for the client, then click Authorize
or Revoke Authorization.
- 287 -
Each client must have a policy assigned to it that specifies the appropriate data to send. The
currently assigned policy appears in the Policy column. To change the assigned policy, select the
client to edit and click the appropriate policy from the drop-down box. Search client policies by
name by entering text into the Policy box. Click the Submit button to save the change. The policy
updates on the client on its next connection.
Example policy files are available for use with the names default and beginning with TNS-. You can
use these policy files as is or export them to be used as a basis for custom policy files. Tenable may
update or change these example policy files without notice, so using them as is may return
different results at a later time.
Use the Add button to add customized Log Correlation EngineClient policy files to the Log
Correlation Engine server and make them available for use. The Name option is appended to the
beginning of the file name and offers a description of the function or use of the policy file. The OS
Type is used in the file name to easily identify the OS for which the policy is designed. The Client
Type indicates the LCE Client for which the policy is written. The Source option is used to select
and upload the custom policy file or type the policy file into the box. Click the Submit button to save
the policy file and send it to the Log Correlation Engine server.
Note: The default and TNS prefixes should only be used by policies supplied by Tenable. If you use default
or TNS as a prefix for custom policy files, they may be overwritten or manipulated.
Right-click or select the check box for a policy, then click Export to save the policy to a local drive.
The file is in XML format, which you can edit with standard text or XML editors.
Right-click or select the check box for a policy, then click View to display the policy name and
source of the policy in a window within Tenable Security Center. You cannot edit the information
from within this window.
Note: For more information on creating Log Correlation Engine Client policy files, see the Tenable Log
Correlation Engine Client Guide.
OT Security Instances
- 288 -
OT Security protects industrial networks by providing industrial and critical infrastructure
operations with visibility, security, and control to ensure safe facility operation while reducing
overall risk. You can use Tenable Security Center to analyze OT Security asset and vulnerability data
alongside your data from other scanners.
When you configure data synchronization from OT Security to Tenable Security Center, OT Security
sends asset and vulnerability data to an agent repository in Tenable Security Center. OT Security
communicates with Tenable Security Center using the Tenable Security Center API.
Note: It is important to restrict the data OT Security collects to only the desired host IP address ranges.
For example, if OT Security collects information on 1100 hosts and Tenable Security Center is licensed for
1000 hosts, OT Security sends all of the data to Tenable Security Center and Tenable Security Center will
indicate that you exceeded your host count. For more information, see License Requirements.
1. Add a designated agent repository for OT Security data in Tenable Security Center, as
described in Add a Repository.
2. Using the OT Security API, configure the Tenable Security Center integration to specify the
sync schedule, import repository, and authentication.
What to do next:
l View scan results from OT Security, as described in View Scan Results.
Repositories
Repositories are databases within Tenable Security Center that contain vulnerability data. You can
share repositories with users and organizations based on admin-defined assets. Repositories
provide scalable and configurable data storage. Optionally, you can share repository data between
multiple Tenable Security Centers.
- 289 -
Note: The maximum repository size is 64 GB. For best performance, Tenable recommends splitting
repositories larger than 32 GB.
When adding a local repository, you designate storage within Tenable Security Center for different
types of vulnerability data (identified by IPv4 addresses, IPv6 addresses, agents, or mobile
scanners). Scanners attached to a Tenable Security Center populate your local repositories with
vulnerability data. For more information, see Local Repositories.
When adding an external repository, you access a local repository from another Tenable Security
Center:
l Remote repositories allow you to share repository data from one Tenable Security Center
deployment to your primary Tenable Security Center deployment via an SSH session.
l Offline repositories allow you to share repository data from one Tenable Security Center
deployment to your primary Tenable Security Center deployment via manual export and import
(a .tar.gz archive file). You can combine data from several repository files into a single
offline repository by importing multiple files to the offline repository.
External repository data is static and used solely for reporting purposes. For more information, see
External Repositories.
For more information, see Add a Repository and Manage Repositories. For information about
Tenable Security Center repository data encryption, see Encryption Strength.
Tip: If you need to remove data from a repository (for example, to remove retired asset data or to resolve a
license issue), see the knowledge base article.
Manage Repositories
- 290 -
The Repositories page appears.
3. To filter the repositories that appear on the page, apply a filter as described in Apply a Filter.
-or-
Select the check box for the repository you want to view.
b. Click View.
The View Repository page appears. For more information, see Repository Details.
5. To edit a repository:
-or-
Select the check box for the repository you want to edit.
d. Click Submit.
- 291 -
7. To import a repository file into an offline repository, see Import a Repository.
Add a Repository
To add a repository:
4. Click the tile for the repository type you want to add.
l IPv4/IPv6 Repositories
l Mobile Repositories
l Agent Repositories
l Universal Repositories
l Remote Repositories
l Offline Repositories
6. Click Submit.
What to do next:
- 292 -
l If you added an offline repository, export one or more repositories from your other Tenable
Security Center as described in Export a Repository.
l If you added an offline repository, import one or more exported repository files as described
in Import a Repository.
You can view a list of all repositories on your Tenable Security Center. For more information, see
Repositories.
l IP/Device Count — The total number of assets for which the repository contains
vulnerability data.
l Capacity — (IPv4, IPv6, Agent, and Universal repositories only) The percentage of
maximum available repository space you are currently using. The maximum repository
size is 64 GB.
Tip: For best performance, Tenable recommends splitting repositories larger than 32 GB.
l Last Updated — The date and time the repository was last updated.
- 293 -
View Repository Details
You can view details for any repository. For more information, see Repositories.
-or-
Select the check box for the repository you want to view.
4. Click View.
- 294 -
Section Repository Type Action
updated.
- 295 -
Section Repository Type Action
l IPv4/IPv6 Repositories
l Agent Repositories
l Universal Repositories
l Remote Repositories
l Offline Repositories
Advanced Settings IPv4/IPv6, Agent, View a summary of your settings for the
Remote, Offline, repository. For more information about a
Universal setting, see:
l IPv4/IPv6 Repositories
l Agent Repositories
l Universal Repositories
l Remote Repositories
l Offline Repositories
- 296 -
Section Repository Type Action
Vulnerability Data IPv4/IPv6, Agent, View the data expiration settings for the
Lifetime Universal repository. For more information, see:
l IPv4/IPv6 Repositories
l Agent Repositories
l Universal Repositories
Export a Repository
- 297 -
You can export a repository from one Tenable Security Center and import it as an offline repository
on another Tenable Security Center. You can export repositories via the Tenable Security Center
user interface or the CLI. For more information, see Offline Repositories.
Note: Depending on the size of the repository database, this file can be quite large. It is important to save
the file to a location with sufficient free disk space.
Tip: If the repository you want to export has trend data enabled and you want to include trend data in your
repository export, export the repository via the CLI. Repositories that you export via the user interface do
not include trend data. For more information about trend data, see IPv4/IPv6 Repositories, Agent
Repositories, and Universal Repositories.
-or-
Select the check box for the repository you want to export.
4. Click Export.
1. Log in to Tenable Security Center via the command line interface (CLI).
- 298 -
Variable Description
trendingDays (IP, Agent, and Universal repositories only) The number of days of
vulnerability trending data to include. To use the preconfigured
repository setting, type default.
trendWithRaw (IP, Agent, and Universal repositories only) Specify whether you
want the export to include plugin output data: yes or no. To use
the preconfigured repository setting, type default.
(Optional) To automatically overwrite an existing repository file with the same name, include
the optional argument -f.
For example:
What to do next:
l To import the repository to another Tenable Security Center, add an offline repository to that
Tenable Security Center, as described in Add a Repository.
Import a Repository
- 299 -
Required User Role: Administrator
You can import one or more repository files to an offline repository. For more information, see
Offline Repositories.
Note: When importing the repository archive, the default maximum file import size is 360MB. This is
specified by the post_max_size directive in /opt/sc/support/etc/php.ini. If larger file uploads are
required, increase the default value.
-or-
Select the check box for the offline repository you created.
Delete a Repository
To delete a repository:
- 300 -
1. Log in to Tenable Security Center via the user interface.
b. Click Delete.
4. Click Delete.
Local Repositories
When adding local repositories, you designate storage within Tenable Security Center for different
types of vulnerability data. Scanners attached to a Tenable Security Center populate your local
repositories with vulnerability data.
Tenable Security Center supports four types of local repositories: IPv4/IPv6 Repositories, Mobile
Repositories, Agent Repositories, and Universal Repositories.
IPv4/IPv6 Repositories
- 301 -
These are the most common types of repositories used with Tenable Security Center. They store
IPv4 and IPv6 data from active and passive scans. Data stored in local repositories can be shared
between organizations and includes the full range of event and vulnerability metadata.
Caution: When creating Tenable Security Center IPv4 or IPv6 repositories, Log Correlation Engine event
source IP address ranges must be included along with the vulnerability IP address ranges or the event data
and event vulnerabilities are not accessible from the Tenable Security Center user interface.
IP Repository Options
Option Description
General
Data
IP Ranges Specifies the IP address range of vulnerability data you want to store in
the repository.
Access
Organizations Specifies which organizations have access to the vulnerability data stored
in the repository.
Advanced Settings
Generate Trend When enabled, Tenable Security Center generates trend data by taking
Data periodic snapshots of the cumulative database. Trend data is displayed in
- 302 -
Option Description
some Tenable Security Center tools (e.g., trending line charts and trending
area charts).
Days Trending Specifies the number of days of cumulative vulnerability data that you
want Tenable Security Center to display in dashboard and report
vulnerability trending displays.
Enable Full Text When enabled, Tenable Security Center includes vulnerability text in
Search periodic snapshots of .nessus data for vulnerability trending purposes. For
more information about the Vulnerability Text filter component, see
Vulnerability Analysis Filter Components.
Active The number of days you want Tenable Security Center to retain active
scan vulnerability data stored in IP repositories. The default value of this
option is 365 days.
Passive The number of days you want Tenable Security Center to retain Tenable
- 303 -
Option Description
Event (IPv4 repositories only) The number of days you want Tenable Security
Center to retain Log Correlation Engine event data stored in
IP repositories. The default value of this option is 365 days.
Compliance The number of days you want Tenable Security Center to retain audit
compliance data stored in IP repositories. The default value of this option
is 365 days.
Mitigated The number of days you want Tenable Security Center to retain mitigated
vulnerability data. The default value of this option is 365 days.
Mobile Repositories
The mobile repository is a local type that stores data from various servers. For more information,
see Add a Repository.
General Options
l ActiveSync Options
- 304 -
Option Description Default
l MaaS360 Options
l MobileIron Options
ActiveSync Options
The following table describes the additional options to configure when creating an ActiveSync
mobile repository.
- 305 -
Option Description Default
Update Schedule Specifies when Tenable Security Center scans Every day at
the server to update the mobile repository. On 12:30 -04:00
each scan, Tenable Security Center removes
the current data in the repository and replaces
it with data from the latest scan.
The following table describes the additional options to configure when creating an AirWatch MDM
mobile repository.
Verify SSL Certificate When enabled, Tenable verifies that the Enabled
- 306 -
Option Description Default
The following table describes the additional options to configure when creating an Apple Profile
Manager mobile repository.
- 307 -
Option Description Default
Verify SSL Certificate When enabled, Tenable verifies that the Enabled
SSL certificate on the server is signed by a
trusted CA.
The following table describes the additional options to configure when creating a Blackberry UEM
mobile repository.
- 308 -
Option Description Default
Port The port you want Tenable Security Center to use for --
authenticating to the Blackberry UEM server.
Verify When enabled, Tenable verifies that the SSL certificate Disabled
SSL Certificate on the server is signed by a trusted CA.
Update Schedule Specifies when Tenable Security Center scans the server Every day at
to update the mobile repository. On each scan, Tenable 12:30 -
Security Center removes the current data in the 04:00
repository and replaces it with data from the latest scan.
- 309 -
The following table describes the additional options to configure when creating a Good MDM mobile
repository.
Username The username for the Good MDM user account Tenable --
Security Center uses to authenticate to Good MDM.
Update Schedule Specifies when Tenable Security Center scans the Every day
server to update the mobile repository. On each scan, at 12:30 -
Tenable Security Center removes the current data in 04:00
the repository and replaces it with data from the latest
scan.
- 310 -
MaaS360 Options
The following table describes the additional options to configure when creating a MaaS360 mobile
repository.
Username The username for the MaaS360 user account Tenable Security --
Center uses to authenticate to MaaS360.
Collect All When enabled, a mobile repository scan collects all data. Enabled
Device Data
When disabled, you can select which types of data a mobile
repository scan collects:
- 311 -
Option Description Default
to a mobile repository.
Update Specifies when Tenable Security Center scans the server to Every day
Schedule update the mobile repository. On each scan, Tenable Security at 12:30 -
Center removes the current data in the repository and 04:00
replaces it with data from the latest scan.
Intune Options
The following table describes the additional options to configure when creating a Microsoft Intune
mobile repository.
Intune Tenant The Microsoft Azure Directory value in your Microsoft Intune --
registration.
Intune Client The Microsoft Azure Application value generated during your --
Microsoft Intune registration.
Intune The username for the Microsoft Intune user account Tenable --
Username Security Center uses to authenticate to Microsoft Intune.
Update Specifies when Tenable Security Center scans the server to Every day
Schedule update the mobile repository. On each scan, Tenable Security at 12:30 -
Center removes the current data in the repository and replaces 04:00
it with data from the latest scan.
- 312 -
MobileIron Options
The following table describes the additional options to configure when creating a MobileIron mobile
repository.
MobileIron VSP Admin Portal The server URL Tenable Security Center uses --
URL to authenticate to the MobileIron
administrator portal.
VSP Admin Portal Port (Optional) The TCP port that the MobileIron --
administrator portal listens on for
communications from Tenable Security
Center.
MobileIron Port The TCP port that MobileIron listens on for 443
communications from Tenable Security
Center.
Verify SSL Certificate When enabled, Tenable verifies that the Enabled
SSL certificate on the server is signed by a
trusted CA.
- 313 -
Option Description Default
Agent Repositories
Agent repositories can store data from Tenable Nessus Agents (identified by agent ID) or
OT Security (identified by OT Security UUID).
An agent ID uniquely identifies agent-detected assets that may share a common IP address.
OT Security assigns UUIDs to assets to uniquely identify them, since not all operational technology
assets have IP addresses. Then, Tenable Security Center uses the UUIDs to uniquely identify
OT Security data in Tenable Security Center. For more information about viewing OT Security data
in Tenable Security Center, see OT Security Instances.
General
- 314 -
Option Description
Access
Organizations Specifies which organizations have access to the vulnerability data stored
in the repository.
Advanced Settings
Generate Trend When enabled, Tenable Security Center generates trend data by taking
Data periodic snapshots of the cumulative database. Trend data is displayed in
some Tenable Security Center tools (e.g., trending line charts and trending
area charts).
Days Trending Specifies the number of days of cumulative vulnerability data that you
want Tenable Security Center to display in dashboard and report
vulnerability trending displays.
Enable Full Text When enabled, Tenable Security Center includes vulnerability text in
Search periodic snapshots of .nessus data for vulnerability trending purposes. For
more information about the Vulnerability Text filter component, see
Vulnerability Analysis Filter Components.
Active The number of days you want Tenable Security Center to retain agent
scan vulnerability data stored in agent repositories. The default value of
- 315 -
Option Description
Compliance The number of days you want Tenable Security Center to retain audit
compliance data stored in repositories. The default value of this option is
365 days.
Mitigated The number of days you want Tenable Security Center to retain mitigated
vulnerability data. The default value of this option is 365 days.
Universal Repositories
Universal repositories can store data from Tenable Nessus, Tenable Nessus Agent, and Tenable OT
Security scans, as well as IPv4 and IPv6 data from Tenable Nessus Network Monitor, and Log
Correlation Engine scans.
Tenable Security Center assigns UUIDs to assets to uniquely identify vulnerability data in universal
repositories, since not all operational technology assets have IP addresses or Tenable UUIDs.
General
Data
IP Ranges Specifies the IP address range of vulnerability data you want to store in
the repository.
Note: Agent scans and Tenable OT Security scans into universal repositories
- 316 -
Option Description
Access
Organizations Specifies which organizations have access to the vulnerability data stored
in the repository.
Advanced Settings
Generate Trend When enabled, Tenable Security Center generates trend data by taking
Data periodic snapshots of the cumulative database. Trend data is displayed in
some Tenable Security Center tools (e.g., trending line charts and trending
area charts).
Days Trending Specifies the number of days of cumulative vulnerability data that you
want Tenable Security Center to display in dashboard and report
vulnerability trending displays.
Enable Full Text When enabled, Tenable Security Center includes vulnerability text in
Search periodic snapshots of .nessus data for vulnerability trending purposes. For
more information about the Vulnerability Text filter component, see
Vulnerability Analysis Filter Components.
Active The number of days you want Tenable Security Center to retain active
- 317 -
Option Description
Passive The number of days you want Tenable Security Center to retain passive
scan vulnerability data stored in universal repositories. The default value
of this option is 7 days.
Event The number of days you want Tenable Security Center to retain event data
stored in universal repositories. The default value of this option is 365
days.
Compliance The number of days you want Tenable Security Center to retain audit
compliance data stored in universal repositories. The default value of this
option is 365 days.
Mitigated The number of days you want Tenable Security Center to retain mitigated
vulnerability data stored in universal repositories. The default value of this
option is 365 days.
External Repositories
When adding an external repository, you access a local repository from another Tenable Security
Center:
l Offline repositories allow you to share repository data from one Tenable Security Center
deployment to your primary Tenable Security Center deployment via manual export and import
(a .tar.gz archive file). You can combine data from several repository files into a single
offline repository by importing multiple files to the offline repository.
l Remote repositories allow you to share repository data from one Tenable Security Center
deployment to your primary Tenable Security Center deployment via an SSH session.
External repository data is static and used solely for reporting purposes. For more information, see
Offline Repository Options and Remote Repositories.
Offline Repositories
- 318 -
Offline repositories allow you to share repository data from one Tenable Security Center
deployment to your primary Tenable Security Center deployment via manual export and import (a
.tar.gz archive file). You can combine data from several repository files into a single offline
repository by importing multiple files to the offline repository.
Offline repositories are particularly useful to export data from air-gapped instances of Tenable
Security Center. For more information, see Considerations for Air-Gapped Environments.
Note: You cannot set an offline repository as the Import Repository for active scans. You can only use
offline repository data for reporting purposes.
2. Export one or more repositories from your other Tenable Security Center deployment.
3. Import one or more repositories to the offline repository on your primary Tenable Security
Center deployment.
General
Access
Data Type The type of data in the other Tenable Security Center repository: IPv4,
IPv6, Mobile, Agent, or Universal.
IP Ranges If the Data Type is IPv4 or IPv6, specifies the IP address range of
vulnerability data that you want to view in the offline repository. For
example, to view all data from the exported repository file, specify a range
that includes all data in that repository.
- 319 -
Option Description
Type If the Data Type is Mobile, the type of mobile repository: ActiveSync,
AirWatch MDM, Apple Profile Manager, Blackberry UEM, Good MDM,
Microsoft Intune, or Mobile Iron.
Access
Organizations Specifies which organizations have access to the vulnerability data stored
in the repository.
Advanced Settings
Generate Trend When enabled, Tenable Security Center generates trend data by taking
Data periodic snapshots of the cumulative database. Trend data is displayed in
some Tenable Security Center tools (e.g., trending line charts and trending
area charts).
Days Trending Specifies the number of days of cumulative vulnerability data that you
want Tenable Security Center to display in dashboard and report
vulnerability trending displays.
Enable Full Text When enabled, Tenable Security Center includes vulnerability text in
- 320 -
Option Description
Search periodic snapshots of .nessus data for vulnerability trending purposes. For
more information about the Vulnerability Text filter component, see
Vulnerability Analysis Filter Components.
Remote Repositories
Remote repositories allow you to share repository data from one Tenable Security Center
deployment to your primary Tenable Security Center deployment via an SSH session.
Note: You cannot set a remote repository as the Import Repository for active scans. You can use remote
repository data only for reporting purposes.
Note: Ensure all your Tenable Security Center deployments are running the same version. For example, if
your remote repository exists on a Tenable Security Center running a later version than your primary
Tenable Security Center deployment, upgrade your primary Tenable Security Center deployment to the
same version.
To use tiered remote repositories for large enterprise deployments of Tenable Security Center, see
Tiered Remote Repositories.
Option Description
General
Host The IP address for the host you want to synchronize with to obtain
repository data. After you type the IP address:
- 321 -
Option Description
Repository The remote repository you want to collect IP addresses and vulnerability
data from.
Update Schedule Sets the schedule for the remote server to be queried for updated
information.
Access
Organizations Specifies which organizations have access to the vulnerability data stored
in the repository.
A tiered remote repository configuration uses remote repositories to share data between multiple
Tenable Security Center instances.
l If you plan to support 100,000-249,999 hosts, Tenable recommends a tiered remote repository
configuration.
l If you plan to support 250,000 or more hosts, Tenable requires a tiered remote repository
configuration.
Tiered Tenable Security Center instances perform informal roles in your overall Tenable Security
Center deployment. Tenable recommends at least one designated reporting Tenable Security
Center and an additional Tenable Security Center instance for every 100,000 to 150,000 hosts on
your network.
- 322 -
l A scanning tier Tenable Security Center optimizes scanning by managing scan jobs across
your attached scanners. Scanning tier Tenable Security Center instances prioritize efficient
collection of scan data.
l A reporting tier Tenable Security Center optimizes dashboards and reporting by centralizing
the data collected by scanning tier Tenable Security Center instances.
Note: Your scanning tier and reporting tier Tenable Security Center instances must be running the same
Tenable Security Center version.
Without a tiered remote repository configuration, enterprise-scale scanning and analysis may cause
performance issues on a single Tenable Security Center. Tiered remote repositories optimize your
analysis and report generation without negatively impacting scanning performance.
Tip: Configuring tiered remote repositories does not allow you to monitor the status of scanning tier
Tenable Security Center instances. To monitor the status of multiple Tenable Security Center instances,
connect your Tenable Security Center instances to Tenable Security Center Director. For more information
about Tenable Security Center Director, see the Tenable Security Center Director User Guide.
1. On the scanning tier Tenable Security Center instance, create one or more repositories for
storing scan result data.
Note: To view trend data for scanning tier Tenable Security Center instances on your
reporting tier Tenable Security Center instance, enable the Generate Trend Data option
for each repository on your scanning tier Tenable Security Center instances. For more
information, see Agent Repositories and IPv4/IPv6 Repositories.
2. On the scanning tier Tenable Security Center instance, run scans to populate the repositories
with data.
- 323 -
3. On the reporting tier Tenable Security Center instance, create a remote repository for each
repository on your scanning tier Tenable Security Center instance.
The reporting tier Tenable Security Center syncs scan result data from the scanning tier
Tenable Security Center repositories.
Active Scans
In active scanning, the scanner sends packets to a remote target to provide a snapshot of network
services and applications. Tenable Security Center compares this data to a plugin database to
determine if any vulnerabilities are present. Tenable Security Center can also use a scanner located
outside the local network to simulate what an external entity might see.
For more information about supported active scanner types (Tenable Nessus and Tenable
Vulnerability Management deployments) in Tenable Security Center, see Tenable Nessus Scanners.
You can use credentialed Tenable Nessus scans, a type of active scanning, to perform highly
accurate and rapid patch, configuration, and vulnerability audits on Unix, Windows, Cisco, and
database systems by actually logging in to the target system with provided credentials.
Credentialed scans can also enumerate all UDP and TCP ports in just a few seconds. Tenable
Security Center can manage these credentials securely across thousands of different systems and
also share the results of these audits only with users who need to access them.
For more information, see Manage Active Scans and Active Scan Settings.
1. If you are configuring a Tenable Nessus scanner (not a Tenable Vulnerability Management
deployment), configure scanning in Tenable Nessus, as described in Scans in the Tenable
Nessus User Guide.
Note: For information about credentialed scanning in Tenable Nessus, see Credentialed Checks in the
Tenable Nessus User Guide.
2. Add the Tenable Nessus scanner or your Tenable Vulnerability Management deployment in
Tenable Security Center, as described in Tenable Nessus Scanners.
3. Add a scan zone in Tenable Security Center, as described in Add a Scan Zone.
- 324 -
4. Add a repository for the scan data in Tenable Security Center, as described in Add a
Repository.
b. Add Credentials.
6. Add an active scan in Tenable Security Center, as described in Add an Active Scan.
What to do next:
l View scan results, as described in Scan Results.
If you experience issues with an active scan, Tenable Support may ask you to run a diagnostic scan
to assist with troubleshooting. After Tenable Security Center runs the diagnostic scan, download
the diagnostic file and send it to Tenable Support.
Remediation Scans
You can run a remediation scan to run a followup active scan against existing active scan results. A
remediation scan evaluates a specific plugin against a specific target or targets where the related
vulnerability was present in your earlier active scan.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
- 325 -
For more information about active scan options, see Active Scan Settings.
l Confirm you understand the complete scanning configuration process, as described in Active
Scans.
3. Click Add.
4. Click General.
8. (Optional) If you want to schedule the scan to run automatically, select a Schedule for the
scan.
9. Click Settings.
- 326 -
15. Click Targets.
17. Select one or more Assets and IPs / DNS Names for the scan.
a. Click Credentials.
19. (Optional) If you want to configure multiple credentials for the active scan, repeat step 19.
Note: When running an active scan, Tenable Security Center attempts authentication
using the newest credentials added by an Administrator user. If the newest Administrator-
added credentials do not match, Tenable Security Center attempts authentication with
older Administrator-added credentials.
Then, if no Administrator-added credentials match, Tenable Security Center attempts to
authenticate using the newest credentials added by an organizational user. If the newest
organizational user-added credentials do not match, Tenable Security Center attempts
authentication with older organizational user-added credentials.
c. Select the report you want to run after the scan completes, as described in Add a Report
to a Scan.
- 327 -
Tenable Security Center saves your configuration.
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
You can configure a scan policy to scan the following virtual environments:
l Virtual machines
Note: You must provide an IPv4 address when scanning an ESXi host. Otherwise, the scan fails.
1. Begin configuring a scan policy that supports credentialed access, as described in Add a Scan
Policy. For more information about authentication options in scan policies, see The
Authentication tab specifies authentication options during a scan..
5. In the second Type drop-down box, select VMware ESX SOAP API.
6. Click Select.
The VMware ESX SOAP API options appear. For more information, see VMware ESX SOAP API.
7. In the Username box, type the username associated with the local ESXi account.
- 328 -
8. In the Password box, type the password associated with the username you provided.
9. If your vCenter host includes an SSL certificate (not a self-signed certificate), disable the Do
not verify SSL Certificate toggle.
Tenable Security Center applies the VMware ESX SOAP API authentication options to the scan
policy.
What to do next:
l Reference the scan policy in an active scan configuration, as described in Add an Active Scan.
1. Begin configuring a scan policy that supports credentialed access, as described in Add a Scan
Policy. For more information about authentication options in scan policies, see The
Authentication tab specifies authentication options during a scan..
5. In the second Type drop-down box, select VMware vCenter SOAP API.
6. Click Select.
The VMware vCenter SOAP API options appear. For more information, see VMware vCenter
SOAP API.
- 329 -
7. In the vCenter Host box, type the IP address of the vCenter host.
8. In the vCenter Port box, type the port for the vCenter host.
9. In the Username box, type the username associated with the local vCenter account.
10. In the Password box, type the password associated with the username you provided.
11. If the vCenter host is not SSL enabled, disable the HTTPS toggle.
12. If your vCenter host includes an SSL certificate (not a self-signed certificate), enable the
Verify SSL Certificate toggle.
Tenable Security Center applies the VMware vCenter SOAP API authentication options to the
scan policy.
Note: When scanning vCenter-managed ESXis with API credentials, the Nessus Scan information
plugin always shows Credentialed Checks: No in the vCenter scan results. To verify that the
authentication was successful, check to see that the Nessus Scan Information plugin shows
Credentialed Checks: Yes in the scan results of the ESXis.
What to do next:
l Reference the scan policy in an active scan configuration, as described in Add an Active Scan.
- 330 -
VIB Enumeration Yes 7.0.3+, 8.x
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
3. To filter the scans that appear on the page, apply a filter as described in Apply a Filter.
5. To suspend or resume a scheduled scan, see Suspend or Resume a Scheduled Active Scan.
-or-
b. Click View.
7. To edit a scan:
- 331 -
a. Right-click the row for the scan.
-or-
b. Click Edit.
d. Click Submit.
8. To copy a scan:
a. Right-click the row for the scan.
-or-
b. Click Copy.
c. Click Copy.
- 332 -
Tenable Security Center creates a copy of the scan.
b. Click Delete.
c. Click Delete.
c. Click Delete.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
- 333 -
l Scans > Active Scans (to manage active scans)
l Scans > Agent Synchronization Jobs (to manage agent synchronization jobs)
l Scans > Scan Results (to manage a scan from the results page).
l To pause the scan or synchronization job, select the check box for the scan or
synchronization job, and click Pause at the top of the table.
l To start the scan or synchronization job, select the check box for the scan or
synchronization job, and click Launch at the top of the table.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
If you suspend a scheduled active scan, Tenable Security Center stops launching new scans for that
active scan configuration. Tenable Security Center does not disrupt scans already in progress or
prevent users from launching scans on demand.
If you resume a suspended active scan, Tenable Security Center resumes launching scans on the
schedule configured for that active scan.
- 334 -
3. Right-click the row for the scheduled scan you want to suspend or resume.
-or-
Select the check box for the scheduled scan you want to suspend or resume.
The page updates to reflect the scan schedule status. When a scan is suspended, Tenable
Security Center displays a line through the Start Time and Schedule values.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
If you experience issues with an active scan, Tenable Support may ask you to run a diagnostic scan
to assist with troubleshooting. After Tenable Security Center runs the diagnostic scan, download
the diagnostic file and send it to Tenable Support.
l Confirm the scanner associated with the active scan is running a supported version of
Tenable Nessus. For minimum Tenable Nessus scanner version requirements, see the Tenable
Security Center Release Notes for your version.
2. Right-click the row for the scan where you want to run a diagnostic scan.
-or-
Select the check box for the scan where you want to run a diagnostic scan.
- 335 -
The available actions appear at the top of the table.
Note: You must resolve repository errors before running a diagnostic scan.
4. In the Diagnostic Target box, type a target as a single IPv4 address, IPv6 address, or
hostname. The target must also be specified in the active scan's Targets.
5. In the Diagnostic Password box, type a password to secure the diagnostic file.
6. Click Submit.
8. Locate the diagnostic scan and confirm that the scan finished without errors.
-or-
l Parameter
l Parameter
l The Targets section identifies the devices Tenable Security Center scans.
l The Credentials section allows users to select pre-configured credential sets for
authenticated scanning. For more information, see Credentials.
- 336 -
l These options determine what actions occur immediately before and after the active scan
completes.
General Options
Parameter Description
General
Name The scan name that is associated with the scan’s results and may be any
name or phrase (for example, SystemA, DMZ Scan, or Daily Scan of the Web
Farm).
Policy The policy on which you want to base the scan. You can scroll through the
list, or search by entering text in the search box at the top of the list of
available policies.
Schedule
l Now specifies that you want Tenable Security Center to launch the
scan immediately without saving the configuration for later.
Note: Scans configured to run Now do not appear on the Active Scans
page.
l Once specifies that you want Tenable Security Center to launch the
scan at the specified time without saving the configuration for later.
Note: Scans configured to run Once do not appear on the Active Scans
page.
- 337 -
Parameter Description
that does not exist in some months (e.g., the 29th), Tenable Security
Center cannot run the scan on those days.
l On Demand specifies that you want to manually launch the scan at any
time.
Settings Options
Parameter Description
Basic
Scan Zone Note: If your organization's Distribution Method setting is Locked Zone, you
cannot modify this setting. If your organization's Distribution Method setting
is Automatic Distribution Only, Tenable Security Center automatically
chooses one or more scan zones and hides this setting.
Specifies the scan zone you want to use to run the scan. Depending on
your organization's Distribution Method setting, you can select one of the
following:
Note: If you select a single scan zone, Tenable Security Center ignores
the ranges in the scan zone and scans all of the targets you specify in
the scan configuration.
Import Repository Specifies the repository where Tenable Security Center imports the scan
results. Select a IPv4, IPv6, or Universal repository to receive IPv4 or IPv6
- 338 -
Parameter Description
Scan Timeout The action you want Tenable Security Center to perform in the event a
Action scan is incomplete:
l Discard Results — The system does not import any of the results
obtained by the scan to the database.
Rollover Schedule If you set the Scan Timeout Action to Import results with Rollover, this
option specifies how to handle the rollover scan. You can create the
rollover scan as a template to launch manually, or to launch the next day
at the same start time as the just-completed scan.
Advanced
Scan Virtual Specifies whether the system treats a new DNS entry for an IP address
Hosts as a virtual host as opposed to a DNS name update.
When Tenable Security Center finds a new DNS name for an IP address:
l If Scan Virtual Hosts is enabled, vulnerability data for the two DNS
names appears as two entries with the same IP address in the IP
Summary analysis tool.
l If Scan Virtual Hosts is disabled, vulnerability data for the two DNS
names merge into a single IP address entry in the IP Summary
analysis tool.
If you import scan results from a Universal repository, this option does
not appear. Universal repositories treat hosts with the same IP address
but unique FQDNs as different hosts. For more information, see Universal
- 339 -
Parameter Description
Repositories.
Track hosts This option uses the DNS name, NetBIOS name, Agent ID, and MAC
which have been address (if known), in that order, to track a host when its IP address
issued new IP changes. Once Tenable Security Center finds a match, Tenable Security
address Center does not search further for matches.
For example, if Tenable Security Center does not match a DNS name, but
it does match a NetBIOS name, the system does not check the MAC
address. Networks using DHCP require that you set this option to
properly track hosts.
If you import scan results from a Universal repository, this option does
not appear. Universal repositories do not rely on IP addresses to track
hosts. For more information, see Universal Repositories.
Immediately If a previously responsive host does not reply to a scan, Tenable Security
remove Center removes the host's vulnerabilities from the cumulative database.
vulnerabilities If the host has vulnerabilities in the mitigated database, they remain in
from scanned the mitigated database.
hosts that do not
l If you enable this option, the system removes the vulnerabilities
reply
immediately after the scan completes.
Number of days If you disable Immediately remove vulnerabilities from scanned hosts
to wait before that do not reply, this value specifies how many days the system waits to
removing dead remove vulnerabilities.
hosts
Max scan duration Specifies the maximum number of hours you want a scan to run.
(hours)
If a scan reaches this threshold, Tenable Security Center automatically
creates a rollover scan that you can launch manually to complete the
- 340 -
Parameter Description
Inactivity timeout This setting specifies the maximum number of hours a scan will wait for
duration (hours) a plugin to run before switching to a different scanner. The default value
is 12 hours. You can specify a value from 1 to 120 hours.
The value for Inactivity timeout duration must be less than the value for
Max scan duration.
Targets Options
The Targets section identifies the devices Tenable Security Center scans.
Option Description
l Assets — Scan one or more assets. For more information, see Assets.
Assets (Available if Target Type is Assets or Mixed) The list of assets to scan. Click
to select or deselect the assets you want to scan.
Specify IP addresses and DNS names using the following valid formats:
- 341 -
192.0.2.0-192.0.2.255 or 192.0.2.0/24)
Note: You cannot scan both IPv4 and IPv6 addresses in the same scan, because
you can only select one Import Repository.
Credentials Options
The Credentials section allows users to select pre-configured credential sets for authenticated
scanning. For more information, see Credentials.
Tenable Security Center active scans support the following credential types:
l Windows Credentials
l SSH Credentials
l SNMP Credentials
l Database Credentials
l Miscellaneous Credentials
These options determine what actions occur immediately before and after the active scan
completes.
Option Description
Add This option provides a list of reports available to the user to run when the scan
Report completes. For more information, see Add a Report to a Scan.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
- 342 -
You can run a remediation scan to run a followup active scan against existing active scan results. A
remediation scan evaluates a specific plugin against a specific target or targets where the related
vulnerability was present in your earlier active scan.
Remediation scans allow you to validate whether your vulnerability remediation actions on the
targets have been successful. If a remediation scan cannot identify a vulnerability on targets where
it was previously identified, the system changes the status of the vulnerability to mitigated. For
more information, see Cumulative vs. Mitigated Vulnerabilities.
l You can perform remediation scans only for active scan results.
l You cannot perform remediation scans for agent repository scan results.
l You cannot perform remediation scans for Tenable OT Security scan results.
l If the selected plugin requires dependent plugins, the system automatically includes those
plugins in the remediation scan.
l Remediation scans only evaluate plugins against the port you specify. Keep this in mind when
launching a remediation scan for a plugin that typically targets multiple ports.
l Remediation scans work best for un-credentialed network scan results. Use caution when
running a remediation scan for a plugin that requires scan credentials. If you neglect to add
scan credentials when required for a specific plugin, or if you mis-enter the credentials, the
system may identify the related vulnerabilities as mitigated, not because they are mitigated,
but because the system could not complete the credentialed scan.
The page refreshes to show the analysis tool view you selected.
- 343 -
4. Right-click the row for the vulnerability for which you want to launch a remediation scan and
click Launch Remediation Scan.
Note: A remediation scan inherits certain settings from the vulnerability or vulnerability
instance you selected. The Launch Remediation Scan page:
l Automatically populates the relevant plugin information.
l Provides an editable scan name in the format "Remediation Scan of Plugin #
number".
l Populates the target IP address based on the asset where the previous scan
identified the vulnerability.
5. Configure the settings for the scan, as described in Active Scan Settings.
Note: You do not need to associate the remediation scan with a scan policy.
Note: You cannot schedule a remediation scan. The scan launches as soon as you submit it.
6. Click Submit.
To view a list of assets identified on your domain, see the Domain Inventory Assets page.
- 344 -
1. Log in to Tenable Security Center via the user interface.
2. In the left navigation, click Scans > Attack Surface Domain Discovery.
4. Click Submit.
Add a Domain
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
Note: You can add a maximum of two domains across your system.
When you add a domain, Tenable Security Center identifies internet-accessible assets associated
with the domain. For more information, see Attack Surface Domain Discovery.
To add a domain:
2. In the left navigation, click Scans > Attack Surface Domain Discovery.
4. In the Add a Domain to Your Inventory box, type your organization's domain.
5. Click Submit.
What to do next:
- 345 -
l View the assets associated with your domain, as described in View Domain Inventory Assets.
l Export a CSV file of the assets associated with your domain, as described in Export Domain
Inventory Assets.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
For more information about domains, see Attack Surface Domain Discovery.
2. In the left navigation, click Scans > Attack Surface Domain Discovery.
The View Domain panel appears, with details about the domain:
l Created Time - When the domain was added to Tenable Security Center.
l Last Refresh - The last time the list of domain assets was updated.
Delete a Domain
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
For more information about domains, see Attack Surface Domain Discovery.
To delete a domain:
2. In the left navigation, click Scans > Attack Surface Domain Discovery.
- 346 -
The Attack Surface Domain Discovery page appears.
5. Click Delete.
assets Assets are lists of devices (for example, laptops, servers, tablets, or phones)
within a Tenable Security Center organization. You can share assets with one
or more users based on local security policy requirements.
You can add an asset to group devices that share common attributes. Then,
you can use the asset during scan configuration to target the devices in the
asset.
credentials Credentials are reusable objects that facilitate a login to a scan target. You
can configure various types of credentials with different authentication
methods for use within scan policies. You can also share credentials
between users for scanning purposes.
audit files During a configuration audit, auditors verify that your server and device
configurations meet an established standard and that you maintain them
- 347 -
with an appropriate procedure. Tenable Security Center can perform
configuration audits on key assets by using local Tenable Nessus checks that
can log directly on to a Unix or Windows server without an agent.
In addition to base audits, you can create customized audits for the
particular requirements of any organization. You can upload customized
audits into Tenable Security Center and make them available to anyone
performing configuration audits within an organization.
You can upload and use NIST SCAP files in the same manner as an audit file.
Navigate to NIST’s SCAP website (http://scap.nist.gov) and under the SCAP
Content section, download the desired SCAP security checklist zip file. You
can then upload the file to Tenable Security Center and select it for use in
Tenable Nessus scan jobs.
Once you configure audit scan policies in Tenable Security Center, you can
use them as needed. Tenable Security Center can also perform audits
intended for specific assets. A Tenable Security Center user can use audit
policies and asset lists to determine the compliance posture of any specified
asset.
scan zones Scan zones represent areas of your network that you want to target in an
active scan, associating an IP address or range of IP addresses with one or
more scanners in your deployment. Scan zones define the IP address ranges
associated with the scanner along with organizational access.
scan policies Scan policies contain options related to performing an active scan. For
example:
- 348 -
l Options that control technical aspects of the scan such as timeouts,
number of hosts, type of port scanner, and more.
Assets
Tenable Security Center assets are lists of devices (for example, laptops, servers, tablets, or
phones) within a Tenable Security Center organization. Assets can be shared with one or more
users based on local security policy requirements.
You can add an asset to group devices that share common attributes. Then, you can use the asset
during scan configuration to target the devices in the asset. Examples of common attributes
include:
l IP address ranges
l hardware types
l vulnerabilities
l operating systems
Tenable Security Center supports template-based and custom assets. For more information, see
Add a Template-Based Asset and Add a Custom Asset. To view details for any of your assets, see
View Asset Details.
To view details about individual hosts that appear in your assets, see View Hosts and View Host
Details.
Template-Based Assets
- 349 -
Tenable provides asset templates that you can customize for your environment. Tenable-provided
asset templates are updated via the Tenable Security Center feed and visible depending on other
configurations.
Custom Assets
Tenable Security Center supports the following custom assets types: Static Assets, DNS Name List
Assets, LDAP Query Assets, Combination Assets, Dynamic Assets, Watchlist Assets, and Import
Assets.
Static Assets
Static assets are lists of IP addresses. You can use static assets immediately after configuration.
For example, if your organization assigns laptops within a defined IP address range, you can create
a custom static asset for laptops using that IP address range.
Option Description
Tag A tag for the asset. For more information, see Tags.
Option Description
DNS Names The DNS hostnames for the asset to be based on.
- 350 -
LDAP Query Assets
The LDAP query asset type appears if your organization includes a configured LDAP server.
Option Description
LDAP Server The LDAP server where you want to perform the query.
Note: If the LDAP server uses a different DNS server than Tenable Security
Center, Tenable Security Center cannot resolve hostnames retrieved from the
LDAP server.
Note: Tenable Security Center cannot retrieve more than one page of LDAP
results. If Tenable Security Center asset or user authentication queries are not
retrieving all expected results, consider modifying your LDAP pagination control
settings to increase the results per page.
Search Base The LDAP search base used as the starting point to search for specific
LDAP data.
Search String Modify this string to create a search based on a location or filter other than
the default search base or attribute.
Generate Click to display a preview query in the Results Preview section. The
Preview preview lists the LDAP data that matches the defined search string.
Combination Assets
Combination assets allow you to create an asset based on existing assets and the AND, OR, and
NOT operators.
Combination assets can include agent IDs if the asset contains exclusively dynamic assets. You may
experience unexpected asset behavior if your combination asset contains other asset types and
interacts with agent repository data.
- 351 -
Option Description
Combination This option accepts multiple existing assets utilizing the operators AND,
OR, and NOT. You can use these operators and multiple existing assets to
create new unique assets. If the source assets change, the Combination
asset updates to match the new conditions.
3. Press Space.
Dynamic Assets
Dynamic assets are flexible groups of condition statements that Tenable Security Center uses to
retrieve a list of devices meeting the conditions. Tenable Security Center refreshes dynamic asset
lists using the results from Tenable Security Center scans. You cannot use dynamic assets until
after Tenable Security Center performs an initial discovery scan and retrieves a list of devices.
Note: If a dependent scan uses a dynamic asset list, the asset list will update before the scan runs.
- 352 -
For example, in the asset above, Tenable Security Center retrieves a list of Linux systems listening
on TCP Port 80. For more information about using dynamic asset conditions, see Dynamic Assets.
Option Description
Asset Defines the rules for creating a dynamic asset list. Hover over an existing
Definition rule to display the options to add, edit, or delete a group or a rule.
Plugin ID
- 353 -
Valid Operators Effect
Plugin Text
contains the Value must contain the text specified (for example, ABCDEF contains ABC).
pattern
Posix regex Any valid Posix regex pattern contained within “/” and “/” (example:
/.*ABC.*/).
Operating System
contains the Value must contain the text specified (for example, ABCDEF contains ABC).
pattern
Posix regex Any valid Posix regex pattern contained within “/” and “/” (for example,
/.*ABC.*/).
IP Address
- 354 -
Valid Operators Effect
DNS, NetBIOS Host, NetBIOS Workgroup, MAC, SSH v1 Fingerprint, SSH v2 Fingerprint
contains the Value must contain the text specified (for example, 1.2.3.124 contains 124).
pattern
Posix regex Any valid Posix regex pattern contained within “/” and “/” (for example,
/.*ABC.*/).
not equal to Value must be not equal to value specified (maximum 365).
is greater than Value is greater than the value specified (maximum 365).
where Plugin ID Any valid plugin ID number. You can enter multiple plugin IDs using a range
is or comma-separated plugin IDs (for example, 3, 10189, 34598, 50000-55000,
800001-800055).
Severity
is equal to Value must be equal to value specified: Info, Low, Medium, High, or
- 355 -
Valid Operators Effect
Critical.
not equal to Value must be not equal to value specified: Info, Low, Medium, High, or
Critical.
is less than Value must be less than the value specified: Info, Low, Medium, High, or
Critical.
is greater than Value must be greater than the value specified: Info, Low, Medium, High,
or Critical.
where Plugin ID Any valid plugin ID number. You can enter multiple plugin IDs using a range
is or comma-separated plugin IDs (for example, 3, 10189, 34598, 50000-55000,
800001-800055).
Exploit Available
Exploit Frameworks
XRef
Watchlist Assets
You can use a watchlist asset to maintain lists of IPs that are not in the user’s managed range of IP
addresses. You can filter for IPs from a watchlist regardless of your IP address range configuration
to help analyze event activity originating outside of the user’s managed range. For example, if a
block of IP addresses is a known source of malicious activity, you could add it to a Malicious IPs
watchlist and added to a custom query.
- 356 -
Note: Watchlists only use event data to create the asset list.
Option Description
IP Addresses IP addresses to include within the asset list (20,000 character limit). You
can enter one address, CIDR address, or range per line.
Import Assets
Option Description
Asset Click Choose File to choose the asset that was previously exported for import
into Tenable Security Center.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
3. Click Add.
- 357 -
4. (Optional) If you want to search for a specific asset template, type a search phrase in the
Search Templates box.
The Add Asset Template page for the template type appears.
l The four square icon ( ) on the left side indicates a collection of several assets.
l The data icons ( ) on the right side indicate the data required to build the
asset. The Tenable Nessus Network Monitor (PVS), Log Correlation Engine, and NS icons
indicate you must have Tenable Nessus Network Monitor, Log Correlation Engine, or
Tenable Nessus data. The key icon ( ) indicates you must have credentials for the
device. The notepad icon ( ) indicates you must have compliance data.
7. (Optional) If you want to search for a specific asset template, type a search phrase in the
Search Templates box or select a category from the All drop-down box.
9. Click Add.
10. Click the row for the asset you just added.
12. (Optional) If necessary, edit the asset to customize it for your environment. For more
information about asset options, see Assets.
- 358 -
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
5. Configure the required options for the asset type, as described in Assets.
6. Click Submit.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can view details for any asset. For more information, see Assets.
- 359 -
-or-
Select the check box for the asset you want to view.
4. Click View.
Section Action
- 360 -
Section Action
View Hosts
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can view a list of hosts associated with asset lists. For more information, see Assets.
- 361 -
a. In the table, click the button next to a column header.
l AES — (Requires Tenable Security Center+ license) The host's Asset Exposure Score. For
more information, see Asset Exposure Score in the Tenable Vulnerability
Management User Guide.
l ACR— (Requires Tenable Security Center+ license) The host's Asset Criticality Rating.
For more information, see Asset Criticality Rating in the Tenable Vulnerability
Management User Guide.
l Repository — The repository that contains vulnerability data associated with the host.
l Last Seen — The date and time last Tenable Security Center detected the host on your
network.
l Source — The type of scan that discovered the host on your network: Tenable Nessus
Scan, Tenable Nessus Network Monitor, Log Correlation Engine, Agent Scan, or
Tenable OT Security Scan.
Tip: The following columns are hidden by default: System Type, Net BIOS, DNS, and Asset ID.
Export Hosts
- 362 -
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can export a list of hosts in a .csv file to share the data with others in your organization. For
more information, see Assets.
3. (Optional) To filter the list of hosts, apply a filter. For more information, see Host Asset Filter
Components.
Filter
Description
Component
Asset Criticality (Requires Tenable Security Center+ license) Filters for hosts within the
Rating (ACR) specified ACR range (for example, between 1 and 5). For more information,
see Asset Criticality Rating in the Tenable Vulnerability Management User
Guide.
Tip: To edit the ACR for a host asset, see Edit an ACR Manually.
Address This filter specifies an IPv4 or IPv6 address, range, or CIDR block to limit
the viewed hosts. For example, entering 198.51.100.28/24 and/or
2001:DB8::/32 limits any of the web tools to show only host data from the
selected network(s). Addresses can be comma-separated or on separate
- 363 -
Filter
Description
Component
lines.
Asset Exposure (Requires Tenable Security Center+ license) Filters for hosts within the
Score (AES) specified AES range (for example, between 400 and 600).
DNS Name This filter specifies a DNS name to limit the viewed hosts. For example,
entering host.example.com limits any of the web tools to show only host
data from that DNS name.
Name Filters for hosts with names that include the specified text.
Repositories Filters for hosts with associated vulnerability data in the specified
repository.
System Type Filters for hosts with the specified device type, as determined by plugin
54615.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can view a list of assets identified in your organization's domains. For more information, see
Attack Surface Domain Discovery.
3. (Optional) To filter the list of domain inventory assets, apply a filter. For more information, see
Domain Inventory Filter Components.
- 364 -
4. (Optional) To create a domain inventory asset list, see Create a Domain Inventory Asset List.
Note: The value in this column is determined by DNS messages associated with the asset.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can create an asset list from your domain inventory assets to use in active scans.
For more information about your domain inventory, see Attack Surface Domain Discovery.
- 365 -
3. (Optional) To filter the list of domain inventory assets, apply a filter. For more information, see
Domain Inventory Filter Components.
4. Right-click the row for the domain inventory asset you want to include in the asset list.
-or-
Select the check box for the domain inventory asset you want to include in the asset list.
7. (Optional) In the Description box, type a description for the asset list.
8. (Optional) In the Tag drop-down box, select a tag for the asset list. For more information
about tags, see Tags.
9. Click Submit.
What to do next:
l Create an active scan using the domain inventory asset list. For more information, see Add an
Active Scan.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can export a list of assets identified in your organization's domains. For more information, see
Attack Surface Domain Discovery.
- 366 -
The Domain Inventory page appears.
3. (Optional) To the left of the table, click a domain to filter the list of assets.
Tenable Security Center exports the domain inventory assets in a CSV file.
Filter
Description
Component
Address Filters by an IPv4 or IPv6 address, range, or CIDR block. You can enter
IP addresses in a comma-separated list or on separate lines.
Domain Filters by domain name. The drop-down includes a list of all available
domains.
Host Filters by the host associated with the domain inventory asset. In the drop-
down, select Exact Match, Should not Match, Contains, or Not Contains. The
Exact Match option supports single and comma-separated values.
Ports Filters by ports associated with the domain inventory asset. In the drop-
down, select = to match the specified ports, ≠ to exclude the specified ports,
≥ to match ports greater than or equal to the specified ports, or ≤ to match
ports less than or equal to the specified ports. You can specify a single port,
comma-separated list of ports, or range of ports (e.g., 8000-8080).
Record Type The type of domain inventory asset. This value is determined by DNS
messages associated with the asset. In the drop-down, select Exact Match,
Should not Match, Contains, or Not Contains. The Exact Match option
supports single and comma-separated values.
Credentials
Credentials are reusable objects that facilitate scan target login.
- 367 -
Administrators can add credentials available to all organizations. Organizational users can add
credentials available to other users in the same organization. For information about user access in
Tenable Security Center, see User Access.
Users can share credentials with other users, allowing them to scan remote hosts without knowing
the credentials of the host. For information about Tenable Security Center credential data
encryption, see Encryption Strength.
l Miscellaneous Credentials
l Database Credentials
l SNMP Credentials
l SSH Credentials
l Windows Credentials
If a scan contains multiple instances of one type of credential, Tenable Security Center tries the
credentials on each scan target in the order you added the credentials to Tenable Security Center.
Note: Tenable Security Center uses the first credential that allows successful login to perform
credentialed checks on the target. After a credential allows a successful login, Tenable Security Center
does not try any of the other credentials in the list, even if a different credential has greater privileges.
Add Credentials
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
Note: You can add up to 1000 SSH credentials in a single scan. For best performance, Tenable
recommends adding no more than 10 SSH credentials per scan.
- 368 -
To add credentials:
2. Click Scanning > Credentials (administrator users) or Scans > Credentials (organizational
users).
3. Click Add.
4. In the Miscellaneous, API Gateway, Database, SNMP, SSH, Windows, or Web Authentication
sections, click the tile for the specific method you want to configure.
l Miscellaneous Credentials
l Database Credentials
l SNMP Credentials
l SSH Credentials
l Windows Credentials
9. Click Submit.
Miscellaneous Credentials
- 369 -
Configure the following options for all miscellaneous credentials, including options specific for your
authentication method:
l The following table describes the additional options to configure for Citrix credentials.
l The following table describes the additional options to configure for Nutanix Prism Central
credentials.
l The following table describes the additional options to configure for OpenShift Container
Platform credentials.
l The following table describes the additional options to configure for VMware vCenter API
credentials.
Option Description
Tag A tag for the credential. For more information, see Tags.
Citrix Options
The following table describes the additional options to configure for Citrix credentials.
Port (Required) The TCP port that Citrix listens on for 443
communications from Tenable Security Center.
Username (Required) The username for the scanning Citrix account that --
Tenable Security Center uses to perform checks on the target
system.
- 370 -
Option Description Default
Verify SSL When enabled, Tenable verifies that the SSL certificate on enabled
Certificate the server is signed by a trusted CA.
The following table describes the additional options to configure for Nutanix Prism Central
credentials.
Nutanix Host (Required) The hostname or IP address for the Nutanix Prism --
Central host.
Nutanix Port (Required) The port for the Nutanix Prism Central host. 9440
Password (Required) The password for the Nutanix Prism Central user. --
Discover When enabled, Tenable Security Center adds all discovered enabled
Hosts Nutanix hosts to the list of scan targets.
Discover When enabled. Tenable Security Center adds all discovered enabled
Virtual Nutanix Virtual Machines to the list of scan targets.
Machines
Verify SSL When enabled, Tenable verifies that the SSL certificate on disabled
Certificate the server is signed by a trusted CA.
- 371 -
Option Description Default
The following table describes the additional options to configure for OpenShift Container Platform
credentials.
Port (Required) The port for the OpenShift Container Platform 6443
host.
Verify When enabled, Tenable verifies that the SSL certificate enabled
SSL Certificate on the server is signed by a trusted CA.
The following table describes the additional options to configure for VMware vCenter API
credentials.
- 372 -
Option Description Default
vCenter Port (Required) The port for the VMware vCenter API host. 443
Verify SSL Certificate When enabled, Tenable verifies that the disabled
SSL certificate on the server is signed by a trusted
CA.
Auto Discover When enabled, Tenable Security Center adds all disabled
Managed VMware discovered managed VMware ESXi hosts to the list of
ESXi Hosts scan targets.
Auto Discover When enabled, Tenable Security Center adds all disabled
Managed VMware discovered managed VMware ESXi virtual machines
ESXi Virtual Machines to the list of scan targets.
Option Description
Tag A tag for the credential. For more information, see Tags.
- 373 -
IBM DataPower Options
The following table describes the additional options to configure for IBM DataPower credentials.
Option Description
Client The file that contains the PEM certificate used to communicate with the IBM
Certificate DataPower host.
Client The file that contains the PEM private key for the client certificate.
Certificate
Private Key
Custom If your IBM DataPower configuration uses custom HTTP headers, the custom
Header Key HTTP header key.
Custom If your IBM DataPower configuration uses custom HTTP headers, the custom
Header Value HTTP header value.
Enable for When enabled, allows Tenable Security Center to use the IBM DataPower
Hashicorp credential with a Hashicorp Vault credential.
Vault
Tip: If you want to run a test that does not use IBM DataPower credentials
without having to delete the credential, you can temporarily disable this option
to prevent Tenable Security Center from using IBM DataPower credentials.
Database Credentials
The following topic describes the available Database credentials.
Note: Aspects of credential options are based on Nessus plugin options. Therefore, specific credential
options may differ from the descriptions documented here.
- 374 -
Options Description
Tag A tag for the credential. For more information, see Tags.
IBM DB2
The following table describes the additional options to configure for IBM DB2 credentials.
Options Description
Source The method for providing the required credential details: Entry or
Import.
l CyberArk
l Password
l Lieberman
l Hashicorp Vault
l Wallix Bastion
- 375 -
Options Description
Port The TCP port that the IBM DB2 database instance listens on for
communications from Tenable Security Center. The default is
port 50000.
Database Name The name for your database (not the name of your instance).
Informix/DRDA
The following table describes the additional options to configure for Informix/DRDA credentials.
Options Description
Port The TCP port that the Informix/DRDA database instance listens on for
communications from Tenable Security Center. The default is port 1526.
MySQL
The following table describes the additional options to configure for MySQL credentials.
Options Description
Source The method for providing the required credential details: Entry or
Import.
- 376 -
Options Description
credentials.
l CyberArk
l Password
l Lieberman
l Hashicorp Vault
l Wallix Bastion
Port The TCP port that the MySQL database instance listens on for
communications from Tenable Security Center. The default is
port 3306.
Oracle Database
The following table describes the additional options to configure for Oracle Database credentials.
Options Description
Source The method for providing the required credential details: Entry or
Import.
- 377 -
Options Description
l CyberArk
l Password
l Lieberman
l Hashicorp Vault
l Wallix Bastion
Port The TCP port that the Oracle database instance listens on for
communications from Tenable Security Center. The default is
port 1521.
Authentication The type of account you want Tenable Security Center to use to
access the database instance:
l Normal
l System Operator
Service Type The Oracle parameter you want to use to specify the database
instance: SID or Service Name.
PostgreSQL
- 378 -
The following table describes the additional options to configure for PostgreSQL credentials.
Options Description
l CyberArk
l Password
l Lieberman
l Hashicorp Vault
Port The TCP port that the PostgreSQL database instance listens on
for communications from Tenable Security Center. The default is
port 5432.
SQL Server
The following table describes the additional options to configure for SQL Server credentials.
Options Description
Source The method for providing the required credential details: Entry or
Import.
- 379 -
Options Description
l CyberArk
l Password
l Lieberman
l Hashicorp Vault
l Wallix Bastion
Port The TCP port that the SQL Server database instance listens on
for communications from Tenable Security Center. The default is
port 1433.
Authentication The type of account you want Tenable Security Center to use to
access the database instance: SQL or Windows.
Sybase ASE
The following table describes the additional options to configure for Sybase ASE credentials.
Options Description
l CyberArk
l Password
- 380 -
Options Description
l Lieberman
l Hashicorp Vault
l Wallix Bastion
Port The TCP port that the Sybase ASE database instance listens on
for communications from Tenable Security Center. The default is
port 3638.
Sybase ASE Auth Type The type of authentication used by the Sybase ASE
database: RSA or Plain Text.
Apache Cassandra
Option Description
l CyberArk
l Password
l Lieberman
l Hashicorp Vault
l Wallix Bastion
Database Port The port the database listens on. The default is port 9042.
MongoDB
- 381 -
Option Description
Port (Required) The TCP port that the MongoDB database instance listens on for
communications from Tenable Security Center.
Depending on the authentication type you select for your database credentials, you must configure
the following options. For more information about database credential settings, see Database
Credentials.
l Import Credentials
l Arcon Options
l CyberArk Options
l Lieberman Options
l Password Options
Import
Upload a .csv file with the credentials entered in the specified format. For descriptions of valid
values to use for each item, see Database Credentials.
- 382 -
You must configure either CyberArk or Hashicorp credentials for a database credential in the same
scan so that Tenable Security Center can retrieve the credentials.
Database
CSV Format
Credential
Note: Include the required data in the specified order, with commas between each value, without spaces.
For example, for Oracle with CyberArk: 192.0.2.255,1521,SID,service_
id,username,SYSDBA,CyberArk,Database-Oracle-SYS.
Arcon Options
The following table describes the additional options to configure when using Arcon as the
Authentication Method for IBM DB2, SQL Server, MySQL, Oracle Database, PostgreSQL, or Sybase
ASE database credentials.
Option Description
Arcon Port (Required) The port on which Arcon listens. By default, Tenable Security
- 383 -
Center uses port 444.
Authentication (Required) The URL Tenable Security Center uses to access Arcon.
URL
Password Engine (Required) The URL Tenable Security Center uses to access the
URL passwords in Arcon.
Username (Required) The username to log in to the hosts you want to scan.
Checkout Duration (Required) The length of time, in hours, that you want to keep
credentials checked out in Arcon. Configure the Checkout Duration to
exceed the typical duration of your Tenable Security Center scans. If a
password from a previous scan is still checked out when a new scan
begins, the new scan fails.
Use SSL When enabled, Tenable Security Center uses SSL through IIS for secure
communications. You must configure SSL through IIS in Arcon before
enabling this option.
Verify When enabled, Tenable Security Center validates the SSL certificate.
SSL Certificate You must configure SSL through IIS in Arcon before enabling this option.
CyberArk Options
The following table describes the additional options to configure when using CyberArk as the
Authentication Method for Apache Cassandra, IBM DB2, MySQL, Oracle Database, PostgreSQL,
SQL Server, or Sybase ASE database credentials.
Note: You must be running Tenable Nessus 7.0.0 or later to configure CyberArk credentials.
- 384 -
Option Description Required
CyberArk Host The IP address or FQDN name for the CyberArk AIM Web yes
Service. This can be the host, or the host with a custom
URL added on in a single string.
Client The file that contains the PEM private key for the client yes, if
Certificate certificate. private key
Private Key is applied
Get credential The method with which your CyberArk API credentials are yes
by retrieved. Can be Username, Identifier, or Address.
- 385 -
Option Description Required
Account Name (If Get credential by is Identifier) The unique account name no
or identifier assigned to the CyberArk API credential.
Use SSL If enabled, the scanner uses SSL through IIS for secure no
communications. Enable this option if CyberArk is
configured to support SSL through IIS.
Verify SSL If enabled, the scanner validates the SSL certificate. Enable no
Certificate this option if CyberArk is configured to support SSL through
IIS and you want to validate the certificate.
The following table describes the additional options to configure when using CyberArk (Legacy) as
the Authentication Method for Apache Cassandra, IBM DB2, MySQL, Oracle Database, PostgreSQL,
SQL Server, or Sybase ASE database credentials.
Note: You must be running Tenable Nessus 7.0.0 or later to configure CyberArk credentials.
Database
Option Description Required
Types
- 386 -
Database
Option Description Required
Types
- 387 -
Database
Option Description Required
Types
- 388 -
Database
Option Description Required
Types
l Normal
l System Operator
l RSA
l Plain Text
Instance Name SQL Server The name for your database instance. no
l SID
l SERVICE_NAME
The following table describes the additional options to configure when using CyberArk Database
Auto-Discovery as the Authentication Method for Apache Cassandra, IBM DB2, MySQL, Oracle
Database, PostgreSQL, SQL Server, or Sybase ASE database credentials.
Note: You must be running Tenable Nessus 7.0.0 or later to configure CyberArk credentials.
- 389 -
Option Description Required
CyberArk Host The IP address or FQDN name for the user’s CyberArk yes
Instance.
AIM WebService There are two authentication methods established in the yes
Authentication feature. IIS Basic Authentication and Certificate
Type Authentication. Certificate Authentication can be either
encrypted or unencrypted.
Client Certificate The file that contains the PEM-formatted private key for no
Private Key the client certificate.
CyberArk PVWA Password for the username to log in to CyberArk web yes
Web UI Login console. This is used to authenticate to the PVWA REST
Password API and gather bulk account information.
CyberArk Platform String used in the PVWA REST API query parameters to yes
Search String gather bulk account information. For example, the user
- 390 -
Option Description Required
Use SSL If enabled, the scanner uses SSL through IIS for secure yes
communications. Enable this option if CyberArk is
configured to support SSL through IIS.
Password Options
The following table describes the additional options to configure when using Password as the
Authentication Method for Apache Cassandra, IBM DB2, SQL Server, MySQL, Oracle Database,
PostgreSQL, or Sybase ASE database credentials.
Database
Option Description
Types
PostgreSQL
- 391 -
Database
Option Description
Types
SQL Server
Service Type Oracle The Oracle parameter you want to use to identify the
Database database instance: SID or Service Name.
Instance Name SQL Server The name for your database instance.
The following table describes the additional options to configure when using Hashicorp Vault as the
Authentication Method for Apache Cassandra, IBM DB2, SQL Server, MySQL, Oracle Database,
PostgreSQL, or Sybase ASE database credentials.
MySQL
PostgreSQL
SQL Server
PostgreSQL
- 392 -
Instance Name SQL Server The SQL server name. yes
Service Type Oracle The unique SID or Service Name that yes
Database identifies your database.
- 393 -
Role ID All The GUID provided by Hashicorp yes
Vault when you configured your App
Role.
/v1/auth/approle/login
l AD — Active Directory
KV1 Engine URL All The URL Tenable Security Center yes
uses to access the Hashicorp Vault
KV2 Engine URL
secrets engine.
AD Engine URL
Example: /v1/path_to_secret. No
LDAP Engine URL trailing /
- 394 -
from Hashicorp Vault.
Secret Name All The key secret you want to retrieve yes
values for.
Lieberman Options
The following table describes the additional options to configure when using Lieberman as the
Authentication Method for Apache Cassandra, IBM DB2, SQL Server, MySQL, Oracle Database,
PostgreSQL, or Sybase ASE database credentials.
Note: You must meet the version requirements specified in Tenable Integrated Product Compatibility.
- 395 -
Database
Option Description
Types
Database Name IBM DB2 The name for your database instance.
PostgreSQL
SQL Server
Service Type Oracle The Oracle parameter you want to use to identify the
Database database instance: SID or Service Name.
Instance Name SQL Server The name for your database instance.
Lieberman User All The username for the Lieberman explicit user you
want Tenable Security Center to use for
authentication to the Lieberman Rapid Enterprise
Defense (RED) API.
Use SSL All When enabled, Tenable Security Center uses SSL
through IIS for secure communications. You must
- 396 -
Database
Option Description
Types
System Name All The name for the database credentials in Lieberman.
The following table describes the additional options to configure when using WALLIX Bastion as the
Authentication Method for Apache Cassandra, IBM DB2, MySQL, Oracle Database, SQL Server, or
Sybase ASE database credentials.
WALLIX Host The IP address for the WALLIX Bastion host. yes
WALLIX Port The port on which the WALLIX Bastion API yes
communicates. By default, Tenable uses 443.
WALLIX User Your WALLIX Bastion user interface login username. yes
WALLIX Password Your WALLIX Bastion user interface login password. yes
Used for Basic authentication to the API.
WALLIX API Key The API key generated in the WALLIX Bastion user yes
interface. Used for API Key authentication to the
API.
- 397 -
Option Description Required
Get Credential by The account name associated with a Device you Required only if
Device Account want to log in to the target systems with. you have a
Name target and/or
Note: If your device has more than one account you device with
must enter the specific device name for the account
you want to retrieve credentials for. Failure to do this
multiple
may result in credentials for the wrong account accounts.
returned by the system.
SNMP Credentials
Configure the following options for SNMP credentials. Tenable Security Center supports SNMPv1 for
authentication via a community string.
Options Description
Tag A tag for the credential. For more information, see Tags.
SSH Credentials
Use SSH credentials for host-based checks on Unix systems and supported network devices.
Tenable Security Center uses these credentials to obtain local information from remote Unix
systems for patch auditing or compliance checks. Tenable Security Center uses Secure Shell (SSH)
protocol version 2 based programs (e.g., OpenSSH, Solaris SSH, etc.) for host-based checks.
- 398 -
Tenable Security Center encrypts the data using the AES-256-CBC algorithm to protect it from
being viewed by sniffer programs.
Note: Non-privileged users with local access on Linux systems can determine basic security issues, such
as patch levels or entries in the /etc/passwd file. For more comprehensive information, such as system
configuration data or file permissions across the entire system, an account with root privileges is required.
Note: You can add up to 1000 SSH credentials in a single scan. For best performance, Tenable
recommends adding no more than 10 SSH credentials per scan.
Configure the following options for SSH credentials, including options specific for your
authentication method:
l The following table describes the additional options to configure when using Arcon as the
authentication method for SSH credentials.
l The following table describes the additional options to configure when using BeyondTrust as
the authentication method for SSH credentials.
l Centrify Options
l The following table describes the additional options to configure when using Certificate as the
authentication method for SSH credentials.
l The following table describes the additional options to configure when using CyberArk
SSH Auto-Discovery as the authentication method for SSH credentials.
l The following table describes the additional options to configure when using CyberArk Vault
as the authentication method for SSH credentials.
l The following table describes the additional options to configure when using CyberArk Vault
(Legacy) as the authentication method for SSH credentials.
l The following table describes the additional options to configure when using Delinea Secret
Server as the authentication method for SSH credentials.
l The following table describes the additional options to configure when using Hashicorp Vault
as the authentication method for SSH credentials.
l The following table describes the additional options to configure when using Kerberos as the
authentication method for SSH credentials.
- 399 -
l The following table describes the additional options to configure when using Lieberman as the
authentication method for SSH credentials.
l The most effective credentialed scans are those with root privileges (enable privileges, for
Cisco IOS). Since many sites do not permit a remote login as root for security reasons, a
Nessus user account can invoke a variety of privilege escalation options including: su, sudo,
su+sudo, DirectAuthorize (dzdo), PowerBroker (pbrun), k5login, and Cisco Enable.
l The following table describes the additional options to configure when using Public Key as the
authentication method for SSH credentials.
l QiAnXin Options
l The following table describes the additional options to configure when using Senhasegura as
the authentication method for SSH credentials.
l The following table describes the additional options to configure when using Thycotic Secret
Server as the authentication method for SSH credentials.
l The following table describes the additional options to configure when using WALLIX Bastion
as the authentication method for SSH credentials.
Tag A tag for the credential. For more information, see Tags.
Arcon Options
The following table describes the additional options to configure when using Arcon as the
authentication method for SSH credentials.
Option Description
- 400 -
path.
Arcon Port (Required) The port on which Arcon listens. By default, Tenable Security
Center uses port 444.
Authentication (Required) The URL Tenable Security Center uses to access Arcon.
URL
Password Engine (Required) The URL Tenable Security Center uses to access the
URL passwords in Arcon.
Username (Required) The username to log in to the hosts you want to scan.
Arcon Target Type (Optional) The name of the target type. Depending on the Arcon PAM
version you are using and the system type the SSH credential has been
created with, this is set to linux by default. Refer to the Arcon PAM
Specifications document (provided by Arcon) for target type/system
type mapping for the correct target type value.
Checkout Duration (Required) The length of time, in hours, that you want to keep
credentials checked out in Arcon. Configure the Checkout Duration to
exceed the typical duration of your Tenable Security Center scans. If a
password from a previous scan is still checked out when a new scan
begins, the new scan fails.
Use SSL When enabled, Tenable Security Center uses SSL through IIS for secure
communications. You must configure SSL through IIS in Arcon before
enabling this option.
Verify When enabled, Tenable Security Center validates the SSL certificate.
SSL Certificate You must configure SSL through IIS in Arcon before enabling this option.
- 401 -
Privilege The privilege escalation method you want to use to increase users'
Escalation privileges after initial authentication. Your Privilege Escalation selection
determines the specific options you must configure. For more
information, see Privilege Escalation.
BeyondTrust Options
The following table describes the additional options to configure when using BeyondTrust as the
authentication method for SSH credentials.
Option Description
Checkout Duration The length of time, in minutes, that you want to keep credentials
checked out in BeyondTrust. Configure the Checkout duration to exceed
the typical duration of your Tenable Security Center scans. If a password
from a previous scan is still checked out when a new scan begins, the
new scan fails.
Use SSL If enabled, Tenable Security Center uses SSL through IIS for secure
communications. You must configure SSL through IIS in BeyondTrust
before enabling this option.
Verify If enabled, Tenable Security Center validates the SSL certificate. You
- 402 -
Option Description
SSL Certificate must configure SSL through IIS in BeyondTrust before enabling this
option.
Use Private Key If enabled, Tenable Security Center uses key-based authentication for
SSH connections instead of password authentication.
Use Privilege If enabled, Tenable Security Center uses BeyondTrust for privilege
Escalations escalation.
Centrify Options
The following table describes the additional options to configure when using Centrify as the
authentication method for SSH credentials.
Option Description
Centrify Port (Required) The port on which Centrify listens. By default, Tenable
Security Center uses port 443.
Tenant (Required) The Centrify tenant associated with the API. By default,
Tenable Security Center uses centrify.
Authentication (Required) The URL Tenable Security Center uses to access Centrify. By
URL default, Tenable Security Center uses /Security.
Password Query (Required) The URL Tenable Security Center uses to query the
URL passwords in Centrify. By default, Tenable Security Center uses
/RedRock.
- 403 -
Password Engine (Required) The URL Tenable Security Center uses to access the
URL passwords in Centrify. By default, Tenable Security Center uses
/ServerManage.
Username (Required) The username to log in to the hosts you want to scan.
Checkout Duration (Required) The length of time, in minutes, that you want to keep
credentials checked out in Centrify.
Use SSL When enabled, Tenable Security Center uses SSL through IIS for secure
communications. You must configure SSL through IIS in Centrify before
enabling this option.
Verify When enabled, Tenable Security Center validates the SSL certificate.
SSL Certificate You must configure SSL through IIS in Centrify before enabling this
option.
Certificate Options
The following table describes the additional options to configure when using Certificate as the
authentication method for SSH credentials.
Option Description
User (Required) The RSA, DSA, ECDSA, or ED25519 OpenSSH certificate file for
Certificate the user.
Private Key (Required) The RSA, DSA, ECDSA, or ED25519 OpenSSH private key file for
the user.
- 404 -
Option Description
Privilege The privilege escalation method you want to use to increase users'
Escalation privileges after initial authentication. Your Privilege Escalation selection
determines the specific options you must configure. For more information,
see Privilege Escalation.
The following table describes the additional options to configure when using CyberArk SSH Auto-
Discovery as the authentication method for SSH credentials.
CyberArk Host The IP address or FQDN name for the user’s CyberArk yes
Instance.
AIM Web Service There are two authentication methods established in yes
Authentication the feature. IIS Basic Authentication and Certificate
Type Authentication. Certificate Authentication can be either
encrypted or unencrypted.
- 405 -
Option Description Required
CyberArk PVWA Password for the username to log in to CyberArk web yes
Web UI Login console. This is used to authenticate to the PVWA REST
Password API and gather bulk account information.
CyberArk String used in the PVWA REST API query parameters to yes
Platform Search gather bulk account information. For example, the user
String can enter UnixSSH Admin TestSafe, to gather all
UnixSSH platform accounts containing a username
Admin in a Safe called TestSafe.
Use SSL If enabled, the scanner uses SSL through IIS for secure yes
communications. Enable this option if CyberArk is
configured to support SSL through IIS.
- 406 -
Option Description Required
The following table describes the additional options to configure when using CyberArk Vault as the
authentication method for SSH credentials.
CyberArk Host The IP address or FQDN name for the CyberArk AIM Web yes
Service.
Client Certificate The file that contains the PEM certificate used to no
communicate with the CyberArk host.
Client Certificate The file that contains the PEM private key for the client yes, if
Private Key certificate. private key
is applied
- 407 -
Option Description Required
Client Certificate The passphrase for the private key, if required. yes, if
Private Key private key
Passphrase is applied
Get credential by The method with which your CyberArk API credentials yes
are retrieved. Can be Username, Identifier, or Address.
- 408 -
Option Description Required
Use SSL If enabled, the scanner uses SSL through IIS for secure no
communications. Enable this option if CyberArk is
configured to support SSL through IIS.
The following table describes the additional options to configure when using CyberArk Vault
(Legacy) as the authentication method for SSH credentials.
Option Description
CyberArk The privilege escalation method you want to use to increase users'
- 409 -
Option Description
elevate privileges after initial authentication. Your CyberArk elevate privileges with
privileges with selection determines the specific options you must configure. For more
information, see Privilege Escalation.
Central (Required) The port the CyberArk Central Credential Provider is listening on.
Credential
Provider URL
Port
CyberArk The domain for the CyberArk account. You must configure SSL through IIS in
Address CyberArk Central Credential Provider before configuring this option.
Vault The username for the vault, if the CyberArk Central Credential Provider is
Username configured for basic authentication.
Vault The password for the vault, if the CyberArk Central Credential Provider is
Password configured for basic authentication.
Safe (Required) The safe on the CyberArk Central Credential Provider server that
contains the credentials you want to retrieve.
CyberArk The file that contains the PEM certificate used to communicate with the
Client CyberArk host.
Certificate
CyberArk The file that contains the PEM private key for the client certificate.
Client
Certificate
Private Key
- 410 -
Option Description
Certificate
Private Key
Passphrase
AppID (Required) The AppID with CyberArk Central Credential Provider permissions
to retrieve the target password.
Folder (Required) The folder on the CyberArk Central Credential Provider server
that contains the credentials you want to retrieve.
Vault Use SSL When enabled, Tenable Security Center uses SSL through IIS for secure
communications. You must configure SSL through IIS in CyberArk Central
Credential Provider before enabling this option.
Vault Verify When enabled, Tenable Security Center validates the SSL certificate. You
SSL must configure SSL through IIS in CyberArk Central Credential Provider
before enabling this option.
CyberArk The unique name of the credential you want to retrieve from CyberArk.
Escalation
Account
Details Name
CyberArk AIM The URL for the CyberArk AIM web service. By default, Tenable Security
Service URL Center uses /AIMWebservice/v1.1/AIM.asmx.
- 411 -
The following table describes the additional options to configure when using Delinea Secret Server
as the authentication method for SSH credentials.
Delinea The value of the secret on the Delinea server. The secret is yes
Secret Name labeled Secret Name on the Delinea server.
Delinea Host The Delinea Secret Server host to pull the secrets from. yes
Delinea Port The Delinea Secret Server Port for API requests. By default, yes
Tenable uses 443.
Checkout The duration Tenable should check out the password from yes
Duration Delinea. Duration time is in hours and should be longer than
the scan time.
Verify SSL If enabled, verifies the SSL Certificate on the Delinea server. no
Certificate
- 412 -
prompt setting allows recognition of these prompts. Leave this blank
for most standard password prompts.
The following table describes the additional options to configure when using Hashicorp Vault as the
authentication method for SSH credentials.
Role Secret ID The GUID generated by Hashicorp Vault when you yes
configured your App Role.
/v1/auth/approle/login
- 413 -
environment.
l AD — Active Directory
KV1 Engine URL The URL Tenable Security Center uses to access the yes
Hashicorp Vault secrets engine.
KV2 Engine URL
Example: /v1/path_to_secret. No trailing /
AD Engine URL
Username Source (Appears when Hashicorp Vault Type is KV1 or KV2) yes
Specifies if the username is input manually or pulled
from Hashicorp Vault.
Username Key (Appears when Hashicorp Vault Type is KV1 or KV2) The yes
name in Hashicorp Vault that usernames are stored
under.
Password Key (Appears when Hashicorp Vault Type is KV1 or KV2) The yes
key in Hashicorp Vault that passwords are stored under.
Secret Name The key secret you want to retrieve values for. yes
- 414 -
KDC Transport (Required if Kerberos Target Authentication is enabled) yes
The KDC uses TCP by default in Linux implementations.
For UDP, change this option. If you need to change the
KDC Transport value, you may also need to change the
port as the KDC UDP uses either port 88 or 750 by
default, depending on the implementation.
Use SSL When enabled, Tenable Security Center uses SSL for no
secure communications. You must configure SSL in
Hashicorp Vault before enabling this option.
Kerberos Options
The following table describes the additional options to configure when using Kerberos as the
authentication method for SSH credentials.
Option Description
Password (Required) The password associated with the username you provided.
- 415 -
Option Description
KDC Port (Required) The port you want to use for the KDC connection. By default,
Tenable Security Center uses port 88.
KDC Transport (Required) The method you want to use to connect to the KDC server.
Note: If you select UDP, you may need to edit the KDC Port. The KDC UDP
protocol uses either port 88 or port 750.
Realm (Required) The authentication domain, typically the domain name of the
target (e.g., example.com).
Privilege The privilege escalation method you want to use to increase users'
Escalation privileges after initial authentication. Your Privilege Escalation selection
determines the specific options you must configure. For more
information, see Privilege Escalation.
Lieberman Options
The following table describes the additional options to configure when using Lieberman as the
authentication method for SSH credentials.
Option Description
Lieberman User The username for the Lieberman explicit user you want Tenable Security
Center to use for authentication to the Lieberman Rapid Enterprise
Defense (RED) API.
- 416 -
Option Description
Use SSL When enabled, Tenable Security Centeruses SSL through IIS for secure
communications. You must configure SSL through IIS in Lieberman
before enabling this option.
Verify When enabled, Tenable Security Center validates the SSL certificate.
SSL Certificate You must configure SSL through IIS in Lieberman before enabling this
option.
Password Options
The most effective credentialed scans are those with root privileges (enable privileges, for Cisco
IOS). Since many sites do not permit a remote login as root for security reasons, a Nessus user
account can invoke a variety of privilege escalation options including: su, sudo, su+sudo,
DirectAuthorize (dzdo), PowerBroker (pbrun), k5login, and Cisco Enable.
The following table describes the additional options to configure when using Password as the
authentication method for SSH credentials.
Option Description
Password (Required) The password associated with the username you provided.
(Unsafe!)
Privilege The privilege escalation method you want to use to increase users' privileges
Escalation after initial authentication. Your Privilege Escalation selection determines
the specific options you must configure. For more information, see Privilege
Escalation.
- 417 -
The following table describes the additional options to configure when using Public Key as the
authentication method for SSH credentials.
Option Description
Private Key (Required) The RSA, DSA, ECDSA, or ED25519 OpenSSH key file for the user.
Privilege The privilege escalation method you want to use to increase users'
Escalation privileges after initial authentication. Your Privilege Escalation selection
determines the specific options you must configure. For more information,
see Privilege Escalation.
QiAnXin Options
The following table describes the additional options to configure when using QiAnXin as the
authentication method for SSH credentials.
QiAnXin Host The IP address or url for the QiAnXin host. yes
QiAnXin Port The port on which the QiAnXin API communicates. yes
By default, Tenable uses 443.
QiAnXin API Client ID The Client ID for the embedded account yes
application created in QiAnXin PAM.
QiAnXin API Client The Secret ID for the embedded account yes
Secret application created in QiAnXin PAM.
QiAnXin Username The username to log in to the hosts you want to yes
scan.
QiAnXin Asset Address Specify the host IP of the asset containing the no
account to use. If not specified, the scan target IP
is used.
- 418 -
Option Description Required
l HP_UNIX — HP Unix
l SOLARIS — Solaris
l OPENLDAP — OpenLDAP
l POSTGRESQL — PostgreSQL
QiAnXin Region ID Specify the region ID of the asset containing the Only if using
account to use. multiple
regions
Verify SSL Certificate When enabled, Tenable verifies that the SSL no
Certificate on the server is signed by a trusted CA.
- 419 -
Option Description Required
Senhasegura Options
The following table describes the additional options to configure when using Senhasegura as the
authentication method for SSH credentials.
Senhasegura Host The IP address or url for the Senhasegura host. yes
Senhasegura API The Client ID for the applicable Senhasegura A2A yes
Client ID Application for Oauth 2.0 API authentication.
Senhasegura API The Secret ID for the applicable Senhasegura A2A yes
Client Secret Application for Oauth 2.0 API authentication.
Use SSH Key for The user can select this option to retrieve the Required if
Target SSH Key to authenticate to the target if authenticating to
Authentication configuration is applicable in Senhasegura. target with SSH
Key.
Private Key File The Private Key used to decrypt encrypted Required if you
sensitive data from A2A. have enabled
- 420 -
Option Description Required
The following table describes the additional options to configure when using Thycotic Secret
Server as the authentication method for SSH credentials.
- 421 -
Option Description
Thycotic The privilege escalation method you want to use to increase users'
elevate privileges after initial authentication. Your selection for this setting
privileges with determines the specific options you must configure. For more information,
see Privilege Escalation.
Thycotic Secret (Required) The value you want Tenable Security Center to use when setting
Server URL the transfer method, target, and target directory for the scanner. Find the
value on the Thycotic server, in Admin > Configuration > Application
Settings > Secret Server URL.
Thycotic Login (Required) The username for a user on the Thycotic server.
Name
Thycotic (Required) The password associated with the Thycotic Login Name you
Password provided.
Thycotic In cloud instances of Thycotic, the value that identifies the organization
Organization you want Tenable Security Center to target.
Verify SSL If enabled, Tenable Security Center verifies the SSL Certificate on the
Certificate Thycotic server.
For more information about using self-signed certificates, see the Nessus
custom_CA.inc documentation.
Use Private Key If enabled, Tenable Security Center uses key-based authentication for
- 422 -
Option Description
The following table describes the additional options to configure when using WALLIX Bastion as
the authentication method for SSH credentials.
WALLIX Host The IP address for the WALLIX Bastion host. yes
WALLIX Port The port on which the WALLIX Bastion API yes
communicates. By default, Tenable uses 443.
WALLIX API Key The API key generated in the WALLIX Bastion yes
user interface. Used for API Key authentication
to the API.
Get Credential by The account name associated with a Device you Required only if
Device Account Name want to log in to the target systems with. you have a
target and/or
Note: If your device has more than one account device with
you must enter the specific device name for the
account you want to retrieve credentials for.
multiple
accounts.
- 423 -
Option Description Required
Privilege Escalation This enables WALLIX Bastion Privileged Access Required if you
Management (PAM). Use the drop-down menu to wish to escalate
select the privilege elevation method. To bypass privileges.
this function, leave this field set to Nothing.
Privilege Escalation
- 424 -
Some SSH credential types support privilege escalation.
Note: BeyondTrust's PowerBroker (pbrun) and Centrify's DirectAuthorize (dzdo) are proprietary root task
delegation methods for Unix and Linux systems.
Tip: Scans run using su+sudo allow the user to scan with a non-privileged account and then switch to a
user with sudo privileges on the remote host. This is important for locations where remote privileged login
is prohibited.
Note: Scans run using sudo vs. the root user do not always return the same results because of the
different environmental variables applied to the sudo user and other subtle differences. For more
information, see https://www.sudo.ws/docs/man/sudo.man/.
The following table describes the additional options to configure for privilege escalation.
Kerberos
Password
Public Key
WALLIX Bastion
Public Key
WALLIX Bastion
Escalation Path Arcon The directory path for the privilege escalation
commands.
Kerberos
Password
- 425 -
Option SSH Types Description
Public Key
WALLIX Bastion
Escalation Su User Arcon The username for the account with su privileges.
CyberArk
Kerberos
Password
Public Key
WALLIX Bastion
Escalation Arcon The name parameter for the account with elevated
Account Name privileges.
Checkpoint Gaia
'Expert' Note: For CyberArk credentials, the system uses the
password associated with the CyberArk account
CyberArk
name you provide for all scanned hosts.
Delinea Secret
Server
CyberArk Checkpoint Gaia The name parameter for the account with elevated
Escalation 'Expert' privileges.
Account Details
CyberArk Note: For CyberArk credentials, the system uses the
Name
password associated with the CyberArk account
name you provide for all scanned hosts.
- 426 -
Option SSH Types Description
Escalation Hashicorp Vault The key secret for the Hashicorp account with
Account Secret elevated privileges.
Name
Escalation sudo CyberArk The username for the account with sudo privileges.
user
Escalation Checkpoint Gaia The secret name for the account with elevated
Credential ID 'Expert' privileges.
Delinea Secret
Server
Expert Password Checkpoint Gaia The password for Expert mode in Gaia.
'Expert'
Location of dzdo CyberArk The directory path for the dzdo command.
(directory)
Delinea Secret
Server
Hashicorp Vault
Senhasegura
Location of pbrun CyberArk The directory path for the pbrun command.
(directory)
Delinea Secret
Server
Hashicorp Vault
Senhasegura
Hashicorp Vault
- 427 -
Option SSH Types Description
Senhasegura
Location of su and CyberArk The directory path for the su and sudo commands.
sudo (directory)
Delinea Secret
Server
Hashicorp Vault
Senhasegura
Location of sudo CyberArk The directory path for the sudo command.
(directory)
Delinea Secret
Server
Hashicorp Vault
su user Delinea Secret The username for the account with su privileges.
Server
Hashicorp Vault
Senhasegura
Hashicorp Vault
Senhasegura
sudo user Hashicorp Vault The username for the account with sudo privileges.
Senhasegura
sudo login CyberArk The username for the account with sudo privileges.
Thycotic Checkpoint Gaia The name parameter for the account with elevated
Escalation 'Expert' privileges.
Account
Thycotic Secret Note: For Thycotic credentials, the system uses the
Server password associated with the Thycotic account name
you provide for all scanned hosts.
- 428 -
Windows Credentials
Tenable Security Center has vulnerability checks that can use a Microsoft Windows domain account
to find local information from a remote Windows host. For example, using credentials enables
Tenable Security Center to determine if important security patches have been applied.
Tip: Using a non-administrator account will greatly affect the quality of the scan results. Often it makes
sense to create a special Tenable Security Center user with administrative privileges that is used solely for
scheduled scanning.
Configure the following options for Windows credentials, including options specific for your
authentication method:
l The following table describes the additional options to configure when using Arcon as the
authentication method for Windows credentials.
l The following table describes the options to configure when using BeyondTrust as the
authentication method for Windows credentials.
l Centrify Options
l The following table describes the options to configure when using CyberArk Vault (Legacy) as
the authentication method for Windows credentials.
l The following table describes the additional options to configure when using CyberArk
Windows Auto-Discovery as the authentication method for Windows credentials.
l The following table describes the additional options to configure when using CyberArk Vault
as the authentication method for Windows credentials.
l The following table describes the additional options to configure when using Delinea Secret
Server as the authentication method for Windows credentials.
l The following table describes the additional options to configure when using Hashicorp Vault
as the authentication method for Windows credentials.
l The following table describes the options to configure when using Kerberos as the
authentication method for Windows credentials.
l The following table describes the additional options to configure when using Lieberman as the
authentication method for Windows credentials.
- 429 -
l The following table describes the options to configure when using LM Hash as the
authentication method for Windows credentials.
l The following table describes the options to configure when using NTLM Hash as the
authentication method for Windows credentials.
l The following table describes the options to configure when using Password as the
authentication method for Windows credentials.
l QiAnXin Options
l The following table describes the options to configure when using Senhasegura as the
authentication method for Windows credentials.
l The following table describes the options to configure when using Thycotic Secret Server as
the authentication method for Windows credentials.
l The following table describes the additional options to configure when using WALLIX Bastion
as the authentication method for Windows credentials.
Tag A tag for the credential. For more information, see Tags.
Arcon Options
The following table describes the additional options to configure when using Arcon as the
authentication method for Windows credentials.
Option Description
- 430 -
Arcon Port (Required) The port on which Arcon listens. By default, Tenable Security
Center uses port 444.
Authentication (Required) The URL Tenable Security Center uses to access Arcon.
URL
Password Engine (Required) The URL Tenable Security Center uses to access the
URL passwords in Arcon.
Username (Required) The username to log in to the hosts you want to scan.
Checkout Duration (Required) The length of time, in hours, that you want to keep
credentials checked out in Arcon. Configure the Checkout Duration to
exceed the typical duration of your Tenable Security Center scans. If a
password from a previous scan is still checked out when a new scan
begins, the new scan fails.
Use SSL When enabled, Tenable Security Center uses SSL through IIS for secure
communications. You must configure SSL through IIS in Arcon before
enabling this option.
Verify When enabled, Tenable Security Center validates the SSL certificate.
SSL Certificate You must configure SSL through IIS in Arcon before enabling this option.
BeyondTrust Options
The following table describes the options to configure when using BeyondTrust as the
authentication method for Windows credentials.
- 431 -
Option Description
Checkout Duration The length of time, in minutes, that you want to keep credentials
checked out in BeyondTrust. Configure the Checkout duration to exceed
the typical duration of your Tenable Security Center scans. If a password
from a previous scan is still checked out when a new scan begins, the
new scan fails.
Use SSL If enabled, Tenable Security Center uses SSL through IIS for secure
communications. You must configure SSL through IIS in BeyondTrust
before enabling this option.
Verify If enabled, Tenable Security Center validates the SSL certificate. You
SSL Certificate must configure SSL through IIS in BeyondTrust before enabling this
option.
Centrify Options
The following table describes the additional options to configure when using Centrify as the
authentication method for Windows credentials.
Option Description
- 432 -
Centrify Host (Required) The Centrify IP address or DNS address.
Centrify Port (Required) The port on which Centrify listens. By default, Tenable
Security Center uses port 443.
Tenant (Required) The Centrify tenant associated with the API. By default,
Tenable Security Center uses centrify.
Authentication (Required) The URL Tenable Security Center uses to access Centrify. By
URL default, Tenable Security Center uses /Security.
Password Query (Required) The URL Tenable Security Center uses to query the
URL passwords in Centrify. By default, Tenable Security Center uses
/RedRock.
Password Engine (Required) The URL Tenable Security Center uses to access the
URL passwords in Centrify. By default, Tenable Security Center uses
/ServerManage.
Username (Required) The username to log in to the hosts you want to scan.
Checkout Duration (Required) The length of time, in minutes, that you want to keep
credentials checked out in Centrify.
Use SSL When enabled, Tenable Security Center uses SSL through IIS for secure
communications. You must configure SSL through IIS in Centrify before
- 433 -
enabling this option.
Verify When enabled, Tenable Security Center validates the SSL certificate.
SSL Certificate You must configure SSL through IIS in Centrify before enabling this
option.
The following table describes the options to configure when using CyberArk Vault (Legacy) as the
authentication method for Windows credentials.
Option Description
Central The port the CyberArk Central Credential Provider is listening on.
Credential
Provider URL
Port
Vault Username The username for the vault, if the CyberArk Central Credential Provider is
configured for basic authentication.
Vault Password The password for the vault, if the CyberArk Central Credential Provider is
configured for basic authentication.
Safe The safe on the CyberArk Central Credential Provider server that contains
the credentials you want to retrieve.
CyberArk Client The file that contains the PEM certificate used to communicate with the
Certificate CyberArk host.
CyberArk Client The file that contains the PEM private key for the client certificate.
- 434 -
Option Description
Certificate
Private Key
Folder The folder on the CyberArk Central Credential Provider server that
contains the credentials you want to retrieve.
Vault Use SSL When enabled, Tenable Security Center uses SSL through IIS for secure
communications. You must configure SSL through IIS in CyberArk Central
Credential Provider before enabling this option.
Vault Verify SSL When enabled, Tenable Security Center validates the SSL certificate. You
must configure SSL through IIS in CyberArk Central Credential Provider
before enabling this option.
CyberArk The unique name of the credential you want to retrieve from CyberArk.
Escalation
Account Details
Name
- 435 -
Option Description
CyberArk AIM The URL for the CyberArk AIM web service. By default, Tenable Security
Service URL Center uses /AIMWebservice/v1.1/AIM.asmx.
The following table describes the additional options to configure when using CyberArk Windows
Auto-Discovery as the authentication method for Windows credentials.
CyberArk Host The IP address or FQDN name for the user’s CyberArk yes
Instance.
AIM Web Service There are two authentication methods established in yes
Authentication the feature. IIS Basic Authentication and Certificate
Type Authentication. Certificate Authentication can be either
encrypted or unencrypted.
- 436 -
Option Description Required
CyberArk PVWA Password for the username to log in to CyberArk web yes
Web UI Login console. This is used to authenticate to the PVWA REST
Password API and gather bulk account information.
CyberArk String used in the PVWA REST API query parameters to yes
Platform Search gather bulk account information. For example, the user
String can enter UnixSSH Admin TestSafe, to gather all
Windows platform accounts containing a username
Admin in a Safe called TestSafe.
- 437 -
Option Description Required
Use SSL If enabled, the scanner uses SSL through IIS for secure yes
communications. Enable this option if CyberArk is
configured to support SSL through IIS.
The following table describes the additional options to configure when using CyberArk Vault as the
authentication method for Windows credentials.
CyberArk Host The IP address or FQDN name for the CyberArk AIM Web yes
Service. This can be the host, or the host with a custom
URL added on in a single string.
Client Certificate The file that contains the PEM certificate used to no
communicate with the CyberArk host.
Client Certificate The file that contains the PEM private key for the client yes, if
Private Key certificate. private key
is applied
Client Certificate The passphrase for the private key, if required. yes, if
Private Key private key
- 438 -
Option Description Required
Passphrase is applied
Get credential by The method with which your CyberArk API credentials yes
are retrieved. Can be Username, Identifier, or Address.
- 439 -
Option Description Required
Use SSL If enabled, the scanner uses SSL through IIS for secure no
communications. Enable this option if CyberArk is
configured to support SSL through IIS.
The following table describes the additional options to configure when using Delinea Secret Server
as the authentication method for Windows credentials.
Delinea The value of the secret on the Delinea server. The secret is yes
Secret Name labeled Secret Name on the Delinea server.
Delinea Host The Delinea Secret Server IP address for API requests. yes
Delinea Port The Delinea Secret Server Port for API requests. By default, yes
Tenable uses 443.
- 440 -
Delinea The password to authenticate to the Delinea server. This is yes
Password associated with the Delinea Login Name you provided.
Checkout The duration Tenable should check out the password from yes
Duration Delinea. Duration time is in hours and should be longer than
the scan time.
Verify SSL If enabled. verifies the SSL Certificate on the Delinea server. no
Certificate
The following table describes the additional options to configure when using Hashicorp Vault as the
authentication method for Windows credentials.
- 441 -
Role Secret ID The GUID generated by Hashicorp Vault when you yes
configured your App Role.
/v1/auth/approle/login
l AD — Active Directory
KV1 Engine URL The URL Tenable Security Center uses to access the yes
Hashicorp Vault secrets engine.
KV2 Engine URL
Example: /v1/path_to_secret. No trailing /
AD Engine URL
Username Source (Only displays if Hashicorp Vault Type is KV1 or KV2) yes
Specifies if the username is input manually or pulled
from Hashicorp Vault.
Username Key (Only displays if Hashicorp Vault Type is KV1 or KV2) The yes
name in Hashicorp Vault that usernames are stored
under.
Password Key (Only displays if Hashicorp Vault Type is KV1 or KV2) The yes
key in Hashicorp Vault that passwords are stored under.
Secret Name The key secret you want to retrieve values for. yes
- 442 -
Authentication the specified Linux or Unix target.
Use SSL When enabled, Tenable Security Center uses SSL for no
secure communications. You must configure SSL in
Hashicorp Vault before enabling this option.
Kerberos Options
The following table describes the options to configure when using Kerberos as the authentication
method for Windows credentials.
Option Description
- 443 -
Option Description
Domain The authentication domain, typically the domain name of the target (e.g.,
example.com).
KDC Port The port you want to use for the KDC connection. By default, Tenable
Security Center uses port 88.
KDC Transport The method you want to use to connect to the KDC server.
Note: If you select UDP, you may need to edit the KDC Port. The KDC UDP
protocol uses either port 88 or port 750.
Lieberman Options
The following table describes the additional options to configure when using Lieberman as the
authentication method for Windows credentials.
Option Description
Lieberman User The username for the Lieberman explicit user you want Tenable Security
Center to use for authentication to the Lieberman Rapid Enterprise
Defense (RED) API.
- 444 -
Option Description
Use SSL When enabled, Tenable Security Center uses SSL through IIS for secure
communications. You must configure SSL through IIS in Lieberman
before enabling this option.
Verify When enabled, Tenable Security Center validates the SSL certificate.
SSL Certificate You must configure SSL through IIS in Lieberman before enabling this
option.
LM Hash Options
The following table describes the options to configure when using LM Hash as the authentication
method for Windows credentials.
Option Description
The following table describes the options to configure when using NTLM Hash as the authentication
method for Windows credentials.
Option Description
- 445 -
Password Options
The following table describes the options to configure when using Password as the authentication
method for Windows credentials.
Option Description
QiAnXin Options
The following table describes the options to configure when using QiAnXin as the authentication
method for Windows credentials.
QiAnXin Host The IP address or URL for the QiAnXin host. yes
QiAnXin Port The port on which the QiAnXin API communicates. yes
By default, Tenable uses 443.
QiAnXin API Client ID The Client ID for the embedded account yes
application created in QiAnXin PAM.
QiAnXin API Client The Secret ID for the embedded account yes
Secret application created in QiAnXin PAM.
QiAnXin Username The username to log in to the hosts you want to yes
scan.
QiAnXin Asset Address Specify the host IP of the asset containing the no
account to use. If not specified, the scan target IP
is used.
- 446 -
Option Description Required
l HP_UNIX — HP Unix
l SOLARIS — Solaris
l OPENLDAP — OpenLDAP
l POSTGRESQL — PostgreSQL
QiAnXin Region ID Specify the region ID of the asset containing the Only if using
account to use. multiple
regions.
Verify SSL Certificate When enabled, Tenable verifies that the SSL no
Certificate on the server is signed by a trusted CA.
Senhasegura Options
- 447 -
The following table describes the options to configure when using Senhasegura as the
authentication method for Windows credentials.
Private Key File The Private Key used to decrypt encrypted Required if you have
sensitive data from A2A. enabled encryption
of sensitive data in
Note: You can enable encryption of sensitive data in A2A Application
the A2A Application Authorizations. If enabled, you
must provide a private key file in the scan
Authorizations.
credentials. This can be downloaded from the
applicable A2A application in Senhasegura.
- 448 -
Thycotic Secret Server Options
The following table describes the options to configure when using Thycotic Secret Server as the
authentication method for Windows credentials.
Option Description
Thycotic Secret (Required) The value you want Tenable Security Center to use when setting
Server URL the transfer method, target, and target directory for the scanner. Find the
value on the Thycotic server, in Admin > Configuration > Application
Settings > Secret Server URL.
Thycotic Login (Required) The username for a user on the Thycotic server.
Name
Thycotic (Required) The password associated with the Thycotic Login Name you
Password provided.
Thycotic In cloud instances of Thycotic, the value that identifies which organization
Organization the Tenable Security Center query should target.
Use Private Key If enabled, Tenable Security Center uses key-based authentication for
SSH connections instead of password authentication.
Verify SSL If enabled, Tenable Security Center verifies the SSL Certificate on the
Certificate Thycotic server.
- 449 -
Option Description
The following table describes the additional options to configure when using WALLIX Bastion as
the authentication method for Windows credentials.
WALLIX Host The IP address for the WALLIX Bastion host. yes
WALLIX Port The port on which the WALLIX Bastion API yes
communicates. By default, Tenable uses 443.
WALLIX API Key The API key generated in the WALLIX Bastion yes
user interface. Used for API Key
authentication to the API.
Get Credential by The account name associated with a Device Required only if
Device Account Name you want to log in to the target systems with. you have a target
and/or device with
Note: If your device has more than one account multiple accounts.
you must enter the specific device name for the
- 450 -
Option Description Required
Configure the following options for Web Authentication credentials, including options specific for
your authentication method: Client Certificate Authentication Options, HTTP Server Authentication
Options, and Web Application Authentication Options.
For information about web app scans, see Web App Scans.
Tag A tag for the credential. For more information, see Tags.
- 451 -
Option Description
Client Certificate The file that contains the PEM-formatted certificate used to
communicate with the host.
Client Certificate The file that contains the PEM-formatted private key for the client
Private Key certificate.
Page to Verify The URL that Tenable Security Center can access to validate the
Successful authenticated session.
Authentication
Pattern to Verify A word, phrase, or regular expression that appears on the website only if
Successful the authentication is successful (for example, Welcome, your username!).
Authentication Leading slashes are escaped and .* is not required at the beginning or
end of the pattern.
Option Description
l NTLM
l Kerberos
- 452 -
Option Description
Kerberos Realm (Required when enabling the Kerberos Authentication Type) The realm to
which Kerberos Target Authentication belongs, if applicable.
Key Distribution (Required when enabling the Kerberos Authentication Type) The host
Center (KDC) that supplies the session tickets for the user.
Option Description
l Cookie Authentication
l API Key
l Selenium Authentication
l Bearer Authentication
Login Form
Login Page The URL of the login page for the web application you want to scan.
Login Parameters For each field in the target's login form (for example, username,
password, domain, etc.) enter one login parameter in each row:
a. In the left box, type the login field's name or id HTML DOM attribute.
b. In the right box, type the value to insert in that text field at login.
Pattern to Verify A word, phrase, or regular expression that appears on the website only if
Successful Auth the authentication is successful (for example, Welcome, your username).
Note that leading slashes are escaped and .* is not required at the
- 453 -
Option Description
Page to Verify The URL that Tenable Security Center can continually access to validate
Active Session the authenticated session.
Pattern to Verify A word, phrase, or regular expression that appears on the website only if
Active Session the session is still active (for example, Hello, your username). Note that
leading slashes are escaped and .* is not required at the beginning or end
of the pattern.
Cookie Authentication
Page to Verify The URL that Tenable Security Center can continually access to validate
Active Session the authenticated session.
Pattern to Verify A word, phrase, or regular expression that appears on the website only if
Active Session the session is still active (for example, Hello, your username). Note that
leading slashes are escaped and .* is not required at the beginning or end
of the pattern.
API Key
- 454 -
Option Description
Page to Verify The URL that Tenable Security Center can continually access to validate
Active Session the authenticated session.
Pattern to Verify A word, phrase, or regular expression that appears on the website only if
Active Session the session is still active (for example, Hello, your username). Note that
leading slashes are escaped and .* is not required at the beginning or end
of the pattern.
Selenium Authentication
Page to Verify The URL that Tenable Security Center can continually access to validate
Active Session the authenticated session.
Pattern to Verify A word, phrase, or regular expression that appears on the website only if
Active Session the session is still active (for example, Hello, your username). Note that
leading slashes are escaped and .* is not required at the beginning or end
of the pattern.
Bearer Authentication
Page to Verify The URL that Tenable Security Center can continually access to validate
Active Session the authenticated session.
Pattern to Verify A word, phrase, or regular expression that appears on the website only if
Active Session the session is still active (for example, Hello, your username). Note that
- 455 -
Option Description
leading slashes are escaped and .* is not required at the beginning or end
of the pattern.
Audit Files
The Tenable Nessus vulnerability scanner allows you to perform compliance audits of numerous
platforms including (but not limited to) databases, Cisco, Unix, and Windows configurations as well
as sensitive data discovery based on regex contained in audit files. Audit files are XML-based text
files that contain the specific configuration, file permission, and access control tests to be
performed. For more information, see Manage Audit Files.
After you create an audit file, you can reference the audit file in a template-based Policy
Compliance Auditing scan policy or a custom scan policy. For more information about compliance
options in custom scan policies, see The Compliance tab specifies compliance the audit files to
reference in a scan policy. The options available depend on the type of audit file selected..
For more information on compliance checks and creating custom audits, see the Compliance
Checks Reference.
Note: The maximum number of audit files you can include in a single Policy Compliance Auditing scan is
limited by the total runtime and memory that the audit files require. Exceeding this limit may lead to
incomplete or failed scan results. To limit the possible impact, Tenable recommends that audit selection in
your scan policies be targeted and specific for the scan's scope and compliance requirements.
- 456 -
l a Tenable-created audit file downloaded from the Tenable downloads page.
l a Security Content Automation Protocol (SCAP) Data Stream file downloaded from a
SCAP repository (e.g., https://nvd.nist.gov/ncp/repository).
The file must contain full SCAP content (Open Vulnerability and Assessment Language
(OVAL) and Extensible Configuration Checklist Description Format (XCCDF) content) or
OVAL standalone content.
Note: XCCDF standalone content audit files lack automated checks and do not return scan results in
Tenable Security Center.
l a custom audit file created or customized for a specific environment. For more information,
see the knowledge base article.
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
You can add template-based audit files using templates embedded within Tenable Security Center.
Tenable updates these templates regularly through the Tenable Security Center feed.
Note: The maximum number of audit files you can include in a single Policy Compliance Auditing scan is
limited by the total runtime and memory that the audit files require. Exceeding this limit may lead to
incomplete or failed scan results. To limit the possible impact, Tenable recommends that audit selection in
your scan policies be targeted and specific for the scan's scope and compliance requirements.
2. Click Scanning > Audit Files (administrator users) or Scans > Audit Files (organizational
users).
3. Click Add
- 457 -
The Audit File Templates page appears.
6. (Optional) In the Description box, type a description for the audit file.
7. (Optional) Edit the template-specific options if you do not want to use the default values.
8. Click Submit.
What to do next:
l Reference the audit file in a template-based Policy Compliance Auditing scan policy or a
custom scan policy. For more information about compliance options in custom scan policies,
see The Compliance tab specifies compliance the audit files to reference in a scan policy. The
options available depend on the type of audit file selected..
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
You can add custom audit files to upload any of the following:
l a Security Content Automation Protocol (SCAP) Data Stream file downloaded from a
SCAP repository (e.g., https://nvd.nist.gov/ncp/repository).
The file must contain full SCAP content (Open Vulnerability and Assessment Language
(OVAL) and Extensible Configuration Checklist Description Format (XCCDF) content) or
OVAL standalone content.
Note: XCCDF standalone content audit files lack automated checks and do not return scan results in
Tenable Security Center.
- 458 -
l a custom audit file created or customized for a specific environment. For more information,
see the knowledge base article.
Note: The maximum number of audit files you can include in a single Policy Compliance Auditing scan is
limited by the total runtime and memory that the audit files require. Exceeding this limit may lead to
incomplete or failed scan results. To limit the possible impact, Tenable recommends that audit selection in
your scan policies be targeted and specific for the scan's scope and compliance requirements.
2. Click Scanning > Audit Files (administrator users) or Scans > Audit Files (organizational
users).
3. Click Add
5. In the Name box, type a descriptive name for the audit file.
7. Click Choose File and browse to the Audit File you want to upload.
The system uploads the file. If you uploaded a SCAP Data Stream file, additional options
appear.
8. If you uploaded a Data Stream file with full SCAP content, continue configuring options for the
file:
a. If you uploaded SCAP 1.2 content or later, in the Data Stream Name box, select the Data
Stream identifier found in the SCAP 1.2 Data Stream content.
- 459 -
b. In the Benchmark Type box, select the operating system that the SCAP content targets.
c. In the Benchmark Name box, select the benchmark identifier found in the
SCAP XCCDF component.
d. In the Profile box, select the benchmark profile identifier found in the
SCAP XCCDF component.
9. Click Submit.
What to do next:
l Reference the audit file in a template-based Policy Compliance Auditing scan policy or a
custom scan policy. For more information about compliance options in custom scan policies,
see The Compliance tab specifies compliance the audit files to reference in a scan policy. The
options available depend on the type of audit file selected..
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
3. To filter the audit files that appear on the page, apply a filter as described in Apply a Filter.
4. To add an audit file, see Add a Template-Based Audit File or Add a Custom Audit File.
- 460 -
-or-
b. Click View.
-or-
b. Click Edit.
d. To replace the audit file, click the delete button ( ) next to the file and upload a new
audit file.
e. Click Submit.
-or-
- 461 -
b. Click Share.
d. Click Submit.
-or-
b. Click Export.
-or-
b. Click Delete.
c. Click Delete.
Scan Zones
- 462 -
Scan zones are areas of your network that you want to target in an active scan, associating an
IP address or range of IP addresses with one or more scanners in your deployment. You must create
scan zones in order to run active scans in Tenable Security Center.
For more information, see Add a Scan Zone, View Your Scan Zones, Edit a Scan Zone, and Delete a
Scan Zone.
Option Description
Ranges One or more IP addresses that you want the scan zone to target. Supported
formats:
Scanners One or more scanners that you want to use to scan the Ranges in this scan
zone.
Note: Do not choose scanners that cannot reach the areas of your network
identified in the Ranges. Similarly, consider the quality of the network
connection between the scanners you choose and the Ranges.
Best Practices
Tenable recommends pre-planning your scan zone strategy to efficiently target discrete areas of
your network. If configured improperly, scan zones prevent scanners from reaching their targets.
Consider the following best practices:
l It is simplest to configure and manage a small number of scan zones with large ranges.
l If you use Nessus Manager for agent management, do not target Nessus Manager in any scan
zone ranges.
- 463 -
Overlapping Scan Zones
In some cases, you may want to configure overlapping scan zones to ensure scanning coverage or
redundancy.
Note: Do not configure overlapping scan zones without pre-planning your scan zone and Distribution
Method strategy.
Two or more scan zones are redundant if they target the same area of your network. If Tenable
Security Center executes a scan with redundant scan zones, it first attempts the scan using the
narrowest, most specific scan zone.
In this example, the red numbers represent specific IP addresses on your network. The grey circles
represent the network coverage of individual scan zones.
See the following table to understand the primary and redundant scan zones for the IP addresses in
this example.
- 464 -
2 Scan Zone B Scan Zone A.
For more information about scan zone options, see Scan Zones.
6. In the Ranges box, type one or more IP addresses, CIDR addresses, or ranges to target with
the scan zone.
7. In the Scanners box, choose one or more scanners to associate with the scan zone.
8. Click Submit.
What to do next:
- 465 -
l Configure scan zone-related organization settings, as described in Organizations.
l Configure an active scan that targets your scan zone, as described in Add an Active Scan.
All Scanners Available All of the scanners in the scan zone are Working.
x/y Scanners Available Only some of the scanners in the scan zone are Working.
No Scanners Available None of the scanners in the scan zone are Working.
For information about Working and other scanner statuses, see Tenable
Nessus Scanner Statuses.
l Last Modified — The date and time the scan zone was last modified.
For more information about scan zone options, see Scan Zones.
- 466 -
To edit a scan zone:
3. Right-click the row for the scan zone you want to edit.
-or-
Select the check box for the scan zone you want to edit.
4. Click Edit.
5. Modify the following scan zone options. For more information, see Scan Zones.
l Name
l Description
l Ranges
l Scanners
6. Click Submit.
- 467 -
l Confirm that no scans target the scan zone you want to delete. Tenable Security Center scans
may fail if you delete an actively targeted scan zone.
b. Click Delete.
4. Click Delete.
Scan Policies
Scan policies contain plugin settings and advanced directives for active scans.
When an administrator user creates a scan policy, the policy is available to all organizations. When
an organizational user creates a scan policy, the scan policy is available only to their organization.
Users with the appropriate permissions can use scan policies in an active scan, modify policy
options, and more. For more information about user permissions, see User Roles.
- 468 -
l Add a Scan Policy
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
You can create template-based or custom scan policies for your active scans. When you create a
custom scan policy, you can configure any scan policy option. When you configure a template-
based scan policy, you can configure the options included for the template type. For more
information about Tenable-provided scan policy templates, see Scan Policy Templates.
2. Click Scanning > Policies (administrator users) or Scans > Policies (organizational users).
- 469 -
4. In the Template section, click a policy template. For more information, see Scan Policy
Templates.
6. Click Submit.
2. Click Scanning > Policies (administrator users) or Scans > Policies (organizational users).
6. Click Submit.
What to do next:
l Reference the scan policy in an active scan configuration, as described in Add an Active Scan.
- 470 -
Each Tenable-provided scan policy template contains a different set of scan policy options. You can
only modify the settings included for that scan policy template type.
Custom scan policies, such as Advanced Scan, contain all scan policy options. You can modify any
scan policy options for custom scans.
For more information, see Scan Policies and Scan Policy Options.
Note: If there is a Tenable-provided template that does not appear in this list, it may be a scan policy that
is not supported by Tenable Security Center.
Template Description
Common
Advanced Agent The most configurable scan type. You can configure this scan template
Scan to match any policy. This template has the same default settings as the
basic scan template, but it allows for additional configuration options.
Note: Advanced scan templates allow you to scan more deeply using custom
configuration, such as faster or slower checks, but misconfigurations can
cause asset outages or network saturation. Use the advanced templates
with caution.
Advanced Scan The most configurable scan type. You can configure this scan template
to match any policy. This template has the same default settings as the
basic scan template, but it allows for additional configuration options.
Basic Network Performs a full system scan that is suitable for any host. Use this
Scan template to scan an asset or assets with all of Nessus's plugins enabled.
For example, you can perform an internal vulnerability scan on your
organization's systems.
- 471 -
Compliance Configuration
Note: While the PCI DSS requires you to provide evidence of passing or
"clean" scans on at least a quarterly basis, you must also perform scans after
any significant changes to your network (PCI DSS 11.2.3).
The compliance checks can audit against custom security policies, such
as password complexity, system settings, or registry values on Windows
operating systems. For Windows systems, the compliance audits can
test for a large percentage of anything that can be described in a
Windows policy file. For Unix systems, the compliance audits test for
running processes, user security policy, and content of files.
SCAP and OVAL Audits systems using SCAP and OVAL definitions.
- 472 -
Auditing The National Institute of Standards and Technology (NIST) Security
Content Automation Protocol (SCAP) is a set of policies for managing
vulnerabilities and policy compliance in government agencies. It relies
on multiple open standards and policies, including OVAL, CVE, CVSS,
CPE, and FDCC policies.
l When using the SCAP and OVAL Auditing template, you can
perform Linux and Windows SCAP CHECKS to test compliance
standards as specified in NIST’s Special Publication 800-126.
Other
CISA Alerts AA22- Performs remote and local checks for vulnerabilities from CISA alerts
011A and AA22- AA22-011A and AA22-047A.
047A
- 473 -
Detection 0235.
Host Discovery Performs a simple scan to discover live hosts and open ports.
Launch this scan to see what hosts are on your network and associated
information such as IP address, FQDN, operating systems, and open
ports, if available. After you have a list of hosts, you can choose what
hosts you want to target in a specific vulnerability scan.
Note: Assets identified by discovery scans do not count toward your license.
Intel AMT Security Performs remote and local checks for CVE-2017-5689.
Bypass Detection
ProxyLogon: Performs remote and local checks to detect Microsoft Exchange Server
MS Exchange vulnerabilities related to CVE-2021-26855, CVE-2021-26857, CVE-2021-
- 474 -
26858, and CVE-2021-27065.
Spectre and Performs remote and local checks for CVE-2017-5753, CVE-2017-5715,
Meltdown and CVE-2017-5754.
Detection
API A scan that checks an API for vulnerabilities. This scan analyzes RESTful
APIs described via an OpenAPI (Swagger) specification file.
PCI A scan that assesses web applications for compliance with Payment
Card Industry Data Security Standards (PCI DSS) for PCI ASV.
Quick Scan A high-level scan similar to the Config Audit scan policy template that
analyzes HTTP security headers and other externally facing
configurations on a web application to determine if the application is
compliant with common security industry standards. Does not include
scheduling.
If you create a scan using the Quick Scan scan policy template, Tenable
- 475 -
Security Center analyzes your web application only for plugins related to
security industry standards compliance.
Scan A comprehensive scan that assesses web applications for a wide range
of vulnerabilities.
The Scan scan policy template provides plugin family options for all
active web application plugins.
If you create a scan using the Scan scan policy template, Tenable
Security Center analyzes your web application for all plugins that the
scanner checks for when you create a scan using the Web App Config
Audit, Web App Overview, or SSL_TLS scan policy templates, as well as
additional plugins to detect specific vulnerabilities.
A scan run with this scan template provides a more detailed assessment
of a web application and take longer to complete that other web app
scans.
When you create a scan using the SSL_TLS scan policy template,
Tenable Security Center analyzes your web application only for plugins
related to SSL/TLS implementation. The scanner does not crawl URLs or
assess individual pages for vulnerabilities.
Web App Config A high-level scan that analyzes HTTP security headers and other
Audit externally facing configurations on a web application to determine if the
application is compliant with common security industry standards.
If you create a scan using this scan policy template, Tenable Security
Center analyzes your web application only for plugins related to security
industry standards compliance.
Web App Overview A high-level preliminary scan that determines which URLs in a web
application Tenable Security Center scans by default.
This scan template does not analyze the web application for active
vulnerabilities. Therefore, this scan policy template does not offer as
- 476 -
many plugin family options as the Scan template.
When you create a custom scan policy, you can configure any scan policy option. When you
configure a template-based scan policy, you can configure the options included for the template
type. For more information about Tenable-provided scan policy templates, see Scan Policy
Templates.
l Setup Options
l Advanced Options
l Assessment Options
l Malware Options
l SCADA Options
l Windows Options
l Report Options
l Authentication Options
l Compliance Options
l Plugins Options
Setup Options
- 477 -
Option Description
Tag A tag for the policy. For more information, see Tags.
Advanced Options
Option Description
General Settings
Scan for Determines whether the scan searches for unpatched vulnerabilities.
unpatched This includes CVEs marked as "Will Not Fix" by the related vendor.
vulnerabilities (no
Enabling this setting may increase your overall findings count; each
patches or
platform and package combination results in an individual plugin. If
mitigations
additional CVEs are found to affect a platform and package
available)
combination, the CVEs are added to the existing plugin.
Stop scanning During a scan, hosts may become unresponsive after a period of time.
hosts that become Enabling this setting stops scan attempts against hosts that stop
unresponsive sending results.
during the scan
- 478 -
Option Description
The scan initially sends a bad ssh request to the target in order to
retrieve the supported authorization methods. This allows you to
determine how to connect to the target, which is helpful when you
configure a custom ssh banner and then try to determine how to
connect to the host.
Scan targets with When disabled, to avoid overwhelming a host, Tenable Nessus prevents
multiple domain against simultaneously scanning multiple targets that resolve to a single
names in parallel IP address. Instead, Tenable Nessus scanners serialize attempts to scan
the IP address, whether it appears more than once in the same scan
task or in multiple scan tasks on that scanner. Scans may take longer to
complete.
Create unique When enabled, the scanner creates a unique identifier (Tenable UUID) .
identifier on hosts Tenable Vulnerability Management and Tenable Security Center use the
scanned using Tenable UUID to merge incoming scan data with historical results for
credentials the asset and ensure that license counts are accurately reflected.
For more information, see Why Tenable Tags and Agent IDs are created
during authenticated scans.
- 479 -
Option Description
Performance Options
Slow down the When Tenable Nessus detects congestion during a scan, it will slow the
scan when speed of the scan in an attempt to ease the burden on the affected
network segment(s).
congestion is
detected
Max simultaneous This setting limits the maximum number of checks a Tenable Nessus
checks per host scanner performs against a single host at one time. The default value of
this option is 5 simultaneous checks per host.
Max simultaneous This setting limits the maximum number of hosts that a single Tenable
hosts per scan Nessus scanner scans at the same time. The default value of this option
is 30 hosts per scan.
If the scan is using a zone with multiple scanners, each scanner will
accept up to the amount specified in the Max simultaneous hosts per
scan option. For example, if the Max simultaneous hosts per scan is
set to 5 and there are 5 scanners per zone, each scanner will accept 5
hosts to scan, allowing a total of 25 hosts to be scanned between the 5
scanners.
If you set Max Simultaneous hosts per scan to more than the Nessus
scanner’s max_hosts value, the following message appears in the
scanner's nessusd.messages: Tried to raise the maximum hosts number
- 150. Using 100. Change 'max_hosts' in the server configuration if you
believe this is incorrect. You can ignore this message; Tenable Security
Center send scans to the scanner into scan chunks of up to eight IPs
- 480 -
Option Description
and will not reach the scanner's max_hosts, which must be nine or
greater.
Max number of Specifies the maximum number of established TCP sessions for a single
concurrent TCP host.
sessions per host
This TCP throttling option also controls the number of packets per
second the SYN scanner sends, which is 10 times the number of TCP
sessions. For example, if this option is set to 15, the SYN scanner sends
150 packets per second at most.
Type an integer between 1-2000. If you leave the box empty or enter 0,
Tenable Security Center does not enforce a limit.
Max number of This setting limits the maximum number of TCP sessions established by
concurrent TCP any of the active scanners during a scan.
sessions per scan
Type an integer between 1-2000. If you leave the box empty or enter 0,
Tenable Security Center does not enforce a limit.
Exclude Filepath A plain text file containing a list of filepaths to exclude from all plugins
that search using the find command on Unix systems.
In the file, enter one filepath per line, formatted per patterns allowed by
the Unix find command -path argument. For more information, see
the find command man page.
Exclude Filesystem A plain text file containing a list of filesystems to exclude from all
plugins that search using the find command on Unix systems.
In the file, enter one filesystem per line, using filesystem types
supported by the Unix find command -fstype argument. For more
information, see the find command man page.
Include Filepath A plain text file containing a list of filepaths to include from all plugins
that search using the find command on Unix systems.
- 481 -
Option Description
In the file, enter one filepath per line, formatted per patterns allowed by
the Unix find command -path argument. For more information, see
the find command man page.
Windows Exclude A plain text file containing a list of filepaths to exclude from all plugins
Filepath that search using Tenable's unmanaged software directory scans.
In the file, enter one absolute or partial filepath per line, formatted as
the literal strings you want to exclude. You can include absolute or
relative directory names, examples such as E:\, E:\Testdir\, and
\Testdir\.
Windows Include A plain text file containing a list of filepaths to include in all plugins that
Filepath search using Tenable's unmanaged software directory scans.
In the file, enter one absolute or partial filepath per line, formatted as
the literal strings you want to exclude. You can only include absolute
directory names, examples such as E:\, E:\Testdir\, and C:\.
Caution: Avoid having the same filepaths in the Windows Include Filepath
and Windows Exclude Filepath settings. This conflict results in the filepath
being excluded from the search.
- 482 -
Option Description
Maximum Controls the maximum output length in kilobytes for each individual
Compliance Output compliance check value that the target returns. If a compliance check
Length in KB value that is greater than this setting's value, Tenable Security Center
truncates the result. The default value is 128000.
Generate Attaches XCCDF result files generated from compliance .audit scans.
XCCDF Result File For more information, see Compliance Export XCCDF Results.
Generate Attaches .audit JSON result files. For more information, see Compliance
JSON Result File Export JSON Results.
Note: You cannot download the JSON file directly from Tenable
Security Center.
Debug Settings
Always Report When enabled, Tenable Security Center generates a report of all the
SSH Commands commands run over SSH on the host in a machine-readable format. You
can view the reported commands under plugin 168017.
Note: The setting does not function correctly if you disable plugin 168017.
Enumerate Shows a list of plugins that were launched during the scan. You can
Launched Plugins view the list in scan results under plugin 112154.
- 483 -
Option Description
Maximum delay (Agents 8.2 and later) If set, each agent in the agent group delays
(minutes) starting the scan for a random number of minutes, up to the specified
maximum. Staggered starts can reduce the impact of agents that use a
shared resource, such as virtual machine CPU.
If the maximum delay you set exceeds your scan window, Tenable
shortens your maximum delay to ensure that agents begin scanning at
least 30 minutes before the scan window closes.
Option Description
Ping the When enabled, Tenable Nessus attempts to ping the hosts in the scan to
remote host determine if the host is alive or not.
Test the local This option allows you to include or exclude the local Tenable Nessus host
Tenable Nessus from the scan. This is used when the Tenable Nessus host falls within the
host target network range for the scan.
Use fast When Tenable Nessus pings a remote IP address and receives a reply, it
network performs extra checks to make sure that it is not a transparent proxy or a
discovery load balancer that would return noise but no result (some devices answer to
every port 1 - 65535 even when there is no service behind the device). Such
checks can take some time, especially if the remote host is firewalled. If
Use fast network discovery is enabled, Tenable Nessus does not perform
these checks.
ARP Ping a host using its hardware address via Address Resolution Protocol
(ARP). This only works on a local network.
- 484 -
Option Description
Destination Destination ports can be configured to use specific ports for TCP ping. This
ports option specifies the list of ports that are checked via TCP ping. Type one of
the following:
l a single port
l built-in
For more information about which ports built-in specifies, see the
knowledge base article.
ICMP Ping a host using the Internet Control Message Protocol (ICMP).
Assume ICMP When a ping is sent to a host that is down, its gateway may return an ICMP
unreachable unreachable message. When enabled, this option considers this to mean
means the host the host is dead. This is to help speed up discovery on some networks.
is down
Some firewalls and packet filters use this same behavior for hosts that are
up but are connecting to a port or protocol that is filtered. With this option
enabled, this leads to the scan considering the host is down when it is
indeed up.
Maximum (If you enabled ICMP) Allows you to specify the number of attempts to try to
number of ping the remote host. The default is two attempts.
retries
Fragile Devices
- 485 -
Option Description
Scan Network Instructs the Tenable Nessus scanner not to scan network printers if
Printers unselected. Since many printers are prone to denial of service conditions,
Tenable Nessus can skip scanning them once identified. This is
recommended if scanning is performed on production networks.
Scan Novell Instructs the Tenable Nessus scanner not to scan Novel Netware hosts if
Netware hosts unselected. Since many Novell Netware hosts are prone to denial of service
conditions, Tenable Nessus can skip scanning them once identified. This is
recommended if scanning is performed on production networks.
Scan When enabled, Tenable Security Center performs a full scan of Operational
Operational Technology (OT) devices such as programmable logic controllers (PLCs) and
Technology remote terminal units (RTUs) that monitor environmental factors and the
devices activity and state of machinery.
Wake-on-LAN
List of MAC Wake on Lan (WOL) packets will be sent to the hosts listed, one on each
addresses line, in an attempt to wake the specified host(s) during a scan.
Boot time wait The number of minutes Tenable Nessus will wait to attempt a scan of hosts
(in minutes) sent a WOL packet.
Option Description
Ports
Consider If a port is not scanned with a selected port scanner (for example, out of
unscanned the range specified), the scanner will consider it closed.
ports as closed
Port scan range Specifies a keyword (default) or a custom port range that you want the
- 486 -
Option Description
scanner to target.
l Type all to instruct the scanner to scan all 65,536 ports, including
port 0.
SSH (netstat) When enabled, the scanner uses netstat to check for open ports from the
local machine. It relies on the netstat command being available via an SSH
connection to the target. This scan is intended for Linux-based systems
and requires authentication credentials.
WMI (netstat) When enabled, the scanner uses netstat to determine open ports while
performing a WMI-based scan.
l Ignores any custom range specified in the Port Scan Range setting.
- 487 -
Option Description
SNMP When enabled, if the appropriate credentials are provided by the user, the
scanner can better test the remote host and produce more detailed audit
results. For example, there are many Cisco router checks that determine
the vulnerabilities present by examining the version of the returned SNMP
string. This information is necessary for these audits.
Only run If a local port enumerator runs, all network port scanners will be disabled
network port for that asset.
scanners if local
port
enumeration
failed
Verify open TCP When enabled, if a local port enumerator (for example, WMI or netstat)
ports found by finds a port, the scanner also verifies that the port is open remotely. This
local port approach helps determine if some form of access control is being used (for
enumerators example, TCP wrappers or a firewall).
TCP Use the built-in Tenable Nessus TCP scanner to identify open TCP ports on
the targets, using a full TCP three-way handshake. If you enable this
option, you can also set the Override Automatic Firewall Detection option.
Note: On some platforms (for example, Windows and macOS), if the operating
system is causing serious performance issues using the TCP scanner, Tenable
Nessus launches the SYN scanner instead.
SYN Use the built-in Tenable Nessus SYN scanner to identify open TCP ports on
the target hosts. SYN scans do not initiate a full TCP three-way handshake.
- 488 -
Option Description
The scanner sends a SYN packet to the port, waits for SYN-ACK reply, and
determines the port state based on a response or lack of response.
If you enable this option, you can also set the Override Automatic Firewall
Detection option.
Override Rely on local port enumeration first before relying on network port scans.
automatic
firewall
detection
UDP This option engages the built-in Tenable Nessus UDP scanner to identify
open UDP ports on the targets.
Due to the nature of the protocol, it is generally not possible for a port
scanner to tell the difference between open and filtered UDP ports.
Enabling the UDP port scanner may dramatically increase the scan time
and produce unreliable results. Consider using the netstat or SNMP port
enumeration options instead if possible.
The Service Discovery tab specifies how the scanner looks for services running on the target’s
ports.
Option Description
Probe all ports When enabled, the scanner attempts to map each open port with the
to find service that is running on that port, as defined by the Port scan range
services option.
Caution: In some rare cases, probing might disrupt some services and cause
unforeseen side effects.
- 489 -
Option Description
services Caution: Testing for SSL capability on all ports may be disruptive for the tested
host.
Search for Specifies which ports on target hosts the scanner searches for SSL/TLS
SSL/TLS on services.
l All ports
Search for Specifies which ports on target hosts the scanner searches for DTLS
DTLS on services.
l None
Identify Identifies SSL certificates that age out within the specified timeframe. Type
certificates a value to set a timeframe (in days).
expiring within
x days
Enumerate all When Tenable Security Center performs an SSL scan, it tries to determine
SSL/TLS the SSL ciphers used by the remote server by attempting to establish a
ciphers connection with each different documented SSL cipher, regardless of what
the server says is available.
Enable CRL Direct Tenable Nessus to check SSL certificates against known Certificate
checking Revocation Lists (CRL). Enabling this option makes a connection and query
(connects to one or more servers on the internet.
the Internet)
Assessment Options
- 490 -
The Assessment tab specifies how the scanner tests for information during the scan.
Value Description
Accuracy
Override In some cases, Tenable Nessus cannot remotely determine whether a flaw is
normal present or not. If report paranoia is set to Paranoid then a flaw is reported
accuracy every time, even when there is a doubt about the remote host being affected.
Conversely, a paranoia setting of Avoid false alarms will cause Tenable
Nessus to not report any flaw whenever there is a hint of uncertainty about
the remote host. Normal is a middle ground between these two settings.
Perform Causes various plugins to use more aggressive settings. For example, when
thorough looking through SMB file shares, a plugin can analyze 3 directory levels deep
tests (may instead of its default of 1. This could cause much more network traffic and
disrupt your analysis in some cases. Note that by being more thorough, the scan will be
network or more intrusive and is more likely to disrupt the network, while potentially
impact scan providing better audit results.
speed)
Antivirus
Antivirus This option determines the delay in the number of days of reporting the
definition software as being outdated. The valid values are between 0 (no delay, default)
grace period and 7.
(in days)
SMTP
Third party Tenable Nessus attempts to send spam through each SMTP device to the
domain address listed in this option. This third party domain address must be outside
the range of the site being scanned or the site performing the scan.
Otherwise, the test may be aborted by the SMTP server.
From The test messages sent to the SMTP server(s) will appear as if they originated
address from the address specified in this option.
To Address Tenable Nessus attempts to send messages addressed to the mail recipient
- 491 -
Value Description
listed in this option. The postmaster address is the default value since it is a
valid address on most mail servers.
The Brute Force tab specifies how the scanner tests for information against SCADA systems.
Additionally, if Hydra is installed on the same host as a Tenable Nessus server linked to Tenable
Security Center, the Hydra section is enabled. Hydra extends brute force login testing for the
following services: Asterisk, AFP, Cisco AAA, Cisco auth, Cisco enable, CVS, Firebird, FTP, HTTP-
FORM-GET, HTTP-FORM-POST, HTTP-GET, HTTP-HEAD, HTTP-PROXY, HTTPS-FORM-GET, HTTPS-
FORM-POST, HTTPS-GET, HTTPS-HEAD, HTTP-Proxy, ICQ, IMAP, IRC, LDAP, MS-SQL, MYSQL, NCP,
NNTP, Oracle Listener, Oracle SID, Oracle, PC-Anywhere, PCNFS, POP3, POSTGRES, RDP, Rexec,
Rlogin, Rsh, S7-300, SAP/R3, SIP, SMB, SMTP, SMTP Enum, SNMP, SOCKS5, SSH (v1 and v2),
Subversion, Teamspeak (TS2), Telnet, VMware-Auth, VNC and XMPP.
Option Description
General Settings
Only use In some cases, Tenable Nessus can test default accounts and known default
credentials passwords. This can cause the account to be locked out if too many
provided by consecutive invalid attempts trigger security protocols on the operating
the user system or application. By default, this setting is enabled to prevent Tenable
Nessus from performing these tests.
Oracle Database
Hydra
- 492 -
Option Description
Logins file A file that contains user names that Hydra will use during the scan.
Passwords file A file that contains passwords for user accounts that Hydra will use during
the scan.
Number of The number of simultaneous Hydra tests that you want to execute. By
parallel tasks default, this value is 16.
Try empty If enabled, Hydra will additionally try user names without using a password.
passwords
Try login as If enabled, Hydra will additionally try a user name as the corresponding
password password.
Stop brute If enabled, Hydra will stop brute forcing user accounts after the first time an
forcing after account is successfully accessed.
the first
success
Add accounts If disabled, only the user names specified in the logins file will be used for
found by other the scan. Otherwise, additional user names discovered by other plugins will
plugins to the be added to the logins file and used for the scan.
login file
SAP R3 Client The ID of the SAP R3 client that you want Hydra to test.
ID (0 - 99)
- 493 -
Option Description
passwords as
NTLM hashes
Cisco login This password is used to login to a Cisco system before brute forcing enable
password passwords. If no password is provided here, Hydra will attempt to login
using credentials that were successfully brute forced earlier in the scan.
Web page to Type a web page that is protected by HTTP basic or digest authentication. If
brute force a web page is not provided here, Hydra will attempt to brute force a page
discovered by the Tenable Nessus web crawler that requires HTTP
authentication.
HTTP proxy If Hydra successfully brute forces an HTTP proxy, it will attempt to access
test website the website provided here via the brute forced proxy.
LDAP DN The LDAP Distinguish Name scope that Hydra will authenticate against.
Malware Options
The Malware tab specifies options for DNS Resolution, hash, and allowlist files and file system
scanning.
Option Description
Malware scan When enabled, displays the General Settings, Hash and Allowlist
Files, and File System Scanning sections.
Provide your own list Additional known bad MD5 hashes can be uploaded via a text file
of known bad that contains one MD5 hash per line.
MD5/SHA1/SHA256
If you want to add a description for each hash, type a comma after
hashes
the hash, followed by the description. If any matches are found when
scanning a target and a description was provided for the hash, the
description will show up in the scan results.
- 494 -
Provide your own list Additional known good MD5 hashes can be uploaded via a text file
of known good that contains one MD5 hash per line.
MD5/SHA1/SHA256
If you want to add a description for each hash, type a comma after
hashes
the hash, followed by the description. If any matches are found when
scanning a target and a description was provided for the hash, the
description will show up in the scan results.
Hosts file allowlist Tenable Nessus checks system hosts files for signs of a compromise
(e.g., Plugin ID 23910). This option allows you to upload a file
containing a list of IPs and hostnames that will be ignored by
Tenable Nessus during a scan. Include one IP address and hostname
(formatted identically to your hosts file on the target) per line in a
regular text file.
Scan file system Turning on this option allows you to scan system directories and
files on host computers.
Scan User Profiles Enable file system scanning to scan user profiles.
Custom Filescan A custom file that lists directories for malware file scanning. List
Directories each directory on one line.
- 495 -
Yara Rules Files A .yar file containing the YARA rules to be applied in the scan. You
can only upload one file per scan, so include all rules in a single file.
For more information, see yara.readthedocs.io.
SCADA Options
The SCADA tab specifies how the scanner tests for information against SCADA systems.
Option Description
Start at These options are available for commercial users. This drop-down box item is
register dynamically generated by the SCADA plugins available with the commercial
version of Tenable Nessus. Modbus uses a function code of 1 to read coils in a
End at
Modbus slave. Coils represent binary output settings and are typically mapped
register
to actuators. The ability to read coils may help an attacker profile a system and
identify ranges of registers to alter via a write coil message. The defaults for
this are 0 for the Start at register value and 16 for the End at register value.
Start COTP The ICCP/COTP TSAP Addressing menu determines a Connection Oriented
TSAP Transport Protocol (COTP) Transport Service Access Points (TSAP) value on an
ICCP server by trying possible values. The start and stop values are set to 8 by
Stop COTP
default.
TSAP
The Web Applications tab specifies how the scanner tests for information against web server
applications.
Value Description
Scan web When enabled, displays the General Settings, Web Crawler, and
applications Application Test Settings sections.
- 496 -
Value Description
Use a custom Specifies which type of web browser Tenable Nessus will impersonate while
User-Agent scanning.
Start crawling The URL of the first page that will be tested. If multiple pages are required,
from use a colon delimiter to separate them (e.g., /:/php4:/base).
Excluded pages Enable exclusion of portions of the web site from being crawled. For
(regex) example, to exclude the /manual directory and all Perl CGI, set this option
to: (^/manual)|(\.pl(\?.*)?$). Tenable Nessus supports POSIX regular
expressions for string matching and handling, as well as Perl-compatible
regular expressions (PCRE).
Maximum depth Limit the number of links Tenable Nessus will follow for each start page.
to crawl
Follow When enabled, Tenable Nessus will follow dynamic links and may exceed
dynamically the parameters set above.
generated
pages
Abort web If Tenable Nessus cannot login to the target via HTTP, then do not run any
application web application tests.
tests if HTTP
login fails
Try all HTTP This option will instruct Tenable Nessus to also use POST requests for
- 497 -
Value Description
Methods enhanced web form testing. By default, the web application tests will only
use GET requests, unless this option is enabled. Generally, more complex
applications use the POST method when a user submits data to the
application. This setting provides more thorough testing, but may
considerably increase the time required. When selected, Tenable Nessus
will test each script/variable with both GET and POST requests. This setting
provides more thorough testing, but may considerably increase the time
required.
Attempt HTTP When performing web application tests, attempt to bypass filtering
Parameter mechanisms by injecting content into a variable while supplying the same
Pollution variable with valid content as well. For example, a normal SQL injection test
may look like /target.cgi?a='&b=2. With HTTP Parameter Pollution (HPP)
enabled, the request may look like /target.cgi?a='&a=1&b=2.
Test embedded Embedded web servers are often static and contain no customizable CGI
web servers scripts. In addition, embedded web servers may be prone to crash or
become non-responsive when scanned. Tenable recommends scanning
embedded web servers separately from other web servers using this
option.
Test more than This option manages the combination of argument values used in the HTTP
one parameter requests. The default, without checking this option, is testing one
at a time per parameter at a time with an attack string, without trying non-attack
form variations for additional parameters. For example, Tenable Nessus
attempts /test.php?arg1=XSS&b=1&c=1 where b and c allows other
values, without testing each combination. This is the quickest method of
testing with the smallest result set generated.
l One value — This tests one parameter at a time with an attack string,
without trying non-attack variations for additional parameters. For
example, Tenable Nessus attempts /test.php?arg1=XSS&b=1&c=1
where b and c allows other values, without testing each combination.
- 498 -
Value Description
This is the quickest method of testing with the smallest result set
generated.
l All pairs (slower but efficient) — This form of testing is slightly slower
but more efficient than the one value test. While testing multiple
parameters, it will test an attack string, variations for a single variable
and then use the first value for all other variables. For example,
Tenable Nessus attempts /test.php?arg1=XSS&b=1&c=1 and then
cycles through the variables so that one is given the attack string, one
is cycled through all possible values (as discovered during the mirror
process) and any other variables are given the first value. In this case,
Tenable Nessus will never test for /test.php?a=XSS&b=3&c=3&d=3
when the first value of each variable is 1.
Do not stop This option determines when a new flaw is targeted. This applies at the
after the first script level; finding an XSS flaw will not disable searching for SQL injection
flaw is found or header injection, but you will have at most one report for each type on a
per web page given port, unless thorough tests is set. Note that several flaws of the same
- 499 -
Value Description
type (e.g., XSS, SQLi, etc.) may be reported sometimes, if they were caught
by the same attack. The drop-down has four options:
URL for During Remote File Inclusion (RFI) testing, this option specifies a file on a
Remote File remote host to use for tests. By default, Tenable Nessus will use a safe file
Inclusion hosted by Tenable for RFI testing. If the scanner cannot reach the Internet,
using an internally hosted file is recommended for more accurate RFI
testing.
Maximum run This option manages the amount of time in minutes spent performing web
time (minutes) application tests. This option defaults to 60 minutes and applies to all ports
and CGIs for a given web site. Scanning the local network for web sites with
small applications will typically complete in under an hour, however web
sites with large applications may require a higher value.
Windows Options
- 500 -
Option Description
General Settings
Request When enabled, Tenable Nessus queries domain users instead of local
information users.
about the SMB
Domain
SAM Registry When enabled, Tenable Nessus enumerates users via the Security Account
Manager (SAM) registry.
ADSI Query When enabled, Tenable Nessus enumerates users via Active Directory
Service Interfaces (ADSI). To use ADSI, you must also configure
ADSI authentication options.
WMI Query When enabled, Tenable Nessus enumerates users via Windows
Management Interface (WMI).
RID Brute When enabled, Tenable Nessus enumerates users via relative identifier
Forcing (RID) brute forcing. Enabling this setting enables the Enumerate Domain
User and Enumerate Local User options.
Report Options
- 501 -
Option Description
Processing
Override normal Determines the verbosity of the detail in the output of the scan results:
verbosity
l Normal — Provides the standard level of plugin activity in the report.
Show missing Show patches in the report that have not been applied but have been
patches that superseded by a newer patch if enabled.
have been
superseded
Hide results from If a plugin is only run due to it being a dependency of a selected plugin,
plugins initiated hide the results if enabled.
as a dependency
Output
Designate hosts When possible, designate hosts by their DNS name rather than IP address
by their DNS in the reports.
name
Display hosts When enabled, show a list of hosts that respond to pings sent as part of
that respond to the scan.
ping
Display Display a list of hosts within the scan range that were not able to be
unreachable reached during the scan, if enabled.
hosts
Display Unicode When enabled, Unicode characters appear in plugin output such as
characters usernames, installed application names, and SSL certificate information.
- 502 -
Option Description
Note: Plugin output may sometimes incorrectly parse or truncate strings with
Unicode characters. If this issue causes problems with regular expressions in
plugins or custom audits, disable this setting and scan again.
Generate SCAP Generate a SCAP XML results file as a part of the report output for the
XML Results scan.
Authentication Options
Option Description
Authentication
Type Specifies the type of authentication you want scanners to use for
credentialed access to scan targets. Credentialed access gathers more
complete data about a target.
l Host
l Database Credentials
l Miscellaneous
l Plaintext Authentication
l Patch Management
SNMP
UDP Port This is the UDP port that will be used when performing certain SNMP
scans. Up to four different ports may be configured, with the default port
Additional UDP
being 161.
port #1
Additional UDP
port #2
Additional UDP
- 503 -
Option Description
port #3
SSH
known_hosts file If an SSH known_hosts file is provided for the scan policy, Tenable
Nessus will only attempt to log in to hosts defined in this file. This helps
to ensure that the same username and password you are using to audit
your known SSH servers is not used to attempt a login to a system that
may not be under your control.
Preferred port This option is set to direct the scan to connect to a specific port if SSH
is known to be listening on a port other than the default of 22.
Client version Specifies which type of SSH client to impersonate while performing
scans.
Attempt least Enables or disables dynamic privilege escalation. When enabled, if the
privilege scan target credentials include privilege escalation, Tenable Nessus first
(experimental) attempts to run commands without privilege escalation. If running
commands without privilege escalation fails, Tenable Nessus retries the
commands with privilege escalation.
Plugins 102095 and 102094 report whether plugins ran with or without
privilege escalation.
Note: Enabling this option may increase the time required to perform scans
by up to 30%.
Windows
Never send By default, Windows credentials are not sent to the target host in the
credentials in the clear.
clear
Do not use When disabled, it is theoretically possible to trick Tenable Nessus into
NTLMv1 attempting to log in to a Windows server with domain credentials via the
authentication NTLM version 1 protocol. This provides the remote attacker with the
- 504 -
Option Description
ability to use a hash obtained from Tenable Nessus. This hash can be
potentially cracked to reveal a username or password. It may also be
used to directly log in to other servers.
Start the Remote This option tells Tenable Nessus to start the Remote Registry service on
Registry service computers being scanned if it is not running. This service must be
during the scan running in order for Tenable Nessus to execute some Windows local
check plugins.
Enable This option will allow Tenable Nessus to access certain registry entries
administrative that can be read with administrator privileges.
shares during the
scan
Start the Server When enabled, the scanner temporarily enables the Windows Server
service during the service, which allows the computer to share files and other devices on a
scan network. The service is disabled after the scan completes.
Plaintext Authentication
Perform patch When enabled, Tenable Security Center uses telnet to connect to the
audits over telnet host device for patch audits.
Perform patch When enabled, Tenable Security Center permits patch audits over a rsh
audits over rsh connection.
- 505 -
Option Description
Perform patch When enabled, Tenable Security Center permits patch audits over a
audits over rexec rexec connection.
HTTP
Login method Specify whether the login action is performed via a GET or POST request.
Follow 30x If a 30x redirect code is received from a web server, this directs Tenable
redirections (# of Nessus to follow the link provided or not.
levels)
Invert The regex pattern you want Tenable Security Center to look for on the
authenticated login page that, if found, denies authentication.
regex
Tip: Tenable Security Center can attempt to match a given string, such as
Authentication failed.
Use authenticated When enabled, Tenable Security Center searches the HTTP response
regex on HTTP headers for a given regex pattern instead of searching the body of a
headers response to better determine authentication state.
Case insensitive When enabled, Tenable Security Center ignores case in regex.
authenticated
regex
Compliance Options
- 506 -
The Compliance tab specifies compliance the audit files to reference in a scan policy. The options
available depend on the type of audit file selected.
For more information, see Audit Files and Configure Compliance Options.
Option Description
Generic (Generic SSH audits only) The command to use for accomplishing the
SSH Escalation privilege escalation. This is similar to the enable command for Cisco
command devices.
Generic (Generic SSH audits only) A regular expression that must match after the
SSH Escalation escalation has succeeded. This can be the prompt or any other message
success check notifying the success of privilege escalation.
Plugins Options
The Plugins tab specifies which plugins are used during the policy’s Tenable Nessus scan. You can
enable or disable plugins in the plugin family view or in the plugin view for more granular control.
Caution: The Denial of Service plugin family contains plugins that could cause outages on network hosts if
the Safe Checks option is not enabled, but it also contains useful checks that do not cause any harm. The
Denial of Service plugin family can be used in conjunction with Safe Checks to ensure that any potentially
dangerous plugins are not run. However, Tenable does not recommend enabling the Denial of Service
plugin family in production environments.
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
You can configure compliance options within a scan policy to reference one or more audit files in a
template-based Policy Compliance Auditing scan policy or a custom scan policy.
For more information, see Audit Files, Scan Policies, and Scan Policy Options.
Note: The maximum number of audit files you can include in a single Policy Compliance Auditing scan is
limited by the total runtime and memory that the audit files require. Exceeding this limit may lead to
- 507 -
incomplete or failed scan results. To limit the possible impact, Tenable recommends that audit selection in
your scan policies be targeted and specific for the scan's scope and compliance requirements.
4. In the Select a Type drop-down box, select the type of audit file you want to reference in the
scan policy.
5. In the Select an Audit File drop-down box, select the name of the audit file you want to
reference in the scan policy.
Tenable Security Center applies the audit file to the scan policy.
7. If required, configure additional options for the audit file you applied to the scan policy. For
more information, see The Compliance tab specifies compliance the audit files to reference in
a scan policy. The options available depend on the type of audit file selected..
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
You can configure plugin options within a scan policy to enable or disable plugins at the plugin
family level or individual plugin level.
Note: When Tenable adds new plugins to Tenable Security Center, Tenable Security Center automatically
enables the new plugins if the entire plugin family they belong to is enabled in your scan policy template.
- 508 -
1. Begin configuring a scan, policy as described in Add a Scan Policy.
The Plugins page appears with the plugin family view displayed.
3. In the Status column, view the plugin family status and the number of enabled plugins within
the plugin family:
l Enabled — All plugins in the family are enabled. The scan targets the parameters in the
plugins.
l Disabled — All plugins in the family are disabled. The scan does not target the
parameters in the plugins.
Note: Disabling a plugin family reduces the time and resources required to run the scan.
l Mixed — The plugin family contains a combination of Enabled and Disabled plugins.
Mixed plugin families have a padlock icon that is locked or unlocked:
l Locked - New plugins added to the plugin family via plugin feed updates will be
disabled automatically in the policy.
l Unlocked - New plugins added to the plugin family via plugin feed updates will be
enabled automatically in the policy.
5. To enable or disable all plugins in the family, select the Enabled or Disabled slider in the
Status column.
6. To filter the plugin families listed on the page, use the Select a Filter drop-down box to build
and apply a filter.
The Total column becomes the Matched column and indicates the number of plugins in the
family that match the current filter.
7. To view only enabled or disabled plugin families, click the Enabled or Disabled tab above the
table.
- 509 -
8. To sort the plugin families listed on the page, click the Status, Plugin Family, or Total column
title.
9. To lock or unlock all mixed plugin families displayed on the page, click Lock All Mixed or
Unlock All Mixed.
10. To enable or disable all of the plugin families displayed on the page, click Enable Shown or
Disable Shown.
Tenable Security Center enables or disables all plugins within the plugin families shown on the
page, not just the number of plugins in the Total or Matched column. For more granular
control, set plugin statuses in the plugin view.
11. To enable or disable individual plugins within a family, click the plugin family name to access
the plugin view.
l Enabled — The plugin is enabled. The scan targets the parameters in the plugins.
l Disabled — The plugin is disabled. The scan does not target the parameters in the
plugins.
Disabling a plugin family reduces the time and resources required to run the scan.
5. In the Plugin ID column, click the information icon to display the plugin details.
- 510 -
7. To filter the plugins listed on the page, use the Select a Filter drop-down box to build and
apply a filter.
8. To view only enabled or disabled plugins, click the Enabled or Disabled tab above the table.
9. To sort the plugins listed on the page, click the Status, Plugin Name, or Plugin ID column title.
10. To enable or disable all of the plugins displayed on the page, click Enable Shown or Disable
Shown.
Tenable Security Center enables or disables all plugins shown on the page.
11. To return to the plugin family view, click the Back option.
12. To view the plugins in a different family, click the drop-down box and select a different plugin
family.
Host
Tenable Security Center can use SNMPv3 credentials to scan remote systems that use an encrypted
network management protocol (including network devices). Tenable Security Center uses these
credentials to scan for patch auditing or compliance checks.
You can configure SNMPv3 options in scan policies, as described in The Authentication tab
specifies authentication options during a scan. and Add a Scan Policy.
SNMPv3 Options
Option Description Default
Port (Required) The TCP port that SNMPv3 listens on for 161
communications from Tenable Security Center.
- 511 -
Option Description Default
Privacy algorithm The encryption algorithm to use for SNMP traffic: AES-192
AES-192, AES-256, or DES.
Miscellaneous
l ADSI
l F5
l IBM iSeries
l Netapp API
l X.509
You can configure these authentication methods in scan policies, as described in The
Authentication tab specifies authentication options during a scan. and Add a Scan Policy.
ADSI
- 512 -
ADSI allows Tenable Security Center to query an ActiveSync server to determine if any Android or
iOS-based devices are connected. Using the credentials and server information, Tenable Security
Center authenticates to the domain controller (not the Exchange server) to directly query it for
device information. These settings are required for mobile device scanning and Active Directory
Starter Scans.
Tenable Security Center supports obtaining the mobile information from Exchange Server 2010 and
2013 only.
F5
Option Description Default
Verify SSL When enabled, Tenable verifies that the SSL certificate on the enabled
- 513 -
Certificate server is signed by a trusted CA.
IBM iSeries
Option Description Default
Username (Required) The username for the IBM iSeries account that -
Tenable Security Center uses to perform checks on the target
system.
Port (Required) The TCP port that the RHEV server listens on for 443
communications from Tenable Security Center.
Verify SSL When enabled, Tenable verifies that the SSL certificate on the enabled
Certificate server is signed by a trusted CA.
Netapp API
Option Description Default
Username (Required) The username for the Netapp API account with -
HTTPS access that Tenable Security Center uses to perform
checks on the target system.
- 514 -
Password (Required) The password for the Netapp API user. -
To limit the audit to a single vFiler, type the name of the vFiler.
Port (Required) The TCP port that Netapp API listens on for 443
communications from Tenable Security Center.
Port (Required) The TCP port that PAN-OS listens on for 443
communications from Tenable Security Center.
Verify SSL When enabled, Tenable verifies that the SSL certificate on the enabled
Certificate server is signed by a trusted CA.
Tenable can access VMware servers through the native VMware SOAP API.
Username (Required) The username for the ESXi server account that -
Tenable uses to perform checks on the target system.
- 515 -
Option Description Default
Do not verify Do not validate the SSL certificate for the ESXi server. disabled
SSL
Certificate
Tenable can access vCenter through the native VMware vCenter SOAP API. If available, Tenable uses
the vCenter REST API to collect data in addition to the SOAP API.
Note: Tenable supports VMware vCenter/ESXi versions 7.0.3 and later for authenticated scans. This does
not impact vulnerability checks for VMware vCenter/ESXi, which do not require authentication.
Note: The SOAP API requires a vCenter account with read permissions and settings privileges. The REST
API requires a vCenter admin account with general read permissions and required Lifecycle Manager
privileges to enumerate VIBs.
vCenter Port (Required) The TCP port that vCenter listens on for 443
communications from Tenable.
Username (Required) The username for the vCenter server account with -
admin read/write access that Tenable uses to perform checks
on the target system.
- 516 -
Option Description Default
Verify SSL When enabled, Tenable verifies that the SSL certificate on the enabled
Certificate server is signed by a trusted CA.
X.509
Option Description Default
Plaintext Authentication
Caution: Tenable does not recommend plaintext credentials. Instead, use encrypted authentication
methods when possible.
If a secure method of performing credentialed checks is not available, you can configure Tenable
Security Center to perform checks over unsecure protocols using plaintext authentication settings.
l telnet/rsh/rexec
l NNTP
l FTP
l POP2
l POP3
l IMAP
- 517 -
l IPMI
l HTTP
You can configure plaintext authentication options in scan policies, as described in The
Authentication tab specifies authentication options during a scan. and Add a Scan Policy.
telnet/rsh/rexec
Tenable Security Center performs patch auditing on non-Windows targets only.
Username (Required) The username for the telnet, rsh, or rexec account -
that Tenable Security Center uses to perform checks on the
target system.
Password (Required) The password for the telnet, rsh, or rexec user. -
(Unsafe!)
NNTP
Setting Description Default
Username (Required) The username for the NNTP account that Tenable -
Security Center uses to perform checks on the target system.
FTP
Setting Description Default
Username (Required) The username for the FTP account that Tenable -
Security Center uses to perform checks on the target system.
POP2
- 518 -
Setting Description Default
Username (Required) The username for the POP2 account that Tenable -
Security Center uses to perform checks on the target system.
POP3
Setting Description Default
Username (Required) The username for the POP3 account that Tenable -
Security Center uses to perform checks on the target system.
IMAP
Setting Description Default
Username (Required) The username for the IMAP account that Tenable -
Security Center uses to perform checks on the target system.
IPMI
Setting Description Default
Username (Required) The username for the IMPI account that Tenable -
Security Center uses to perform checks on the target system.
HTTP
- 519 -
Setting Description Default
l Basic/Digest authentication
Login submission (Required) The action parameter for the form method. –
page For example, for <form method="POST"
name="auth_form" action="/login.php">, use
/login.php.
- 520 -
Setting Description Default
authentication.
Patch Management
Tenable Security Center can leverage credentials for patch management systems to perform patch
auditing on systems for which credentials may not be available.
l HCL BigFix
l Symantec Altiris
You can configure patch management options in scan policies, as described in Authentication
Options and Add a Scan Policy.
IT administrators are expected to manage the patch monitoring software and install any agents
required by the patch management system on their systems.
- 521 -
Note: If the credential check sees a system but it is unable to authenticate against the system, it uses the
data obtained from the patch management system to perform the check. If Tenable Security Center is able
to connect to the target system, it performs checks on that system and ignores the patch management
system output.
Note: The data returned to Tenable Security Center by the patch management system is only as current as
the most recent data that the patch management system has obtained from its managed hosts.
If you provide credentials for a host and for one or more patch management systems, Tenable
Security Center compares the findings between all methods and report on conflicts or provide a
satisfied finding. Use the Patch Management Windows Auditing Conflicts plugins to highlight patch
data differences between the host and a patch management system.
Tenable Security Center supports KACE K1000 versions 6.x and earlier.
KACE K1000 scanning uses the following Tenable plugins: 76867, 76868, 76866, and 76869.
Database Port (Required) The TCP port that KACE K1000 listens on for 3306
communications from Tenable Security Center.
Organization (Required) The name of the organization component for the ORG1
Database Name KACE K1000 database (e.g., ORG1).
Database (Required) The username for the KACE K1000 account that R1
Username Tenable Security Center uses to perform checks on the
- 522 -
Option Description Default
target system.
K1000 Database (Required) The password for the KACE K1000 user. -
Password
HCL BigFix
HCL Bigfix is available to manage the distribution of updates and hotfixes for desktop
systems.Tenable Security Center can query HCL Bigfix to verify whether or not patches are installed
on systems managed by HCL Bigfix and display the patch information.
Package reporting is supported by RPM-based and Debian-based distributions that HCL Bigfix
officially supports. This includes Red Hat derivatives such as RHEL, CentOS, Scientific Linux, and
Oracle Linux, as well as Debian and Ubuntu. Other distributions may also work, but unless
HCL Bigfix officially supports them, there is no support available.
For local check plugins to trigger, only RHEL, CentOS, Scientific Linux, Oracle Linux, Debian,
Ubuntu, and Solaris are supported. Plugin 160250 must be enabled.
Tenable Security Center supports HCL Bigfix 9.5 and later and 10.x and later.
HCL Bigfix scanning uses the following Tenable plugins: 160247, 160248, 160249, 160250, and
160251.
Web Reports (Required) The name of HCL Bigfix Web Reports server. -
Server
Web Reports (Required) The TCP port that the HCL Bigfix Web Reports -
Port server listens on for communications from Tenable Security
Center.
Web Reports (Required) The username for the HCL Bigfix Web Reports -
Username administrator account that Tenable Security Center uses to
perform checks on the target system.
Web Reports (Required) The password for the HCL Bigfix Web Reports -
Password administrator user.
- 523 -
Option Description Default
Verify SSL When enabled, Tenable verifies that the SSL certificate on the Enabled
certificate server is signed by a trusted CA.
From the HCL BigFix Console application, import the following .bes files.
BES file:
- 524 -
</Analysis>
</BES>
BES file:
]]></ActionScript>
</DefaultAction>
</Task>
</BES>
- 525 -
Tenable Security Center connects to the server that is running the SCCM site (e.g., credentials must
be valid for the SCCM service, so the selected user must have privileges to query all the data in the
SCCM MMC). This server may also run the SQL database, or the database and the SCCM repository
can be on separate servers. When leveraging this audit, Tenable Security Center must connect to
the SCCM server via WMI and HTTPS.
Note: SCCM scanning with Tenable products requires one of the following roles: Read-only Analyst,
Operations Administrator, or Full Administrator. For more information, see Setting Up SCCM Scan Policies.
SCCM scanning uses the following Tenable plugins: 57029, 57030, 73636, and 58186.
Note: SCCM patch management plugins support versions from SCCM 2007 up to and including
Configuration Manager version 2309.
Username (Required) The username for the SCCM user account that -
Tenable Security Center uses to perform checks on the target
system. The user account must have privileges to query all
data in the SCCM MMC.
Password (Required) The password for the SCCM user with privileges to -
query all data in the SCCM MMC.
WSUS scanning uses the following Tenable plugins: 57031, 57032, and 58133.
- 526 -
Option Description Default
Port (Required) The TCP port that Microsoft WSUS listens on 8530
for communications from Tenable Security Center.
Verify When enabled, Tenable verifies that the SSL certificate Enabled
SSL Certificate on the server is signed by a trusted CA.
Although not supported by Tenable, the Red Hat Satellite plugin also works with Spacewalk Server,
the Open Source Upstream Version of Red Hat Satellite. Spacewalk can manage distributions based
on Red Hat (RHEL, CentOS, Fedora) and SUSE. Tenable supports the Satellite server for Red Hat
Enterprise Linux.
Satellite scanning uses the following Tenable plugins: 84236, 84235, 84234, 84237, and 84238.
- 527 -
Option Description Default
Server
Port (Required) The TCP port that Red Hat Satellite listens on for 443
communications from Tenable Security Center.
Username (Required) The username for the Red Hat Satellite account -
that Tenable Security Center uses to perform checks on the
target system.
Password (Required) The password for the Red Hat Satellite user. -
Verify SSL When enabled, Tenable verifies that the SSL certificate on Enabled
Certificate the server is signed by a trusted CA.
Although not supported by Tenable, the Red Hat Satellite 6 plugin also works with Spacewalk
Server, the Open Source Upstream Version of Red Hat Satellite. Spacewalk can manage
distributions based on Red Hat (RHEL, CentOS, Fedora) and SUSE. Tenable supports the Satellite
server for Red Hat Enterprise Linux.
Red Hat Satellite 6 scanning uses the following Tenable plugins: 84236, 84235, 84234, 84237, 84238,
84231, 84232, and 84233.
Port (Required) The TCP port that Red Hat Satellite 6 listens 443
on for communications from Tenable Security Center.
- 528 -
Option Description Default
Password (Required) The password for the Red Hat Satellite 6 user. -
Verify When enabled, Tenable verifies that the SSL certificate Enabled
SSL Certificate on the server is signed by a trusted CA.
Symantec Altiris
Altiris is available from Symantec to manage the distribution of updates and hotfixes for Linux,
Windows, and macOS systems. Tenable Security Center has the ability to use the Altiris API to verify
whether or not patches are installed on systems managed by Altiris and display the patch
information through the Tenable Security Center user interface.
Tenable Security Center connects to the Microsoft SQL server that is running on the Altiris host.
When leveraging this audit, if the MSSQL database and Altiris server are on separate hosts, Tenable
Security Center must connect to the MSSQL database, not the Altiris server.
Altiris scanning uses the following Tenable plugins: 78013, 78012, 78011, and 78014.
Database Port (Required) The TCP port that Altiris listens on for 5690
communications from Tenable Security Center.
Database Name (Required) The name of the MSSQL database that Symantec_
manages Altiris patch information. CMDB
- 529 -
Credential Description Default
Use Windows When enabled, use NTLMSSP for compatibility with Enabled
Authentication older Windows Servers.
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
2. Click Scanning > Policies (administrator users) or Scans > Policies (organizational users).
l Type — The name of the template used to add the scan policy.
- 530 -
l Owner — The username for the user associated with the scan policy.
l Last Modified — The date and time the scan policy was last modified.
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
You can view details for individual scan policies. For more information, see Scan Policies.
2. Click Scanning > Policies (administrator users) or Scans > Policies (organizational users).
3. Right-click the row for the scan policy you want to view.
-or-
Select the check box for the scan policy you want to view.
4. Click View.
Section Action
l Type — The name of the template used to add the scan policy.
- 531 -
Section Action
l Created — The date and time the scan policy was added.
l Last Modified — The date and time the scan policy was last
modified.
l Owner — The username for the user associated with the scan
policy.
Options tabs View all of the options configured for the scan policy. The tabs
displayed depend on the scan policy type. For more information, see
Scan Policy Options.
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
2. Click Scanning > Policies (administrator users) or Scans > Policies (organizational users).
3. Right-click the row for the scan policy you want to edit.
-or-
- 532 -
Select the check box for the scan policy you want to edit.
5. Modify the scan policy. For more information, see Scan Policy Options.
6. Click Submit.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can share or revoke access to a scan policy to allow or restrict access to a user group. When
you share a scan policy with a user group, users in the group with the appropriate permissions can
use the policy in an active scan, modify policy options, and more.
For more information, see Scan Policies. For more information about user groups, see Groups.
2. Click Scanning > Policies (administrator users) or Scans > Policies (organizational users).
3. Right-click the row for the scan policy for which you want to share or revoke access.
-or-
Select the check box for the scan policy for which you want to share or revoke access.
4. Click Share.
- 533 -
The Share Policy window appears.
5. In the Share Policy window, select the groups for which you want to share or revoke access to
the scan policy.
6. Click Submit.
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
Note: Exported scan policies are not backwards-compatible. If you are running Tenable Security Center
6.0.0 or later and you export a scan policy, you can only import the scan policy into another instance of
Tenable Security Center 6.0.0 or later.
You can export a scan policy as a .nessus file and import it to another Tenable Security Center to
use in an active scan configuration.
In some cases, Tenable Support may also ask you to export a scan policy for troubleshooting.
Note: Exported scan policy files do not include audit files or credentials. You can re-configure audit files
and credentials you want to use with the scan policy on the Tenable Security Center where you import the
scan policy. For more information, see Audit Files and Credentials.
l Confirm your PHP Serialization Mode setting is set to PHP Serialization ON. For more
information, see Use the Security section to define the Tenable Security Center user interface
login parameters and options for account logins. You can also configure banners, headers,
and classification headers and footers..
- 534 -
1. Log in to Tenable Security Center via the user interface.
2. Click Scanning > Policies (administrator users) or Scans > Policies (organizational users).
a. In the table, right-click the row for the scan policy you want to export.
a. In the table, select the check box for each scan policy you want to export.
4. Click Export.
What to do next:
l Do any of the following:
o Import the scan policy into another Tenable Security Center, as described in Import a
Scan Policy.
o If Tenable Support requested a scan policy file for troubleshooting, share the scan policy
file with Tenable Support.
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
You can import a .nessus scan policy file from Tenable Nessus or from another Tenable Security
Center to use in an active scan configuration. For more information, see Scan Policies.
Note: Imported scan policies do not include audit files or credentials. For more information, see Audit Files
and Credentials.
- 535 -
l Ensure your PHP Serialization Mode setting is PHP Serialization ON. For more information,
see Use the Security section to define the Tenable Security Center user interface login
parameters and options for account logins. You can also configure banners, headers, and
classification headers and footers..
2. Click Scanning > Policies (administrator users) or Scans > Policies (organizational users).
5. (Optional) In the Description box, type a description for the scan policy.
6. (Optional) In the Tag box, type or select a tag for the scan policy.
7. Click Choose File and browse to the .nessus scan policy file you want to import.
8. Click Submit.
What to do next:
l (Optional) Modify the scan policy settings, as described in Edit a Scan Policy.
l (Optional) Configure audit files and credentials you wish to reference with the scan policy, as
described in Add a Custom Audit File and Add Credentials.
l Reference the scan policy in an active scan configuration, as described in Add an Active Scan.
- 536 -
Copy a Scan Policy
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
2. Click Scanning > Policies (administrator users) or Scans > Policies (organizational users).
a. In the table, right-click the row for the scan policy you want to copy.
a. In the table, select the check box for each scan policy you want to copy.
4. Click Copy.
Tenable Security Center copies the scan policy. The copy appears, named Copy of
PolicyName.
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
Note: If you delete a scan policy referenced by an active scan, Tenable Security Center disables the scan.
For more information, see Scan Result Statuses.
- 537 -
l If any active scans reference the scan policy you intend to delete, update the active scans to
use a different scan policy, as described in Manage Active Scans.
2. Click Scanning > Policies (administrator users) or Scans > Policies (organizational users).
3. In the table, right-click the row for the scan policy you want to delete.
4. Click Delete.
5. Click Delete.
2. Click Scanning > Policies (administrator users) or Scans > Policies (organizational users).
3. In the table, select the check box for each scan policy you want to delete.
5. Click Delete.
Agent Scanning
- 538 -
To perform agent scanning, Tenable Security Center fetches agent scan results from agent-capable
Tenable Nessus Manager or Tenable Vulnerability Management instances. Using Tenable Nessus
Agents for scanning reduces network usage and allows devices to maintain their scan schedules
even when disconnected from the network. Tenable Security Center fetches these results for
review with other acquired information about the host and network.
You can configure one or both methods of fetching agent scan results in Tenable Security Center:
l Agent scans fetch results from agent scans you add and launch in Tenable Security Center.
When you add an agent scan in Tenable Security Center, Tenable Security Center creates a
corresponding agent scan in an instance of Tenable Nessus Manager or Tenable Vulnerability
Management that you linked to Tenable Security Center. When you launch an agent scan in
Tenable Security Center, Tenable Security Center launches the corresponding scan in Tenable
Nessus Manager or Tenable Vulnerability Management, then imports the results into Tenable
Security Center.
You can create agent scans in Tenable Security Center using the Advanced Agent Scan
template. For more information, see Scan Policy Templates.
l Agent synchronization jobs fetch results from agent scans you previously created and
launched in Tenable Nessus Manager or Tenable Vulnerability Management.
Agent synchronization jobs can fetch results from agent scans configured in Tenable Nessus
Manager or Tenable Vulnerability Management using any agent scan template.
1. Configure Tenable Nessus Agents in either Tenable Nessus Manager or Tenable Vulnerability
Management, as described in Deployment Workflow in the Tenable Nessus Agent Deployment
and User Guide.
- 539 -
3. Add one or more agent repositories in Tenable Security Center, as described in Add a
Repository.
l Add an agent scan using the Basic Agent Scan or Advanced Agent Scan template in
Tenable Security Center, as described in Add an Agent Scan.
What to do next:
l View scan results, as described in Scan Results.
Agent Scans
Agent scans fetch results from agent scans you add and launch in Tenable Security Center. When
you add an agent scan in Tenable Security Center, Tenable Security Center creates a corresponding
agent scan in an instance of Tenable Nessus Manager or Tenable Vulnerability Management that you
linked to Tenable Security Center. When you launch an agent scan in Tenable Security Center,
Tenable Security Center launches the corresponding scan in Tenable Nessus Manager or Tenable
Vulnerability Management, then imports the results into Tenable Security Center.
You can create agent scans in Tenable Security Center using the Advanced Agent Scan template.
For more information, see Scan Policy Templates.
For more information about agent scanning in Tenable Security Center, see Agent Scanning.
The Agent Scans page displays a list of all available agent scans. Tenable Security Center shares
newly created agent scan import schedules to everyone within the same user group when users
have the appropriate permissions.
When more than one agent scan result is ready on Tenable Vulnerability Management or Tenable
Nessus Manager, the scan results queue for import to Tenable Security Center.
- 540 -
l Add an Agent Scan
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can create agent scans in Tenable Security Center using the Advanced Agent Scan template.
For more information, see Scan Policy Templates.
For more information, see Agent Scans and Agent Scan Settings.
l (Optional) Configure an Advanced Agent Scan policy template, as described in Add a Scan
Policy.
4. Click General.
- 541 -
a. Click Custom Policy to enable the toggle.
b. In the Policy drop-down menu, select the Advanced Agent Scan policy.
l If you want to configure automatic report generation, click Add Report. For more
information, see Add a Report to a Scan.
What to do next:
l View scan results, as described in Scan Results.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
- 542 -
3. To filter the scans that appear on the page, apply a filter as described in Apply a Filter.
-or-
b. Click View.
6. To edit a scan:
a. Right-click the row for the scan.
-or-
b. Click Edit.
c. Modify the scan options. For more information, see Agent Scan Settings.
d. Click Submit.
7. To delete a scan:
- 543 -
a. Right-click the row for the scan.
-or-
b. Click Delete.
c. Click Delete.
l General Options
l Settings Options
General Options
Parameter Description Default
General
Name The scan name associated with the scan’s results. This may --
- 544 -
Parameter Description Default
Custom Policy When enabled, select an agent scan policy to apply to the Disabled
scan. For more information, see Scan Policy Templates.
Policy (If Custom Policy is enabled) The name of the agent scan --
policy.
Scan Window Specifies the amount of time Tenable Security Center waits 1 hour
before fetching the results of the agent scan: 15 minutes,
30 minutes, 1 hour, 3 hours, 6 hours, 12 hours, or 1 day.
- 545 -
Parameter Description Default
Schedule
Schedule The frequency you want Tenable Security Center to fetch On Demand
agent scan results: Now, Remediation, Once, Daily, Weekly,
Monthly, or On Demand.
Settings Options
Parameter Description Default
Import Specifies the repository where you want the agent scan --
Repository results to import. Select an agent repository to receive scan
data.
- 546 -
These options determine what actions occur immediately before and after the agent scan
completes.
Add This option provides a list of reports available to the user to run --
Report when the agent scan data import completes. For more
information, see Add a Report to a Scan.
The Agent Synchronization Jobs page displays a list of all available agent synchronization jobs.
Tenable Security Center shares newly created agent scan import schedules to everyone within the
same user group when users have the appropriate permissions.
When more than one agent scan result is ready on Tenable Nessus Manager, the scan results queue
for import to Tenable Security Center.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
For more information about agent synchronization jobs, see Agent Synchronization Jobs. For more
information about agent synchronization job options, see Agent Synchronization Job Settings.
- 547 -
l Confirm you understand the complete agent scanning configuration process, as described in
Agent Scanning.
4. Click General.
9. (Optional) If you want to limit the scan results fetched by Tenable Security Center, enable
Scan Result Threshold and select a date and time to specify the oldest scan results you want
Tenable Security Center to fetch.
l If you want to configure automatic report generation, click Add Report. For more
information, see Add a Report to a Scan.
l If you previously added an email address to your account profile and you want to
configure email notifications, enable or disable E-Mail Me on Launch or E-Mail Me on
Completion.
- 548 -
14. Click Submit.
What to do next:
l View scan results, as described in Scan Results.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
3. To filter the agent synchronization jobs that appear on the page, apply a filter as described in
Apply a Filter.
-or-
b. Click View.
- 549 -
6. To edit an agent synchronization job:
a. Right-click the row for the agent synchronization job.
-or-
b. Click Edit.
c. Modify the agent synchronization job options. For more information, see Agent
Synchronization Job Settings.
d. Click Submit.
-or-
b. Click Copy.
- 550 -
Tenable Security Center creates a copy of the agent synchronization job.
-or-
b. Click Delete.
c. Click Delete.
l General Options
l Settings Options
General Options
- 551 -
Option Description
Name The agent synchronization job name associated with the scan’s results. This
may be any name or phrase (e.g., SystemA, DMZ Scan, Daily Scan of the
Web Farm, etc.).
Agent Scanner The agent-capable scanner from which you want Tenable Security Center to
retrieve agent results.
Agent Scan A filter for agent scan results to retrieve from the Tenable Nessus Agent-
Name Filter enabled scanner. Filters can use the specific name of the result(s) to
retrieve or an asterisk (*) or question mark (?) for all or part of the scan
result name(s) to retrieve. You can find the available agent scans retrieved
from the selected scanner on the Scan page of the user logged in to the
Nessus server.
You can click the Preview Filter button to view results that match the filter.
Scan Result Specifies whether Tenable Security Center fetches all or some agent scan
Threshold results from the agent-capable scanner.
l When disabled, Tenable Security Center fetches all agent scan results.
Note: You cannot modify the Scan Result Threshold after initial creation of the
agent synchronization job.
After you create the agent synchronization job, the Edit Agent
Synchronization Job and View Agent Synchronization Job pages display
the Last Fetched date to indicate when Tenable Security Center performed
the most recent successful agent synchronization job.
Select Date When Scan Result Threshold is enabled, specifies the oldest agent scan
and Time results you want Tenable Security Center to fetch.
Schedule The frequency you want Tenable Security Center to fetch agent scan results.
- 552 -
Option Description
Note: If you schedule your scan to repeat monthly, Tenable recommends setting
a start date no later than the 28th day. If you select a start date that does not
exist in some months (e.g., the 29th), Tenable Security Center cannot run the
scan on those days.
Settings Options
Parameter Description
Import Specifies the agent repository where you want the agent scan results to
Repository import.
Option Description
Add This option provides a list of reports available to the user to run when the agent
Report scan data import completes.
- 553 -
Option Description
The initial choices are to click the group and owner of the report to present a list
of valid report options. Next, click the report from the list that can be searched
using the text search box. When hovering over a report name, you can select the
information icon to display the name and description of the report. You can base
the generated report on the current scan’s results or the results in the
Cumulative database.
Selecting the check mark causes the report to launch once the agent
synchronization job completes. Selecting the X removes the changes. Once
added, you can modify or delete the report information.
Web application scanning in Tenable Security Center allows you to scan and address web
application vulnerabilities that traditional scanners cannot scan.
You can use a Tenable Nessus scanner to perform web app scans. For more information about
Tenable Nessus scanners, see Tenable Nessus Scanners.
For more information about web app scans in Tenable Security Center, see Manage Web App Scans
and Web App Scan Settings.
For more information about your Tenable Web App Scanning for Tenable Security Center license,
see License Requirements.
Note: Tenable Security Center allows only one concurrent web app scan per configured Tenable Nessus
scanner at a time.
1. Apply the Tenable Web App Scanning for Tenable Security Center license, as described in
Update an Existing License.
- 554 -
2. Ensure the Tenable Web App Scanning plugins are updated, as described in Plugin/Feed
Settings. The plugins automatically update when the license is updated.
a. Ensure you are running Docker version 20.0.0 or later on your Tenable Nessus host.
Tenable recommends the official Docker builds and install packages.
c. Ensure your system meets the hardware requirements for Tenable Nessus with Tenable
Web App Scanning enabled.
Note: The following platforms do not support web app scanning in Tenable Nessus:
l Any host system that does not support official Docker builds.
l Any host that uses an ARM-based processor (for example, AArch64 Linux
distributions and macOS M1 and M2 systems).
l Tenable Core + Tenable Nessus, or any instance of Tenable Nessus that already runs
within a Docker image.
For more information about Docker support on virtualized hosts, see the Docker
documentation.
4. Enable the Tenable Web App Scanning Capable option for the Tenable Nessus scanner in
Tenable Security Center, as described in Tenable Nessus Scanners.
5. Add a scan zone in Tenable Security Center, as described in Add a Scan Zone.
6. Add a universal repository for the scan data in Tenable Security Center, as described in Add a
Repository.
7. Configure your Tenable Web App Scanning credentials, as described in Add Credentials.
8. Create a Web App Scanning scan policy, as described in Add a Scan Policy.
9. Add a web app scan in Tenable Security Center, as described in Add a Web App Scan.
What to do next:
l View scan results, as described in Scan Results.
l View web app scan vulnerability data, as described in Web App Scanning Analysis.
- 555 -
Add a Web App Scan
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can create web app scans in Tenable Security Center using Web Application Scanning
templates. For more information, see Scan Policy Templates.
For more information, see Web App Scans and Web App Scan Settings.
l Configure a Web App Scanning scan policy, as described in Add a Scan Policy.
4. Click General.
c. In the Policy drop-down menu, select the Web App Scanning scan policy.
5. Click Settings.
- 556 -
a. Select a Scan Zone for the scan.
6. Click Targets.
7. Click Credentials.
a. If you want to configure automatic report generation, click Add Report. For more
information, see Add a Report to a Scan.
9. Click Submit.
What to do next:
l View scan results, as described in Scan Results.
l View web app scan vulnerability data, as described in Web App Scanning Analysis.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
For more information about web app scans, see Web App Scans.
- 557 -
1. Log in to Tenable Security Center via the user interface.
3. To filter the scans that appear on the page, apply a filter as described in Apply a Filter.
-or-
b. Click View.
6. To edit a scan:
a. Right-click the row for the scan.
-or-
b. Click Edit.
c. Modify the scan options. For more information, see Web App Scan Settings.
- 558 -
d. Click Submit.
7. To delete a scan:
a. Right-click the row for the scan.
-or-
b. Click Delete.
c. Click Delete.
l Parameter
l Parameter
- 559 -
l Option
l The Credentials section allows users to select pre-configured credential sets for
authenticated scanning. For more information, see Credentials.
l These options determine what actions occur immediately before and after the web app scan
completes.
General Options
General
Name The scan name that is associated with the scan’s results. --
This can be any name or phrase (for example, SystemA, DMZ
Scan, or Daily Scan of the Web Farm).
Policy The policy on which you want to base the scan. You can --
scroll through the list, or search by entering text in the
search box at the top of the list of available policies. For
more information, see Scan Policy Templates.
Schedule
- 560 -
Parameter Description Default
Settings Options
Parameter Description
Basic
Scan Zone Note: If your organization's Distribution Method setting is Locked Zone, you
cannot modify this setting. If your organization's Distribution Method setting
is Automatic Distribution Only, Tenable Security Center automatically
chooses one or more scan zones and hides this setting.
Specifies the scan zone you want to use to run the scan. Depending on
your organization's Distribution Method setting, you can select one of
the following:
- 561 -
Parameter Description
Import Repository Specifies the repository where Tenable Security Center imports the
scan results. Select a Universal repository to receive IPv4 or IPv6 results
appropriate to the scan. For more information about repositories, see
Repositories.
Advanced
Max scan duration Specifies the maximum number of hours you want a scan to run. If a
(hours) scan reaches this threshold, the scan stops and Tenable Security Center
discards the scan results.
Inactivity timeout Specifies the maximum number of hours you want a scan to be inactive
duration (hours) before it times out.
The value for Inactivity timeout duration must be less than the value for
Max scan duration.
- 562 -
Targets Options
URLs One or more URL targets for the scan. Type multiple targets as a --
comma-separated list of URLs.
Credentials Options
The Credentials section allows users to select pre-configured credential sets for authenticated
scanning. For more information, see Credentials.
Tenable Security Center web app scans support Web Authentication Credentials.
Note: You cannot add credentials to web app scans that have multiple targets.
These options determine what actions occur immediately before and after the web app scan
completes.
Notifications
Add Report This option provides a list of reports available to the user to --
run when the web app scan data import completes. For
more information, see Add a Report to a Scan.
- 563 -
Freeze Windows
You can set a freeze window in Tenable Security Center to specify a time frame when you do not
want Tenable Security Center to scan specific targets. This prevents remediation or ad-hoc scans
from scanning assets during undesired time frames, such as during production hours. For more
information about what happens to in-progress scans at the start of a freeze window, see the
knowledge base article.
Freeze windows are organizational and affect all scans in the creating user’s organization. Only
users with the Manage Freeze Windows permission can add, edit, or delete freeze windows.
Note: If a freeze window becomes active in Tenable Security Center after an Agent scan or a
web app scan launches, the freeze window will not stop any Agent scans or web app scans that
are currently in progress. However, if you launch a web app scan while a freeze window is
already active, and the freeze window applies to any of the web app scan targets, then those
web app scan targets will not be scanned.
To stop Agent scans, configure a freeze window in each Tenable Nessus Manager.
For more information, see Add a Freeze Window, Edit a Freeze Window, and Delete a Freeze
Window.
Option Description
Enabled When enabled, Tenable Security Center does not scan any assets that
are affected by the freeze window. If a scan does not include any
assets outside of the freeze window, then the scan will abort.
Targets Specifies the targets you do not want to scan during the freeze
window.
- 564 -
Option Description
Assets If you selected Assets or Mixed as the Targets, specifies one or more
Tenable-provided or user-defined asset lists that you do not want to
scan during the freeze window.
IPs If you selected IPs or Mixed as the Targets, specifies one or more
asset IP addresses that you do not want to scan during the freeze
window.
Frequency
Repeat Every
Repeat On
- 565 -
Add a Freeze Window
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
7. In the Targets drop-down box, select a target: All Systems, Assets, IPs, or Mixed.
8. In the Assets and/or IPs boxes, select or type targets for the freeze window.
9. (Optional) If you selected Assets or Mixed as the Targets and you want to restrict the freeze
window by scan repository, in the Repository section, select a repository.
10. Modify the Starts On, Frequency, Repeat Every, and Repeat On options to set the schedule
for the freeze window.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
- 566 -
For more information, see Freeze Windows.
3. Right-click the row for the freeze window you want to edit.
-or-
Select the check box for the freeze window you want to edit.
4. Click Edit.
6. To edit the freeze window settings, modify options described in Edit a Freeze Window.
7. Click Submit.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
- 567 -
3. To delete a single freeze window:
a. In the table, right-click the row for the freeze window you want to delete.
a. In the table, select the check box for each freeze window you want to delete.
4. Click Delete.
5. Click Delete.
Tags
You can use tags in Tenable Security Center to label assets, policies, credentials, or queries with a
custom descriptor to improve filtering and object management. For example, you could add a tag
named East Coast Employees to label all of your assets in that geographic area.
After you create a tag and apply it to an object, the tag is visible to all users who can view or modify
that object. However, tags are not shared across object types.
For more information, see Add a Tag and Remove or Delete a Tag.
Add a Tag
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
To add a tag:
- 568 -
l Click Assets > Assets.
l Click Scanning > Policies (administrator users) or Scans > Policies (organizational
users).
3. Right-click the row for the asset, policy, credential, or query you want to tag.
-or-
Select the check box for the asset, policy, credential, or query you want to tag.
4. Click Edit.
6. Click Submit.
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
You can remove a tag from an asset, policy, credential, or query to stop associating that object with
the tag. To completely delete a tag from Tenable Security Center, you must remove the tag from all
assets, policies, credentials, or queries. For more information, see Tags.
- 569 -
l Click Assets > Assets.
l Click Scanning > Policies (administrator users) or Scans > Policies (organizational
users).
3. In the table, right-click the row for the asset, policy, credential, or query where you want to
remove the tag.
4. Click Edit.
5. In the Tag drop-box, remove the tag from the asset, policy, credential, or query.
6. Click Submit.
Tenable Security Center removes the tag from the asset, policy, credential, or query.
7. (Optional) If you want to delete the tag from Tenable Security Center, repeat steps 2 through 6
until you have removed all uses of the tag for the object type.
- 570 -
Analyze Data
See the following sections to analyze and respond to Tenable Security Center data.
Scan Results View a table of scan results from active and agent scans.
Dashboards View graphical summaries of scans, scan results, and system activity.
Event Analysis View a table of Tenable Log Correlation Engine security event data.
Assurance Create ARCs to develop security program objectives and assess your
Report Cards organization's security posture.
You can use Filters and Queries to manipulate the data you see in analysis tools and save views for
later access. You can perform Workflow Actions (alerting, ticketing, accepting risk, recasting risk)
from some analysis tools.
If you are licensed for Tenable Lumin, you can synchronize Tenable Security Center with Tenable
Lumin to take advantage of Cyber Exposure features, as described in Tenable Lumin
Synchronization. For more information, contact your Tenable representative.
Dashboards
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
- 571 -
Administrator users can view Tenable-provided Overview , LCE Overview, and Health Overview
dashboards. For more information, see Overview Dashboard , LCE Overview Dashboard, and Health
Overview Dashboard.
Organizational users can configure custom or template-based dashboards that contain dashboard
components, which display vulnerability, event, ticket, user, and alert data for analysis. When
viewing vulnerability or event data, you can drill into the underlying dataset for further evaluation.
Tip: Tenable provides many dashboard templates (for example, the VPR Summary dashboard).
For a complete index of Tenable-provided dashboard templates, see the Tenable Security
Center Dashboards blog.
Dashboards allow you to organize similar dashboard components to streamline your analysis.
Instead of creating a single dashboard with several dozen dashboard components, you can create
several dashboards that group similar dashboard components together. For example, you can
create two separate dashboards to view active scanning data and passive scanning data.
Note: Dashboards display vulnerability, event, and other scan data. Tenable recommends
configuring several data sources to optimize the data you see in dashboards. For more
information, see Scanning Overview.
Tip: Tenable Security Center automatically refreshes dashboard data once per day. To refresh
all dashboard components on demand as an organizational user, click Refresh All.
l View a Dashboard
l Import a Dashboard
l Manage Dashboards
Dashboard Options
- 572 -
Option Description
General
View a Dashboard
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
To view a dashboard:
a. In the upper-right corner of the page, click the Switch Dashboard drop-down box.
l Edit the dashboard settings for the dashboard in view, as described in Edit
Settings for a Dashboard.
- 573 -
l Share or revoke access to the dashboard in view, as described in Share or Revoke
Access to a Dashboard.
a. In the upper-right corner of the page, click the Options drop-down box.
Overview Dashboard
Tenable provides the Overview dashboard to administrator users by default. For more information,
see View a Dashboard.
Widget Action
Licensing Status View a graph of your total license size compared to your total
currently active IP addresses.
How close am I to hitting my
license limit?
Web App Scanning FQDNs View a graph of your total license size compared to your total
currently active FQDNs.
How close am I to hitting my
license limit? For more information about web app scans, see Web App
Scans.
- 574 -
Widget Action
System Status l View the status of the job daemon, which powers the job
queue.
Is the Tenable Security
Center job daemon running? l To change the status of the job daemon, click Start or
Stop.
Latest Plugins View information about the latest plugin changes in feed
updates.
What plugins were most
recently changed in a feed l ID — The plugin ID.
update?
l Name — The name of the plugin.
- 575 -
Health Overview Dashboard
Tenable provides the Health Overview dashboard to administrator users by default. For more
information, see View a Dashboard.
Widget Action
Application View information about the health of your application with the
Configuration Health following checks:
What is the health of l License Expiration Warning — When a Tenable Security Center
my application license expires, you may not be able to update plugins, receive
configuration? Feed updates or access the tool.
- 576 -
Widget Action
Job Queue Health View information about the health of your job queue:
Summary
l Job Delay — Jobs that have been delayed by more than an hour
What is the health of since their scheduled run time.
my job queue?
l Pending Jobs — Jobs that are scheduled to run in the future. If
too many jobs are scheduled, you may experience delays in
processing vulnerability data, generating reports, or other
processes.
Refine Scan Zone View information about the size of your scan zones.
Scope
Job Queue Delay View information about delays in the job queue.
- 577 -
Widget Action
Details
Scan Zones with View information about the size of your scan zones, and whether
Overlap they have overlapping boundaries.
Nessus Agent View a list of Nessus Agent Managers currently configured to use as
Managers as Network Network Scanners.
Scanners
Degraded Scan Zones View information about scan zones with non-working scanners.
- 578 -
Widget Action
Nessus Agent View a list of Nessus Agent Managers not configured to use
Managers Not Using API keys.
API Authentication
Large Asset Lists View lists of assets with more than 20,000 characters.
Widget Action
LCE Client Status View information about your Tenable Log Correlation
Engine clients:
What is the status of my
Tenable Log Correlation l Client IP — The IP address of the Tenable Log
- 579 -
Widget Action
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
a. In the upper-right corner of the page, click the Switch Dashboard drop-down box.
4. In the upper-right corner of the page, click the Options drop-down box.
- 580 -
Add a Template-Based Dashboard
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can add a dashboard by configuring a Tenable-provided dashboard template. To add a custom
dashboard instead, see Add a Custom Dashboard. To import a dashboard, see Import a Dashboard.
For more information, see Dashboards and Dashboard and Component Templates.
3. In the upper-right corner of the page, click the Options drop-down button.
6. Click a template.
The Add Dashboard Template page updates to reflect the template you selected.
l To edit the dashboard name, click the name box and edit the name.
l To edit the dashboard description, click the Description box and edit the description.
l To restrict the target data displayed in the dashboard, click the Targets drop-down box.
8. Click Add.
Tenable Security Center saves your configuration and the Dashboards page appears.
- 581 -
9. In the upper-right corner of the page, click the Switch Dashboard drop-down box.
What to do next:
l Add dashboard components, as described in Add a Template-Based Dashboard Component or
Add a Custom Dashboard Component.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can add a fully customized dashboard. To add a dashboard from a Tenable-provided template
instead, see Add a Template-Based Dashboard.
3. In the upper-right corner of the page, click the Options drop-down button.
8. In the Layout section, select the layout you want to use for the dashboard.
9. Click Submit.
- 582 -
Tenable Security Center saves your configuration and the Dashboards page appears.
10. In the upper-right corner of the page, click the Switch Dashboard drop-down box.
What to do next:
l Add dashboard components, as described in Add a Template-Based Dashboard Component or
Add a Custom Dashboard Component.
For a complete index of Tenable-provided report templates, see the Tenable Security Center
Dashboards blog.
Template Description
Common
Compliance & Configuration Dashboards that aid with configuration, change, and
Assessment compliance management.
Discovery & Detection Dashboards that aid in trust identification, rogue detection,
and new device discovery.
Security Industry Trends Dashboards related to trends, reports, and analysis from
industry leaders.
- 583 -
Other (Dashboards)
Import a Dashboard
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
To import a dashboard:
2. Click Dashboard.
3. In the upper-right corner of the page, click the Options drop-down button.
- 584 -
The Import Dashboard page appears.
7. Click Choose File and browse to the dashboard file you want to import.
8. Click Submit.
Manage Dashboards
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
To manage dashboards:
3. In the upper-right corner of the page, click the Options drop-down button.
5. To add a dashboard, click Add. For more information, see Add a Template-Based Dashboard
or Add a Custom Dashboard.
-or-
To manage multiple dashboards, select the check box for the dashboard.
- 585 -
l Click View to view details for the dashboard.
l Click Hide from Dashboard to hide the dashboard from the Switch Dashboard drop-
down on the Dashboards page.
l Click Show on Dashboard to show the dashboard on the Switch Dashboard drop-down
on the Dashboards page.
b. Then, identify how you want Tenable Security Center to handle object references:
o Remove All References – all object references are removed, altering the definitions of
the components. Importing users do not need to make any changes for components to
be useable.
o Keep All References – object references are kept intact. Importing users must be in the
same organization and have access to all relevant objects for the components to be
useable.
o Replace With Placeholders – object references are removed and replaced with their
respective names. Importing users see the name of the reference object, but need to
replace it with an applicable object within their organization before the component is
useable.
Note: Due to version-specific changes in dashboard XML file formats, exported dashboards are not always
compatible for import between Tenable Security Center versions.
- 586 -
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
a. In the upper-right corner of the page, click the Switch Dashboard drop-down box.
4. In the upper-right corner of the page, click the Options drop-down box.
7. Click Submit.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can share access to a dashboard to give users in a group the ability to view the dashboard. The
user's role and custom permissions determine if they can drill down into other pages with more
information. For more information, see Dashboards.
- 587 -
1. Log in to Tenable Security Center via the user interface.
a. In the upper-right corner of the page, click the Switch Dashboard drop-down box.
4. In the upper-right corner of the page, click the Options drop-down box.
5. Click Share.
6. In the box, search for and select the groups for which you want to share or revoke access.
7. Click Submit.
Delete a Dashboard
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
To delete a dashboard:
- 588 -
a. In the upper-right corner of the page, click the Switch Dashboard drop-down box.
4. In the upper-right corner of the page, click the Options drop-down box.
5. Click Delete.
6. Click Delete.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
3. Click Edit.
4. Edit the dashboard component options. For more information, see Custom Dashboard
Component Options.
- 589 -
1. Hover over the dashboard component.
Note: Only dashboard components that display vulnerability analysis or event analysis data support
viewing the data behind a dashboard component.
3. Click Copy.
4. In the Name box, edit the name for the copied dashboard component.
5. In the Dashboard drop-down box, click the name of the dashboard where you want to copy the
dashboard component.
6. Click Copy.
3. Click Refresh.
- 590 -
To delete the dashboard component:
1. Hover over the dashboard component.
3. Click Delete.
4. Click Delete.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
For more information, see Dashboards and Dashboard and Component Templates.
2. Click Dashboard.
3. In the upper-right corner of the page, click the Switch Dashboard drop-down box.
4. Click the name of the dashboard for which you want to add a component.
- 591 -
The dashboard appears.
5. In the upper-right corner of the page, click the Options drop-down box.
7. In the Common section, click the template you want to use for the dashboard component.
The Add Component Template page updates to reflect the template you selected.
l To edit the dashboard component name, click the name box and edit the name.
l To edit the dashboard component description, click the Description box and edit the
description.
l To restrict the target data displayed in the dashboard component, click the Targets
drop-down box.
l To edit the dashboard component refresh schedule, click the Schedule link.
9. Click Add.
Tenable Security Center saves your configuration and the Dashboards page appears.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can configure a custom dashboard component to add a table, bar chart, pie chart, line chart,
area chart, or matrix to a dashboard. For more information, see Dashboards and Dashboard and
Component Templates.
For an example matrix component configuration, see Configure a Simple Matrix Dashboard
Component.
- 592 -
l Add a dashboard, as described in Add a Template-Based Dashboard, Add a Custom
Dashboard, or Import a Dashboard.
2. Click Dashboard.
3. In the upper-right corner of the page, click the Switch Dashboard drop-down box.
4. Click the name of the dashboard for which you want to add a component.
5. In the upper-right corner of the page, click the Options drop-down box.
7. In the Other section, click the type of component you want to configure.
8. Configure the options for your component type, as described in Custom Dashboard
Component Options.
9. Click Submit.
Use the following options to configure custom dashboard components. For more information about
dashboard component types, see Dashboard and Component Templates.
- 593 -
l Matrix Component Options
General Options
Configure the following options for all custom dashboard component types.
Schedule (Required for all except Matrix components) Specifies how Daily
often the component polls the data source to obtain updates:
- 594 -
Option Description Default
Data
Tool The analysis tool to use for creating the chart. For more Vulnerability
information, see Vulnerability Analysis Tools and Event Summary
Analysis Tools.
Display
- 595 -
Option Description Default
Sort Column (Not available if Type is Event) The column Tenable Plugin ID
Security Center uses to sort the results.
Data
Tool The analysis tool to use for creating the chart. For more Vulnerability
information, see Vulnerability Analysis Tools and Event Summary
Analysis Tools.
- 596 -
Option Description Default
Display
Sort Column (If Type is Vulnerability or Ticket) The column Tenable Plugin ID
Security Center uses to sort the results.
Data
Tool The analysis tool to use for creating the chart. For more Vulnerability
- 597 -
Option Description Default
Display
Sort Column The column Tenable Security Center uses to sort the Plugin ID
results.
When you create a matrix component, you define rules to determine what displays in each cell in a
table of customizable columns and rows.
l Use columns to define a group of vulnerability, mobile, event, ticket, user, or alert data. For
example, you could create columns for critical, high, medium, low, and informational
vulnerabilities.
l Use rows to define the operations performed against each column element for that row. For
example, if each column determines the vulnerability type (critical, high, medium, low, and
informational), you can create a row to calculate the ratio of the particular vulnerability type
count against the total vulnerability count.
- 598 -
By default, each cell definition includes a single customizable rule that defines what appears in the
cell if no other conditions have been defined or triggered.
Tenable Security Center reviews each rule in a cell from top to bottom and triggers the display rule
on the first rule match. Once a rule triggers, Tenable Security Center stops reviewing rules for the
cell. If none of the added rules match, Tenable Security Center performs the default rule.
Option Action
Cells
Size Use the drop-down menus to select the number of columns and rows for the
matrix. Tenable Security Center supports matrices from 1x1 to 10x10.
icon Click the icon in a row or column header cell to manage the column or row.
Tip: You can choose to refresh the data more often to see the most current
view. However, frequent refreshes can cause slow system performance.
icon Click the icon inside a cell to configure rules for the cell. For more information,
see Matrix Component Query Options.
Data
Data Type The type of data: Vulnerability, Mobile, Event, User, Vulnerability
Alert, or Ticket.
- 599 -
Option Description Default
Rules
- 600 -
Option Description Default
Text Color (If Display is Text) The matrix component text color. #1a1a40
Data
Date The date range for the line or area chart. Within 24
Range Hours
If Date Type is Relative, select from the following options:
- 601 -
Option Description Default
days.
If Date Type is Absolute, select a date and time for the beginning
and end of the range.
Series Click to add a series to the line or area chart. For more --
information, see Line and Area Chart Series Options.
Data
Display
Series Data to display in the chart: Total, Info, Low, Medium, High, All
Data or Critical.
- 602 -
Configure a Simple Matrix Dashboard Component
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
1. On the Add Matrix Component page, in the Name box, type a name for the dashboard
component.
3. In the Cells section, select the number of Columns and Rows for the matrix.
- 603 -
For example, 5 columns and 3 rows.
8. Click Submit.
The matrix editor appears, with the new header label displayed.
9. Repeat the header label steps for the other header cells.
10. Hover over the body cells and click the edit icon.
- 604 -
For example, this matrix component displays Vulnerability data by a ratio from the Cumulative
database. The numerator filters are looking for vulnerabilities that have an exploit available
with a Critical severity discovered within the last 7 days. The Denominator filters are for
vulnerabilities that have a Critical severity discovered within the last 7 days. The rules are
looking for percentages of the vulnerabilities that match and designate the ratio value with
the corresponding color based on the percentages found.
12. Repeat the body cell steps for the other body cells.
In the example above, the other cells are similar with many of the same rules. The differences
are adding a Numerator filter to include the Exploit Framework we are looking for and a
Denominator filter for the Exploit Available option.
- 605 -
13. Click Submit.
Tenable Security Center sorts all pages of the table by the data in the column that you
selected.
l To view all action buttons available in a single row, right-click the row:
- 606 -
Button Action
l To change the column order, drag and drop a column header to another position in the
table.
3. Select or clear the check box for any column you want to show or hide in the table.
a. Roll over the header between two columns until the resize cursor appears.
Tenable Security Center sorts all pages of the table by the data in the column you
selected.
Scan Results
- 607 -
The Scan Results page displays scan results and statuses from active scans, agent scans, and
agent synchronization jobs .
Note: Tenable Security Center does not include all agent scans in the scan results table. If an agent scan
imports scan results identical to the previous agent scan, Tenable Security Center omits the most recent
agent scan from the scan results table.
Note: If you added the parent node of a Tenable Nessus Manager cluster as a scanner in Tenable Security
Center, Tenable Security Center displays scan results for all child nodes. For more information, see
Clustering in the Tenable Nessus User Guide.
Note: For each agent synchronization job result for a child node, Tenable Security Center
imports a metadata record containing no vulnerability data. This metadata record appears as a
second result on the Scan Results page. To prevent Tenable Security Center from importing the
metadata file, configure and launch agent scans from Tenable Security Center, as described in
Agent Scans.
For more information, see Manage Scan Results and Scan Result Statuses.
l Scan Status
l Import Status
Scan Status
The scan status specifies the status of the scan.
Status Description
Active Scans
- 608 -
Status Description
Hostnames scan.
Verifying Targets Tenable Security Center is verifying targets before running the scan.
Initializing Scanners Tenable Security Center is initializing scanners before running the
scan.
Pausing You paused the scan and Tenable Security Center is pausing the scan.
Resuming You resumed the scan and Tenable Security Center is resuming the
scan.
Agent Scans
Import Status
The scan status specifies the status of the scan result import to Tenable Security Center.
Status Description
- 609 -
Status Description
Blocked Tenable Security Center did not import the scan result for one of the following
reasons:
l The scan result import would cause you to exceed your license.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
Depending on the state of a scan result, you can perform different management actions (for
example, you cannot download results for a scan with errors).
- 610 -
l Click the filter icon.
Filters allow you to view only desired scan results. Filter parameters include:
Note: To return to the default filter for your user account, refresh your browser window. The
number in grey next to the filter displays how many filters are currently in use.
-or-
b. Select Browse.
The Vulnerability Summary analysis tool appears, populated with data from the scan.
- 611 -
a. Right-click the row for the scan.
-or-
b. Click View.
The View Scan Result page appears. For more information, see Scan Result Details.
-or-
b. Select Download.
Tip: On a standard scan, you can download a Tenable Nessus results file. If the scan contains
SCAP results, you can use an additional option to download the SCAP results.
-or-
b. Select Import.
- 612 -
Tip: This option is useful for cases where a scan may have not fully imported after
completion. For example, if Tenable Security Center blocked a scan because importing it
would have exceeded the licensed IP address count, you can increase the IP address count,
then import the scan results previously not imported.
-or-
b. Select Copy.
Selecting a Group from the drop-down box displays a list of users from that group. You
can select one or more users from the list.
-or-
b. Select Email.
To generate a report for the scan results based off a preconfigured report:
a. Right-click the row for the scan.
-or-
- 613 -
Select the check box for the scan.
-or-
b. Select Delete.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
Note: Tenable Security Center does not include all agent scans in the scan results table. If an agent scan
imports scan results identical to the previous agent scan, Tenable Security Center omits the most recent
agent scan from the scan results table.
- 614 -
Note: If you added the parent node of a Tenable Nessus Manager cluster as a scanner in Tenable Security
Center, Tenable Security Center displays scan results for all child nodes. For more information, see
Clustering in the Tenable Nessus User Guide.
Note: For each agent synchronization job result for a child node, Tenable Security Center
imports a metadata record containing no vulnerability data. This metadata record appears as a
second result on the Scan Results page. To prevent Tenable Security Center from importing the
metadata file, configure and launch agent scans from Tenable Security Center, as described in
Agent Scans.
l Name — The name for the scan associated with the result.
l Scan Policy — The name of the scan policy that generated the scan result.
l Owner — The username for the user who added the scan.
l Import Time — The date and time Tenable Security Center completed the scan result
import.
l Status — The status of the scan that generated the scan result. For more information,
see Scan Status.
4. To view additional details for a scan result, see View Scan Result Details.
- 615 -
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can view details for any scan result. For more information, see Scan Results.
-or-
4. Click View.
Section Action
- 616 -
Section Action
l Owner — The username for the user who added the scan.
- 617 -
Section Action
synchronization.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can upload active or agent scan results from scans performed by other systems. Tenable
Security Center supports either raw (.nessus) or compressed (.zip) files, with one .nessus file per
archive before uploading. This allows you to import scan results from scans run in remote locations
without network connectivity to Tenable Security Center.
Note: To upload files greater than 300 MB to Tenable Security Center, you must modify upload_max_
filesize in /opt/sc/support/etc/php.ini to accommodate the larger uploads.
- 618 -
Scan Result-Repository Incompatibility
Caution: Tenable does not recommend importing scan results to incompatible repositories since data may
be omitted.
If you upload agent scan results to a non-agent repository, Tenable Security Center omits all
vulnerabilities without IP Address data for the host. Non-agent repositories cannot uniquely
identify hosts without IP Address data for the host.
If you upload non-agent scan results to an agent repository, Tenable Security Center omits all
vulnerabilities without Agent ID data for the host. Agent repositories cannot uniquely identify hosts
without Agent ID data for the host.
6. If you selected an IPv4, IPv6, or Universal repository, enable or disable the Advanced options:
Track hosts which have been issued new IP address, Scan Virtual Hosts, and Immediately
remove vulnerabilities from scanned hosts that do not reply.
For more information about the advanced options, see Active Scan Settings.
7. Click Submit.
Solutions Analysis
Tenable provides recommended solutions for all vulnerabilities on your network. You can perform
the recommended action in a solution to lower the risk on your network.
- 619 -
For more information, see:
l View Solutions
View Solutions
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can use the Solutions page to view solutions for specific assets on your network or drill into
solution details.
2. Click Solutions.
3. To filter the solutions in the table by an asset list, in the Targeted Assets drop-down box,
click an asset list name.
The system refreshes the page and filters the table by the asset list you selected. For more
information about asset lists, see Assets.
l Risk Reduction — The percent you would reduce your risk by addressing the vulnerability
in the solution. Tenable Security Center calculates the risk reduction percentage by
dividing the score of the vulnerabilities in the solution by the score of all of the
vulnerabilities on your network.
- 620 -
Tip: A vulnerability instance is a single instance of a vulnerability appearing on an asset,
identified uniquely by plugin ID, port, and protocol.
l CVSSv3 Base Score — The highest CVSSv3 score for a vulnerability included in the
solution. If only CVSSv2 is available, the column is blank.
The Solution Details page appears. For more information, see Solution Details.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can use the Solution Details page to view details for a specific solution. To export the details
for a solution, see Export Hosts Affected by a Solution.
2. Click Solutions.
Section Action
- 621 -
Section Action
- 622 -
Section Action
What to do next:
l (Optional) Export the hosts affected by the solution to share with others in your organization,
as described in Export Hosts Affected by a Solution.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can export a list of hosts affected by a solution as a .csv file to share the data with others in
your organization. For more information, see Solutions Analysis.
2. Click Solutions.
3. Click the row for the solution for which you want to export a list of affected hosts.
Note: If the number of affected hosts is greater than 1,000, Tenable Security Center prompts you to
type a name for the CSV report result you want to generate. After generation, you can download the
report result, as described in Download a Report Result.
5. Select or clear the check boxes to indicate which columns you want to appear in the exported
file.
- 623 -
Column Name Description
Tenable UUID The Tenable UUID, if applicable. A Tenable UUID uniquely identifies:
CVE Instances The total number of CVE instances associated with vulnerabilities
on the affected host that are addressed by the solution.
Repository The name of the repository that stores the device's scan data.
- 624 -
Tip: A vulnerability instance is a single instance of a vulnerability
appearing on an asset, identified uniquely by plugin ID, port, and
protocol.
Score The sum of the weighted CVSS score across vulnerability instances
on the affected host addressed by the solution.
Risk Reduction The percent you would reduce your risk across all solutions and
affected hosts by addressing the vulnerabilities on this affected
host associated with the solution. Tenable Security Center
calculates the risk reduction percentage by dividing the total CVSS
score of the vulnerabilities on the affected host addressed by the
solution by the total CVSS score of all of the vulnerabilities on your
network.
- 625 -
on the affected host that are addressed by the solution.
VPR The highest VPR of all vulnerabilities on the affected host that are
addressed by the solution. If no VPR is available, the column is
blank.
CVSS v3 The highest CVSSv3 score of all vulnerabilities on the affected host
that are addressed by the solution. If only a CVSSv2 score is
available, the column is blank.
6. Click Download.
Tenable Security Center exports the list of hosts affected by the solution.
Vulnerability Analysis
The Vulnerabilities page displays vulnerabilities from either the cumulative or mitigated
vulnerability database. For more information, see Cumulative vs. Mitigated Vulnerabilities.
Note: If multiple vulnerabilities share the same IP Address or Agent ID data, Tenable Security Center
assumes they are from the same host.
To perform a common type of vulnerability analysis, see View Vulnerabilities by Plugin or View
Vulnerabilities by Host.
Cumulative Vulnerabilities
- 626 -
The cumulative database contains currently vulnerable vulnerabilities, including recast, accepted, or
previously mitigated vulnerabilities.
Mitigated Vulnerabilities
The mitigated database contains vulnerabilities that Tenable Security Center determines are not
vulnerable, based on the scan definition, the results of the scan, the current state of the cumulative
view, and authentication information.
l The IP address of the vulnerability was in the target list of the scan.
l The vulnerability with that IP address/port/plugin ID combination was not in the scan result.
To start, the vulnerability must appear in the cumulative view to be considered for mitigation. The
import process then looks at each vulnerability in the import repository. The import process also
verifies that authentication was successful before mitigating any local check vulnerabilities that
meet the above criteria.
Note: Mitigation logic works with scans using policies defined by templates, advanced policies, and
remediation scans. These policies are set up to take advantage of this new mitigation logic.
For more information about mitigation, see the knowledge base article.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
For general information about cumulative vulnerabilities and mitigated vulnerabilities, see
Cumulative vs. Mitigated Vulnerabilities.
- 627 -
1. Log in to Tenable Security Center via the user interface.
The page updates to display data from the mitigated or cumulative vulnerability database.
Note: When you view these metrics on an analysis page organized by plugin (for example, the
Vulnerabilities page), the metrics represent the highest value assigned or calculated for a
vulnerability associated with the plugin.
CVSS
Tenable uses and displays third-party Common Vulnerability Scoring System (CVSS) values retrieved
from the National Vulnerability Database (NVD) to describe risk associated with vulnerabilities.
Tenable assigns all vulnerabilities a severity (Info, Low, Medium, High, or Critical) based on the
vulnerability's static CVSS score (the CVSS version depends on your configuration). For more
information, see Organizations.
Tenable Security Center analysis pages provide summary information about vulnerabilities using the
following CVSS categories.
- 628 -
Low The plugin's highest vulnerability The plugin's highest vulnerability
CVSSv2 score is between 0.1 and 3.9. CVSSv3 score is between 0.1 and 3.9.
- or - - or -
The plugin does not search for The plugin does not search for
vulnerabilities. vulnerabilities.
Note: Vulnerabilities without CVEs in the National Vulnerability Database (NVD) (for example, many
vulnerabilities with the Info severity) do not receive a VPR. Tenable recommends remediating these
vulnerabilities according to their CVSS-based severity.
Tenable Security Center provides new and updated VPR values through the Tenable Security Center
feed. For more information, see Edit Plugin and Feed Schedules.
Tenable recommends resolving vulnerabilities with the highest VPRs first. You can view VPR scores
and summary data in:
- 629 -
l The Tenable-provided Vulnerability Priority Rating (VPR) Summary dashboard, described in
Dashboards.
l The Vulnerability Summary, Vulnerability List, and Vulnerability Detail List tools, described in
View Vulnerabilities by Plugin.
You can view the following key drivers to explain a vulnerability's VPR.
Note:Tenable does not customize these values for your organization; VPR key drivers reflect a
vulnerability's global threat landscape.
Vulnerability The number of days since the National Vulnerability Database (NVD)
Age published the vulnerability.
CVSSv3 Impact The NVD-provided CVSSv3 impact score for the vulnerability. If the NVD did
Score not provide a score, Tenable Security Center displays a Tenable-predicted
score.
Exploit Code The relative maturity of a possible exploit for the vulnerability based on the
Maturity existence, sophistication, and prevalence of exploit intelligence from
internal and external sources (e.g., Reversinglabs, Exploit-db, Metasploit,
etc.). The possible values (High, Functional, PoC, or Unproven) parallel the
CVSS Exploit Code Maturity categories.
Product The relative number of unique products affected by the vulnerability: Low,
Coverage Medium, High, or Very High.
Threat Sources A list of all sources (e.g., social media channels, the dark web, etc.) where
threat events related to this vulnerability occurred. If the system did not
observe a related threat event in the past 28 days, the system displays No
recorded events.
Threat Intensity The relative intensity based on the number and frequency of recently
observed threat events related to this vulnerability: Very Low, Low,
Medium, High, or Very High.
- 630 -
Threat Recency The number of days (0-180) since a threat event occurred for the
vulnerability.
To perform a common type of vulnerability analysis, see View Vulnerabilities by Plugin or View
Vulnerabilities by Host.
Asset Summary This tool summarizes the scores and counts of vulnerabilities for all
dynamic or static asset lists.
You can click a count to view the IP Summary tool, filtered by the asset
list you selected.
CCE Summary This displays a summary of hosts which have Common Configuration
Enumeration (CCE) vulnerabilities.
- 631 -
Analysis Tool Description
You can click a count to view the Vulnerability Summary tool, filtered by
the CCE vulnerability you selected.
Class B Summary The vulnerability score for an address is computed by adding up the
number of vulnerabilities at each severity level and multiplying it with the
Class C Summary
organization’s severity score.
Starting out with a Class A or Class B summary can identify more active
network ranges for networks with a large number of active IP addresses.
You can click a Class A or Class B row to view the Class B or Class C tool,
filtered by the asset list you selected. You can click a Class C row to view
the IP Summary tool, filtered by the asset list you selected.
CVE Summary This view groups vulnerabilities based on their CVE ID, severity, and
vulnerability count.
DNS Name Tenable Security Center includes the ability to summarize information by
Summary vulnerable DNS name. The DNS Name Summary lists the matching
hostnames, the repository, vulnerability count, and a breakdown of the
individual severity counts.
You can click a DNS name to view the Vulnerability List tool, filtered by
the DNS name you selected.
IAVM Summary This view groups vulnerabilities based on their IAVM ID, severity, and
vulnerability count.
List Mail Clients Tenable Security Center uses Tenable Nessus Network Monitor to
determine a unique list of email clients. The list contains the email client
name, count of detections, and the detection method.
- 632 -
Analysis Tool Description
You can click a count to view the IP Summary tool, filtered by the email
client you selected.
You can click a count to view the IP Summary tool, filtered by operating
system.
List Services Tenable Security Center processes information from scans and creates a
summary of unique services discovered. The service discovered, count of
hosts, and detection method are listed.
You can click a service to view the IP Summary tool, filtered by the
service you selected.
List Software Tenable Security Center processes information from scans and creates a
summary of unique software packages discovered. The software name,
count of hosts, and detection method are listed.
You can click a software name to view the IP Summary tool, filtered by
the software you selected.
List SSH Servers This tool utilizes active and passive scan results to create a unique list of
known SSH servers. The list contains the ssh server name, count of
detections, and the detection method.
Tip: Not all SSH servers run on port 22. Do not be surprised if you encounter
SSH servers running on unexpected ports.
You can click a count to view the IP Summary tool, filtered by the SSH
server you selected.
List Web Clients Tenable Security Center understands Tenable Nessus Network Monitor
plugin ID 1735, which passively detects the web client in use. This tool
lists the unique web clients detected. The list contains the user-agents,
- 633 -
Analysis Tool Description
You can click a count to view the IP Summary tool, filtered by the web
client you selected.
List Web Servers This tool takes the passive output from passive and active scans to
create a unique list of known web servers. The list contains the web
server name, count of detections, and the detection method.
Tip: Not all web servers run on port 80 or 443. Do not be surprised if you
encounter web servers running on unexpected ports.
You can click a count to view the IP Summary tool, filtered by the web
server you selected.
MS Bulletin This tool filters vulnerabilities based on Microsoft Bulletin ID. Displayed
Summary are the IDs, Vulnerability Totals, Host Total, and Severity. This view is
particularly useful in cases where Microsoft releases a new bulletin and a
quick snapshot of vulnerable hosts is required.
Plugin Family This tool charts the Nessus, Tenable Nessus Network Monitor, or Event
Summary plugin family as well as their relative counts based on severity level for all
matching vulnerabilities.
You can click a count to view the Vulnerability List tool, filtered by the
plugin family you selected.
Port Summary A summary of the ports in use is displayed for all matched vulnerabilities.
Each port has its count of vulnerabilities as well as a breakdown for each
severity level.
You can click a port to view the IP Summary tool, filtered by the port you
selected.
Protocol This tool summarizes the detected IP protocols such as TCP, UDP, and
Summary ICMP. The tool also breaks out the counts for each protocol’s severity
levels.
- 634 -
Analysis Tool Description
You can click a count to view the IP Summary tool, filtered by the count
you selected.
Remediation The Remediation Summary tool provides a list of remediation actions that
Summary may be taken to prioritize tasks that have the greatest effect to reduce
vulnerabilities in systems. This list provides a solution to resolve a
particular CPE on a given OS platform. The data provided includes:
Severity This tool considers all of the matching vulnerabilities and then charts the
Summary total number of info, low, medium, high, and critical vulnerabilities.
- 635 -
Analysis Tool Description
You can click a count to view the Vulnerability Summary tool, filtered by
the severity you selected.
User This displays a list of the users who are assigned responsibility for the
Responsibility vulnerability based on the user’s assigned asset list. Multiple users with
Summary the same responsibility are displayed on the same line. Users without any
assigned responsibilities are not displayed in the list. Tenable Security
Center populates this list after you assign an asset to a user account.
Vulnerability Displays the details for a specific vulnerability instance on your network.
Detail List
Tip: A vulnerability instance is a single instance of a vulnerability appearing on
an asset, identified uniquely by plugin ID, port, and protocol.
Vulnerability List Displays a table of all vulnerability instances found on your network,
organized by plugin ID.
- 636 -
Filter
Availability Description
Component
Application CPE All Allows a text string search to match against available
CPEs. The filter may be set to search based on a
contains, Exact Match, or Regex Filter filter. The Regex
Filter is based on Perl-compatible regular expressions
(PCRE).
Asset All This filter displays systems from the assets you select.
If more than one asset contains the systems from the
primary asset (i.e., there is an intersect between the
asset lists), those assets are displayed as well.
- 637 -
Filter
Availability Description
Component
Asset Criticality All (Requires Tenable Security Center+ license) Filters for
Rating (ACR) vulnerabilities on hosts within the specified ACR range,
between 0 and 10.
Asset Exposure All (Requires Tenable Security Center+ license) Filters for
Score (AES) hosts within the specified AES range, between 0 and
1000.
AES Severity All (Requires Tenable Security Center+ license) Filters for
hosts with the specified AES severity.
Audit File All Filters vulnerabilities by plugin IDs associated with the
audit file used to perform a scan.
- 638 -
Filter
Availability Description
Component
range.
CVSS v2 Vector All Filters results based on a search against the CVSS v2
vector information.
CVSS v3 Vector All Filters results based on a search against the CVSS v3
vector information.
Data Format All Displays results matching the specified data type: IPv4,
IPv6, or Agent.
DNS Name All This filter specifies a DNS name to limit the viewed
vulnerabilities. For example, entering host.example.com
limits any of the web tools to only show vulnerability
data from that DNS name.
Exploit All When set, the text option can be equal to or contain the
Frameworks text entered in the option.
- 639 -
Filter
Availability Description
Component
Output Assets Asset This filter displays only the desired asset list systems.
Summary
Analysis Tool
Patch Published All Some plugins contain information about when a patch
was published for a vulnerability. This filter allows the
user to search based on when a vulnerability's patch
became available:
- 640 -
Filter
Availability Description
Component
l Current Month
l Last Month
l Current Year
l Last Year
Plugin Family All This filter chooses a Nessus or Tenable Nessus Network
Monitor plugin family. Only vulnerabilities from that
family display.
Plugin ID All Type the plugin ID desired or range based on a plugin ID.
Available operators are equal to (=), not equal to (!=),
greater than or equal (>=) and less than or equal to (<=).
Plugin Modified All Tenable plugins contain information about when a plugin
was last modified. This filter allows users to search
based on when a particular plugin was modified:
- 641 -
Filter
Availability Description
Component
l Current Month
l Last Month
l Current Year
l Last Year
Plugin Name All Using the Contains option, type all or a portion of the
actual plugin name. For example, entering MS08-067 in
the plugin name filter displays vulnerabilities using the
plugin named MS08-067: Microsoft Windows Server
Service Crafted RPC Request Handling Remote Code
Execution (958644) (uncredentialed check). Similarly,
entering the string uncredentialed displays a list of
vulnerabilities with that string in the plugin name.
- 642 -
Filter
Availability Description
Component
l Current Month
l Last Month
l Current Year
l Last Year
Plugin Type All Select whether to view all plugin types or passive,
active, event, or compliance vulnerabilities.
Port All This filter is in two parts. First the equality operator is
specified to allow matching vulnerabilities with the same
ports, different ports, all ports less than or all ports
greater than the port filter. The port filter allows a
comma separated list of ports. For the larger than or
less than filters, only one port may be used.
- 643 -
Filter
Availability Description
Component
Protocol All This filter provides boxes to select TCP, UDP, or ICMP-
based vulnerabilities.
STIG Severity All Displays vulnerabilities with the chosen STIG severity in
the plugins database.
l Current Month
l Last Month
- 644 -
Filter
Availability Description
Component
l Current Year
l Last Year
l Current Month
l Last Month
- 645 -
Filter
Availability Description
Component
quarter)
l Current Year
l Last Year
Vulnerability Cumulative This filter allows the user to see when the vulnerability
Last Observed View was last observed by Tenable Nessus, Tenable Log
Correlation Engine, or Tenable Nessus Network Monitor:
- 646 -
Filter
Availability Description
Component
l Current Month
l Last Month
l Current Year
l Last Year
Vulnerability Mitigated View This filter allows the user to filter results based on when
Mitigated the vulnerability was mitigated:
- 647 -
Filter
Availability Description
Component
l Current Month
l Last Month
l Current Year
l Last Year
Vulnerability All Displays vulnerabilities within the chosen VPR range. For
Priority Rating more information, see CVSS vs. VPR.
(VPR)
Tip:The Vulnerabilities page displays vulnerabilities by
plugin. The VPR that appears is the highest VPR of all the
vulnerabilities associated with that plugin.
l All
- 648 -
Filter
Availability Description
Component
l Current Month
l Last Month
l Current Year
l Last Year
Web App All Required Additional License: Tenable Web App Scanning
Scanning
Required Tenable Nessus Version: 10.6.1 or later
- 649 -
Filter
Availability Description
Component
Web App URL All Required Additional License: Tenable Web App Scanning
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can drill into analysis views, filtering by host, to view vulnerabilities and vulnerability instances
on a host.
4. Filter the tool to locate the host where you want to view vulnerability instance details, as
described in Filters and Vulnerability Analysis Filter Components.
- 650 -
a. Click the row for the vulnerability instance for which you want to view the details.
The Vulnerability List tool appears, filtered by the vulnerability instance you selected.
Options Actions
Jump to View the Vulnerability Detail List page. This page displays the
Vulnerability synopsis, description, solution, and the plugin output of the
Detail vulnerability.
Filters side bar Apply a filter, as described in Apply a Filter and Vulnerability
Analysis Filter Components.
- 651 -
vulnerability, as described in View Host Details.
The System Information pane appears. For more information, see View Host Details.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can drill into analysis views, filtering by plugin, to view vulnerabilities and vulnerability instances
related to that plugin.
Options Actions
Jump to View the Vulnerability Detail List page. This page displays the
- 652 -
Vulnerability synopsis, description, solution, and the plugin output of the
Detail vulnerability.
Filters side bar Apply a filter, as described in Apply a Filter and Vulnerability Analysis
Filter Components.
Plugin row l Click the Plugin ID to view the plugin details for the plugin, as
described in View Plugin Details.
- 653 -
Rule.
4. Click the row for the plugin where you want to view vulnerability instance details.
The Vulnerability List tool appears, filtered by the plugin you selected.
Options Actions
Jump to View the Vulnerability Detail List page. This page displays the
Vulnerability synopsis, description, solution, and the plugin output of the
Detail vulnerability.
Filters side bar Apply a filter, as described in Apply a Filter and Vulnerability Analysis
- 654 -
Filter Components.
Vulnerability l Click the Plugin ID to view the plugin details associated with
row the vulnerability, as described in View Plugin Details.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can drill into analysis views to view details for a specific instance of a vulnerability found on
your network.
Tip: A vulnerability instance is a single instance of a vulnerability appearing on an asset, identified uniquely
by plugin ID, port, and protocol.
- 655 -
Section Actions
l Save an asset.
arrows Click the arrows to view other vulnerability instances related to the
plugin.
Synopsis and View information about the plugin, vulnerability instance, and
Description affected assets.
Discovery View details about when the vulnerability was discovered and last
seen on your network.
- 656 -
Information
Risk View metrics (e.g., CVSS score, VPR, etc.) about the risk associated
Information with the vulnerability.
VPR Key Drivers View the key drivers Tenable used to calculate the VPR score. For
more information, see CVSS vs. VPR.
Reference View related links to the CVE, BID, MSFT, CERT, and other industry
Information materials about the vulnerability.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can drill into analysis views to view details for a specific host on your network.
4. In the IP Address column, click the IP address link to view host details for a specific
vulnerability instance.
- 657 -
Tip: A vulnerability instance is a single instance of a vulnerability appearing on an asset, identified
uniquely by plugin ID, port, and protocol.
Section Actions
l Last Scan — The date and time Tenable Security Center last
scanned the host.
- 658 -
l Compliance Data — Indicates whether the scan that detected
the vulnerability included compliance plugins.
Links l View SANS and ARIN links for the host. If configured, this
section also displays custom resource links.
Assets View the asset lists containing the asset. For more information, see
Assets.
Section Action
- 659 -
Section Action
Asset Exposure (Requires Tenable Security Center+ license) View the host's AES. For
Score more information, see Asset Exposure Score in the Tenable
Vulnerability Management User Guide.
Asset Criticality (Requires Tenable Security Center+ license) View the host's ACR and
Rating details about modifications to the ACR.
For more information, see Asset Criticality Rating and ACR Key
Drivers in the Tenable Vulnerability Management User Guide.
OT Properties View the Tenable OT Security properties for the host. This section
appears only for hosts discovered by Tenable OT Security scans.
- 660 -
Section Action
l 0 - Physical process
l 1 - Intelligent devices
l 2 - Control systems
l Last Update - The date and time that the asset was last
- 661 -
Section Action
updated.
l First Seen — The date and time Tenable Security Center first
detected the host on your network.
- 662 -
Section Action
l Last Seen — The date and time last Tenable Security Center
detected the host on your network.
Findings tab l View the vulnerabilities detected on the host. For more
information, see CVSS vs. VPR.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can drill into analysis views to view details for a specific instance of a vulnerability found on
your network.
Tip: A vulnerability instance is a single instance of a vulnerability appearing on an asset, identified uniquely
by plugin ID, port, and protocol.
- 663 -
The Vulnerability Summary tool appears.
5. In the Plugin ID column, click the plugin ID to view plugin details for a specific plugin.
Section Actions
Vulnerability Priority View the key drivers Tenable used to calculate the
Rating (VPR) Key vulnerability VPR. For more information, see CVSS vs. VPR.
Drivers
CVE and BID View related links to the CVE and BID materials about the
vulnerability.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can export data from the Vulnerabilities page as a .csv or a .pdf file.
- 664 -
3. In the Export drop-down box, click Export > Export as CSV or Export as PDF.
Note: If the record count (rows displayed) of any CSV export is greater than 1,000, Tenable Security
Center prompts you for the name of the CSV report you want to generate. After generation, you can
download the report from the Report Results page.
4. Select or clear the check boxes to indicate which columns you want to appear in the exported
file.
5. Click Submit.
The Web App Scanning page displays vulnerabilities discovered by web app scans.
Web application scanning in Tenable Security Center allows you to scan and address web
application vulnerabilities that traditional scanners cannot scan. For more information about web
app scanning, see Web App Scans.
For more information about the Web App Scanning analysis page, see:
- 665 -
On the Web App Scanning page, you can use the drop-down box to select the web app scanning
analysis tool you want to view.
Asset Summary Summarizes the scores and counts of web app vulnerabilities for all
dynamic or static asset lists.
You can click a count to view the IP Summary tool, filtered by the asset
list you selected.
You can click a count to view the Vulnerability Summary tool, filtered by
the CCE vulnerability you selected.
Class B Summary The vulnerability score for an address is computed by adding up the
number of vulnerabilities at each severity level and multiplying it with the
Class C Summary
organization’s severity score.
Starting out with a Class A or Class B summary can identify more active
network ranges for networks with a large number of active IP addresses.
You can click a Class A or Class B row to view the Class B or Class C tool,
filtered by the asset list you selected. You can click a Class C row to view
the IP Summary tool, filtered by the asset list you selected.
CVE Summary Displays web app vulnerabilities grouped by CVE ID, severity, and
vulnerability count.
DNS Name Tenable Security Center includes the ability to summarize information by
Summary vulnerable DNS name. The DNS Name Summary displays the matching
hostnames, the repository, vulnerability count, and a breakdown of the
individual severity counts.
You can click a DNS name to view the Vulnerability List tool, filtered by
- 666 -
Analysis Tool Description
IAVM Summary Displays web app vulnerabilities grouped by IAVM ID, severity, and
vulnerability count.
You can click a count to view the IP Summary tool, filtered by operating
system.
Plugin Family Charts the Nessus, Tenable Nessus Network Monitor, or Event plugin
Summary family as well as their relative counts based on severity level for all
matching vulnerabilities.
You can click a count to view the Vulnerability List tool, filtered by the
plugin family you selected.
Port Summary Summarizes the ports in use for all matched vulnerabilities. Each port
displays a count of vulnerabilities and a breakdown for each severity level.
You can click a port to view the IP Summary tool, filtered by the port you
selected.
Severity Displays the total number of info, low, medium, high, and critical
Summary vulnerabilities.
You can click a count to view the Vulnerability Summary tool, filtered by
the severity you selected.
User Displays a list of the users who are assigned responsibility for the
- 667 -
Analysis Tool Description
Responsibility vulnerability based on the user’s assigned asset list. Multiple users with
Summary the same responsibility are displayed on the same line. Users without any
assigned responsibilities are not displayed in the list. Tenable Security
Center populates this list after you assign an asset to a user account.
Web App Displays a list of all web apps associated with vulnerabilities on your
URL Summary network, organized by URL.
Web App Vuln Displays details for each web app vulnerability. For more information, see
Detail List View Web App Scanning Vulnerability Details.
Web App Vuln Displays a list of all web app vulnerabilities discovered on your network,
List organized by plugin ID.
Filters limit the results of the displayed web app vulnerability data and can be added, modified, or
reset as desired. For more information, see Filters.
Filter
Description
Component
Asset Criticality (Requires Tenable Security Center+ license) Filters for vulnerabilities on
Rating (ACR) hosts within the specified ACR range, between 0 and 10.
Tip: To edit the ACR for an asset, see Edit an ACR Manually.
- 668 -
Filter
Description
Component
Asset Exposure (Requires Tenable Security Center+ license) Filters for hosts within the
Score (AES) specified AES range, between 0 and 1000.
AES Severity (Requires Tenable Security Center+ license) Filters for hosts with the
specified AES severity.
Accept Risk Displays web app vulnerabilities based on their Accepted Risk workflow
status. Available choices include Accepted Risk or Non-Accepted Risk.
Choosing both options displays all vulnerabilities regardless of acceptance
status.
Address This filter specifies an IPv4 or IPv6 address, range, or CIDR block to limit
the viewed vulnerabilities. For example, entering 198.51.100.28/24 and/or
2001:DB8::/32 limits any of the web tools to show vulnerability data from
the specified networks. You can enter addresses in a comma-separated list
or on separate lines.
Agent ID Displays results matching the specified agent UUID (Tenable UUID). An
agent UUID uniquely identifies:
Application CPE Allows a text string search to match against available CPEs. The filter may
be set to search based on a contains, Exact Match, or Regex Filter filter.
The Regex Filter is based on Perl-compatible regular expressions (PCRE).
Asset This filter displays systems from the assets you select. If more than one
asset contains the systems from the primary asset (i.e., there is an
- 669 -
Filter
Description
Component
intersect between the asset lists), those assets are displayed as well.
Tip: Use NOT, OR, and AND operators to exclude unwanted assets from the
view.
Audit File Filters vulnerabilities by plugin IDs associated with the audit file used to
perform a scan.
CVE ID Displays vulnerabilities based on one or more CVE IDs. Type multiple IDs as
a comma-separated list (e.g., CVE-2011-3348,CVE-2011-3268,CVE-2011-
3267).
CVSS v2 Score Displays vulnerabilities within the chosen Common Vulnerability Scoring
System version 2 (CVSS v2) score range.
CVSS v2 Vector Filters results based on a search against the CVSS v2 vector information.
CVSS v3 Score Displays vulnerabilities within the chosen Common Vulnerability Scoring
System version 3 (CVSS v3) score range.
CVSS v3 Vector Filters results based on a search against the CVSS v3 vector information.
Cross Filters results based on a search against the cross reference information in
References a vulnerability.
DNS Name This filter specifies a DNS name to limit the viewed vulnerabilities. For
example, entering host.example.com limits any of the web tools to only
show vulnerability data from that DNS name.
Data Format Displays results matching the specified data type: IPv4, IPv6, or Agent.
Exploit If set to yes, displays only vulnerabilities for which a known public exploit
Available exists.
Exploit When set, the text option can be equal to or contain the text entered in the
Frameworks option.
- 670 -
Filter
Description
Component
IAVM ID Displays vulnerabilities based on one or more IVAM IDs. Type multiple IDs as
a comma-separated list (e.g., 2011-A-0005,2011-A-0007,2012-A-0004).
Input Name If the asset is vulnerable to injection attacks, this displays the name of the
asset component where an attacker could inject malicious code.
Input Type If the asset is vulnerable to injection attacks, this displays the component
of the asset where an attacker could inject malicious code (for example, a
form or session cookie).
MS Bulletin ID Displays vulnerabilities based on one or more Microsoft Bulletin IDs. Type
multiple IDs as a comma-separated list (e.g., MS10-012,MS10-054,MS11-020).
NetBIOS Name Displays vulnerabilities that match the specified NetBIOS name.
Note: This filter searches for exact matches only. Type the NetBIOS name as
workgroup \ NetBIOS name.
Operating The operating system that a scan identified as installed on the asset.
System
Patch Published Some plugins contain information about when a patch was published for a
vulnerability. This filter allows the user to search based on when a
- 671 -
Filter
Description
Component
l Current Month
l Last Month
l Current Year
l Last Year
Plugin Family This filter chooses a Nessus or Tenable Nessus Network Monitor plugin
family. Only vulnerabilities from that family display.
Plugin ID Type the plugin ID desired or range based on a plugin ID. Available
operators are equal to (=), not equal to (!=), greater than or equal (>=) and
less than or equal to (<=).
Plugin Modified Tenable plugins contain information about when a plugin was last modified.
This filter allows users to search based on when a particular plugin was
modified:
- 672 -
Filter
Description
Component
l Current Month
l Last Month
l Current Year
l Last Year
Plugin Name Using the Contains option, type all or a portion of the actual plugin name.
For example, entering MS08-067 in the plugin name filter displays
vulnerabilities using the plugin named MS08-067: Microsoft Windows
Server Service Crafted RPC Request Handling Remote Code Execution
(958644) (uncredentialed check). Similarly, entering the string
uncredentialed displays a list of vulnerabilities with that string in the plugin
name.
Use the Regex Match option to filter plugin names based on Perl-
compatible regular expressions (PCRE).
Plugin Tenable plugins contain information about when a plugin was first
Published published. This filter allows users to search based on when a particular
plugin was created:
- 673 -
Filter
Description
Component
l Current Month
l Last Month
l Current Year
l Last Year
Plugin Type Select whether to view all plugin types or passive, active, event, or
compliance vulnerabilities.
Port This filter is in two parts. First the equality operator is specified to allow
matching vulnerabilities with the same ports, different ports, all ports less
than or all ports greater than the port filter. The port filter allows a comma
separated list of ports. For the larger than or less than filters, only one
port may be used.
Note: All host-based vulnerability checks are reported with a port of 0 (zero).
Protocol This filter provides boxes to select TCP, UDP, or ICMP-based vulnerabilities.
Recast Risk Displays vulnerabilities based on their Recast Risk workflow status.
- 674 -
Filter
Description
Component
STIG Severity Displays vulnerabilities with the chosen STIG severity in the plugins
database.
Scan Policy Displays vulnerabilities found by the currently enabled plugins in the scan
Plugins policy. For more information, see The Plugins tab specifies which plugins
are used during the policy’s Tenable Nessus scan. You can enable or
disable plugins in the plugin family view or in the plugin view for more
granular control..
Security End of When available, Tenable plugins contain information about software end of
Life Date life dates. This filter allows users to search based on when a particular
software is end of life:
l Current Month
l Last Month
l Current Year
l Last Year
- 675 -
Filter
Description
Component
Severity Displays vulnerabilities with the selected severity. For more information,
see CVSS vs. VPR.
Users Allows selection of one or more users who are responsible for the
vulnerabilities.
Vulnerability Tenable Security Center tracks when each vulnerability was first
Discovered discovered. This filter allows you to see when vulnerabilities were
discovered:
l Current Month
l Last Month
l Current Year
l Last Year
Note: The discovery date is based on when the vulnerability was first imported
- 676 -
Filter
Description
Component
into Tenable Security Center. For Tenable Nessus Network Monitor, this date
does not match the exact vulnerability discovery time as there is normally a lag
between the time that Tenable Nessus Network Monitor discovers a
vulnerability and the import occurs.
Note: Days are calculated based on 24-hour periods prior to the current time,
not calendar days. For example, if the report run time was 1/8/2019 at 1:00 PM,
using a 3-day count would include vulnerabilities starting 1/5/2019 at 1:00 PM
and not from 12:00 AM.
Vulnerability ID The ID for the vulnerability. The authority that identifies a given
vulnerability determines the vulnerability's ID format.
Vulnerability This filter allows the user to see when the vulnerability was last observed
Last Observed by Tenable Nessus, Tenable Log Correlation Engine, or Tenable Nessus
Network Monitor:
l Current Month
l Last Month
l Current Year
l Last Year
- 677 -
Filter
Description
Component
Note: The observation date is based on when the vulnerability was most
recently imported into Tenable Security Center. For Tenable Nessus Network
Monitor, this date does not match the exact vulnerability discovery as there is
normally a lag between the time that Tenable Nessus Network Monitor
discovers a vulnerability and the import occurs.
Vulnerability Displays vulnerabilities within the chosen VPR range. For more information,
Priority Rating see CVSS vs. VPR.
(VPR)
l All
l Current Month
l Last Month
l Current Year
l Last Year
- 678 -
Filter
Description
Component
Vulnerability Displays vulnerabilities containing the entered text (e.g., php 5.3) or regex
Text search term.
Web App URL The URL for the discovered web application associated with the
vulnerability. Separate multiple URLs with single quotations and commas.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can drill into web app scanning vulnerabilities to view details for each vulnerability instance
found on your network.
Tip: A vulnerability instance is a single instance of a web app vulnerability appearing on an asset, identified
uniquely by plugin ID, port, protocol, URL, input type, input name, and HTTP method.
- 679 -
Section Actions
l Save an asset.
arrows Click the arrows to view other vulnerability instances related to the
plugin.
Synopsis and View information about the plugin, vulnerability instance, and
Description affected assets.
Affected Host View details about the affected host asset, as well as the plugin
Asset output.
Discovery View details about when the vulnerability was first discovered and
last observed on your network.
- 680 -
Asset Exposure View the AES value for the vulnerability.
Score
For more information, about AES values, see Asset Exposure Score
in the Tenable Vulnerability Management User Guide.
Risk Information View metrics (e.g., CVSS score, VPR, etc.) about the risk associated
with the vulnerability.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can export data from the Web App Scanning page as a .csv or a .pdf file.
3. In the Export drop-down box, click Export > Export as CSV or Export as PDF.
Note: If the record count (rows displayed) of any CSV export is greater than 1,000, Tenable Security
Center prompts you for the name of the CSV report you want to generate. After generation, you can
download the report from the Report Results page.
- 681 -
4. Select or clear the check boxes to indicate which columns you want to appear in the exported
file.
5. Click Submit.
Event Analysis
The Events display page contains an aggregation of security events from Tenable Log Correlation
Engine. Events can be viewed in a list format with options similar to the Vulnerability interface.
- 682 -
Analysis Tools
A wide variety of analysis tools are available for comprehensive event analysis.
When viewing the analysis tool results, clicking on result will generally take you to the next level of
detail for the analysis. For instance, from the Type summary page clicking on a type will display the
Normalized Event Summary. Clicking on an even in that list will display the List of Events page
featuring that event. Along each progression a new drop-down menu will appear allowing for easy
access to either pivot to another analysis tool based on the current view or to return to the previous
view.
Additionally most results will have a gear icon next to them. This icon will provide summaries,
normally based on time restrictions or a view of the vulnerability summary for the affected host,
around that item’s result.
Load Query
- 683 -
The Load Query option enables users to load a predefined query and display the current dataset
against that query. Click on Load Query in the filters list to display a box with all available queries.
The query names are displayed in alphabetical order. After clicking on an individual query, the
vulnerability view is changed to match the query view for the current dataset.
Save Query
You can save the current view as a query for reuse. For more information about queries, see
Queries.
Save Asset
Event results can be saved to an asset list for later use. For more information, see Assets.
Save Watchlist
Event results can be saved to a watchlist asset list for later use. For more information, see Assets.
Open Ticket
Tickets are used within Tenable Security Center to assist with the assessment and remediation of
vulnerabilities and security events. For more information, see Open a Ticket.
View Settings
When available, this setting controls the columns displayed in your view.
- 684 -
The Switch Archive menu item is displayed when viewing archived event data. Selecting this option
displays the same menu and selections as above to select a different archive silo for viewing.
The Switch to Active menu item is displayed when viewing archived data and when selected,
changes the view to active event data for analysis.
Export as CSV
Event results can be exported to a comma-separated file for detailed analysis outside of Tenable
Security Center by clicking on the Options drop-down menu and then the Export as CSV option.
When selected, a window opens with an option to choose the columns to be included in the CSV
file.
If the record count (rows displayed) of any CSV export is greater than 1,000 records, a note is
displayed that prompts for the name of the CSV report to be generated. When complete, the report
can be downloaded from the Report Results page. For CSV exports of under 1,000 records, the
browser’s standard Save As dialog window is displayed.
Once the appropriate selections are made, click the Submit button to create the CSV file or Cancel
to abort the process.
When viewing the analysis tool results, clicking on result will generally take you to the next level of
detail for the analysis. For instance, from the Type summary page clicking on a type will display the
Normalized Event Summary. Clicking on an even in that list will display the List of Events page
featuring that event. Along each progression a new drop-down menu will appear allowing for easy
access to either pivot to another analysis tool based on the current view or to return to the previous
view.
Additionally most results will have a gear icon next to them. This icon will provide summaries,
normally based on time restrictions or a view of the vulnerability summary for the affected host,
around that item’s result.
- 685 -
Tool Description
Asset This tool can be used to see how certain types of activity, remote attackers,
Summary or non-compliant events have occurred across different asset groups.
Clicking on the Total count for the listed asset displays a Type Summary
analysis tool.
Connection This tool lists connections made between two different hosts by source and
Summary destination IP address and the counts of connections between them.
Date Summary When analyzing large amounts of data, it is often useful to get a quick
summary of how the data set manifests itself across several dates.
Destination IP This tool displays events listed by the destination IP address recorded. The
Summary table lists the Tenable Log Correlation Engine it was discovered on, the IP
address, and the count. Clicking on the information icon next to the IP
address displays the system information pertaining to the host IP address.
Clicking on one of the hosts displays the Type Summary analysis tool.
Detailed Event This tool displays a summary of the various events based on their full event
Summary name and count. Clicking on an event displays the List of Events analysis
tool.
Event Trend This analysis tool displays an event trend area graph with total events over
the last 24 hours. Modify the filters for this graph to display the desired
event trend view.
IP Summary Tenable Security Center provides the ability to quickly summarize matching
IP addresses by single IP address, Class A, Class B, and Class C addresses.
Class A
- 686 -
Tool Description
Summary The IP Summary tool displays the associated Tenable Log Correlation Engine
server along with the IP address of the reporting system and about the event
Class B
count for that system.
Summary
Clicking on an IP address displays a Host Detail window for that IP address.
Class C
Clicking the information icon next to the IP address displays information
Summary
about the NetBIOS Name (if known), DNS Name (if known), MAC address (if
known), OS (if known), Score, Repository, Last Scan, Passive Data,
Compliance Data, and Vulnerability severity counts. The Assets box displays
which asset lists the IP address belongs to. The Useful Links box contains a
list of resources that can be queried by IP address. Clicking on one of the
Resource links causes the resource to be queried with the current IP
address. For example, if the current IP address was a publicly registered
address, clicking on the ARIN link causes the ARIN database to be queried
for the registration information for that address. If custom resources have
been added by an administrative user (via the Manage IP Address
Information Links selection under the Customization tab), they will be
displayed here.
List of Events This tool displays a line of data for each matching event. The line includes
many pieces of information such as time, event name, number of correlated
vulnerabilities involved IP addresses, and sensor.
Normalized This tool summarizes a listing of all normalized events and their count for
Event the chosen time period. Normalized events are lower-level events that have
Summary been assigned a Tenable name based on Tenable Log Correlation Engine
scripts parsing of the log records (e.g., Snort-HTTP_Inspect).
Clicking on the event name displays the List of Events analysis tool.
Port Summary A port summary can be invoked. This tool produces a table of the top used
ports and combines counts for source and destination ports into one overall
- 687 -
Tool Description
count.
Clicking on the port will display a Type Summary of events filtered for that
port.
Note: Port 0 events are host-based events that are not specific to any particular
TCP/UDP port.
Raw Syslog Users can choose to view the original log message or IDS event for full
Events forensic analysis.
Sensor This tool displays the unique event counts for any query from unique sensor
Summary types.
When a sensor is clicked on, the Type Summary analysis tool is displayed for
events from the selected sensor.
Source IP This tool displays events listed by the source IP address recorded. The table
Summary lists the Tenable Log Correlation Engine it was discovered on, the IP
address, and the count. Clicking on the information icon next to the IP
address displays the system information pertaining to the host IP address.
Clicking on one of the hosts displays the Type Summary analysis tool.
Type Summary This tool displays the matching unique event types and the number of
corresponding events for each.
The unique event types are based on normalized logs or events such as
firewall, system, correlated, network and IDS. These types are high-level
- 688 -
Tool Description
Clicking on any of the event counts displays the Normalized Event Summary
for the type.
User Summary This tool displays the matching unique event types and the number of
corresponding events for each user when user tracking is enabled in Tenable
Log Correlation Engine.
The unique event types are based on normalized logs such as firewall,
system, correlated, network, and IDS.
Clicking on any of the event counts under the Total column will display the
Type Summary analysis tool.
The Events page also supports using a filter bar for filtering. To display the filter bar, in the toolbar,
click More > Show Filter Bar.
Note: The filter bar does not display or adjust the timeframe filter.
Filter
Description
Component
Address Specifies an IP address, range, or CIDR block to limit the displayed events.
For example, entering 198.51.100.64/24 limits any of the web tools to show
only the event data from that network. You can enter addresses on
separate lines or comma separated.
Tip: Use NOT, OR, and AND operators to exclude unwanted assets from the
view.
- 689 -
Filter
Description
Component
Destination Specifies an IP address or CIDR block to limit the displayed events based
Address on destination. For example, entering 198.51.100.64/24 limits any of the
analysis tools to show only the event data with destination IPs in that
block. Addresses can be comma-separated.
Destination Filter the destination address of the event data by the specified asset list.
Asset
Tip: Use NOT, OR, and AND operators to exclude unwanted assets from the
view.
Destination Port This filter is in two parts. Specify the type of filter to allow matching events
with the same ports (=) or different ports (≠). The port filter may specify a
single, comma separated list of ports or range of ports (for example, 8000-
8080).
Detailed Event This is the detailed event name given by the IDS vendor. For example, an
event received from a Snort sensor can have a detailed event name of
DOUBLE DECODING ATTACK, which means that HTTP_INSPECT 119:2:1 fired
and was sent to the Log Correlation Engine.
Log Correlation Specify one or more Log Correlation Engines to obtain events from by
Engines checking the box next to the choices.
Normalized The name given to the event by the Log Correlation Engine after the Log
Event Correlation Engine runs its PRM and TASL scripts against it.
Port This filter is in two parts. Specify the type of filter to allow matching
vulnerabilities with the specified ports (=), excluding ports (≠), ports greater
than or equal to (≥), or ports less than or equal to (≤). The specified and
excluding port filter may specify a single port, comma-separated list of
ports, or range of ports (for example, 8000-8080).
- 690 -
Filter
Description
Component
Note: Tenable Security Center reports all host-based vulnerability checks with
a port of 0 (zero).
Repositories Specify the Repositories to obtain events from. You can search the
repositories using the search filter at the top. You can select multiple
repositories from the list.
Sensor Filter the events by sensor using the equal (=) or not equal (!=) operators.
Source Address Specifies an IP address or CIDR block to limit the displayed events based
on source. For example, entering 198.51.100.64/24 limits any of the analysis
tools to show only the event data with source IPs in that block. Addresses
can be comma separated.
Source Asset Filter the source address of the event data by asset list and select an asset
list from those available or the NOT operator to exclude asset lists. After
you add each list, the AND or OR operators are available to customize the
combining of asset lists.
Source Port This filter is in two parts. Specify the type of filter to allow matching events
with the same ports (=) or different ports (≠). The port filter may specify a
single port, comma-separated list of ports, or range of ports (for example,
8000-8080).
Syslog Text (Raw Syslog Events Analysis Tool) String to search for within the filtered
event.
Targeted IDS This filter box selects IDS events that have targeted systems and ports
Events with vulnerabilities likely to be exploited by the detected attack. This is
determined by comparing the host’s vulnerabilities (CVE, etc.) against those
tied to the actual IDS event.
Timeframe Tip: Tenable Security Center always uses this filter. By default, it is set for the
last 24 hours, based on the time of the page load.
- 691 -
Filter
Description
Component
Type Use this to filter by the event type (for example, error, lce, login, or
intrusion).
Note: Clicking on Clear Filters causes the filters to return to the default settings.
Mobile Analysis
The Mobile page displays lists of vulnerabilities discovered by scanning an ActiveSync, Apple Profile
Manager, AirWatch, Good, and/or MobileIron MDM servers.
For information about mobile analysis filtering, see Mobile Analysis Filter Components.
l Save Query
Save Query
You can save the current view as a query for reuse. For more information about queries, see
Queries.
- 692 -
You can export mobile results in the current view to a comma-separated file or a PDF for detailed
analysis outside of Tenable Security Center.
Note: If the record count (rows displayed) of any CSV export is greater than 1,000 records, a note is
displayed that prompts for the name of the CSV report to be generated. When complete, the report can be
downloaded from the Report Results page. For CSV exports of under 1,000 records, the browser’s standard
Save As dialog window is displayed.
Select the columns of data you want exported, then click Submit.
Option Description
Analysis Tool This drop-down box is used to choose the analysis tool used by the
filter. This is the same as selecting the desired analysis tool from the
Analysis > Mobile dialog.
Active Filters Displays the existing filters and allows the user to selectively remove
filters as needed.
Filters
Identifier A text based search filter that looks at the Identifier option in the
repository.
MDM Type A drop-down box to select the MDM server type of ActiveSync, Apple
Profile Manager, Good, AirWatch, and MobileIron MDM server.
Model A text based search filter that looks at the Model option in the
repository.
Operating System A text based search filter that looks at the Operating System CPE option
CPE in the repository.
- 693 -
Option Description
Serial Number This is a text based search filter that looks at the Serial Number option
in the repository.
Severity Displays vulnerabilities with the selected severity (Info, Low, Medium,
High, Critical).
Username This is a text based search filter that looks at the User option in the
repository.
Version This is a text based search filter that looks at the OS Version option in
the repository.
Vulnerability Last This filter allows the user to see when the vulnerability was last
Observed observed.
(Cumulative only)
Reports
You can create reports in Tenable Security Center to share data with users in other organizations.
For more information about which users can access what data, see Tenable Security Center
Architecture.
Tenable provides reporting through an assortment of report templates and customizable report
formats, including PDF and CSV.
Custom CyberScope, DISA ASR, and DISA ARF reports are also available for specialized needs. An
administrator user must enable report generation options before organizational users can generate
reports with CyberScope, DISA ASR, or DISA ARF data.
Custom CyberScope, DISA ASR, DISA ARF, and DISA Consolidated ARF reports are also available for
specialized needs. An administrator user must enable report generation options before
organizational users can generate reports with CyberScope, DISA ASR, DISA ARF, or
DISA Consolidated ARF data.
In Tenable Security Center, organizational users can create custom reports or template-based
reports, as described in Create a Custom Report or Create a Template Report.
- 694 -
Note: To create custom PDF reports and template-based reports, you must install either the Oracle Java
JRE or OpenJDK (along with their accompanying dependencies) on the system hosting the Tenable
Security Center.
Tip: Tenable provides report templates through the Tenable Security Center feed. For a complete index of
Tenable-provided report templates, see the Tenable Security Center Report Templates blog.
l Manage Reports
l Report Images
Manage Reports
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
On the Reports page of Tenable Security Center, you can manage report definitions and launch
reports. For more information, see Reports.
To manage reports:
- 695 -
l Manage filters for a non-chapter report.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
l If you want to create a CyberScope, DISA ARF, or DISA Consolidated ARF report, create report
attributes as described in CyberScope and DISA Report Attributes.
4. In the Other section, click a report tile. For more information, see Report Templates.
- 696 -
5. Configure the options for the report.
Tenable Security Center displays options relevant to the report format you selected.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
Template reports are formatted reports that can be customized using chapter and target
selections. For more information, see Reports.
l In the Search Templates box in the top right corner of the page, search for a specific
template by keyword.
Tip: After the initial search, you can limit search results by template category.
l In the Common section, click a template category to view the related templates. For
more information, see Report Templates.
- 697 -
Note: Each template description specifies which Tenable Security Center data must be available to
obtain a complete report. For more information, see Data Required for Template-Based Reports.
6. (Optional) In the Chapters section, select which chapters from the template you want to
include in your report. By default, the report includes all chapters from the template.
To return to this setting, click All Systems in the Targets drop-down box.
b. In the IP Addresses box, type the IP address or addresses where you want the report to
focus. Use commas to separate multiple addresses.
Note: You cannot modify any information in the Details section of the page.
9. Click Add.
Tenable Security Center creates a report based on the template and displays the Reports
page. The new report appears as the last entry in reports table.
- 698 -
10. (Optional) Modify report options that are common to both custom and template reports. For
more information, see Report Options.
For example, the default value for the Schedule option for all template-based reports is On
Demand. If you want to run the report automatically, modify the Schedule option for the
report.
11. (Optional) Customize the report outline, as described in Edit a Report Outline.
For example, you might want to use text elements to add your business context to template-
based chapters.
Each report template description contains icons that represent which types of data must be
available on Tenable Security Center to obtain a complete report.
Asset Required Configure an IPv4/IPv6 repository and store scan results in the
repository; see Local Repositories and IPv4/IPv6 Repositories.
Audit File
Required Upload audit files and add them to your scan policy; see Audit
Compliance Files and Scan Policies.
Data Required
Local Checks Configure and run credentialed scans; see Active Scans.
Required
Mobile Data Configure a mobile repository and store scan results in the
Required repository; see Mobile Repositories.
Active Data Configure a Tenable Nessus scanner and run active scans. For
Required more information, see Tenable Nessus Scanners and Active
Scans.
- 699 -
Event Data Configure a Tenable Log Correlation Engine server; see
Required Tenable Log Correlation Engines.
Report Templates
Tenable Security Center provides a selection of report templates and customizable report formats.
You can configure a Tenable-provided report template or you can create a fully customized report
from one of the available formats. For more information, see Reports.
For a complete index of Tenable-provided report templates, see the Tenable Security Center Report
Templates blog.
Template Description
Common
Discovery Reports that aid in trust identification, rogue detection, and new device
& Detection discovery.
Executive Reports that provide operational insight and metrics geared towards
executives.
Security Industry Reports related to trends, reports, and analysis from industry leaders.
Trends
Threat Detection Reports that aid with identifying vulnerabilities and potential threats.
& Vulnerability
Assessments
Other
PDF Create a Portable Document Format (PDF) report that can be viewed
universally.
CSV Create a Comma Separated Values (CSV) report that can be imported
- 700 -
into spreadsheets or databases.
DISA ARF (Requires Report Generation configuration) Create a report that meets
the standards of the Defense Information Systems Agency Assessment
Results Format (DISA ARF).
DISA Consolidated (Requires Report Generation configuration) Create a report that meets
ARF the standards of the Defense Information Systems Agency Consolidated
Assessment Results Format (DISA Consolidated ARF).
DISA ASR (Requires Report Generation configuration) Create a report that meets
the standards of the Defense Information Systems Agency Assessment
Summary Results (DISA ASR).
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
In Tenable Security Center, you can edit both custom reports and reports based on templates.
2. In the reports table, click the name of the report you want to edit.
-or-
Right-click the row for the report you want to edit, and click Edit.
3. In the reports table, click the name of the report you want to edit.
-or-
- 701 -
Right-click the row for the report you want to edit, and click Edit.
Note: Tenable Security Center displays options relevant to the report type.
Report Options
In Tenable Security Center, you can configure the options described below for both custom and
template reports. For information on how to create reports, see Create a Custom Report and Create
a Template Report.
The option descriptions on this page are grouped as they appear on the Add Report and Edit
Report pages. In the options tables, the Relevant Reports column specifies which report types use
each option.
Note: Tenable Security Center classifies a template-based report as a PDF report. You can
configure the same options for that report as you can for a PDF report.
During template report creation, Tenable Security Center set these options to default values.
You can change these options for a template report only after creation is complete.
l General Options
l Report Options
l Definition Options
l Display Options
l Distribution Options
General Options
- 702 -
Relevant
Option Description
Reports
Schedule Determines how often the report runs. Options are On Any
Demand, Now, Once, Daily, Weekly, or Monthly. When
you select a frequency from the drop-down box,
Tenable Security Center displays additional options for
the selected time frame.
Attribute Sets Predefined operational attributes that add required DISA ARF, DISA
information to DISA ARF, DISA Consolidated ARF, or Consolidated
CyberScope report types. The drop-down box displays ARF,
only the attribute set defined for the report you are CyberScope
currently creating.
ASR Content When creating a report, this drop-down box offers a DISA ASR, DISA
selection of Benchmark, IAVM, CVE, or Plugin ID to be Consolidated
included. ARF
ASR Record This drop-down box determines the format (Summary DISA ASR
Format or Detail) of the DISA ASR report.
Include ARF When enabled, allows for the inclusion of a DISA DISA ASR
attribute set for the report.
Benchmarks Benchmarks are generated after a scan using certain DISA ASR, DISA
audit files that have been successfully run against at Consolidated
least one target system. ARF,
CyberScope
Report Options
- 703 -
Relevant
Option Description
Reports
Style A compound value that specifies the report style, paper size, PDF
and orientation. For example, Plain, Letter
l Portrait — vertical
l Landscape — horizontal
Include Cover Include a cover page in the report. Cover pages include: PDF
Page
- 704 -
Relevant
Option Description
Reports
l a cover logo
Cover Logo Specifies which image to use for the lower-left footer logo PDF
on the cover page of the report. The default logo is the
Tenable logo. To add a custom logo, see Report Images.
Note: The Plain report style suppresses this footer logo on the
cover page.
Footer Logo Specifies which image to use for the lower-left footer logo PDF
on all pages except the cover page. The default logo is the
Tenable logo. To add a custom logo, see Report Images.
Watermark Specifies a watermark for each page of the report. The PDF
default is no watermark. To add a custom watermark, see
Report Images.
- 705 -
Relevant
Option Description
Reports
Encrypt PDF Protect the PDF with a password and 256-bit Advanced PDF
Encryption Standard (AES) encryption. When enabled, the
Password text box appears. Enter a password to use to
open the report and view its contents.
Definition Options
Tenable Security Center displays definition options relevant to the report or report element type.
Query A list of predefined queries you can use to CSV, DISA ARF, DISA
retrieve data for the report. For more information, Consolidated ARF,
see Queries. DISA ASR,
CyberScope;
Iterator, Table, and
Chart elements in
PDF
Type The type of data to include in the report. CSV; Iterator, Table,
and Chart elements
in PDF
Source The source of the data to include in the report. CSV, DISA ARF, DISA
Consolidated ARF,
For CSV reports, valid values for this field differ
- 706 -
Option Description Relevant Reports
- 707 -
Option Description Relevant Reports
Tool Select the tool Tenable Security Center uses to CSV; Iterator, Table,
analyze the data in the report. and Chart elements
in PDF
Filters Specifies additional criteria to refine report data. CSV, DISA ARF, DISA
For more information, see Manage Filter Consolidated ARF,
Components for a Non-Chapter Report. DISA ASR,
CyberScope;
Iterator, Table, and
Chart elements in
PDF
Find/Update This option appears after you add at least one PDF
Filters chapter to the report.
Display Options
These options allow you to specify column format information format. A selection to define the
columns and number of results to appear in the report is then available for configuration.
- 708 -
Option Description Relevant Reports
Results The number of results included in the CSV file. CSV; Iterator, Table, Bar
Displayed Chart, and Pie Chart
elements in PDF
Sort Column The column that Tenable Security Center uses CSV; Iterator, Table, Bar
to sort results in the CSV file. Chart, and Pie Chart
elements in PDF
Available columns depend on:
Sort The sort direction for results in the CSV file. CSV; Iterator, Table, Bar
Direction Chart, and Pie Chart
elements in PDF
Display The columns included in the results file. CSV; Iterator, Table, Bar
Columns Available columns depend on Definition Chart, and Pie Chart
options you select. elements in PDF
Distribution Options
Distribution options specify the actions Tenable Security Center takes when a report run
completes.
Relevant
Option Description
Reports
Email Users Select Tenable Security Center users to whom Tenable Any
Security Center emails the completed report. The drop-down
list includes only users with defined email addresses.
- 709 -
Relevant
Option Description
Reports
Email Add Bcc email addresses where Tenable Security Center Any
Addresses emails the completed report. You can specify multiple email
(bcc) addresses, separated by commas.
Share Allows you to select which Tenable Security Center users Any
within your organization can view the completed report in
Tenable Security Center. Use this option if organizational
policies prohibit emailing potentially sensitive data.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
In Tenable Security Center, the report outline allows you to modify the structure of a PDF or
template-based report.
- 710 -
1. In the left navigation, click Reporting > Reports.
2. In the reports table, click the name of the report you want to edit.
-or-
Right-click the row for the report you want to edit, and click Edit.
l Expand or collapse elements nested in the outline by clicking Collapse All or Expand All
at the top of the outline.
l Delete a report element by clicking the delete icon next to the element.
Note: Tenable Security Center does not ask you to confirm this deletion. However, the
deletion is not final until you save all changes to the report.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
In Tenable Security Center, you can add custom chapters to PDF or template-based reports.
- 711 -
To add a custom chapter to a report definition:
2. In the reports table, click the name of the report you want to edit.
-or-
Right-click the row for the report you want to edit, and click Edit.
The report outline appears. This outline is, by default, expanded. For more information, see
Edit a Report Outline.
Tip: If the report contains multiple chapters or sections, scroll down to locate the bottom navigation
bar. It can also be helpful to click Collapse All on the top navigation bar to collapse the outline to its
highest-level components.
6. In the Location box, select a relative location for the chapter within the report.
8. Click Submit.
Tenable Security Center adds the chapter to the report and displays the Edit Report page.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
- 712 -
In Tenable Security Center, you can add template chapters to template reports and custom PDF
reports.
2. In the reports table, click the name of the report you want to edit.
-or-
Right-click the row for the report you want to edit, and click Edit.
The report outline appears. This outline is, by default, expanded. For more information, see
Edit a Report Outline.
l In the Search Templates box in the top right corner of the page, search for a specific
template by keyword.
Tip: After the initial search, you can limit search results by template category.
6. Click the report template that contains chapters you want to include in your custom report.
- 713 -
b. Do one of the following:
l
In the Focus section, target all systems in the report.
This is the default setting. To return to this setting, click All Systems in the
Targets drop-down box.
l
Target specific assets in the report.
i. In the Targets drop-down box, click Assets.
l
Target specific IP addresses in the report.
i. In the Targets drop-down box, click IP Addresses.
ii. In the IP Addresses box, type the IP address or addresses where you want
the report to focus. Use commas to separate multiple addresses.
l
Target specific repositories in the report.
i. In the Targets drop-down box, click Repositories.
8. Click Add.
Tenable Security Center adds the template chapter or chapters to your custom report and
displays the Add Report page again.
c. In the Location box, change the relative location for the chapter within the report.
- 714 -
d. In the Style box, select a style for the chapter.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can add or edit elements within chapters or grouping elements in Tenable Security Center
reports.
2. In the reports table, click the name of the report you want to edit.
-or-
Right-click the row for the report you want to edit, and click Edit.
The report outline appears. This outline is, by default, expanded. For more information, see
Edit a Report Outline.
l Click Add Element next to the element where you want to add the element.
l Click the edit icon next to the element you want to change.
Tip: To display Add Element or the edit icon, hover the cursor over the element.
- 715 -
l Grouping
l Text
l Charts
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
Relevant
Type Description
Reports
Iterator Allows you to specify how the report groups its data. For PDF
example, if an Iterator Type of Port Summary is chosen for a
vulnerability report, vulnerability data in the report is grouped by
detected ports. If you do not configure an iterator, hosts and
vulnerabilities are listed in the report individually.
2. In the reports table, click the name of the report you want to edit.
-or-
Right-click the row for the report you want to edit, and click Edit.
- 716 -
The report outline appears. This outline is, by default, expanded. For more information, see
Edit a Report Outline.
Tip: To display Add Element, hover the cursor over the element.
l
Add a group to the report.
a. In the Grouping section, click the Group icon.
Option Action
l
Add a section to the report.
a. In the Grouping section, click the Section icon.
Option Action
l
Add an iterator to the report.
a. In the Grouping section, click the Iterator icon.
- 717 -
Option Action
General
Definition
Valid values for this field differ based on the setting of the
Type option:
- 718 -
a. Click one of the predefined date ranges, or
click Custom Range and enter starting and
ending days for the range.
- 719 -
Displayed iteration.
Sort Column Select the column that Tenable Security Center uses to
sort the iteration data.
Sort Direction Select the sort direction for the iteration data.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
Relevant
Type Description
Reports
Paragraph Descriptive text that can be inserted anywhere in the report. PDF
Use this option to describe table elements or report output
for the viewer.
- 720 -
To configure a text element in a report:
2. In the reports table, click the name of the report you want to edit.
-or-
Right-click the row for the report you want to edit, and click Edit.
The report outline appears. This outline is, by default, expanded. For more information, see
Edit a Report Outline.
l Click the edit icon next to the element to edit an existing element.
Tip: To display Add Element and the edit icon, hover the cursor over the element.
l
Add a paragraph to the report.
a. In the Text section, click the Paragraph icon.
Option Action
- 721 -
Style Select a style for the element.
l
Add an Assurance Report Card to the report.
a. In the Text section, click the Assurance Report Card icon.
Option Action
Assurance Select the Assurance Report Card (ARC) you want to add to
Report Card the report. For more information on ARCs, see Assurance
Report Cards.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
A matrix element is a type of text element you can insert into a Tenable Security Center report
definition. For more information on text elements, see Configure a Text Element in a Report.
2. In the reports table, click the name of the report you want to edit.
- 722 -
-or-
Right-click the row for the report you want to edit, and click Edit.
The report outline appears. This outline is, by default, expanded. For more information, see
Edit a Report Outline.
l
Add a new element.
a. Click Add Element.
l Click the edit icon next to the element you want to change.
Tip: To display Add Element and the edit icon next to an element, hover the cursor over the
element.
Option Action
6. In the Cells section, select the number of columns and rows you want the matrix to include.
By default, the matrix is 4 cells by 4 cells.
- 723 -
8. Do one of the following:
l
Edit a row or column header.
a. Click the header for the row or column you want to edit.
e. Click Submit.
l
Add a matrix component.
a. Click the matrix cell where you want to add the component.
b. In the Data Type drop-down box, select the type of data for the component.
c. In the Type drop-down box, select the type of calculation you want the component
to perform.
e. (Optional) In the Filter box, add or edit a filter using the same steps you would to
add a filter to a report element; see Manage Filter Components for a Single
Element.
-or-
l
Copy a row or column.
a. Click the header for the row or column you want to copy.
- 724 -
The actions menu appears.
c. Click Copy.
For columns, Tenable Security Center inserts the copied column to the right of the
original column
For rows, Tenable Security Center inserts the copied row under the original row.
l
Delete a row or column.
a. Click the header for the row or column you want to delete.
Example
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
A table element is a type of text element you can insert into a Tenable Security Center report
definition. For more information on text elements, see Configure a Text Element in a Report.
- 725 -
1. In the left navigation, click Reporting > Reports.
2. In the reports table, click the name of the report you want to edit.
-or-
Right-click the row for the report you want to edit, and click Edit.
The report outline appears. This outline is, by default, expanded. For more information, see
Edit a Report Outline.
l
Add a new element.
a. Click Add Element.
l Click the edit icon next to the element you want to change.
Tip: To display Add Element and the edit icon next to an element, hover the cursor over the
element.
Option Action
Option Description
- 726 -
Type
Query
Source Equivalent to the Definition option of the same name in Report Options.
Tool
Filters
Option Description
Results
Displayed
Sort Column Equivalent to the Display option of the same name in Report
Options.
Sort Direction
Display Columns
Example
- 727 -
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
Relevant
Option Description
Reports
Bar Chart Click to add a bar chart element to the report. PDF
Pie Chart Click to add a pie chart element to the report. PDF
- 728 -
Relevant
Option Description
Reports
Line charts are defined by time (x-axis) and series data (y-axis).
When selecting the time, available options include Relative time
and Absolute time. One or more series data elements can be
chosen and displayed as discrete lines for easy comparison.
Area charts are defined by time (x-axis) and series data (y-axis).
When selecting the time, available options include Relative time
and Absolute time. One or more series data elements can be
chosen and displayed as a stackable view for easy comparison.
2. In the reports table, click the name of the report you want to edit.
- 729 -
-or-
Right-click the row for the report you want to edit, and click Edit.
The report outline appears. This outline is, by default, expanded. For more information, see
Edit a Report Outline.
l
Add a chart element
a. Click Add Element to add an element.
b. In the Charts section, click the icon for the type of chart you want to add.
Tip: To display Add Element and the edit icon, hover the cursor over the element.
Option Action
6. For bar charts and pie charts, configure the following Data options:
Option Action
- 730 -
Type
Query
Equivalent to the option the Definition option of the same name in Report
Source
Options.
Tool
Filters
7. For line charts and area charts, configure the following Data options:
Option Action
Data Valid values are Relative and Absolute. Use to configure the x-axis of the
Type chart.
l If you select Absolute for Data Type, select a specific start and end
date for the data.
Series Use to configure the y-axis of the chart. Line charts and area charts require
that you configure at least one series.
8. For bar charts and pie charts, configure the following Display options:
Option Action
Results
Displayed
Sort Column Equivalent to the Display option of the same name in Report
Options.
Sort Direction
Display Columns
- 731 -
Reorder Report Chapters and Elements
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
In Tenable Security Center, you can reorder chapters and elements in a PDF, CSV, or template-
based report.
2. In the reports table, click the name of the report you want to edit.
-or-
Right-click the row for the report you want to edit, and click Edit.
The report outline appears. This outline is, by default, expanded. For more information, see
Edit a Report Outline.
l In the report outline, click the report element, then drag and drop it to its new location.
l Click the edit icon for the component, and select a new location in the Location drop-
down box.
You can manage filters for a single element or for multiple elements at the same time. For more
information, see:
- 732 -
l Manage Filter Components for a Single Element
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
Tip: You can build filters using one or more filter components with defined filter component criteria. Filter
components are types of data (e.g., CVE ID or Severity). After you select a filter component, you specify
the filter component criteria (e.g., a specific CVE ID or a specific severity level).
To manage filter components for a single element in a chapter report in Tenable Security
Center:
2. In the reports table, click the name of the report you want to edit.
-or-
Right-click the row for the report you want to edit, and click Edit.
The report outline appears. This outline is, by default, expanded. For more information, see
Edit a Report Outline.
4. Click the edit icon next to the element you want to edit.
Tip: To display icons next to a element, hover the cursor over the element.
- 733 -
5. Do one of the following:
l
Add a filter component.
Use these steps to add one or more filter components to a single element. For
information about the filter components available for vulnerability analysis data or event
analysis data, see Vulnerability Analysis Filter Components or Event Analysis Filter
Components.
Depending on the filter component you selected, Tenable Security Center prompts
you to type the value you want to filter for or to select from valid values and
operators.
Note: If Tenable Security Center does not prompt you to specify an operator, the
unstated operator is equivalent to is equal to or is set to.
d. Click the check mark next to the filter component to stop editing it.
Note: The new filter component is not saved until you click Submit.
l
Edit a filter component.
a. In the Data section, click the pencil icon next to the filter component.
c. Click the check mark next to the filter component to stop editing it.
Note: Your changes to the filter are not saved until you click Submit.
l
Delete a filter component.
In the Data section, click the delete icon next to the filter component.
- 734 -
Note:Tenable Security Center does not prompt you to confirm the deletion. However, the
deletion is not final until you click Submit to save your changes.
6. Click Submit.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
When managing filter components for a chapter report in Tenable Security Center, you can search
the report for elements that use certain filter components, then update the filter component
criteria for all matching elements in that report at the same time.
Tip: You can build filters using one or more filter components with defined filter component criteria. Filter
components are types of data (e.g., CVE ID or Severity). After you select a filter component, you specify
the filter component criteria (e.g., a specific CVE ID or a specific severity level).
You can use the following filter components to search and update: Address, Audit File, Asset, CVE
ID, DNS Name, IAVM ID, Repositories, Scan Policy, and Severity.
For example, if you search a report definition for all elements where the Severity filter component
is set to Info, you can update the Severity filter component to Medium for all elements, and add an
Audit File filter component to the elements at the same time.
2. In the reports table, click the name of the report you want to edit.
-or-
Right-click the row for the report you want to edit, and click Edit.
- 735 -
The report outline appears. This outline is, by default, expanded. For more information, see
Edit a Report Outline.
Tenable Security Center searches the report outline for elements that match your search
criteria and displays the results in the Matching Filters box.
4. Type filter component criteria or select a value from the list of valid filter values, as
appropriate to the filter component and operator you selected.
1. In the Matching Filters box, review the list to verify that you want to apply the update to all
the listed elements.
Tip: If you do not want to apply the current update to all the listed elements, it may be more
appropriate to manage filter components by individual element. For more information, see Manage
Filter Components for a Single Element.
- 736 -
2. Click Update Filters.
Tenable Security Center applies the updates to the matching elements and returns you to the
report outline.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
In Tenable Security Center, CSV, DISA ARF, DISA ASR, and Cyberscope reports do not use a chapter
structure, so you can create a set of filter components that apply to every element of the report.
Tip: You can build filters using one or more filter components with defined filter component criteria. Filter
components are types of data (e.g., CVE ID or Severity). After you select a filter component, you specify
the filter component criteria (e.g., a specific CVE ID or a specific severity level).
2. In the reports table, click the name of the report you want to edit.
-or-
Right-click the row for the report you want to edit, and click Edit.
l
Add a filter component.
Use these steps to add one or more filter components to a single element. For
information about the filter components available for vulnerability analysis data or event
analysis data, see Vulnerability Analysis Filter Components or Event Analysis Filter
Components.
- 737 -
a. In the Definition section, click Add Filter.
Depending on the filter component you selected, Tenable Security Center prompts
you to type the value you want to filter for or to select from valid values and
operators.
d. Click the check mark next to the filter component to stop editing it.
Note: The new filter component is not saved until you click Submit.
l
Edit a filter component.
a. In the Definition section, click the edit icon next to the filter component.
c. Click the check mark next to the filter component to stop editing it.
Note: Your changes to the filter component are not saved until you click Submit.
l
Delete a filter component.
In the Definition section, click the delete icon next to the filter component.
Note:Tenable Security Center does not prompt you to confirm the deletion. However, the
deletion is not final until you click Submit to save your changes.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
- 738 -
1. In the left navigation, click Reporting > Reports.
2. In the row for the report definition you want to view, click the menu.
3. In the table, right-click the row for the report definition you want to view.
4. Click View.
Note: If you want to edit or delete the report definition from this page, see Edit a Report Definition
or Delete a Report Definition.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can share a copy of a report definition with other users in your organization in Tenable Security
Center. This feature is useful for maintaining consistency throughout your organization.
After you share the copy, the other users own their local copy and can edit or delete as with any
report they create themselves. Later changes you make to the original do not synchronize
automatically to the copy.
2. In the table, right-click the row for the report definition you want to copy.
3. Click Copy.
- 739 -
4. In the Group box, select the group you want to grant access to a copy of the report.
5. Specify the user(s) that you want to grant access to a copy of the report.
6. Click Copy.
Tenable Security Center copies the report definition to the other accounts you specified. The
copy appears, named Copy of DefinitionName.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
In Tenable Security Center, you can export a report definition as an .xml file. This feature is useful
for organizations running multiple Tenable Security Center deployments to provide consistent
reports without duplicating the work needed to create definition templates.
2. In the table, right-click the row for the report definition you want to export.
3. Click Export.
- 740 -
4. Click the export option you want to use:
Option Description
Keep All Export the report definition with object references intact.
References
Users who meet the following requirements can use an imported
report definition with intact object references:
l The user must have access to all relevant objects in the report
definition.
Remove All Export the report definition with object references removed, altering
References the definitions of the components.
Replace With Export the report definition with object references replaced with
Placeholders their respective names.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
In Tenable Security Center, you can only import XML files in the same format used to export report
definitions. This feature is useful for organizations running multiple Tenable Security Center
deployments to provide consistent reports without duplicating the work needed to create definition
templates.
- 741 -
1. Copy the report definition file to your local computer.
7. Click Import.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
a. In the table, right-click the row for the report definition you want to delete.
a. In the table, select the check box for each report definition you want to delete.
3. Click Delete.
- 742 -
Tenable Security Center deletes the report definition.
Note: Tenable Security Center retains any report results associated with the deleted definition. You
must manually delete results associated with the report.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
2. In the table, right-click the row for the report you want to launch.
-or-
Select the check box for the report you want to launch.
3. Click Launch.
4. (Optional) Monitor the status of the report in the Report Results page.
Note: In the Report Results page, you can also stop the currently running report.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
After you create one or more on demand reports, you can add them to active scan, agent scan, or
agent synchronization job configurations.
- 743 -
To add a preconfigured report to an active scan, agent scan, or agent synchronization job:
4. (Optional) If you want the report to include cumulative data in Tenable Security Center, enable
the Create report using cumulative data option.
If you disable this option, the report includes data only from the configured scan.
6. (Optional) If you want to add multiple reports, repeat steps 2-5 for each additional report.
7. Click Submit.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
On the Report Results page of Tenable Security Center, you can manage both currently running
reports and completed report results. Completed report results include successful and failed report
runs, so you can access and distribute a successful report result or troubleshoot a report failure.
For more information, see Reports.
- 744 -
1. Click Reporting > Report Results.
l Share a copy of a successful result with other Tenable Security Center user accounts.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
2. Right-click the row for the report you want to stop, and click Stop.
Note: You cannot restart a stopped report run. You can only launch the report again.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
- 745 -
To download a successful report result to your computer:
a. Click Export.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
2. Right-click the row for the report result you want to view.
3. Click View.
- 746 -
Publish a Report Result
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
2. Right-click the row for the report result you want to publish.
3. Click Publish.
5. Click Publish.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
2. Right-click the row for the report result you want to email.
3. Click Email.
- 747 -
l Use the Group and User boxes to select the Tenable Security Center user or users you
want to receive the report result.
l Type the email address of recipients who are not Tenable Security Center users.
5. Click Submit.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
To share a copy of a successful report result with other Tenable Security Center user
accounts:
2. Right-click the row for the report result you want to copy.
3. Click Copy.
4. In the Group box, select the group you want to grant access to a copy of the report result.
5. Specify a user or users that you want to grant access to a copy of the report result.
6. Click Copy.
Tenable Security Center copies the report result to the other accounts you specified. The
copy appears, named Copy of ResultName.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
- 748 -
1. Click Reporting > Report Results.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
2. Right-click the row for the report result you want to delete.
3. Click Delete.
Configure the following options, including options specific for your attribute type: CyberScope
Options or DISA Options.
- 749 -
General Option Description
Type The type of attribute you want to create. Your Type selection determines the
other options you must configure: CyberScope Options or DISA Options.
CyberScope Options
The following table describes the additional options to configure when configuring a CyberScope
attribute.
Option Description
Component The CyberScope value for a FISMA reporting entity within the Reporting
Bureau Component (e.g., Justice Management Division).
Enclaves The CyberScope value for an enclave associated with the Reporting
Component or Component Bureau.
DISA Options
The following table describes the additional options to configure when configuring a DISA attribute.
Option Description
Owning Unit
Owning Service
- 750 -
Option Description
Current AOR The COAMS fully qualified hierarchy name of the appropriate
combatant command area of responsibility (COCOM AOR).
Administration Unit
Administration POC
Any required information you need to provide about the administration unit's point of contact
(POC).
System Affiliation The COAMS operationalacredit value that specifies the fully
qualified hierarchy name of the system affiliation.
Location
Tip: Tenable recommends leaving all options blank except the Street Address. The Street Address
specifies the COAMS geolocation area.
Report Images
In Tenable Security Center, the Report Images interface allows a user with permissions to view
details, add, edit, or delete PDF report images. From this interface, you can manage two types of
images: logos and watermarks. Logos appear at the bottom of each page, while watermarks appear
prominently across the center of the report page.
- 751 -
Note: Image files must be of type .png or .jpg. Images used must be consistent when selecting the bit
depth (8-bit, 16-bit, 24-bit, etc.). Otherwise, errors might be encountered when generating reports.
Add Add a new logo or watermark image. Note that only PNG and JPEG formats are
supported. The default image sizes are as follows, all at 300 DPI:
l default-cover-logo = 987x130
l default-footer-logo = 380x100
l default-page-logo = 579x84
l default-watermark = 887x610
While there are no set limitations on image size or resolution, using images that
are different from these specifications can have a negative impact on report
appearance.
Note: The image size must be set to 300 DPI to prevent image breaks.
Edit Edit any of the selected image’s options, including name, description, type and
file.
Detail View image details, including name, description, date uploaded, last modified,
and type.
- 752 -
Organizational users with appropriate permissions can add a template-based ARC using Tenable-
provided templates or you can add a custom ARC. For more information about Tenable-provided
ARC templates, see the Assurance Report Cards blog. For more information about user
permissions, see User Roles.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can use a Tenable-provide template to add an Assurance Report Card (ARC). For more
information about Tenable-provided ARC templates, see the Assurance Report Cards blog. To
create a custom ARC, see Add a Custom Assurance Report Card.
- 753 -
3. At the top of the table, click Add.
5. Click a template.
The Add Assurance Report Card Template page updates to reflect the template you selected.
6. Modify the ARC template. For more information, see Assurance Report Card Options.
l To edit the required assets, click an item in the Required Assets section.
l To restrict the target data displayed in the ARC, click the Targets drop-down box.
l To set how often the ARC polls data sources to obtain updates, click Schedule.
7. Click Add.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can create a fully customized Assurance Report Card (ARC). To add an ARC from a Tenable-
provided template, see Add a Template-Based Assurance Report Card.
- 754 -
3. In the Options drown-down box, click Advanced Add.
4. Configure the ARC options. For more information, see Assurance Report Card Options.
5. Click Submit.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can view a summary that displays each Assurance Report Card (ARC), the overall status of the
ARC, and the status of each policy statement in each ARC. To view details for an ARC, see View
Details for an Assurance Report Card.
Tip: To change the position of an ARC in the list, click the icon next to the ARC and drag it to a new
position.
- 755 -
l A green icon ( ) next to an ARC indicates all policy statement in the ARC passed.
l A red icon ( ) next to an ARC indicates one or more policy statements in the ARC failed.
l A green check mark ( ) next to a policy statement indicates the policy statement
passed.
What to do next:
l (Optional) Click a policy statement to view vulnerability analysis for the policy statement data.
For more information, see Vulnerability Analysis.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
5. Click View.
- 756 -
The View Assurance Report Card page appears. For more information, see Assurance Report
Card Options.
Section Action
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
- 757 -
1. Log in to Tenable Security Center via the user interface.
6. Modify the ARC options. For more information, see Assurance Report Card Options.
7. Click Submit.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can share access to an Assurance Report Card (ARC) to give users in a group the ability to view
the ARC. The user's role and custom permissions determine if they can drill down into other pages
with more information. For more information, see Assurance Report Cards.
- 758 -
The Assurance Report Cards page appears.
5. Click Share.
6. In the box, search for and select the groups for which you want to share or revoke access.
7. Click Submit.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can export an Assurance Report Card (ARC) to share with other users in your organization. For
more information, see Assurance Report Cards.
- 759 -
4. To export a single ARC:
a. In the table, right-click the row for the ARC you want to export.
a. In the table, select the check box for each ARC you want to export.
5. Click Export.
Option Description
l The user must have access to all relevant objects in the ARC.
Remove All Export the ARC with object references removed, altering the
References definitions of the components.
Any user can use an imported ARC with object references removed.
Replace With Export the ARC with object references replaced with their respective
Placeholders names.
- 760 -
Tenable Security Center exports the ARC as an .xml file.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
5. Click Copy.
Tenable Security Center copies the ARC. The copy appears, named Copy of ARC Name.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
- 761 -
1. Log in to Tenable Security Center via the user interface.
a. In the table, right-click the row for the ARC you want to delete.
a. In the table, select the check box for each ARC you want to delete.
5. Click Delete.
6. Click Delete.
General
- 762 -
Option Description
Schedule Specifies how often the ARC polls data sources to obtain updates.
l Daily (default) — The ARC polls data sources every 1-20 days at the
specified time.
l Weekly — The ARC polls data sources every 1-20 weeks at the
specified time and day of the week.
l Monthly — The ARC polls data sources every 1-20 months at the
specified time and day of the month.
For example, Every 2 months on the fourth Thursday at 15:00 -4:00 indicates
the ARC will poll data sources to obtain updates every two months, on the
fourth Thursday of the month, at 15:00 in the America/New York timezone.
Policy Statements
Add Policy Click to add a custom policy statement to the ARC. For more information,
Statement see Policy Statement Options.
Focus
Tip: Use NOT, OR, and AND operators to exclude unwanted assets from
the view.
- 763 -
Option Description
Basic
Display Specifies how the ARC displays the policy statement: Ratio (x/y),
Percentage (%), or Compliant/Non-Compliant.
Advanced
Data Type The type of data you want the ARC to analyze: Vulnerabilities or Events.
Base Filters The filters used as the basis for data analysis.
l If the Data Type is Vulnerabilities, you can select from the list of
vulnerability analysis filter components.
l If the Data Type is Events, you can select from a list of event analysis
filter components.
Compliant The filters used to determine the compliance conditions for the data analysis.
Filters For more information, see Vulnerability Analysis and Event Analysis.
l If the Data Type is Vulnerabilities, you can select from the list of
vulnerability analysis filter components.
l If the Data Type is Events, you can select from a list of event analysis
filter components.
- 764 -
Option Description
Note: Filters set in Base Filters are not present in Compliant Filters, with
exception of the Assets and Plugin IDs. All filters set in Base Filters are carried
over into Compliant Filters.
Compliant Specifies the conditions to match for determining compliance. For more
Condition information, see Vulnerability Analysis and Event Analysis.
Specify a quantity: All, No, Any, > (greater than), < (less than), >= (greater than
or equal to), and <= (less than or equal to).
Drilldown The filters to apply when clicking on the ARC policy statement for more
Filters details. For more information, see Vulnerability Analysis and Event Analysis.
l If the Data Type is Vulnerabilities, you can select from the list of
vulnerability analysis filter components.
l If the Data Type is Events, you can select from a list of event analysis
filter components.
Filters
You can apply filters on many pages of the Tenable Security Center web interface to filter the data
displayed on the page.
You can build filters using one or more filter components with defined filter component criteria.
Filter components are types of data (e.g., CVE ID or Severity). After you select a filter component,
you specify the filter component criteria (e.g., a specific CVE ID or a specific severity level).
If you want to save a filter for repeated use, create a query, as described in Queries.
l Apply a Filter
l Filter Components
- 765 -
l Event Analysis Filter Components
Apply a Filter
You can use filters to narrow the data displayed on specific pages.
Each filterable page in Tenable Security Center has a different set of filter components. On the
Vulnerabilities, Events, and Mobile pages, you can add and remove filter components.
To filter data:
a. Click Customize.
- 766 -
b. Select one or more filter component check boxes. For more information about the
components supported for your analysis view, see
c. Click Apply.
The filter panel updates to show the filter components you selected.
5. To modify the criteria for a filter component, click the box for the filter component.
7. Click OK.
The filter panel updates to show the filter component criteria you modified.
8. Click Apply.
What to do next:
l (Optional) Save a filter on the Vulnerabilities page, Events page, and Mobile page as a
reusable query, as described in Add or Save a Query.
Filter Components
For general information about using filters, see Filters.
Filter
Description
Component
For example, set the filter to show only the credentials you can edit.
l Usable — Shows the objects your user account can view or use.
For example, set the filter to show only the credentials you can use in
a scan.
Actions The alert actions to include in the filter: Email, Notify, Report, Scan,
- 767 -
Filter
Description
Component
SysLog, or Ticket. For more information, see Alerts and Alert Actions.
Agent Scanner The agent scanners to include in the filter. For more information, see
Agent Scanning.
Assignee The ticket assignees to include in the filter. For more information, see
Tickets.
Authorized The Log Correlation Engine Client authorization status to include in the
filter: yes or no.
Client IP The Log Correlation Engine Client IP addresses to include in the filter. For
more information, see Tenable Log Correlation Engine Clients.
Completion The date range for scan results to include in the filter:
Time
l Explicit — Choose start and end dates and times to filter for a
specific date range.
l Last x Hours — Filter for the last 1, 2, 4, 6, 12, 24, 48, or 72 hours.
l Last x Days — Filter for the last 5, 7, 15, 25, 30, 60, 90, 120, or 180
days.
Creator The ticket creators to include in the filter. For more information, see
Tickets.
Data Type The repository data type to include in the filter: Agent, IPv4, IPv6, or
Mobile. For more information, see Repositories.
Date The date range to include in the system log filter (for example, Oct 2021).
For more information, see System Logs.
Filter By The type of plugin data to include in the plugin filter. For more information,
- 768 -
Filter
Description
Component
Finish Time The date range for report results to include in the filter:
l Explicit — Choose start and end dates and times to filter for a
specific date range.
l Last x Hours — Filter for the last 1, 2, 4, 6, 12, 24, 48, or 72 hours.
l Last x Days — Filter for the last 5, 7, 15, 25, 30, 60, 90, 120, or 180
days.
Group The groups to include in the filter. For more information, see Groups.
Host The name of the host to include in the filter. For more information, see
Host.
Initiator The username for a user who initiated a job to include in the filter. For
more information, see Job Queue Events.
Keywords The keywords to include in the system logs filter (for example, login). For
more information, see System Logs.
Log Correlation The Log Correlation Engine servers to include in the filter. For more
Engine Server information, see Tenable Log Correlation Engines.
Module The type of logs to include in the system logs filter. For more information,
see System Logs.
Name The name of the object or user to include in the filter. For example, the
name of a Tenable Nessus scanner or the name of a repository.
Organization The organization to include in the filter. For more information, see
Organizations.
- 769 -
Filter
Description
Component
OS The operating systems to include in the filter. For more information, see
Tenable Log Correlation Engine Clients and Tenable Log Correlation Engine
Client Policies.
Owner The object owners to include in the filter. The object owner is the user who
created an object or inherited objects from a deleted user.
Repositories The repositories to include in the filter. For more information, see
Repositories.
Repository The repository to include in the filter. For more information, see
Repositories.
Role The user roles to include in the filter. For more information, see User
Roles.
Scan Policy The scan policies to include in the filter. For more information, see Scan
Policies.
Schedule The schedules to include in the filter. For more information, see Active
Scan Settings, Agent Scan Settings, Agent Synchronization Job Settings,
and Report Options.
Severity The severity to include in the filter. For more information, see CVSS vs.
VPR.
State The Log Correlation Engine Client state to include in the filter: Alive or
Dead. For more information, see Tenable Log Correlation Engine Clients.
Tags The tags to include in the filter. For more information, see Tags.
Timeframe The date range to include in the notification filter: Last 24 Hours, Last 7
- 770 -
Filter
Description
Component
Type The object type (for example, Active or Agent scan results).
Username The username to include in the filter. For more information, see User
Account Options.
Version The Log Correlation Engine version to include in the filter. For more
information, see Tenable Log Correlation Engines.
Queries
The Queries page displays a list of queries available for use. The information on this page includes
Name, Type, Group, Owner, and the Last Modified time. You can use a filter to narrow the list by
any of the columns (except Last Modified). For more information, see Filters.
l Load a Query
l Query Options
l Edit a Query
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can add queries from the Queries page or from the Vulnerabilities page, Web App Scanning
page, Events page, or Mobile page. For more information about query options, see Queries.
Note: If you want to create a mitigated vulnerabilities query, you must add the query from the
Vulnerabilities page.
- 771 -
1. Log in to Tenable Security Center via the user interface.
5. (Optional) If you want to add a tag, type select a Tag from the drop-down. For more
information, see Tags.
6. Select a Type.
7. Select a Tool.
10. In the filter component criteria box, type or select filter component criteria.
- 772 -
l Click Analysis > Vulnerabilities
7. (Optional) If you want to add a tag, type or select a Tag from the drop-down. For more
information, see Tags.
8. Click Submit.
Load a Query
You can load queries from any page that supports filtering. For more information, see Queries and
Filters.
To load a query:
- 773 -
4. Click Load Query.
6. Click Apply.
Query Options
Queries provide the ability to save custom views of vulnerability, event, ticket, user, and alert data
for repeated access.
Option Description
Tag A tag for the query. For more information, see Tags.
For more information about the filter components for Vulnerability, Event,
and Mobile data types, see Vulnerability Analysis Filter Components, Event
Analysis Filter Components, and Mobile Analysis.
For more information about the filter components for Ticket, User, and
Alert data types, see Ticket-Specific Query Options, User-Specific Query
Options, and Alert-Specific Query Options.
- 774 -
Option Description
- 775 -
Option Description
Last Login Filters against users whose last login was that the timeframe specified.
Timeframe Either specify an explicit timeframe, including the start and end time or
choose one of the predefined periods (e.g., last 15 minutes, last hour, etc.).
Account State Filters against the user account state (locked vs. unlocked).
Option Description
Created Filters against the alert creation timeframe specified. Either specify an
Timeframe explicit timeframe, including the start and end time or choose one of the
predefined periods (e.g., last 15 minutes, last hour, etc.).
Modified Filters against the most recent alert modification timeframe specified.
Timeframe Either specify an explicit timeframe, including the start and end time or
choose one of the predefined periods (e.g., last 15 minutes, last hour, etc.).
- 776 -
Option Description
Last Triggered Filters against the most recent alert trigger timeframe specified. Either
Timeframe specify an explicit timeframe, including the start and end time or choose
one of the predefined periods (e.g., last 15 minutes, last hour, etc.).
Last Evaluated Filters against the most recent alert evaluation timeframe specified. Either
Timeframe specify an explicit timeframe, including the start and end time or choose
one of the predefined periods (e.g., last 15 minutes, last hour, etc.).
Edit a Query
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
To edit a query:
3. In the table, right-click the row for the query you want to edit.
-or-
In the table, select the check box for the query you want to edit.
4. Click Edit.
6. Click Submit.
- 777 -
Workflow Actions
Workflow actions allow organizational users to configure and manage alerting, ticketing, and accept
risk or recast risk rules. These functions allow the user to be notified of and properly handle
vulnerabilities and events as they come in.
For more information, see Alerts, Tickets, Accept Risk Rules, and Recast Risk Rules.
Alerts
Tenable Security Center can be configured to perform actions, such as email alerts, for select
vulnerability or alert occurrences to various users regardless of whether the events correlate to a
local vulnerability or not. Other alert actions include UI notifications, creating or assigning tickets,
remediation scans, launching a report, email notifications, and syslog alerting. Multiple actions can
be assigned for each ticket.
l Alert Actions
l Add an Alert
l Alert Options
l Edit an Alert
l Evaluate an Alert
l Delete an Alert
Alert Actions
Tenable Security Center automatically performs alert actions when an alert triggers. You can
configure the following types of alert actions:
l Assign Ticket
l Email
l Generate Syslog
- 778 -
l Launch Scan
l Launch Report
l Notify Users
Tip: Use email alerts to interface with third-party ticketing systems by adding variables in the message
option.
Assign Ticket
When the alert triggers, Tenable Security Center creates a ticket and assigns the ticket to a user.
For more information, see Tickets.
Email
When the alert triggers, Tenable Security Center sends an email.
Message The body of the email message. You can include the (see
following variables to customize the email: description)
- 779 -
%alertName%, this specifies the name assigned to
the alert (for example, “Test email alert”).
- 780 -
#%alertID%) has triggered.
Recipients
Generate Syslog
When the alert triggers, Tenable Security Center sends a custom message to a syslog server.
- 781 -
Host (Required) The host that receives the syslog alert. --
Port The UDP port used by the remote syslog server. 514
Severity The severity level of the syslog messages (Critical, Notice, or Critical
Warning).
Message (Required) The message Tenable Security Center sends with the --
syslog alert.
Launch Scan
When the alert triggers, Tenable Security Center launches an active scan from an existing active
scan template. The active scan Schedule must be On Demand. For more information, see Active
Scans and Active Scan Settings.
Note: At this time, the Launch Scan alert action does not support web app scans, agent scans, or agent
sync.
Scan (Required) The scan template Tenable Security Center uses for the --
alert scan.
Note: Tenable Security Center scans the host that triggered the scan,
not the host within the scan template. Tenable Security Center uses
the top 100 IP results from the alert query for the scan targets.
Launch Report
When the alert triggers, Tenable Security Center generates a report from an existing report
template. For more information, see Reports.
Notify Users
- 782 -
When the alert triggers, Tenable Security Center displays a notification to the specified users.
Add an Alert
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can configure Tenable Security Center to send alerts for vulnerability occurrences.
For more information about the available options for alerts, see Alert Options.
To add an alert:
3. Click Add.
6. (Optional) Click the Schedule field to select the frequency of alerts, time, timezone, and
whether to repeat sending alerts at the specified time.
7. (Optional) In the Behavior drop-down box, select the condition you want to trigger the alert.
The default is Perform actions only on first trigger.
8. (Optional) In the Type drop-down box, select the data type for the condition.
9. In the Trigger drop-down box, select the trigger for the alerts.
- 783 -
10. (Optional) In the Query drop-down box, select the dataset to compare with the trigger
condition.
11. (Optional) Click Add Filterand provide the details of the selected filter.
12. Click Add Actions to specify an action that occurs when the alert triggers. For more
information, see Alert Actions.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can view the summary details of an alert with the name, behavior, condition applied, status,
created date, owner, and ID.
3. In the table, right-click the row for the alert you want to view.
-or-
In the table, select the check box for the alert you want to view.
4. Click View.
The View Alert page appears. For more information about the following fields, see Alert
Options.
- 784 -
Section Action
Options l To edit the alert, click Edit. For more information, see Edit an
drop-down Alert.
box l To delete the alert, click Delete. For more information, see Delete
an Alert.
l Schedule — The schedule for how often the alert checks for
matching conditions.
l Last Evaluated — The date on which the alert was last evaluated.
l Last Triggered — The date on which the alert was last triggered.
l Last Modified — The date on which the alert was last modified.
- 785 -
Section Action
Alert Options
The following options are available when you create or edit an alert in Tenable Security Center.
Option Description
General
Schedule Specifies how often the alert checks for the conditions to be matched:
Minutely, Hourly, Daily, Weekly, Monthly, or Never.
Behavior Specifies how many times Tenable Security Center performs the alert
actions:
Condition
Type The type of data to use for the condition: Vulnerability, Event, or Ticket.
- 786 -
Option Description
General
l Event Count — Trigger an alert when the event count matches the
given parameters. This option appears when you select Event for the
Type option.
Query The dataset Tenable Security Center uses to determine if trigger conditions
have been met.
Filters Apply advanced filters to the vulnerability or event data. For more
information, see Filters.
Actions
Add Actions Specifies the actions that occur when the alter triggers: Assign Ticket,
Email, Generate Syslog, Launch Scan, Launch Report, or Notify Users. For
more information, see Alert Actions.
Edit an Alert
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
To edit an alert:
- 787 -
3. In the table, right-click the row for the alert you want to edit.
-or-
In the table, select the check box for the alert you want to edit.
6. Click Submit.
Evaluate an Alert
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can submit an alert for evaluation to test whether the alert has met the configured time criteria
or not.
To evaluate an alert:
3. In the table, right-click the row for the alert you want to evaluate.
-or-
In the table, select the check box for the alert you want to evaluate.
- 788 -
4. Click Evaluate.
Tenable Security Center returns the evaluation results for the alert.
Delete an Alert
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
To delete an alert:
3. In the table, right-click the row for the alert you want to delete.
-or-
In the table, select the check box for the alert you want to delete.
5. Click Delete.
Tickets
In Tenable Security Center, you can create tickets manually or automatically using the Alerts
feature. This section describes how to manage your tickets.
- 789 -
l Open a Ticket
l Ticket Options
l Edit a Ticket
Open a Ticket
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can use tickets within Tenable Security Center to coordinate the assessment and remediation
of vulnerabilities and security events.
You can configure a ticket from an analysis page, or from the Tickets page. For more information
about the options to configure, see Tickets.
9. Click Submit.
- 790 -
To open a ticket from the Tickets page:
1. Log in to Tenable Security Center via the user interface.
3. Click Add.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
You can view the summary details of a ticket with the name, status, creator, assignee, history,
queries, description, and ticket notes.
To edit a ticket:
- 791 -
3. In the table, right-click the row for the ticket you want to view.
-or-
In the table, select the check box for the ticket you want to view.
4. Click View.
The View Ticket page appears. For more information, see Ticket Options.
Section Action
Options drop-down l To edit the ticket, click Edit. For more information, see Edit
box a Ticket.
Query Views The query added to help provide context for coming up with a
resolution.
- 792 -
Ticket Options
The following options are available when you create or edit a ticket in Tenable Security Center.
Option Description
General
Status (Available The following ticket statuses become available after a ticket has been
during edit) created and are available from the Edit Ticket page:
l Assigned
l Resolved
l More Information
l Not Applicable
l Duplicate
l Closed
Query Views
Add Query View Click to choose a query for the ticket assignee to help provide context for
- 793 -
Option Description
Edit a Ticket
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
To edit a ticket:
3. In the table, right-click the row for the ticket you want to edit.
-or-
In the table, select the check box for the ticket you want to edit.
5. Modify the ticket options. For more information, see Ticket Options.
6. Click Submit.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
- 794 -
When a ticket is mitigated, you can change the ticket status to Resolved. Once the ticket is
resolved, you can change the status to Closed. Tickets in the Resolved or Closed state can always
be reopened as needed.
To resolve a ticket:
3. In the table, right-click the row for the ticket you want to resolve.
-or-
In the table, select the check box for the ticket you want to resolve.
4. Click Resolve.
5. Change the status to Resolved. Optionally, you can add notes to provide details of the
resolution.
6. Click Submit.
7. To close the ticket, click the resolved ticket name and change the status to Closed.
Tenable Security Center updates the ticket status. Resolved tickets still show up in your ticket
queue with an Active status. Closing a ticket removes the ticket from the Active status filter view,
but does not provide the option to add notes similar to editing a ticket.
- 795 -
The Accept Risk Rules page displays a list of accept risk rules configured in Tenable Security
Center. Organizational users must add accept risk rules before the rules appear on this page. For
more information, see Add an Accept Risk Rule.
Adding a rule moves vulnerabilities from the unfiltered cumulative database view. These
vulnerabilities are not deleted, but only display in the cumulative database vulnerability view if the
Accepted Risk filter option is checked. For more information, see Filters.
Administrator and organizational users can manage accept risk rules. You can access information
on what particular vulnerabilities or hosts have been declared to be accepted and, if noted in the
comments, the reason.
To view details for a rule, click the row. To delete a rule, see Delete an Accept Risk Rule.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
If you create an accept risk rule, Tenable Security Center automatically accepts the risk associated
with any vulnerabilities that match the rule. Risk-accepted vulnerabilities do not appear in a
vulnerability search if your filter excludes Accepted Risk vulnerabilities.
3. In the analysis tools drop-down box, select Vulnerability Detail List, Vulnerability List, or
Vulnerability Summary.
The page refreshes to show the analysis tool view you selected.
- 796 -
To accept risk rule for l Right-click any row for which you want to accept risk and
a single vulnerability select Accept Risk.
To accept risk rule for l Select more than one row and in the toolbar, click
multiple vulnerabilities Accept Risk.
6. (Optional) In the Expires box, select the date you want the accept risk rule to expire.
7. In the Repository section, select one or more repositories where you want to apply the rule.
8. Click Submit.
Note: There can be a short delay between clicking on Submit and vulnerabilities showing the new
risk acceptance. You may need to reload the filters to view the applied changes.
What to do next:
l (Optional) Enable Recast and Accept Risk Rule Comments to display contents of the
Comment field in reports and vulnerability analysis views. For more information, see Risk Rule
Comments.
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
You can delete an accept risk rule to stop accepting the risk associated with a vulnerability.
- 797 -
1. Log in to Tenable Security Center via the user interface.
2. Click Workflow > Accept Risk Rules (Organizational users) or Repositories > Accept Risk
Rules (Administrator users).
a. In the table, right-click the row for the rule you want to delete.
a. In the table, select the check box for each rule you want to delete.
4. Click Delete.
5. Click Delete.
Tenable Security Center stops accepting the risk associated with the vulnerability.
Administrator and organizational users can manage recast risk rules. You can access information on
what particular vulnerabilities or hosts have had risk levels recast, their new severity level and, if
noted in the comments, the reason for the severity change. You can search for rules by Plugin ID or
Repository.
You can set an expiration date for a recast risk rule. When a recast risk rule expires, the severity will
reset based on the following criteria:
- 798 -
l If an administrator has configured Tenable Security Center to use CVSSv3 at the organization
level, and there are CVSSv3 metrics available, the severity level of the vulnerability will return
to the level determined by the CVSSv3 data.
l If an administrator has not configured Tenable Security Center to use CVSSv3, or there are no
CVSSv3 metrics available, the vulnerability will retain the recast severity level. If Tenable
Security Center finds the vulnerability again, the vulnerability will receive the severity level
currently determined by the plugin.
To view details for a rule, click the row. To delete a rule, see Delete a Recast Risk Rule.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
If you create a recast risk rule, Tenable Security Center automatically updates the severity for any
vulnerabilities that match the rule to the severity you specified in the rule.
3. In the analysis tools drop-down box, select Vulnerability Detail List, Vulnerability List, or
Vulnerability Summary.
The page refreshes to show the analysis tool view you selected.
To recast risk rule for a l Right-click any row that you want to recast and select
single vulnerability Recast Risk.
- 799 -
l Select the check box next to the vulnerability that you
want to recast and in the toolbar, click Recast Risk.
To recast rule for l Select more than one row and in the toolbar, click
multiple vulnerabilities Recast Risk.
5. In the New Severity drop-down box, select a new severity for the vulnerability.
7. (Optional) In the Expires box, select the date you want the recast risk rule to expire.
8. In the Repository section, select one or more repositories where you want to apply the rule.
9. Click Submit.
Note: There can be a short delay between clicking on Submit and vulnerabilities showing the new
risk. It may be necessary to reload the filters to view the applied changes.
What to do next:
l (Optional) Enable Recast and Accept Risk Rule Comments to display contents of the
Comment field in reports and vulnerability analysis views. For more information, see Risk Rule
Comments.
Required User Role: Organizational user with appropriate permissions. For more information, see User
Roles.
If you create a recast risk rule, Tenable Security Center automatically updates the severity for any
vulnerabilities that match the rule to the severity you specified in the rule. You can edit the
expiration date of existing recast risk rules.
- 800 -
1. Log in to Tenable Security Center via the user interface.
a. In the table, right-click the row for the rule you want to edit.
a. In the table, select the check box for each rule you want to edit.
4. Click Edit.
5. In the Expires box, select the date you want the recast risk rule to expire.
6. Click Submit.
Required User Role: Administrator or organizational user with appropriate permissions. For more
information, see User Roles.
You can delete a recast risk rule to remove your custom severity for a vulnerability. Then, if Tenable
Security Center sees the vulnerability again, the vulnerability receives the severity currently
associated with the plugin.
2. Click Workflow > Recast Risk Rules (Organizational users) or Repositories > Recast Risk
Rules (Administrator users).
- 801 -
3. To delete a single rule:
a. In the table, right-click the row for the rule you want to delete.
a. In the table, select the check box for each rule you want to delete.
4. Click Delete.
5. Click Delete.
If Tenable Security Center sees the vulnerability again, the vulnerability receives the severity
currently associated with the plugin.
- 802 -
Additional Resources
The topics in this section offer guidance in areas related to Tenable Security Center.
l License Declarations
l Encryption Strength
l Troubleshooting
When Tenable Security Center is installed, the required services are started by default.
1. Log in to Tenable Security Center via the command line interface (CLI).
2. In the CLI in Tenable Security Center, run the following command to check the status of your
Tenable Security Center:
3. Run one of the following commands to change the status of your Tenable Security Center:
- 803 -
# /bin/systemctl stop SecurityCenter
License Declarations
Tenable Security Center’s Software License Agreement can be found on Tenable Security Center in
the /opt/sc/docs directory.
For a list of third-party software packages that Tenable utilizes with Tenable Security Center, see
Tenable Third-Party License Declarations.
Encryption Strength
Tenable Security Center uses the following default encryption for storage and communications.
Function Encryption
- 804 -
Function Encryption
l Tenable
Vulnerability
Management
l Tenable Nessus
Network Monitor
l Tenable Log
Correlation Engine
- 805 -
Configure SSL/TLS Strong Encryption
You can configure SSL/TLS strong encryption for Tenable Security Center-client communications
to meet the security needs of your organization. For more information about Tenable Security
Center encryption, see Encryption Strength.
For example:
# SSL Ciphers
SSLProtocol ALL -SSLv2 -SSLv3
SSLHonorCipherOrder On
SSLCompression off
SSLCipherSuite ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-
AES256-SHA384:ECDHE-RSA-AES256-GCM-SHA384
3. Restart Tenable Security Center, as described in Start, Stop, or Restart Tenable Security
Center.
5. Verify the configuration in ssl_request_log matches the cipher you specified. If the
configuration and cipher do not match, investigate the following:
l Confirm that you do not have other applications installed that redirect or layer additional
encryption for SSL traffic.
- 806 -
Configure Tenable Security Center for NIAP Compliance
If your organization requires that your instance of Tenable Security Center meets National
Information Assurance Partnership (NIAP) standards, you can configure relevant settings to be
compliant with NIAP standards.
You must run Tenable Security Center 5.15.0 or later to fully configure Tenable Security Center for
NIAP compliance. If you are running Tenable Security Center 5.15.0, you must install a patch to
configure Tenable Security Center for NIAP compliance. Contact Tenable Support for assistance
with the required patch. For more information about upgrading Tenable Security Center, see Before
You Upgrade and Upgrade Tenable Security Center.
For more information about Tenable Security Center storage and communications encryption, see
Encryption Strength.
l If you are using SSL certificates to log in to Tenable Security Center, ensure your server and
client certificates are NIAP-compliant. For more information about certificate authentication,
see Certificate Authentication.
l Confirm you have enabled the full disk encryption capabilities provided by the operating
system on the host running Tenable Security Center.
1. Log in to Tenable Security Center via the command line interface (CLI).
2. In the CLI in Tenable Security Center, as the root or tns user, run the following commands to
configure strong SSL/TLS encryption for Tenable Security Center communications:
- 807 -
# /opt/sc/support/bin/sqlite3 /opt/sc/application.db "INSERT INTO Configuration (
type,name,value,visible,editable ) VALUES ( 64, 'SSLCipherList', 'ECDHE-RSA-
AES128-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-
AES256-GCM-SHA384', 'false', 'false' )"
3. Configure the Tenable Security Center web server to use strong encryption for storage and
communications, as described in Configure SSL/TLS Strong Encryption.
Note: For NIAP compliance, you must configure TLS 1.2 encryption with any of the following ciphers:
ECDHE-RSA-AES128-SHA256, ECDHE-RSA-AES128-GCM-SHA256, ECDHE-RSA-AES256-SHA384, or
ECDHE-RSA-AES256-GCM-SHA384.
4. If you connect Tenable Security Center to Tenable Nessus, Tenable Nessus Manager, Tenable
Nessus Network Monitor, or Tenable Log Correlation Engine, you must use certificates to
authenticate the connection. For more information, see Manual Tenable Nessus SSL
Certificate Exchange and Manual Log Correlation Engine Key Exchange.
If you configured supporting resources for Tenable Security Center, see the product documentation
for each resource you added for more file and process allow list information. For more information
about supporting resources in Tenable Security Center, see Resources.
Tenable recommends allowing the following Tenable Security Center files and processes.
Allow List
Files
/opt/sc/*
Processes
/opt/sc/bin/*
/opt/sc/src/*
- 808 -
/opt/sc/support/bin/*
/opt/sc/www/*
You are not normally required to make a manual key exchange between Tenable Security Center and
the Log Correlation Engine; however, in some cases where you are prohibited from remote root
login or required to do key exchange debugging, you must manually exchange the keys.
For the remote Log Correlation Engine to recognize Tenable Security Center, copy the SSH public
key of Tenable Security Center and append it to the /opt/lce/.ssh/authorized_keys file.
The /opt/lce/daemons/lce-install-key.sh script performs this function.
Note: The Log Correlation Engine server must have a valid license key installed and the Log Correlation
Engine daemon must be running before you perform the steps below.
2. Download the Tenable Security Center key, as described in Download the Tenable Security
Center SSH Key.
Caution: Do not edit the file or save it to any specific file type.
4. From the workstation where you downloaded the key file, use a secure copy program (e.g.,
WinSCP) to copy the SSHKey.pub file to the Log Correlation Engine system.
Note: You must have the credentials of an authorized user on the Log Correlation Engine server to
perform this step.
- 809 -
For example, if you have a user username configured on the Log Correlation Engine server
(hostname lceserver) whose home directory is /home/username, the command on a Unix
system is as follows:
5. After you copy the file to the Log Correlation Engine server, in the CLI, run the following
command to move the file to /opt/lce/daemons:
# mv /home/username/SSHKey.pub /opt/lce/daemons
6. On the Log Correlation Engine server, as the root user, run the following command to change
the ownership of the SSH key file to lce:
7. Run the following command to append the SSH public key to the /opt/lce/.ssh/authorized_
keys file:
# su lce
# /opt/lce/daemons/lce-install-key.sh /opt/lce/daemons/SSHKey.pub
8. To test the communication, as the user tns on the Tenable Security Center system, attempt
to run the id command:
# su tns
# ssh -C -o PreferredAuthentications=publickey lce@<LCE-IP> id
If you have not previously established a connection, a warning appears that is similar to the
following:
- 810 -
If the key exchange worked correctly, a message similar to the following appears:
10. You can add the IP address of Tenable Security Center to the Log Correlation Engine system’s
/etc/hosts file. This prevents the SSH daemon from performing a DNS lookup that can add
seconds to your query times.
11. You can add the Log Correlation Engine to Tenable Security Center via the normal
administrator process, described in Log Correlation Engines.
Caution: Please note that users should be familiar with PKI deployments and it is not recommended that
the Nessus server be used as the site’s PKI system. The method described here is intended to assist in
testing the functionality of the certificate exchange to assist users in the incorporation of the certificates
into their current PKI system. In this method, the same key is shared between multiple servers. This may
not be acceptable in some installations.
In the example described in this document, there are three key system components: the certificate
authority, the Nessus server and the Nessus client (Tenable Security Center). It is necessary to
generate the keys required for the SSL communication and copy them to the appropriate
directories.
Certificate Authority
- 811 -
The certificate authority (CA) ensures that the certificate holder is authentic and not an
impersonator. The CA holds a copy of the certificates for registered users to certify that the
certificate is genuine. When the CA receives a certificate signing request (CSR), it validates and
signs the certificate.
In the example provided in this document, the CA resides on the Nessus server (which is not the
recommended method for a production environment). In a proper PKI deployment, the CA would be
a separate system or entity, such as Thawte or Verisign.
Nessus Server
In the example described in this document, the Nessus server is the same physical system that
holds the CA, but this will not likely be the case in a production environment. The Nessus server is
the target of the secure communication and its keys must be generated locally and copied to the
systems that will need to communicate with it using the SSL protocol. The Nessus server has users
defined that authenticate to it either by simple login and password or via SSL. These users will also
have keys associated with them.
- 812 -
File Name Created Purpose Where to Copy to
this will be
provided to
you by the
PKI and
must be
copied to
this location.
- 813 -
File Name Created Purpose Where to Copy to
# /opt/nessus/sbin/nessuscli mkcert-client
This command creates the keys for the Nessus clients and optionally registers them appropriately
with the Nessus server by associating a distinguished name (dname) with the user ID. It is important
to respond y (yes) when prompted to register the user with the Nessus server for this to take effect.
The user name may vary and is referred to here as user.
The certificate filename is a concatenation of cert_, the user name you entered and .pem.
Additionally, the key filename is a concatenation of key_, the user name you entered and .pem.
If the user was previously added via the /opt/nessus/sbin/nessuscli adduser command, you
will still need to run this program to register the user. If you have not previously created the user, it
is not necessary to also run the nessuscli adduser command; the user is created if it does not
already exist. The following files are created by this command:
- 814 -
File Name Created Purpose
/C={country}/ST={state}/L={location}/OU=
{organizational
unit}/O={organization/CN={common name}
In the example described here, Tenable Security Center and the Nessus scanner are defined as
follows. Your configuration varies:
Nessus Scanner:
IP: 192.0.2.202
OS: Red Hat ES 5
# /opt/nessus/sbin/nessuscli mkcert
--------------------------------------------------------------------------
Creation of the Nessus SSL Certificate
--------------------------------------------------------------------------
This script will now ask you the relevant information to create the SSL
certificate of Nessus. Note that this information will *NOT* be sent to
anybody (everything stays local), but anyone with the ability to connect to your Nessus
daemon will be able to retrieve this information.
- 815 -
CA certificate life time in days [1460]:
Server certificate life time in days [365]:
Your country (two letter code) [US]:
Your state or province name [NY]:
Your location (e.g. town) [New York]:
Your organization [Nessus Users United]: Tenable Network Security
This host name [Nessus4_2]:
. Certification authority :
Certificate = /opt/nessus//com/nessus/CA/cacert.pem
Private key = /opt/nessus//var/nessus/CA/cakey.pem
. Nessus Server :
Certificate = /opt/nessus//com/nessus/CA/servercert.pem
Private key = /opt/nessus//var/nessus/CA/serverkey.pem
Next, create the user ID for the Nessus client, which is Tenable Security Center in this case, to log
in to the Nessus server with, key and certificate. This is done with the command
/opt/nessus/sbin/nessuscli mkcert-client. If the user does not exist in the Nessus user
database, it is created. If it does exist, it is registered to the Nessus server and have a distinguished
name (dname) associated with it. It is important to respond y (yes) when prompted to register the
user with the Nessus server for this to take effect. The user must be a Nessus admin, so answer y
when asked. The following example shows the prompts and typical answers:
# /opt/nessus/sbin/nessuscli mkcert-client
Do you want to register the users in the Nessus server
as soon as you create their certificates ? [n]: y
--------------------------------------------------------------------------
Creation Nessus SSL client Certificate
--------------------------------------------------------------------------
This script will now ask you the relevant information to create the SSL
- 816 -
client certificates for Nessus.
Client certificate life time in days [365]:
Your country (two letter code) [FR]: US
Your state or province name []: MD
Your location (e.g. town) [Paris]: Columbia
Your organization []: Tenable Network Security
Your organizational unit []:
**********
We are going to ask you some question for each client certificate
If some question have a default answer, you can force an empty answer by
entering a single dot '.'
*********
User #1 name (e.g. Nessus username) []: paul
User paul already exists
Do you want to go on and overwrite the credentials? [y]: y
Should this user be administrator? [n]: y
Country (two letter code) [US]:
State or province name [MD]:
Location (e.g. town) [Columbia]:
Organization [Tenable Network Security]:
Organizational unit []:
e-mail []:
User rules
----------
nessusd has a rules system which allows you to restrict the hosts
that $login has the right to test. For instance, you may want
him to be able to scan his own host only.
Please see the nessus-adduser(8) man page for the rules syntax
Type the rules for this user, and enter a BLANK LINE once you are done:
(the user can have an empty rules set)
The certificates created contain the username entered previously, in this case paul, and are located
in the directory as listed in the example above (e.g., /tmp/nessus-043c22b5).
- 817 -
Create the nessuscert.pem Key
In the above specified tmp directory, the certificate and key files in this example are named cert_
paul.pem and key_paul.pem. These files must be concatenated to create nessuscert.pem as
follows:
# cd /tmp/nessus-043c22b5
# cat cert_paul.pem key_paul.pem > nessuscert.pem
Note: The nessuscert.pem file is used when configuring the Nessus scanner on Tenable Security Center.
This file needs to be copied to somewhere accessible for selection from your web browser during the
Nessus configuration.
Restart the Nessus daemons with the appropriate command for your system. The example here is
for Red Hat:
- 818 -
Considerations for Custom Certificates
During an upgrade, Tenable Security Center will check for the presence of custom SSL certificates.
If certificates are found and the owner is not Tenable, any newly generated certificates will be
named with a .new extension and placed in the /opt/sc/support/conf directory to avoid
overwriting existing files.
l Add your Tenable Nessus scanners to Tenable Security Center, as described in Add a Tenable
Nessus Scanner.
- 819 -
1. In the command line interface (CLI) on another Tenable Nessus server, run the following
command to copy the certificate files onto your other Tenable Nessus server:
# cd /opt/nessus/var/nessus/CA
# scp cakey.pem serverkey.pem root@nessusIP:/opt/nessus/var/nessus/CA
# cd /opt/nessus/com/nessus/CA
# scp cacert.pem servercert.pem root@nessusIP:/opt/nessus/com/nessus/CA
2. Run the following command to create a user directory on your second Tenable Nessus server,
using the same name as the user you created on the first Tenable Nessus server. Replace
admin with the user's name:
3. Press y to confirm you want the user to have system administrator privileges.
4. Run the following command to copy the the user you created on the first Tenable Nessus
server to the directory you created in step 2. Replace admin with the user’s name:
# cd /opt/nessus/var/nessus/users
# tar –zcvf – admin | ssh –C root@nessusIP "tar –zxvf - -C
/opt/nessus/var/nessus/users"
5. Run the following command to force Tenable Nessus to authenticate via certificate:
6. Restart the Nessus service on all the Nessus servers with the appropriate command for your
system. This example is for Red Hat:
- 820 -
7. In Tenable Security Center, update all of your Tenable Nessus scanner configurations to use
SSL certificate-based authentication. For more information, see Add a Tenable Nessus
Scanner.
- 821 -
File Name Created Purpose Where to Copy to
- 822 -
The Nessus user, which in this case is the user ID that Tenable Security Center uses to
communicate with the Nessus server, is created by the command C:\Program
Files\Tenable\Nessus\nessuscli mkcert-client.
This command creates the keys for the Nessus clients and optionally registers them appropriately
with the Nessus server by associating a distinguished name (dname) with the user ID. It is important
to respond y (yes) when prompted to register the user with the Nessus server for this to take effect.
The user name may vary and is referred to here as user.
The certificate filename is a concatenation of cert_, the user name you entered and .pem.
Additionally, the key filename is a concatenation of key_, the user name you entered and .pem.
C:\Documents and This is the private key for the specified user.
Settings\<UserAccount>\Local
Settings\Temp\nessus-xxxxxxxx\key_
<user>.pem
"/C={country}/ST={state}/L={location}/OU=
{organizational
unit}/O={organization/CN={common name}"
- 823 -
To create the keys and user:
1. Create the Certificate Authority and Nessus server certificate using the command
C:\Program Files\Tenable\Nessus\nessuscli mkcert
Caution: Critical: Any Nessus Scanner that has previously processed scans will not initially accept
these keys as a policy.db will have already been created on the Nessus Scanner. Remove the
policies.db from the Nessus Scanner to ensure the deployment finishes successfully.
rm /opt/nessus/var/nessus/users/<UserName>/policies.db
5. Create the user ID for the Nessus client, which is Tenable Security Center in this case, to log
in to the Nessus server with, key and certificate using the following command:
If the user does not exist in the Nessus user database, it is created. If it does exist, it is
registered to the Nessus server and have a distinguished name (dname) associated with it. It
is important to respond y (yes) when prompted to register the user with the Nessus server for
this to take effect. The user must be a Nessus admin, so answer y when asked.
The certificates created contain the username entered previously, in this case admin, and are
located in the directory as listed in the example above (e.g., C:\Documents and
Settings\<UserAccount>\Local Settings\Temp\nessus-00007fb1). In the specified directory, the
certificate and key files in this example are named cert_admin.pem and key_admin.pem.
- 824 -
Note: The nessuscert.pem file will be used when configuring the Nessus scanner on Tenable Security
Center. This file needs to be copied to somewhere accessible for selection from your web browser during
the Nessus configuration.
Open the Nessus Server Manager GUI, click Stop Nessus Server and then click Start Nessus Server.
- 825 -
Offline Plugin and Feed Updates for Tenable Security Center
You can perform offline plugin updates and feed updates in air-gapped Tenable Security Center
environments.
Configure Tenable Nessus + Tenable Web App Scanning for Tenable Security Center
Offline
Note:Tenable Security Center does not manage plugins for Log Correlation Engine. However, Log
Correlation Engine plugins are required for event analysis.
For general information about best practices in air-gapped environments, see Considerations for
Air-Gapped Environments.
1. In the command line interface (CLI), run the following command to prevent the Tenable
Nessus scanner from starting automatically upon restarting the system:
- 826 -
/usr/bin/systemctl disable nessusd
2. Run the following command and save the challenge string that is displayed:
Note: Do not click here, even if you have a newer version of Tenable Nessus installed. You cannot
use the https://plugins.nessus.org/v2/offline.php page for Tenable Security Center downloads.
4. Paste the challenge string from Step 3 and your Activation Code in the appropriate boxes on
the web page.
5. Click Submit.
6. On the next page, copy the link that starts with https://plugins.nessus.org/get.php... and
save it as a favorite. Within the saved link change all-2.0.tar.gz to sc-plugins-diff.tar.gz. This
link will be needed for future use.
9. Verify the file using the MD5 checksum, as described in the knowledge base article.
10. Save the sc-plugins-diff.tar.gz on the system used to access your Tenable Security
Center web interface.
- 827 -
The Plugins/Feed Configuration page appears.
15. Click Choose File and browse to the saved sc-plugins-diff.tar.gz file.
After several minutes, the plugin update finishes and the page updates the Last Updated date
and time.
What to do next:
l If you installed a temporary Tenable Nessus scanner on the same host as Tenable Security
Center, uninstall the Tenable Nessus scanner.
1. In the command line interface (CLI), run the following command to prevent the Tenable
Nessus Network Monitor scanner from starting automatically upon restarting the system:
2. Run the following command and save the challenge string that is displayed:
# /opt/nnm/bin/nnm --challenge
3. In your browser, navigate to the Tenable Nessus Network Monitor plugins page.
- 828 -
4. Paste the challenge string from Step 3 and your Activation Code in the appropriate boxes on
the web page.
5. Click Submit.
6. On the next page, copy the link that starts with https://plugins.nessus.org/v2/... and
bookmark it in your browser. The other information on the page is not relevant for use with
Tenable Security Center.
9. Verify the file using the MD5 checksum, as described in the knowledge base article.
10. Save the sc-passive.tar.gz on the system used to access your Tenable Security Center
GUI.
Note: Access the Tenable Nessus Network Monitor feed setting and change the activation from
offline to Tenable Security Center.
15. Click Choose File and browse to the saved sc-passive.tar.gz file.
After several minutes, the plugin update finishes and the page updates the Last Updated date
and time.
What to do next:
- 829 -
l If you installed a temporary Tenable Nessus scanner on the same host as Tenable Security
Center, uninstall the Tenable Nessus scanner.
Note: If you already performed a Tenable Nessus offline plugin update, start at step 7.
1. In the command line interface (CLI), run the following command to prevent the Tenable
Nessus scanner from starting automatically upon restarting the system:
2. To obtain the challenge code for an offline Tenable Security Center registration, do one of the
following:
l If you deployed Tenable Security Center + Tenable Core, navigate to the Tenable
Security Center tab in Tenable Core and save the challenge code.
l If you installed Tenable Security Center in an environment other than Tenable Core, run
the following command and save the challenge code:
- 830 -
4. Paste the challenge code from Step 2 and your Activation Code in the appropriate boxes on
the web page.
5. Click Submit.
6. On the next page, copy the link that starts with https://plugins.nessus.org/get.php... and
save it as a favorite.
10. Verify the file using the MD5 checksum, as described in the knowledge base article.
11. Save the SecurityCenterFeed48.tar.gz on the system used to access your Tenable
Security Center GUI.
15. In the Schedules section, expand the Tenable Security Center Feed options.
16. Click Choose File and browse to the saved SecurityCenterFeed48.tar.gz file.
After several minutes, the plugin update finishes and the page updates the Last Updated date
and time.
What to do next:
- 831 -
l If you installed a temporary Tenable Nessus scanner on the same host as Tenable Security
Center, uninstall the Tenable Nessus scanner.
Note: If you have already updated Tenable Nessus plugins offline, or if you have updated plugins via the
Tenable Security Center feed, skip to step 8.
l Ensure that you are running Tenable Security Center 6.2 or later.
l Ensure that you have a Tenable Web App Scanning license to use with Tenable Security
Center
1. In the command line interface (CLI), run the following command to prevent the Tenable
Nessus scanner from starting automatically upon restarting the system:
2. To obtain the challenge code for an offline Tenable Security Center registration, do one of the
following:
l If you deployed Tenable Security Center + Tenable Core, in Tenable Core, click the
Tenable Security Center tab and save the challenge code.
l If you installed Tenable Security Center in an environment other than Tenable Core, run
- 832 -
the following command and save the challenge code:
4. Paste the challenge code from Step 2 and your Activation Code in the corresponding boxes.
5. Click Submit.
6. On the next page, copy the link that starts with https://plugins.nessus.org/get.php...
and save it as a favorite.
9. Save the sc-was-plugins.tar.gz on the system used to access your Tenable Security
Center UI.
14. Click Choose File and browse to the saved sc-was-plugins.tar.gz file.
After several minutes, the plugin update finishes and the page updates the Last Updated date
and time.
What to do next:
- 833 -
l If you installed a temporary Tenable Nessus scanner on the same host as Tenable Security
Center, uninstall the Tenable Nessus scanner.
l Update the was-scanner Docker image on your Tenable Nessus scanners by using the
instructions at . When updating offline Tenable Web App Scanning plugins, always update the
was-scanner Docker image and vice-versa.
Configure Tenable Nessus + Tenable Web App Scanning for Tenable Security
Center Offline
Note:If you already configured Tenable Nessus + Tenable Web App Scanning for Tenable Security Center
offline, you only need to repeat steps 3-5.
l Update any Tenable Web App Scanning plugins, as described in Perform an Offline Tenable
Web App Scanning Plugins Update.
To configure Tenable Nessus + Tenable Web App Scanning for Tenable Security Center
offline:
1. On a system with Docker installed that is connected to the internet, run the following
commands:
2. Transfer the was-scanner-image.tar file to the Tenable Nessus scanner you want to
configure as a Tenable Web App Scanning scanner.
- 834 -
a. Install and run Docker version 20.0.0 or later on your Tenable Nessus host. Tenable
recommends the official Docker builds and install packages.
4. Enable the Tenable Web App ScanningCapable option for the Tenable Nessus scanner in
Tenable Security Center, as described in Tenable Nessus Scanners.
5. Add a scan zone in Tenable Security Center, as described in Add a Scan Zone.
6. Add a universal repository for the scan data in Tenable Security Center, as described in Add a
Repository.
7. Configure your Tenable Web App Scanning credentials, as described in Add Credentials.
8. Create a Web App Scanning scan policy, as described in Add a Scan Policy.
9. Add a web app scan in Tenable Security Center, as described in Add a Web App Scan.
Troubleshooting
This troubleshooting section covers some of the common issues encountered with Tenable Security
Center.
- 835 -
1. If a login page does not appear, close and reopen the web browser.
2. Ensure that the remote httpd service is running on the Tenable Security Center host:
# ps ax | grep httpd
1990 ? Ss 0:01 /opt/sc/support/bin/httpd -k start
3. Ensure that sufficient drive space exists on the Tenable Security Center host:
# df
Filesystem 1K-
blocks Used Available Use% Mounted on
/dev/mapper/VolGroup00-LogVol00 8506784
8506784 0 100% /
/dev/sda1 101086 24455 71412 26%
/boot
tmpfs 1037732 0
1037732 0% /dev/shm
4. If there is not enough drive space, recover sufficient space and restart the Tenable Security
Center service:
# df
Filesystem 1K-blocks
Used Available Use% Mounted on
/dev/mapper/VolGroup00-LogVol00 8506784 6816420 1251276
85% /
/dev/sda1
101086 24455 71412 26% /boot
tmpfs 1037732 0 1037732 0%
/dev/shm
- 836 -
Locked out of all Tenable Security Center user accounts
Contact Tenable Support.
2. Check that you can SSH from the Tenable Security Center host to the Tenable Log Correlation
Engine host.
3. Check that the Tenable Log Correlation Engine daemon is running on its host and listening on
the configured port (TCP port 31300 by default):
4. Check that the listening ports can be reached from the network and are not blocked by a
firewall.
5. If the Tenable Log Correlation Engine server is not operational, attempt to start the service:
- 837 -
# service lce start
2. Confirm connectivity by checking that heartbeat events show up in the Tenable Security
Center UI.
3. Check the Tenable Log Correlation Engine configuration settings in accordance with the
Tenable Log Correlation Engine documentation.
4. Check the individual Tenable Log Correlation Engine client configuration and authorization. If
syslog is being used to collect information and events, ensure that the syslog service is
running and configured correctly on the target syslog server in accordance with Tenable Log
Correlation Engine documentation.
5. Check for NTP time synchronization between the Tenable Security Center, Tenable Log
Correlation Engine, and Tenable Log Correlation Engine clients.
- 838 -
1. Manually test a plugin update under Plugins with Update Plugins. If successful, the line
Passive Plugins Last Updated will update to the current date and time.
2. Ensure that the Tenable Security Center host is allowed outbound HTTPS connectivity to the
Tenable Log Correlation Engine Plugin Update Site.
3. For all other Tenable Log Correlation Engine plugin update issues, contact Tenable Support.
2. SSH to the remote Tenable Nessus host to make sure the underlying operating system is
operational.
3. Confirm that the Tenable Nessus daemon is running (Linux example below):
2. Check connectivity from Tenable Security Center to the port the Tenable Nessus system is
running on (e.g., 8834). For example, run:
curl -k https://<scannerIPaddress>:<port>
- 839 -
Tenable Nessus scans fail to complete
1. Ensure that the Tenable Nessus service is running on the Tenable Nessus host.
2. Ensure that Tenable Nessus scanner is listed in Tenable Security Center under Resources >
Nessus Scanners and that the status of the Tenable Nessus scanner is listed as Working. For
more information, see Tenable Nessus Scanner Statuses.
3. Click Edit to ensure that the IP address or hostname, port, username, password, and selected
repositories for the Tenable Nessus scanner are all correct.
6. Right click the scan results and click Scan Details to obtain a more detailed description of the
error.
If the scan details indicate a Blocking error, this is indicative of a license IP address count
that has reached the limit. Either remove a repository to free up IP addresses or obtain a
license for more IP addresses.
7. Ensure that scan targets are permitted within the configured scan zones.
8. Ensure the Tenable Nessus scanner is running a supported Tenable Nessus version. For
minimum Tenable Nessus scanner version requirements, see the Tenable Security Center
Release Notes for your version.
2. Click License and ensure that the Tenable Nessus Activation Code is marked as Valid.
3. Ensure the Tenable Nessus scanner is running a supported Tenable Nessus version. For
minimum Tenable Nessus scanner version requirements, see the Tenable Security Center
Release Notes for your version.
4. Ensure that the user used to connect to the Tenable Nessus server is a Tenable Nessus
administrator.
- 840 -
5. Ensure that the Tenable Security Center system is allowed outbound HTTPS connectivity to
the Tenable Nessus Plugin Update Site.
6. Under System, Configuration, and Update in Tenable Security Center, ensure that Active
Plugins is not set to Never.
If successful, the line Active Plugins Last Updated updates to the current date and time.
8. For all other Tenable Nessus plugin update issues, contact Tenable Support.
2. SSH to the remote Tenable Nessus Network Monitor host to make sure the underlying
operating system is operational.
3. Confirm that the Tenable Nessus Network Monitor is running (Linux example below):
NNM is stopped
NNM Proxy (pid 3142) is running
#
4. If the Tenable Nessus Network Monitor service is not running, start the service:
- 841 -
1. Confirm that the Tenable Nessus Network Monitor proxy is listening on the same port as
Tenable Security Center (port 8835 by default):
2. Check connectivity by telnetting from the Tenable Security Center console into the Tenable
Nessus Network Monitor server on port 8835 (the Tenable Nessus Network Monitor listening
port). If successful, the response includes: Escape character is '^]'.
2. Ensure that the Tenable Nessus Network Monitor appears in Tenable Security Center under
Resources > Tenable Nessus Network Monitors and that the status of the Tenable Nessus
Network Monitor appears as Working.
3. Click Edit to ensure that the IP address or hostname, port, username, password, and selected
repositories for the Tenable Nessus Network Monitor are correct.
5. Click Submit to attempt to reinitialize the Tenable Nessus Network Monitor scanning
interface.
If successful, Passive Plugins Last Updated updates to the current date and time.
2. Ensure that the Tenable Security Center host allows outbound HTTPS connectivity to the
Tenable Nessus Network Monitor Plugin Update Site.
3. For all other Tenable Nessus Network Monitor plugin update issues, contact Tenable Support.
Error Messages
For Tenable Security Center API status codes, see the Tenable Security Center API Guide.
- 842 -
Note: Some errors are dependent on internal processes. If the error code you received is not listed, it may
not indicate a specific Tenable Security Center error.
Scanning
For more information about creating, modifying, and launching scans, see Configure Scans.
For more information about statuses, see Tenable Nessus Scanner Statuses, Scan Result Statuses,
and View Your Scan Zones.
14 Progress handler has died. Your system processes may be overloaded during
the scan. Confirm your available system resources
and re-run the scan.
- 843 -
Code Message Recommended Action
102 Could not open Tenable Security Center may have insufficient disk
'<nessusFile>' for writing. space. Free up disk space in Tenable Security
Center, as described in the knowledge base article.
106 Error getting contents of Tenable Security Center cannot access the audit
AuditFile '<auditFileName>' file definition. Do any of the following:
for Scan job #<scanJobID>.
l Verify the specified audit file is valid.
106 Error creating temp SCAP Tenable Security Center may have insufficient disk
directory '<scapDir>'. space. Free up disk space in Tenable Security
Center, as described in the knowledge base article.
106 Error creating temp OVAL Tenable Security Center may have insufficient disk
directory '<ovalDir>'. space. Free up disk space in Tenable Security
Center, as described in the knowledge base article.
- 844 -
Code Message Recommended Action
106 Error creating temp Tenable Security Center may have insufficient disk
directory '<tempDir>'. space. Free up disk space in Tenable Security
Center, as described in the knowledge base article.
106 Error untaring SCAP results Tenable Security Center may have insufficient disk
file '<file>' (rc = $rc). space. Free up disk space in Tenable Security
Center, as described in the knowledge base article.
106 Error moving <type> result Tenable Security Center may have insufficient disk
file '<curFile>' to '<newFile>'. space. Free up disk space in Tenable Security
Center, as described in the knowledge base article.
106 Unable to get current Tenable Security Center may have insufficient disk
working directory. space. Free up disk space in Tenable Security
Center, as described in the knowledge base article.
106 Failed to change to the Tenable Security Center may have insufficient disk
SCAP directory for zipping. space. Free up disk space in Tenable Security
Center, as described in the knowledge base article.
106 Error building SCAP results Tenable Security Center may have insufficient disk
file '<scapFile>' (rc = space. Free up disk space in Tenable Security
<zipReturnCode>). Center, as described in the knowledge base article.
106 Failed to change back to Tenable Security Center may have insufficient disk
originating directory. space. Free up disk space in Tenable Security
Center, as described in the knowledge base article.
106 Unable to get current Tenable Security Center may have insufficient disk
working directory. space. Free up disk space in Tenable Security
Center, as described in the knowledge base article.
106 Failed to change to the Tenable Security Center may have insufficient disk
OVAL directory for zipping. space. Free up disk space in Tenable Security
Center, as described in the knowledge base article.
106 Error building OVAL results Tenable Security Center may have insufficient disk
- 845 -
Code Message Recommended Action
file '$ovalFile' (rc = $rc). space. Free up disk space in Tenable Security
Center, as described in the knowledge base article.
106 Failed to change back to Tenable Security Center may have insufficient disk
originating directory. space. Free up disk space in Tenable Security
Center, as described in the knowledge base article.
106 No results file found for Tenable Security Center cannot locate
Scan job #<jobIDorPID> /opt/sc/data/scans/#jobID/results.xml.
('<scanDefinitionName>' - Verify the following:
#<scanDefinitionID>).
l /opt/sc/data/scans/#jobID/results.xm
l is in the correct directory.
106 Error creating new VDB Verify the tns user can access the following
directory for Scan job directory:
#<jobIDorPID> /opt/sc/orgs/#orgID/VDB/#dateOfScan/.
('<scanDefinitionName>' -
#<scanDefinitionID>).
106 Error moving results for Verify the tns user can access the following
Scan job #<jobIDorPID> directory:
('<scanDefinitionName>' - /opt/sc/orgs/#orgID/VDB/#dateOfScan/.
#<scanDefinitionID>).
145 Error reading AuditFile '' for Add an audit file to the scan policy, then re-run the
Scan job #<scanJobID>. scan. For more information, see Audit Files and
Unable to retrieve AuditFile Scan Policies.
#<auditFileID>"
146 Unable to find template Check for any errors with the last plugin update. If
maps for Policy template needed perform another plugin update. For more
#<policyTemplateID>. information, see Offline Plugin and Feed Updates
for Tenable Security Center.
- 846 -
Code Message Recommended Action
146 Diagnostic target is outside The scan target is not included in the scan
IPs of original Scan. configuration. If you want to include the target in
the scan, update the scan settings and then re-run
the scan.
146 Diagnostic target is not a The target of the diagnostic scan must be a single
single host. IP or FQDN. Update the scan configuration, then re-
run the scan.
146 Zone Selection is locked You may have insufficient permissions to run the
but no Zone is specified. scan, or you may need to adjust your scan
configuration.
146 Zone Selection is You may have insufficient permissions to run the
selectable but no Zone is scan, or you may need to adjust your scan
specified. configuration.
146 Entered IPs and Assets are One or more scan targets do not exist in the
empty. selected import repository. For troubleshooting
assistance, see the knowledge base article.
146 Scan IPs are restricted. You may have insufficient permissions to run the
scan, or you may need to adjust your scan
configuration.
146 Scan IPs are not within You may have insufficient permissions to run the
your accessible range. scan, or you may need to adjust your scan
configuration.
- 847 -
Code Message Recommended Action
146 The number of Scan IPs is Reduce the number of scan targets and re-run the
too large (more than 2^24 scan.
unique IPs).
147 Job #<scanJobID> not Confirm the job queue database is not locked, then
found. re-run the scan.
201 Error Setting up Scan Do any of the following, then re-run the scan:
database. <details>
l Confirm you have adequate disk space
201 Error creating Scan Do any of the following, then re-run the scan:
database tables. <details>
l Confirm you have adequate disk space
202 Error message varies. Your system processes may be overloaded during
the scan. Confirm your available system resources
and re-run the scan. If the error persists, contact
your Tenable representative.
400 Scan job #<scanJobID> Your system processes may be overloaded during
stopped due to scanner the scan. Confirm your available system resources
inactivity. and re-run the scan.
- 848 -
Code Message Recommended Action
('<scanDefinitionName>' -
#<scanDefinitionID>)."
65536 Unable to scan You may have insufficient permissions to run the
<numRestrictedTargets> scan, or you may need to adjust your scan
Restricted target<plural> in configuration.
Scan job #<jobIDorPID>
For troubleshooting assistance, see the knowledge
('<scanDefinitionName>' -
base article.
#<scanDefinitionID>).
65536 Unable to scan You may have insufficient permissions to run the
<numInaccessibleTargets> scan, or you may need to adjust your scan
target(s) outside your configuration.
accessible ranges in Scan
For troubleshooting assistance, see the knowledge
#job #<jobIDorPID>
base article.
('<scanDefinitionName>' -
#<scanDefinitionID>).
65536 Usable Zones fail to cover You may have insufficient permissions to run the
<unscannableCount> scan, or you may need to adjust your scan
accessible Scan IP<plural> configuration.
for Scan job #<jobIDorPID>
For troubleshooting assistance, see the knowledge
('<scanDefinitionName>' -
base article.
#<scanDefinitionID>).
65536 Available Zones do not You may have insufficient permissions to run the
cover accessible Scan IPs scan, or you may need to adjust your scan
for Scan job #<jobIDorPID> configuration.
('<scanDefinitionName>' -
For troubleshooting assistance, see the knowledge
#<scanDefinitionID>).
base article.
- 849 -