Tenable Vulnerability Management-User Guide
Tenable Vulnerability Management-User Guide
Copyright © 2024 Tenable, Inc. All rights reserved. Tenable, Tenable Nessus, Tenable Lumin, Assure, and the Tenable logo are registered trademarks of Tenable, Inc. or its affiliates. All other
products or services are trademarks of their respective owners.
Table of Contents
System Requirements 41
CVSS 43
CVSS-Based Severity 44
Vulnerability Mitigation 48
Vulnerability States 49
Navigate Breadcrumbs 57
Navigate Planes 58
Filter a Table 62
-2-
Error Messages 68
Dashboards 81
Tenable-Provided Dashboards 94
Create a Dashboard 98
-3-
Duplicate a Dashboard 114
-4-
Improve Your Tenable Lumin Metrics 166
Scans 232
-5-
View Scans 237
-6-
Scan Templates 292
Description 356
Configuration 357
-7-
Preconfigured Advanced Settings 417
DB2 437
MySQL 437
Oracle 438
PostgreSQL 439
Cassandra 441
MongoDB 442
Password 443
Import 444
BeyondTrust 445
CyberArk 446
-8-
Delinea 451
Lieberman 454
QiAnXin 457
Senhasegura 459
Host 460
Miscellaneous 522
Mobile 529
HTTP Server Authentication Settings in Tenable Web App Scanning Scans 583
-9-
Client Certificate Authentication 588
Introduction 598
- 10 -
Search Known Vulnerabilities 606
Sources 612
CVEs 626
My Findings 627
Plugins 629
Explore 634
Findings 636
Vulnerabilities 637
- 11 -
Web Application Findings 644
Assets 697
- 12 -
Supported Plugins 748
Vulnerabilities 774
- 13 -
View Vulnerability Details 781
Assets 813
- 14 -
View Deleted Assets 846
Act 861
Reports 861
Remediation 885
- 15 -
Edit a Remediation Project 898
Solutions 926
- 16 -
Push a Container Image to Tenable Container Security 936
Prepare Kubernetes Objects to Configure and Run the Tenable Container Security
Scanner 954
Configure and Run the Tenable Container Security Scanner in Kubernetes 956
- 17 -
Configure Tenable Container Security Connectors to Import and Scan Images 983
Configure an AWS ECR Connector to Import Images in Tenable Container Security 985
Settings 1008
My Account 1016
- 18 -
SAML 1033
Users 1054
- 19 -
Export Users 1072
Permissions 1088
Roles 1104
- 20 -
Export Activity Logs 1130
Language 1157
Exports 1157
- 21 -
Renew an Export Expiration Date 1171
Tags 1192
- 22 -
Edit a Tag via Asset Filters 1222
Sensors 1241
Agents 1241
- 23 -
Agent Filters 1279
Networks 1300
- 24 -
Move Assets to a Network via Settings 1311
OT Connectors 1346
- 25 -
Tenable FedRAMP Moderate Cloud Sensors 1353
Credentials 1374
Exclusions 1385
- 26 -
Connectors 1396
Limitations 1401
- 27 -
Manually Delete Connector Artifacts from Azure Frictionless Assessment 1435
- 28 -
Welcome to Tenable Vulnerability Management
Tenable Vulnerability Management® (formerly known as Tenable.io) allows security and audit teams
to share multiple Tenable Nessus, Tenable Nessus Agent, and Tenable Nessus Network Monitor
scanners, scan schedules, scan policies, and scan results among an unlimited set of users or
groups.
Note: Tenable Vulnerability Management can be purchased alone or as part of the Tenable One package.
For more information, see Tenable One.
Tip: The Tenable Vulnerability Management User Guide is available in English and Japanese. The Tenable
Vulnerability Management user interface is available in English, Japanese, and French. To switch the user
interface language, see Language.
For additional information on Tenable Vulnerability Management, review the following customer
education materials:
The platform combines the broadest vulnerability coverage spanning IT assets, cloud resources,
containers, web apps, and identity systems, builds on the speed and breadth of vulnerability
coverage from Tenable Research, and adds comprehensive analytics to prioritize actions and
communicate cyber risk. Tenable One allows organizations to:
- 29 -
Tip: For additional information on getting started with Tenable One products, check out the Tenable One
Deployment Guide.
By making different resources available for sharing among users and groups, Tenable Vulnerability
Management provides endless possibilities for creating customized workflows for vulnerability
management programs, regardless of any of the numerous regulatory or compliance drivers that
demand keeping your business secure.
Tenable Vulnerability Management can schedule scans, push policies, view scan findings, and
control multiple Tenable Nessus scanners from the cloud. This enables the deployment of Tenable
Nessus scanners throughout networks to both public and private clouds as well as multiple physical
locations.
Tenable Lumin
Get Started with Tenable Lumin
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Tenable Lumin features augment Tenable Vulnerability Management data. Use Tenable Lumin to
quickly and accurately assess your exposure risk and compare your health and remediation
performance to other Tenable customers in your Salesforce industry and the larger population.
Tenable Lumin correlates raw vulnerability data with asset business criticality and threat context
data to support faster, more targeted analysis workflows than traditional vulnerability management
tools.
- 30 -
web applications that rely on Javascript and are built on HTML5. This leaves you with an incomplete
understanding of your web application security posture.
Tenable Web App Scanning provides comprehensive vulnerability scanning for modern web
applications. Tenable Web App Scanning's accurate vulnerability coverage minimizes false positives
and false negatives, ensuring that security teams understand the true security risks in their web
applications. The product offers safe external scanning that ensures production web applications
are not disrupted or delayed, including those built using HTML5 and AJAX frameworks.
Tenble Container Security stores and scans container images as the images are built, before
production. It provides vulnerability and malware detection, along with continuous monitoring of
container images. By integrating with the continuous integration and continuous deployment
(CI/CD) systems that build container images, Tenable Container Security ensures every container
reaching production is secure and compliant with enterprise policy.
The Tenable Vulnerability Management API can be leveraged to develop your own applications using
various features of the Tenable Vulnerability Management platform, including scanning, creating
policies, and user management.
- 31 -
3. Configure Scans
6. Expand
Tip: For additional information on Tenable Vulnerability Management, review the following customer
education materials:
1. Review principles of the TCP/IP internet protocol suite. Tenable Vulnerability Management
documentation assumes you know basic networking concepts and principles.
2. Get your Tenable Vulnerability Management access information and starter account
credentials from your Tenable representative.
3. If necessary, access Tenable Support and training resources for Tenable Vulnerability
Management, including the Professional Services Scan Strategy guide.
4. Design a deployment plan by identifying your organization's objectives and analyzing your
network topology. Consider Tenable-recommended best practices for your environment.
For more information about environment requirements, see the guidelines provided for your
scanner in the General Requirements Guide. For more information about supported browsers
for Tenable Vulnerability Management, see System Requirements.
5. Design an internal scanning and external scanning plan. Identify the scans you intend to run
and ensure that you have sufficient network coverage.
6. Design an analysis workflow. Identify key stakeholders in your management and operational
groups, considering the data you intend to share with each stakeholder.
- 32 -
To install your scanners and link them to Tenable Vulnerability Management:
l If your deployment plan includes Tenable Nessus scanners, install Tenable Nessus as
described in Install Tenable Nessus in the Tenable Nessus User Guide.
l If your deployment plan includes Tenable Nessus Agents, install agents as described in
Install Tenable Nessus Agents in the Tenable Nessus Agent Deployment and User Guide.
l If your deployment plan includes Tenable Nessus Network Monitor, install Tenable
Nessus Network Monitor as described in Install NNM in the Tenable Nessus Network
Monitor User Guide.
o Then, configure Tenable Nessus Network Monitor to communicate with Tenable
Vulnerability Management, as described in Configure NNM in the Tenable Nessus
Network Monitor User Guide.
l If your deployment plan includes Tenable Web App Scanning, install web applications as
described in Deploy or Install Tenable Core + Tenable Web App Scanning in the Tenable
Core User Guide.
Then, link your first scanners to Tenable Vulnerability Management, as described in Link a
Sensor.
Configure Scans
Configure and run basic scans to begin evaluating the effectiveness of your deployment
plan and analysis workflow:
Note: For information on how to configure scans based on your environment and business needs, see the
Tenable Vulnerability Management Scan Tuning Guide.
- 33 -
1. Configure your first active scan using the Basic Network Scan template:
b. Create a scan using the Basic Network Scan template, as described in Create a Scan.
2. Configure your first agent scan using the Basic Agent Scan template:
b. Create an agent scan using the Basic Agent Scan template, as described in Create a
Scan.
3. Launch your first Tenable Nessus scan and agent scan, as described in Launch a Scan.
4. Confirm your Tenable Nessus scan and agent scan completed, accessing all targeted areas of
your network. Review your discovered assets to assess your knowledge of your network.
1. Create user accounts and create user groups within your Tenable Vulnerability Management
container.
2. Create access groups to manage view and scan permissions for assets and targets.
a. Launch your credentialed Tenable Nessus scan and credentialed agent scan, as
described in Launch a Scan.
b. Confirm your credentialed scan completed, accessing all targeted areas of your
network.
- 34 -
6. If you want to assess your exposure, obtain a Tenable Lumin license.
7. If you want to perform web application scanning, obtain a Tenable Web App Scanning license.
8. If you want to evaluate risk on your containers, obtain a Tenable Container Security license.
9. Configure user Access Control to control what objects users can and cannot view and interact
with within Tenable Vulnerability Management.
2. View and analyze your vulnerability and asset findings via the Findings and Assets pages.
3. Create a dashboard to gain immediate insight and quickly analyze vulnerabilities in your
network. Use interactive widgets and customizable tables to explore your data.
4. Filter your dashboards, assets, and findings to drill into data and investigate your progress.
6. Create a report to share scan and vulnerability information with others in your organization.
Expand
Tenable recommends the following as best practices to keep up to date with your
deployment plan and analysis workflow:
l Conduct weekly meetings to review your organization's responses to identified vulnerabilities.
Conduct weekly management meetings to oversee your teams executing the analysis
workflow.
l Review your scan results and scan coverage. You may need to modify your scan
configurations to suit your organization's objectives and reach all areas of your network.
- 35 -
l Consider API integrations, as described in the Tenable Vulnerability Management API
Documentation.
When your environment expands, so does your asset count, so you purchase more licenses to
account for the change. Tenable licenses use progressive pricing, so the more you purchase, the
lower the per-unit price. For prices, contact your Tenable representative.
Tip: To view your current license count and available assets, in the Tenable top navigation bar, click
and then click License Information. To learn more, see License Information Page.
Note: Tenable offers simplified pricing to managed security service providers (MSSPs). To learn more,
contact your Tenable representative.
Tenable Vulnerability Management uses a complex algorithm to identify new assets without creating
duplicates. The algorithm looks at the asset’s BIOS UUID, MAC address, NetBIOS name, fully
qualified domain name (FQDN), and more. Authenticated scanners or agents also assign a Tenable
- 36 -
UUID to each asset to mark it as unique. For more information, see the Tenable Vulnerability
Management FAQ.
The following table describes when assets count towards your license.
- 37 -
l Access to the Tenable Vulnerability Management API.
Reclaiming Licenses
When you purchase licenses, your total license count is static for the length of your contract unless
you purchase more licenses. However, Tenable Vulnerability Management reclaims licenses under
some conditions—and then reassigns them to new assets so that you do not run out of licenses.
The following table explains how Tenable Vulnerability Management reclaims licenses.
Deleted assets Tenable Vulnerability Management removes deleted assets from the Assets
workbench and reclaims their licenses within 24 hours.
Aged out In Settings > Sensors > Networks, if you enable Asset Age Out, Tenable
assets Vulnerability Management reclaims assets after they have not been scanned
for a period you specify.
Assets from Tenable Vulnerability Management reclaims assets from connectors the day
connectors after they are terminated. You can observe this event in each connector.
All other Tenable Vulnerability Management reclaims all other assets—such as those
assets imported from other products or assets with no age-out setting—after they
have not been scanned for 90 days.
Scenario Result
You scan more assets than are A message appears in Tenable Vulnerability
licensed for three consecutive days. Management.
You scan more assets than are A message and warning about reduced functionality
licensed for 15+ days. appears in Tenable Vulnerability Management.
- 38 -
You scan more assets than are A message appears in Tenable Vulnerability
licensed for 45+ days. Management; scan and export features are disabled.
Tip: Improper scan hygiene or product misconfigurations can cause scan overages, which result in inflated
asset counts. To learn more, see Scan Best Practices.
Expired Licenses
The Tenable Vulnerability Management licenses you purchase are valid for the length of your
contract. 30 days before your license expires, a warning appears in the user interface. During this
renewal period, work with your Tenable representative to add or remove products or change your
license count.
After your license expires, you can no longer sign in to the Tenable platform.
Note: Plugin IDs are static, but Tenable products may sometimes update plugin names. For the latest
information on plugins, see Tenable Plugins.
- 39 -
34277 Nessus UDP Scanner
11936 OS Identification
0 Open Ports
- 40 -
19 VLAN ID Detection
System Requirements
Display Settings
Minimum screen resolution: 1440 x 1024
Supported Browsers
Tenable Vulnerability Management supports the latest versions of the following browsers.
Note: Before reporting issues with Tenable Vulnerability Management, ensure your browser is up to date.
l Google Chrome
l Apple Safari
l Mozilla Firefox
l Microsoft Edge
l 162.159.129.83/32
l 162.159.130.83/32
l 162.159.140.26/32
- 41 -
l 172.66.0.26/32
l 2606:4700:7::1a
l 2a06:98c1:58::1a
l 2606:4700:7::a29f:8153
l 2606:4700:7::a29f:8253
l *.cloud.tenable.com with the wildcard character (*) to allow cloud.tenable.com and all
subdomains, such as sensor.cloud.tenable.com
Tip: For information about the port requirements for Tenable Security Center, Tenable Nessus
scanners, and Tenable Nessus Agents, see the following topics:
l Tenable Security Center Port Requirements
l Tenable Nessus Port Requirements
l Tenable Nessus Agent Port Requirements
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Note: If you bookmark a Tenable Vulnerability Management page within your browser, you must still log in
before accessing the bookmarked page.
In some cases, you may also need to navigate through the Workspace page and navigate to the Tenable
Vulnerability Management application before accessing the bookmarked page.
Note: If you are an administrator logging in to your Tenable Vulnerability Management instance for
the first time, Tenable provides your first-time credentials during setup. After you log in for the first
time, you can set your new password. If you are logging in to Tenable Vulnerability Management after
initial setup, your username is the email address you used to register for your Tenable Vulnerability
Management account.
- 42 -
l Review the System Requirements in the General Requirements User Guide and confirm that
your computer and browser meet the requirements.
Note: If your account is configured to use SAML, you can log in to Tenable Vulnerability Management
directly through your SAML provider. For more information, see SAML.
3. In the password box, type the Tenable Vulnerability Management password you created during
registration.
4. (Optional) To retain your username for later sessions, select the Remember Me check box.
Note:Tenable Vulnerability Management logs you out after a period of inactivity (typically, 30
minutes).
Note: When you view these metrics on an analysis page organized by plugin (for example, the
Vulnerabilities by Plugin page), the metrics represent the highest value assigned or calculated
for a vulnerability associated with the plugin.
For Tenable Lumin-specific information about VPR and the other Tenable Lumin metrics, see
Tenable Lumin Metrics.
CVSS
- 43 -
Tenable uses and displays third-party Common Vulnerability Scoring System (CVSS) values retrieved
from the National Vulnerability Database (NVD) to describe risk associated with vulnerabilities. CVSS
scores power a vulnerability's Severity and Risk Factor values.
Note: If a vulnerability's related plugin has CVSS vectors, the Risk Factor is calculated based on the
CVSSv2 vector and equates to the CVSSv2 score Severity. If a plugin does not have CVSS vectors, Tenable
independently calculates the Risk Factor.
Tenable Vulnerability Management imports a CVSS score every time a scan sees a vulnerability.
CVSS-Based Severity
Tenable assigns all vulnerabilities a severity (Info, Low, Medium, High, or Critical) based on the
vulnerability's static CVSS score (the CVSS version depends on your configuration). For more
information, see Configure Your Severity Metric.
Critical The plugin's highest The plugin's highest The plugin's highest
vulnerability CVSSv2 vulnerability CVSSv3 vulnerability CVSSv4
score is 10.0. score is between 9.0 score is between 9.0
and 10.0. and 10.0.
High The plugin's highest The plugin's highest The plugin's highest
vulnerability CVSSv2 vulnerability CVSSv3 vulnerability CVSSv4
score is between 7.0 score is between 7.0 score is between 7.0
and 9.9. and 8.9. and 8.9.
Medium The plugin's highest The plugin's highest The plugin's highest
vulnerability CVSSv2 vulnerability CVSSv3 vulnerability CVSSv4
score is between 4.0 score is between 4.0 score is between 4.0
and 6.9. and 6.9. and 6.9.
Low The plugin's highest The plugin's highest The plugin's highest
vulnerability CVSSv2 vulnerability CVSSv3 vulnerability CVSSv4
score is between 0.1 score is between 0.1 score is between 0.1
- 44 -
and 3.9. and 3.9. and 3.9.
Info The plugin's highest The plugin's highest The plugin's highest
vulnerability CVSSv2 vulnerability CVSSv3 vulnerability CVSSv3
score is 0. score is 0. score is 0.
- or - - or - - or -
The plugin does not The plugin does not The plugin does not
search for search for search for
vulnerabilities. vulnerabilities. vulnerabilities.
For each plugin, Tenable interprets CVSS scores for the vulnerabilities associated with the plugin
and assigns an overall risk factor (Low, Medium, High, or Critical) to the plugin. The Vulnerability
Details page shows the highest risk factor value for all the plugins associated with a vulnerability.
Note: Detection (non-vulnerability) plugins and some automated vulnerability plugins do not receive CVSS
scores. In these cases, Tenable determines the risk factor based on vendor advisories.
Tip: Info plugins receive a risk factor of None. Other plugins without associated CVSS scores receive a
custom risk factor based on information provided in related security advisories.
Tenable calculates a dynamic VPR for most vulnerabilities. The VPR is a dynamic companion to the
data provided by the vulnerability's CVSS score, since Tenable updates the VPR to reflect the
current threat landscape. VPR values range from 0.1-10.0, with a higher value representing a higher
likelihood of exploit.
- 45 -
Medium 4.0 to 6.9
Note: Vulnerabilities without CVEs in the National Vulnerability Database (NVD) (for example, many
vulnerabilities with the Info severity) do not receive a VPR. Tenable recommends remediating these
vulnerabilities according to their CVSS-based severity.
Tenable Vulnerability Management provides a VPR value the first time you scan a vulnerability on
your network. Then, Tenable Vulnerability Management automatically provides new and updated
VPR values daily.
Tenable recommends resolving vulnerabilities with the highest VPRs first. You can view VPR scores
and summary data in:
You can view the following key drivers to explain a vulnerability's VPR.
Note:Tenable does not customize these values for your organization; VPR key drivers reflect a
vulnerability's global threat landscape.
Age of Vuln The number of days since the National Vulnerability Database (NVD) published
the vulnerability.
CVSSv3 The NVD-provided CVSSv3 impact score for the vulnerability. If the NVD did
Impact not provide a score, Tenable Vulnerability Management displays a Tenable-
Score predicted score.
Exploit Code The relative maturity of a possible exploit for the vulnerability based on the
Maturity existence, sophistication, and prevalence of exploit intelligence from internal
- 46 -
and external sources (e.g., Reversinglabs, Exploit-db, Metasploit, etc.). The
possible values (High, Functional, PoC, or Unproven) parallel the CVSS Exploit
Code Maturity categories.
Product The relative number of unique products affected by the vulnerability: Low,
Coverage Medium, High, or Very High.
Threat A list of all sources (e.g., social media channels, the dark web, etc.) where
Sources threat events related to this vulnerability occurred. If the system did not
observe a related threat event in the past 28 days, the system displays No
recorded events.
Threat The relative intensity based on the number and frequency of recently observed
Intensity threat events related to this vulnerability: Very Low, Low, Medium, High, or
Very High.
Threat The number of days (0-180) since a threat event occurred for the vulnerability.
Recency
- 47 -
The Tenable Vulnerability Management interface uses different icons for each severity category and
accepted or recasted status.
Vulnerability Mitigation
Tenable Vulnerability Management vulnerabilities exist in one of two categories: Active or Fixed.
When Tenable Vulnerability Management discovers a vulnerability on an asset, the vulnerability
remains in the Active category until it is mitigated or fixed. Then, the vulnerability moves to the
Fixed category.
Active Vulnerabilities
- 48 -
Active vulnerabilities are any vulnerabilities in the New, Active, or Resurfaced states. For more
information, see Vulnerability States.
Fixed Vulnerabilities
The Fixed category contains vulnerabilities that Tenable Vulnerability Management determines are
not vulnerable, based on the scan definition, the results of the scan, and authentication
information. To be considered for mitigation, a vulnerability must be active and successfully
authenticated.
l A vulnerability with that combination of IP address, port, protocol, and plugin ID is not listed in
the scan results.
Mitigation Exceptions
Note the following exceptions for vulnerability mitigation:
l Vulnerabilities identified during a thorough scan by a plugin with the thorough_tests attribute
can only be mitigated by another thorough scan.
l The list of scanned ports can be expanded to “all” ports when one of the following plugins
triggered the host:14272 (SSH netstat), 34220 (WMI netstat), 14274 (SNMP).
l Agent scans cannot mitigate vulnerabilities discovered by a combined type plugin reported on
a remote port (not 0/445).
Vulnerability States
- 49 -
Tenable assigns a state to vulnerabilities detected on your network. You can track and filter by
vulnerability state to see the detection, resolution, and reappearance of vulnerabilities over time.
To filter for vulnerabilities by their state, use the Findings workbench.
Vulnerability
Description
State
Note: To view Fixed vulnerabilities by date range, use the Last Fixed filter.
Note: The API uses different terms for vulnerability states than the user interface. In the API, the new and
active states are both labeled as open. The resurfaced state is labeled as reopened. The fixed state is the
same.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
- 50 -
1. In the upper-right corner, click the blue user circle.
The quick actions menu displays a list of the most commonly performed actions.
Resource Center
The Resource Center displays a list of informational resources including product announcements,
Tenable blog posts, and user guide documentation.
- 51 -
To access the Resource Center:
Notifications
In Tenable Vulnerability Management, the Notifications panel displays a list of system notifications.
The button shows the current number of unseen notifications. When you open the Notifications
panel, Tenable Vulnerability Management marks those notifications as seen. Once you have seen a
notification, you can clear it to remove it from the Notifications panel.
- 52 -
Note:Tenable Vulnerability Management groups similar notifications together.
To view notifications:
o To expand a group of notifications, at the bottom of the grouped notification, click More
Notifications.
o To collapse an expanded group of notifications, at the top of the expanded notifications,
click Show Less.
o To clear an expanded group of notifications, at the top of the expanded notifications,
click Clear Group.
o To clear all notifications, at the bottom of the panel, click Clear All.
Settings Icon
Click the button to navigate directly to the Settings page, where you can configure your system
settings.
Workspace
When you log in to Tenable, the Workspace page appears by default. On the Workspace page, you
can switch between your Tenable applications or set a default application to skip the Workspace
page in the future. You can also switch between your applications from the Workspace menu,
which appears in the top navigation bar.
Important: Tenable disables application tiles for expired applications. Tenable removes expired application
tiles from the Workspace page and menu 30 days after expiration.
- 53 -
To open the Workspace menu:
1. From any Tenable application, in the upper-right corner, click the button.
1. From any Tenable application, in the upper-right corner, click the button.
- 54 -
The Workspace page appears.
By default, users with the Administrator, Scan Manager, Scan Operator, Standard, and Basic roles can set
a default application. If you have another role, contact your administrator and request the Manage
permission under My Account. For more information, see Custom Roles.
1. Log in to Tenable.
A menu appears.
- 55 -
3. In the menu, click Make Default Login Page.
1. Log in to Tenable.
A menu appears.
The user account menu provides several quick actions for your user account.
- 56 -
2. Do one of the following:
l Click My Profile to configure your own user account. You navigate directly to the My
Account settings page. See My Account for more information.
l Click What's new to navigate directly to the Tenable Vulnerability Management Release
Notes.
For additional information about navigating the Tenable Vulnerability Management interface, see
the following topics:
Navigate Breadcrumbs
Navigate Planes
Navigate Breadcrumbs
In the Tenable Vulnerability Management interface, certain pages display breadcrumbs in the top
navigation bar. From left to right, the breadcrumbs show the path of pages you visited to reach your
current page:
- 57 -
To navigate breadcrumbs:
l In the top navigation bar, click a link in the breadcrumb trail to return to a previous page.
Navigate Planes
Tenable Vulnerability Management combines fixed pages with overlapping planes.
l
Use the left navigation plane as follows:
a. In the upper-left corner, click the button.
With the exception of the left navigation plane, planes open from the right side of the screen.
2. Manipulate a plane using the following buttons at the left edge of the plane:
3. Return to a previous plane or page (and close a new plane or planes) by clicking the previous
plane.
- 58 -
Tenable Vulnerability Management Tables
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Explore Tables
Explore tables are any tables within the Explore section in the Tenable Vulnerability Management
user interface. They include many of the features of Tenable Vulnerability Management Workbench
tables, but include additional customization and filtering capabilities. For more information, see
Filter Findings or Assets.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Note: Customizable tables also include the ability to access the actions buttons by right-clicking a table
row. To access your browser menu, press the Ctrl key and right-click.
Tenable Vulnerability Management Workbench tables are any tables in the Tenable Vulnerability
Management interface outside of the Explore section.
- 59 -
l
Navigate the table:
o To adjust the sort order, click a column title.
Tenable Vulnerability Management sorts all pages of the table by the data in the
column you selected.
o In Tenable Vulnerability Management, to increase or decrease the number of rows
displayed per page, click Results per page and select a number.
This button appears instead of individual action buttons if 5 or more actions are
possible for the row.
o To navigate to another page of the table, click the arrows:
Button Action
Note: Due to limitations, the total number of findings is not always known past the 1000
limit. In this case, the table may display a modified interface, changes in pagination
labeling, and a disabled last page navigation button.
l
Search the table:
In the new interface, a search box appears above individual tables in various pages and
planes. In some cases, the search box appears next to the Filters box.
Your search criteria depends on the type of data in the table you want to search.
- 60 -
b. Click the button.
l To change the column order, drag and drop a column header to another position in the
table.
l
Remove or add columns:
a. Roll over any column.
c. Select or clear the check box for any column you want to show or hide in the table.
l
Adjust column width:
a. Roll over the header between two columns until the resize cursor appears.
Tip: To automatically resize a column to the width of its content, double-click the right
side of the column header.
Tenable Vulnerability Management sorts all pages of the table by the data in the column
you selected.
l To sort data in the table by multiple columns, press Shift and click one or more column
headers.
- 61 -
Tenable Vulnerability Management sorts all pages of the table in the order in which you
selected the columns.
Filter a Table
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
In Tenable Vulnerability Management, a Filters box appears above individual tables in various pages
and planes.
To filter a table:
a. In the drop-down list, search for the filter you want to apply.
b. Select the check box next to the filter or filters you want to apply.
For example, you might select Severity if filtering findings or Asset ID if filtering assets.
Note: When using the contains or does not contain operators, use the following best
practices:
l For the most accurate and complete search results, use full words in your search
value.
l Do not use periods in your search value.
l Remember that when filtering assets, the search values are case sensitive.
- 62 -
l Where applicable, Tenable recommends using the contains or does not contain
instead of the is equal to or is not equal to operators.
An example of the expected input is present in the box until you start
typing. If what you type is invalid for the attribute, a red outline appears
around the text box.
Single valid If a default value is associated with the attribute, Tenable Vulnerability
value Management selects the default value automatically.
To deselect values:
- 63 -
The value disappears from the box.
7. Click Apply.
Tenable Vulnerability Management clears all filters from the table, including saved
searches.
Note: Clearing filters does not change the date range selected in the upper-right corner of the
page. For more information, see Tenable Vulnerability Management Tables.
Tenable recommends the following to get started with Tenable Lumin data and functionality.
1. To add Tenable Lumin to your Tenable Vulnerability Management license, contact your
Tenable representative.
- 64 -
2. In your browser, disable features that may prevent you from enabling Tenable Lumin:
l Ad blocker extensions
l Do Not Track (Mozilla Firefox, Google Chrome, Apple Safari, or Microsoft Internet
Explorer)
Tip: You can re-enable these features after you fully enable Tenable Lumin.
Prepare
Generate data and learn about Tenable Lumin terminology.
Note: You must run scans to start Note: Tenable Lumin does not support
seeing data in Tenable Lumin views; third-party integration data.
Tenable Lumin shows scan result data
generated after you licensed Tenable 2. Create assets in Tenable Security
Lumin. For more information, see
Center to add business context to your
Tenable Lumin Data Timing.
assets.
Note: Tenable Lumin does not support 3. Configure Tenable Security Center to
third-party integration data. Tenable Lumin synchronization.
- 65 -
your assets. information, see Tenable Lumin Data
Timing.
3. Review the metrics terminology to
understand Vulnerability Priority Rating 4. View your assets as business context
(VPR) and Asset Criticality Rating (ACR) tags in Tenable Vulnerability
values and how they impact your Asset Management. For more information, see
Exposure Score (AES), Assessment Manage Asset Tags.
Maturity grade, and Cyber Exposure
5. Review the metrics terminology to
Score (CES).
understand Vulnerability Priority Rating
4. Allow sufficient time for your metrics to (VPR) and Asset Criticality Rating (ACR)
calculate. For more information, see values and how they impact your Asset
Tenable Lumin Data Timing. Exposure Score (AES), Assessment
Maturity grade, and Cyber Exposure
Score (CES).
1. Use the Tenable Lumin dashboard to understand your CES and access details pages.
l Cyber Exposure Score widget — How does your overall risk compare to other Tenable
customers in your Salesforce industry and the larger population?
l Cyber Exposure Score Trend widget — How has the overall risk for your entire
organization changed over time?
l Assessment Maturity widget — How frequently and thoroughly are you scanning your
assets?
- 66 -
l Remediation Maturity widget — How quickly and thoroughly are you remediating
vulnerabilities on your assets?
l Reduce Cyber Exposure Score widget — What would the impact be if you addressed all
of your top 20 recommended actions?
l Asset Criticality Rating Breakdown widget — How critical are your assets?
l Asset Scan Distribution widget — What types of scans have run on your assets?
l Mitigations widget — What endpoint protection agents are running on your assets?
l Cyber Exposure Score by Business Context/Tag widget — How do assets with different
tags (unique business context) compare?
2. To browse the most critical vulnerabilities on your network, sort your vulnerabilities by VPR.
3. To browse the most critical assets on your network, sort your assets by ACR.
1. Use the Assets page to review the Tenable-provided ACR values for your assets.
l Do any of your assets have ACR values that seem too high for the relative criticality of
that asset?
l Do any of your assets have ACR values that seem too low for the relative criticality of
that asset?
Important: Private findings are excluded from all scores in Tenable Lumin. For more information see
Findings.
- 67 -
1. View lists of Tenable-recommended action items:
2. Follow the recommendations and take steps to address the vulnerabilities on your network.
Mature
Mature your vulnerability management strategy.
l Continue monitoring and addressing vulnerabilities to lower your CES and AES.
l Continue exporting and sharing recommended actions (solutions) data with others in your
organization to refine your vulnerability management strategy.
Error Messages
For Tenable Vulnerability Management API status codes, see the Tenable Developer Portal.
Scanning
The following table describes the scanning error messages that may appear in Tenable Vulnerability
Management.
Some scanning errors occur when you exceed the following Tenable Vulnerability Management
scanning limitations:
Scan Limitations
Limitation Description
- 68 -
hostnames per information, see Discovery Scans vs. Assessment Scans). The host target
assessment scan limit is 10 times your organization's licensed asset count.
Host scan results Tenable Vulnerability Management limits the number of live hosts for
per scan which a single scan can generate scan results for. The live host scan
results limit is 1.1 times your organization's licensed asset count.
- 69 -
Targeted IP You cannot specify more than 300,000 comma-separated IP addresses or
addresses or ranges when configuring a scan’s targets.
ranges per scan
Active scans You cannot have more than 25 scans running in your container
simultaneously.
Scan chunks Tenable Vulnerability Management limits scan chunks to 10,000 hosts or
150,000 findings. If a scan chunk exceeds either value, Tenable
Vulnerability Management does not process the scan and eventually
aborts it.
Note: This limits items like MDM assessments, importing Nessus files, and
very large Auto Discovery scenarios like VMware to individual scans with less
than 10,000 assessed targets.
For more information about creating, modifying, and launching scans, see Manage Scans. For more
information about scan status values, see Scan Status.
Account Target The target count exceeds the limit You reached the maximum scan
Limit for this account. Please contact target limit. To increase your scan
customer support to upgrade your target limit by upgrading your
license. license, contact Tenable Support.
Agent Group The owner does not have access to You do not have access to all the
Permissions all of the configured agent groups. agent groups selected for this scan.
Select the correct groups. For more
information, see Agent Groups.
- 70 -
Warning Message Recommended Action
All Scans All active scans were aborted. Tenable Vulnerability Management
Aborted aborted the scan due to a system
abort request. Re-run the scan.
Auto Routed Custom scan targets are not Select a specific scanner to run
Custom Targets currently supported for auto routed scans on custom targets.
scans.
Concurrent Scan Concurrent scan limit reached for You reached the maximum
Limit this account. Please contact concurrent scan limit. Re-run the
customer support to upgrade your scan later.
license.
Concurrent Scan Scan could not be completed: You reached the maximum
Limit Reached concurrent scan limit reached for concurrent scan limit. Re-run the
this account. Please contact scan later.
customer support to upgrade your
license.
Conflict Transition for indexing to pausing The scan is completed and is now
not supported. in the process of indexing. Wait for
the indexing to complete.
Empty Scanner The scan is configured to use a Confirm the scanner group contains
- 71 -
Warning Message Recommended Action
Empty Targets No targets are configured for the Confirm the scan configuration
scan. contains one or more valid targets,
then re-run the scan.
Inactive The scan is configured to use a Confirm the scanner group contains
Scanners scanner group with no active functioning scanners, then re-run
scanners. the scan. For more information, see
Scanner Groups.
Indexing Error Unexpected error during task Re-run the scan for unscanned
processing. Targets may need to targets or targets that need to be
be rescanned : [scan targets] re-scanned.
Invalid AWS No valid AWS targets are Confirm the scan contains valid
Targets configured for the scan. AWS scan targets and re-run the
scan. For more information, see
Targets.
Invalid PCI The PCI scan can only be launched Use a Tenable cloud sensor to run a
Scanner using Tenable Cloud Scanners Tenable PCI ASV scan. For more
information, see Cloud Sensors.
Invalid Tag Failed to resolve a target FQDN or One or more assets in a tag
Target IP from an asset in the configured configured for the scan requires an
tags. associated scan target. Confirm the
tag configuration, then re-run the
scan. For more information, see
Tags.
Invalid Tag Rule Tags with the "Match All" filter can Adjust your tag rules, then re-run
- 72 -
Warning Message Recommended Action
As Target only have one rule for scans with the scan.
the "Targets defined by tags"
option enabled. Tag category: [tag
category], Tag value: [tag value].
Invalid Target Can't resolve target. Confirm your scan includes valid
scan targets, then re-run the scan.
For more information, see Targets.
Invalid Target An invalid target range is Correct or remove the invalid scan
Range configured for the scan: [scan target range, then re-run the scan.
targets] For more information, see Targets.
Invalid Targets No valid targets are configured for Confirm the scan targets meet the
the scan. following criteria:
- 73 -
Warning Message Recommended Action
Log4j DNS Unable to resolve DNS [scan Re-run the scan for unscanned
Failed Request target] to check Log4j targets or targets that need to be
Vulnerability. re-scanned.
Max Findings The maximum number of findings Review the Tenable Vulnerability
Error was reached. Management scan limitations and
adjust the scan configuration to
produce an allowed number of
findings.
Max Hosts Scan has exceeded the maximum Review the Tenable Vulnerability
Reached Error number of allowed hosts. Management scan limitations and
adjust the scan configuration to
scan an allowed number of hosts.
No Available Unable to find a scanner that is Confirm you selected the correct
Scanner able to run the scan. scanner, then re-run the scan.
No Configured The scan has no configured Agent Add at least one Agent Group to the
Agent Groups Groups. scan.
No Scan Policy The scan must be configured with The scan requires a scan policy.
a scan policy. Configure a scan policy, then re-run
the scan.
- 74 -
Warning Message Recommended Action
Notification Notifications for this scan may not The scan completed, but failed to
Error have been sent. send a notification.
Owner Disabled The owner of the scan is disabled. Enable the owner of the scan or
transfer ownership to an enabled
user. For more information, see
Permissions.
Paused Scan Paused scan exceeded timeout of The paused scan exceeded the
Timeout [maximum allowed pause] days. maximum pause duration. Re-run
Some tasks were aborted. Targets the scan for all incomplete scan
may need to be rescanned. targets.
Pending Scan The scan was unable to transition Confirm the selected scanner group
Timeout to running within the expected has sufficient capacity, then re-run
timeout. the scan. For more information, see
Scanner Groups.
Policy The owner of the scan does not You do not have access to the scan
Permissions have access to the configured policy for this scan. Re-run the
policy. scan with correct permissions. For
more information, see Permissions.
Portscanner Max Portscanners have found more Since this negatively impacts both
Ports Exceeded than [number] ports open for scan accuracy and performance,
target [target name], and the you may want to adjust your
number of reported ports has been network security configuration to
truncated to [number] (threshold disable this behavior for
controlled by scanner preference vulnerability scans.
portscanner.max_ports). Usually
this is due to intervening network
equipment intercepting and
responding to connection requests
as a countermeasure against
portscanning or other potentially
- 75 -
Warning Message Recommended Action
malicious activity.
Routed To The following targets were routed Confirm the scanner group contains
Inactive to a scanner group with no active functioning scanners, then re-run
Scanners scanners: [scan targets] the scan. For more information, see
Scanner Groups.
Running Scan The scan exceeded the maximum The scan may be taking too long to
Timeout allowed runtime. scan some scan targets. Re-run the
scan.
Scan Aborted The assigned scanner was not Tenable Vulnerability Management
found. could not find the selected scanner.
Select a different scanner and re-
run the scan.
Scan Forbidden Rejected attempt to scan [scan The scan target is excluded from
target], as it violates user-defined scans. If you want to scan this
- 76 -
Warning Message Recommended Action
Scan Job The scan could not be initialized. Tenable Vulnerability Management
Initialization Please check the scan targets failed to launch the scan. Re-run
Error setting for irregularities and the scan with the correct scan
contact support if the problem target. For more information, see
persists. Targets.
Scanner Group Unable to load scanner group for Confirm the scan configuration
Error scanner [scanner ID]. contains one or more valid targets,
then re-run the scan.
- 77 -
Warning Message Recommended Action
Scanner Not The assigned scanner was not Tenable Vulnerability Management
Found found. could not find the selected scanner.
Select a valid scanner and re-run
the scan.
Scanner The owner of the scan does not You do not have access to the
Permissions have access to the assigned selected scanner. Select a different
scanner. scanner and re-run the scan. For
more information, see Permissions.
Stalled Task A task was automatically aborted Confirm the scanners are
after stalling on scanner. Targets functioning properly and have
may need to be rescanned: [scan enough capacity for your scans,
targets] then re-run the scan for unscanned
targets or targets that need to be
re-scanned.
Tag Not Found Tenable Vulnerability Management Open the scan configuration in
could not process the tag. The tag Tenable Vulnerability Management
either did not exist at the time of to automatically remove any tags
scanning or the user does not have that no longer existing. Save the
access to the tag. Tag UUID: [tag scan configuration and re-run the
uuid]. scan.
- 78 -
Warning Message Recommended Action
Error associated with scan. could not obtain the scan targets.
Verify the targets and re-run the
scan. For more information, see
Targets.
Target Access The owner of the scan does not You do not have the correct user
Error have access to any configured permissions to run the scan. Check
targets. your user permissions and re-run
the scan. For more information, see
Permissions.
Target Group The owner of the scan does not Confirm the scan owner's
Permissions have access to all of the configured permissions, then re-run the scan.
target groups. For more information, see Target
Groups.
Target Limit The target count exceeds the The scan target range is too large.
maximum allowed for Tenable Confirm the scan configuration
Vulnerability Management. includes a valid target range, then
re-run the scan. For more
information, see Targets.
Target Range A target range exceeds the Confirm or reduce the configured
Limit maximum allowed targets: [scan scan target range and re-run the
targets] scan. For more information, see
Targets.
Targets Unable The following targets are not able Re-run the scan for unscanned
To Complete to complete scanning in the targets or targets that need to be
allowed scan time and will need to scanned again.
be rescanned: [scan targets]
- 79 -
Warning Message Recommended Action
Task Processing Unexpected error in processing. Re-run the scan for unscanned
Error Targets may need to be rescanned: targets or targets that need to be
[scan targets] re-scanned.
Transition Some tasks stalled when being Failed to complete scan on some
Timeout [resumed, paused, or stopped] and scan targets. Re-run the scan for all
were aborted. Targets may need to unscanned scan targets.
be rescanned.
- 80 -
Dashboards
Dashboards are interactive, graphical interfaces that often provide at-a-glance views of key
performance indicators (KPIs) relevant to a particular objective or business process.
Note: Depending on your license, more dashboards are included. For example, the Tenable Lumin
dashboard.
l Dashboards that other users have shared with you. Click the Shared with Me tab to view
dashboards that others have shared with you.
Note: There may be a delay between when a scan completes and when the dashboard data updates while
Tenable Vulnerability Management indexes the data.
You can roll over individual items to reveal additional information or click on items to drill down into
details behind the data.
- 81 -
Tip: All charts on the Vulnerability Management Overview show New, Active, and Resurfaced vulnerability
data. However, the counts or data displayed on each chart may differ for other reasons. For example, the
Vulnerability Priority Rating (VPR) widget organizes vulnerabilities by VPR category, but the Vulnerability
Trending widget graphs vulnerabilities by CVSS-based severity category. For more information about how
severity and VPR metrics compare, see CVSS vs. VPR.
In the Vulnerability Management Overview, you can interact with the following widgets:
Widget Action
Cyber Exposure News This widget highlights the most recent Tenable blog posts
Feed related to exposure incidents.
- 82 -
information, see View Asset Details.
l View a count of your scans run during the last 90 days and
the percentage that succeeded and failed.
CISA Alerts AA22-011A This widget provides a vulnerability count of risks associated
and AA22-047A with the CISA Alerts AA22-011A and AA22-047A vulnerabilities
that have been identified or mitigated.
- 83 -
The Vulnerabilities page appears, filtered by the range you
selected. For more information, see View Vulnerabilities by
Plugin.
Vulnerability Trending This widget shows the cumulative number of Critical, High,
Medium, and Low severity vulnerabilities on your network over
time. For more information, see CVSS vs. VPR.
- 84 -
l To export the data in the widget, click the button and
select a format.
Critical and High This widget summarizes the number of Critical and High severity
Exploitable Vulnerabilities vulnerabilities on your network, organized by exploitability
characteristic category. A single vulnerability may have multiple
exploitability characteristics and count towards multiple
categories.
Future Threats: Not Yet This widget summarizes the vulnerabilities that are not yet
Exploitable Vulnerabilities exploitable, determined by their Exploit Code Maturity and
Vulnerability Publication Date.
Vulnerability Age This widget summarizes the age of your vulnerabilities (by
Vulnerability First Seen date), organized by severity, to help you
manage your SLAs. For more information about severity, see
- 85 -
CVSS vs. VPR.
Note: There may be a delay between the time when a scan completes and when the dashboard data
updates while Tenable Vulnerability Management indexes the data.
Hovering over individual items reveals a data summary that you can click to drill down for further
details.
In the Vulnerability Management Overview (Explore), you can interact with the following widgets:
Widget Action
Cyber Exposure News This widget highlights the most recent Tenable blog posts
Feed related to exposure incidents.
- 86 -
and Frictionless Assessment. The numbers displayed in this
widget use severity to determine the precedence of
vulnerabilities to mitigate.
Tenable Research This widget provides two indicators for current major threats
Advisory discovered by Tenable Research. The red indicator signifies the
presence of the relevant vulnerabilities, while the green
indicator is enabled when these vulnerabilities are patched.
- 87 -
The Findings page appears with details about the assets
detected in the selected range.
Critical and High This widget focuses on the most severe current threats, critical,
Exploitable Vulnerabilities and high exploitable vulnerabilities to help prioritize remediation.
Each bar represents vulnerabilities grouped by an exploitability
characteristic.
- 88 -
l Exploited by Malware: Vulnerabilities that can be exploited
by malicious software, such as viruses, worms, spyware,
adware, and ransomware.
Future Threats: Not Yet This widget provides a view of vulnerabilities based on exploit
Exploitable Vulnerabilities code maturity and vulnerability publication date. The columns
display counts of published vulnerabilities within the specified
- 89 -
time period present in the organization. The rows display the
exploit code maturity, where Proof of Concept is more serious
than Unproven Exploit.
- 90 -
The Findings page appears with details about assets
detected for the category.
The tables below describes the sections and widgets displayed in the Web Applications Scanning
dashboard. You can view details about the data in a widget by clicking the widget.
Widget Description
Findings Number of findings Tenable Web App Scanning has discovered. The
findings are categorized by severity (Critical and High).
- 91 -
Widget Description
OWASP Top 10
This chart displays the vulnerabilities discovered by Tenable Web App Scanning that appear in the
latest Open Web Application Security Project (OWASP) Top 10 Most Critical Web Application
Security Risks document.
Tenable Vulnerability Management updates dashboard data based on date filters you add when you
Create a Custom Widget for the dashboard.
- 92 -
a. In the upper-left corner, click the button.
The Dashboards page appears. The page contains tiles that represent:
l Tenable-provided dashboards
l In the upper-left corner, use the Search bar to search for specific dashboards.
l In the upper-left corner, use the drop-down to change the order in which dashboards
appear on the Dashboards page.
l Edit a dashboard.
l Share a dashboard.
l Export a dashboard.
l Duplicate a dashboard.
- 93 -
l Delete a dashboard.
Tenable-Provided Dashboards
On the Dashboards page, Tenable Vulnerability Management shows dashboards in the following
order:
2. Dashboards you create and dashboards that have been shared with you.
Note: You can change the order in which dashboards appear by using the drop-down in the upper-right
corner of the Dashboards page.
The Tenable-provided dashboards you see depend on the licenses you have, but can include the
following:
Dashboard License
Note: You can export the Vulnerability Management Overview and Asset View dashboard landing pages,
or export individual widgets on those dashboards. For more information, see Export a Full Dashboard and
Export an Individual Dashboard Widget.
Note: If your dashboard fails to show data, you may be filtering the dashboard by a target group with too many
targets. Tenable recommends limiting the number of targets in any individual target group.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
- 94 -
In Tenable Vulnerability Management, you can export the following dashboard landing pages:
l Asset View
l Tenable Lumin
Once the export completes, a Success message appears and Tenable Vulnerability
Management downloads the export file to your computer. Depending on your browser
settings, your browser may notify you that the download is complete.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
In Tenable Vulnerability Management, you can export individual widgets from the following
dashboard landing pages:
l Asset View
- 95 -
l Tenable Lumin
1. View the dashboard page that contains the widget you want to export.
2. In the header of the widget you want to export, click the button.
Once the export completes, a Success message appears and Tenable Vulnerability
Management downloads the export file to your computer. Depending on your browser
settings, your browser may notify you that the download is complete.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Tenable Vulnerability Management updates dashboard data every time you run a scan.
l In grid view, roll over the tile for the dashboard you want to view.
- 96 -
l In list view, roll over the thumbnail dashboard image for the dashboard you want to view.
3. Click View.
Tip: Use this option to view legacy versions of Explore dashboards. For more
information, see Enable Explore Dashboards
l Click on widget elements to drill down into details behind the data.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
- 97 -
To view the dashboard template library:
a. In the upper-right corner of the page, click the button in the drop-down box.
l In the upper-left corner, use the Search bar to search for specific dashboards.
l Click the New and Updated tab to view dashboards that are eligible for auto-update.
l Preview a dashboard.
l Create a dashboard.
Create a Dashboard
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
You can create a custom dashboard or use the Template Library to create a copy from the available
templates. Dashboards let you drill down to view the details of each widget.
Important: The Template Library in Tenable Vulnerability Management includes Explore dashboard
templates. The Explore dashboard templates are marked with Explore at the end of the template name.
For example: Vulnerability Management (Explore). From the dashboards that you create using these
templates, you can drill down to the Findings or Assets pages. To add an Explore dashboard, see Enable
Explore Dashboards.
To create a dashboard:
- 98 -
1. View the Dashboards page.
b. In the Groups panel on the left, click the group name to view the templates for the
category.
The following is not supported in Tenable FedRAMP Moderate environments. For more
information, see the Tenable FedRAMP Moderate Product Offering.
Category Description
Center for CIS Benchmarks are best practices for the secure configuration
Internet of a target system. Be sure to use the proper audit file for
Security (CIS) scans.
- 99 -
Host Audit Organizations such as CIS, DISA, and some vendors create
Plugin Type golden configurations standards, known as benchmarks.
Tenable creates audit files that perform a detailed
configuration review. Scanning the assets with the Host Audit
Compliance Check plugins allows you to do detailed
configuration checks. These reports provide summary and
detailed information for all the Host Audit Compliance Check
plugins.
Tenable Best Allows you to implement best practice audits for new
Practice Audits technologies. Be sure to use the proper audit file for scans.
Web App Web application security provides the ability to detect and
Scanning mitigate threats and vulnerabilities that may compromise the
confidentiality, integrity, and availability of web applications.
These reports leverage data from Tenable Web App Scanning, a
comprehensive and automated vulnerability scanning tool for
modern web applications.
- 100 -
d. Hover over the template.
e. (Optional) To preview the dashboard template, click Preview. For more information, see
Preview a Dashboard.
f. Click Add.
The new dashboard appears on the Dashboards page with the name Copy of selected
dashboard.
A menu appears.
- 101 -
b. Do one of the following:
Note: The Edit Filter option does not appear if there are no widgets added to the
dashboard.
The edges of the widget become defined and exhibit a raised appearance.
d. Release the mouse button to drop the widget in the new location.
What to do next:
l Manage Dashboards
- 102 -
Preview a Dashboard
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
When creating a new dashboard from a template, you can preview the dashboard before adding it to
the Dashboards page.
To preview a dashboard:
1. Create a dashboard.
2. In the Template Library, roll over the template you want to preview.
3. Click Preview.
4. To exit the preview, in the top navigation bar, click a link in the breadcrumb trail to return to
the Template Library, or the Dashboards page.
An Added dashboard to Dashboards confirmation message appears, and the new dashboard
appears on the Dashboards page with the name Copy of selected dashboard.
To use Explore dashboards within Tenable Vulnerability Management, you must first add them to
your interface via the Template Library.
Note: The numerical data that appears on your Explore dashboards may not match the data on your legacy
Tenable Web App Scanning or VM dashboards.
Note: The data on your Explore Tenable Web App Scanning and VM dashboards reflects your complete
scanning history. This differs from the Tenable Web App Scanning and VM dashboards, which display data
- 103 -
for only the last 30 calendar days.
If Explore dashboards do not appear, your container may not have enabled them. Please contact
your Customer Success Manager.
5. For each Explore dashboard you want to add to your interface, do the following:
b. Click Add.
Note: To reenable your Tenable Web App Scanning or VM dashboards, enable the corresponding
workbench.
Manage Dashboards
This section contains the following topics related to help you manage your Tenable Vulnerability
Management dashboards:
Dashboard Groups
- 104 -
In Tenable Vulnerability Management, you can organize dashboards into groups via the dashboard
Groups panel. This allows you to track different types of dashboards, and dashboards that others
have shared with you. You can also share a dashboard group with one or more users or user groups.
The Groups panel automatically expands when you view the Dashboards page. The panel is
separated by Tenable-provided dashboard groups and user-created dashboard groups.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
3. In the Group Name box, type a name for your dashboard group.
4. In the Dashboards to Include section, select the check box next to any dashboards you want
to add to the dashboard group.
5. Click Save.
Tenable Vulnerability Management adds the dashboard group to the user-created dashboard
list in the Groups panel.
Note: Dashboard groups are not automatically re-shared with a user after they have been updated. For
example:
- 105 -
User A shares a dashboard group with User B. User A then makes a change to the dashboard group. To see
the update, User A must re-share the dashboard group, with User B.
Note: Shared content may appear differently to the users with which it is shared based on the access group
to which they belong.
2. In the Groups panel, click the user-created dashboard group you want to share.
l To share the dashboard group with all users, select the All Users check box.
l To share the dashboard group with specific users or user groups, from the drop-down
box, select the users or user groups with which you want to share the dashboard group.
5. Click Share.
A Group shared successfully message appears. Tenable Vulnerability Management shares the
dashboard group with the designated users or user groups and sends an email indicating that
you shared a dashboard with them.
- 106 -
1. View the Dashboards page.
2. In the Groups panel, click the user-created dashboard group you want to edit.
4. (Optional) In the Group Name box, edit the name of the dashboard group.
5. (Optional) In the Dashboards to Include section, select or deselect the dashboards that
appear in the dashboard group.
6. Click Save.
2. In the Groups panel, click the user-created dashboard group you want to delete.
4. Click Delete.
Note: Deleting dashboard groups does not delete the dashboards within the group.
- 107 -
Automatically Update Widgets on a Dashboard
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
To provide the most up-to-date vulnerability information, Tenable updates or adds new dashboard
widgets when, for example, a new vulnerability is exposed or when Tenable Vulnerability
Management adds a new vulnerability filter. When Tenable updates these widgets, you can view and
automatically update them in one of the following ways:
l Dashboards page — On the Dashboards page, you can update all updated widgets on a
dashboard at one time.
l Dashboard Template Library — When creating a custom dashboard via the Template Library,
you can view new or updated widgets and add them to the custom dashboard.
Note: On predefined dashboard templates, Tenable Vulnerability Management always includes the
most recent version of widgets.
l Widget Library — In the Widget Library, you can view new or updated widgets and add them
to up to ten individual dashboards.
Note: You can also see dashboards with new and updated widgets on the All tab. These dashboards
appear with a pulsing blue dot next to the dashboard name.
3. Roll over the dashboard for which you want to update widgets.
4. Click Apply.
An Update Available message appears that describes the updates to the widgets on the
dashboard.
- 108 -
5. Click Update.
4. Click Add.
5. In the Dashboards drop-down, select the dashboard or dashboards to which you want to add
the new or updated widget.
6. Click Save.
Edit a Dashboard
- 109 -
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
To edit a dashboard:
c. Click Edit.
A drop-down appears.
l
Rename the dashboard:
a. Click the name of the dashboard.
- 110 -
l
Edit the dashboard description:
a. Click the dashboard description.
l
Edit the dashboard filters:
a. In the upper-right corner of the page, click Edit Filter.
l
Add widgets to the dashboard:
a. In the upper-right corner of the page, click Add Widgets.
A menu appears.
l
Reorder widgets on the dashboard:
a. Roll over the top of the widget until the move cursor appears.
l
Resize the widgets on the dashboard:
- 111 -
a. Roll over the lower-right corner of the widget until the resize cursor appears.
l
Delete the dashboard:
o In the lower-left corner of the page, click Delete Dashboard.
You return to the selected dashboard and Tenable Vulnerability Management applies your
changes.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
You can set any dashboard as the default dashboard to make it your landing page. If you do not set
a default dashboard, Tenable Vulnerability Management uses the Tenable-provided Vulnerability
Management Overview dashboard as the default.
When you set a dashboard as default, on the Dashboards page, the Default label appears in the
header of the dashboard tile.
Note: If you delete a dashboard set as default, the product Tenable-provided dashboard becomes the
default.
- 112 -
1. Do one of the following:
Note: You may have to log out and log back in to see the updated default dashboard.
Rename a Dashboard
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
To rename a dashboard:
- 113 -
A confirmation appears at the top of the page.
Duplicate a Dashboard
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Required Tenable Web App Scanning User Role: Scan Operator, Standard, Scan Manager, or
Administrator
To duplicate a dashboard:
2. Click Duplicate.
Filter a Dashboard
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
You can apply filters at the dashboard level to all widgets within that dashboard.
- 114 -
Note: You can apply configurations to individual widgets. The widget-level configuration takes precedence
over dashboard-level configuration.
A drop-down appears.
3. Click Filter.
4. In the Select Filter Type drop-down, select the assets you want the dashboard to analyze. See
the following table for options and requirements.
All Assets (Default) This option includes This is the default option and
all the assets in the includes all assets in the dashboard.
dashboard. There is not a requirement for this
option.
Target Group This option only includes An extra field for Select Target
assets in a specific target Groups appears when you select this
group. option. Select the desired target
group from the drop-down list.
Custom This option only includes A text box appears when you select
assets with a specific this option. Enter one or more of the
hostname, IP address, FQDN, custom option formats (hostname, IP
or CIDR. address, FQDN, or CIDR). Separate
multiple items with commas.
- 115 -
number of IP addresses in your
search filter is less than or equal to
25.
5. Click Apply.
6. In the widgets section, roll over the icon to view the added filter.
Note: The following are the filtering limitations for Explore widgets:
Note: You can filter only with the tags you can access. You cannot apply tags that you do not have access
to.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
You can filter a dashboard to show only vulnerabilities within a specific timeframe — in hours, days,
months, or years. Filters are available only for custom dashboards or dashboards created using the
template library.
Note: Filter by time option is available only for Explore dashboards and Explore widgets.
2. To filter your dashboard data for a specific timeframe, do one of the following:
- 116 -
l In the All drop-down box, select the required timeframe: All, 7 days ago, 14 days ago, 30
days ago, 60 days ago, 90 days ago.
l For a custom timeframe, in the Last Seen box, type the value to view the data within the
last number of days, hours, years, or months.
Tenable Vulnerability Management displays the vulnerabilities for the selected timeframe on
the dashboard.
Share a Dashboard
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Tenable Vulnerability Management users can share a dashboard with one or more users, or one or
more user groups. Shared dashboards appear automatically for the users or groups with which they
are shared.
Note: You cannot edit dashboards that are shared with you. You can, however, duplicate or delete a
dashboard that is shared with you.
Note: Dashboards are not automatically re-shared with a user after they have been updated. For example:
User A shares a dashboard with User B. User A then makes a change to the dashboard. To see the update,
User A must re-share the dashboard with User B.
Note: Shared content may appear differently to the users with which it is shared based on the access group
to which they belong.
To share a dashboard:
- 117 -
c. Click Share.
l To share the dashboard with all users, select the All Users check box.
l To share the dashboard with specific users or user groups, from the drop-down box,
select the users or user groups with which you want to share the dashboard.
3. Click Share.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
With the export feature, you can export dashboard data in CSV, PDF, and detailed PDF formats. You
can create dashboard exports on demand or schedule automated exports to specified recipients.
You can also manage your dashboard exports. You can download them, view your export history,
delete your exports, or delete their configuration.
Note: While you cannot export the Vulnerability Management Overview and Asset View dashboards, you
can export their associated landing pages, or export individual widgets on those dashboards. For more
information, see Export a Full Dashboard Landing Page and Export an Individual Dashboard Widget.
Export a Dashboard
- 118 -
To export a dashboard in CSV format:
1. Do one of the following:
c. Click CSV.
The export request and status appears in the Downloads section on the Exports plane.
When the export completes, Tenable Vulnerability Management downloads the export file to
your computer. Depending on your browser settings, your browser may notify you that the
download is complete.
To export a PDF:
- 119 -
1. Do one of the following:
Note: The PDF report contains the displayed information for the selected dashboard. The
information that you see on the screen is the information that is included in the report.
- 120 -
The PDF - Detailed report has in-depth information, including vulnerability details, that goes beyond
the items displayed.
Note: If you select PDF - Detailed and there are user-created filters applied to one or more widgets
on the dashboard, a Confirm Export message appears indicating that Tenable Vulnerability
Management does not apply user-created filters to any additional chapters. Click Confirm to continue
with the export.
The export request and status appears in the Downloads section on the Exports plane.
When the export completes, Tenable Vulnerability Management downloads the export file to
your computer. Depending on your browser settings, your browser may notify you that the
download is complete.
To schedule an export:
- 121 -
The Schedule Export plane appears.
l If you have never exported and/or scheduled an export for the dashboard, the Schedule
options automatically appear.
l If you have already exported the dashboard, in the Schedule section, click Add New.
l If you have already scheduled an export for the dashboard, you cannot create another
one. You must first cancel the scheduled dashboard export.
Note: The PDF report contains the displayed information for the selected dashboard. The
information that you see on the screen is the information included in the report.
The PDF - Detailed report has in-depth information, including vulnerability details, that goes beyond
the items displayed.
Note: If you select PDF - Detailed and there are user-created filters applied to one or more widgets
on the dashboard, a Confirm Export message appears indicating that Tenable Vulnerability
Management does not apply user-created filters to any additional chapters. Click Confirm to continue
with the export.
Option Description
Start Date and Time The date and time that you want the export to begin.
- 122 -
l Monthly — The export occurs once a month on the day of
the week and time specified (for example Monthly on Last
Tuesday)
Note: Once you save the scheduled export, you cannot edit the
Encryption Password. Instead, you must create a copy of the
dashboard, create a scheduled export, and then select the desired
password.
Add Recipients (Optional) The email address for the person that receives the
report. You can specify multiple email addresses as a comma-
separated list.
5. Click Schedule.
- 123 -
1. Do one of the following:
c. Click Export.
2. In the Downloads section, next to the export download you want to download, click the
button.
- 124 -
l The schedule for the dashboard export.
You cannot access the Export History plane if the dashboard has not yet been exported.
c. Click Export.
2. In the Downloads section, roll over the export download you want to delete.
4. Click Delete.
- 125 -
To delete a dashboard export configuration:
1. Do one of the following:
c. Click Export.
a. View the dashboard for which you want to delete a scheduled export.
2. In the Schedule section, roll over the scheduled export configuration you want to delete.
4. Click Confirm.
Delete a Dashboard
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Note: In Tenable Vulnerability Management, you can only delete custom dashboards. You cannot delete
Tenable-Provided Dashboards.
- 126 -
To delete a dashboard:
2. Click Delete.
3. Click Delete.
Manage Widgets
You can use the widget library to create and edit widgets to use across your dashboards.
On your dashboards, you can further configure widgets to modify your dashboards.
- 127 -
l Configure a Widget
l Duplicate a Widget
l Rename a Widget
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
The widget library provides a selection of Tenable-provided widgets to add to your template-based
or custom dashboard.
Note: The Tenable-provided Vulnerability Trending widget is not available in the widget library. All other
Tenable-provided widgets appear in the widget library.
2. In the upper-right corner of the page, click the Widget Library button.
3. (Optional) In the upper-left corner of the page, click the tab for the dashboard widgets you
want to view. For example, if you want to only widgets associated with Tenable Vulnerability
Management, click the Vulnerability Management tab.
Note: The tabs that appear on the Widgets page depend on the licenses (for example, Tenable
Lumin, Tenable Web App Scanning) you have enabled in Tenable Vulnerability Management.
a. In the upper-right corner of the page, click the button in the drop-down box.
b. Select the criteria by which you want to sort the widgets page.
l In the upper-left corner, use the Search bar to search for specific widgets.
- 128 -
l Click the New and Updated tab to view dashboard widgets that are eligible for auto-
update.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Note: You can only delete custom widgets. You cannot delete pre-configured Tenable Vulnerability
Management widgets.
3. In the header of the widget you want to delete, click the button.
4. Click Delete.
5. Click Delete.
Tenable Vulnerability Management removes the widget from the widget plane, and a message
confirming the deletion appears at the top of the plane.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
You can use the custom widget option to create uniquely defined widgets, which you can then add
to any user-defined dashboards.
- 129 -
To create a custom widget:
b. In the upper-right corner of the page, click the Custom Widget button.
a. Edit a dashboard.
A menu appears.
A menu appears.
4. In the charts section, select the chart type for your custom widget:
l Table
5. In the dataset drop-down box, select the type of information Tenable Vulnerability
Management uses to update the widget:
- 130 -
l Vulnerabilities
l Assets
Note: If you selected ring chart or bar chart in the charts section, selecting the Assets
dataset resets the chart selection to a table.
The chart type, Data Grouping, and Display Fields options update based on your selection.
6. In the Data Grouping drop-down box, select how you want to group the data:
Note: If you previously created a tag, it appears in the custom widget's list of filters.
Note: If you exceed the current asset query limitation of 5,000, a message appears in your interface.
Refine the query to a smaller set of asset tags.
Note: Tenable Vulnerability Management does not currently support tag filters in exports.
8. (Optional) To filter the widget data using an existing saved search, in the Saved Searches
drop-down box, select the saved search you want to use to filter your widget data.
Note: If you do not have any saved searches, this option does not appear. To create a new saved
search, see Saved Search.
- 131 -
In the Widget Preview, the title updates automatically.
10. (Optional) In the Description box, type a description for the custom widget.
In the Widget Preview, the icon appears and the description hover text updates
automatically.
Note: While Name, Description, and the chart type all update in the widget preview automatically, all
other configuration options refresh after you click Update Preview.
Tenable Vulnerability Management saves the custom widget to the widget library, and you can
add the widget to any user-defined dashboards.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Required Tenable Web App Scanning User Role: Scan Operator, Standard, Scan Manager, or
Administrator
You can use the custom widget option to create uniquely defined widgets, which you can then add
to any user-defined Explore dashboards. You can create custom widgets with vulnerabilities and
assets data. Vulnerabilities can include host vulnerabilities, Tenable Web App Scanning
vulnerabilities, and vulnerabilities from Legacy Tenable Cloud Security. Adding a mix of these
custom widgets to your dashboard provides you with a holistic view of the vulnerability
environment.
You can drill down from the custom widgets to the Findings and Assets pages.
- 132 -
1. Do one of the following:
b. In the upper-right corner of the page, click the New Custom Widget button.
a. Edit a dashboard.
A menu appears.
2. In the Chart Type section, select the chart type for your custom widget:
l Bar
l Column
l Doughnut
l Matrix
l Multi-series Bar
l Multi-series Column
l Stacked Bar
l Stacked Column
l Table
- 133 -
l Chart types for assets:
l Column
l Bar
l Doughnut
l Table
4. (Optional) In the Description box, type a description for the custom widget.
In the Widget Preview, the icon appears and the contextual description updates
automatically.
5. In the Data Set drop-down box, select the type of information Tenable Vulnerability
Management uses to update the widget:
l Findings
l Assets
The Chart Type, Group By, and Sort Fields options update based on your selection.
If you
Options
selected...
- 134 -
b. In the Limit drop-down box, select the number of records you
want to show on the widget. The default value is 5 and maximum
value is 20.
c. In the Group By drop-down box, select how you want to group the
data. The values in the Group By drop-down changes based on the
Entity you select.
Note: For Bar, Column, Doughnut, and Table chart types, you
can select only one option to group vulnerabilities. For Matrix,
Multi-series Bar, Multi-series Column, Stacked Bar, and
Stacked Column chart types, you must select two options for
grouping vulnerabilities.
d. In the Stats drop-down box, select the statistics you want to show
on the widget.
For all chart types except Table, count is the default statistic
option. For the Table chart type, you can select from multiple
options.
e. In the Sort Fields drop-down box, select how you want to sort the
data on the widget. You can sort by one of these options:
l Count
l Value in Group By
f. In the Sort Order drop-down box, select whether you want the sort
in ascending or descending order.
- 135 -
b. In the Group By drop-down box, select how you want to group the
data:
l System Type
l Name
l Operating System
l SSH Fingerprint
l Mac Addresses
l Asset Types
Note: For Bar, Column, Doughnut, and Table chart types, you
can select only one option to group assets. For Matrix, Multi-
series Bar, Multi-series Column, Stacked Bar, and Stacked
Column chart types, you must select two options for grouping
assets.
c. In the Stats drop-down box, select the statistics you want to show
on the widget.
For all chart types except Table, count is the default statistic
option. For the Table chart type, you can select from multiple
options.
Note: Tenable recommends that you use simple instead of complex queries or one level of nested
filters when creating your custom widgets. Widgets can only have a maximum of one level of nested
filters, provided no additional context filters are applied when the widgets are added to the
dashboards. An example of a query with one level of nesting:
(CVSSv3 Base Score is greater than 8.9 OR VPR is greater than 8.9) AND State is
not equal to Fixed
- 136 -
b. Click the filter you want to apply.
d. In the first drop-down box, select the operator you want to apply to the filter.
e. In the second drop-down box, select one or more values to apply to the filter.
f. Select Match All from the drop-down box. By default, Tenable Vulnerability Management
sets the filter to Match All.
Note: While Name, Description, and the chart type all update in the widget preview automatically, all
other configuration options refresh after you click Update Preview.
Tenable Vulnerability Management saves the custom widget to the widget library, and you can
add the widget to any user-defined dashboards.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
3. In the upper-right corner of the widget you want to edit, click the button.
A menu appears.
- 137 -
4. Click Edit.
A confirmation appears.
Note: A custom widget that was previously included in dashboards before you edited the widget does not
update to reflect your edits. To include the edited widget, you must add the widget again as described in
Add a Widget to a Dashboard.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Use the following steps to add a widget to your template-based and custom dashboards.
You can add custom widgets, widgets from Tenable-provided dashboards, and other general
purpose Tenable-provided widgets.
Note: These steps describe how to add a template widget to a dashboard. See custom widgets for
information on how to create custom widgets and add them to your dashboard.
Tip: You can hover over a widget tile for brief descriptions of each widget. For detailed
descriptions about widgets originating from Tenable-provided dashboards, see Tenable-
Provided Dashboards.
- 138 -
b. Roll over the widget you want to add.
d. In the Dashboards drop-down box, select the dashboard or dashboards to which you
want to add the widget.
e. Click Save.
Tenable Vulnerability Management adds the widget to the bottom of the appropriate
dashboard or dashboards.
f. Click Add.
Tenable Vulnerability Management adds the widget to the bottom of the appropriate
dashboard.
3. Click Done.
Configure a Widget
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
To configure a widget:
1. View the dashboard page that contains the widget you want to configure.
2. In the upper-right corner of the widget you want to change, click the button.
A menu appears.
3. Click Configure.
- 139 -
l
Rename the widget:
a. Do one of the following:
l In the widget summary plane, roll over the widget name and click the
button.
A confirmation message appears at the top of the page, and the new name
appears in the widget header.
l
Edit the widget description:
a. Do one of the following:
l In the widget summary plane, roll over the widget description and click the
button.
A confirmation message appears at the top of the page, and the new description
appears in the widget header.
l
Duplicate the widget:
o In the Actions row, click the button.
- 140 -
l
Delete the widget from the dashboard:
a. In the Actions row, click the button.
b. Click Delete.
l
Apply filters to the widget:
All Assets (Default) This option This is the default option and
includes all the assets in the includes all assets in the
dashboard. dashboard. There is not a
requirement for this option.
Custom This option only includes When you select this option, a
assets with a specific text box appears. Enter one or
hostname, IP address, FQDN, more of the custom option
or CIDR. formats (hostname, IP address,
FQDN, or CIDR). You must
separate multiple items with a
comma.
Tags This option uses tags to When you select this option, a
filter asset results or drop-down box appears. Select or
vulnerability results. type the tag name by which you
want to filter results. Tenable
Note: Because the Vulnerability Management filters
ACR Widget uses Tenable
Lumin data, this widget
the results by the selected tags.
does not support filtering
by tag. Note: Tenable Vulnerability
Management supports a
maximum of 100 filters.
- 141 -
Note: Once you apply a filter to a widget, a icon appears in the widget header. Roll over the
icon to view the applied filter.
5. Click Apply.
A confirmation message appears and Tenable Vulnerability Management applies your changes
to the widget.
Duplicate a Widget
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
To duplicate a widget:
1. View the dashboard page that contains the widget you want to duplicate.
2. In the upper-right corner of the widget you want to duplicate, click the button.
A menu appears.
3. Click Duplicate.
Rename a Widget
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
To rename a widget:
1. View the dashboard page that contains the widget you want to change.
2. In the upper-right corner of the widget you want to rename, click the button.
A menu appears.
- 142 -
3. Click Configure.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
1. View the dashboard page that contains the widget you want to remove.
2. In the upper-right corner of the widget you want to remove, click the button.
A menu appears.
3. Click Delete.
4. Click Delete.
Tenable Vulnerability Management removes the widget from the dashboard. Remaining
widgets adjust to fill the new space.
- 143 -
Welcome to Tenable Lumin
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
You can use Tenable Lumin to quickly and accurately assess your risk and compare your health and
remediation performance to other Tenable customers in your Salesforce industry and the larger
population. Tenable Lumin correlates raw vulnerability data with asset business criticality and
threat context data to support faster, more targeted analysis workflows than traditional
vulnerability management tools.
Tenable-provided metrics help you quantify your risk to make informed remediation and strategic
security decisions. For more information about the metrics used in Tenable Lumin analysis, see
Tenable Lumin Metrics.
For information on how to prepare, install, and configure Tenable Lumin, see Get Started with
Tenable Lumin.
Important! Tenable One customers can access Tenable Lumin directly from the Workspace page.
Tenable Tenable Lumin uses several metrics to help you assess your risk.
For information about improving the accuracy of your Tenable Lumin metrics and increasing your
overall vulnerability management health, see Improve Your Tenable Lumin Metrics.
- 144 -
Important: Private findings are excluded from all scores in Tenable Lumin. For more information see
Findings.
l the overall CES for your entire organization (for example, the CES displayed in the Cyber
Exposure Score widget)
l the tag-level CES for assets in a specific business context (for example, the CES displayed in
the Cyber Exposure Score by Business Context/Tag widget).
Low 0 to 349
To view the CES for your entire organization or for a group of assets, view the widgets on the View
the Tenable Lumin Dashboard.
For more information about how long Tenable Vulnerability Management takes to calculate or
recalculate your CES, see Tenable Lumin Data Timing.
- 145 -
Critical 9.0 to 10.0
Note: Vulnerabilities without CVEs in the National Vulnerability Database (NVD) (for example, many
vulnerabilities with the Info severity) do not receive a VPR. Tenable recommends remediating these
vulnerabilities according to their CVSS-based severity.
Tenable Vulnerability Management provides a VPR value the first time you scan a vulnerability on
your network. Then, Tenable Vulnerability Management automatically provides new and updated
VPR values daily.
Tenable recommends prioritizing vulnerabilities with the highest VPRs that are present on your
assets with the highest ACRs.
To view the VPR for a specific vulnerability, view vulnerabilities as described in View Vulnerabilities
by Plugin.
Note:Tenable does not customize these values for your organization; VPR key drivers reflect a
vulnerability's global threat landscape.
Age of Vuln The number of days since the National Vulnerability Database (NVD) published
the vulnerability.
CVSSv3 The NVD-provided CVSSv3 impact score for the vulnerability. If the NVD did
Impact not provide a score, Tenable Vulnerability Management displays a Tenable-
Score predicted score.
- 146 -
Exploit Code The relative maturity of a possible exploit for the vulnerability based on the
Maturity existence, sophistication, and prevalence of exploit intelligence from internal
and external sources (e.g., Reversinglabs, Exploit-db, Metasploit, etc.). The
possible values (High, Functional, PoC, or Unproven) parallel the CVSS Exploit
Code Maturity categories.
Product The relative number of unique products affected by the vulnerability: Low,
Coverage Medium, High, or Very High.
Threat A list of all sources (e.g., social media channels, the dark web, etc.) where
Sources threat events related to this vulnerability occurred. If the system did not
observe a related threat event in the past 28 days, the system displays No
recorded events.
Threat The relative intensity based on the number and frequency of recently observed
Intensity threat events related to this vulnerability: Very Low, Low, Medium, High, or
Very High.
Threat The number of days (0-180) since a threat event occurred for the vulnerability.
Recency
- 147 -
Tenable assigns an ACR to each asset on your network to represent the asset's relative criticality as
an integer from 1 to 10. A higher ACR indicates higher criticality.
Critical 9 to 10
High 7 to 8
Medium 4 to 6
Low 1 to 3
Because Tenable Vulnerability Management calculates ACR values every 24 hours, you may need to
wait up to 24 hours to view the ACR after scanning the asset on your network.
Note: Tenable recommends reviewing your Tenable-provided ACR values and overriding them, if
necessary. You can customize ACR values to reflect the unique infrastructure or needs of your
organization, as described in Edit an ACR.
If an asset receives multiple ACR values, Tenable Vulnerability Management prioritizes the values in
the following order:
To view the ACR for a specific asset, view the asset details as described in View Asset Details.
Note: Tenable does not customize these values for your organization; ACR key drivers reflect the global
threat landscape associated with the asset's characteristics.
Note: Running unauthenticated scans may result in limited or incomplete ACR key drivers.
- 148 -
device_type The device type. For example:
internet_ The device's location on your network and proximity to the internet. For
exposure example:
l internal — The device is located within your local area network (LAN),
possibly behind a firewall.
l external — The device is located outside your LAN and not behind a
firewall.
Software or
Capability Description
Services
- 149 -
analytics_system A software solution for data analytics and reporting QlikView
is installed on the target host.
TIBCO Spotfire
IBM SPSS
SharePoint 2013
SOLR
Elasticsearch
Enterprise Search
Google Search
Appliance
Lucene
SQL Server
Reporting
Services
Oracle BI
publisher
SAP Business
Object
- 150 -
backup_server An enterprise backup solution is installed or Acronis Backup
running on the target host.
Quest NetVault
Unitrends
Enterprise Backup
Veritas Backup
Exec
Spectrum Protect
(formerly Tivoli
Storage Manager)
Siebel CRM
- 151 -
database_server A database system is installed on the target host or PostgreSQL
a database server is running on the target host.
Microsoft SQL
Server
MongoDB
Oracle Database
Db2 Hosted
Percona XtraDB
Cluster
IBM Informix
PostgreSQL
Percona Server
MariaDB Cluster
MySQL
Microsoft SQL
Server
SAP Adaptive
Server Enterprise
(ASE)
MariaDB Server
SQLite
Apache Derby
Network Server
SAP DB
Cogent Datahub
Server
- 152 -
directory_server The target asset is an authentication server. McAfee Stonegate
Authentication
Server
Kerberos
Ticketing Server
LDAP protocol
IBM Tivoli
Stonegate Auth
Server
Oracle E-Business
Suite
SAP ERP
Microsoft
Dynamics GP
SAP DB
SAPControl
SAP RMI-P4
Protocol Service
Apache OFBiz
erp_system_ The target asset has installed a client software for SAP GUI
client accessing ERP systems.
- 153 -
file_server The target asset is used for file sharing purposes. WebCenter
The file sharing here is a narrow sense. SMB server
ownCloud
is not considered as a file server in this
classification. Sharepoint
Oracle WebCenter
Content
Sharepoint
FTP service
Apple File
Protocol (AFP)
service
Network File
System (NFS)
Server Detection
ServiceDesk Plus
OTRS
ManageEngine
Service Desk
- 154 -
Performance
Monitoring
System Center
Operations
Manager
Applications
Manager-
ManageEngine
ManageEngine
Desktop Central
Ghost Solution
Suite
ZENworks -
Configuration
Management
IBM BigFix
System Center
Configuration
Manager
CA Unified
Infrastructure
Management
Centreon
VMware vRealize
Operations
OpManager
Nagios XI
- 155 -
SCOM
- 156 -
PRTG Network
Monitor
Zabbix
SolarWinds
Storage Resource
Monitor
GroundWork
Monitor
Pandora FMS
Tivoli Monitoring
OP5 Monitor
NetFlow Traffic
Analyzer
PRTG Network
Monitor
Cisco Prime
Infrastructure
H3C Intelligent
Management
Center
ZENworks Asset
Management
ManageEngine
Desktop Central
Unified Endpoint
Manager
- 157 -
Google Analytics
Cisco Prime
Infrastructure
H3C Intelligent
Management
Center
HP 3PAR
Management
Server
Ghost Solution
Suite
Fortigate Firewall
Management
Console
Barracuda Spam
& Virus Firewall
Management Web
Console
IMAP Service
Detection
CCProxy SMTP
Server Detection
SMTP Service
Detection
POP Service
Detection
- 158 -
pci The target asset has PCI sensitive information. PCI Plugin Fired
HTTP proxy
Detected in
Service Banner
McAfee Email
Gateway
reverse_proxy_ The target asset is a reverse proxy that directs NetApp SANtricity
server external client requests to internal servers. A Web Services
reverse proxy can be an ADC or a load-balancer. Proxy
Foreman Smart-
Proxy TFTP
rnd_software The target asset is for development purposes Red Hat Mobile
because product development software is installed Application
on it. Platform
Application
Testing Suite
Windows Visual
Studio
AutoCAD
Autodesk DWG
TrueView
- 159 -
Detection
Trihedral VTScada
Detection
- 160 -
web_application_ There is a web application server running or Geronimo
server installed on the target asset. Having a web
Resin
application server running on the target asset does
not necessarily indicate its criticality. But it can Tuxedo
hint criticality when used in together with some
Tomcat
properties, e.g. web application server + external +
server device type = high criticality. Jetty
Microsoft .NET
Platform
WebLogic Server
Magento
WebSphere
Commerce
Cobalt
DNN Platform
Umbraco
Oracle WebCenter
Sites
Glassfish
nginx
Microsoft IIS
- 161 -
Tenable calculates a dynamic AES for each asset on your network to represent the asset's relative
exposure as an integer between 0 and 1000. A higher AES indicates higher exposure.
Tenable calculates AES based on the current ACR (Tenable-provided or custom) and the VPRs
associated with the asset.
Low 0 to 349
Assessment Maturity provides a high-level summary of how effectively you are scanning for
vulnerabilities on your licensed assets. Tenable calculates a dynamic Assessment Maturity grade
that represents your assessment scanning health as a letter grade between A and F. An A grade
indicates you are assessing your assets frequently and thoroughly.
Tenable provides an Assessment Maturity grade the first time you scan. Then, Tenable Vulnerability
Management automatically provides an updated Assessment Maturity grade daily.
A 75 to 100
B 55 to 74
C 30 to 54
D 15 to 29
F 0 to 14
- 162 -
l
For asset scores:
o Scan Frequency score — How often the asset was scanned within the last 90 days
o Scan Depth score — Whether or not the asset was in an authenticated scan within the
last 90 days
o Assessment Maturity score — A calculation of (Scan Frequency score + Scan Depth
score) / 2
l
For a container/business context score:
o Scan Frequency score — the average of the asset Scan Frequency scores
o Scan Depth score — the average of the asset Scan Depth scores
o Assessment Maturity score — the average of the asset Assessment Maturity scores
A high depth grade indicates you are running authenticated scans on these assets.
A 75 to 100
B 55 to 74
C 30 to 54
D 15 to 29
F 0 to 14
Tenable calculates your frequency grade based on how often you scan assets on your network. A
high frequency grade indicates you are scanning your assets often.
A 75 to 100
B 55 to 74
- 163 -
C 30 to 54
D 15 to 29
F 0 to 14
To view your Assessment Maturity grade, depth grade, and frequency grade, see View Assessment
Maturity Details.
For more information about how long Tenable Vulnerability Management takes to calculate or
recalculate your Assessment Maturity grade, see Tenable Lumin Data Timing.
Remediation Maturity provides a high-level summary of how effectively you are remediating
vulnerabilities on your licensed assets. Tenable calculates a dynamic Remediation Maturity grade
that represents your remediation health as a letter grade between A and F. An A grade indicates
you are remediating the vulnerabilities on your assets quickly and thoroughly.
A 75 to 100
B 55 to 74
C 30 to 54
D 15 to 29
F 0 to 14
Tenable provides a Remediation Maturity grade the first time you remediate a vulnerability. Then,
Tenable Lumin automatically provides an updated Remediation Maturity grade daily.
- 164 -
Tenable calculates your remediation responsiveness grade based on how long it takes you to
remediate a vulnerability after it is first discovered (the First Seen date).
A high remediation responsiveness grade indicates you are quickly remediating the vulnerabilities
on your assets.
A 75 to 100
B 55 to 74
C 30 to 54
D 15 to 29
F 0 to 14
Tenable calculates your remediation coverage grade based on the percentage of remediated
vulnerabilities on your assets.
A high remediation coverage grade indicates you are remediating a high percentage of the
vulnerabilities on your assets.
A 75 to 100
B 55 to 74
C 30 to 54
D 15 to 29
F 0 to 14
To view your Remediation Maturity grade, remediation responsiveness grade, and remediation
coverage grade, see View Remediation Maturity Details.
For more information about how long Tenable Lumin takes to calculate or recalculate your
Remediation Maturity grade, see Tenable Lumin Data Timing.
- 165 -
Improve Your Tenable Lumin Metrics
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
If you want to improve the accuracy of your Tenable Lumin metrics and increase your overall
vulnerability management health, evaluate your Tenable-provided values and your scanning
strategy.
Important: Private findings are excluded from all scores in Tenable Lumin. For more information see
Findings.
1. On the Assessment Maturity Details page, review your Assessment Maturity grade to evaluate
your overall scanning health.
l View details about your Assessment Maturity depth grade in the Depth Grade widget. If
necessary, improve your depth grade by increasing the number of plugins enabled in
your user-defined templates or scans, or by increasing the number of authenticated or
agent scans. For more information, see Configure Plugins in Tenable Vulnerability
Management Scans, Credentials in Tenable Vulnerability Management Scans, or Scan
Templates.
If you improve your Assessment Maturity score, you improve the accuracy of your Tenable-
provided ACR and VPR values. Then, more accurate ACR and VPR values improve the accuracy
of your AES and CES values.
2. In the Assets table, review your Tenable-provided ACR values to evaluate the
characterizations of the assets on your network. If the ACR values do not reflect the unique
infrastructure or needs of your organization, you can override them. For more information,
see Edit an ACR Manually.
More accurate ACR values improve the accuracy of your AES and CES values.
- 166 -
3. On the Remediation Maturity Details page, review your Remediation Maturity grade to evaluate
your overall vulnerability remediation health.
l View details about your Remediation Maturity remediation responsiveness grade in the
Remediation Responsiveness Grade widget. If necessary, improve your remediation
responsiveness grade by quickly remediating your most critical (highest VPR)
vulnerabilities. For more information, see View Recommended Actions.
l View details about your Remediation Maturity remediation coverage grade in the
Remediation Coverage Grade widget. If necessary, improve your remediation coverage
grade by increasing the number of vulnerabilities you remediate. For more information
on the assets with the most critical vulnerabilities, see the Vulnerability Priority Rating
(VPR) widget described in Vulnerability Management Dashboard.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
You can customize an asset's Asset Criticality Rating (ACR) value to reflect the unique infrastructure
or needs of your organization. You can edit the ACR for a single asset independently or multiple
assets simultaneously.
Tip: Changes to an ACR value (and recalculations for your AES and CES values) take effect within 24 hours.
Tip: For information about how Tenable Vulnerability Management prioritizes manually overridden ACR
values, see Asset Criticality Rating (ACR).
- 167 -
Note: All Tenable Lumin data reflects all assets within the organization's Tenable Vulnerability Management
instance.
Location Action
Asset Details page a. In the left navigation plane, in the Asset View section,
click Assets.
Assets page a. In the left navigation plane, in the Asset View section,
click Assets.
b. In the assets table, roll over the asset you want to edit.
- 168 -
3. Do one of the following:
l To modify the ACR value, click or drag the Asset Criticality Rating slider to increase or
decrease the ACR.
l To reset an existing ACR value to the Tenable-provided ACR value, click Reset to
Tenable ACR.
4. (Optional) If you want to include a justification for your ACR change, in the Overwrite
Reasoning section, select one or more reasons.
5. (Optional) If you want to include a note about your ACR change, in the Notes section, type a
note.
6. Click Save.
3. In the Cyber Exposure Score by Business Context/Tag widget, click the tag for which you
want to view asset details.
The Tenable Lumin Business Context/Tag Asset Details page appears, filtered by the tag you
selected.
4. Access the Assets page through the Asset Criticality Rating Breakdown widget, the Asset
Scan Distribution widget, or the Asset Scan Frequency widget, as described in View Business
Context/Tag Asset Details.
- 169 -
5. In the table, select the check boxes next to the assets that you want to edit.
7. Click and drag the Asset Criticality Rating slider to set the ACR.
8. (Optional) If you want to include a justification for your ACR change, in the Overwrite
Reasoning section, select one or more reasons.
9. (Optional) If you want to include a note about your ACR change, in the Notes section, type a
note.
Tenable Vulnerability Management saves the custom ACR for all selected assets.
Run scans to generate vulnerability data for use in Tenable Lumin views.
Newly generated data does not immediately impact your Tenable Lumin metrics (for example, your
CES). Tenable requires more time to recalculate your metrics. For more information, see Time to
Calculate or Recalculate Your CES, Assessment Maturity, or Remediation Maturity Grade.
- 170 -
Time to Synchronize Data from Tenable Security Center
Vulnerability and asset data synchronize differently to Tenable Vulnerability Management.
Asset data (tags Manual (on-demand) All data and recalculated Tenable Lumin
in Tenable synchronizations only. metrics appear in Tenable Vulnerability
Vulnerability Management within 48 hours.
Management)
For more information about Tenable Security Center synchronization, see Tenable One
Synchronization in the Tenable Security Center User Guide.
l You run your first Tenable Vulnerability Management-configured scans after licensing Tenable
Lumin.
l You initiate your first Tenable Security Center synchronization after licensing Tenable Lumin.
l Tenable Security Center runs a scan that imports new data to a synchronized repository.
- 171 -
Tip: Tenable Vulnerability Management calculates Tenable Lumin metrics based on your licensed assets seen
in the last 90 days. If you change your scanning configuration (for example, you perform a recommended
action to increase your Assessment Maturity grade), your changes influence the next scheduled
recalculation, but take more time over the next 90 days to impact significantly and overhaul your metrics.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
The Tenable-provided Tenable Lumin dashboard visualizes exposure data for your organization. You
cannot customize the widgets on this Tenable-provided dashboard.
Important! Tenable One customers can access Tenable Lumin directly from the Workspace page.
- 172 -
1. In the upper-left corner, click the button.
Note: All Tenable Lumin data reflects all assets within the organization's Tenable Vulnerability
Management instance.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
In Tenable Vulnerability Management, you can export the Tenable Lumin dashboard landing page.
- 173 -
3. From the drop-down menu, select one of the following options:
Once the export completes, a Success message appears and Tenable Vulnerability
Management downloads the export file to your computer. Depending on your browser
settings, your browser may notify you that the download is complete.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
In Tenable Vulnerability Management, you can export individual widgets from the Tenable Lumin
dashboard.
Note: You cannot export the Cyber Exposure Score by Business Context widget.
2. In the header of the widget you want to export, click the button.
- 174 -
3. From the drop-down menu, select one of the following options:
Once the export completes, a Success message appears and Tenable Vulnerability
Management downloads the export file to your computer. Depending on your browser
settings, your browser may notify you that the download is complete.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Larger organizations may have business units that span multiple industries, or that don't fit neatly
into one industry categorization. By selecting the most applicable industry benchmark in Tenable
Lumin, users can maximize the relevancy of their data and more accurately track how their Tenable
Lumin metrics compare with others across similar industries.
- 175 -
1. In the upper-left corner, click the button.
4. In the Benchmark section, from the Industry drop-down, select the industry benchmark you
want to use across the Tenable Lumin dashboard.
5. Click Save.
2. Click Confirm.
- 176 -
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
l Assessment Maturity
l Remediation Maturity
l Mitigations
Note: All Tenable Lumin data reflects all assets within the organization's Tenable Vulnerability Management
instance.
- 177 -
This widget summarizes the CES for your entire organization compared to Tenable customers in
your Salesforce industry and the larger population.
l View a visual representation of your CES compared to the average CES for Tenable customers
in your Salesforce industry and the larger population.
l View a summary statement about whether your CES recently increased or decreased.
The Tenable Lumin Cyber Exposure Score details panel appears. For more information, see
CES Details.
- 178 -
Time Frame Assets
Past 90 days at each point on the graph, Licensed assets for your entire
recalculated daily organization
This widget graphs the increases and decreases to your CES and to the average CES for Tenable
customers in your Salesforce industry and the larger population.
l To view details about an industry or population CES value on a specific date, hover over a
point on the graph.
l To view details about your CES value on a specific date, click a point on the You line.
The Tenable Lumin Cyber Exposure Score details plane appears. For more information, see
CES Details.
l To show or hide data for your organization, the industry, or the population, click the boxes in
the graph legend.
The system updates the widget to show or hide the data you selected.
- 179 -
Time Frame Assets
l View the expected CES reduction if you address all top 20 recommended actions.
l View the number of vulnerability instances you would eliminate if you addressed all top 20
recommended actions.
l To view details about your top 20 recommended actions, click See Top Recommended
Actions.
The Tenable Lumin Recommended Actions page appears. For more information, see View
Recommended Actions.
Assessment Maturity
- 180 -
How frequently and thoroughly are you scanning your assets?
This widget summarizes the Assessment Maturity grade for your entire organization compared to
Tenable customers in your Salesforce industry and the larger population.
Important: Your Assessment Maturity and Remediation Maturity scores may have recently changed due to
data migration and algorithm changes within Tenable Lumin. This is expected behavior. For more
information, contact your Tenable representative.
l View your Assessment Maturity grade compared to the average Assessment Maturity grade
for Tenable customers in your Salesforce industry and the larger population.
l View a summary statement about whether your Assessment Maturity grade recently increased
or decreased.
l To view historical details about your Assessment Maturity grade, hover over a point on the
graph.
The hover text provides historical data about the Assessment Maturity grade.
l To view more details about your Assessment Maturity grade, click More Details.
- 181 -
The Tenable Lumin Assessment Maturity page appears. For more information, see View
Assessment Maturity Details.
Remediation Maturity
How quickly and thoroughly are you remediating vulnerabilities on your assets?
Important: Your Assessment Maturity and Remediation Maturity scores may have recently changed due to
data migration and algorithm changes within Tenable Lumin. This is expected behavior. For more
information, contact your Tenable representative.
This widget summarizes the Remediation Maturity grade for your entire organization compared to
Tenable customers in your Salesforce industry and the larger population.
l View your Remediation Maturity grade compared to the average Remediation Maturity grade
for Tenable customers in your Salesforce industry and the larger population.
l View a summary statement about whether your Remediation Maturity grade recently
increased or decreased.
- 182 -
l To view historical details about your Remediation Maturity grade, hover over a point on the
graph.
The hover text provides historical data about the Remediation Maturity grade.
l To view more details about your Remediation Maturity grade, click More Details.
The Tenable Lumin Remediation Maturity page appears. For more information, see View
Remediation Maturity Details.
This widget shows the 6 most recent cyber security alerts provided by the Tenable research team.
Tenable Lumin provides further details about how many assets are potentially impacted and a link
to the Tenable blog post for the alert, where you can view further information and any required
responses.
Note: To maintain an accurate CVE count, Tenable Lumin does not include entries from patch Tuesdays,
Oracle CPU, etc. as alerts within the Cyber Exposure Alerts widget.
- 183 -
To reduce noise within the Cyber Exposure Alerts widget, Tenable Lumin does not target specific
CVEs ( i.e., from Patch Tuesday/Oracle CPU)
l To view the severity of the alert, a brief description, and the date on which the alert was
published, roll over one of the alerts in the widget.
l To view the percentage of your assets affected by the alert (assets where one of the CVEs
associated with the alert is present as a vulnerability on the asset), roll over one of the rows in
the Assets Affected column.
If an alert has a CVE but no assets are affected, or you have not yet scanned your assets for
the vulnerability, then the Assets Affected column shows a value of 0%. If no CVE is currently
assigned to the alert, then the Assets Affected column shows a value of Pending. Once
Tenable Vulnerability Management calculates the CVE for the alert, Tenable Lumin updates
the column with the appropriate value.
l To view your vulnerabilities by asset automatically filtered by the CVE associated with the
alert, click one of the percentages in the widget.
l To view the Tenable blog post about the exposure alert, click one of the alerts in the widget.
l To view the Trending Threats page for an alert, click one of the alerts in the widget.
Mitigations
How are endpoint protection agents distributed on your assets?
- 184 -
Time Frame Assets
This widget summarizes the distribution of endpoint protection agents on your assets.
If you run an authenticated scan based on the Basic Network Scan template or Advanced Network
Scan template or an agent scan based on the Basic Agent Scan or Advanced Agent Scan template,
Tenable automatically enables the plugins required to detect mitigations present on your assets.
Tenable Lumin defines mitigations as endpoint protection agents, which include antivirus software,
Endpoint Protection Platforms (EPPs), or Endpoint Detection and Response (EDR) solutions.
l To view a list of assets in a Mitigations category, click one of the percentages in the widget.
The Assets page appears, filtered by licensed assets, the mitigations category you selected,
and the past 90 days. For more information, see View Assets.
Note: When accessing the Assets page from the Mitigations widget, you may see an asset count
notification at the top of the page. This notification indicates the number of assets you have
permission to view based on the access group to which you belong.
l To view details about the endpoint protection agents detected on your assets, click More
Details.
- 185 -
The Tenable Lumin Mitigations page appears. For more information, see View Mitigations
Details in Tenable Lumin.
Past 90 days All licensed assets to which the selected tags apply
This widget summarizes data about the CES calculated for your entire organization and for assets
with specific business context tags.
l CES — The average CES for assets with the tag. A value of N/A indicates Tenable is
calculating your CES.
l CES Trend — A visual representation of your CES change over the past 180 days. A value
of N/A indicates Tenable is processing your CES data or that there are 0 assets with
this tag.
l 14 Day Trend — A summary of how the CES increased ( ) or decreased ( ) in the past 14
days. A value of N/A indicates Tenable is processing your CES data or that there are 0
assets with this tag.
l Assessment Maturity — The Assessment Maturity grade for assets with the tag. A value
of N/A indicates there are 0 licensed assets with the tag.
To view details about your Assessment Maturity grade for assets with a specific tag, in
the Assessment Maturity column, click the grade.
- 186 -
The Tenable Lumin Assessment Maturity page appears, filtered by the tag you selected.
l Remediation Maturity — The Remediation Maturity grade for assets with the tag.
To view details about your Remediation Maturity grade for assets with a specific tag, in
the Remediation Maturity column, click the grade.
The Tenable Lumin Remediation Maturity page appears, filtered by the tag you selected.
For more information, see View Remediation Maturity Details.
l # Assets with High AES — The number of assets with the tag and a high AES.
l Reduce Tag CES — Your expected tag-level CES reduction if you resolve all the solutions
for assets with this specific tag. A value of N/A indicates your expected reduction is 5
or fewer. Typically, you cannot significantly reduce your CES if many assets were
scanned without authentication or if your assets are healthy and your risk is already low.
To view the recommended actions for assets with a specific tag, in the Reduce Tag CES
column, click See Actions.
The Tenable Lumin Recommended Actions page appears, filtered by licensed assets
and the tag you selected.
l To view details about the assets with a specific tag, click a row of the table.
The Tenable Lumin Business Context/Tag Asset Details page appears. For more information,
see View Business Context/Tag Asset Details.
- 187 -
l To reorder the tags in the widget:
a. Click and hold the button next to the tag you want to move.
c. Release the mouse button to drop the tag in the new location.
l To add a tag to the widget, click the Add Tag button and specify the tag you
want to add.
4. Click Save.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Use this page to browse CES details for your organization, or for assets with a specific business
context tag.
- 188 -
3. Do one of the following:
l To view current CES details, in the Cyber Exposure Score widget, click the
CES value.
l To view historical CES details, in the Cyber Exposure Score Trend widget,
- 189 -
click a past point on the graph.
l To view CES details for assets with a specific business context tag:
a. In the Cyber Exposure Score by Business Context/Tag widget, click the tag for
which you want to view asset details.
The Tenable Lumin Business Context/Tag Asset Details page appears, filtered by
the tag you selected.
- 190 -
Note: All Tenable Lumin data reflects all assets within the organization's Tenable Vulnerability
Management instance.
- 191 -
Score Past 90 days Licensed l View the CES for your
assets entire organization and
the average CES for
other Tenable customers
in your Salesforce
industry and the larger
population.
Note: This
section only
appears if the
algorithm update
- 192 -
affected your
CES score.
o Asset Composition
Change — Asset
license changes,
assets depth
changes, etc.
o Vulnerability
Composition
Change —
Remediation of
vulnerabilities, the
discovery of new
vulnerabilities, etc.
o Asset Exposure
and ACR Change —
Any changes to
your AES or ACR
Assets (#) All time Licensed and l View the total number of
- 193 -
(Visible only when unlicensed assets.
viewing current assets l For each ACR category,
CES details)
view the following
information:
o The percentage of
assets with critical,
high, medium, and
low ACR values.
Tip: The
percentages do
not total to 100%
if any of your
assets are
unscored.
- 194 -
) or decreased (
) during that time.
Vulnerabilities (#) All time Licensed and l View the total number of
unlicensed vulnerabilities present on
(Visible only when
assets the assets.
viewing current
CES details) l For each VPR category,
view the following
information:
o The percentage of
vulnerabilities with
critical, high,
medium, and low
VPR values.
Tip: The
percentages do
not total to 100%
if any of your
assets are
unscored.
- 195 -
of vulnerabilities
with critical, high,
medium, and low
VPR values.
o If the number of
vulnerabilities with
critical, high,
medium, and low
VPR values
increased or
decreased in the
past 14 days, the
amount by which
the percentage of
vulnerabilities and
the total number of
vulnerabilities has
increased ( ) or
decreased ( )
during that time.
l To view a list of
vulnerabilities in a VPR
category, click a
percentage.
- 196 -
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Tenable calculates a dynamic Assessment Maturity grade that represents your overall scanning
depth and frequency. For more information, see Assessment Maturity.
Important: Your Assessment Maturity and Remediation Maturity scores may have recently changed due to
data migration and algorithm changes within Tenable Lumin. This is expected behavior. For more
information, contact your Tenable representative.
The Assessment Maturity page appears and, by default, shows details for your entire
organization.
- 197 -
3. (Optional) To change the tag filter applied to the page, in the upper left corner, select a tag
from the drop-down list.
Note: All Tenable Lumin data reflects all assets within the organization's Tenable Vulnerability Management
instance.
- 198 -
l To view a list of your licensed
assets impacting your
Assessment Maturity, click
<count> Licensed Assets.
Maturity Score Past 90 days at Licensed This widget graphs the increases
Trend each point on assets and decreases to your Assessment
the graph, Maturity grade and to the average
How is your
recalculated Assessment Maturity grade for
Assessment
daily Tenable customers in your
Maturity grade
Salesforce industry and the larger
changing over
population.
time?
l To view details about an
Assessment Maturity grade on
a specific date, hover over a
point on the graph.
- 199 -
Assessment Maturity grade.
- 200 -
decreased.
- 201 -
Frequency Grade Past 90 days Licensed This widget summarizes the
assets Assessment Maturity frequency
Are you scanning
grade for your entire organization,
your assets
compared to Tenable customers in
frequently
your Salesforce industry and the
enough?
larger population.
Asset Scan Past 90 days Licensed This widget graphs the percentage
Frequency assets of your assets that Tenable
Vulnerability Management scans
How often are you
- 202 -
scanning your daily, weekly, monthly, and
assets? quarterly, compared to Tenable
customers in your Salesforce
industry and the larger population.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Tenable calculates a dynamic Remediation Maturity grade that represents your overall vulnerability
remediation responsiveness and coverage. For more information, see Remediation Maturity.
Important: Your Assessment Maturity and Remediation Maturity scores may have recently changed due to
data migration and algorithm changes within Tenable Lumin. This is expected behavior. For more
information, contact your Tenable representative.
- 203 -
To view Remediation Maturity details for all assets:
3. (Optional) To change the tag filter applied to the page, in the upper left corner, select a tag
from the drop-down list.
Note: All Tenable Lumin data reflects all assets within the organization's Tenable Vulnerability Management
instance.
- 204 -
l View a visual representation
of your Remediation
Maturity compared to the
average Remediation
Maturity for Tenable
customers in your
Salesforce industry and the
larger population.
Maturity Score Past 90 days at Licensed This widget graphs the increases
Trend each point on assets and decreases to your
the graph, Remediation Maturity grade and
How is your
- 205 -
Remediation Maturity recalculated to the average Remediation
grade changing over daily Maturity grade for Tenable
time? customers in your Salesforce
industry and the larger
population.
- 206 -
population.
- 207 -
legend.
- 208 -
l View a visual representation
of your remediation
coverage grade compared
to the average remediation
coverage grade for Tenable
customers in your
Salesforce industry and the
larger population.
- 209 -
data you selected.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
You can use this page to view details about assets with a specific business context tag.
- 210 -
l Add tags to assets, as described in Add a Tag to an Asset.
3. (Optional) To change the tag filter applied to the page, in the upper left corner, select a tag
from the drop-down list.
Note: All Tenable Lumin data reflects all assets within the organization's Tenable Vulnerability Management
instance.
Section or
Timeframe Assets Action
Widget
Tag summary All time Licensed and l View the name of the tag.
unlicensed l View the CES calculated
assets with the
for assets with the tag.
tag applied
Cyber Exposure Past 90 days at Licensed assets This widget graphs the
- 211 -
Score Trend each point on the with the tag increases and decreases to your
graph, applied tag-specific CES compared to
How has the
recalculated daily the average organization-wide
overall risk for
CES for Tenable customers in
this business
your Salesforce industry and
context changed
the larger population.
over time?
Note: Newly added tags may
take up to 14 days before
displaying CES trending
information.
- 212 -
population, click the
boxes in the graph legend.
Asset Criticality Past 90 days Licensed and This widget visualizes the
Rating unlicensed percentage of your assets in
- 213 -
Breakdown assets with the each ACR category.
tag applied
How critical are l View the total number of
my assets? scanned assets on your
network.
Asset Scan Past 90 days Licensed and This widget summarizes your
Distribution unlicensed asset scan distribution during
assets with the the past 90 days.
What percentage
tag applied
of your assets Authenticated Scans are run by
are scanned with a non-agent scanner with
different credentialed scanning
methods? configured. Agent Scans are
run by agent scanners. All other
scans are Unauthenticated
Scans.
- 214 -
assets scanned on your
network in the past 90
days.
Tenable Vulnerability
Management refreshes
the widget.
- 215 -
Asset Scan Past 90 days Licensed and This widget visualizes the
Frequency unlicensed percentage of assets scanned
assets with the on your network during periods
How often are
tag applied in the past 90 days, compared
you scanning
to others in your Salesforce
your assets?
industry and the population.
Tenable Vulnerability
Management refreshes
the widget.
- 216 -
filtered by the tag,
licensed assets, the time
period you selected, and
the ACR category filter
applied to the widget. For
more information, see
View Assets.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
If you run an authenticated scan based on the Basic Network Scan template or Advanced Network
Scan template or an agent scan based on the Basic Agent Scan or Advanced Agent Scan template,
Tenable automatically enables the plugins required to detect mitigations present on your assets.
Tenable Lumin defines mitigations as endpoint protection agents, which include antivirus software,
Endpoint Protection Platforms (EPPs), or Endpoint Detection and Response (EDR) solutions.
Then, you can use Tenable Lumin Mitigations data to assess whether your assets are covered
properly with the endpoint protection agent software.
You must enable certain plugins in your authenticated and agent scans to detect endpoint
protection agents on your assets. For more information, see Plugins for Mitigation Detection.
- 217 -
1. In the upper-left corner, click the button.
Note: All Tenable Lumin data reflects all assets within the organization's Tenable Vulnerability Management
instance.
Section Action
Date range Change the date range for the mitigations table. For more information, see
selector Tenable Vulnerability Management Tables.
Search box Search the mitigations table by product name. For more information, see
Tenable Vulnerability Management Tables.
- 218 -
o All Assets — The total number of assets with the endpoint
protection agent present.
o Critical Assets — The total number of Critical ACR assets with
the endpoint protection agent present.
o High Assets — The total number of High ACR assets with the
endpoint protection agent present.
o Version — The version of the endpoint protection agent.
o Last Detected — The date that a scan last detected the endpoint
protection agent on an asset.
l Export mitigations.
The Assets page appears, filtered by licensed assets, ACR severity, the
mitigation product name, the mitigation vendor name, the mitigation
version, and the past 90 days. For more information, see View Assets.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
To detect mitigations, you must enable the following plugins in your scan.
- 219 -
Tip: Tenable Vulnerability Management enables these plugins automatically in the following Tenable-
provided scan templates: Advanced Network Scan, Basic Network Scan, Advanced Agent Scan, Basic
Agent Scan.
ID Name
- 220 -
87923 McAfee Application Control / Change Control Installed
- 221 -
139918 ClamAV Installed (Linux)
Export Mitigations
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
You can export a list of mitigations and affected assets, if needed, to share the data with others in
your organization.
2. In the mitigations table, select the check boxes next to the mitigation or mitigations that you
want to include in the export file.
4. In the Type section, click the type of export you want to perform.
- 222 -
l CSV - Mitigations — A single .csv file that includes the mitigations you selected.
l CSV - Mitigations & Assets Affected — Two .csv files that include the mitigations you
selected and the assets affected where those mitigations are present.
The export begins and Tenable Vulnerability Management downloads the export as a tar.gz
package. For more information about the data in the export files, see Mitigations Export File
Contents.
What to do next:
l To download previously exported mitigation data, see View and Download Exported
Mitigations.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
You can export mitigations from the Mitigations page. Your export files contain the following data.
vendor_name The name of the vendor that maintains the endpoint protection agent.
all_assets The total number of assets with the endpoint protection agent
present.
critical_assets The total number of Critical ACR assets with the endpoint protection
agent present.
high_assets The total number of High ACR assets with the endpoint protection
agent present.
last_detected The date that a scan last detected the endpoint protection agent on an
asset.
- 223 -
mitigations_detail.csv — the Affected Assets file
vendor_name The name of the vendor that maintains the endpoint protection agent.
last_detected The date that a scan last detected the endpoint protection agent on an
asset.
acr_severity The ACR category of the ACR calculated for the asset.
aes_severity The AES category of the AES calculated for the asset.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
After you export mitigation or affected assets files, you can view and download them. You cannot
view or download export files generated by other users.
- 224 -
To view and download mitigation and affected asset exports files:
3. In the exports table, click the row for the export you want to download.
Tenable Vulnerability Management downloads the export file as a tar.gz package. For
information about the data in the export files, see Mitigations Export File Contents.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Tenable provides a list of top recommended actions (solutions) for assets on your network,
regardless of your access group permissions. You can identify solutions, then drill into the solution
details to understand the steps to address the vulnerability on your network.
To generate the top recommended actions, Tenable Lumin looks for the plugins that, if remediated
for all licensed assets, have the biggest effect on your CES. If plugins are related, remediating one
may affect other plugins.
Addressing vulnerabilities on your network lowers your CES and AES metrics.
To view the top recommended solutions for all assets on your network:
- 225 -
2. In the left navigation plane, click Lumin.
3. In the Actions to Reduce CES widget, click See Top Recommended Actions.
The Tenable Lumin Recommended Actions page appears. The table sorts your top solutions
(up to 20) by VPR category (Critical to Low) and then by decreasing Assets Affected.
4. (Optional) To change the tag filter applied to the page, in the upper left corner, select a tag
from the drop-down list.
Section Action
Summary bar View summary statistics about the expected impact if you address all the
solutions in the Recommended Actions table.
- 226 -
l CVEs — The number of individual Common Vulnerabilities and
Exposures (CVEs) addressed by the solution.
l Exploit Code Maturity — The key driver value for the highest
VPR for the vulnerabilities addressed by the solution.
The Solution Details page appears. For more information, see View
Solution Details.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
You can export a list of recommended actions (solutions) and affected assets, if needed, to share
the data with others in your organization.
- 227 -
1. Navigate to one the Tenable Lumin Recommended Actions page, as described in View
Recommended Actions.
2. In the table, select the check boxes next to the recommended actions that you want to
include in the export file.
4. In the CSV section, select the check box for the recommended action data you want to
export:
l Solutions — A .csv file that includes the recommended actions you selected. This check
box is selected by default.
l Details — A .csv file that includes the recommended actions you selected as well as
additional details about those solutions.
The export begins and Tenable Vulnerability Management downloads the export as a tar.gz
package. For information about the data in the export files, see Recommended Actions Export
File Contents.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
You can export recommended actions (solutions) from two recommended action pages. The export
contents from each page are unique to that page.
- 228 -
Recommended Actions Export for a Group of Assets
If you export recommended actions and assets affected files from the Recommended Actions page
for a group of assets, your export files contain the following data.
cve_instance_ The total number of vulnerability instances on this asset addressed by the
count solution.
assets_ The total number of assets affected by the vulnerabilities addressed by the
affected solution.
vpr The highest VPR for the vulnerabilities addressed by the solution.
cvss The highest CVSSv2 score (or CVSSv3 score, when available) for the
- 229 -
vulnerabilities addressed by the solution.
acr_severity The ACR category of the ACR calculated for the asset.
aes_severity The AES category of the AES calculated for the asset.
vuln_instance_ The total number of vulnerability instances on this asset addressed by the
count solution.
- 230 -
summary A description for the solution.
exploit_code_ The key driver value for the highest VPR for the vulnerabilities addressed
maturity by the solution.
vpr The highest VPR for the vulnerabilities addressed by the solution.
cvss The highest CVSSv2 score (or CVSSv3 score, when available) for the
vulnerabilities addressed by the solution.
- 231 -
Scans
You can create, configure, and manage scans in Tenable Vulnerability Management.
Section Description
Manage Scans Create, import, and launch scans. View and manage scans and scan
results.
Scans (Unified Create, launch, and manage Tenable Vulnerability Management and
Configuration) Tenable Web App Scanning scans in the Tenable Vulnerability
Overview Management unified user interface.
Sensors Link your sensors, such as Tenable Nessus scanners, Tenable Nessus
Agents, and Tenable Nessus Network Monitors, to Tenable Vulnerability
Management.
Note: For information about scanning in Tenable Web App Scanning, see the Tenable Web App Scanning
Getting Started Guide.
Note: For information about scanning in Tenable Container Security, see Tenable Container Security
Scanner Scanning Overview.
Manage Scans
To manage your Tenable Vulnerability Management and Tenable Web App Scanning scans in the
unified Scans user interface, see Scans Overview.
To manage your Tenable Web App Scanning scans in Tenable Web App Scanning, see the Tenable
Web App Scanning Getting Started Guide.
Scans Overview
The Scans page allows you to create, launch, and configure Tenable Vulnerability Management
scans and Tenable Web App Scanning scans.
- 232 -
Many of the Scans workflows and procedures are similar to the legacy Vulnerability Management >
Scans and Web App Scanning > Scans pages, but we have provided updated help topics that match
the new Scans user interface:
Create a Scan
In Tenable Vulnerability Management, you can create scans using scan templates. For general
information about templates and settings, see Scan Templates and Settings.
When you create a scan, Tenable Vulnerability Management assigns you owner permissions for the
scan.
Tip: To quickly target specific vulnerabilities that previous scans have identified on your assets, create a
Tenable Vulnerability Management remediation scan.
Note: Tenable Vulnerability Management excludes PCI Quarterly External scan data from dashboards,
reports, and workbenches intentionally. This is due to the scan's paranoid nature, which may lead to false
positives that Tenable Vulnerability Management would otherwise not detect. For more information, see
Tenable PCI ASV Scans.
l If you want to create a scan from a user-defined template, create a user-defined template as
described in Create a User-Defined Template.
l Create an access group for any targets you want to use in the scan and assign Can Scan
permissions to the appropriate users.
To create a scan:
3. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
- 233 -
This also determines whether you are creating a Tenable Vulnerability Management or Tenable
Web App Scanning scan.
4. In the upper-right corner of the page, click the Create a Scan button.
l If you are creating a Tenable Vulnerability Management scan, use the following
procedure:
a. Click the Nessus Scanner, Nessus Agent, or User Defined tab to view available
templates for your scan.
Note: Users with Scan Operator permissions can see and use only the user-defined
templates shared with their account.
b. Click the tile for the template you want to use for your scan.
Tab Action
- 234 -
l Assessment Settings — Specifies how a scan
identifies vulnerabilities, as well as what
vulnerabilities are identified. This includes
identifying malware, assessing the
vulnerability of a system to brute force
attacks, and the susceptibility of web
applications.
l If you want to save and launch the scan immediately, click Save & Launch.
Note: If you scheduled the scan to run at a later time, the Save & Launch option
is not available.
l If you are creating a Tenable Web App Scanning scan, use the following procedure:
- 235 -
a. Click the Web Application or User Defined tab to view available templates for your
scan.
Note: Users with Scan Operator permissions can see and use only the user-defined
templates shared with their account.
b. Click the tile for the template you want to use for your scan.
Tab Action
Scope Specify the URLs and file types that you want to include in
or exclude from your scan. For more information, see
Scope Settings in Tenable Web App Scanning Scans.
- 236 -
l If you want to save without launching the scan, click Save.
l If you want to save and launch the scan immediately, click Save & Launch.
Note: If you scheduled the scan to run at a later time, the Save & Launch option
is not available.
View Scans
Tenable Vulnerability Management defines Archived as any individual scan results that are older
than 35 days. For scan results that are younger than 35 days, you can view and export the results in
Tenable Vulnerability Management. For archived scan results, you can export the results, but cannot
view them in Tenable Vulnerability Management. This limitation applies to both imported scan
results and scan results that Tenable Vulnerability Management collects directly from scanners.
After 15 months, Tenable Vulnerability Management removes the scan data entirely.
You can view configured and imported scans. If you have appropriate permissions, you can also
perform actions to manage the scans.
3. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
4. In the Folders section, click a folder to load the scans you want to view.
- 237 -
The scans table updates to display the scans in the folder you selected.
For more information about scan folders, see Organize Scans by Folder.
Section Action
Search box Search the table by scan name or status. For more information, see
Tenable Vulnerability Management Tables.
Create In the upper-right corner, click the Create Scan button to create a new
Scan scan.
button
Tools In the upper-right corner, click the Tools button. A menu appears with
button the following options:
l Manage Sensors
l Manage Credentials
l Manage Exclusions
l Last Run — The date and time the scan was last run.
- 238 -
l Sort, increase or decrease the number of rows per page, or navigate
to another page of the table. For more information, see Tenable
Vulnerability Management Tables.
l Launch a scan.
You can view scan results for scans you own and scans that were shared with you.
l You can view details for an individual scan based on the permissions configured for the scan.
However, when you view aggregated scan results in dashboards and other analysis views (for
example, the Vulnerabilities or Assets tables), your access is based on the access groups you
belong to.
l Tenable Vulnerability Management defines Archived as any individual scan results that are
older than 35 days. For scan results that are younger than 35 days, you can view and export
the results in Tenable Vulnerability Management. For archived scan results, you can export the
results, but cannot view them in Tenable Vulnerability Management. This limitation applies to
both imported scan results and scan results that Tenable Vulnerability Management collects
directly from scanners. After 15 months, Tenable Vulnerability Management removes the scan
data entirely.
l When you view results from the latest run of the scan, Tenable Vulnerability Management
categorizes the scan as Read. The Read status is specific to your user account only. You can
- 239 -
also manually change the read status.
l Tenable Vulnerability Management retains scan data for 15 months. If you want to store scan
data for longer than 15 months, you can export the scan data for storage outside of Tenable
Vulnerability Management.
l You can view a maximum of 5,000 rows at a time in the Vulns by Asset table.
3. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
4. In the Folders section, click a folder to load the scans you want to view.
The scans table updates to display the scans in the folder you selected.
5. In the scan table, click the scan where you want to view details.
The scan details plane appears below the scan table. By default, this plane shows details for
the latest run of the scan.
Section Action
- 240 -
l Copy a scan.
See All Details button Click the See All Details button to open the Scan
Details page and view the scan's vulnerabilities and
affected assets, target information, and scan history.
You can also use the Scan Details page to export the
scan, edit the scan configuration, move the scan to the
trash folder, and submit the scan for PCI validation.
Table header
l (Rollover scans only) Download a list of a rollover
scan's remaining targets.
Severity summaries
The number of vulnerabilities with a Critical, High,
Medium, and Low severity in the scan results.
- 241 -
l Scanner — The scanner that performed the scan.
Note: This tab does not appear for scan results older
than 35 days.
- 242 -
per page, or navigate to another page of the
table, see Tenable Vulnerability Management
Tables.
Audit tab
View compliance audit check results. This tab only
appears if the scan results include data from
compliance audit checks.
Tip: This tab does not appear for scan results older than
35 days.
- 243 -
identified.
Summary tab
(Rule-based scans only) Shows the scan's description,
triggers, an explanation of rule-based scanning, and a
link to the vulnerabilities workbench.
Tip: This tab does not appear for scan results older than
35 days.
- 244 -
o FQDN
o IPv4 address
- 245 -
information, see View Asset Details.
Warnings tab
View warnings about problems Tenable Vulnerability
Management or the scanner encountered while running
the scan. This tab only appears if Tenable Vulnerability
Management or the scanner encountered an issue
while running the scan.
Tip: This tab does not appear for scan results older than
35 days.
Remediations tab
View remediation details.
History tab
View the scan history.
This tab contains a table listing each time the scan has
run. For the scan run currently displaying in the Scan
- 246 -
Details page, Tenable Vulnerability Management adds
the label Current to the run. By default, the latest scan
run is labeled Current.
- 247 -
you selected as Current and updates the Scan
Details section to show data for the selected run.
In this section, you can view the date and time when
the scan Started, Completed, and when it was
Modified, Canceled, or manually Aborted.
Scan Duration section The amount of time elapsed between the start and end
of the scan.
You can view a scan's vulnerability details by plugin or by asset (Tenable Vulnerability Management
scans only) from the Scans section.
- 248 -
1. In the upper-left corner, click the button.
4. In the Folders section, click a folder to load the scans you want to view.
The scans table updates to display the scans in the folder you selected.
5. In the scans table, click the scan where you want to view details.
The scan details plane appears below the scan table. By default, this plane shows details for
the latest run of the scan.
6. In the scan details plane, click the See All Details button.
The Scan Details page appears. The Vulns by Plugin tab shows by default.
7. If you would rather view vulnerabilities by the affected asset, click the Vulns by Asset tab.
Note: You can view a maximum of 5,000 rows at a time in the Vulns by Asset table.
8. From either the Vulns by Plugin tab or the Vulns by Asset tab, do one of the following:
l On the Vulns by Plugin tab, click a vulnerability to view its details. For more information,
see View Vulnerability Details.
l On the Vulns by Asset tab, click an asset row to view its vulnerability details. For more
information, see View Asset Details.
Scan Filters
- 249 -
On the Scans page, you can filter scans using Tenable-provided filters. The Tenable Vulnerability
Management scan view allows you to filter by scan status, and the Tenable Web App Scanning scan
view allows you to filter by multiple values.
Filter Description
Created Date (Tenable Web App The date the scan configuration was created.
Scanning scans only)
Finalized Date (Tenable Web App The date on which the scan last completed.
Scanning scans only)
Last Modified Date (Tenable Web App The date on which the scan configuration was last
Scanning scans only) modified.
Last Scanned Date (Tenable Web App The date on which the scan was last ran.
Scanning scans only)
Name (Tenable Web App Scanning The name of the scan configuration.
scans only)
Schedule (Tenable Web App Scanning Whether a scan schedule is enabled or on demand.
scans only)
Target (Tenable Web App Scanning The target URL used to launch the scan.
scans only)
Template (Tenable Web App The Tenable-provided scan template the scan
Scanning scans only) configuration was based on.
User Template (Tenable Web App The user-defined scan template the scan
Scanning scans only) configuration was based on.
Launch a Scan
- 250 -
In addition to configuring a scan's Schedule settings to launch the scan at scheduled times, you can
launch a scan manually. You can only launch a new scan when the previous scan has the Completed,
Aborted, or Canceled status (for more information, see Scan Status).
Alternatively, you can launch a rollover scan to scan the remaining targets of a previous scan that
ended prematurely (for more information, see Launch a Rollover Scan). You can also launch a
remediation scan to run a follow-up scan against existing scan results (for more information, see
Launch a Remediation Scan).
Note: To learn more about scan limitations in Tenable Vulnerability Management, see Scan Limitations.
Launch a Scan
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
Use the following steps to launch a scan manually. You can launch the scan using the targets as
configured in the scan, or you can launch the scan with custom targets that override the configured
targets.
To launch a scan:
3. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
4. In the Folders section, click a folder to load the scans you want to view.
The scans table updates to display the scans in the folder you selected.
For more information about scan folders, see Organize Scans by Folder.
- 251 -
5. In the scans table, roll over the scan you want to launch.
l To launch the scan using the targets as configured in the scan, click the button in the
row.
l If you have previously launched the scan and want to use custom targets that override
the configured targets:
c. Click Launch.
You can follow the scan's progress by checking its Scan Status on the Scans page.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
When you launch a rollover scan, the scan runs only against targets and hosts that Tenable
Vulnerability Management did not scan previously. This happens when a scan ends before scanning
all the assigned targets, which can occur when:
- 252 -
In some cases, you may see Completed scans that you can perform rollover scans for. This
indicates that even though all the assigned targets were scanned, some individual scan tasks may
have failed.
Rollover scans allow you to achieve complete scan coverage for all your assets, and you can use the
rollover feature to split up large, network-impacting scans. You can launch a rollover scan from
Scans page. Tenable Vulnerability Management marks scans that you can launch a rollover scan for
in the scan table with the Rollover tag in the Name column.
To view the remaining targets that the rollover scan will run against, see Download Rollover Targets.
If you want to restart the scan and rescan all the targets, see Launch a Scan.
3. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
4. In the Folders section, click a folder to load the scans you want to view.
The scans table updates to display the scans in the folder you selected.
For more information about scan folders, see Organize Scans by Folder.
5. In the scans table, roll over the scan you want to launch.
A menu appears.
You can follow the scan's progress by checking its Scan Status on the Scans page.
- 253 -
Launch a Remediation Scan
Required Tenable Vulnerability Management User Role: Standard, Scan Manager, or Administrator
You can create a remediation scan to run a follow-up scan against existing scan results. A
remediation scan evaluates a specific plugin against a specific scan target or targets where a
vulnerability was present in your earlier active scan.
Remediation scans allow you to validate whether your vulnerability remediation actions on the scan
targets have been successful. If a remediation scan cannot identify a vulnerability on targets where
the vulnerability was previously identified, the system changes the status of the vulnerability to
Fixed.
You can perform remediation scans for scan results from certain sensors only:
Note: To learn more about scan limitations in Tenable Vulnerability Management, see Scan Limitations.
- 254 -
1. Set the scope for the remediation scan:
- 255 -
An individual vulnerability on an To set this scope:
individual asset
a. View vulnerability details.
- 256 -
Vulnerabilities tab.
Tenable Vulnerability Management automatically creates the remediation scan from the
Tenable-provided Advanced Network Scan template and populates certain settings based on
the assets and vulnerabilities you selected.
a. Verify the settings that Tenable Vulnerability Management populated based on the
vulnerabilities and assets you selected.
- 257 -
b. Configure additional settings for the scan.
The number of manual changes you must make depends on the plugins involved in the
remediation scan.
The following table defines the inherited and default values for settings in the remediation
scan.
Setting
Setting Remediation Scan Value
Category
- 258 -
o Rebuild scanners and link new
scanners in the future without having
to update scanner designations in
scan configurations.
- 259 -
Network Scan template.
- 260 -
l the plugins you selected for remediation
scanning
l If you want to save and launch the scan immediately, click Save & Launch.
Note: If you scheduled the scan to run at a later time, the Save & Launch option is not
available.
What to do next:
l In the Remediation Scans folder on the Scans page:
o View the scan status to determine when the scan completes.
o Edit the scan configuration.
o Change the read status of the scan results.
o Launch the scan.
b. Verify that the status for the selected vulnerabilities is now Fixed on the assets that the
remediation scan targeted.
- 261 -
When you stop a scan, Tenable Vulnerability Management terminates all tasks for the scan and
categorizes the scan as canceled. The scan results associated with the scan reflect only the
completed tasks. You cannot stop individual tasks, only the scan as a whole.
3. In the scans table, roll over the scan you want to stop.
A menu appears.
5. Click Stop.
Tenable Vulnerability Management stops the scan. The Status column updates to reflect the
status of the scan.
You can pause scans that you want to stop temporarily. When you pause a scan, Tenable
Vulnerability Management pauses all active tasks for that scan and concludes the scanner's local
scan task. Paused scans do not consume scanner resources, and other scans can run while there is
a paused scan. Tenable Vulnerability Management does not dispatch new tasks from a paused scan
job. If the scan remains in a paused state for more than 14 days, the scan times out. Tenable
Vulnerability Management terminates the related tasks on the scanner and categorizes the scan as
aborted.
You can resume scans that you previously paused. When you resume a scan, Tenable Vulnerability
Management instructs the scanner to start the tasks from the point at which the scan was paused.
- 262 -
If Tenable Vulnerability Management encounters problems when resuming the scan, the scan fails,
and Tenable Vulnerability Management categorizes the scan as aborted. Tenable Vulnerability
Management does not dispatch new tasks from a paused scan job. If the scan remains in a paused
state for more than 14 days, the scan times out. Tenable Vulnerability Management terminates the
related tasks on the scanner and categorizes the scan as aborted.
Note: You can only pause and resume Tenable Vulnerability Management scans.
- 263 -
l If the scan is based on a user-defined template, assign the new owner at least Can View
permissions for that template. Otherwise, the new owner cannot view the scan configuration.
Note: Only the scan owner can change scan ownership. Therefore, if an administrator needs to change the
ownership of another user's scan, they must first assist the user with their account and then assign
ownership to the appropriate user.
3. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
4. In the Folders section, click a folder to load the scans you want to view.
The scans table updates to display the scans in the folder you selected.
5. (Optional) Search for the scan you want to edit. For more information, see Tenable
Vulnerability Management Tables.
9. In the User Permissions section, next to the permission drop-down for Owner, click the
button.
- 264 -
10. Select a user from the list.
Tenable Vulnerability Management automatically adds you to the list of users and assigns Can
View permissions to your user account.
Tenable Vulnerability Management removes your account from the list of users.
12. (Optional) Edit the Tenable Vulnerability Management permissions for your user account:
a. Next to the permission drop-down for your user account, click the button.
b. Select a permission.
Tenable Vulnerability Management assigns ownership to the selected user and assigns your
user account the permissions you selected. If you removed all permissions for your user
account from the scan, the scan no longer appears in any of your scan folders.
On the Scans page, a scan appears in bold in the scans table if you have not yet viewed (read) the
results of the latest run of the scan.
If you view the scan results, Tenable Vulnerability Management categorizes the scan as "read" and
removes the bold formatting from the scan in the scans table.
2. In the scans table, roll over the scan you want to change.
- 265 -
3. Click the button.
A menu appears.
Tenable Vulnerability Management changes the read status for the scan.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
3. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
4. In the Folders section, click a folder to load the scans you want to view.
The scans table updates to display the scans in the folder you selected.
5. (Optional) Search for the scan you want to edit. For more information, see Tenable
Vulnerability Management Tables.
- 266 -
7. Click the button next to the scan name.
8. Change the scan configuration. For more information about scan configuration settings, see
Scan Settings.
l If you want to save and launch the scan immediately, click Save & Launch.
Note: If you scheduled the scan to run at a later time, the Save & Launch option is not
available.
l Virtual machines
Note: You must provide an IPv4 address when scanning an ESXi host. Otherwise, the scan fails.
- 267 -
3. In the Targets section, type the IP address or addresses of the ESXi host or hosts.
The Credentials page appears. This page contains a table of credentials configured for the
scan.
7. In the Username box, type the username associated with the local ESXi account.
8. In the Password box, type the password associated with the local ESXi account.
9. If your vCenter host includes an SSL certificate (not a self-signed certificate), disable the Do
not verify SSL Certificate toggle. Otherwise, leave the toggle enabled.
l If you want to save and launch the scan immediately, click Save & Launch.
Note: If you scheduled the scan to run at a later time, the Save & Launch option is not
available.
Note: When scanning vCenter-managed ESXis with API credentials, the Nessus Scan information plugin
always shows Credentialed Checks: No in the vCenter scan results. To verify that the authentication
was successful, check to see that the Nessus Scan Information plugin shows Credentialed Checks:
Yes in the scan results of the ESXis.
- 268 -
Note: The SOAP API requires a vCenter admin account with read and write permissions. The REST API
requires a vCenter admin account with read permissions, and a VMware vSphere Lifecycle manager
account with read permissions.
The Credentials page appears. This page contains a table of credentials configured for the
scan.
7. In the vCenter Host box, type the IP address of the vCenter host.
8. In the vCenter Port box, type the port for the vCenter host. By default, this value is 443.
9. In the Username box, type the username associated with the vCenter account.
10. In the Password box, type the password associated with the vCenter account.
11. If the vCenter host is SSL enabled, enable the HTTPS toggle.
12. If your vCenter host includes an SSL certificate (not a self-signed certificate), enable the
Verify SSL Certificate toggle. Otherwise, leave the toggle disabled.
- 269 -
l If you want to save without launching the scan, click Save.
l If you want to save and launch the scan immediately, click Save & Launch.
Note: If you scheduled the scan to run at a later time, the Save & Launch option is not
available.
When you copy a scan configuration, Tenable Vulnerability Management assigns you owner
permissions for the copy and assigns the copy scan permissions from the original scan.
Note: You cannot copy a scan from the Remediation Scans folder.
3. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
4. In the Folders section, click a folder to load the scans you want to view.
The scans table updates to display the scans in the folder you selected.
- 270 -
5. In the scans table, roll over the scan you want to copy.
A menu appears.
7. Click Copy.
The Copy to Folder plane appears, which contains a list of your scan folders.
9. Click Copy.
Tenable Vulnerability Management creates a copy of the scan with Copy of prepended to the
name and assigns you owner permissions for the copy. The copy appears in the scans table of
the folder you selected.
You can export both imported scan results and results that Tenable Vulnerability Management
collects directly from scanners.
Tenable Vulnerability Management retains individual scan results until the results are 15 months old.
Notes:
l Filters are not applicable for Tenable Web App Scanning exports, All results will are
exported.
l For archived scan results (that is, results older than 45 days), Tenable Vulnerability
Management limits export types to .nessus and .csv files.
l When a scan is actively running, the Export button does not appear in the Tenable
Vulnerability Management interface. Wait until the scan completes, then export the scan
results.
- 271 -
1. In the upper-left corner, click the button.
3. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
4. In the Folders section, click a folder to load the scans you want to view.
The scans table updates to display the scans in the folder you selected.
Scans table a. In the scans table, roll over the scan you want to export.
A menu appears.
c. Click Export.
Note: You cannot export scan results from the Scans table if the scan has
multiple targets. For scans with multiple targets, you can export scan results
for each target from the Scan Details page.
Scan Details a. In the scans table, click the scan you want to export.
A menu appears.
c. Click Export.
- 272 -
Supported for
Format Description Archived
Scan Results
Nessus A .nessus file in XML format that contains the list of Yes
targets, scan settings defined by the user, and scan
results. Tenable Vulnerability Management strips
password credentials and does not export them as
plain text in the XML. If you import a .nessus file as a
user-defined scan template, you must re-apply your
passwords to any credentials.
- 273 -
Vulnerability Management with Tenable Security
Center.
PDF An Adobe .pdf file that contains the list of targets, n/a
scan results, and scan notes.
Nessus A .nessus file in XML format that contains the list of n/a
targets, scan settings defined by the user, and scan
results. Tenable Vulnerability Management strips
password credentials and does not export them as
plain text in the XML.
JSON A .json file that contains the list of targets, scan n/a
- 274 -
settings defined by the user, scan results, and scan
notes. Tenable Vulnerability Management strips
password credentials and does not export them as
plain text in the JSON file.
7. For Tenable Vulnerability Management scans, if you select the PDF - Custom or HTML -
Custom formats:
l Select either Assets or Plugin from the Group By list, depending on how you want to
group the scan results in the export file.
8. Click Export.
Tenable Vulnerability Management generates the export file. Depending on your browser
settings, your browser may automatically download the export file to your computer, or may
prompt you to confirm the download before continuing.
Import a Scan
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
You can import scan results into Tenable Vulnerability Management. You cannot import results from
scans run more than 15 months ago.
Imported scans always belong to the default network. For more information, see Networks.
- 275 -
The Scans page appears.
A menu appears.
If the scan file is a .nessus or .db file, the Import plane appears.
Note: To learn more about the .nessus file format, see Nessus File Format.
If the scan file is any other file type, the Scan Import window appears.
b. (Optional) To show the scan results in dashboards, select the Show in Dashboard?
check box.
c. Click Import.
l If the scan file is any other file type, specify if you want the scan results to appear in
dashboards:
o Click Yes to show the scan results in dashboards.
o Click No to prevent the scan results from appearing in dashboards.
The Scans page appears, and the imported scan appears in the scans table.
Tenable Vulnerability Management begins processing the imported scan results. Once this
process is complete, the imported data appears in the individual scan details and aggregated
- 276 -
data views (such as dashboards). This process can take up to 30 minutes, depending on the
size of the import file.
Tip: If the imported data does not appear in the individual scan results or aggregated data views
after a reasonable processing time, verify that you are assigned adequate permissions for the
imported targets in access groups.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
In Tenable Vulnerability Management, the Scans page contains a Folders section that automatically
groups your configured and imported scans into default folders. To organize your scans further, you
can create custom folders.
Folder Description
This folder appears by default when you access the Scans page.
Remediation Contains any remediation scans you own or that another user has
- 277 -
Scans shared with you.
Trash Contains scans that you have moved to the trash. If you have Can
Configure permissions for a scan in this folder, you can permanently
delete the scan for all users.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
The custom scan folders you create appear only to you and cannot be shared with other users. You
are the only user who can view, rename, or delete the scan folders you create.
Note: The custom folders you create appear only to you and cannot be shared with other users.
2. In the left navigation plane, in the Vulnerability Management section, click Scans.
The New Folder box appears at the bottom of the folder list.
- 278 -
5. Click the button.
A Folder added successfully message appears and the new folder appears in the Folders
section.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
You can move a scan from a default folder to either the My Scans default folder or a custom scan
folder. You can also move a scan from a custom folder to the My Scans default folder or a different
custom folder.
If you move a scan from the All Scans default folder, the scan appears in both the folder you select
and the All Scans folder.
If you move a scan from the My Scans default folder, the scan appears in the custom folder only.
For information about moving a scan to the trash, see Move a Scan to the Trash Folder.
Note: You cannot move scans to or from the Remediation Scans folder.
2. In the left navigation plane, in the Vulnerability Management section, click Scans.
3. In the Folders section, click a folder to load the scans you want to view.
The scans table updates to display the scans in the folder you selected.
4. In the scan table, roll over the scan you want to move.
- 279 -
5. Do one of the following:
A menu appears.
The Move to Folder plane appears. This plane contains a list of your scan folders.
The Move to Folder plane appears. This plane contains a list of your scan folders.
Tenable Vulnerability Management limits the list to folders that match your search.
7. In the folder list, click the folder where you want to move the scan.
8. Click Move.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
You can rename custom scan folders only. You cannot rename the default scan folders.
Renaming a scan folder affects your user account only, because the custom folders you create
appear only to you and cannot be shared with other users.
- 280 -
1. In the upper-left corner, click the button.
2. In the left navigation plane, in the Vulnerability Management section, click Scans.
3. In the Folders section, roll over the folder you want to rename.
Tenable Vulnerability Management updates the folder name and a Folder updated
successfully message appears.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
You can delete custom scan folders only. You cannot delete the default scan folders that Tenable
Vulnerability Management provides (All Scans, My Scans, and Trash).
Deleting a scan folder affects your user account only, because the custom folders you create
appear only to you and cannot be shared with other users.
If you delete a scan folder that contains inactive scans, Tenable Vulnerability Management moves
the folder's scans to the Trash folder. If you delete a scan folder that contains at least one active
(Pending or Running) scan, Tenable Vulnerability Management moves the folder's scans to the My
Scans folder.
- 281 -
1. In the upper-left corner, click the button.
2. In the left navigation plane, in the Vulnerability Management section, click Scans.
3. In the Folders section, roll over the folder you want to delete.
When you move a shared scan to the Trash folder, Tenable Vulnerability Management moves the
scan for your account only. The scan remains in the original folder for all other users who have Can
View permissions or higher for the scan.
Scans moved to the Trash folder also appear in the All Scans folder, marked with the label, Trash.
Note: After you move a scan to the Trash folder, the scan remains in the Trash folder until a user with Can
Edit permissions permanently deletes the scan.
Note: Scheduled scans do not run if they are in the scan owner's Trash folder.
l For more information about Tenable Vulnerability Management scan schedules, see
Schedule.
l For more information about Tenable Web App Scanning scan schedules, see Schedule.
Note: You cannot move scans from the Remediation Scans folder to the Trash folder. Instead, delete
remediation scans directly in the folder.
- 282 -
To move a scan or scans to the Trash folder:
3. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
4. In the Folders section, click the folder that contains the scan you want to move.
l
Select a single scan:
a. In the scans table, roll over the scan you want to move.
A menu appears.
c. Click Trash.
l
Select multiple scans:
a. In the scans table, select the check box next to each scan you want to move.
Tenable Vulnerability Management moves the scan or scans you selected to the Trash
folder.
Delete a Scan
When you permanently delete a scan, you delete the scan configuration and scan results for all
users the scan is shared with.
- 283 -
The workflow for deleting a remediation scan differs from the workflow described in this procedure.
For more information, see the Delete a remediation scan steps at the end of this topic.
Caution: After you delete a scan, you cannot recover the scan or any scan data associated with the scan.
Delete only scans you are certain you no longer need to view or run.
To delete a scan:
3. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
The scan table updates to show the scans in the trash folder.
l
Select a single scan:
a. In the scans table, roll over the scan you want to delete.
A menu appears.
c. Click Delete.
l
Select multiple scans:
- 284 -
a. In the scans table, select the check box next to the scans you want to delete.
When you delete a remediation scan, you delete the scan configuration and scan results for all
users the scan is shared with.
Note: The Remediation Scans folder only shows for Tenable Vulnerability Management scans.
The scan table updates to show remediation scans that you own or that other users have
shared with you. By default, the rows are sorted by Created Date.
- 285 -
l
Select a single scan:
a. In the scans table, roll over the scan you want to delete.
A menu appears.
c. Click Delete.
l
Select multiple scans:
a. In the scans table, select the check box next to the scans you want to delete.
Note: Tenable Vulnerability Management keeps up to 10,000 of the most recent remediation scan
results. Once you have more than 10,000 remediation scan results, Tenable Vulnerability
Management deletes the scan results, starting with the oldest result.
For information about how discovered and assessed assets are counted towards your license, see
Tenable Vulnerability Management Licenses.
- 286 -
l a scan configured with the your license.
Host Discovery template.
Authenticated Scans
- 287 -
login account (e.g., root or
administrator access), the more
thorough the scan results.
Unauthenticated Scans
This licensing exception allows you to discover assets on your network without the large number of
assets counting towards your license limit. After you discover your assets, you can then identify
which assets have not yet been assessed for vulnerabilities, and choose which of those assets you
want to scan and manage going forward.
- 288 -
1. Discover assets using any of the following methods:
l Configure Tenable Nessus Network Monitor with discovery mode enabled, linked to
Tenable Vulnerability Management.
l Configure a connector.
Assets discovered by these methods do not count towards your asset license limit until they
have been assessed for vulnerabilities.
a. Click Apply.
Tenable Vulnerability Management filters for assets that have not yet been assessed for
vulnerabilities.
Note: Unassessed assets (where Asset Assessed is equal to false) can differ from unlicensed
assets (where Is Licensed (VM) is equal to false). Once you scan an asset for vulnerabilities,
Tenable Vulnerability Management categorizes the asset as assessed from that point on, but
the licensing status of an asset can change over time as assets are deleted or age out of your
organization's license count.
3. (Optional) Tag assets to identify assets that have not been assessed.
b. Manually apply the tag to assets, or create tag rules that automatically filter for assets
that have not been assessed.
- 289 -
For example, to create a dynamic tag for assets that have not yet been assessed, set
the tag rules to filter for Asset Assessed is equal to false.
4. (Optional) Create a scan to target assets using the tag you created.
Scan Failovers
If Tenable Vulnerability Management assigns a scan job to a scanner, and the scanner goes offline
while scanning, the following happens:
1. The scan job times out if the assigned scanner does not respond to Tenable Vulnerability
Management after two hours.
2. Tenable Vulnerability Management removes the scan job from the scanner and attempts the
scan job on another scanner in the same scanner group, or on the same scanner if it comes
back online.
3. Tenable Vulnerability Management attempts steps 1 and 2 three times. If the scan job is not
completed after three attempts, Tenable Vulnerability Management aborts the scan job.
Scan Status
Tenable Vulnerability Management provides a scan status for each of your configured scans.
If the scan is in progress, Tenable Vulnerability Management shows the number of scan tasks
completed as a percentage.
For example, if you scan less than 120 IP addresses in a single scan, Tenable Vulnerability
Management creates a single scan task and the progress percentage changes from 0% to 100%
when it completes.
However, if you target more than 120 IP addresses, Tenable Vulnerability Management creates
multiple scan tasks. After each task completes, the percentage changes to reflect the number of
completed tasks. For example, a scan that targets 300 IP addresses is split into three scan tasks,
and as each task completes, the progress bar updates the percentage to reflect the completed
tasks.
Note: Pausing a scan causes Tenable Vulnerability Management to move any completed results to
processing. When you resume the scan, Tenable Vulnerability Management creates a new scan task or
tasks for incomplete results. Therefore, pausing a scan can cause the progress percentage to update.
- 290 -
Tip: For Tenable Vulnerability Management scans, you can hover over the scan status to view more status
information in a pop-up window, such as the number of targets scanned and the elapsed or final scan time.
The window shows different information based on the scan's current status.
Tenable Vulnerability Management scans can have the following status values:
Status Description
Tip: The typical Tenable Vulnerability Management scan status flow is as follows: Initializing, Running,
Publishing Results, Completed.
Aborted Either the latest run of the scan is incomplete because Tenable Vulnerability
Management or the scanner encountered problems during the run, or the
scan remained queued without running for four or more hours. For more
information about the problems encountered during the run, view the scan
warnings.
Empty The scan is either empty (the scan is new or has yet to run) or pending
(Tenable Vulnerability Management is processing a request to run the scan).
Imported A user imported the scan. You cannot run imported scans. Scan history is
unavailable for imported scans.
Pausing A user paused the scan, and Tenable Vulnerability Management is processing
the action.
- 291 -
Status Description
Pending Tenable Vulnerability Management has the scan queued to launch and is
assigning scan tasks to the assigned sensors.
Publishing Tenable Vulnerability Management processes and stores the scan results
Results data for you to view and use in the Tenable Vulnerability Management user
interface. The Publishing Results status begins once the Running status
reaches 100%.
Running The scan is currently running. While this status is shown, the scan's sensors
complete their assigned scan tasks, and Tenable Vulnerability Management
processes the scan results. The progress bar shows next to the status when
a scan is running. The progress bar shows the percentage of the completed
tasks.
Stopping A user stopped the scan, the scan timed out, or Tenable Vulnerability
Management is stopping the scan after all associated scan tasks are
complete.
Scan Templates
- 292 -
Scan templates contain granular configuration settings for your scans. You can use Tenable's scan
templates to create custom scan configurations for your organization. Then, you can run scans
based on Tenable's scan templates or your custom configurations' settings.
When you create a scan configuration, the Select a Scan Template page appears. Tenable
Vulnerability Management provides separate templates for Tenable Vulnerability Management and
Tenable Web App Scanning. Within Tenable Vulnerability Management scanning, Tenable
Vulnerability Management provides separate templates for scanners and agents, depending on
which sensor you want to use for scanning:
If you have custom configurations, they appear in the User Defined tab. For more information about
user-defined templates, see User-Defined Templates.
When you configure a Tenable-provided scan template, you can modify only the settings included
for the scan template type. When you create a user-defined scan template, you can modify a
custom set of settings for your scan.
Tip: For information and tips on optimizing your Tenable Vulnerability Management scan configurations,
see the Tenable Vulnerability Management Scan Tuning Guide.
l Vulnerability Scans (Common) — Tenable recommends using vulnerability scan templates for
most of your organization's standard, day-to-day scanning needs.
l Tactical Scans — Tenable recommends using the tactical scan templates to scan your network
for a specific vulnerability or group of vulnerabilities. Tactical scans are lightweight, timely
scan templates that you can use to scan your assets for a particular vulnerability. Tenable
- 293 -
frequently updates the Tenable Vulnerability Management Tactical Scans library with
templates that detect the latest vulnerabilities of public interest, such as Log4Shell.
The following table describes the available Tenable Nessus Scanner templates:
Template Description
Advanced Network The most configurable scan type. You can configure this scan template
Scan to match any policy. This template has the same default settings as the
basic scan template, but it allows for additional configuration options.
Basic Network Performs a full system scan that is suitable for any host. Use this
Scan template to scan an asset or assets with all of Nessus's plugins enabled.
For example, you can perform an internal vulnerability scan on your
organization's systems.
Host Discovery Performs a simple scan to discover live hosts and open ports.
Launch this scan to see what hosts are on your network and associated
information such as IP address, FQDN, operating systems, and open
ports, if available. After you have a list of hosts, you can choose what
hosts you want to target in a specific vulnerability scan.
- 294 -
Note: Assets identified by discovery scans do not count toward your license.
Note: While the PCI DSS requires you to provide evidence of passing or
"clean" scans on at least a quarterly basis, you must also perform scans after
any significant changes to your network (PCI DSS 11.2.3).
Legacy Web App Uses a Tenable Nessus scanner to scan your web applications.
Scan
Note: Unlike the Tenable Web App Scanning scanner, the Tenable Nessus
scanner does not use a browser to scan your web applications. Therefore, a
Legacy Web App Scan is not as comprehensive as Tenable Web App Scanning.
Configuration Scans
- 295 -
The MDM Config Audit template reports on a variety of MDM
vulnerabilities, such as password requirements, remote wipe settings,
and the use of insecure features, such as tethering and Bluetooth.
The compliance checks can audit against custom security policies, such
as password complexity, system settings, or registry values on Windows
operating systems. For Windows systems, the compliance audits can
test for a large percentage of anything that can be described in a
Windows policy file. For Unix systems, the compliance audits test for
running processes, user security policy, and content of files.
SCAP and OVAL Audits systems using SCAP and OVAL definitions.
Auditing
The National Institute of Standards and Technology (NIST) Security
Content Automation Protocol (SCAP) is a set of policies for managing
vulnerabilities and policy compliance in government agencies. It relies on
- 296 -
multiple open standards and policies, including OVAL, CVE, CVSS, CPE,
and FDCC policies.
l When using the SCAP and OVAL Auditing template, you can
perform Linux and Windows SCAP CHECKS to test compliance
standards as specified in NIST’s Special Publication 800-126.
Tactical Scans
Active Directory Use a Domain User account to query AD identity information. This policy
Identity enumerates Active Directory identity information via LDAPS. It requires
Domain User credentials, LDAPS configuration, and an Active Directory
Domain Controller as the scan target.
CISA Alerts AA22- Performs remote and local checks for vulnerabilities from recent CISA
011A and AA22- alerts.
047A
- 297 -
ContiLeaks Performs remote and local checks for ContiLeaks vulnerabilities.
Intel AMT Security Performs remote and local checks for CVE-2017-5689.
Bypass
ProxyLogon: Performs remote and local checks to detect Microsoft Exchange Server
MS Exchange vulnerabilities related to CVE-2021-26855, CVE-2021-26857, CVE-2021-
26858, and CVE-2021-27065.
Ripple20 Remote Detects hosts running the Treck stack in the network, which may be
Scan affected by Ripple20 vulnerabilities.
Spectre and Performs remote and local checks for CVE-2017-5753, CVE-2017-5715,
Meltdown and CVE-2017-5754.
- 298 -
Zerologon Remote Detects Microsoft Netlogon elevation of privilege vulnerability
Scan (Zerologon).
l Vulnerability Scans — Tenable recommends using vulnerability scan templates for most of
your organization's standard, day-to-day scanning needs.
l Inventory Collection — Unlike standard Tenable Nessus Agent vulnerability scans, the Collect
Inventory template uses Tenable's Frictionless Assessment technology to provide faster scan
results and reduce the scan's system footprint. Agent-based inventory scans gather basic
information from a host and upload it to Tenable Vulnerability Management. Then, Tenable
Vulnerability Management analyzes the information against missing patches and
vulnerabilities as Tenable releases coverage. This reduces the performance impact on the
target host while also reducing the time it takes for an analyst to see the impact of a recent
patch.
Note: If a plugin requires authentication or settings to communicate with another system, the
plugin is not available on agents. This includes, but is not limited to:
l Patch management
l Mobile device management
l Cloud infrastructure audit
l Database checks that require authentication
The following table describes the available Tenable Nessus Agent templates:
Template Description
Vulnerability Scans
Advanced An agent scan without any recommendations, so that you can fully
Agent Scan customize the scan settings. In Tenable Vulnerability Management, the
Advanced Agent Scan template allows for two scanning methods:
l Scan Window - Specify the timeframe during which the agent must
- 299 -
Template Description
Note: When you create an agent scan using the Advanced Agent Scan template,
you must also select the plugins you want to use for the scan.
Malware Scan Scans for malware on systems connected via Tenable Nessus Agents.
Tenable Nessus Agent detects malware using a combined allow list and
block list approach to monitor known good processes, alert on known bad
processes, and identify coverage gaps between the two by flagging unknown
processes for further inspection.
SCAP and Audits systems using SCAP and OVAL definitions for systems connected via
OVAL Agent Tenable Nessus Agents.
Auditing
The National Institute of Standards and Technology (NIST) Security Content
Automation Protocol (SCAP) is a set of policies for managing vulnerabilities
- 300 -
Template Description
l When using the SCAP and OVAL Auditing template, you can perform
Linux and Windows SCAP CHECKS to test compliance standards as
specified in NIST’s Special Publication 800-126.
Inventory Collection
- 301 -
Template Description
Template Description
API A scan that checks an API for vulnerabilities. This scan analyzes RESTful APIs
described via an OpenAPI (Swagger) specification file. File attachment size is
limited to 1 MB.
Tip: If the API you want to scan requires keys or a token for authentication, you
can add the expected custom headers in the Advanced settings in the HTTP
Settings section.
Note: The API scan template is available as a public beta. Its functionality is
subject to change as ongoing improvements are made throughout the beta period.
- 302 -
Config Audit A high-level scan that analyzes HTTP security headers and other externally
facing configurations on a web application to determine if the application is
compliant with common security industry standards.
If you create a scan using the Config Audit scan template, Tenable Web App
Scanning analyzes your web application only for plugins related to security
industry standards compliance.
Log4Shell Detects the Log4Shell vulnerability (CVE-2021-44228) in Apache Log4j via local
checks.
Overview A high-level preliminary scan that determines which URLs in a web application
Tenable Web App Scanning scans by default.
The Overview scan template does not analyze the web application for active
vulnerabilities. Therefore, this scan template does not offer as many plugin
family options as the Scan template.
PCI A scan that assesses web applications for compliance with Payment Card
Industry Data Security Standards (PCI DSS) for Tenable PCI ASV.
Quick Scan A high-level scan similar to the Config Audit scan template that analyzes
HTTP security headers and other externally facing configurations on a web
application to determine if the application is compliant with common security
industry standards. Does not include scheduling.
If you create a scan using the Quick Scan scan template, Tenable Vulnerability
Management analyzes your web application only for plugins related to security
industry standards compliance.
Scan A comprehensive scan that assesses web applications for a wide range of
vulnerabilities.
The Scan template provides plugin family options for all active web
application plugins.
If you create a scan using the Scan template, Tenable Web App Scanning
analyzes your web application for all plugins that the scanner checks for when
you create a scan using the Config Audit, Overview, or SSL TLS templates, as
well as additional plugins to detect specific vulnerabilities.
- 303 -
A scan run with this scan template provides a more detailed assessment of a
web application and take longer to complete that other Tenable Web App
Scanning scans.
SSL TLS A scan to determine if a web application uses SSL/TLS public-key encryption
and, if so, how the encryption is configured.
When you create a scan using the SSL TLS template, Tenable Web App
Scanning analyzes your web application only for plugins related to SSL/TLS
implementation. The scanner does not crawl URLs or assess individual pages
for vulnerabilities.
User-Defined Templates
Tenable provides a variety of scan templates for specific scanning purposes. If you want to
customize a Tenable-provided scan template and share it with other users, you can create a user-
defined scan template.
You can create, edit, copy, export, or delete user-defined Tenable Vulnerability Management and
Tenable Web App Scanning Scan templates from the Scans page. You can also import and export
Tenable Vulnerability Management scan templates.
A menu appears.
- 304 -
The Scan Templates page appears.
5. Below Scan Templates, choose to view Vulnerability Management Scan Templates or Web
Application Scan Templates.
Click a template to view or edit its settings and parameters, or use the following procedures to
further manage your user-defined templates:
You can create user-defined scan templates to save and share custom scan settings with other
Tenable Vulnerability Management users.
When you define a scan template, Tenable Vulnerability Management assigns you owner
permissions for the scan template. You can share the scan template by assigning template
permissions to other users, but only you can delete the scan template.
3. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
4. In the upper-right corner of the page, click the Create Template button.
5. Click the tile for the template you want to use as the base for your user-defined scan
template.
- 305 -
l If you are creating a Tenable Vulnerability Management scan template, use the following
procedure:
- 306 -
a. Configure the scan template:
Tab Action
- 307 -
Plugins Select security checks by plugin family or individual
plugin.
l If you are creating a Tenable Web App Scanning scan, use the following procedure:
Tab Action
Scope Specify the URLs and file types that you want to include in
or exclude from your scan. For more information, see
Scope Settings in Tenable Web App Scanning Scans.
7. Click Save.
Tenable Vulnerability Management saves the user-defined scan template and adds it to the list
of scan templates on the Scan Templates page.
- 308 -
To edit a user-defined scan template:
3. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
A menu appears.
6. In the scan templates table, click the scan template you want to edit.
l If you are editing a Tenable Vulnerability Management scan template, use the following
procedure:
- 309 -
a. Configure the scan template options:
Tab Action
- 310 -
Plugins Select security checks by plugin family or individual
plugin.
l If you are editing a Tenable Web App Scanning scan template, use the following
procedure:
Tab Action
Scope Specify the URLs and file types that you want to include in
or exclude from your scan. For more information, see
Scope Settings in Tenable Web App Scanning Scans.
8. Click Save.
Tenable Vulnerability Management saves the user-defined scan template and adds it to the list
of templates on the Scan Templates page.
- 311 -
When you copy a user-defined scan template, Tenable Vulnerability Management assigns you owner
permissions for the copy. You can share the copy by assigning template permissions to other users,
but only you can delete the copied scan template.
3. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
A menu appears.
6. In the scans table, roll over the scan you want to launch.
A menu appears.
Note: Tenable Vulnerability Management does not export passwords, credentials, and file-based settings
(for example, .audit files and the SSH known_hosts file) in user-defined scan templates.
- 312 -
1. In the upper-left corner, click the button.
A menu appears.
6. In the scans table, roll over the scan template you want to export.
A menu appears.
Tenable Vulnerability Management exports the user-defined scan template as a .nessus file.
Note: To learn more about the .nessus file format, see Nessus File Format.
When you import a scan template, Tenable Vulnerability Management assigns you owner
permissions for the scan template. You can share the scan template by assigning template
permissions to other users, but only you can delete the scan template.
Tenable Vulnerability Management does not include passwords or compliance audit files in exported
user-defined scan templates. You must add these settings in manually after importing the scan
template.
- 313 -
1. In the upper-left corner, click the button.
A menu appears.
8. Click Open.
A Template uploaded message appears, and the scan template appears on the Scan
Templates page.
What to do next:
l As needed, add passwords and compliance audit files to the imported template.
If you delete a user-defined scan template, Tenable Vulnerability Management deletes it from all
user accounts.
- 314 -
1. In the upper-left corner, click the button.
3. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
A menu appears.
l
Select a single scan template:
a. In the scans table, roll over the scan you want to launch.
A menu appears.
l
Select multiple scan templates:
a. In the scan templates table, select the check box for each scan template you want
to delete.
- 315 -
Tenable Vulnerability Management deletes the user-defined scan template or templates you
selected.
3. In the User Permissions section, next to the permission drop-down for Owner, click the
button.
Tenable Vulnerability Management automatically adds you to the list of users and assigns Can
View permissions to your user account.
Tenable Vulnerability Management removes your account from the list of users.
a. Next to the permission drop-down for your user account, click the button.
b. Select a permission.
7. Click Save.
- 316 -
Tenable assigns ownership to the selected user and assigns your user account the
permissions you selected. If you removed all permissions for your user account from the
template, the template no longer appears in the templates table.
Scan Settings
Scan settings enable you to refine parameters in scans to meet your specific network security
needs. The scan settings you can configure vary depending on the Tenable-provided template on
which a scan or user-defined template is based.
You can configure these settings in individual scans or in user-defined templates from which you
create individual scans.
- 317 -
l Configure Plugins in Tenable Vulnerability
Management Scans
l If you configure a setting in a user-defined template, that setting applies to any scans you
create based on that user-defined template.
l You base a user-defined template on a Tenable-provided template. Most of the settings are
identical to the settings you can configure in an individual scan that uses the same Tenable-
provided template.
However, certain Basic settings are unique to creating a user-defined template, and do not
appear when configuring an individual scan. For more information, see Basic Settings in User-
Defined Templates.
l You can configure certain settings in a user-defined template, but cannot modify those
settings in an individual scan based on a user-defined template. These settings include
Discovery, Assessment, Report, Advanced, Compliance, SCAP, and Plugins. If you want to
modify these settings for individual scans, create individual scans based on a Tenable-
provided template instead.
l If you configure Credentials in a user-defined template, other users can override these
settings by adding scan-specific or managed credentials to scans based on the template.
You can configure these settings in individual scans or in user-defined templates from which you
create individual scans.
Tenable Vulnerability Management scan settings are organized into the following categories:
- 318 -
l Discovery Settings in Tenable Vulnerability Management Scans
l If you configure a setting in a user-defined template, that setting applies to any scans you
create based on that user-defined template.
l You base a user-defined template on a Tenable-provided template. Most of the settings are
identical to the settings you can configure in an individual scan that uses the same Tenable-
provided template.
However, certain Basic settings are unique to creating a user-defined template, and do not
appear when configuring an individual scan. For more information, see Basic Settings in User-
Defined Templates.
l You can configure certain settings in a user-defined template, but cannot modify those
settings in an individual scan based on a user-defined template. These settings include
Discovery, Assessment, Report, Advanced, Compliance, SCAP, and Plugins. If you want to
modify these settings for individual scans, create individual scans based on a Tenable-
provided template instead.
l If you configure Credentials in a user-defined template, other users can override these
settings by adding scan-specific or managed credentials to scans based on the template.
- 319 -
Note: This topic describes Basic settings you can set in individual scans. For Basic settings in user-
defined templates, see Basic Settings in User-Defined Templates.
You can use Basic settings to specify organizational and security-related aspects of a scan
configuration. This includes specifying the name of the scan, its targets, whether the scan is
scheduled, and who has access to the scan.
Note: To learn more about scan limitations in Tenable Vulnerability Management, see Scan Limitations.
l General
l Schedule
l Notifications
l User Permissions
General
The general settings for a scan.
Scan Results Show in Specifies whether the results of the scan should
dashboard appear in workbenches, dashboards, and reports, or
be kept private.
- 320 -
Resurfaced.
Folder My Scans Specifies the folder where the scan appears after
being saved.
Agent Groups None (Tenable Nessus Agent templates only) Specifies the
agent group or groups you want the scan to target. In
the drop-down box, select an existing agent group, or
create a new agent group.
Scanner Type Internal Scanner Specifies whether a local, internal scanner or a cloud-
managed scanner performs the scan, and determines
whether the Scanner field lists local or cloud-
managed scanners to choose from.
- 321 -
scanner designations in scan
configurations.
Tags None Select one or more tags to scan all assets that have
any of the specified tags applied. To see a list of
assets identified by the specified tags, click View
Assets.
- 322 -
Use Tag Rules Existing tagged (Required) Specifies whether Tenable Vulnerability
as Targets assets only Management scans tagged assets only, or any assets
that which the selected tags' rules apply to.
- 323 -
Tags and Tag Rules.
Scan Type Scan Window (Tenable Nessus Agent templates only) (Required)
Specifies whether the agent scans occur based on a
scan window or triggers:
- 324 -
file name is detected in the trigger
directory.
- 325 -
Target Groups None You can select or add a new target group to which the
scan applies. Assets in the target group are used as
scan targets.
Upload Targets None Uploads a text file that specifies the targets.
- 326 -
The targets file must be formatted in the following
manner:
Policy None This setting appears only when the scan owner edits
an existing scan that is based on a user-defined scan
template.
- 327 -
Schedule
The scan schedule settings.
By default, scans are not scheduled. When you first access the Schedule section, the Enable
Schedule setting appears, set to Off. To modify the settings listed on the following table, click the
Off button. The rest of the settings appear.
Note: Scheduled scans do not run if they are in the scan owner's Trash folder.
Default
Setting Description
Value
- 328 -
Note: If you schedule your scan to recur
monthly and by time and day of the month,
Tenable recommends setting a start date no
later than the 28th day. If you select a start
date that does not exist in some months (for
example, the 29th), Tenable Vulnerability
Management cannot run the scan on those
days.
Starts Varies Specifies the exact date and time when a scan
launches.
Timezone Zulu Specifies the timezone of the value set for Starts.
Repeat On Varies Specifies what day of the week a scan repeats. This
item appears only if you specify Weekly for
Frequency.
- 329 -
available settings.
Notifications
The notification settings for a scan.
Default
Setting Description
Value
User Permissions
You can share the scan with other users by setting permissions for users or groups. When you
assign a permission to a group, that permission applies to all users within the group.
Tip: Tenable recommends assigning permissions to user groups, rather than individual users, to minimize
maintenance as individual users leave or join your organization.
Permission Description
No Access (Default user only) Groups and users set to this permission cannot interact
with the scan in any way.
Can View Groups and users with this permission can view the results of the scan,
export the scan results, and move the scan to the Trash folder. They cannot
view the scan configuration or permanently delete the scan.
Can Execute In addition to the tasks allowed by Can View, groups and users with this
permission can launch, pause, and stop a scan. They cannot view the scan
configuration or permanently delete the scan.
Note: In addition to Can Execute permissions for the scan, users running a scan
must have Can Scan permissions in an access group for the specified target, or
- 330 -
the scanner does not scan the target.
Can Edit In addition to the tasks allowed by Can Execute, groups and users with this
permission can view the scan configuration and modify any setting for the
scan except scan ownership. They can also delete the scan.
Note: This topic describes Basic settings you can set in user-defined templates. For Basic settings in
individual scans, see Basic Settings in Tenable Vulnerability Management Scans .
You can use Basic settings to specify basic aspects of a user-defined template, including who has
access to the user-defined template.
l General
l Permissions
General
The general settings for a user-defined template.
Default
Setting Description
Value
- 331 -
Description None (Optional) Specifies a description of the user-defined
template.
Permissions
You can share the user-defined template with other users by setting permissions for users or
groups. When you assign a permission to a group, that permission applies to all users within the
group.
Tip: Tenable recommends assigning permissions to user groups, rather than individual users, to minimize
maintenance as individual users leave or join your organization.
Permission Description
No Access (Default user only) Groups and users set to this permission cannot interact
with the scan in any way.
Can View Groups and users with this permission can view the results of the scan,
export the scan results, and move the scan to the Trash folder. They cannot
view the scan configuration or permanently delete the scan.
Can Execute In addition to the tasks allowed by Can View, groups and users with this
permission can launch, pause, and stop a scan. They cannot view the scan
configuration or permanently delete the scan.
Note: In addition to Can Execute permissions for the scan, users running a scan
must have Can Scan permissions in an access group for the specified target, or
the scanner does not scan the target.
Can Edit In addition to the tasks allowed by Can Execute, groups and users with this
permission can view the scan configuration and modify any setting for the
scan except scan ownership. They can also delete the scan.
- 332 -
the permissions assigned to that user in the individual scan.
l An administrator always has the equivalent of Can Edit permissions,
regardless of the permissions set for the administrator account in
the individual scan. This does not apply to user-defined scan
templates.
Authentication
In user-defined templates, you can use Authentication settings to configure the authentication
Tenable Vulnerability Management performs for credentialed scanning.
Tip: The Authentication settings are equivalent to the Scan-wide Credential Type Settings in Tenable-
provided scan templates.
SNMPv1/v2c
HTTP
Login method POST Specify if the login action is performed via a GET or
POST request.
- 333 -
force lockout mechanisms.
Invert Disabled A regex pattern to look for on the login page, that if
authenticated found, tells Tenable Vulnerability Management that
regex authentication was not successful (e.g., Authentication
failed!).
Case insensitive Disabled he regex searches are case sensitive by default. This
authenticated instructs Tenable Vulnerability Management to ignore
regex case.
telnet/rsh/rexec
Windows
Never send Enabled By default, for security reasons, this option is enabled.
credentials in the
clear
- 334 -
Do not use Enabled If the Do not use NTLMv1 authentication option is
NTLMv1 disabled, then it is theoretically possible to trick
authentication Tenable Vulnerability Management into attempting to
log into a Windows server with domain credentials via
the NTLM version 1 protocol. This provides the remote
attacker with the ability to use a hash obtained from
Tenable Vulnerability Management. This hash can be
potentially cracked to reveal a username or password.
It may also be used to directly log into other servers.
Force Tenable Vulnerability Management to use
NTLMv2 by enabling the Only use NTLMv2 setting at
scan time. This prevents a hostile Windows server from
using NTLM and receiving a hash. Because NTLMv1 is
an insecure protocol, this option is enabled by default.
Start the Remote Disabled This option tells Tenable Vulnerability Management to
Registry service start the Remote Registry service on computers being
during the scan scanned if it is not running. This service must be
running in order for Tenable Vulnerability Management
to execute some Windows local check plugins.
- 335 -
control configurations for your network firewall might
blacklist your scanner for attempting to negotiate Server
Message Block Protocol (SMB protocol) connections.
SSH
Preferred port 22 The port on which SSH is running on the target system.
Amazon AWS
equivalent to Scans > Credentials > Cloud Services > Amazon AWS
Regions to access Rest of the In order for Tenable Vulnerability Management to audit
World an Amazon AWS account, you must define the regions
you want to scan. Per Amazon policy, you need
different credentials to audit account configuration for
- 336 -
the China region than you do for the rest of the world.
l us-east-1
l us-east-2
l us-west-1
l us-west-2
l ca-central-1
l eu-west-1
l eu-west-2
l eu-central-1
l ap-northeast-1
l ap-northeast-2
l ap-southeast-1
l ap-southeast-2
l sa-east-1
l cn-north-1
l cn-northwest-1
- 337 -
authenticates over an encrypted (HTTPS) or an
unencrypted (HTTP) connection.
Rackspace
l Chicago (ORD)
l London (LON)
l Syndney (SYD)
Microsoft Azure
equivalent to Scans > Credentials > Cloud Services > Amazon AWS
When you configure a Tenable Nessus Agent scan in Tenable Vulnerability Management, Tenable
Vulnerability Management offers two agent scan types: Scan Window and Triggered Scan.
For window scans, Tenable Vulnerability Management creates a timeframe (for example, the default
is three hours) in which an agent group must report in order to be included in the scan results. You
must schedule Tenable Vulnerability Management to launch window scan at a scheduled time, or
you must manually launch the scan from the Tenable Vulnerability Management user interface (for
example, if you schedule a three-hour agent window scan for every Monday, Tenable Vulnerability
Management pulls data updates from the agent group for three hours every Monday).
- 338 -
Triggered scans differ from window agent scans in that the agent or agent group launches the scan
without any Tenable Vulnerability Management or user intervention. Agents can launch triggered
scans using three different methods:
l Interval trigger — Configure agents to scan at a certain time interval (for example, every 12
hours or every 24 hours).
l File Name trigger — Configure agents to scan whenever a file with a specific file name is
added to the agent trigger directory. The trigger file disappears after the scan begins. The
agent trigger directory location varies by operating system:
macOS /Library/NessusAgent/run/var/nessus/triggers
Linux /opt/nessus_agent/var/nessus/triggers
l Nessuscli trigger — Launch an existing triggered scan manually by running the following
command in the Tenable Nessus Agent nessuscli utility:
You can also set multiple triggers for a single scan, and the scan searches for the triggers in their
listed order (in other words, if the first trigger does not trigger the scan, it searches for the second
trigger).
Tenable recommends using triggered agent scans over window agent scans in many cases. Due to
the scanning independence from Tenable Vulnerability Management or user intervention and the
multiple trigger options, triggered scanning offers more flexibility to meet the needs of your
workflow, especially if you have a mobile workforce in multiple time zones.
Triggered scans can provide more consistent coverage than window scans and help overcome
connectivity issues between Tenable Vulnerability Management and linked agents. While window
scans can create gaps in data coverage due to unresponsive or offline agents, triggered scans allow
agents to scan and send data to Tenable Vulnerability Management whenever the triggers occur;
Tenable Vulnerability Management accepts and processes data from triggered scans at any time.
- 339 -
Tenable recommends using scan windows if you need to export individual scan results, as you can
only export triggered scan data by using the bulk vulnerability export API.
To view triggered scan results, see View Tenable Vulnerability Management Scan Details.
Note: For triggered scan histories, Tenable Vulnerability Management shows a scan history entry for each
12-hour window of the past 7 days. Tenable Vulnerability Management only retains up to 15 triggered scan
histories at a time for each scan.
In addition to managing triggered scans from Tenable Vulnerability Management, you can view
triggered scan details by running the following command in the Tenable Nessus Agent nessuscli
utility:
The --list command returns the agent's triggered scan details. These details include:
l Scan name
l Scan description
For more information about the Tenable Nessus Agent nessuscli utility, see Nessuscli Agent
in the Tenable Nessus User Guide.
You can also view your agent trigger information in the agent trigger directory:
- 340 -
macOS /Library/NessusAgent/run/var/nessus/triggers
Linux /opt/nessus_agent/var/nessus/triggers
Scan Targets
In Tenable Vulnerability Management, you can use a number of different formats when specifying
targets for a scan. The following tables contain target formats, examples, and a short explanation of
what occurs when Tenable Vulnerability Management scans that target type.
Note: Tenable limits the number of targets that you can scan in a single scan. For more information, see
Scan Limitations.
Note: For previously scanned assets, you can configure scan targets based on host attributes like
operating system or installed software, instead of host identifiers like IP address.
Tip: If a hostname target looks like either a link6 target (start with the text "link6") or one of the two IPv6
range forms, put single quotes around the target to ensure that Tenable Vulnerability Management
processes it as a hostname.
Target
Example Explanation
Description
- 341 -
Target
Example Explanation
Description
- 342 -
Target
Example Explanation
Description
- 343 -
Target
Example Explanation
Description
identifier on Windows
platforms.
Some text with Test Host 1[10.0.1.1] Scans the IPv4 or IPv6 address
either a single or within the brackets, like a
IPv4 or IPv6 Test Host 2[2001:db8::abcd] normal single target.
address within
square
brackets
Target Groups
You can still use target groups to manage your scan targets. However, Tenable recommends that you
instead use tags to group and scan your assets when possible. In the future, when tagging features and
options match those currently available in target groups, Tenable will convert your target groups into tags
and retire your existing target groups. No action is required on your part, and Tenable will provide you with
60 calendar days notice before converting and retiring your target groups. For more information, contact
your Tenable representative.
A target group allows you to construct a list of scan targets by FQDN, CIDR notation, or IP address
range. You can then specify which users in your organization can use the target group in scan
configurations or filtering dashboards (including workbenches).
Note: Tenable recommends limiting the number of targets in any single target group. When filtering a
dashboard by a target group with too many targets, Tenable Vulnerability Management may fail to show
data.
Note: Scan targets listed by CIDR notation must be in one of the following formats:
l xx.xx.0.0/16
l xx.xx.xx.0/24
If you grant a user permissions in a target group, the user can use the target group in the Target
Groups option for scan configuration. However, you must also grant the user Can Scan permissions
in an access group for the targets, or Tenable Vulnerability Management excludes the targets from
the scan results. For more information, see Permissions.
- 344 -
To manage target groups, use the following procedures:
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
The Target Groups page appears. By default, the System tab is active. This tab contains a
table of system target groups.
4. If you want to edit a user target group, click User. Otherwise, stay on the System target
groups tab.
5. In the upper-right corner of the page, click the Create Target Group button.
Setting Description
- 345 -
Setting Description
Note: Scan targets listed by CIDR notation must be in one of the following
formats:
l xx.xx.0.0/16
l xx.xx.xx.0/24
The system adds the uploaded targets to the Targets box after you save
the target group.
Note: If you grant a user permissions in a target group, the user can use the target group in the
Target Groups option for scan configurations. However, you must also grant the user Can Scan
permissions in an access group for the targets, or Tenable Vulnerability Management excludes the
targets from the scan results. For more information, see Access Groups.
8. Click Save.
l If you configured user permissions for the target group, Tenable Vulnerability
Management creates the target group and adds it to the table on the Target Groups
page.
l If you retained the default No Access permissions for the target group, a confirmation
window appears.
- 346 -
l If the default configuration is appropriate for the target group, click Continue to
confirm your action.
l If the default configuration is not appropriate for the target group, click Cancel to
return to user permissions configuration for the target group.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
Note: For auditing cloud infrastructure, Tenable Vulnerability Management requires a target group with
Can Scan permissions to be present on 127.0.0.1.
Note: To enable the user to use a target group in the Target Groups option for scan configurations, you must
also grant the user Can Scan permissions in an access group for the targets. If you do not, Tenable
Vulnerability Management excludes the targets from the scan results. For more information, see Access
Groups.
l
Change the permissions for the Default user
Note: The Default user represents any users that have not been specifically added to the
target group.
- 347 -
a. Next to the permission drop-down for the Default user, click the button.
c. Click Save.
l
Add permissions
a. Next to User Permissions, click the button.
b. In the Add users or groups box, type the name of a user or group.
The selected user or group appears in the list of users and groups.
d. Next to the permission drop-down for the user or group, click the button.
f. Click Save.
l
Edit permissions
a. Next to the permission drop-down for the user or group, click the button.
c. Click Save.
l
Delete permissions
a. In the list of users, roll over the user or group you want to delete.
- 348 -
c. Click Save.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
Note: System target groups and related functionality asset isolation are deprecated. To control
scan permissions, use access groups instead.
You can still create and edit system target groups, as well as use system target groups in scan
configurations and dashboard filters. However, Tenable recommends using user target groups
instead.
The Target Groups page appears. By default, the System tab is active. This tab contains a
table of system target groups.
4. If you want to edit a user target group, click User. Otherwise, stay on the System target
groups tab.
- 349 -
5. In the target groups table, click the target group you want to edit.
Setting Description
The system adds the uploaded targets to the Targets box after you save
the target group.
8. Click Save.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
Tip: To create or modify the .csv file, Tenable recommends using a robust editor such as Microsoft Excel.
- 350 -
1. In the upper-left corner, click the button.
The Target Groups page appears. By default, the System tab is active. This tab contains a
table of system target groups.
4. If you want to import a user target group, click User. Otherwise, stay on the System target
groups page.
Note: System target groups and related functionality asset isolation are deprecated. To
control scan permissions, use access groups instead.
You can still create and edit system target groups, as well as use system target groups in
scan configurations and dashboard filters. However, Tenable recommends using user
target groups instead.
Tenable Vulnerability Management imports the file and adds the target groups to the target
groups box.
name Field used to identify the name of the target group. You can use any
combination of alphanumeric characters or symbols in the name field.
- 351 -
members Field used to identify the host address or addresses to include in the
target group.
Required Tenable Vulnerability Management User Role: Standard, Scan Manager, or Administrator
You can export a target group as a .csv file. Depending on your browser, the target group may
download automatically.
The Target Groups page appears. By default, the System tab is active. This tab contains a
table of system target groups.
4. If you want to export a user target group, click User. Otherwise, stay on the System target
groups tab.
Note: System target groups and related functionality asset isolation are deprecated. To
control scan permissions, use access groups instead.
- 352 -
You can still create and edit system target groups, as well as use system target groups in
scan configurations and dashboard filters. However, Tenable recommends using user
target groups instead.
l
Select a single target group.
a. In the target groups table, roll over the target group you want to export.
l
Select multiple target groups.
a. In the target groups table, select the check boxes for each target group you want
to export.
creation_date Date (in UNIX timestamp format) when the target group was created.
last_modification_ Date (in UNIX timestamp format) when the target group was last
date modified.
- 353 -
Delete a target group
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
The Target Groups page appears. By default, the System tab is active. This tab contains a
table of system target groups.
4. If you want to delete a user target group, click User. Otherwise, stay on the System target
groups tab.
l
Select a single target group.
a. In the target groups table, roll over the target group you want to delete.
- 354 -
b. In the row, click the button.
l
Select multiple target groups.
a. In the target groups table, select the check box for each target group you want to
delete.
Tenable Vulnerability Management deletes the target group or groups you selected.
The following table describes user permissions for both system and user target groups.
Permission Description
No Access (Default user only) Users assigned this permission cannot use the system
target group to filter dashboards.
Can Use Note: System target groups are deprecated; Tenable recommends using user
target groups instead.
Users assigned this permission can use hosts in the user target groups to
filter dashboards and configure scans.
Note: To enable the user to use a target group in the Target Groups option for
scan configurations, you must also grant the user Can Scan permissions in an
access group for the targets. If you do not, Tenable Vulnerability Management
excludes the targets from the scan results. For more information, see Access
Groups.
- 355 -
User Target Group
No Access (Default user only) Users assigned this permission cannot configure scans for
hosts in the user target group or use hosts in the user target group to filter
dashboards.
Can Use Users assigned this permission can use hosts in the user target groups to
filter dashboards and configure scans.
Note: To enable the user to use a target group in the Target Groups option for
scan configurations, you must also grant the user Can Scan permissions in an
access group for the targets. If you do not, Tenable Vulnerability Management
excludes the targets from the scan results. For more information, see Access
Groups.
Can Change In addition to using hosts in this user target group when configuring scans
and filtering dashboards, users assigned this permission can modify any
setting for the target group except permissions.
Info-level Reporting
Info-level Reporting is a scan setting available for Nessus Agent vulnerability scan templates. The
setting specifies how often the agent scan should report unchanged Info-severity vulnerability
findings.
Description
Info-severity findings can account for up to 90% of agent scan findings. Most Info-level findings do
not change from scan to scan and have minimal impact on your overall network exposure.
Configuring Info-level Reporting can help minimize your scan processing times by decreasing the
number of unchanged Info-severity findings that Tenable Vulnerability Management processes after
every agent scan.
After you configure an agent scan, the first execution of that scan always reports all detected
findings regardless of severity level. This is known as a baseline scan. Subsequent scans return all
vulnerability findings with a severity of Low or higher, and any new or changed Info-level findings.
Agents do not re-report existing, unchanged Info-level findings to Tenable Vulnerability
Management until a new baseline scan is performed.
- 356 -
When you view agent vulnerability scan results in the Tenable Vulnerability Management user
interface, baseline scans are indicated with the baseline icon ( ). For example:
Note: The baseline icon does not appear for triggered scans, regardless of whether or not the
scan was a baseline scan.
The baseline icon always appears for scans whose scan configurations do not have the Info-
level Reporting setting. This is because every execution of that scan includes all findings and is,
therefore, a baseline scan.
The baseline icon does not appear for scans whose configurations have the Info-level Reporting
setting, but were run before the Info-level Reporting feature was released.
Configuration
You can configure the agent scan to report all severity findings by launching a new baseline scan
after one of the following intervals:
l After number of scans — The agent scan reports all findings every x number of scans. You
choose from the following increments: 7, 10, 15, or 20 scans.
For example, if you set the value to the default of 10, the agent scan reports all findings in its
next scan and then reports all findings again during every 10th scan. All interim scans only
- 357 -
return findings with a severity of Low or higher, as well as any new or changed Info-level
findings.
l After number of days — The agent scan reports all findings after a set number of days after
the previous day on which the agent scan last reported all findings. You choose from the
following increments: 7, 10, 20, 30, 60, or 90 days.
For example, if you set the value to the default of 10, the agent scan reports all findings in its
next scan. For 10 days, all interim scans return all findings with a severity of Low or higher and
any new or changed Info-level findings. After the 10-day period passes, the agent scan reports
all findings again in its next scan.
You can only set triggered agent scans to After number of scans. You can set Scan Window
scans to either After number of scans or After number of days.
The default value for triggered agent scans is After 10 scans, and the default value for Scan
Window agent scans is After 10 days. Tenable recommends using the default values. Only
lower the value if doing so is necessary for your organization.
In addition to Info-level Reporting, you can enable Force refresh of all Info-severity vulnerabilities
on next scan to force the agent scan to report all findings in the next scan. After the next scan
completes and reports all findings, the Info-level Reporting setting determines how often the scan
reports Info-severity findings.
Note: All vulnerability findings with a severity of Low or higher and new or changed Info-severity
vulnerabilities are always reported after every scan.
l Only agents version 10.5.0 and later can use the Info-level Reporting setting. Any agents on
earlier versions always perform baseline scans.
l The Info-level Reporting setting is not supported when Tenable Vulnerability Management is
connected to Tenable Security Center.
l Agent scans with configured Compliance settings do not support the Info-level Reporting
setting. All agent scans with Compliance settings configured are baseline scans.
l If you recast an Info-level plugin to a higher severity level (for example, Low or Medium), the
plugin is still affected by Info-level Reporting and excluded from non-baseline scans if the
- 358 -
plugin output has not changed.
l Each individual agent calculates the After number of scans value separately. Therefore,
triggered scans can return a combination of baseline and non-baseline results.
l Plugins 19506 (Nessus Scan Information) and 42980 (SSL Certificate Expiry) are always
reported in full with every scan.
Note: If a scan is based on a user-defined template, you cannot configure Discovery settings in the scan.
You can only modify these settings in the related user-defined template.
The Discovery settings relate to discovery and port scanning, including port ranges and methods.
If you select the Custom preconfigured setting option, or if you are using a scanner template that
does not include preconfigured discovery settings, you can manually configure Discovery settings
in the following categories:
l Host Discovery
l Port Scanning
l Service Discovery
l Identity
Host Discovery
By default, some settings in the Host Discovery section are enabled. When you first access the
Host Discovery section, the Ping the remote host option appears and is set to On.
Default
Setting Description
Value
Ping the Remote On If set to On, the scanner pings remote hosts on multiple
Host ports to determine if they are alive. Additional options
General Settings and Ping Methods appear.
- 359 -
multiple ports during the scan.
Scan Unresponsive Disabled Specifies whether the Nessus scanner scans hosts that
Hosts do not respond to any ping methods. This option is only
available for scans using the PCI Quarterly External Scan
template.
General Settings
Use Fast Network Disabled When disabled, if a host responds to ping, Tenable
Discovery Vulnerability Management attempts to avoid false
positives, performing additional tests to verify the
response did not come from a proxy or load balancer.
These checks can take some time, especially if the
remote host is firewalled.
Ping Methods
ARP Enabled Ping a host using its hardware address via Address
Resolution Protocol (ARP). This only works on a local
network.
- 360 -
ICMP Enabled Ping a host using the Internet Control Message Protocol
(ICMP).
Assume ICMP Disabled Assume ICMP unreachable from the gateway means the
Unreachable From host is down. When a ping is sent to a host that is down,
the Gateway its gateway may return an ICMP unreachable message.
Means the Host is When this option is enabled, when the scanner receives
Down an ICMP Unreachable message, it considers the targeted
host dead. This approach helps speed up discovery on
some networks.
UDP Disabled Ping a host using the User Datagram Protocol (UDP). UDP
is a stateless protocol, meaning that communication is
not performed with handshake dialogues. UDP-based
communication is not always reliable, and because of
the nature of UDP services and screening devices, they
are not always remotely detectable.
Fragile Devices
Scan Network Disabled When enabled, the scanner scans network printers.
Printers
Scan Novell Disabled When enabled, the scanner scans Novell NetWare hosts.
Netware Hosts
Scan Operational Disabled When enabled, the scanner performs a full scan of
Technology Operational Technology (OT) devices such as
Devices programmable logic controllers (PLCs) and remote
- 361 -
terminal units (RTUs) that monitor environmental factors
and the activity and state of machinery.
Wake-on-LAN
For example:
33:24:4C:03:CC:C7
FF:5C:2C:71:57:79
Boot Time Wait (In 5 minutes The amount of time to wait for hosts to start before
Minutes) performing the scan.
Port Scanning
The Port Scanning section includes settings that define how the port scanner behaves and which
ports to scan.
Default
Setting Description
Value
Ports
Consider Disabled When enabled, if a port is not scanned with a selected port
Unscanned scanner (for example, the port falls outside of the specified
Ports as Closed range), the scanner considers it closed.
- 362 -
Default
Setting Description
Value
If scanning both TCP and UDP, you can specify a split range
specific to each protocol. For example, if you want to scan
a different range of ports for TCP and UDP in the same
policy, you would type T:1-1024,U:300-500.
SSH (netstat) Enabled When enabled, the scanner uses netstat to check for open
ports from the local machine. It relies on the netstat
command being available via an SSH connection to the
target. This scan is intended for Linux-based systems and
requires authentication credentials.
WMI (netstat) Enabled When enabled, the scanner uses netstat to determine open
- 363 -
Default
Setting Description
Value
Only Run Enabled If a local port enumerator runs, all network port scanners
Network Port will be disabled for that asset.
Scanners if
Local Port
Enumeration
Failed
Verify Open TCP Disabled When enabled, if a local port enumerator (for example, WMI
Ports Found By or netstat) finds a port, the scanner also verifies that the
Local Port port is open remotely. This approach helps determine if
Enumerators some form of access control is being used (for example,
TCP wrappers or a firewall).
- 364 -
Default
Setting Description
Value
TCP Disabled Use the built-in Tenable Nessus TCP scanner to identify
open TCP ports on the targets, using a full TCP three-way
handshake. If you enable this option, you can also set the
Override Automatic Firewall Detection option.
SYN Enabled Use the built-in Tenable Nessus SYN scanner to identify
open TCP ports on the target hosts. SYN scans do not
initiate a full TCP three-way handshake. The scanner sends
a SYN packet to the port, waits for SYN-ACK reply, and
determines the port state based on a response or lack of
response.
If you enable this option, you can also set the Override
Automatic Firewall Detection option.
Override Disabled This setting can be enabled if you enable either the TCP or
Automatic SYN option.
Firewall
When enabled, this setting overrides automatic firewall
Detection
detection.
- 365 -
Default
Setting Description
Value
UDP Disabled This option engages the built-in Tenable Nessus UDP
scanner to identify open UDP ports on the targets.
Service Discovery
The Service Discovery section includes settings that attempt to map each open port with the
service that is running on that port.
Default
Setting Description
Value
General Settings
Probe All Ports Enabled When enabled, the scanner attempts to map each open
to Find Services port with the service that is running on that port, as
defined by the Port scan range option.
Search for Known Specifies which ports on target hosts the scanner searches
SSL/TLS On SSL/TLS for SSL/TLS services.
- 366 -
Default
Setting Description
Value
Search for None Specifies which ports on target hosts the scanner searches
DTLS On for DTLS services.
l None
Enumerate All True When enabled, the scanner ignores the list of ciphers
SSL/TLS advertised by SSL/TLS services and enumerates them by
Ciphers attempting to establish connections using all possible
ciphers.
Enable CRL False When enabled, the scanner checks that none of the
Checking identified certificates have been revoked.
(Connects to
the Internet)
Identity
The Identity section allows you to enable or disable the collection of Active Directory data.
- 367 -
General Settings
- 368 -
l Ping hosts using:
o TCP
o ARP
o ICMP (2 retries)
- 369 -
o Scan common ports
o Use netstat if
credentials are provided
o Use SYN scanner if
necessary
- 370 -
o Always test the local
Nessus host
o Use fast network
discovery
- 371 -
o Use SYN scanner if
necessary
- 372 -
discovery
- 373 -
Custom All defaults
Legacy Web App Scan Port scan (common ports) l General Settings:
(default) o Always test the local
Nessus host
o Use fast network
discovery
- 374 -
necessary
Configuration Scans
Audit Cloud – –
Infrastructure
- 375 -
o Use fast network
discovery
Tactical Scans
- 376 -
where it is commonly
used
- 377 -
o Always test the local
Nessus host
- 378 -
Nessus host
- 379 -
Intel AMT Security Quick l General Settings:
Bypass o Ping the remote host
o Always test the local
Nessus host
- 380 -
o Detect SSL on all open
ports
- 381 -
Shadow Brokers Scan Normal (default) l General Settings:
o Ping the remote host
o Always test the local
Nessus host
- 382 -
Detection o Ping the remote host
o Always test the local
Nessus host
- 383 -
where it is commonly
used
Note: If a scan is based on a user-defined template, you cannot configure Assessment settings in the
scan. You can only modify these settings in the related user-defined template.
You can use Assessment settings to configure how a scan identifies vulnerabilities, as well as what
vulnerabilities are identified. This includes identifying malware, assessing the vulnerability of a
system to brute force attacks, and the susceptibility of web applications.
- 384 -
Certain Tenable-provided scanner templates include preconfigured assessment settings.
If you select the Custom preconfigured setting option, or if you are using a scanner template that
does not include preconfigured assessment settings, you can manually configure Assessment
settings in the following categories:
l General
l Brute Force
l SCADA
l Web Applications
l Windows
l Malware
l Databases
Note: The following tables include settings for the Advanced Network Scan template. Depending on the
template you select, certain settings may not be available, and default values may vary.
General
The General section includes the following groups of settings:
l Accuracy
l Antivirus
l SMTP
Accuracy
- 385 -
Management to not report any flaw whenever there is a hint
of uncertainty about the remote host. As a middle ground
between these two settings, disable this setting.
Perform Disabled Causes various plugins to work harder. For example, when
thorough looking through SMB file shares, a plugin analyzes 3
tests (may directory levels deep instead of 1. This could cause much
disrupt your more network traffic and analysis in some cases. By being
network or more thorough, the scan is more intrusive and is more likely
impact scan to disrupt the network, while potentially providing better
speed) audit results.
Antivirus
Antivirus 0 Configure the delay of the Antivirus software check for a set
definition number of days (0-7). The Antivirus Software Check menu
grace period allows you to direct Tenable Vulnerability Management to
(in days) allow for a specific grace time in reporting when antivirus
signatures are considered out of date. By default, Tenable
Vulnerability Management considers signatures out of date
regardless of how long ago an update became available (e.g.,
a few hours ago). You can configure this option to allow for
up to 7 days before reporting them out of date.
SMTP
Third party Tenable Vulnerability Management attempts to send spam through each SMTP
domain device to the address listed in this field. This third party domain address must
be outside the range of the site being scanned or the site performing the scan.
Otherwise, the test may be aborted by the SMTP server.
From The test messages sent to the SMTP server(s) appear as if the messages
address originated from the address specified in this field.
- 386 -
Brute Force
The Brute Force section includes the following groups of settings:
l General Settings
l Oracle Database
Default
Setting Description
Value
General Settings
Only use Enabled In some cases, Tenable Vulnerability Management can test
credentials default accounts and known default passwords. This can
provided by cause the account to be locked out if too many consecutive
the user invalid attempts trigger security protocols on the operating
system or application. By default, this setting is enabled to
prevent Tenable Vulnerability Management from performing
these tests.
Oracle Database
Test default Disabled Test for known default accounts in Oracle software.
accounts
(slow)
SCADA
Default
Setting Description
Value
Web Applications
The Web Applications section includes the following groups of settings:
- 387 -
l General Settings
l Web Crawler
Use a custom Mozilla/4.0 (compatible; MSIE Specifies which type of web browser
User-Agent 8.0; Windows NT 5.1; Tenable Vulnerability Management
Trident/4.0) impersonates while scanning.
Web Crawler
- 388 -
Setting Default Value Description
- 389 -
Setting Default Value Description
- 390 -
Setting Default Value Description
- 391 -
Setting Default Value Description
Do not stop Stop after one flaw is found This setting determines when a new flaw
after first flaw per web server (fastest) is targeted. This applies at the script level.
is found per Finding an XSS flaw does not disable
web page searching for SQL injection or header
injection, but unless otherwise specified,
there is at most one report for each type
on a given port. Note that several flaws of
the same type (for example, XSS or SQLi)
may be reported if they were caught by
the same attack.
- 392 -
Setting Default Value Description
- 393 -
Setting Default Value Description
Windows
The Windows section contains the following groups of settings:
l General Settings
Default
Setting Description
Value
General Settings
Request Enabled If enabled, domain users are queried instead of local users.
information
about the SMB
Domain
You can enable as many of the user enumeration methods as appropriate for user discovery.
- 394 -
ADSI Query Enabled Tenable Vulnerability Management enumerates users via
Active Directory Service Interfaces (ADSI). To use ADSI, you
must configure credentials under Credentials >
Miscellaneous > ADSI.
Start UID 1000 The beginning of a range of IDs where Tenable Vulnerability
Management attempts to enumerate domain users.
End UID 1200 The end of a range of IDs where Tenable Vulnerability
Management attempts to enumerate domain users.
Start UID 1000 The beginning of a range of IDs where Tenable Vulnerability
Management attempts to enumerate local users.
End UID 1200 The end of a range of IDs where Tenable Vulnerability
Management attempts to enumerate local users.
Malware
The Malware section contains the following groups of settings:
l General Settings
l Yara Rules
- 395 -
Default
Setting Description
Value
Custom Netstat IP None A text file that contains a list of known bad IP
Threat List addresses that you want to detect.
Provide your own list None A text file with one MD5 hash per line that specifies
of known bad MD5 additional known bad MD5 hashes.
hashes
Optionally, you can include a description for a hash by
adding a comma after the hash, followed by the
description. If any matches are found when scanning a
target, the description appears in the scan results. You
can also use hash-delimited comments (for example,
fop) in addition to comma-delimited comments.
Provide your own list None A text file with one MD5 hash per line that specifies
of known good MD5 additional known good MD5 hashes.
hashes
Optionally, you can include a description for each hash
by adding a comma after the hash, followed by the
description. If any matches are found when scanning a
target, and a description was provided for the hash,
the description appears in the scan results. You can
also use hash-delimited comments (for example, #) in
addition to comma-delimited comments.
- 396 -
Hosts file allow list None Tenable Vulnerability Management checks system
hosts files for signs of a compromise (for example,
Plugin ID 23910 titled Compromised Windows System
(hosts File Check)). This option allows you to upload a
file containing a list of IPs and hostnames you want
Tenable Vulnerability Management to ignore during a
scan. Include one IP and one hostname (formatted
identically to your hosts file on the target) per line in a
regular text file.
Yara Rules
Yara Rules None A .yar file containing the YARA rules to be applied in
the scan. You can only upload one file per scan, so
include all rules in a single file. For more information,
see yara.readthedocs.io.
Scan file system Disabled If enabled, Tenable Vulnerability Management can scan
system directories and files on host computers.
- 397 -
Scan User Profiles Disabled Enables file system scanning to scan user profiles.
Linux Directories
MacOS Directories
Databases
Default
Setting Description
Value
Oracle Database
Use Disabled When enabled, if at least one host credential and one
detected SIDs Oracle database credential are configured, the scanner
authenticates to scan targets using the host credentials,
and then attempts to detect Oracle System IDs (SIDs)
locally. The scanner then attempts to authenticate using
the specified Oracle database credentials and the
detected SIDs.
- 398 -
Preconfigured Assessment Settings
l Web Applications:
o Disable web application
scanning
l Web Applications:
o Start crawling from "/"
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
- 399 -
tests disabled
- 400 -
Scan for all web l General Settings:
vulnerabilities (quick) o Avoid potential false alarms
o Enable CGI scanning
l Web Applications:
o Start crawling from "/"
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
l Web Applications:
o Start crawling from "/"
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
- 401 -
app test for 10 minutes
(max)
o Try all HTTP methods
o Attempt HTTP Parameter
Pollution
Host Discovery – –
l Web Applications:
o Disable web application
scanning
l Web Applications:
o Start crawling from "/"
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
- 402 -
o Generic web application
tests disabled
l Web Applications:
o Start crawling from "/"
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
l Web Applications:
o Start crawling from "/"
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
- 403 -
used web applications
o Perform each generic web
app test for 10 minutes
(max)
o Try all HTTP methods
o Attempt HTTP Parameter
Pollution
l Web Applications:
o Start crawling from "/"
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
l Web Applications:
o Start crawling from "/"
- 404 -
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
l Web Applications:
o Start crawling from "/"
o Crawl 1000 pages (max)
o Traverse 6 directories (max)
- 405 -
Mobile Device Scan – –
PCI Quarterly – –
External Scan
Configuration
Scans
Audit Cloud – –
Infrastructure
Policy Compliance – –
Auditing
Tactical Scans
DROWN Detection – –
Shadow Brokers – –
Scan
Spectre and –
Meltdown
Detection – –
- 406 -
WannaCry – –
Ransomware
Detection
Note: If a scan is based on a user-defined template, you cannot configure Report settings in the scan. You
can only modify these settings in the related user-defined template.
l Processing
l Output
Default
Setting Description
Value
Processing
Override normal Disabled When disabled, provides the standard level of plugin
verbosity activity in the report. The output does not include the
informational plugins 56310, 64582, and 58651.
- 407 -
Default
Setting Description
Value
Hide results from Enabled When enabled, the list of dependencies is not included
plugins initiated as in the report. If you want to include the list of
a dependency dependencies in the report, disable this setting.
Output
Designate hosts by Disabled Uses the host name rather than IP address for report
their DNS name output.
Display hosts that Disabled Reports hosts that successfully respond to a ping.
respond to ping
Display Disabled When enabled, hosts that did not reply to the ping
unreachable hosts request are included in the security report as dead
hosts. Do not enable this option for large IP blocks.
Note: If a scan is based on a user-defined template, you cannot configure Advanced settings in the scan.
You can only modify these settings in the related user-defined template.
- 408 -
The Advanced settings provide increased control over scan efficiency and the operations of a scan,
as well as the ability to enable plugin debugging.
If you select the Custom preconfigured setting option, or if you are using a Nessus Scanner
template that does not include preconfigured advanced settings, you can manually configure
Advanced settings in the following categories:
l General Settings
l Performance Options
l Debug Settings
Note: The following tables include settings for the Advanced Network Scan template. Depending on the
template you select, certain settings may not be available, and default values may vary.
Default
Setting Description
Value
General Settings
Enable Safe Enabled When enabled, disables all plugins that may have an
Checks adverse effect on the remote host.
Scan for Disabled Determines whether the scan searches for unpatched
unpatched vulnerabilities. This includes CVEs marked as "Will Not
vulnerabilities (no Fix" by the related vendor.
patches or
Enabling this setting may increase your overall findings
mitigations
count; each platform and package combination results in
available)
an individual plugin. If additional CVEs are found to affect
a platform and package combination, the CVEs are added
- 409 -
Default
Setting Description
Value
- 410 -
Default
Setting Description
Value
Scan targets with Disabled When disabled, to avoid overwhelming a host, Tenable
multiple domain Vulnerability Management prevents a single scanner from
names in parallel simultaneously scanning multiple targets that resolve to a
single IP address. Instead, Tenable Vulnerability
Management scanners serialize attempts to scan the IP
address, whether it appears more than once in the same
scan task or in multiple scan tasks on that scanner. Scans
may take longer to complete.
Create unique Enabled When enabled, the scanner creates a unique identifier
identifier on (Tenable UUID) . Tenable Vulnerability Management and
hosts scanned Tenable Security Center use the Tenable UUID to merge
using credentials incoming scan data with historical results for the asset
and ensure that license counts are accurately reflected.
- 411 -
Default
Setting Description
Value
Performance Options
Slow down the Disabled When enabled, Tenable detects when it is sending too
scan when many packets and the network pipe is approaching
network capacity. If network congestion is detected, throttles the
congestion is scan to accommodate and alleviate the congestion. Once
detected the congestion has subsided, Tenable automatically
attempts to use the available space within the network
pipe again.
Use Linux kernel Disabled When enabled, Tenable Vulnerability Management uses
congestion the Linux kernel to detect when it sends too many
detection packets and the network pipe approaches capacity. If
detected, Tenable Vulnerability Management throttles the
scan to accommodate and alleviate the congestion. Once
the congestion subsides, Tenable Vulnerability
Management automatically attempts to use the available
space within the network pipe again.
- 412 -
Default
Setting Description
Value
Network timeout 5 Specifies the time that Tenable waits for a response from
(in seconds) a host unless otherwise specified within a plugin. If you
are scanning over a slow connection, you may want to set
this to a higher number of seconds.
- 413 -
Default
Setting Description
Value
Exclude Filepath None A plain text file containing a list of filepaths to exclude
from all plugins that search using the find command on
Unix systems.
Include Filepath None A plain text file containing a list of filepaths to include
- 414 -
Default
Setting Description
Value
Windows Exclude None A plain text file containing a list of filepaths to exclude
Filepath from any search on Windows systems.
Windows Include None A plain text file containing a list of filepaths to include in
Filepath any use of Recursive search on Windows systems.
Debug Settings
Enable plugin Disabled Attaches available debug logs from plugins to the
- 415 -
Default
Setting Description
Value
Maximum delay 0 (Agents 8.2 and later) If set, each agent in the agent
(minutes) group delays starting the scan for a random number of
minutes, up to the specified maximum. Staggered starts
can reduce the impact of agents that use a shared
resource, such as virtual machine CPU.
Maximum 128,000 KB Controls the maximum output length for each individual
Compliance compliance check value that the target returns. If a
Output Length in compliance check value that is greater than this setting's
KB value, Tenable Vulnerability Management truncates the
result.
- 416 -
Default
Setting Description
Value
- 417 -
Vulnerability Scans (Common)
l Performance options:
o 30 simultaneous hosts (max)
o 4 simultaneous checks per host
(max)
o 5 second network read timeout
- 418 -
o Create unique identifier on
hosts scanned using credentials
Host Discovery – –
- 419 -
o 4 simultaneous checks per host
(max)
o 5 second network read timeout
- 420 -
bandwidth links o 2 simultaneous hosts (max)
o 2 simultaneous checks per host
(max)
o 15 second network read timeout
o Slow down the scan when
network congestion is detected
- 421 -
o Create unique identifier on
hosts scanned using credentials
Configuration Scans
- 422 -
l Asset identification options:
o Create unique identifier on
hosts scanned using credentials
Tactical Scans
- 423 -
Bash Shellshock – All defaults
Detection
- 424 -
Detection
Credentialed scans can perform any operation that a local user can perform. The level of scanning
depends on the privileges granted to the user account. The more privileges the scanner has via the
login account (for example, root or administrator access), the more thorough the scan results.
In Tenable Vulnerability Management, you can create credentials for use in scans in the following
ways:
- 425 -
recommends adding managed credentials to scans,
instead of adding credentials to user-defined
templates.
The settings you configure for a credential vary based on the credential type. Credential types
include:
l Cloud Services
l Database
l Host
l Miscellaneous
- 426 -
l Patch Management
l Plaintext authentication
Note: Tenable Vulnerability Management opens several concurrent authenticated connections. Ensure that
the host being audited does not have a strict account lockout policy based on concurrent sessions.
Note: By default, when creating credentialed scans or user-defined templates, hosts are
identified and marked with a Tenable Asset Identifier (TAI). This globally unique identifier is
written to the host's registry or file system, and subsequent scans can retrieve and use the TAI.
This option is enabled (by default) or disabled in the Advanced -> General Settings of a scan
configuration or template: Create unique identifier on hosts scanned using credentials.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
In the event that a scan contains multiple instances of a single type of credential (SSH logins, SMB
logins, etc.), Tenable Vulnerability Management attempts to use them on a valid target in the order
that they were added to the scan configuration.
Note: The first credential that allows successful login is used to perform credentialed checks on the
target. After a credential provides successful login, Tenable Vulnerability Management does not try any of
the other credentials in the list, even if one of the latter credentials has a greater degree of access or
privileges.
- 427 -
To add a credential to a scan:
The Credentials page appears. This page contains a table of credentials configured for the
scan.
a. (Optional) Search for a managed credential in the list by typing your search criteria in the
text box and clicking the button.
b. In the Managed Credentials section, click the button to display all managed
credentials.
d. To close the Select Credential Type plane, click the button in the upper-right corner
of the plane.
- 428 -
Add a new managed credential.
a. In any section of the Select Credential Type plane except the Managed Credentials
section, click the button to display the credentials for that type.
e. In the first text box, type a name for the managed credential.
f. (Optional) In the second text box, type a brief description of the managed credential.
Tenable Vulnerability Management closes the settings plane and adds the credential to the
credentials table for the scan.
Note: Upon saving, Tenable Vulnerability Management automatically orders the credentials by
ascending ID and groups the credentials by type.
l If you want to save and launch the scan immediately, click Save & Launch.
Note: If you scheduled the scan to run at a later time, the Save & Launch option is not
available.
- 429 -
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
1. Edit a scan.
6. (Managed credentials only) Click Yes to save the changes to the managed credential.
- 430 -
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
l You cannot use managed credentials in user-defined templates. To use a single set of
credentials for multiple scans, add managed credentials to scans, instead of adding
credentials to user-defined templates.
Note: In scan configurations, the Scan-wide Credential Type settings are located in individual credentials.
In user-defined templates, these settings are located in the Authentication section of the Basic settings
for the template.
The Credentials page appears. This page contains a table of credentials configured for the
template.
Tenable Vulnerability Management closes the settings plane and adds the credential to the
credentials table for the template.
- 431 -
7. Click Save to save your template changes.
Tenable Vulnerability Management adds the credential to the credentials table for the
template.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
A scan-specific credential can only be used in a single scan. To reuse a scan-specific credential in
multiple scans, convert it to a managed credential.
- 432 -
1. In the upper-left corner, click the button.
2. In the left navigation plane, in the Vulnerability Management section, click Scans.
3. In the Folders section, click a folder to load the scans you want to view.
The scans table updates to display the scans in the folder you selected.
7. In the credentials table, click the scan-specific credential you want to convert.
9. In the first text box, type a name for the managed credential.
10. (Optional) In the second text box, type a brief description of the managed credential.
Tenable Vulnerability Management closes the settings plane and adds the credential to the
credentials table for the scan.
Cloud Services
- 433 -
Tenable Vulnerability Management can authenticate a scan using accounts in the cloud services
listed below.
Note: Some credential types may not be available for configuration, depending on the scan template you
selected.
AWS
Default
Option Description Required
Value
l us-east-1
l us-east-2
- 434 -
l us-west-1
l us-west-2
l ca-central-1
l eu-west-1
l eu-west-2
l eu-central-1
l ap-northeast-1
l ap-northeast-2
l ap-southeast-1
l ap-southeast-2
l sa-east-1
l cn-north-1
l cn-northwest-1
Microsoft Azure
Default
Option Description Required
Value
- 435 -
Password – Password associated with the username. yes
Rackspace