Tenable Vulnerability Management Connector

Pre-requisites
  • Access Key
  • Secret Key
Reference Document:
How to derive the prerequisites?:
  • Login to your Tenable IO cloud console
  • Select the Vulnerability Management product.
  • Navigate to Settings > Access Control
  • Click “Create User”
  • On the General page
    • Populate the name, email, and password information per your organizations standards
    • Select the “Scan Operator” role
    • Click “Next”
  • On the User Groups page
    • Choose the appropriate user group(s) such as “All Users”
    • Click “Next”
  • On the Permissions page
    • Select “Asset Discovery”
    • Click “Save”
  • Edit the newly created user by clicking on it
  • Click on “More” in the API Keys section > Generate API Keys > Replace & Generate
  •  Copy the Access Key and Secret Key 
  •  Click “Save”
Configurations:

The following are the configurations to forward the vulnerability logs to DNIF:

Field Name Description
Connector NameEnter a name for the connector
Access KeyEnter Access Key 
Secret KeyEnter Secret Key 
  • Click Save after entering all the required details and click Test Connection, to test the configuration.
  • A Connection successful message will be displayed on screen along with the time stamp.