Tenable Vulnerability Management-User Guide
Tenable Vulnerability Management-User Guide
User Guide
Last Revised: September 17, 2025
Copyright © 2025 Tenable, Inc. All rights reserved. Tenable, Tenable Nessus, Tenable Lumin, Assure, and the Tenable logo are registered trademarks of Tenable, Inc. or its affiliates. All other
products or services are trademarks of their respective owners.
Table of Contents
System Requirements 42
CVSS 45
CVSS-Based Severity 45
Vulnerability Mitigation 50
Vulnerability States 51
My Account 60
-2-
Update Your Account 65
Breadcrumbs 72
Planes 73
Tables 74
Use Tables 74
Right-Click Menu 75
Filter a Table 76
Explore Tables 79
Use Filters 79
Query Builder 87
Saved Queries 89
Manage Queries 91
Error Messages 96
Dashboards 110
-3-
Tenable Web App Scanning Dashboard 120
-4-
Manage Dashboard Exports 147
Scans 173
-5-
View Scan Vulnerability Details 190
-6-
Shared Collections 234
Description 304
Configuration 305
-7-
Add a Credential to a Scan 380
Cassandra 390
DB2 392
MongoDB 392
MySQL 393
Oracle 394
PostgreSQL 395
Password 398
Import 399
BeyondTrust 400
CyberArk 401
Delinea 406
-8-
Delinea Auto Discovery 407
Lieberman 411
QiAnXin 414
Senhasegura 415
Host 416
Miscellaneous 489
Mobile 497
HTTP Server Authentication Settings in Tenable Web App Scanning Scans 554
-9-
Client Certificate Authentication 558
Overview 562
Introduction 567
- 10 -
Scanning during Maintenance Windows 572
Sources 592
CVEs 597
My Findings 599
Plugins 601
- 11 -
Exposure Response 609
My Findings 620
Plugins 623
Explore 638
Assets 639
- 12 -
Asset Types 649
Findings 685
Assets 786
- 13 -
Use the Assets Workbench 787
Findings 847
Vulnerabilities 849
- 14 -
Host Audits 854
Solutions 913
Reports 920
- 15 -
Schedule a Report 934
Exports 943
Remediation 968
- 16 -
Create a New Remediation Project From Findings 975
Settings 1011
SAML 1019
- 17 -
Edit a SAML Configuration 1027
Users 1046
- 18 -
Edit a User Group 1071
Permissions 1078
Roles 1094
- 19 -
Access Group Types 1129
Language 1148
Exports 1149
- 20 -
Export your Export Activity 1168
Tags 1184
- 21 -
Export Tags 1222
Sensors 1231
Agents 1231
- 22 -
Delete a Freeze Window 1275
Networks 1308
- 23 -
Add an Agent to a Network 1314
- 24 -
OT Connectors 1352
Credentials 1380
Exclusions 1391
- 25 -
Delete an Exclusion 1398
Connectors 1402
- 26 -
Add Principal to Service Account in GCP 1452
Create a GCP Workload Identity Pool and Download the Configuration File 1453
- 27 -
Web App Scanning Asset Properties 1539
- 28 -
Export Recommended Actions 1678
- 29 -
Welcome to Tenable Vulnerability Management
Tenable Vulnerability Management® (formerly known as Tenable.io) allows security and audit
teams to share multiple Tenable Nessus, Tenable Agent, and Tenable Network Monitor scanners,
scan schedules, scan policies, and scan results among an unlimited set of users or groups.
Note: Tenable Vulnerability Management can be purchased alone or as part of the Tenable One package.
For more information, see Tenable One.
For additional information on Tenable Vulnerability Management, review the following customer
education course:
The platform combines the broadest vulnerability coverage spanning IT assets, cloud resources,
containers, web apps, and identity systems, builds on the speed and breadth of vulnerability
coverage from Tenable Research, and adds comprehensive analytics to prioritize actions and
communicate cyber risk. Tenable One allows organizations to:
Tip: For additional information on getting started with Tenable One products, check out the Tenable One
Deployment Guide.
- 30 -
This topic explains how to plan a Tenable Vulnerability Management deployment. It includes high-
level guidance to build a deployment plan, configure scanners and application settings, start
analyzing vulnerability data, and—when ready—expand into Tenable One.
1. Contact your Tenable representative and get your product access information and account
credentials.
- 31 -
l If you want to assess your exposure, obtain a Tenable Lumin license.
l If you want to scan web applications, obtain a Tenable Web App Scanning license.
l If you want to evaluate risk on your containers, obtain a Tenable Container Security
license.
4. Choose a scanning plan, including the scans to run, consulting the Professional Services Scan
Strategy guide if needed.
5. Design an analysis workflow, identifying key stakeholders and considering what data you
intend to share.
l Install Tenable Agents as described in the Tenable Agent Deployment and User Guide.
l Install Tenable Network Monitor and then configure your installation as described in in
the Tenable Agent Deployment and User Guide.
l Install Tenable Core and Tenable Web App Scanning as described in the Tenable Core
User Guide.
3. Configure your first active scan using the Basic Network Scan template:
b. Create a scan using the Basic Network Scan template, as described in Create a Scan.
4. Configure your first agent scan using the Basic Agent Scan template:
b. Create an agent scan using the Basic Agent Scan template, as described in Create a
Scan.
5. Launch your first Tenable Nessus scan and agent scan, as described in Launch a Scan.
- 32 -
6. Confirm that scans completed, accessing all targeted areas of your network. Review
discovered assets.
2. Create user groups to control user permissions for the resources in Tenable Vulnerability
Management.
a. Launch your credentialed Tenable Nessus scan and credentialed agent scan, as
described in Launch a Scan.
b. Confirm your credentialed scan completed, accessing all targeted areas of your network.
2. View scanned assets and vulnerabilities on the Findings and Assets workbenches.
3. With Vulnerability Intelligence, view known vulnerabilities by category and compare them to
your own exposure.
- 33 -
5. With reports, share scan and vulnerability information with your organization.
Integrate Tenable Vulnerability Management with Tenable One and leverage the following features:
l Access the Exposure View page, where you can gain critical business context by getting
business-aligned cyber exposure score for critical business services, processes and functions,
and track delivery against SLAs. Track overall VM risk to understand the risk contribution of
assets to your overall Cyber Exposure Score, including by asset class, vendor, or by tags.
o View and manage cyber exposure cards.
o View CES and CES trend data for the Global and Vulnerability Management exposure
cards.
o View Remediation Service Level Agreement (SLA) data.
o View Tag Performance data.
l Access the Exposure Signals page, where you can generate exposure signals that use
queries to search for asset violations. Simply put, if an asset is impacted by a weakness
related to the query, then the asset is considered a violation. Using this, you can gain visibility
into your most critical risk scenarios.
l Find top active threats in your environment with up-to-date feeds from Tenable
Research.
l View, generate, and interact with the data from queries and their impacted asset
violations.
l Access the Inventory page, where you can enhance asset intelligence by accessing deeper
asset insights, including related attack paths, tags, exposure cards, users, relationships, and
- 34 -
more. Improve risk scoring by gaining a more complete view of asset exposure, with an asset
exposure score that assesses total asset risk and asset criticality.
o View and interact with the data on the Assets tab:
n Review your AD assets to understand the strategic nature of the interface. This
should help set your expectations on what features to use within Tenable Exposure
Management, and when.
n Familiarize yourself with the Global Asset Search and its objects and properties.
Bookmark custom queries for later use.
n Find devices, user accounts, software, cloud assets, SaaS applications, networks,
and their weaknesses.
n Drill down into the Asset Details page to view asset properties and all associated
context views.
o View and interact with the data on the Weaknesses tab:
n View key context on vulnerability and misconfiguration weaknesses to make the
most impactful remediation decisions.
o View and interact with the data on the Software tab:
n Gain full visibility of the software deployed across your business and better
understand the associated risks.
n Identify what software may be out of date, and which pieces of software may soon
be End of Life (EoL).
o View and interact with the data on the Findings tab:
n View instances of weaknesses (vulnerabilities or misconfigurations) appearing on
an asset, identified uniquely by plugin ID, port, and protocol.
n Review insights into those findings, including descriptions, assets affected,
criticality, and more to identify potential security risks, visibility on under-utilized
resources, and support compliance efforts.
- 35 -
l Access the Attack Path page, where you can optimize risk prioritization by exposing risky
attack paths that traverse the attack surface, including web apps, IT, OT, IoT, identities, ASM,
and prevent material impact. Streamline mitigation by identifying choke points to disrupt attack
paths with mitigation guidance, and gain deep expertise with AI insights (Not supported in
FedRAMP environments).
o View the Dashboard tab for a high-level view of your vulnerable assets such as the
number of attack paths leading to these critical assets, the number of open attack
techniques and their severity, a matrix to view paths with different source node exposure
score and ACR target value combinations, and a list of trending attack paths.
n Review the Top Attack Path Matrix and click the Top Attack Paths tile to view
more information about paths leading to your “Crown Jewels”, or assets with an
ACR of 7 or above.
You can adjust these if needed to ensure you’re viewing the most critical attack path
data.
o On the Top Attack Techniques tab, view all attack techniques that exist in one or more
attack paths that lead to one or more critical assets by pairing your data with advanced
graph analytics and the MITRE ATT&CK® Framework to create attack techniques,
which allow you to understand and act on the unknowns that enable and amplify threat
impact on your assets and information.
o On the Top Attack Paths tab, generate attack path queries to view your assets as part of
potential attack paths:
n Generate an Attack Path with a Built-in Query
n Generate an Attack Path Query with the Attack Path Query Builder
n Generate an Asset Query with the Asset Query Builder
Then, you can view and interact with the Attack Path Query and Asset Query data via the
query result list and the interactive graph.
o Interact with the MITRE ATT&CK Heatmap tab.
- 36 -
o Create and manage tags to highlight or combine different asset classes.
o View the Tag Details page to gain further insight into the tags associated with your
assets.
When your environment expands, so does your asset count, so you purchase more licenses to
account for the change. Tenable licenses use progressive pricing, so the more you purchase, the
lower the per-unit price. For prices, contact your Tenable representative.
Tip: To view your current license count and available assets, in the Tenable top navigation bar, click
and then click License Information. To learn more, see License Information Page.
Note: Tenable offers simplified pricing to managed security service providers (MSSPs). To learn more,
contact your Tenable representative.
Tenable Vulnerability Management uses a complex algorithm to identify new assets without creating
duplicates. The algorithm looks at the asset’s BIOS UUID, MAC address, NetBIOS name, fully
- 37 -
qualified domain name (FQDN), and more. Authenticated scanners or agents also assign a Tenable
UUID to each asset to mark it as unique. For more information, see the Tenable Vulnerability
Management FAQ.
The following table describes when assets count towards your license.
- 38 -
l Access to the Tenable Vulnerability Management
API.
Reclaiming Licenses
When you purchase licenses, your total license count is static for the length of your contract unless
you purchase more licenses. However, Tenable Vulnerability Management reclaims licenses under
some conditions—and then reassigns them to new assets so that you do not run out of licenses.
The following table explains how Tenable Vulnerability Management reclaims licenses.
Deleted Tenable Vulnerability Management removes deleted assets from the Assets
assets workbench and reclaims their licenses within 24 hours.
Aged out In Settings > Sensors > Networks, if you enable Asset Age Out, Tenable
assets Vulnerability Management reclaims assets after they have not been scanned
for a period you specify.
Assets from Tenable Vulnerability Management reclaims assets from connectors the day
connectors after they are terminated. You can observe this event in each connector.
All other Tenable Vulnerability Management reclaims all other assets—such as those
assets imported from other products or assets with no age-out setting—after they
have not been scanned for 90 days.
Scenario Result
You scan more assets than are A message appears in Tenable Vulnerability
licensed for three consecutive days. Management.
You scan more assets than are A message and warning about reduced functionality
- 39 -
licensed for 15+ days. appears in Tenable Vulnerability Management.
You scan more assets than are A message appears in Tenable Vulnerability
licensed for 30+ days. Management; scan and export features are disabled.
Tip: Improper scan hygiene or product misconfigurations can cause scan overages, which result in inflated
asset counts. To learn more, see Scan Best Practices.
Expired Licenses
The Tenable Vulnerability Management licenses you purchase are valid for the length of your
contract. 30 days before your license expires, a warning appears in the user interface. During this
renewal period, work with your Tenable representative to add or remove products or change your
license count.
After your license expires, you can no longer sign in to the Tenable platform.
Note: Plugin IDs are static, but Tenable products may sometimes update plugin names. For the latest
information on plugins, see Tenable Plugins.
- 40 -
34220 Netstat Portscanner (WMI)
11936 OS Identification
- 41 -
0 Open Ports
19 VLAN ID Detection
System Requirements
Display Settings
Minimum screen resolution: 1440 x 1024
Supported Browsers
Tenable Vulnerability Management supports the latest versions of the following browsers.
Note: Before reporting issues with Tenable Vulnerability Management, ensure your browser is up to date.
l Google Chrome
l Apple Safari
l Mozilla Firefox
l Microsoft Edge
- 42 -
l 162.159.129.83/32
l 162.159.130.83/32
l 162.159.140.26/32
l 172.66.0.26/32
l 2606:4700:7::1a
l 2a06:98c1:58::1a
l 2606:4700:7::a29f:8153
l 2606:4700:7::a29f:8253
l *.cloud.tenable.com with the wildcard character (*) to allow cloud.tenable.com and all
subdomains, such as sensor.cloud.tenable.com
Tip: For information about the port requirements for Tenable Security Center, Tenable Nessus
scanners, and Tenable Agents, see the following topics:
l Tenable Security Center Port Requirements
l Tenable Nessus Port Requirements
l Tenable Agent Port Requirements
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
Note: If you bookmark a Tenable Vulnerability Management page within your browser, you must still log in
before accessing the bookmarked page.
In some cases, you may also need to navigate through the Workspace page and navigate to the Tenable
Vulnerability Management application before accessing the bookmarked page.
- 43 -
l Obtain credentials for your Tenable Vulnerability Management user account.
Note: If you are an administrator logging in to your Tenable Vulnerability Management instance for
the first time, Tenable provides your first-time credentials during setup. After you log in for the first
time, you can set your new password. If you are logging in to Tenable Vulnerability Management
after initial setup, your username is the email address you used to register for your Tenable
Vulnerability Management account.
l Review the System Requirements in the General Requirements User Guide and confirm that
your computer and browser meet the requirements.
Note: If your account is configured to use SAML, you can log in to Tenable Vulnerability Management
directly through your SAML provider. For more information, see SAML.
3. In the password box, type the Tenable Vulnerability Management password you created
during registration.
4. (Optional) To retain your username for later sessions, select the Remember Me check box.
Note:Tenable Vulnerability Management logs you out after a period of inactivity (typically, 30
minutes).
Note: When you view these metrics on an analysis page organized by plugin (for example, the
Vulnerabilities by Plugin page), the metrics represent the highest value assigned or calculated
- 44 -
for a vulnerability associated with the plugin.
For Tenable Lumin-specific information about VPR and the other Tenable Lumin metrics, see
Tenable Lumin Metrics.
CVSS
Tenable uses and displays third-party Common Vulnerability Scoring System (CVSS) values
retrieved from the National Vulnerability Database (NVD) to describe risk associated with
vulnerabilities. CVSS scores power a vulnerability's Severity and Risk Factor values.
Note: If a vulnerability's related plugin has CVSS vectors, the Risk Factor is calculated based on the
CVSSv2 vector and equates to the CVSSv2 score Severity. If a plugin does not have CVSS vectors,
Tenable independently calculates the Risk Factor.
Tenable Vulnerability Management imports a CVSS score every time a scan sees a vulnerability.
CVSS-Based Severity
Tenable assigns all vulnerabilities a severity (Info, Low, Medium, High, or Critical) based on the
vulnerability's static CVSS score (the CVSS version depends on your configuration). For more
information, see Configure Your Severity Metric.
Critical The plugin's highest The plugin's highest The plugin's highest
vulnerability CVSSv2 vulnerability CVSSv3 vulnerability CVSSv4
score is 10.0. score is between 9.0 score is between 9.0
and 10.0. and 10.0.
High The plugin's highest The plugin's highest The plugin's highest
vulnerability CVSSv2 vulnerability CVSSv3 vulnerability CVSSv4
score is between 7.0 score is between 7.0 score is between 7.0
and 9.9. and 8.9. and 8.9.
Medium The plugin's highest The plugin's highest The plugin's highest
- 45 -
vulnerability CVSSv2 vulnerability CVSSv3 vulnerability CVSSv4
score is between 4.0 score is between 4.0 score is between 4.0
and 6.9. and 6.9. and 6.9.
Low The plugin's highest The plugin's highest The plugin's highest
vulnerability CVSSv2 vulnerability CVSSv3 vulnerability CVSSv4
score is between 0.1 score is between 0.1 score is between 0.1
and 3.9. and 3.9. and 3.9.
Info The plugin's highest The plugin's highest The plugin's highest
vulnerability CVSSv2 vulnerability CVSSv3 vulnerability CVSSv3
score is 0. score is 0. score is 0.
- or - - or - - or -
The plugin does not The plugin does not The plugin does not
search for search for search for
vulnerabilities. vulnerabilities. vulnerabilities.
For each plugin, Tenable interprets CVSS scores for the vulnerabilities associated with the plugin
and assigns an overall risk factor (Low, Medium, High, or Critical) to the plugin. The Vulnerability
Details page shows the highest risk factor value for all the plugins associated with a vulnerability.
Note: Detection (non-vulnerability) plugins and some automated vulnerability plugins do not receive CVSS
scores. In these cases, Tenable determines the risk factor based on vendor advisories.
Tip: Info plugins receive a risk factor of None. Other plugins without associated CVSS scores receive a
custom risk factor based on information provided in related security advisories.
Tenable calculates a dynamic VPR for most vulnerabilities. The VPR is a dynamic companion to the
data provided by the vulnerability's CVSS score, since Tenable updates the VPR to reflect the
current threat landscape. VPR values range from 0.1-10.0, with a higher value representing a higher
- 46 -
likelihood of exploit.
Note: Vulnerabilities without CVEs (for example, many vulnerabilities with the Info severity) do not receive
a VPR. Tenable recommends remediating these vulnerabilities according to their CVSS-based severity.
Tenable Vulnerability Management provides a VPR value the first time you scan a vulnerability on
your network. Then, Tenable Vulnerability Management automatically provides new and updated
VPR values daily.
Tenable recommends resolving vulnerabilities with the highest VPRs first. You can view VPR scores
and summary data in:
Some key drivers that you can view to explain a vulnerability's VPR include, but are not limited to:
Note:Tenable does not customize these values for your organization; VPR key drivers reflect a
vulnerability's global threat landscape.
Age of Vuln The number of days since the National Vulnerability Database (NVD)
published the vulnerability.
- 47 -
CVSSv3 The NVD-provided CVSSv3 impact score for the vulnerability. If the NVD did
Impact Score not provide a score, Tenable Vulnerability Management displays a Tenable-
predicted score.
Exploit Code The relative maturity of a possible exploit for the vulnerability based on the
Maturity existence, sophistication, and prevalence of exploit intelligence from internal
and external sources (e.g., Reversinglabs, Exploit-db, Metasploit, etc.). The
possible values (High, Functional, PoC, or Unproven) parallel the CVSS
Exploit Code Maturity categories.
Product The relative number of unique products affected by the vulnerability: Low,
Coverage Medium, High, or Very High.
Threat A list of all sources (e.g., social media channels, the dark web, etc.) where
Sources threat events related to this vulnerability occurred. If the system did not
observe a related threat event in the past 28 days, the system displays No
recorded events.
Threat The relative intensity based on the number and frequency of recently
Intensity observed threat events related to this vulnerability: Very Low, Low, Medium,
High, or Very High.
Threat The number of days (0-180) since a threat event occurred for the vulnerability.
Recency
- 48 -
l A discussion of the vulnerability on hacker forums
The Tenable Vulnerability Management interface uses different icons for each severity category and
accepted or recasted status.
- 49 -
Vulnerability Mitigation
Tenable Vulnerability Management vulnerabilities exist in one of two categories: Active or Fixed.
When Tenable Vulnerability Management discovers a vulnerability on an asset, the vulnerability
remains in the Active category until it is mitigated or fixed. Then, the vulnerability moves to the Fixed
category.
Active Vulnerabilities
Active vulnerabilities are any vulnerabilities in the New, Active, or Resurfaced states. For more
information, see Vulnerability States.
Fixed Vulnerabilities
The Fixed category contains vulnerabilities that Tenable Vulnerability Management determines are
not vulnerable, based on the scan definition, the results of the scan, and authentication information.
To be considered for mitigation, a vulnerability must be active and successfully authenticated.
l The vulnerability's port is on the list of scanned port ranges, and the remote port is found open.
l A vulnerability with that combination of IP address, port, protocol, and plugin ID is not listed in
the scan results.
Mitigation Exceptions
Note the following exceptions for vulnerability mitigation:
l Vulnerabilities identified during a thorough scan by a plugin with the thorough_tests attribute
can only be mitigated by another thorough scan.
- 50 -
l Vulnerabilities discovered by a local or combined plugin reported on port 0 or 445 via a
credential scan can only be mitigated by another credential scan.
l The list of scanned ports can be expanded to “all” ports when one of the following plugins
triggered the host:14272 (SSH netstat), 34220 (WMI netstat), 14274 (SNMP).
l Agent scans cannot mitigate vulnerabilities discovered by a combined type plugin reported on
a remote port (not 0/445).
Vulnerability States
Tenable assigns a state to vulnerabilities detected on your network. You can track and filter by
vulnerability state to see the detection, resolution, and reappearance of vulnerabilities over time. To
filter for vulnerabilities by their state, use the Findings workbench.
Vulnerability
Description
State
Note: To view Fixed vulnerabilities by date range, use the Last Fixed filter.
- 51 -
Note: The API uses different terms for vulnerability states than the user interface. In the API, the new and
active states are both labeled as open. The resurfaced state is labeled as reopened. The fixed state is the
same.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
The quick actions menu displays a list of the most commonly performed actions.
- 52 -
To access the quick actions menu:
Resource Center
The Resource Center displays a list of informational resources including product announcements,
Tenable blog posts, and user guide documentation.
- 53 -
2. Click a resource link to navigate to that resource.
Notifications
In Tenable Vulnerability Management, the Notifications panel displays a list of system notifications.
The button shows the current number of unseen notifications. When you open the Notifications
panel, Tenable Vulnerability Management marks those notifications as seen. Once you have seen a
notification, you can clear it to remove it from the Notifications panel.
To view notifications:
- 54 -
l In the upper-right corner, click the button.
o To expand a group of notifications, at the bottom of the grouped notification, click More
Notifications.
o To collapse an expanded group of notifications, at the top of the expanded notifications,
click Show Less.
o To clear an expanded group of notifications, at the top of the expanded notifications, click
Clear Group.
o To clear all notifications, at the bottom of the panel, click Clear All.
Settings
Click the button to navigate directly to the Settings page, where you can configure your system
settings.
Note: For more information, see Settings within the Tenable Vulnerability Management User Guide.
Workspace
When you log in to Tenable, the Workspace page appears by default. On the Workspace page, you
can switch between your Tenable applications or set a default application to skip the Workspace
page in the future. You can also switch between your applications from the Workspace menu, which
appears in the top navigation bar.
Important: Tenable disables application tiles for expired applications. Tenable removes expired application
tiles from the Workspace page and menu 30 days after expiration.
- 55 -
1. From any Tenable application, in the upper-right corner, click the button.
1. From any Tenable application, in the upper-right corner, click the button.
- 56 -
The Workspace page appears.
l Where applicable, at the bottom of a tile, view the percentage of your license utilization for the
application. Click See More to navigate directly to the License Information page for the
selected application.
Tip: For more information on how Tenable licenses work and how assets or resources are licensed in
each product, see Licensing Tenable Products.
l
Set a default application:
- 57 -
When you log in to Tenable, the Workspace page appears by default. However, you can set a
default application to skip the Workspace page in the future.
By default, users with the Administrator, Scan Manager, Scan Operator, Standard, and Basic roles
can set a default application. If you have another role, contact your administrator and request the
Manage permission under My Account. For more information, see Custom Roles.
A menu appears.
l
Remove a Default Application:
A menu appears.
l
Request Access to a Tenable application:
Some applications, like Tenable Identity Exposure, require you to request access to the
application. You can do this directly via the Workspace page.
- 58 -
1. In the lower-right corner of the tile, click Request.
You navigate directly to the request page for the selected application.
The user account menu provides several quick actions for your user account.
- 59 -
2. Do one of the following:
l Click My Profile to configure your own user account. You navigate directly to the My
Account settings page. See My Account for more information.
l Click What's new to navigate directly to the Tenable Vulnerability Management Release
Notes.
For additional information about navigating the Tenable Vulnerability Management interface, see the
following topics:
My Account
Breadcrumbs
Planes
Tables
Query Builder
Saved Queries
My Account
From the My Account page, you can make changes to your own user account.
- 60 -
To access the My Account page:
- 61 -
2. Click My Profile.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
On the My Account page, you can view details about your account, including your log in
details, user role, and the groups and permissions assigned to you.
- 62 -
1. Access the My Account page.
2. On the left side of the page, you can select from the following:
Option Action
- 63 -
l (Optional) Update your basic account information, including
name and email address.
- 64 -
o The objects each permission applies to.
Caution: Any existing API keys are replaced when you click the
Generate button. You must update the applications where the
previous API keys were used.
Caution: Be sure to copy the access and secret keys before you
close the API Keys tab. After you close this tab, you cannot retrieve
the keys from Tenable Vulnerability Management.
Note: User accounts expire according to when the Tenable Vulnerability Management container they
belong to was created. Tenable controls this setting directly. For more information, contact Tenable
Support.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
name@domain
- 65 -
where domain corresponds to a domain approved for your Tenable Vulnerability Management
instance.
This email address overrides the email address set as your Username. If you leave this option
empty, Tenable Vulnerability Management uses the Username value as your email address.
Note: During initial setup, Tenable configures approved domains for your Tenable Vulnerability
Management instance. To add domains to your instance, contact Tenable Support.
4. Click Save.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
You can change the password for your own account as any type of user. The method of changing
your password varies slightly based on the role assigned to your user account.
3. In the New Password box, type a new password. See Tenable Vulnerability Management
Password Requirements for more information.
- 66 -
Tenable Vulnerability Management saves the new password and terminates any currently
active sessions for your account. Tenable Vulnerability Management then prompts you to re-
authenticate.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see
the Tenable FedRAMP Product Offering.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
On the My Account page, you can configure two-factor authentication for your account.
Tip: Administrators can also enforce two-factor authentication for other accounts when creating or editing a
user account.
Note: Before configuring two-factor authentication, check the International Phone Availability list to ensure you
are able to receive text messages from Tenable Vulnerability Management.
- 67 -
Note: By default, Tenable Vulnerability Management treats mobile numbers as U.S.
numbers and prepends the +1 country code. If your mobile phone number is a non-U.S.
number, be sure to prepend the appropriate country code.
d. Click Next.
e. In the Verification Code box, type the verification code you received.
f. Click Next.
b. Click Update.
Note: Once you save the phone number for this configuration, you cannot edit or change the
phone number. You must configure a new authentication setup for any additional phone
numbers you want to use.
c. Click Next.
- 68 -
d. In the authenticator application of your choice, scan the QR code.
e. In the Verification Code box, type the code provided by your authenticator
application.
Note: If you do not type the correct verification code, Tenable Vulnerability Management
locks the QR code. Delete the setup from your authenticator application and scan a new
QR code.
f. Click Next.
The My Account page appears, where you can view and update your account
details.
- 69 -
a. Click My Profile.
2. In the Change Password section, in the Current Password box, type your current password.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
The API keys associated with your user account enable you to access the API for all Tenable
Vulnerability Management products for which your organization is licensed.
Note: Tenable Vulnerability Management API access and secret keys are required to authenticate with the
Tenable Vulnerability Management API.
- 70 -
Note: The API keys associated with your user account enable you to access the API for all Tenable
Vulnerability Management products for which your organization is licensed. You cannot set separate keys
for individual products. For example, if you generate API keys in Tenable Vulnerability Management, this
action also changes the API keys for Tenable Web App Scanning and Tenable Container Security.
Note: Be sure to use one API key per application. Examples include, but are not limited to:
l Tenable Vulnerability Management integration
l Third-party integration
l Other custom applications, including those from Tenable Professional Services
The method to generate API keys varies depending on the role assigned to your user account.
Administrators can generate API keys for any user account. For more information, see Generate
Another User's API Keys. Other roles can generate API keys for their own account.
3. Click Generate.
Caution: Any existing API keys are replaced when you click the Generate button. You must update
the applications where the previous API keys were used.
Tenable Vulnerability Management generates new access and secret keys, and displays the
new keys in the Custom API Keys section of the page.
Tip: If the Generate button is inactive, contact your administrator to ensure they've enabled
API access for your account. For more information, see Edit a User Account.
- 71 -
Caution: Be sure to copy the access and secret keys before you close the API Keys tab. After you
close this tab, you cannot retrieve the keys from Tenable Vulnerability Management.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Tenable Vulnerability Management locks you out if you attempt to log in and fail 5 consecutive times.
Note: If you no longer have access to the email address specified in your account, an administrator for your
Tenable Vulnerability Management instance can reset your password instead. If you are unsure which email
address to use, contact your Tenable representative.
Note: A user can be locked out of the user interface but still submit API requests if they are assigned the
appropriate authorizations (api_permitted). For more information, see the Tenable Developer Portal.
1. On the Tenable Vulnerability Management login page, click the Forgot your password? link.
4. Click Send.
Tenable Vulnerability Management sends password recovery instructions to the email address
specified in your user account.
5. Reset your password using the instructions in the email message. See Password
Requirements for more information.
Breadcrumbs
- 72 -
In the Tenable Vulnerability Management interface, certain pages display breadcrumbs in the top
navigation bar. From left to right, the breadcrumbs show the path of pages you visited to reach your
current page:
To navigate breadcrumbs:
l In the top navigation bar, click a link in the breadcrumb trail to return to a previous page.
Planes
Tenable Vulnerability Management combines fixed pages with overlapping planes.
l
Use the left navigation plane as follows:
a. In the upper-left corner, click the button.
With the exception of the left navigation plane, planes open from the right side of the screen.
2. Manipulate a plane using the following buttons at the left edge of the plane:
- 73 -
retract preview Retract an expanded plane to the preview plane.
3. Return to a previous plane or page (and close a new plane or planes) by clicking the previous
plane.
Tables
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
Explore Tables
Explore tables are any tables within the Explore section in the Tenable Vulnerability Management
user interface. They include many of the features of Tenable Vulnerability Management Workbench
tables, but include additional customization and filtering capabilities. For more information, see
Explore Tables.
Use Tables
In Tenable Vulnerability Management, you can use and interact with tables in the following ways:
You can customize the columns in any Tenable Vulnerability Management table.
- 74 -
A dialog appears.
2. In the dialog:
Action Description
Add or remove a column Select or clear the check box next to the column.
Find a column to add Search for a column and select its check box.
Right-Click Menu
Within any table, you can right-click to access a menu with additional options.
- 75 -
To access the right-click menu:
1. In the table, right-click the row for which you want to view menu items.
The options in the menu depend on the type of table you are viewing, however the following
options are always available:
l Filter By Value — Click to automatically filter the table by rows that include the selected
value.
Note: By default, Tenable Vulnerability Management applies the AND operator to the filter. To
use the OR operator, you must use the Query Builder.
l Filter Out Value — Click to automatically filter the table by rows that do not include the
selected value.
Note: By default, Tenable Vulnerability Management applies the AND operator to the filter. To
use the OR operator, you must use the Query Builder.
Filter a Table
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
In Tenable Vulnerability Management, a Filters box appears above individual tables in various
pages and planes.
To filter a table:
- 76 -
a. In the drop-down list, search for the filter you want to apply.
b. Select the check box next to the filter or filters you want to apply.
For example, you might select Severity if filtering findings or Asset ID if filtering assets.
Note: When using the contains or does not contain operators, use the following best
practices:
l For the most accurate and complete search results, use full words in your search
value.
l Do not use periods in your search value.
l Remember that when filtering assets, the search values are case sensitive.
l Where applicable, Tenable recommends using the contains or does not contain
instead of the is equal to or is not equal to operators.
An example of the expected input is present in the box until you start
typing. If what you type is invalid for the attribute, a red outline appears
around the text box.
Single valid If a default value is associated with the attribute, Tenable Vulnerability
value Management selects the default value automatically.
- 77 -
b. Search for and select one of the listed values.
To deselect values:
7. Click Apply.
Tenable Vulnerability Management clears all filters from the table, including saved
searches.
Note: Clearing filters does not change the date range selected in the upper-right corner of the
page. For more information, see Tables.
- 78 -
Explore Tables
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
The Findings and Assets workbenches use Explore tables to present your organization's data. You
can filter these tables to view specific assets or findings.
Use Filters
In Explore tables on the Findings and Assets workbenches, you can use filters to view specific
findings or assets.
Note: To optimize performance, Tenable limits the number of Findings filters that you can apply to 18 and
the number of Asset filters that you can apply to 35.
Tip: For a list of available filters, see Findings Filters or Asset Filters.
Note: When filtering findings to generate a Findings Report, you can apply a maximum of 5 filters to each
report.
- 79 -
c. Select the filters you want to apply.
e. For each filter, choose the appropriate operator and option. For example, to return
vulnerabilities with Critical Severity, select an operator of is equal to and the Critical
option, as shown in the following image:
Search operators are contextual, depending on the filter you select. For a complete
reference, see the following table:
Operator Description
exists Filters for items for which the selected filter exists.
does not Filters for items for which the selected filter does not exist.
exist
is not equal Filters for items that do not include the filter value.
to
- 80 -
Operator Description
is greater Filters for items with a value greater than the specified filter value. If
than you want to include the value you specify in the filter, then use the is
greater than or equal to operator.
is greater
than or
equal to
is less than Filters for items with a value less than the specified filter value. If
you want to include the value you specify in the filter, then use the is
is less than
less than or equal to operator.
or equal to
within last Filters for items with a date within a number of hours, days, months,
or years before today. Type a number, then select a unit of time.
after Filters for items with a date after the specified filter value.
before Filters for items with a date before the specified filter value.
older than Filters for items with a date more than a number of hours, days,
months, or years before today. Type a number, then select a unit of
time.
between Filters for items with a date between two specified dates.
contains Filters for items that contain the specified filter value.
does not Filters for items that do not contain the specified filter value.
contain
l Begin or end with – Filters for values that begin or end with
text you specify. For example, to find all values that begin with
"1", type 1*. To find all values that end in "1", type *1.
- 81 -
Operator Description
l Contains –Filters for values that contain text you specify. For
example, to find all values with a "1" between the first and last
characters, type *1*.
l To clear the values for a filter, hover on the right side of the filter and click Clear.
l To remove a filter, hover on the right side of the filter and click Remove.
l On the Findings workbench, to reset filters to the default set, at the top of the filters
plane, click Reset.
l On the Assets workbench, to remove all filters, at the top of the filters plane, click
Clear All.
g. Click Apply.
- 82 -
b. Click inside the box.
A drop-down appears.
c. In the drop-down, select the AND or OR conditions or type them in the box.
e. In the drop-down, select one of the following operators or type it in the box.
Note: If you want to filter on a value that starts with (') or ("), or includes (*) or (,), then you must
wrap the value in quotation marks (").
Operator Description
exists Filters for items for which the selected filter exists.
does not Filters for items for which the selected filter does not exist.
exist
is not equal Filters for items that do not include the filter value.
to
is greater Filters for items with a value greater than the specified filter value. If
than you want to include the value you specify in the filter, then use the is
greater than or equal to operator.
is greater
than or
equal to
is less than Filters for items with a value less than the specified filter value. If
you want to include the value you specify in the filter, then use the is
is less than
less than or equal to operator.
or equal to
within last Filters for items with a date within a number of hours, days, months,
- 83 -
Operator Description
after Filters for items with a date after the specified filter value.
before Filters for items with a date before the specified filter value.
older than Filters for items with a date more than a number of hours, days,
months, or years before today. Type a number, then select a unit of
time.
between Filters for items with a date between two specified dates.
contains Filters for items that contain the specified filter value.
does not Filters for items that do not contain the specified filter value.
contain
l Begin or end with – Filters for values that begin or end with
text you specify. For example, to find all values that begin with
"1", type 1*. To find all values that end in "1", type *1.
l Contains –Filters for values that contain text you specify. For
example, to find all values with a "1" between the first and last
characters, type *1*.
- 84 -
l To add multiple filters, press Space and then select another condition, operator,
filter, and value.
l To remove one filter, click the button on the right side of the filter.
l To remove all filters, on the right side of the text box, click the button.
h. Click Apply.
4. (Optional) Save the filters to access later or share with other team members.
Tip: Tenable Vulnerability Management runs Findings searches in the background so that you can
navigate away from the Findings page and return when a complex search is complete. You can also
Cancel a search. Finally, Tenable Vulnerability Management caches your most recent search for 30
minutes, notes the date and time in the top toolbar, and saves the state of the Findings page for your
next visit.
In Explore tables, on the Findings and Assets workbenches, right-click any row to show a menu with
contextual options for both findings and assets. In the menu, the following options always appear.
Option Description
View Open the details page for the finding or asset in a new browser tab.
All Details in
New Tab
Copy to Get any value from an Explore table. For example, when creating a tag, copy
Clipboard an operating system value from a field on the Assets workbench and paste it
into your tag.
Filter by Filter an Explore table by any value. For example, on the Findings
Value workbench, right-click on an IPv4 address and click this option to view all
findings with that IPv4 address.
- 85 -
Option Description
Filter Out Remove all entries with a certain value from an Explore table. For example,
Value on the Assets workbench, right click an operating system type to filter out all
assets with that operating system.
In the Explore section, on the Findings or Assets workbenches, you can customize the table
columns.
- 86 -
Action Description
Add or remove a In the Customize Columns dialog, select or clear the check
column box next to the column.
Find a column to add In the Customize Columns dialog, search for a column and
select its check box.
Reorder columns In the Customize Columns dialog, click and drag columns
from top to bottom.
Change column width In the Assets or Findings tables, hover on the separator
between column headings and drag left or right.
Reset column width to In the Customize Columns dialog, click Reset Column
default Width.
Reset all column In the Customize Columns dialog, click Reset to Defaults.
customizations to
default
Query Builder
In Tenable Vulnerability Management, you can use the Query Builder to view specific data via
queries.
Important! When you run a query using the Query Builder, it applies to all data on the page, including the
quick filters on the left side of your data table. These quick filters, on the other hand, only affect the data
within the table itself. Any filters applied on the left side of the page do not affect the Query Builder.
- 87 -
l Filter — The search criteria (for example, for a finding, Severity).
Tip: You can nest queries with parentheses. For example, to search for high-severity findings
where the VPR is greater than seven or the CVSSv3 Base Score is greater than six, use:
Severity is equal to High AND (VPR is greater than 7 OR CVSSv3 is greater than 6) .
Build a Query
To build a query with the Query Builder:
A pane appears with a list of filters, which vary in each section of Tenable Vulnerability
Management.
For filters where the value is text or a number, a hint appears. Otherwise, a list of options
appears.
5. (Optional) Add another query (that is, type a Condition and then add a Filter, an Operator, and
a Value).
Tip: Under Nesting Operators, select an opening parentheses ( or NOT( to start building a nested
query.
Edit a Query
To edit a query, do one of the following.
- 88 -
Action Description
Replace a query In the query box, click the component to replace. A list of options
component appears.
Clear a query On the right side of the query box, click the X.
Keyboard Shortcuts
Use the following keyboard shortcuts in the Query Builder.
Shortcut Description
Right Arrow or Left Move the cursor in your query or choose a date in the date picker.
Arrow
Saved Queries
In Tenable Vulnerability Management, you can build custom queries with the Query Builder and
save them to reuse or share. In the user interface, this feature is called Saved Queries.
You can access the Saved Queries menu to the left of the search/query bar within the Tenable
Vulnerability Management user interface.
- 89 -
Additionally, when viewing your Saved Queries, you can view Tenable Queries which highlight
common key performance indicators (KPIs).
Tenable Queries
Asset Tenable Queries Findings Tenable Queries
l Vulnerabilities of Interest —
Publicly discussed and have a proof
of concept that could lead to
widespread use by attackers.
- 90 -
In the News — Vulnerabilities being widely
reported in the press with notable
coverage over the past 30 days.
Manage Queries
You can manage your queries in the following ways:
Save a Query
To save a query:
A drop-down appears.
- 91 -
3. Click Save As New Query.
You can set any query to be your default query when navigating to the Tenable Vulnerability
Management page.
A drop-down appears.
Tenable Vulnerability Management saves the query as your default, and applies it to the page
automatically.
A drop-down appears.
A drop-down appears.
- 92 -
Note: Any Tenable Vulnerability Management user can run a shared query, but the assets they can view
are based on permissions. To learn more, see Access Control.
A drop-down appears.
A drop-down appears.
- 93 -
You can export data from the Findings and Assets workbenches to CSV or JSON. While these
workbenches contain different data, the basic export process is the same.
Note: On the Findings workbench, when using the Group By filter, you can only export five findings
at a time.
Note: On the Assets workbench, the Asset ID, Last Authenticated Scan, Last Licensed Scan, and
Source fields are required.
Note: You can manually select up to 200 findings or assets. Otherwise, you must select them all.
Option Description
- 94 -
Name Type a name for the export.
Note: If your export file contains a cell starting with any of the
following characters (=, +, -, @), the system adds a single quote
(') at the beginning of the cell. For more information, see the
Knowledge Base.
l Under Select Field Set, search for or select the fields to add
to your export.
a. In the Start Date and Time section, choose the date and time
for the export.
- 95 -
want the export to repeat (for example, daily).
6. Click Export.
Depending on size, the export file may take several minutes to process. When processing
completes, the file downloads to your computer.
Tip: If you close the Export plane before the download completes, you can access the completed
export file in Settings > Exports.
Error Messages
For Tenable Vulnerability Management API status codes, see the Tenable Developer Portal.
Scanning
The following table describes the scanning error messages that may appear in Tenable Vulnerability
Management.
Some scanning errors occur when you exceed the following Tenable Vulnerability Management
scanning limitations:
Scan Limitations
Limitation Description
- 96 -
Targeted IP Tenable Vulnerability Management limits the number of IP addresses or
addresses or hostnames you target with a single assessment scan (for more
hostnames per information, see Discovery Scans vs. Assessment Scans). The host target
assessment scan limit is 10 times your organization's licensed asset count.
Host scan results Tenable Vulnerability Management limits the number of live hosts for
per scan which a single scan can generate scan results for. The live host scan
results limit is 1.1 times your organization's licensed asset count.
- 97 -
results for more than 100,000 dead hosts from a single scan. If you
exceed the limit, Tenable Vulnerability Management aborts the scan.
Active scans You cannot have more than 25 scans running in your container
simultaneously.
Scan chunks Tenable Vulnerability Management limits scan chunks to 10,000 hosts,
150,000 findings, or 7 GB in total size. If a scan chunk exceeds any of
these values, Tenable Vulnerability Management does not process the
scan and eventually aborts it.
Note: This limits items like MDM assessments, importing Nessus files, and
very large Auto Discovery scenarios (for example, VMware) to individual
scans with less than 10,000 assessed targets.
For more information about creating, modifying, and launching scans, see Manage Scans. For more
information about scan status values, see Scan Status.
Aborted Task The following targets were If needed, perform a rollover scan
Targets aborted: [scan targets] on the aborted targets.
Aborted Task There were [number] aborted If needed, perform a rollover scan
Targets Summary targets, including [number of on the aborted targets.
targets not in notes] above the
limit for reporting notes.
Account Target The target count exceeds the limit You reached the maximum scan
Limit for this account. Please contact target limit. To increase your scan
- 98 -
Warning Message Recommended Action
Agent Group The owner does not have access You do not have access to all the
Permissions to all of the configured agent agent groups selected for this
groups. scan. Select the correct groups.
For more information, see Agent
Groups.
All Scans Aborted All active scans were aborted. Tenable Vulnerability Management
aborted the scan due to a system
abort request. Re-run the scan.
Auto Routed Custom scan targets are not Select a specific scanner to run
Custom Targets currently supported for auto scans on custom targets.
- 99 -
Warning Message Recommended Action
routed scans.
Concurrent Scan Concurrent scan limit reached for You reached the maximum
Limit this account. Please contact concurrent scan limit. Re-run the
customer support to upgrade your scan later.
license.
Concurrent Scan Scan could not be completed: You reached the maximum
Limit Reached concurrent scan limit reached for concurrent scan limit. Re-run the
this account. Please contact scan later.
customer support to upgrade your
license.
Conflict Transition for indexing to pausing The scan is completed and is now
not supported. in the process of indexing. Wait for
the indexing to complete.
Empty Scanner The scan is configured to use a Confirm that the scanner group
Group scanner group with no assigned contains functioning scanners,
scanners. then re-run the scan.
Empty Targets No targets are configured for the Confirm the scan configuration
scan. contains one or more valid targets,
then re-run the scan.
Import Failed Failed to import scan results from Re-run the scan.
the agent. Invalid results, multiple
hosts detected in scan results.
(Agent: [agent name], Agent
UUID: [agent uuid])
Inactive Scanners The scan is configured to use a Confirm that the configured
scanner group with no active scanner is functioning, or that the
- 100 -
Warning Message Recommended Action
Indexing Error Unexpected error during task Re-run the scan for unscanned
processing. Targets may need to targets or targets that need to be
be rescanned : [scan targets] re-scanned.
Invalid AWS No valid AWS targets are Confirm the scan contains valid
Targets configured for the scan. AWS scan targets and re-run the
scan. For more information, see
Targets.
Invalid PCI The PCI scan can only be Use a Tenable cloud sensor to run
Scanner launched using Tenable Cloud a Tenable PCI ASV scan. For more
Scanners information, see Cloud Sensors.
Invalid Tag Target Failed to resolve a target FQDN or One or more assets in a tag
IP from an asset in the configured configured for the scan requires an
tags. associated scan target. Confirm
the tag configuration, then re-run
the scan. For more information,
see Tags.
Invalid Tag Rule Tags with the "Match All" filter can Adjust your tag rules, then re-run
As Target only have one rule for scans with the scan.
the "Targets defined by tags"
option enabled. Tag category: [tag
category], Tag value: [tag value].
Invalid Target Can't resolve target. Confirm your scan includes valid
scan targets, then re-run the scan.
For more information, see Targets.
- 101 -
Warning Message Recommended Action
Invalid Target An invalid target range is Correct or remove the invalid scan
Range configured for the scan: [scan target range, then re-run the scan.
targets] For more information, see Targets.
Invalid Targets No valid targets are configured for Confirm the scan targets meet the
the scan. following criteria:
Log4j DNS Failed Unable to resolve DNS [scan Re-run the scan for unscanned
Request target] to check Log4j targets or targets that need to be
Vulnerability. re-scanned.
Max Findings The maximum number of findings Review the Tenable Vulnerability
Error was reached. Management scan limitations and
adjust the scan configuration to
produce an allowed number of
- 102 -
Warning Message Recommended Action
findings.
Max Hosts Scan has exceeded the maximum Review the Tenable Vulnerability
Reached Error number of allowed hosts. Management scan limitations and
adjust the scan configuration to
scan an allowed number of hosts.
No Available Unable to find a scanner that is Confirm you selected the correct
Scanner able to run the scan. scanner, then re-run the scan.
No Configured The scan has no configured Agent Add at least one Agent Group to
Agent Groups Groups. the scan.
No Scan Policy The scan must be configured with The scan requires a scan policy.
a scan policy. Configure a scan policy, then re-
run the scan.
Notification Error Notifications for this scan may not The scan completed, but failed to
have been sent. send a notification.
Owner Disabled The owner of the scan is disabled. Enable the owner of the scan or
transfer ownership to an enabled
user. For more information, see
Permissions.
- 103 -
Warning Message Recommended Action
Paused Scan Paused scan exceeded timeout of The paused scan exceeded the
Timeout [maximum allowed pause] days. maximum pause duration. Re-run
Some tasks were aborted. Targets the scan for all incomplete scan
may need to be rescanned. targets.
Pending Scan The scan was unable to transition Confirm that the selected scanner
Timeout to running within the expected or scanner group has sufficient
timeout. capacity, then re-run the scan.
Policy The owner of the scan does not You do not have access to the
Permissions have access to the configured scan policy for this scan. Re-run
policy. the scan with correct permissions.
For more information, see
Permissions.
Portscanner Max Portscanners have found more Since this negatively impacts both
Ports Exceeded than [number] ports open for scan accuracy and performance,
target [target name], and the you may want to adjust your
number of reported ports has network security configuration to
been truncated to [number] disable this behavior for
(threshold controlled by scanner vulnerability scans.
preference portscanner.max_
ports). Usually this is due to
intervening network equipment
intercepting and responding to
connection requests as a
countermeasure against
portscanning or other potentially
malicious activity.
Routed To The following targets were routed Confirm the scanner group
Inactive Scanners to a scanner group with no active contains functioning scanners,
- 104 -
Warning Message Recommended Action
Running Scan The scan exceeded the maximum The scan may be taking too long to
Timeout allowed runtime. scan some scan targets. Re-run
the scan.
Scan Aborted The assigned scanner was not Tenable Vulnerability Management
found. could not find the selected
scanner. Select a different scanner
and re-run the scan.
Scan Forbidden Rejected attempt to scan [scan The scan target is excluded from
target], as it violates user-defined scans. If you want to scan this
rules. target, remove it from the exclusion
and re-run the scan. For more
information, see Exclusions.
- 105 -
Warning Message Recommended Action
Scan Job The scan could not be initialized. Tenable Vulnerability Management
Initialization Error Please check the scan targets failed to launch the scan. Re-run
setting for irregularities and the scan with the correct scan
contact support if the problem target. For more information, see
persists. Targets.
Scanner Disabled The assigned scanner is disabled. A user disabled the selected
scanner. Select a different scanner
and re-run the scan.
Scanner Group Unable to load scanner group for Confirm the scan configuration
Error scanner [scanner ID]. contains one or more valid targets,
then re-run the scan.
- 106 -
Warning Message Recommended Action
Scanner Not The assigned scanner was not Tenable Vulnerability Management
Found found. could not find the selected
scanner. Select a valid scanner
and re-run the scan.
Scanner The owner of the scan does not You do not have access to the
Permissions have access to the assigned selected scanner. Select a different
scanner. scanner and re-run the scan. For
more information, see
Permissions.
Stalled Task A task was automatically aborted Confirm the scanners are
after stalling on scanner. Targets functioning properly and have
may need to be rescanned: [scan enough capacity for your scans,
targets] then re-run the scan for unscanned
targets or targets that need to be
re-scanned.
Tag Targets Error Failed to obtain tag targets Tenable Vulnerability Management
- 107 -
Warning Message Recommended Action
Target Access The owner of the scan does not You do not have the correct user
Error have access to any configured permissions to run the scan. Check
targets. your user permissions and re-run
the scan. For more information,
see Permissions.
Target Group The owner of the scan does not Confirm the scan owner's
Permissions have access to all of the permissions, then re-run the scan.
configured target groups. For more information, see Target
Groups.
Target Limit The target count exceeds the The scan target range is too large.
maximum allowed for Tenable Confirm the scan configuration
Vulnerability Management. includes a valid target range, then
re-run the scan. For more
information, see Targets.
Target Range A target range exceeds the Confirm or reduce the configured
Limit maximum allowed targets: [scan scan target range and re-run the
targets] scan. For more information, see
Targets.
Targets Unable The following targets are not able Re-run the scan for unscanned
To Complete to complete scanning in the targets or targets that need to be
allowed scan time and will need to scanned again.
be rescanned: [scan targets]
Task Initialization Unexpected error during Re-run the scan for unscanned
Error initialization. Targets may need to targets or targets that need to be
be rescanned: [scan targets] re-scanned.
- 108 -
Warning Message Recommended Action
Task Processing Unexpected error in processing. Re-run the scan for unscanned
Error Targets may need to be targets or targets that need to be
rescanned: [scan targets] re-scanned.
Transition Some tasks stalled when being Failed to complete scan on some
Timeout [resumed, paused, or stopped] scan targets. Re-run the scan for
and were aborted. Targets may all unscanned scan targets.
need to be rescanned.
The following targets were not Ensure that you are using the
routable: [scan targets] correct scanner to scan the targets
and that there are not any
protective securities between the
scanner and the targets.
Unenforceable Some dynamic rules are disabled Verify that the host names are
Rules because IP address resolution. correct and check your DNS
Rules containing the following configuration.
host names are affected: [rules]
- 109 -
Dashboards
Dashboards are interactive, graphical interfaces that often provide at-a-glance views of key
performance indicators (KPIs) relevant to a particular objective or business process.
Note: Depending on your license, more dashboards are included. For example, the Tenable Lumin
dashboard.
l Dashboards that other users have shared with you. Click the Shared with Me tab to view
dashboards that others have shared with you.
Note: There may be a delay between when a scan completes and when the dashboard data updates while
Tenable Vulnerability Management indexes the data.
You can roll over individual items to reveal additional information or click on items to drill down into
details behind the data.
- 110 -
Tip: All charts on the Vulnerability Management Overview show New, Active, and Resurfaced
vulnerability data. However, the counts or data displayed on each chart may differ for other reasons. For
example, the Vulnerability Priority Rating (VPR) widget organizes vulnerabilities by VPR category, but the
Vulnerability Trending widget graphs vulnerabilities by CVSS-based severity category. For more
information about how severity and VPR metrics compare, see CVSS vs. VPR.
In the Vulnerability Management Overview, you can interact with the following widgets:
Widget Action
Cyber Exposure News This widget highlights the most recent Tenable blog posts
Feed related to exposure incidents.
- 111 -
l View a count of your scans run during the last 90 days and
the percentage that succeeded and failed.
CISA Alerts AA22-011A This widget provides a vulnerability count of risks associated
and AA22-047A with the CISA Alerts AA22-011A and AA22-047A vulnerabilities
that have been identified or mitigated.
- 112 -
select a format.
Vulnerability Trending This widget shows the cumulative number of Critical, High,
Medium, and Low severity vulnerabilities on your network over
time. For more information, see CVSS vs. VPR.
Critical and High This widget summarizes the number of Critical and High
Exploitable Vulnerabilities severity vulnerabilities on your network, organized by
exploitability characteristic category. A single vulnerability may
have multiple exploitability characteristics and count towards
- 113 -
multiple categories.
Future Threats: Not Yet This widget summarizes the vulnerabilities that are not yet
Exploitable Vulnerabilities exploitable, determined by their Exploit Code Maturity and
Vulnerability Publication Date.
Vulnerability Age This widget summarizes the age of your vulnerabilities (by
Vulnerability First Seen date), organized by severity, to help
you manage your SLAs. For more information about severity,
see CVSS vs. VPR.
- 114 -
l To export the data in the widget, click the button and
select a format.
Note: There may be a delay between the time when a scan completes and when the dashboard data
updates while Tenable Vulnerability Management indexes the data.
Hovering over individual items reveals a data summary that you can click to drill down for further
details.
In the Vulnerability Management Overview (Explore), you can interact with the following widgets:
Widget Action
Cyber Exposure News This widget highlights the most recent Tenable blog posts
Feed related to exposure incidents.
- 115 -
l To export the data in the widget, click the button and
select a format.
Tenable Research This widget provides two indicators for current major threats
Advisory discovered by Tenable Research. The red indicator signifies the
presence of the relevant vulnerabilities, while the green indicator
is enabled when these vulnerabilities are patched.
- 116 -
Age by Vulnerability Priority Rating (VPR) Score and Vulnerability
Age.
Critical and High This widget focuses on the most severe current threats, critical,
Exploitable Vulnerabilities and high exploitable vulnerabilities to help prioritize remediation.
Each bar represents vulnerabilities grouped by an exploitability
characteristic.
- 117 -
l Locally Exploitable (Low Complexity): Vulnerabilities that
can easily be exploited with local access and require little
skill or information gathering to exploit.
Future Threats: Not Yet This widget provides a view of vulnerabilities based on exploit
Exploitable Vulnerabilities code maturity and vulnerability publication date. The columns
display counts of published vulnerabilities within the specified
time period present in the organization. The rows display the
exploit code maturity, where Proof of Concept is more serious
than Unproven Exploit.
- 118 -
detected for the category.
- 119 -
Managing SLAs and age. The columns display counts of published vulnerabilities
within the specified time period present in the organization. The
rows display the severity level of the vulnerability.
The tables below describes the sections and widgets displayed in the Web Applications Scanning
dashboard. You can view details about the data in a widget by clicking the widget.
Widget Description
Findings Number of findings Tenable Web App Scanning has discovered. The
findings are categorized by severity (Critical and High).
- 120 -
Widget Description
OWASP Top 10
This chart displays the vulnerabilities discovered by Tenable Web App Scanning that appear in the
latest Open Web Application Security Project (OWASP) Top 10 Most Critical Web Application
Security Risks document.
Tenable Vulnerability Management updates dashboard data based on date filters you add when you
Create a Custom Widget for the dashboard.
The Dashboards page appears. The page contains tiles that represent:
- 121 -
l Tenable-provided dashboards
l In the upper-left corner, use the Search bar to search for specific dashboards.
l In the upper-left corner, use the drop-down to change the order in which dashboards
appear on the Dashboards page.
l Edit a dashboard.
l Share a dashboard.
l Export a dashboard.
l Duplicate a dashboard.
l Delete a dashboard.
Tenable-Provided Dashboards
On the Dashboards page, Tenable Vulnerability Management shows dashboards in the following
order:
- 122 -
1. Tenable-provided dashboards. For a complete index of Tenable-provided dashboard
templates, see Tenable Vulnerability Management Dashboards.
2. Dashboards you create and dashboards that have been shared with you.
Note: You can change the order in which dashboards appear by using the drop-down in the upper-right
corner of the Dashboards page.
The Tenable-provided dashboards you see depend on the licenses you have, but can include the
following:
Dashboard License
Note: You can export the Vulnerability Management Overview and Asset View dashboard landing pages,
or export individual widgets on those dashboards. For more information, see Export a Full Dashboard and
Export an Individual Dashboard Widget.
Note: If your dashboard fails to show data, you may be filtering the dashboard by a target group with too many
targets. Tenable recommends limiting the number of targets in any individual target group.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
In Tenable Vulnerability Management, you can export the following dashboard landing pages:
l Tenable Lumin
- 123 -
1. View the dashboard page you want to export.
Once the export completes, a Success message appears and Tenable Vulnerability
Management downloads the export file to your computer. Depending on your browser settings,
your browser may notify you that the download is complete.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
In Tenable Vulnerability Management, you can export individual widgets from the following
dashboard landing pages:
l Tenable Lumin
1. View the dashboard page that contains the widget you want to export.
2. In the header of the widget you want to export, click the button.
- 124 -
3. From the drop-down menu, select one of the following options:
Once the export completes, a Success message appears and Tenable Vulnerability
Management downloads the export file to your computer. Depending on your browser settings,
your browser may notify you that the download is complete.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
Tenable Vulnerability Management updates dashboard data every time you run a scan.
l In grid view, roll over the tile for the dashboard you want to view.
l In list view, roll over the thumbnail dashboard image for the dashboard you want to view.
3. Click View.
- 125 -
b. Select the dashboard you want to view.
Tip: Use this option to view legacy versions of Explore dashboards. For more
information, see Enable Explore Dashboards
l Click on widget elements to drill down into details behind the data.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
- 126 -
l Sort the Template Library page:
a. In the upper-right corner of the page, click the button in the drop-down box.
l In the upper-left corner, use the Search bar to search for specific dashboards.
l Click the New and Updated tab to view dashboards that are eligible for auto-update.
l Preview a dashboard.
l Create a dashboard.
Create a Dashboard
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, Administrator, or Custom Role with appropriate privileges
You can create a custom dashboard or use the Template Library to create a copy from the available
templates. Dashboards let you drill down to view the details of each widget.
Important: The Template Library in Tenable Vulnerability Management includes Explore dashboard
templates. The Explore dashboard templates are marked with Explore at the end of the template name.
For example: Vulnerability Management (Explore). From the dashboards that you create using these
templates, you can drill down to the Findings or Assets pages. To add an Explore dashboard, see Enable
Explore Dashboards.
To create a dashboard:
- 127 -
a. Click Template Library.
b. In the Groups panel on the left, click the group name to view the templates for the
category.
Category Description
Center for CIS Benchmarks are best practices for the secure
Internet Security configuration of a target system. Be sure to use the proper
(CIS) audit file for scans.
Host Audit Organizations such as CIS, DISA, and some vendors create
Plugin Type golden configurations standards, known as benchmarks.
Tenable creates audit files that perform a detailed configuration
review. Scanning the assets with the Host Audit Compliance
Check plugins allows you to do detailed configuration checks.
These reports provide summary and detailed information for all
the Host Audit Compliance Check plugins.
Tenable Best Allows you to implement best practice audits for new
Practice Audits technologies. Be sure to use the proper audit file for scans.
- 128 -
Vendor Based Allows you to implement vendor-specific guidance for new
Audits technologies. Vendors include: Vendor, IBM, Juniper,
Microsoft, NetApp, VMware, and others. Be sure to use the
proper audit file for scans.
Web App Web application security provides the ability to detect and
Scanning mitigate threats and vulnerabilities that may compromise the
confidentiality, integrity, and availability of web applications.
These reports leverage data from Tenable Web App Scanning,
a comprehensive and automated vulnerability scanning tool for
modern web applications.
e. (Optional) To preview the dashboard template, click Preview. For more information, see
Preview a Dashboard.
f. Click Add.
The new dashboard appears on the Dashboards page with the name Copy of selected
dashboard.
- 129 -
a. Click Custom Dashboard.
A menu appears.
- 130 -
a. In the upper-right corner of the page, click Edit Filter.
Note: The Edit Filter option does not appear if there are no widgets added to the
dashboard.
The edges of the widget become defined and exhibit a raised appearance.
d. Release the mouse button to drop the widget in the new location.
What to do next:
l Manage Dashboards
Preview a Dashboard
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
When creating a new dashboard from a template, you can preview the dashboard before adding it to
the Dashboards page.
To preview a dashboard:
- 131 -
1. Create a dashboard.
2. In the Template Library, roll over the template you want to preview.
3. Click Preview.
4. To exit the preview, in the top navigation bar, click a link in the breadcrumb trail to return to the
Template Library, or the Dashboards page.
An Added dashboard to Dashboards confirmation message appears, and the new dashboard
appears on the Dashboards page with the name Copy of selected dashboard.
To use Explore dashboards within Tenable Vulnerability Management, you must first add them to
your interface via the Template Library.
Note: The numerical data that appears on your Explore dashboards may not match the data on your legacy
Tenable Web App Scanning or VM dashboards.
Note: The data on your Explore Tenable Web App Scanning and VM dashboards reflects your complete
scanning history. This differs from the Tenable Web App Scanning and VM dashboards, which display data
for only the last 30 calendar days.
- 132 -
The Template Library page appears.
If Explore dashboards do not appear, your container may not have enabled them. Please contact
your Customer Success Manager.
5. For each Explore dashboard you want to add to your interface, do the following:
b. Click Add.
Note: To reenable your Tenable Web App Scanning or VM dashboards, enable the corresponding
workbench.
Manage Dashboards
This section contains the following topics to help you manage your Tenable Vulnerability
Management dashboards:
Dashboard Groups
In Tenable Vulnerability Management, you can organize dashboards into groups via the dashboard
Groups panel. This allows you to track different types of dashboards, and dashboards that others
have shared with you. You can also share a dashboard group with one or more users or user
groups.
The Groups panel automatically expands when you view the Dashboards page. The panel is
separated by Tenable-provided dashboard groups and user-created dashboard groups.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
- 133 -
Add a Dashboard Group
You can add a dashboard group via the Groups panel on the Dashboards page.
3. In the Group Name box, type a name for your dashboard group.
4. In the Dashboards to Include section, select the check box next to any dashboards you want
to add to the dashboard group.
5. Click Save.
Tenable Vulnerability Management adds the dashboard group to the user-created dashboard
list in the Groups panel.
Note: Dashboard groups are not automatically re-shared with a user after they have been updated. For
example:
User A shares a dashboard group with User B. User A then makes a change to the dashboard group. To
see the update, User A must re-share the dashboard group, with User B.
Note: Shared content may appear differently to the users with which it is shared based on the access group
to which they belong.
- 134 -
1. View the Dashboards page.
2. In the Groups panel, click the user-created dashboard group you want to share.
l To share the dashboard group with all users, select the All Users check box.
l To share the dashboard group with specific users or user groups, from the drop-down
box, select the users or user groups with which you want to share the dashboard group.
5. Click Share.
2. In the Groups panel, click the user-created dashboard group you want to edit.
- 135 -
The Edit Group pane appears.
4. (Optional) In the Group Name box, edit the name of the dashboard group.
5. (Optional) In the Dashboards to Include section, select or deselect the dashboards that
appear in the dashboard group.
6. Click Save.
2. In the Groups panel, click the user-created dashboard group you want to delete.
4. Click Delete.
Note: Deleting dashboard groups does not delete the dashboards within the group.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
To provide the most up-to-date vulnerability information, Tenable updates or adds new dashboard
widgets when, for example, a new vulnerability is exposed or when Tenable Vulnerability
- 136 -
Management adds a new vulnerability filter. When Tenable updates these widgets, you can view
and automatically update them in one of the following ways:
l Dashboards page — On the Dashboards page, you can update all updated widgets on a
dashboard at one time.
l Dashboard Template Library — When creating a custom dashboard via the Template Library,
you can view new or updated widgets and add them to the custom dashboard.
Note: On predefined dashboard templates, Tenable Vulnerability Management always includes the
most recent version of widgets.
l Widget Library — In the Widget Library, you can view new or updated widgets and add them to
up to ten individual dashboards.
Note: You can also see dashboards with new and updated widgets on the All tab. These dashboards
appear with a pulsing blue dot next to the dashboard name.
3. Roll over the dashboard for which you want to update widgets.
4. Click Apply.
An Update Available message appears that describes the updates to the widgets on the
dashboard.
5. Click Update.
- 137 -
1. View the dashboard Template Library.
4. Click Add.
5. In the Dashboards drop-down, select the dashboard or dashboards to which you want to add
the new or updated widget.
6. Click Save.
Edit a Dashboard
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
To edit a dashboard:
- 138 -
1. Do one of the following:
c. Click Edit.
A drop-down appears.
l
Rename the dashboard:
a. Click the name of the dashboard.
l
Edit the dashboard description:
- 139 -
a. Click the dashboard description.
l
Edit the dashboard filters:
a. In the upper-right corner of the page, click Edit Filter.
l
Add widgets to the dashboard:
a. In the upper-right corner of the page, click Add Widgets.
A menu appears.
l
Reorder widgets on the dashboard:
a. Roll over the top of the widget until the move cursor appears.
l
Resize the widgets on the dashboard:
a. Roll over the lower-right corner of the widget until the resize cursor appears.
- 140 -
The widgets shift to accommodate the new widget size.
l
Delete the dashboard:
o In the lower-left corner of the page, click Delete Dashboard.
You return to the selected dashboard and Tenable Vulnerability Management applies your
changes. If the dashboard is shared with other users, those users automatically receive the
updated dashboard.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
You can set any dashboard as the default dashboard to make it your landing page. If you do not set
a default dashboard, Tenable Vulnerability Management uses the Tenable-provided Vulnerability
Management Overview dashboard as the default.
When you set a dashboard as default, on the Dashboards page, the Default label appears in the
header of the dashboard tile.
Note: If you delete a dashboard set as default, the product Tenable-provided dashboard becomes the
default.
- 141 -
l Set a default dashboard via an individual dashboard:
Note: You may have to log out and log back in to see the updated default dashboard.
Rename a Dashboard
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
To rename a dashboard:
Duplicate a Dashboard
- 142 -
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
Required Tenable Web App Scanning User Role: Scan Operator, Standard, Scan Manager, or
Administrator
To duplicate a dashboard:
2. Click Duplicate.
Filter a Dashboard
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
You can apply filters at the dashboard level to all widgets within that dashboard.
Note: You can apply configurations to individual widgets. The widget-level configuration takes precedence
over dashboard-level configuration.
- 143 -
1. View the dashboard you want to filter.
A drop-down appears.
3. Click Filter.
4. In the Select Filter Type drop-down, select the assets you want the dashboard to analyze.
See the following table for options and requirements.
All Assets (Default) This option includes This is the default option and includes
all the assets in the all assets in the dashboard. There is
dashboard. not a requirement for this option.
Target Group This option only includes An extra field for Select Target
assets in a specific target Groups appears when you select this
group. option. Select the desired target
group from the drop-down list.
Custom This option only includes A text box appears when you select
assets with a specific this option. Enter one or more of the
hostname, IP address, FQDN, custom option formats (hostname, IP
or CIDR. address, FQDN, or CIDR). Separate
multiple items with commas.
- 144 -
filter is less than or equal to 300.
5. Click Apply.
6. In the widgets section, roll over the icon to view the added filter.
Note: The following are the filtering limitations for Explore widgets:
Note: You can filter only with the tags you can access. You cannot apply tags that you do not have access
to.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
You can filter a dashboard to show only vulnerabilities within a specific timeframe — in hours, days,
months, or years. Filters are available only for custom dashboards or dashboards created using the
template library.
Note: Filter by time option is available only for Explore dashboards and Explore widgets.
2. To filter your dashboard data for a specific timeframe, do one of the following:
l In the All drop-down box, select the required timeframe: All, 7 days ago, 14 days ago,
30 days ago, 60 days ago, 90 days ago.
- 145 -
l For a custom timeframe, in the Last Seen box, type the value to view the data within the
last number of days, hours, years, or months.
Tenable Vulnerability Management displays the vulnerabilities for the selected timeframe on
the dashboard.
Share a Dashboard
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, Administrator, or Custom Role with appropriate privileges
Tenable Vulnerability Management users can share a dashboard with one or more users, or one or
more user groups. Shared dashboards appear automatically for the users or groups with which they
are shared. Additionally, when you update a shared dashboard, the users with which it is shared
automatically receive the updated dashboard.
Note: You cannot edit dashboards that are shared with you. You can, however, duplicate or delete a
dashboard that is shared with you.
Note: Shared content may appear differently to the users with which it is shared based on the access group
to which they belong.
To share a dashboard:
c. Click Share.
- 146 -
a. View the dashboard you want to share.
l To share the dashboard with all users, select the All Users check box.
l To share the dashboard with specific users or user groups, from the drop-down box,
select the users or user groups with which you want to share the dashboard.
3. Click Share.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
With the export feature, you can export dashboard data in CSV, PDF, and detailed PDF formats.
You can create dashboard exports on demand or schedule automated exports to specified
recipients.
You can also manage your dashboard exports. You can download them, view your export history,
delete your exports, or delete their configuration.
Note: While you cannot export the Vulnerability Management Overview and Asset View dashboards, you
can export their associated landing pages, or export individual widgets on those dashboards. For more
information, see Export a Full Dashboard Landing Page and Export an Individual Dashboard Widget.
Export a Dashboard
- 147 -
1. Do one of the following:
c. Click CSV.
The export request and status appears in the Downloads section on the Exports plane.
When the export completes, Tenable Vulnerability Management downloads the export file to
your computer. Depending on your browser settings, your browser may notify you that the
download is complete.
To export a PDF:
- 148 -
1. Do one of the following:
Note: The PDF report contains the displayed information for the selected dashboard. The
information that you see on the screen is the information that is included in the report.
- 149 -
The PDF - Detailed report has in-depth information, including vulnerability details, that goes beyond
the items displayed.
Note: If you select PDF - Detailed and there are user-created filters applied to one or more widgets
on the dashboard, a Confirm Export message appears indicating that Tenable Vulnerability
Management does not apply user-created filters to any additional chapters. Click Confirm to continue
with the export.
The export request and status appears in the Downloads section on the Exports plane.
When the export completes, Tenable Vulnerability Management downloads the export file to
your computer. Depending on your browser settings, your browser may notify you that the
download is complete.
To schedule an export:
- 150 -
The Schedule Export plane appears.
l If you have never exported and/or scheduled an export for the dashboard, the Schedule
options automatically appear.
l If you have already exported the dashboard, in the Schedule section, click Add New.
l If you have already scheduled an export for the dashboard, you cannot create another
one. You must first cancel the scheduled dashboard export.
Note: The PDF report contains the displayed information for the selected dashboard. The
information that you see on the screen is the information included in the report.
The PDF - Detailed report has in-depth information, including vulnerability details, that goes beyond
the items displayed.
Note: If you select PDF - Detailed and there are user-created filters applied to one or more widgets
on the dashboard, a Confirm Export message appears indicating that Tenable Vulnerability
Management does not apply user-created filters to any additional chapters. Click Confirm to continue
with the export.
Option Description
Start Date and Time The date and time that you want the export to begin.
- 151 -
at the time specified (for example, Weekly on Tuesday).
Note: Once you save the scheduled export, you cannot edit the
Encryption Password. Instead, you must create a copy of the
dashboard, create a scheduled export, and then select the desired
password.
Add Recipients (Optional) The email address for the person that receives the
report. You can specify multiple email addresses as a comma-
separated list.
5. Click Schedule.
- 152 -
1. Do one of the following:
c. Click Export.
2. In the Downloads section, next to the export download you want to download, click the
button.
- 153 -
l The schedule for the dashboard export.
You cannot access the Export History plane if the dashboard has not yet been exported.
c. Click Export.
2. In the Downloads section, roll over the export download you want to delete.
4. Click Delete.
- 154 -
To delete a dashboard export configuration:
1. Do one of the following:
c. Click Export.
a. View the dashboard for which you want to delete a scheduled export.
2. In the Schedule section, roll over the scheduled export configuration you want to delete.
4. Click Confirm.
Delete a Dashboard
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
Note: In Tenable Vulnerability Management, you can only delete custom dashboards. You cannot delete
Tenable-Provided Dashboards.
- 155 -
To delete a dashboard:
2. Click Delete.
3. Click Delete.
Manage Widgets
You can use the widget library to create and edit widgets to use across your dashboards.
On your dashboards, you can further configure widgets to modify your dashboards.
- 156 -
l Configure a Widget
l Duplicate a Widget
l Rename a Widget
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
The widget library provides a selection of Tenable-provided widgets to add to your template-based
or custom dashboard.
Note: The Tenable-provided Vulnerability Trending widget is not available in the widget library. All other
Tenable-provided widgets appear in the widget library.
2. In the upper-right corner of the page, click the Widget Library button.
3. (Optional) In the upper-left corner of the page, click the tab for the dashboard widgets you want
to view. For example, if you want to only widgets associated with Tenable Vulnerability
Management, click the Vulnerability Management tab.
Note: The tabs that appear on the Widgets page depend on the licenses (for example, Tenable
Lumin, Tenable Web App Scanning) you have enabled in Tenable Vulnerability Management.
a. In the upper-right corner of the page, click the button in the drop-down box.
b. Select the criteria by which you want to sort the widgets page.
l In the upper-left corner, use the Search bar to search for specific widgets.
- 157 -
l Click the New and Updated tab to view dashboard widgets that are eligible for auto-
update.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
Note: You can only delete custom widgets. You cannot delete pre-configured Tenable Vulnerability
Management widgets.
3. In the header of the widget you want to delete, click the button.
4. Click Delete.
5. Click Delete.
Tenable Vulnerability Management removes the widget from the widget plane, and a message
confirming the deletion appears at the top of the plane.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
In Tenable Vulnerability Management, you can create custom widgets to add to dashboards you
define, giving you custom views of your data.
- 158 -
To create a custom widget:
a. Edit a dashboard.
A menu appears.
l Bar
l Column
l Doughnut
l Matrix
l Multi-series Bar
l Multi-series Column
l Stacked Bar
l Stacked Column
l Table
3. In the Data Set drop-down, select the type of information Tenable Vulnerability Management
uses to update the widget:
- 159 -
l Vulnerabilities
l Assets
Note: If you selected ring chart or bar chart in the charts section, selecting the Assets dataset
resets the chart selection to a table.
The chart type, Data Grouping, and Display Fields options update based on your selection.
4. In the Group By drop-down box, select how you want to group the data:
Note: Some filters are unsupported by certain Group By options in specific environments and you
will not be able to select them. Please contact the Tenable support team in these cases.
Note: If you previously created a tag, it appears in the custom widget's list of filters.
Note: If you exceed the current asset query limitation of 5,000, a message appears in your interface.
Refine the query to a smaller set of asset tags.
Note: Tenable Vulnerability Management does not currently support tag filters in exports.
6. (Optional) To filter the widget data using an existing saved search, in the Saved Searches
drop-down box, select the saved search you want to use to filter your widget data.
- 160 -
Note: If you do not have any saved searches, this option does not appear. To create a new saved
search, see Saved Search.
8. (Optional) In the Description box, type a description for the custom widget.
In the Widget Preview, the icon appears and the description hover text updates
automatically.
Note: While Name, Description, and the chart type all update in the widget preview automatically, all
other configuration options refresh after you click Update Preview.
Tenable Vulnerability Management saves the custom widget to the widget library, and you can
add the widget to any user-defined dashboards.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, Administrator, or Custom Role with appropriate privileges
Required Tenable Web App Scanning User Role: Scan Operator, Standard, Scan Manager, or
Administrator
You can use the custom widget option to create uniquely defined widgets, which you can then add to
any user-defined Explore dashboards. You can create custom widgets with vulnerabilities and
assets data. Vulnerabilities can include host vulnerabilities, Tenable Web App Scanning
vulnerabilities, and vulnerabilities from Legacy Tenable Cloud Security. Adding a mix of these
custom widgets to your dashboard provides you with a holistic view of the vulnerability environment.
You can drill down from the custom widgets to the Findings and Assets pages.
- 161 -
1. Do one of the following:
b. In the upper-right corner of the page, click the New Custom Widget button.
a. Edit a dashboard.
A menu appears.
2. In the Chart Type section, select the chart type for your custom widget:
l Bar
l Column
l Doughnut
l Matrix
l Multi-series Bar
l Multi-series Column
l Stacked Bar
l Stacked Column
l Table
- 162 -
l Chart types for assets:
l Bar
l Column
l Doughnut
l Table
4. (Optional) In the Description box, type a description for the custom widget.
In the Widget Preview, the icon appears and the contextual description updates
automatically.
5. In the Data Set drop-down box, select the type of information Tenable Vulnerability
Management uses to update the widget:
l Findings
l Assets
The Chart Type, Group By, and Sort Fields options update based on your selection.
If you
Options
selected...
- 163 -
l Cloud Misconfigurations— Includes vulnerabilities from
Legacy Tenable Cloud Security.
b. In the Limit box, enter the number of records you want to show on
the widget. Type a number between 1 and 200.
c. In the Group By drop-down box, select how you want to group the
data. The values in the Group By drop-down changes based on
the Entity you select.
Note: For Bar, Column, Doughnut, and Table chart types, you
can select only one option to group vulnerabilities. For Matrix,
Multi-series Bar, Multi-series Column, Stacked Bar, and
Stacked Column chart types, you must select two options for
grouping vulnerabilities.
d. In the Stats drop-down box, select the statistics you want to show
on the widget.
For all chart types except Table, count is the default statistic
option. For the Table chart type, you can select from multiple
options.
e. In the Sort Fields drop-down box, select how you want to sort the
data on the widget. You can sort by one of these options:
l Count
l Value in Group By
f. In the Sort Order drop-down box, select whether you want the sort
in ascending or descending order.
a. In the Limit box, enter the number of records you want to show on
the widget. Type a number between 1 and 200.
- 164 -
b. In the Group By drop-down box, select how you want to group the
data:
l System Type
l Name
l Operating System
l SSH Fingerprint
l Mac Addresses
l Asset Types
Note: For Bar, Column, Doughnut, and Table chart types, you
can select only one option to group assets. For Matrix, Multi-
series Bar, Multi-series Column, Stacked Bar, and Stacked
Column chart types, you must select two options for grouping
assets.
c. In the Stats drop-down box, select the statistics you want to show
on the widget.
For all chart types except Table, count is the default statistic
option. For the Table chart type, you can select from multiple
options.
Note: Tenable recommends that you use simple instead of complex queries or one level of nested
filters when creating your custom widgets. Widgets can only have a maximum of one level of nested
filters, provided no additional context filters are applied when the widgets are added to the
dashboards. An example of a query with one level of nesting:
(CVSSv3 Base Score is greater than 8.9 OR VPR is greater than 8.9) AND State is
not equal to Fixed
- 165 -
b. Click the filter you want to apply.
d. In the first drop-down box, select the operator you want to apply to the filter.
e. In the second drop-down box, select one or more values to apply to the filter.
f. Select Match All from the drop-down box. By default, Tenable Vulnerability Management
sets the filter to Match All.
Note: While Name, Description, and the chart type all update in the widget preview automatically, all
other configuration options refresh after you click Update Preview.
Tenable Vulnerability Management saves the custom widget to the widget library, and you can
add the widget to any user-defined dashboards.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
3. In the upper-right corner of the widget you want to edit, click the button.
A menu appears.
- 166 -
4. Click Edit.
A confirmation appears.
Note: A custom widget that was previously included in dashboards before you edited the widget does not
update to reflect your edits. To include the edited widget, you must add the widget again as described in
Add a Widget to a Dashboard.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
Use the following steps to add a widget to your template-based and custom dashboards.
You can add custom widgets, widgets from Tenable-provided dashboards, and other general
purpose Tenable-provided widgets.
Note: These steps describe how to add a template widget to a dashboard. See custom widgets for
information on how to create custom widgets and add them to your dashboard.
Tip: You can hover over a widget tile for brief descriptions of each widget. For detailed
descriptions about widgets originating from Tenable-provided dashboards, see Tenable-
Provided Dashboards.
- 167 -
b. Roll over the widget you want to add.
d. In the Dashboards drop-down box, select the dashboard or dashboards to which you
want to add the widget.
e. Click Save.
Tenable Vulnerability Management adds the widget to the bottom of the appropriate
dashboard or dashboards.
f. Click Add.
Tenable Vulnerability Management adds the widget to the bottom of the appropriate
dashboard.
3. Click Done.
Configure a Widget
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
To configure a widget:
1. View the dashboard page that contains the widget you want to configure.
2. In the upper-right corner of the widget you want to change, click the button.
A menu appears.
3. Click Configure.
- 168 -
l
Rename the widget:
a. Do one of the following:
l In the widget summary plane, roll over the widget name and click the
button.
A confirmation message appears at the top of the page, and the new name
appears in the widget header.
l
Edit the widget description:
a. Do one of the following:
l In the widget summary plane, roll over the widget description and click the
button.
A confirmation message appears at the top of the page, and the new description
appears in the widget header.
l
Duplicate the widget:
o In the Actions row, click the button.
- 169 -
l
Delete the widget from the dashboard:
a. In the Actions row, click the button.
b. Click Delete.
l
Apply filters to the widget:
All Assets (Default) This option This is the default option and
includes all the assets in the includes all assets in the
dashboard. dashboard. There is not a
requirement for this option.
Custom This option only includes When you select this option, a text
assets with a specific box appears. Enter one or more of
hostname, IP address, the custom option formats
FQDN, or CIDR. (hostname, IP address, FQDN, or
CIDR). You must separate
multiple items with a comma.
Tags This option uses tags to filter When you select this option, a
asset results or vulnerability drop-down box appears. Select or
results. type the tag name by which you
want to filter results. Tenable
Note: Because the Vulnerability Management filters
ACR Widget uses Tenable
the results by the selected tags.
Lumin data, this widget
does not support filtering by
tag. Note: Tenable Vulnerability
Management supports a
maximum of 100 filters.
- 170 -
Note: Once you apply a filter to a widget, a icon appears in the widget header. Roll over the
icon to view the applied filter.
5. Click Apply.
Duplicate a Widget
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
To duplicate a widget:
1. View the dashboard page that contains the widget you want to duplicate.
2. In the upper-right corner of the widget you want to duplicate, click the button.
A menu appears.
3. Click Duplicate.
Rename a Widget
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
To rename a widget:
1. View the dashboard page that contains the widget you want to change.
2. In the upper-right corner of the widget you want to rename, click the button.
A menu appears.
- 171 -
3. Click Configure.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
1. View the dashboard page that contains the widget you want to remove.
2. In the upper-right corner of the widget you want to remove, click the button.
A menu appears.
3. Click Delete.
4. Click Delete.
Tenable Vulnerability Management removes the widget from the dashboard. Remaining
widgets adjust to fill the new space.
- 172 -
Scans
You can create, configure, and manage scans in Tenable Vulnerability Management.
Section Description
Manage Scans Create, import, and launch scans. View and manage scans and scan
results.
Scans (Unified Create, launch, and manage Tenable Vulnerability Management and
Configuration) Tenable Web App Scanning scans in the Tenable Vulnerability
Overview Management unified user interface.
Sensors Link your sensors, such as Tenable Nessus scanners, Tenable Agents,
and Tenable Network Monitors, to Tenable Vulnerability Management.
Note: For information about scanning in Tenable Web App Scanning, see the Tenable Web App Scanning
Getting Started Guide.
Manage Scans
To manage your Tenable Vulnerability Management and Tenable Web App Scanning scans in the
unified Scans user interface, see Scans Overview.
To manage your Tenable Web App Scanning scans in Tenable Web App Scanning, see the Tenable
Web App Scanning Getting Started Guide.
Scans Overview
The Scans page allows you to create, launch, and configure Tenable Vulnerability Management
scans and Tenable Web App Scanning scans.
Tip: Before you begin, check out the Tenable Vulnerability Management scan limitations.
- 173 -
Caution: Tenable occasionally performs maintenance on Tenable Vulnerability Management. To avoid
performance issues, Tenable recommends not running or scheduling scans during maintenance windows.
For current maintenance status and updates, see the Tenable Status page.
Create a Scan
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
In Tenable Vulnerability Management, you can create scans using scan templates. For general
information about templates and settings, see Scan Templates and Settings.
When you create a scan, Tenable Vulnerability Management assigns you owner permissions for the
scan.
Tip: To quickly target specific vulnerabilities that previous scans have identified on your assets, create a
Tenable Vulnerability Management remediation scan.
Note: If you are scanning a Linux machine with Tenable Vulnerability Management, the Linux machine's
shell configuration file must have a PS1 variable of four or more characters (for example, PS1='\u@\h:~\$
'). Having a PS1 variable of less than four characters (for example, PS1='\$ ') can drastically increase the
overall scan time.
l If you want to create a scan from a user-defined template, create a user-defined template as
described in Create a User-Defined Template.
l Create an access group for any targets you want to use in the scan and assign Can Scan
permissions to the appropriate users.
To create a scan:
- 174 -
1. In the left navigation, click Scans.
2. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
This also determines whether you are creating a Tenable Vulnerability Management or
Tenable Web App Scanning scan.
3. In the upper-right corner of the page, click the Create a Scan button.
l If you are creating a Tenable Vulnerability Management scan, use the following
procedure:
a. Click the Nessus Scanner, Nessus Agent, or User Defined tab to view available
templates for your scan.
Note: Users with Scan Operator permissions can see and use only the user-defined
templates shared with their account.
b. Click the tile for the template you want to use for your scan.
Tab Action
- 175 -
schedule the scan, and who has permissions
for the scan.
l If you want to save and launch the scan immediately, click Save & Launch.
- 176 -
Note: If you scheduled the scan to run at a later time, the Save & Launch option is
not available.
Note: If you are editing an imported scan, the Save & Launch option is not
available.
l If you are creating a Tenable Web App Scanning scan, use the following procedure:
a. Click the Web Application or User Defined tab to view available templates for your
scan.
Note: Users with Scan Operator permissions can see and use only the user-defined
templates shared with their account.
b. Click the tile for the template you want to use for your scan.
Tab Action
Scope Specify the URLs and file types that you want to include in
or exclude from your scan. For more information, see
Scope Settings in Tenable Web App Scanning Scans.
- 177 -
Tenable Web App Scanning Scans.
l If you want to save and launch the scan immediately, click Save & Launch.
Note: If you scheduled the scan to run at a later time, the Save & Launch option is
not available.
Note: If you are editing an imported scan, the Save & Launch option is not
available.
View Scans
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
You can view configured and imported scans. If you have appropriate permissions, you can also
perform actions to manage the scans.
Note: You can export the archived scan results, but you cannot view them in Tenable Vulnerability
Management. This limitation applies to both imported scan results and scan results that Tenable
Vulnerability Management collects directly from scanners. After 15 months, Tenable Vulnerability
Management removes the scan data entirely.
- 178 -
l Create or import one or more scans.
2. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
3. In the Folders section, click a folder to load the scans you want to view.
The scans table updates to display the scans in the folder you selected.
For more information about scan folders, see Organize Scans by Folder.
Section Action
Search box Search the table by scan name or status. For more information, see
Tables.
Create In the upper-right corner, click the Create Scan button to create a new
Scan scan.
button
Tools In the upper-right corner, click the Tools button. A menu appears with
button the following options:
l Manage Sensors
l Manage Credentials
l Manage Exclusions
- 179 -
If you have assigned permissions for the scan to other users,
the label Shared appears next to the scan name.
l Last Run — The date and time the scan was last run.
l Launch a scan.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
You can view scan results for scans you own and scans that were shared with you.
l You can view details for an individual scan based on the permissions configured for the scan.
However, when you view aggregated scan results in dashboards and other analysis views (for
- 180 -
example, the Vulnerabilities or Assets tables), your access is based on the access groups
you belong to.
l You can export the archived scan results, but you cannot view them in Tenable Vulnerability
Management. This limitation applies to both imported scan results and scan results that
Tenable Vulnerability Management collects directly from scanners. After 15 months, Tenable
Vulnerability Management removes the scan data entirely.
l When you view results from the latest run of the scan, Tenable Vulnerability Management
categorizes the scan as Read. The Read status is specific to your user account only. You can
also manually change the read status.
l Tenable Vulnerability Management retains scan data for 15 months. If you want to store scan
data for longer than 15 months, you can export the scan data for storage outside of Tenable
Vulnerability Management.
l You can view a maximum of 5,000 rows at a time in the Vulns by Asset table.
2. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
3. In the Folders section, click a folder to load the scans you want to view.
The scans table updates to display the scans in the folder you selected.
4. In the scan table, click the scan where you want to view details.
The scan details plane appears below the scan table. By default, this plane shows details for
the latest run of the scan.
Section Action
- 181 -
l Export scan results.
l Copy a scan.
See All Details button Click the See All Details button to open the Scan
Details page and view the scan's vulnerabilities and
affected assets, target information, and scan history.
You can also use the Scan Details page to export the
scan, edit the scan configuration, move the scan to the
trash folder, and submit the scan for PCI validation.
Page header
l (Rollover scans only) Download a list of a rollover
scan's remaining targets.
Severity summaries
The number of vulnerabilities with a Critical, High,
Medium, and Low severity in the scan results.
Details section
View details about the scan run:
- 182 -
l Status — The status of the scan.
l Start Time — The start date and time for the scan.
Note: This tab does not appear for scan results older than
35 days.
- 183 -
identified the vulnerability.
Tip: This tab does not appear for scan results older than
35 days.
- 184 -
o Agent Name (if agent-scanned)
o NetBIOS Name
o FQDN
o IPv4 address
- 185 -
table.
Audit tab
View compliance audit check results. This tab only
appears if the scan results include data from
compliance audit checks.
Tip: This tab does not appear for scan results older than
35 days.
- 186 -
The Audit Details page appears.
Summary tab
(Rule-based scans only) Shows the scan's description,
triggers, an explanation of rule-based scanning, and a
link to the vulnerabilities workbench.
Warnings tab
View warnings about problems Tenable Vulnerability
Management or the scanner encountered while
running the scan. This tab only appears if Tenable
Vulnerability Management or the scanner encountered
an issue while running the scan. This tab does not
appear for scan results older than 35 days.
Remediations tab
View remediation details.
- 187 -
Note: The Remediation tab only appears if there are
known remediations for the scan.
History tab
View the scan history.
This tab contains a table listing each time the scan has
run. For the scan run currently displaying in the Scan
Details page, Tenable Vulnerability Management adds
the label Current to the run. By default, the latest scan
run is labeled Current.
- 188 -
l View summary information about each time the
scan was run:
In this section, you can view the date and time when
the scan Started, Completed, and when it was
Modified, Canceled, or manually Aborted.
- 189 -
Vulnerabilities by The number of vulnerabilities with a Critical, High,
Severity/VPR Breakdown Medium, and Low severity in the scan results.
section
Scan Duration section The amount of time elapsed between the start and end
of the scan.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
You can view a scan's vulnerability details by plugin or by asset (Tenable Vulnerability Management
scans only) from the Scans section.
3. In the Folders section, click a folder to load the scans you want to view.
The scans table updates to display the scans in the folder you selected.
4. In the scans table, click the scan where you want to view details.
The scan details plane appears below the scan table. By default, this plane shows details for
the latest run of the scan.
- 190 -
5. In the scan details plane, click the See All Details button.
The Scan Details page appears. The Vulns by Plugin tab shows by default.
6. If you would rather view vulnerabilities by the affected asset, click the Vulns by Asset tab.
Note: You can view a maximum of 5,000 rows at a time in the Vulns by Asset table.
7. From either the Vulns by Plugin tab or the Vulns by Asset tab, do one of the following:
l On the Vulns by Plugin tab, click a vulnerability to view its details. For more information,
see View Finding Details.
l On the Vulns by Asset tab, click an asset row to view its vulnerability details. For more
information, see View Asset Details.
Scan Filters
On the Scans page, you can filter scans using Tenable-provided filters. The Tenable Vulnerability
Management scan view allows you to filter by scan status, and the Tenable Web App Scanning scan
view allows you to filter by multiple values.
Filter Description
Created Date (Tenable Web App The date the scan configuration was created.
Scanning scans only)
Finalized Date (Tenable Web App The date on which the scan last completed.
Scanning scans only)
- 191 -
Last Modified Date (Tenable Web App The date on which the scan configuration was last
Scanning scans only) modified.
Last Scanned Date (Tenable Web The date on which the scan was last ran.
App Scanning scans only)
Name (Tenable Web App Scanning The name of the scan configuration.
scans only)
Target (Tenable Web App Scanning The target URL used to launch the scan.
scans only)
Template (Tenable Web App The Tenable-provided scan template the scan
Scanning scans only) configuration was based on.
User Template (Tenable Web App The user-defined scan template the scan
Scanning scans only) configuration was based on.
Launch a Scan
In addition to configuring a scan's Schedule settings to launch the scan at scheduled times, you can
launch a scan manually. You can only launch a new scan when the previous scan has the
Completed, Aborted, or Canceled status (for more information, see Scan Status).
Alternatively, you can launch a rollover scan to scan the remaining targets of a previous scan that
ended prematurely (for more information, see Launch a Rollover Scan). You can also launch a
remediation scan to run a follow-up scan against existing scan results (for more information, see
Launch a Remediation Scan).
Note: If you are scanning a Linux machine with Tenable Vulnerability Management, the Linux machine's
shell configuration file must have a PS1 variable of four or more characters (for example, PS1='\u@\h:~\$
'). Having a PS1 variable of less than four characters (for example, PS1='\$ ') can drastically increase the
overall scan time.
- 192 -
Note: To learn more about scan limitations in Tenable Vulnerability Management, see Scan Limitations.
Launch a Scan
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
Use the following steps to launch a scan manually. You can launch the scan using the targets as
configured in the scan, or you can launch the scan with custom targets that override the configured
targets.
To launch a scan:
2. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
3. In the Folders section, click a folder to load the scans you want to view.
The scans table updates to display the scans in the folder you selected.
For more information about scan folders, see Organize Scans by Folder.
4. In the scans table, roll over the scan you want to launch.
l To launch the scan using the targets as configured in the scan, click the button in the
row.
l If you have previously launched the scan and want to use custom targets that override
the configured targets:
- 193 -
b. In the Targets box, type a comma-separated string of targets.
c. Click Launch.
You can follow the scan's progress by checking its Scan Status on the Scans page.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
When you launch a rollover scan, the scan runs only against targets and hosts that Tenable
Vulnerability Management did not scan previously. This happens when a scan ends before scanning
all the assigned targets, which can occur when:
In some cases, you may see Completed scans that you can perform rollover scans for. This
indicates that even though all the assigned targets were scanned, some individual scan tasks may
have failed.
Rollover scans allow you to achieve complete scan coverage for all your assets, and you can use
the rollover feature to split up large, network-impacting scans. You can launch a rollover scan from
Scans page. Tenable Vulnerability Management marks scans that you can launch a rollover scan
for in the scan table with the Rollover tag in the Name column.
To view the remaining targets that the rollover scan will run against, see Download Rollover Targets.
If you want to restart the scan and rescan all the targets, see Launch a Scan.
- 194 -
1. In the left navigation, click Scans.
2. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
3. In the Folders section, click a folder to load the scans you want to view.
The scans table updates to display the scans in the folder you selected.
For more information about scan folders, see Organize Scans by Folder.
4. In the scans table, roll over the scan you want to launch.
A menu appears.
You can follow the scan's progress by checking its Scan Status on the Scans page.
Required Tenable Vulnerability Management User Role: Standard, Scan Manager, or Administrator
You can create a remediation scan to run a follow-up scan against existing scan results. A
remediation scan evaluates a specific plugin against a specific scan target or targets where a
vulnerability was present in your earlier active scan.
Remediation scans allow you to validate whether your vulnerability remediation actions on the scan
targets have been successful. If a remediation scan cannot identify a vulnerability on targets where
the vulnerability was previously identified, the system changes the status of the vulnerability to
Fixed.
Tenable Vulnerability Management automatically creates remediation scans from the Tenable-
provided Advanced Network Scan template and populates certain settings based on the assets and
vulnerabilities you selected.
You can perform remediation scans for scan results from certain sensors only:
- 195 -
Sensor Type Supported?
Tenable Agent no
To learn more about scan limitations in Tenable Vulnerability Management, see Scan Limitations.
- 196 -
1. Set the scope for the remediation scan:
Remediation Scan
Action
Scope
- 197 -
vulnerabilities on all
affected assets
Tenable Vulnerability Management automatically creates the remediation scan from the
Tenable-provided Advanced Network Scan template and populates certain settings based on
the assets and vulnerabilities you selected.
- 198 -
a. Verify the settings that Tenable Vulnerability Management populated based on the
vulnerabilities and assets you selected.
The number of manual changes you must make depends on the plugins involved in the
remediation scan.
The following table defines the inherited and default values for settings in the remediation
scan.
Setting
Setting Remediation Scan Value
Category
- 199 -
scan load among multiple scanners.
o Rebuild scanners and link new
scanners in the future without having
to update scanner designations in
scan configurations.
- 200 -
Network Scan template.
- 201 -
appropriate settings.
l If you want to save and launch the scan immediately, click Save & Launch.
Note: If you scheduled the scan to run at a later time, the Save & Launch option is not
available.
What to do next:
l In the Remediation Scans folder on the Scans page:
o View the scan status to determine when the scan completes.
o Edit the scan configuration.
o Change the read status of the scan results.
o Launch the scan.
b. Verify that the status for the selected vulnerabilities is now Fixed on the assets that the
remediation scan targeted.
- 202 -
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
When you stop a scan, Tenable Vulnerability Management terminates all tasks for the scan and
categorizes the scan as canceled. The scan results associated with the scan reflect only the
completed tasks. You cannot stop individual tasks, only the scan as a whole.
2. In the scans table, roll over the scan you want to stop.
A menu appears.
4. Click Stop.
Tenable Vulnerability Management stops the scan. The Status column updates to reflect the
status of the scan.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
You can pause scans that you want to stop temporarily. When you pause a scan, Tenable
Vulnerability Management pauses all active tasks for that scan and concludes the scanner's local
scan task. Paused scans do not consume scanner resources, and other scans can run while there is
a paused scan. Tenable Vulnerability Management does not dispatch new tasks from a paused scan
- 203 -
job. If the scan remains in a paused state for more than 14 days, the scan times out. Tenable
Vulnerability Management terminates the related tasks on the scanner and categorizes the scan as
aborted.
You can resume scans that you previously paused. When you resume a scan, Tenable Vulnerability
Management instructs the scanner to start the tasks from the point at which the scan was paused. If
Tenable Vulnerability Management encounters problems when resuming the scan, the scan fails,
and Tenable Vulnerability Management categorizes the scan as aborted. Tenable Vulnerability
Management does not dispatch new tasks from a paused scan job. If the scan remains in a paused
state for more than 14 days, the scan times out. Tenable Vulnerability Management terminates the
related tasks on the scanner and categorizes the scan as aborted.
- 204 -
l If the scan is based on a user-defined template, assign the new owner at least Can View
permissions for that template. Otherwise, the new owner cannot view the scan configuration.
Note: Only the scan owner can change scan ownership. Therefore, if an administrator needs to change the
ownership of another user's scan, they must first assist the user with their account and then assign
ownership to the appropriate user.
2. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
3. In the Folders section, click a folder to load the scans you want to view.
The scans table updates to display the scans in the folder you selected.
4. (Optional) Search for the scan you want to edit. For more information, see Tables.
8. In the User Permissions section, next to the permission drop-down for Owner, click the
button.
Tenable Vulnerability Management automatically adds you to the list of users and assigns Can
View permissions to your user account.
- 205 -
10. (Optional) Remove all permissions for your user account:
Tenable Vulnerability Management removes your account from the list of users.
11. (Optional) Edit the Tenable Vulnerability Management permissions for your user account:
a. Next to the permission drop-down for your user account, click the button.
b. Select a permission.
Tenable Vulnerability Management assigns ownership to the selected user and assigns your
user account the permissions you selected. If you removed all permissions for your user
account from the scan, the scan no longer appears in any of your scan folders.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
On the Scans page, a scan appears in bold in the scans table if you have not yet viewed (read) the
results of the latest run of the scan.
If you view the scan results, Tenable Vulnerability Management categorizes the scan as "read" and
removes the bold formatting from the scan in the scans table.
2. In the scans table, roll over the scan you want to change.
- 206 -
3. Click the button.
A menu appears.
Tenable Vulnerability Management changes the read status for the scan.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
2. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
3. In the Folders section, click a folder to load the scans you want to view.
The scans table updates to display the scans in the folder you selected.
4. (Optional) Search for the scan you want to edit. For more information, see Tables.
7. Change the scan configuration. For more information about scan configuration settings, see
Scan Settings.
- 207 -
8. Do one of the following:
l If you want to save and launch the scan immediately, click Save & Launch.
Note: If you scheduled the scan to run at a later time, the Save & Launch option is not
available.
Note: If you are editing an imported scan, the Save & Launch option is not available.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
l Virtual machines
Note: You must provide an IPv4 address when scanning an ESXi host. Otherwise, the scan fails.
Configuring the vCenter API or ESXi API credentials enables the collection of VMware Installation
Bundle (VIB) package details for ESXi servers, which are used in the ESX Local Security Checks
plugin family. Both of these credentials enable the collection of ESXi VIBs. Configuring an SSH
credential to a targeted ESXi server also enables the collection of VIBs.
In addition to collection of ESXi VIBs, the vCenter credential enables auto-discovery of ESXi servers
and vCenter compliance checks. In the case of vCenter compliance checks, the vCenter server
must be configured as a target.
- 208 -
These credentials do not collect any host-level data about the vCenter server. To collect host-level
data, configure an additional credential to the vCenter server (for example, SSH or Windows).
Tenable also collects ESXi and vCenter versions by detecting the software on the targeted hosts
using remote, unauthenticated checks. Current vCenter and ESXi vulnerability results are based on
this data.
3. In the Targets section, type the IP address or addresses of the ESXi host or hosts.
The Credentials page appears. This page contains a table of credentials configured for the
scan.
7. In the Username box, type the username associated with the local ESXi account.
8. In the Password box, type the password associated with the local ESXi account.
9. If your vCenter host includes an SSL certificate (not a self-signed certificate), disable the Do
not verify SSL Certificate toggle. Otherwise, leave the toggle enabled.
- 209 -
l If you want to save without launching the scan, click Save.
l If you want to save and launch the scan immediately, click Save & Launch.
Note: If you scheduled the scan to run at a later time, the Save & Launch option is not
available.
Note: If you are editing an imported scan, the Save & Launch option is not available.
Note: When scanning vCenter-managed ESXis with API credentials, the Nessus Scan information plugin
always shows Credentialed Checks: No in the vCenter scan results. To verify that the authentication
was successful, check to see that the Nessus Scan Information plugin shows Credentialed Checks:
Yes in the scan results of the ESXis.
Note: Listing the vCenter as a target results in the scan collecting the vCenter version and its
vulnerabilities, but not operating system-level details. Listing the vCenter server as a target is also
required for vCenter compliance scanning.
- 210 -
The Credentials page appears. This page contains a table of credentials configured for the
scan.
7. In the vCenter Host box, type the IP address of the vCenter host.
8. In the vCenter Port box, type the port for the vCenter host. By default, this value is 443.
9. In the Username box, type the username associated with the vCenter account.
10. In the Password box, type the password associated with the vCenter account.
11. If the vCenter host is SSL enabled, enable the HTTPS toggle.
12. If your vCenter host includes an SSL certificate (not a self-signed certificate), enable the Verify
SSL Certificate toggle. Otherwise, leave the toggle disabled.
l If you want to save and launch the scan immediately, click Save & Launch.
Note: If you scheduled the scan to run at a later time, the Save & Launch option is not
available.
Note: If you are editing an imported scan, the Save & Launch option is not available.
- 211 -
VMware vCenter Support Matrix
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
When you copy a scan configuration, Tenable Vulnerability Management assigns you owner
permissions for the copy and assigns the copy scan permissions from the original scan.
Note: You cannot copy a scan from the Remediation Scans folder.
2. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
3. In the Folders section, click a folder to load the scans you want to view.
The scans table updates to display the scans in the folder you selected.
4. In the scans table, roll over the scan you want to copy.
A menu appears.
- 212 -
6. Click Copy.
The Copy to Folder plane appears, which contains a list of your scan folders.
8. Click Copy.
Tenable Vulnerability Management creates a copy of the scan with Copy of prepended to the
name and assigns you owner permissions for the copy. The copy appears in the scans table of
the folder you selected.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
You can export both imported scan results and results that Tenable Vulnerability Management
collects directly from scanners.
Tenable Vulnerability Management retains individual scan results until the results are 15 months
old.
Notes:
l Filters are not applicable for Tenable Web App Scanning exports, All results will are
exported.
l For archived scan results (that is, results older than 35 days), Tenable Vulnerability
Management limits export types to .nessus and .csv files.
l When a scan is actively running, the Export button does not appear in the Tenable
Vulnerability Management interface. Wait until the scan completes, then export the scan
results.
- 213 -
2. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
3. In the Folders section, click a folder to load the scans you want to view.
The scans table updates to display the scans in the folder you selected.
Scans table a. In the scans table, roll over the scan you want to export.
A menu appears.
c. Click Export.
Note: You cannot export scan results from the Scans table if the scan has
multiple targets. For scans with multiple targets, you can export scan results
for each target from the Scan Details page.
Scan a. In the scans table, click the scan you want to export.
Details
The scan details plane appears below the scan table.
A menu appears.
c. Click Export.
Supported for
Format Description Archived
Scan Results
- 214 -
PDF - An Adobe .pdf file. No
Custom
Note:Tenable Vulnerability Management cannot export
PDF files with more than 400,000 individual scan
results.
Nessus A .nessus file in XML format that contains the list of Yes
targets, scan settings defined by the user, and scan
results. Tenable Vulnerability Management strips
password credentials and does not export them as
plain text in the XML. If you import a .nessus file as a
user-defined scan template, you must re-apply your
passwords to any credentials.
- 215 -
Note: When exporting scan results as a .csv file,
the severities always show CVSSv2 scores
regardless of your configured severity metric.
When exporting compliance scan results as a
.csv file, the Risk column results are replaced
with the following values:
l PASSED results show as None
l WARNING results show as Medium
l FAILED results show as High
PDF An Adobe .pdf file that contains the list of targets, n/a
scan results, and scan notes.
Nessus A .nessus file in XML format that contains the list of n/a
targets, scan settings defined by the user, and scan
results. Tenable Vulnerability Management strips
password credentials and does not export them as
plain text in the XML.
JSON A .json file that contains the list of targets, scan n/a
settings defined by the user, scan results, and scan
notes. Tenable Vulnerability Management strips
password credentials and does not export them as
plain text in the JSON file.
- 216 -
6. For Tenable Vulnerability Management scans, if you select the PDF - Custom or HTML -
Custom formats:
l In the Data section, select the Vulnerabilities, Audits, and Remediations checkboxes to
include vulnerability data, audit (compliance), and remediation patch information in the
export, respectively. You can also leave them unselected to omit the relevant data from
the export.
The Data section options available for each scan result vary depending on the scan
result's data. For example, if the scan result does not include remediation patch
information, the Remediations checkbox does not show.
l In the Group by section, select Asset to group vulnerabilities, audits, and remediations
by asset, or select Plugin to group them by plugin.
7. Click Export.
Tenable Vulnerability Management generates the export file. Depending on your browser
settings, your browser may automatically download the export file to your computer, or may
prompt you to confirm the download before continuing.
Import a Scan
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
Imported scans always belong to the default network. For more information, see Networks.
- 217 -
A menu appears.
If the scan file is a .nessus or .db file, the Import plane appears.
Note: To learn more about the .nessus file format, see Nessus File Format.
If the scan file is any other file type, the Scan Import window appears.
c. Click Import.
l If the scan file is any other file type, specify if you want the scan results to appear in
dashboards:
o Click Yes to show the scan results in dashboards.
o Click No to prevent the scan results from appearing in dashboards.
The Scans page appears, and the imported scan appears in the scans table.
Tenable Vulnerability Management begins processing the imported scan results. Once this
process is complete, the imported data appears in the individual scan details and aggregated
data views (such as dashboards). This process can take up to 30 minutes, depending on the
size of the import file.
- 218 -
Tip: If the imported data does not appear in the individual scan results or aggregated data views after
a reasonable processing time, verify that you are assigned adequate permissions for the imported
targets in access groups.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
In Tenable Vulnerability Management, the Scans page contains a Folders section that automatically
groups your configured and imported scans into default folders. To organize your scans further, you
can create custom folders.
Folder Description
This folder appears by default when you access the Scans page.
Remediation Contains any remediation scans you own or that another user has
Scans shared with you.
- 219 -
Trash Contains scans that you have moved to the trash. If you have Can
Configure permissions for a scan in this folder, you can permanently
delete the scan for all users.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
The custom scan folders you create appear only to you and cannot be shared with other users. You
are the only user who can view, rename, or delete the scan folders you create.
Note: The custom folders you create appear only to you and cannot be shared with other users.
The New Folder box appears at the bottom of the folder list.
A Folder added successfully message appears and the new folder appears in the Folders
section.
- 220 -
Move a scan to a scan folder
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
You can move a scan from a default folder to either the My Scans default folder or a custom scan
folder. You can also move a scan from a custom folder to the My Scans default folder or a different
custom folder.
If you move a scan from the All Scans default folder, the scan appears in both the folder you select
and the All Scans folder.
If you move a scan from the My Scans default folder, the scan appears in the custom folder only.
For information about moving a scan to the trash, see Move a Scan to the Trash Folder.
Note: You cannot move scans to or from the Remediation Scans folder.
2. In the Folders section, click a folder to load the scans you want to view.
The scans table updates to display the scans in the folder you selected.
3. In the scan table, roll over the scan you want to move.
A menu appears.
- 221 -
b. In the menu, click Move.
The Move to Folder plane appears. This plane contains a list of your scan folders.
The Move to Folder plane appears. This plane contains a list of your scan folders.
Tenable Vulnerability Management limits the list to folders that match your search.
6. In the folder list, click the folder where you want to move the scan.
7. Click Move.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
You can rename custom scan folders only. You cannot rename the default scan folders.
Renaming a scan folder affects your user account only, because the custom folders you create
appear only to you and cannot be shared with other users.
2. In the Folders section, roll over the folder you want to rename.
- 222 -
An editable box replaces the folder name.
Tenable Vulnerability Management updates the folder name and a Folder updated
successfully message appears.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
You can delete custom scan folders only. You cannot delete the default scan folders that Tenable
Vulnerability Management provides (All Scans, My Scans, and Trash).
Deleting a scan folder affects your user account only, because the custom folders you create appear
only to you and cannot be shared with other users.
If you delete a scan folder that contains inactive scans, Tenable Vulnerability Management moves
the folder's scans to the Trash folder. If you delete a scan folder that contains at least one active
(Pending or Running) scan, Tenable Vulnerability Management moves the folder's scans to the My
Scans folder.
2. In the Folders section, roll over the folder you want to delete.
- 223 -
Move a Scan to the Trash Folder
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
When you move a shared scan to the Trash folder, Tenable Vulnerability Management moves the
scan for your account only. The scan remains in the original folder for all other users who have Can
View permissions or higher for the scan.
Scans moved to the Trash folder also appear in the All Scans folder, marked with the label, Trash.
Note: After you move a scan to the Trash folder, the scan remains in the Trash folder until the scan owner
or an administrator permanently deletes the scan.
Note: Scheduled scans do not run if they are in the scan owner's Trash folder.
l For more information about Tenable Vulnerability Management scan schedules, see
Schedule.
l For more information about Tenable Web App Scanning scan schedules, see Schedule.
Note: You cannot move scans from the Remediation Scans folder to the Trash folder. Instead, delete
remediation scans directly in the folder.
2. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
3. In the Folders section, click the folder that contains the scan you want to move.
- 224 -
l
Select a single scan:
a. In the scans table, roll over the scan you want to move.
A menu appears.
c. Click Trash.
l
Select multiple scans:
a. In the scans table, select the check box next to each scan you want to move.
Tenable Vulnerability Management moves the scan or scans you selected to the Trash
folder.
Delete a Scan
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
When you permanently delete a scan, you delete the scan configuration and scan results for all
users the scan is shared with.
The workflow for deleting a remediation scan differs from the workflow described in this procedure.
For more information, see the Delete a remediation scan steps at the end of this topic.
Caution: After you delete a scan, you cannot recover the scan or any scan data associated with the scan.
Delete only scans you are certain you no longer need to view or run.
To delete a scan:
- 225 -
1. In the left navigation, click Scans.
2. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
The scan table updates to show the scans in the trash folder.
l
Select a single scan:
a. In the scans table, roll over the scan you want to delete.
A menu appears.
c. Click Delete.
l
Select multiple scans:
a. In the scans table, select the check box next to the scans you want to delete.
When you delete a remediation scan, you delete the scan configuration and scan results for all users
the scan is shared with.
- 226 -
Note:Tenable Vulnerability Management deletes scan results older than 90 days.
Note: The Remediation Scans folder only shows for Tenable Vulnerability Management scans.
The scan table updates to show remediation scans that you own or that other users have
shared with you. By default, the rows are sorted by Created Date.
l
Select a single scan:
a. In the scans table, roll over the scan you want to delete.
A menu appears.
c. Click Delete.
l
Select multiple scans:
a. In the scans table, select the check box next to the scans you want to delete.
- 227 -
Tenable Vulnerability Management deletes the scan or scans you selected.
Note: Tenable Vulnerability Management keeps up to 10,000 of the most recent remediation scan
results. Once you have more than 10,000 remediation scan results, Tenable Vulnerability
Management deletes the scan results, starting with the oldest result.
For information about how discovered and assessed assets are counted towards your license, see
Tenable Vulnerability Management Licenses.
Authenticated Scans
- 228 -
adding access credentials to your
assessment scan configuration.
Unauthenticated Scans
- 229 -
discovery mode, or connectors). Assets that have been seen but not assessed do not count towards
your asset license limit. For a list of conditions that cause an asset to be assessed, see How Assets
are Counted. However, once assessed, the asset is always categorized as assessed, even if it ages
out of the license count.
This licensing exception allows you to discover assets on your network without the large number of
assets counting towards your license limit. After you discover your assets, you can then identify
which assets have not yet been assessed for vulnerabilities, and choose which of those assets you
want to scan and manage going forward.
l Configure Tenable Network Monitor with discovery mode enabled, linked to Tenable
Vulnerability Management.
l Configure a connector.
Assets discovered by these methods do not count towards your asset license limit until they
have been assessed for vulnerabilities.
a. Click Apply.
Tenable Vulnerability Management filters for assets that have not yet been assessed for
vulnerabilities.
Note: Unassessed assets (where Asset Assessed is equal to false) can differ from unlicensed
assets (where Is Licensed (VM) is equal to false). Once you scan an asset for vulnerabilities,
Tenable Vulnerability Management categorizes the asset as assessed from that point on, but
- 230 -
the licensing status of an asset can change over time as assets are deleted or age out of your
organization's license count.
3. (Optional) Tag assets to identify assets that have not been assessed.
b. Manually apply the tag to assets, or create tag rules that automatically filter for assets
that have not been assessed.
For example, to create a dynamic tag for assets that have not yet been assessed, set the
tag rules to filter for Asset Assessed is equal to false.
4. (Optional) Create a scan to target assets using the tag you created.
Scan Failovers
If Tenable Vulnerability Management assigns a scan job to a scanner, and the scanner goes offline
while scanning, the following happens:
1. The scan job times out if the assigned scanner does not respond to Tenable Vulnerability
Management after two hours.
2. Tenable Vulnerability Management removes the scan job from the scanner and attempts the
scan job on another scanner in the same scanner group, or on the same scanner if it comes
back online.
3. Tenable Vulnerability Management attempts steps 1 and 2 three times. If the scan job is not
completed after three attempts, Tenable Vulnerability Management aborts the scan job.
Scan Status
Tenable Vulnerability Management provides a scan status for each of your configured scans.
If the scan is in progress, Tenable Vulnerability Management shows the number of scan tasks
completed as a percentage.
- 231 -
For example, if you scan less than 120 IP addresses in a single scan, Tenable Vulnerability
Management creates a single scan task and the progress percentage changes from 0% to 100%
when it completes.
However, if you target more than 120 IP addresses, Tenable Vulnerability Management creates
multiple scan tasks. After each task completes, the percentage changes to reflect the number of
completed tasks. For example, a scan that targets 300 IP addresses is split into three scan tasks,
and as each task completes, the progress bar updates the percentage to reflect the completed
tasks.
Note: Pausing a scan causes Tenable Vulnerability Management to move any completed results to
processing. When you resume the scan, Tenable Vulnerability Management creates a new scan task or
tasks for incomplete results. Therefore, pausing a scan can cause the progress percentage to update.
Tip: For Tenable Vulnerability Management scans, you can hover over the scan status to view more status
information in a pop-up window, such as the number of targets scanned and the elapsed or final scan time.
The window shows different information based on the scan's current status.
Tenable Vulnerability Management scans can have the following status values:
Status Description
Tip: The typical Tenable Vulnerability Management scan status flow is as follows: Initializing,
Running, Publishing Results, Completed.
Aborted Either the latest run of the scan is incomplete because Tenable Vulnerability
Management or the scanner encountered problems during the run, or the
scan remained queued without running for four or more hours. For more
information about the problems encountered during the run, view the scan
warnings.
Disabled (Triggered agent scans only) The scan configuration is disabled and does not
launch scans based on the configured triggers. You can enable or disable
- 232 -
Status Description
Empty The scan is either empty (the scan is new or has yet to run) or pending
(Tenable Vulnerability Management is processing a request to run the scan).
Enabled (Triggered agent scans only) The scan configuration is enabled and launches
scans based on the configured triggers. You can enable or disable triggered
agent scan configurations in the scan table's Actions menu.
Imported A user imported the scan. You cannot run imported scans. Scan history is
unavailable for imported scans.
Pending Tenable Vulnerability Management has the scan queued to launch and is
assigning scan tasks to the assigned sensors.
Publishing Tenable Vulnerability Management processes and stores the scan results
Results data for you to view and use in the Tenable Vulnerability Management user
interface. The Publishing Results status begins once the Running status
reaches 100%.
- 233 -
Status Description
Running The scan is currently running. While this status is shown, the scan's sensors
complete their assigned scan tasks, and Tenable Vulnerability Management
processes the scan results. The progress bar shows next to the status when a
scan is running. The progress bar shows the percentage of the completed
tasks.
Stopping A user stopped the scan, the scan timed out or reached the end of the
configured scan window, or Tenable Vulnerability Management is stopping
the scan after all associated scan tasks are complete.
Shared Collections
On the Scans page in Tenable Vulnerability Management, you can create and manage shared
collections. Shared collections allow you to quickly and conveniently share scan configurations with
specific groups and other Tenable Vulnerability Management users.
- 234 -
Note: Shared collections are only available for vulnerability management scans.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
- 235 -
The Create Shared Collection pane opens.
Setting Description
Add Users or Determines what users and groups have access to the shared
Groups collection. To add a new user or group:
b. Search for and select the user or group that you want to add
permission for.
Tip: You can scroll to the bottom of the dropdown and select All
Users to set global permissions.
- 236 -
or higher for shared collections (or a custom role with the
Manage Shared Collections privilege). After you give a group
Can Edit access, you can add users with lower privileges to
the group, but those users are not able to modify the shared
collection.
4. Click Save.
Tenable Vulnerability Management creates the new shared collection. You can view the new
collection under the Shared Collections header on the Scans page.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
Note: To add a scan configuration to a shared collection, you must have Can View permission or higher for
the scan configuration you are adding and Can Edit or Owner permission for the shared collection you are
adding to.
2. Search for the scan or scans that you want to add to a shared collection.
a. In the scan row of the scan table, right-click or click in the Actions column.
- 237 -
a. In the scans table, select the checkboxes of each scan that you want to add.
5. Click Save. Tenable Vulnerability Management adds the scan or scans to the shared
collection.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
Note: To remove a scan configuration from a shared collection, you must have Can View permission or
higher for the scan configuration you are removing and Can Edit or Owner permission for the shared
collection you are removing from.
2. In the Shared Collections section, open the shared collection you want to remove scans from .
a. In the scan row of the scan table, right-click or click in the Actions column.
- 238 -
a. In the scans table, select the checkboxes of each scan that you want to remove.
4. Click Continue. Tenable Vulnerability Management removes the scan or scans from the
shared collection.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
2. In the Shared Collections section, hover over the shared collection you want to edit.
- 239 -
4. Edit the following settings as needed:
Setting Description
Add Users or Determines what users and groups have access to the shared
Groups collection. To add a new user or group:
b. Search for and select the user or group that you want to add
permission for.
Tip: You can scroll to the bottom of the dropdown and select All
Users to set global permissions.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
- 240 -
Note: Only the shared collection's Owner can delete the shared collection.
2. In the Shared Collections section, hover over the shared collection you want to delete.
The shared collection is deleted. The scan data in the deleted shared collection is still
available in your standard folders.
Scan Templates
Scan templates contain granular configuration settings for your scans. You can use Tenable's scan
templates to create custom scan configurations for your organization. Then, you can run scans
based on Tenable's scan templates or your custom configurations' settings.
When you create a scan configuration, the Select a Scan Template page appears. Tenable
Vulnerability Management provides separate templates for Tenable Vulnerability Management and
Tenable Web App Scanning. Within Tenable Vulnerability Management scanning, Tenable
Vulnerability Management provides separate templates for scanners and agents, depending on
which sensor you want to use for scanning:
If you have custom configurations, they appear in the User Defined tab. For more information about
user-defined templates, see User-Defined Templates.
When you configure a Tenable-provided scan template, you can modify only the settings included
for the scan template type. When you create a user-defined scan template, you can modify a custom
set of settings for your scan.
Tip: For information and tips on optimizing your Tenable Vulnerability Management scan configurations,
see the Tenable Vulnerability Management Scan Tuning Guide.
- 241 -
Tenable-Provided Tenable Nessus Scanner Templates
There are three scanner template categories in Tenable Vulnerability Management:
l Vulnerability Scans (Common) — Tenable recommends using vulnerability scan templates for
most of your organization's standard, day-to-day scanning needs.
l Tactical Scans — Tenable recommends using the tactical scan templates to scan your network
for a specific vulnerability or group of vulnerabilities. Tactical scans are lightweight, timely scan
templates that you can use to scan your assets for a particular vulnerability. Tenable frequently
updates the Tenable Vulnerability Management Tactical Scans library with templates that
detect the latest vulnerabilities of public interest, such as Log4Shell.
The following table describes the available Tenable Nessus Scanner templates:
Template Description
Advanced The most configurable scan type. You can configure this scan template to
Network Scan match any policy. This template has the same default settings as the basic
scan template, but it allows for additional configuration options.
Basic Network Performs a full system scan that is suitable for any host. Use this template
Scan to scan an asset or assets with all of Nessus's plugins enabled. For
- 242 -
example, you can perform an internal vulnerability scan on your
organization's systems.
Host Discovery Performs a simple scan to discover live hosts and open ports.
Launch this scan to see what hosts are on your network and associated
information such as IP address, FQDN, operating systems, and open
ports, if available. After you have a list of hosts, you can choose what hosts
you want to target in a specific vulnerability scan.
Note: Assets identified by discovery scans do not count toward your license.
Note: While the PCI DSS requires you to provide evidence of passing or
"clean" scans on at least a quarterly basis, you must also perform scans after
any significant changes to your network (PCI DSS 11.2.3).
Legacy Web App Uses a Tenable Nessus scanner to scan your web applications.
Scan
Note: Unlike the Tenable Web App Scanning scanner, the Tenable Nessus
scanner does not use a browser to scan your web applications. Therefore, a
Legacy Web App Scan is not as comprehensive as Tenable Web App Scanning.
- 243 -
Mobile Device Assesses mobile devices via Microsoft Exchange or an MDM.
Scan
Configuration Scans
- 244 -
Tenable recommends using offline configuration audits to scan devices
that do not support secure remote access and devices that scanners
cannot access.
The compliance checks can audit against custom security policies, such as
password complexity, system settings, or registry values on Windows
operating systems. For Windows systems, the compliance audits can test
for a large percentage of anything that can be described in a Windows
policy file. For Unix systems, the compliance audits test for running
processes, user security policy, and content of files.
SCAP and OVAL Audits systems using SCAP and OVAL definitions.
Auditing
The National Institute of Standards and Technology (NIST) Security
Content Automation Protocol (SCAP) is a set of policies for managing
vulnerabilities and policy compliance in government agencies. It relies on
multiple open standards and policies, including OVAL, CVE, CVSS, CPE,
and FDCC policies.
l When using the SCAP and OVAL Auditing template, you can
perform Linux and Windows SCAP CHECKS to test compliance
standards as specified in NIST’s Special Publication 800-126.
- 245 -
Tactical Scans
Active Directory Use a Domain User account to query AD identity information. This policy
Identity enumerates Active Directory identity information via LDAPS. It requires
Domain User credentials, LDAPS configuration, and an Active Directory
Domain Controller as the scan target.
Credential A lightweight scan template used to verify that host credential pairs for
Validation Windows and Unix successfully authenticate to scan targets. Use this scan
template to quickly diagnose credential pair issues in your network.
Nessus 10.8.0 / Scan to find, reset, and update Tenable Agents on versions 10.8.0 and
10.8.1 Agent 10.8.1. For more information, see the upgrade notes of the Tenable Agent
Reset 10.8.2 release notes.
Ping-Only A simple scan to discover live hosts with minimal network traffic.
Discovery
l Vulnerability Scans — Tenable recommends using vulnerability scan templates for most of your
organization's standard, day-to-day scanning needs.
l Inventory Collection — Unlike standard Tenable Agent vulnerability scans, the Collect
Inventory template provides faster scan results and reduce the scan's system footprint. Agent-
based inventory scans gather basic information from a host and upload it to Tenable
- 246 -
Vulnerability Management. Then, Tenable Vulnerability Management analyzes the information
against missing patches and vulnerabilities as Tenable releases coverage. This reduces the
performance impact on the target host while also reducing the time it takes for an analyst to
see the impact of a recent patch.
Note: If a plugin requires authentication or settings to communicate with another system, the
plugin is not available on agents. This includes, but is not limited to:
l Patch management
l Mobile device management
l Cloud infrastructure audit
l Database checks that require authentication
Template Description
Vulnerability Scans
Advanced An agent scan without any recommendations, so that you can fully
Agent Scan customize the scan settings. In Tenable Vulnerability Management, the
Advanced Agent Scan template allows for two scanning methods:
l Scan Window - Specify the timeframe during which the agent must
report to be included and visible in vulnerability reports.
l Triggered Scans - Provide the agent with specific criteria that indicates
when to launch a scan. The agent launches the scan when one (or
more) of the criteria are met. For more information, see Basic Settings
in the Tenable Vulnerability Management User Guide.
Note: When you create an agent scan using the Advanced Agent Scan template,
you must also select the plugins you want to use for the scan.
- 247 -
Template Description
Scan
Malware Scan Scans for malware on systems connected via Tenable Agents.
Tenable Agent detects malware using a combined allow list and block list
approach to monitor known good processes, alert on known bad processes,
and identify coverage gaps between the two by flagging unknown processes
for further inspection.
PCI Internal Perform an internal PCI DSS 4.0 credentialed vulnerability scan.
Nessus Agent
This template creates scans that you can use to satisfy internal (PCI DSS
4.0) scanning requirements for ongoing vulnerability management programs
that satisfy PCI compliance requirements. You can use these scans for
ongoing vulnerability management and to perform rescans until passing or
clean results are achieved. You can provide credentials to enumerate
missing patches and client-side vulnerabilities.
PCI DSS 4.x provides the ability to use a customized approach objective.
Using PCI DSS 4.x, this template provides the most comprehensive view of
local vulnerabilities on your systems.
Note: Tenable highly recommends configuring the Open Agent Port profile
setting for any agents that run scans based on this template to avoid asset
duplication. For more information, see Agent Profiles.
Note: Tenable assessors do not review internal PCI scans for false positives or
compensating controls. Therefore, Tenable highly recommends using your
organization's internal security assessor (ISA) or qualified security assessor
(QSA) to validate internal scan findings.
- 248 -
Template Description
Auditing The compliance checks can audit against custom security policies, such as
password complexity, system settings, or registry values on Windows
operating systems. For Windows systems, the compliance audits can test
for a large percentage of anything that can be described in a Windows policy
file. For Unix systems, the compliance audits test for running processes,
user security policy, and content of files.
SCAP and Audits systems using SCAP and OVAL definitions for systems connected
OVAL Agent via Tenable Agents.
Auditing
The National Institute of Standards and Technology (NIST) Security Content
Automation Protocol (SCAP) is a set of policies for managing vulnerabilities
and policy compliance in government agencies. It relies on multiple open
standards and policies, including OVAL, CVE, CVSS, CPE, and FDCC
policies.
l When using the SCAP and OVAL Auditing template, you can perform
Linux and Windows SCAP CHECKS to test compliance standards as
specified in NIST’s Special Publication 800-126.
Inventory Collection
- 249 -
Template Description
- 250 -
Template Description
API A scan that checks an API for vulnerabilities. This scan analyzes RESTful
APIs described via an OpenAPI (Swagger) specification file. File attachment
size is limited to 1 MB.
Tip: If the API you want to scan requires keys or a token for authentication, you can
add the expected custom headers in the Advanced settings in the HTTP Settings
section.
Note: The API scan template is available as a public beta. Its functionality is
subject to change as ongoing improvements are made throughout the beta period.
Config Audit A high-level scan that analyzes HTTP security headers and other externally
facing configurations on a web application to determine if the application is
compliant with common security industry standards.
If you create a scan using the Config Audit scan template, Tenable Web App
Scanning analyzes your web application only for plugins related to security
industry standards compliance.
Overview A high-level preliminary scan that determines which URLs in a web application
Tenable Web App Scanning scans by default.
The Overview scan template does not analyze the web application for active
vulnerabilities. Therefore, this scan template does not offer as many plugin
family options as the Scan template.
PCI A scan that assesses web applications for compliance with Payment Card
Industry Data Security Standards (PCI DSS) for Tenable PCI ASV.
Quick Scan A high-level scan similar to the Config Audit scan template that analyzes
HTTP security headers and other externally facing configurations on a web
application to determine if the application is compliant with common security
- 251 -
industry standards. Does not include scheduling.
If you create a scan using the Quick Scan scan template, Tenable
Vulnerability Management analyzes your web application only for plugins
related to security industry standards compliance.
Scan A comprehensive scan that assesses web applications for a wide range of
vulnerabilities.
The Scan template provides plugin family options for all active web application
plugins.
If you create a scan using the Scan template, Tenable Web App Scanning
analyzes your web application for all plugins that the scanner checks for when
you create a scan using the Config Audit, Overview, or SSL TLS templates,
as well as additional plugins to detect specific vulnerabilities.
A scan run with this scan template provides a more detailed assessment of a
web application and take longer to complete that other Tenable Web App
Scanning scans.
SSL TLS A scan to determine if a web application uses SSL/TLS public-key encryption
and, if so, how the encryption is configured.
When you create a scan using the SSL TLS template, Tenable Web App
Scanning analyzes your web application only for plugins related to SSL/TLS
implementation. The scanner does not crawl URLs or assess individual pages
for vulnerabilities.
User-Defined Templates
Tenable provides a variety of scan templates for specific scanning purposes. If you want to
customize a Tenable-provided scan template and share it with other users, you can create a user-
defined scan template.
- 252 -
You can create, edit, copy, export, or delete user-defined Tenable Vulnerability Management and
Tenable Web App Scanning Scan templates from the Scans page. You can also import and export
Tenable Vulnerability Management scan templates.
A menu appears.
4. Below Scan Templates, choose to view Vulnerability Management Scan Templates or Web
Application Scan Templates.
Click a template to view or edit its settings and parameters, or use the following procedures to
further manage your user-defined templates:
You can create user-defined scan templates to save and share custom scan settings with other
Tenable Vulnerability Management users.
When you define a scan template, Tenable Vulnerability Management assigns you owner
permissions for the scan template. You can share the scan template by assigning template
permissions to other users, but only you can delete the scan template.
2. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
- 253 -
3. In the upper-right corner of the page, click the Create Template button.
4. Click the tile for the template you want to use as the base for your user-defined scan template.
l If you are creating a Tenable Vulnerability Management scan template, use the following
procedure:
- 254 -
a. Configure the scan template:
Tab Action
l If you are creating a Tenable Web App Scanning scan, use the following procedure:
- 255 -
a. Configure the scan:
Tab Action
Scope Specify the URLs and file types that you want to include in
or exclude from your scan. For more information, see
Scope Settings in Tenable Web App Scanning Scans.
6. Click Save.
Tenable Vulnerability Management saves the user-defined scan template and adds it to the list
of scan templates on the Scan Templates page.
- 256 -
1. In the left navigation, click Scans.
2. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
A menu appears.
5. In the scan templates table, click the scan template you want to edit.
- 257 -
l If you are editing a Tenable Vulnerability Management scan template, use the following
procedure:
- 258 -
a. Configure the scan template options:
Tab Action
- 259 -
l If you are editing a Tenable Web App Scanning scan template, use the following
procedure:
Tab Action
Scope Specify the URLs and file types that you want to include in
or exclude from your scan. For more information, see
Scope Settings in Tenable Web App Scanning Scans.
7. Click Save.
Tenable Vulnerability Management saves the user-defined scan template and adds it to the list
of templates on the Scan Templates page.
When you copy a user-defined scan template, Tenable Vulnerability Management assigns you
owner permissions for the copy. You can share the copy by assigning template permissions to other
users, but only you can delete the copied scan template.
- 260 -
To copy a user-defined scan template:
2. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
A menu appears.
5. In the scans table, roll over the scan you want to launch.
A menu appears.
Note: Tenable Vulnerability Management does not export passwords, credentials, and file-based settings
(for example, .audit files and the SSH known_hosts file) in user-defined scan templates.
- 261 -
A menu appears.
5. In the scans table, roll over the scan template you want to export.
A menu appears.
Tenable Vulnerability Management exports the user-defined scan template as a .nessus file.
Note: To learn more about the .nessus file format, see Nessus File Format.
When you import a scan template, Tenable Vulnerability Management assigns you owner
permissions for the scan template. You can share the scan template by assigning template
permissions to other users, but only you can delete the scan template.
Tenable Vulnerability Management does not include passwords or compliance audit files in
exported user-defined scan templates. You must add these settings in manually after importing the
scan template.
A menu appears.
- 262 -
5. In the upper-right corner of the page, click the Import button.
7. Click Open.
A Template uploaded message appears, and the scan template appears on the Scan
Templates page.
What to do next:
l As needed, add passwords and compliance audit files to the imported template.
If you delete a user-defined scan template, Tenable Vulnerability Management deletes it from all
user accounts.
2. Below Scans, choose to view Vulnerability Management Scans or Web Application Scans.
A menu appears.
- 263 -
l
Select a single scan template:
a. In the scans table, roll over the scan you want to launch.
A menu appears.
l
Select multiple scan templates:
a. In the scan templates table, select the check box for each scan template you want
to delete.
Tenable Vulnerability Management deletes the user-defined scan template or templates you
selected.
- 264 -
3. In the User Permissions section, next to the permission drop-down for Owner, click the
button.
Tenable Vulnerability Management automatically adds you to the list of users and assigns Can
View permissions to your user account.
Tenable Vulnerability Management removes your account from the list of users.
a. Next to the permission drop-down for your user account, click the button.
b. Select a permission.
7. Click Save.
Tenable assigns ownership to the selected user and assigns your user account the
permissions you selected. If you removed all permissions for your user account from the
template, the template no longer appears in the templates table.
Scan Settings
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
Scan settings enable you to refine parameters in scans to meet your specific network security
needs. The scan settings you can configure vary depending on the Tenable-provided template on
which a scan or user-defined template is based.
You can configure these settings in individual scans or in user-defined templates from which you
create individual scans.
- 265 -
Scan settings are organized into the following categories:
l If you configure a setting in a user-defined template, that setting applies to any scans you
create based on that user-defined template.
- 266 -
l You base a user-defined template on a Tenable-provided template. Most of the settings are
identical to the settings you can configure in an individual scan that uses the same Tenable-
provided template.
However, certain Basic settings are unique to creating a user-defined template, and do not
appear when configuring an individual scan. For more information, see Basic Settings in User-
Defined Templates.
l You can configure certain settings in a user-defined template, but cannot modify those settings
in an individual scan based on a user-defined template. These settings include Discovery,
Assessment, Report, Advanced, Compliance, SCAP, and Plugins. If you want to modify
these settings for individual scans, create individual scans based on a Tenable-provided
template instead.
l If you configure Credentials in a user-defined template, other users can override these
settings by adding scan-specific or managed credentials to scans based on the template.
You can configure these settings in individual scans or in user-defined templates from which you
create individual scans.
Tenable Vulnerability Management scan settings are organized into the following categories:
- 267 -
l SCAP Settings in Tenable Vulnerability Management Scans
l If you configure a setting in a user-defined template, that setting applies to any scans you
create based on that user-defined template.
l You base a user-defined template on a Tenable-provided template. Most of the settings are
identical to the settings you can configure in an individual scan that uses the same Tenable-
provided template.
However, certain Basic settings are unique to creating a user-defined template, and do not
appear when configuring an individual scan. For more information, see Basic Settings in User-
Defined Templates.
l You can configure certain settings in a user-defined template, but cannot modify those settings
in an individual scan based on a user-defined template. These settings include Discovery,
Assessment, Report, Advanced, Compliance, SCAP, and Plugins. If you want to modify
these settings for individual scans, create individual scans based on a Tenable-provided
template instead.
l If you configure Credentials in a user-defined template, other users can override these
settings by adding scan-specific or managed credentials to scans based on the template.
Note: This topic describes Basic settings you can set in individual scans. For Basic settings in user-defined
templates, see Basic Settings in User-Defined Templates.
You can use Basic settings to specify organizational and security-related aspects of a scan
configuration. This includes specifying the name of the scan, its targets, whether the scan is
scheduled, and who has access to the scan.
Note: To learn more about scan limitations in Tenable Vulnerability Management, see Scan Limitations.
- 268 -
l General
l Schedule
l Notifications
l User Permissions
General
The general settings for a scan.
Scan Results Show in Specifies whether the results of the scan should
dashboard appear in workbenches, dashboards, and reports, or
be kept private.
Folder My Scans Specifies the folder where the scan appears after
being saved.
- 269 -
Agent Groups None (Tenable Agent templates only) Specifies the agent
group or groups you want the scan to target. In the
drop-down box, select an existing agent group, or
create a new agent group.
Scanner Type Internal Scanner Specifies whether a local, internal scanner or a cloud-
managed scanner performs the scan, and determines
whether the Scanner field lists local or cloud-
managed scanners to choose from.
Network Default Select the network of scanners and asset that you
want to scan with.
- 270 -
Unless your organization has created and uses
custom networks for specific business needs (for
example, scanning different sub-organizations,
differentiating between external and internal asset
scanning, or differentiating between ephemeral and
static asset scanning), Tenable recommends using
the Default network, which all scanners and scanner
groups are assigned to by default.
Tags None Select one or more tags to scan all assets that have
any of the specified tags applied. To see a list of
assets identified by the specified tags, click View
Assets.
- 271 -
1. Last scan target
Use Tag Rules Existing tagged (Tenable Nessus scanner templates only) (Required)
as Targets assets only Specifies whether Tenable Vulnerability Management
scans tagged assets only, or any assets that which the
selected tags' rules apply to.
- 272 -
Tenable Vulnerability Management only scans
assets that are already tagged with the My IPv4s
tag.
Scan Type Scan Window (Tenable Agent templates only) (Required) Specifies
whether the agent scans occur based on a scan
window or triggers:
- 273 -
l Triggered Scan — Specifies the triggers that
cause agents to report in. Use the drop-down
boxes to select from the following trigger types:
- 274 -
highly
l After number of scans — The agent scan reports
recommends all findings every x number of scans. You
using the choose from the following increments: 4, 7, 10,
default values.
15, or 20 scans.
Only lower the
value if doing so l After number of days — The agent scan reports
is necessary for
all findings after a set number of days after the
your
organization. previous day on which the agent scan last
reported all findings. You choose from the
following increments: 7, 10, 20, 30, 60, or 90
days.
Target Groups None You can select or add a new target group to which the
scan applies. Assets in the target group are used as
scan targets.
- 275 -
Tip: You can force Tenable Vulnerability Management
to use a given hostname for a server during a scan by
using the hostname[ip] syntax (for example,
www.example.com[192.168.1.1]). However, you
cannot use this approach if you enable scan routing for
the scan.
Upload Targets None Uploads a text file that specifies the targets.
Policy None This setting appears only when the scan owner edits
an existing scan that is based on a user-defined scan
template.
- 276 -
Tenable-provided scan template on which a scan is
based.
Schedule
The scan schedule settings.
By default, scans are not scheduled. When you first access the Schedule section, the Enable
Schedule setting appears, set to Off. To modify the settings listed on the following table, click the
Off button. The rest of the settings appear.
Note: Scheduled scans do not run if they are in the scan owner's Trash folder.
- 277 -
Value
- 278 -
20 years, by time and date.
Starts Varies Specifies the exact date and time when a scan
launches.
Timezone Zulu Specifies the timezone of the value set for Starts.
Repeat On Varies Specifies what day of the week a scan repeats. This
item appears only if you specify Weekly for
Frequency.
Notifications
The notification settings for a scan.
Default
Setting Description
Value
- 279 -
Recipient(s) that are alerted when a scan completes and the results are
available.
User Permissions
You can share the scan with other users by setting permissions for users or groups. When you
assign a permission to a group, that permission applies to all users within the group.
Tip: Tenable recommends assigning permissions to user groups, rather than individual users, to minimize
maintenance as individual users leave or join your organization.
Permission Description
No Access (Default user only) Groups and users set to this permission cannot interact
with the scan in any way.
Can View Groups and users with this permission can view the results of the scan,
export the scan results, and move the scan to the Trash folder. They cannot
view the scan configuration or permanently delete the scan.
Can Execute In addition to the tasks allowed by Can View, groups and users with this
permission can launch, pause, and stop a scan. They cannot view the scan
configuration or permanently delete the scan.
Note: In addition to Can Execute permissions for the scan, users running a scan
must have Can Scan permissions in an access group for the specified target, or
the scanner does not scan the target.
Can Edit In addition to the tasks allowed by Can Execute, groups and users with this
permission can view the scan configuration and modify any setting. They
cannot change the scan's ownership (only the scan owner can change scan
ownership) or permanently delete the scan.
- 280 -
l An administrator always has the equivalent of Can Edit
permissions, regardless of the permissions set for the administrator
account in the individual scan. This does not apply to user-defined
scan templates.
Note: This topic describes Basic settings you can set in user-defined templates. For Basic settings in
individual scans, see Basic Settings in Tenable Vulnerability Management Scans .
You can use Basic settings to specify basic aspects of a user-defined template, including who has
access to the user-defined template.
l General
l Permissions
General
The general settings for a user-defined template.
Default
Setting Description
Value
Permissions
You can share the user-defined template with other users by setting permissions for users or
groups. When you assign a permission to a group, that permission applies to all users within the
group.
Tip: Tenable recommends assigning permissions to user groups, rather than individual users, to minimize
maintenance as individual users leave or join your organization.
- 281 -
Permission Description
No Access (Default user only) Groups and users set to this permission cannot interact
with the scan in any way.
Can View Groups and users with this permission can view the results of the scan,
export the scan results, and move the scan to the Trash folder. They cannot
view the scan configuration or permanently delete the scan.
Can Execute In addition to the tasks allowed by Can View, groups and users with this
permission can launch, pause, and stop a scan. They cannot view the scan
configuration or permanently delete the scan.
Note: In addition to Can Execute permissions for the scan, users running a scan
must have Can Scan permissions in an access group for the specified target, or
the scanner does not scan the target.
Can Edit In addition to the tasks allowed by Can Execute, groups and users with this
permission can view the scan configuration and modify any setting for the
scan except scan ownership. They can also delete the scan.
Authentication
In user-defined templates, you can use Authentication settings to configure the authentication
Tenable Vulnerability Management performs for credentialed scanning.
Tip: The Authentication settings are equivalent to the Scan-wide Credential Type Settings in Tenable-
provided scan templates.
- 282 -
Setting Default Value Description
SNMPv1/v2c
HTTP
Login method POST Specify if the login action is performed via a GET or
POST request.
Invert Disabled A regex pattern to look for on the login page, that if
authenticated found, tells Tenable Vulnerability Management that
regex authentication was not successful (e.g., Authentication
failed!).
- 283 -
Case insensitive Disabled he regex searches are case sensitive by default. This
authenticated instructs Tenable Vulnerability Management to ignore
regex case.
telnet/rsh/rexec
Windows
Never send Enabled By default, for security reasons, this option is enabled.
credentials in the
clear
- 284 -
by default.
Start the Remote Disabled This option tells Tenable Vulnerability Management to
Registry service start the Remote Registry service on computers being
during the scan scanned if it is not running. This service must be
running in order for Tenable Vulnerability Management
to execute some Windows local check plugins.
SSH
- 285 -
Preferred port 22 The port on which SSH is running on the target system.
Amazon AWS
equivalent to Scans > Credentials > Cloud Services > Amazon AWS
l us-east-1
l us-east-2
- 286 -
l us-west-1
l us-west-2
l ca-central-1
l eu-west-1
l eu-west-2
l eu-central-1
l ap-northeast-1
l ap-northeast-2
l ap-southeast-1
l ap-southeast-2
l sa-east-1
l cn-north-1
l cn-northwest-1
Rackspace
- 287 -
l Chicago (ORD)
l London (LON)
l Syndney (SYD)
Microsoft Azure
equivalent to Scans > Credentials > Cloud Services > Amazon AWS
Scan Targets
In Tenable Vulnerability Management, you can use a number of different formats when specifying
targets for a scan. The following tables contain target formats, examples, and a short explanation of
what occurs when Tenable Vulnerability Management scans that target type.
Note: Tenable limits the number of targets that you can scan in a single scan. For more information, see
Scan Limitations.
Note: For previously scanned assets, you can configure scan targets based on host attributes like
operating system or installed software, instead of host identifiers like IP address.
Tip: If a hostname target looks like either a link6 target (start with the text "link6") or one of the two IPv6
range forms, put single quotes around the target to ensure that Tenable Vulnerability Management
processes it as a hostname.
Target
Example Explanation
Description
- 288 -
Target
Example Explanation
Description
- 289 -
Target
Example Explanation
Description
Vulnerability Management
does not accept ranges in this
format.
- 290 -
Target
Example Explanation
Description
Some text with Test Host 1[10.0.1.1] Scans the IPv4 or IPv6 address
either a single or within the brackets, like a
- 291 -
Target
Example Explanation
Description
Target Groups
You can still use target groups to manage your scan targets. However, Tenable recommends that you
instead use tags to group and scan your assets when possible. In the future, when tagging features and
options match those currently available in target groups, Tenable will convert your target groups into tags
and retire your existing target groups. No action is required on your part, and Tenable will provide you with
60 calendar days notice before converting and retiring your target groups. For more information, contact
your Tenable representative.
A target group allows you to construct a list of scan targets by FQDN, CIDR notation, or IP address
range. You can then specify which users in your organization can use the target group in scan
configurations or filtering dashboards (including workbenches).
Note: Tenable recommends limiting the number of targets in any single target group. When filtering a
dashboard by a target group with too many targets, Tenable Vulnerability Management may fail to show
data.
Note: Scan targets listed by CIDR notation must be in one of the following formats:
l xx.xx.0.0/16
l xx.xx.xx.0/24
If you grant a user permissions in a target group, the user can use the target group in the Target
Groups option for scan configuration. However, you must also grant the user Can Scan permissions
in an access group for the targets, or Tenable Vulnerability Management excludes the targets from
the scan results. For more information, see Permissions.
- 292 -
Required User Role: Administrator
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
The Target Groups page appears. By default, the System tab is active. This tab contains a
table of system target groups.
3. If you want to edit a user target group, click User. Otherwise, stay on the System target groups
tab.
4. In the upper-right corner of the page, click the Create Target Group button.
Setting Description
Note: Scan targets listed by CIDR notation must be in one of the following
formats:
l xx.xx.0.0/16
l xx.xx.xx.0/24
- 293 -
Setting Description
The system adds the uploaded targets to the Targets box after you save
the target group.
Note: If you grant a user permissions in a target group, the user can use the target group in the
Target Groups option for scan configurations. However, you must also grant the user Can Scan
permissions in an access group for the targets, or Tenable Vulnerability Management excludes the
targets from the scan results. For more information, see Access Groups.
7. Click Save.
l If you configured user permissions for the target group, Tenable Vulnerability
Management creates the target group and adds it to the table on the Target Groups
page.
l If you retained the default No Access permissions for the target group, a confirmation
window appears.
l If the default configuration is appropriate for the target group, click Continue to
confirm your action.
l If the default configuration is not appropriate for the target group, click Cancel to
return to user permissions configuration for the target group.
- 294 -
Required Target Group Permissions: Any
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
Note: For auditing cloud infrastructure, Tenable Vulnerability Management requires a target group with
Can Scan permissions to be present on 127.0.0.1.
Note: To enable the user to use a target group in the Target Groups option for scan configurations, you must
also grant the user Can Scan permissions in an access group for the targets. If you do not, Tenable
Vulnerability Management excludes the targets from the scan results. For more information, see Access
Groups.
l
Change the permissions for the Default user
Note: The Default user represents any users that have not been specifically added to the
target group.
a. Next to the permission drop-down for the Default user, click the button.
c. Click Save.
l
Add permissions
a. Next to User Permissions, click the button.
b. In the Add users or groups box, type the name of a user or group.
- 295 -
As you type, a filtered list of users and groups appears.
The selected user or group appears in the list of users and groups.
d. Next to the permission drop-down for the user or group, click the button.
f. Click Save.
l
Edit permissions
a. Next to the permission drop-down for the user or group, click the button.
c. Click Save.
l
Delete permissions
a. In the list of users, roll over the user or group you want to delete.
c. Click Save.
- 296 -
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
Note: System target groups and related functionality asset isolation are deprecated. To control
scan permissions, use access groups instead.
You can still create and edit system target groups, as well as use system target groups in scan
configurations and dashboard filters. However, Tenable recommends using user target groups
instead.
The Target Groups page appears. By default, the System tab is active. This tab contains a
table of system target groups.
3. If you want to edit a user target group, click User. Otherwise, stay on the System target groups
tab.
4. In the target groups table, click the target group you want to edit.
Setting Description
- 297 -
Setting Description
The system adds the uploaded targets to the Targets box after you save
the target group.
7. Click Save.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
Tip: To create or modify the .csv file, Tenable recommends using a robust editor such as Microsoft Excel.
The Target Groups page appears. By default, the System tab is active. This tab contains a
table of system target groups.
3. If you want to import a user target group, click User. Otherwise, stay on the System target
groups page.
- 298 -
Note: System target groups and related functionality asset isolation are deprecated. To
control scan permissions, use access groups instead.
You can still create and edit system target groups, as well as use system target groups in
scan configurations and dashboard filters. However, Tenable recommends using user
target groups instead.
Tenable Vulnerability Management imports the file and adds the target groups to the target
groups box.
name Field used to identify the name of the target group. You can use any
combination of alphanumeric characters or symbols in the name field.
members Field used to identify the host address or addresses to include in the
target group.
Required Tenable Vulnerability Management User Role: Standard, Scan Manager, or Administrator
- 299 -
You can export a target group as a .csv file. Depending on your browser, the target group may
download automatically.
The Target Groups page appears. By default, the System tab is active. This tab contains a
table of system target groups.
3. If you want to export a user target group, click User. Otherwise, stay on the System target
groups tab.
Note: System target groups and related functionality asset isolation are deprecated. To
control scan permissions, use access groups instead.
You can still create and edit system target groups, as well as use system target groups in
scan configurations and dashboard filters. However, Tenable recommends using user
target groups instead.
l
Select a single target group.
a. In the target groups table, roll over the target group you want to export.
l
Select multiple target groups.
a. In the target groups table, select the check boxes for each target group you want to
export.
- 300 -
The action bar appears at the bottom of the page.
creation_date Date (in UNIX timestamp format) when the target group was created.
last_modification_ Date (in UNIX timestamp format) when the target group was last
date modified.
Required Tenable Vulnerability Management User Role: Scan Operator, Standard, Scan Manager, or
Administrator
- 301 -
1. In the left navigation, click Settings.
The Target Groups page appears. By default, the System tab is active. This tab contains a
table of system target groups.
3. If you want to delete a user target group, click User. Otherwise, stay on the System target
groups tab.
l
Select a single target group.
a. In the target groups table, roll over the target group you want to delete.
l
Select multiple target groups.
a. In the target groups table, select the check box for each target group you want to
delete.
Tenable Vulnerability Management deletes the target group or groups you selected.
The following table describes user permissions for both system and user target groups.
- 302 -
Permission Description
No Access (Default user only) Users assigned this permission cannot use the system
target group to filter dashboards.
Can Use Note: System target groups are deprecated; Tenable recommends using user
target groups instead.
Users assigned this permission can use hosts in the user target groups to
filter dashboards and configure scans.
Note: To enable the user to use a target group in the Target Groups option for
scan configurations, you must also grant the user Can Scan permissions in an
access group for the targets. If you do not, Tenable Vulnerability Management
excludes the targets from the scan results. For more information, see Access
Groups.
No Access (Default user only) Users assigned this permission cannot configure scans
for hosts in the user target group or use hosts in the user target group to filter
dashboards.
Can Use Users assigned this permission can use hosts in the user target groups to
filter dashboards and configure scans.
Note: To enable the user to use a target group in the Target Groups option for
scan configurations, you must also grant the user Can Scan permissions in an
access group for the targets. If you do not, Tenable Vulnerability Management
excludes the targets from the scan results. For more information, see Access
Groups.
Can Change In addition to using hosts in this user target group when configuring scans
and filtering dashboards, users assigned this permission can modify any
setting for the target group except permissions.
Info-level Reporting
- 303 -
Info-level Reporting is a scan setting available for agent vulnerability scan templates. The setting
specifies how often the agent scan should report unchanged Info-severity vulnerability findings.
Description
Info-severity findings can account for up to 90% of agent scan findings. Most Info-level findings do
not change from scan to scan and have minimal impact on your overall network exposure.
Configuring Info-level Reporting can help minimize your scan processing times by decreasing the
number of unchanged Info-severity findings that Tenable Vulnerability Management processes after
every agent scan.
After you configure an agent scan, the first execution of that scan always reports all detected
findings regardless of severity level. This is known as a baseline scan. Subsequent scans return all
vulnerability findings with a severity of Low or higher, and any new or changed Info-level findings.
Agents do not re-report existing, unchanged Info-level findings to Tenable Vulnerability
Management until a new baseline scan is performed.
When you view agent vulnerability scan results in the Tenable Vulnerability Management user
interface, baseline scans are indicated with the baseline icon ( ). For example:
- 304 -
Note: The baseline icon does not appear for triggered scans, regardless of whether or not the
scan was a baseline scan.
The baseline icon always appears for scans whose scan configurations do not have the Info-
level Reporting setting. This is because every execution of that scan includes all findings and is,
therefore, a baseline scan.
The baseline icon does not appear for scans whose configurations have the Info-level
Reporting setting, but were run before the Info-level Reporting feature was released.
Configuration
You can configure the agent scan to report all severity findings by launching a new baseline scan
after one of the following intervals:
l After number of scans — The agent scan reports all findings every x number of scans. You
choose from the following increments: 7, 10, 15, or 20 scans.
For example, if you set the value to the default of 10, the agent scan reports all findings in its
next scan and then reports all findings again during every 10th scan. All interim scans only
return findings with a severity of Low or higher, as well as any new or changed Info-level
findings.
l After number of days — The agent scan reports all findings after a set number of days after the
previous day on which the agent scan last reported all findings. You choose from the following
increments: 7, 10, 20, 30, 60, or 90 days.
For example, if you set the value to the default of 10, the agent scan reports all findings in its
next scan. For 10 days, all interim scans return all findings with a severity of Low or higher and
any new or changed Info-level findings. After the 10-day period passes, the agent scan reports
all findings again in its next scan.
You can only set triggered agent scans to After number of scans. You can set Scan Window
scans to either After number of scans or After number of days.
The default value for triggered agent scans is After 10 scans, and the default value for Scan
Window agent scans is After 10 days. Tenable recommends using the default values. Only
lower the value if doing so is necessary for your organization.
In addition to Info-level Reporting, you can enable Force refresh of all Info-severity vulnerabilities
on next scan to force the agent scan to report all findings in the next scan. After the next scan
- 305 -
completes and reports all findings, the Info-level Reporting setting determines how often the scan
reports Info-severity findings.
Note: All vulnerability findings with a severity of Low or higher and new or changed Info-severity
vulnerabilities are always reported after every scan.
l The Info-level Reporting setting is not supported when Tenable Vulnerability Management is
connected to Tenable Security Center.
l Agent scans with configured Compliance settings do not support the Info-level Reporting
setting. All agent scans with Compliance settings configured are baseline scans.
l If you recast an Info-level plugin to a higher severity level (for example, Low or Medium), the
plugin is still affected by Info-level Reporting and excluded from non-baseline scans if the
plugin output has not changed.
l Each individual agent calculates the After number of scans value separately. Therefore,
triggered scans can return a combination of baseline and non-baseline results.
l Plugins 19506 (Nessus Scan Information) and 42980 (SSL Certificate Expiry) are always
reported in full with every scan.
Note: If a scan is based on a user-defined template, you cannot configure Discovery settings in the scan.
You can only modify these settings in the related user-defined template.
The Discovery settings relate to discovery and port scanning, including port ranges and methods.
If you select the Custom preconfigured setting option, or if you are using a scanner template that
does not include preconfigured discovery settings, you can manually configure Discovery settings in
the following categories:
- 306 -
l Host Discovery
l Port Scanning
l Service Discovery
l Identity
Host Discovery
By default, some settings in the Host Discovery section are enabled. When you first access the
Host Discovery section, the Ping the remote host option appears and is set to On.
Default
Setting Description
Value
Ping the Remote On If set to On, the scanner pings remote hosts on multiple
Host ports to determine if they are alive. Additional options
General Settings and Ping Methods appear.
Scan Unresponsive Disabled Specifies whether the Nessus scanner scans hosts that
Hosts do not respond to any ping methods. This option is only
available for scans using the PCI Quarterly External
Scan template.
General Settings
Use Fast Network Disabled When disabled, if a host responds to ping, Tenable
Discovery Vulnerability Management attempts to avoid false
positives, performing additional tests to verify the
response did not come from a proxy or load balancer.
These checks can take some time, especially if the
remote host is firewalled.
- 307 -
does not perform these checks.
Ping Methods
ARP Enabled Ping a host using its hardware address via Address
Resolution Protocol (ARP). This only works on a local
network.
Assume ICMP Disabled Assume ICMP unreachable from the gateway means
Unreachable From the host is down. When a ping is sent to a host that is
the Gateway Means down, its gateway may return an ICMP unreachable
the Host is Down message. When this option is enabled, when the
scanner receives an ICMP Unreachable message, it
considers the targeted host dead. This approach helps
speed up discovery on some networks.
UDP Disabled Ping a host using the User Datagram Protocol (UDP).
UDP is a stateless protocol, meaning that
- 308 -
communication is not performed with handshake
dialogues. UDP-based communication is not always
reliable, and because of the nature of UDP services
and screening devices, they are not always remotely
detectable.
Fragile Devices
Scan Network Disabled When enabled, the scanner scans network printers.
Printers
Scan Novell Disabled When enabled, the scanner scans Novell NetWare
Netware Hosts hosts.
Scan Operational Disabled When enabled, the scanner performs a full scan of
Technology Operational Technology (OT) devices such as
Devices programmable logic controllers (PLCs) and remote
terminal units (RTUs) that monitor environmental
factors and the activity and state of machinery.
Wake-on-LAN
For example:
- 309 -
33:24:4C:03:CC:C7
FF:5C:2C:71:57:79
Boot Time Wait (In 5 minutes The amount of time to wait for hosts to start before
Minutes) performing the scan.
Port Scanning
The Port Scanning section includes settings that define how the port scanner behaves and which
ports to scan.
Default
Setting Description
Value
Ports
Consider Disabled When enabled, if a port is not scanned with a selected port
Unscanned scanner (for example, the port falls outside of the specified
Ports as range), the scanner considers it closed.
Closed
- 310 -
Default
Setting Description
Value
l tcp to T
l udp to U
- 311 -
Default
Setting Description
Value
SSH (netstat) Enabled When enabled, the scanner uses netstat to check for open
ports from the local machine. It relies on the netstat command
being available via an SSH connection to the target. This scan
is intended for Linux-based systems and requires
authentication credentials. To use this setting, you must first
configure SSH Credentials.
WMI (netstat) Enabled When enabled, the scanner uses netstat to determine open
ports while performing a WMI-based scan.
Only Run Enabled When this setting is enabled, the scanner relies on local port
Network Port enumeration before relying on network port scans. If a local
Scanners if port enumerator runs, all network port scanners are disabled
Local Port for the asset.
Enumeration
When this setting is disabled, the scanner performs network
- 312 -
Default
Setting Description
Value
Verify Open Disabled When enabled, if a local port enumerator (for example, WMI
TCP Ports or netstat) finds a port, the scanner also verifies that the port is
Found By open remotely. This approach helps determine if some form of
Local Port access control is being used (for example, TCP wrappers or a
Enumerators firewall).
TCP Disabled Use the built-in Tenable Nessus TCP scanner to identify open
TCP ports on the targets, using a full TCP three-way
handshake. If you enable this option, you can also set the
Override Automatic Firewall Detection option.
SYN Enabled Use the built-in Tenable Nessus SYN scanner to identify open
TCP ports on the target hosts. SYN scans do not initiate a full
TCP three-way handshake. The scanner sends a SYN packet
to the port, waits for SYN-ACK reply, and determines the port
state based on a response or lack of response.
If you enable this option, you can also set the Override
Automatic Firewall Detection option.
Override Disabled This setting can be enabled if you enable either the TCP or
Automatic SYN option.
Firewall
When enabled, this setting overrides automatic firewall
Detection
detection.
- 313 -
Default
Setting Description
Value
UDP Disabled This option engages the built-in Tenable Nessus UDP
scanner to identify open UDP ports on the targets.
Service Discovery
The Service Discovery section includes settings that attempt to map each open port with the service
that is running on that port.
Default
Setting Description
Value
General Settings
Probe All Ports Enabled When enabled, the scanner attempts to map each open
to Find Services port with the service that is running on that port, as defined
by the Port scan range option.
- 314 -
Default
Setting Description
Value
Search for Known Specifies which ports on target hosts the scanner searches
SSL/TLS On SSL/TLS for SSL/TLS services.
ports
This setting has three options:
l None
Search for None Specifies which ports on target hosts the scanner searches
DTLS On for DTLS services.
l None
Enumerate All True When enabled, the scanner ignores the list of ciphers
SSL/TLS advertised by SSL/TLS services and enumerates them by
Ciphers attempting to establish connections using all possible
ciphers.
- 315 -
Default
Setting Description
Value
Enable CRL False When enabled, the scanner checks that none of the
Checking identified certificates have been revoked.
(Connects to
the Internet)
Identity
The Identity section allows you to enable or disable the collection of Active Directory data.
General Settings
- 316 -
Vulnerability Scans (Common)
- 317 -
o Use netstat if
credentials are provided
- 318 -
o ICMP (2 retries)
o Use netstat if
credentials are provided
- 319 -
o ARP
o ICMP (2 retries)
- 320 -
o ICMP (2 retries)
o Use netstat if
credentials are provided
- 321 -
o Use netstat if
credentials are provided
o Use netstat if
credentials are provided
- 322 -
Custom All defaults
Legacy Web App Scan Port scan (common ports) l General Settings:
(default) o Always test the local
Nessus host
o Use fast network
discovery
o Use netstat if
- 323 -
credentials are provided
Configuration Scans
Audit Cloud – –
Infrastructure
- 324 -
SCAP and OVAL Host enumeration (default) l General Settings:
Auditing o Always test the local
Nessus host
o Use fast network
discovery
Tactical Scans
- 325 -
o Scan the default
Nessus port range
o Detect SSL/TLS on
ports where it is
commonly used
- 326 -
o Novell Netware hosts
- 327 -
Normal (default) l General Settings:
o Ping the remote host
o Always test the local
Nessus host
- 328 -
o Ping the remote host
o Always test the local
Nessus host
- 329 -
Custom All defaults
o Detect SSL/TLS on
ports where it is
commonly used
- 330 -
o Scan all TCP ports
o Detect SSL on all open
ports
- 331 -
Custom All defaults
- 332 -
Custom All defaults
- 333 -
and 445
o Detect SSL/TLS on
ports where it is
commonly used
Note: If a scan is based on a user-defined template, you cannot configure Assessment settings in the scan.
You can only modify these settings in the related user-defined template.
- 334 -
You can use Assessment settings to configure how a scan identifies vulnerabilities, as well as what
vulnerabilities are identified. This includes identifying malware, assessing the vulnerability of a
system to brute force attacks, and the susceptibility of web applications.
If you select the Custom preconfigured setting option, or if you are using a scanner template that
does not include preconfigured assessment settings, you can manually configure Assessment
settings in the following categories:
l General
l Brute Force
l SCADA
l Web Applications
l Windows
l Malware
l Databases
Note: The following tables include settings for the Advanced Network Scan template. Depending on the
template you select, certain settings may not be available, and default values may vary.
General
The General section includes the following groups of settings:
l Accuracy
l Antivirus
l SMTP
Accuracy
- 335 -
Accuracy paranoia is set to Show potential false alarms, a flaw is
reported every time, even when there is a doubt about the
remote host being affected. Conversely, a paranoia setting
of Avoid potential false alarms causes Tenable
Vulnerability Management to not report any flaw whenever
there is a hint of uncertainty about the remote host. As a
middle ground between these two settings, disable this
setting.
Perform Disabled Causes various plugins to work harder. For example, when
thorough looking through SMB file shares, a plugin analyzes 3
tests (may directory levels deep instead of 1. This could cause much
disrupt your more network traffic and analysis in some cases. By being
network or more thorough, the scan is more intrusive and is more likely
impact scan to disrupt the network, while potentially providing better audit
speed) results.
Antivirus
Antivirus 0 Configure the delay of the Antivirus software check for a set
definition number of days (0-7). The Antivirus Software Check menu
grace period allows you to direct Tenable Vulnerability Management to
(in days) allow for a specific grace time in reporting when antivirus
signatures are considered out of date. By default, Tenable
Vulnerability Management considers signatures out of date
regardless of how long ago an update became available
(e.g., a few hours ago). You can configure this option to
allow for up to 7 days before reporting them out of date.
SMTP
Third party Tenable Vulnerability Management attempts to send spam through each SMTP
domain device to the address listed in this field. This third party domain address must
be outside the range of the site being scanned or the site performing the scan.
Otherwise, the test may be aborted by the SMTP server.
From The test messages sent to the SMTP server(s) appear as if the messages
- 336 -
address originated from the address specified in this field.
Brute Force
The Brute Force section includes the following groups of settings:
l General Settings
l Oracle Database
Default
Setting Description
Value
General Settings
Only use Enabled In some cases, Tenable Vulnerability Management can test
credentials default accounts and known default passwords. This can
provided by cause the account to be locked out if too many consecutive
the user invalid attempts trigger security protocols on the operating
system or application. By default, this setting is enabled to
prevent Tenable Vulnerability Management from performing
these tests.
Oracle Database
Test default Disabled Test for known default accounts in Oracle software.
accounts
(slow)
SCADA
Default
Setting Description
Value
- 337 -
Default
Setting Description
Value
Web Applications
The Web Applications section includes the following groups of settings:
l General Settings
l Web Crawler
Web Crawler
- 338 -
Setting Default Value Description
- 339 -
Setting Default Value Description
Test embedded Disabled Embedded web servers are often static and
web servers contain no customizable CGI scripts. In
addition, embedded web servers may be
prone to crash or become non-responsive
when scanned. Tenable recommends
scanning embedded web servers
separately from other web servers using
this option.
- 340 -
Setting Default Value Description
/test.php?arg1=XSS&b=1&c=1, where b
and c allow other values, without testing
each combination. This is the quickest
method of testing with the smallest result
set generated.
- 341 -
Setting Default Value Description
Do not stop Stop after one flaw is found This setting determines when a new flaw is
after first flaw is per web server (fastest) targeted. This applies at the script level.
found per web Finding an XSS flaw does not disable
page searching for SQL injection or header
injection, but unless otherwise specified,
there is at most one report for each type on
a given port. Note that several flaws of the
same type (for example, XSS or SQLi) may
- 342 -
Setting Default Value Description
- 343 -
Setting Default Value Description
Windows
The Windows section contains the following groups of settings:
l General Settings
Default
Setting Description
Value
General Settings
You can enable as many of the user enumeration methods as appropriate for user discovery.
- 344 -
the Security Account Manager (SAM) registry.
End UID 1200 The end of a range of IDs where Tenable Vulnerability
Management attempts to enumerate domain users.
End UID 1200 The end of a range of IDs where Tenable Vulnerability
Management attempts to enumerate local users.
Malware
The Malware section contains the following groups of settings:
l General Settings
- 345 -
l Yara Rules
Default
Setting Description
Value
Custom Netstat IP None A text file that contains a list of known bad IP
Threat List addresses that you want to detect.
Provide your own list None A text file with one MD5 hash per line that specifies
of known bad MD5 additional known bad MD5 hashes.
hashes
Optionally, you can include a description for a hash by
adding a comma after the hash, followed by the
description. If any matches are found when scanning
a target, the description appears in the scan results.
You can also use hash-delimited comments (for
example, fop) in addition to comma-delimited
comments.
Provide your own list None A text file with one MD5 hash per line that specifies
of known good MD5 additional known good MD5 hashes.
hashes
Optionally, you can include a description for each
hash by adding a comma after the hash, followed by
the description. If any matches are found when
- 346 -
scanning a target, and a description was provided for
the hash, the description appears in the scan results.
You can also use hash-delimited comments (for
example, #) in addition to comma-delimited
comments.
Hosts file allow list None Tenable Vulnerability Management checks system
hosts files for signs of a compromise (for example,
Plugin ID 23910 titled Compromised Windows System
(hosts File Check)). This option allows you to upload a
file containing a list of IPs and hostnames you want
Tenable Vulnerability Management to ignore during a
scan. Include one IP and one hostname (formatted
identically to your hosts file on the target) per line in a
regular text file.
Yara Rules
Yara Rules None A .yar file containing the YARA rules to be applied in
the scan. You can only upload one file per scan, so
include all rules in a single file. For more information,
see yara.readthedocs.io.
- 347 -
(x86)% (x86)%.
Scan User Profiles Disabled Enables file system scanning to scan user profiles.
Linux Directories
MacOS Directories
Databases
Default
Setting Description
Value
Oracle Database
Use Disabled When enabled, if at least one host credential and one
detected SIDs Oracle database credential are configured, the scanner
authenticates to scan targets using the host credentials,
and then attempts to detect Oracle System IDs (SIDs)
locally. The scanner then attempts to authenticate using
the specified Oracle database credentials and the
detected SIDs.
- 348 -
host credentials or does not detect any SIDs locally, the
scanner authenticates to the Oracle database using the
manually specified SIDs in the Oracle database
credentials.
l Web Applications:
o Disable web application
scanning
l Web Applications:
o Start crawling from "/"
o Crawl 1000 pages (max)
o Traverse 6 directories
- 349 -
(max)
o Test for known
vulnerabilities in commonly
used web applications
o Generic web application
tests disabled
l Web Applications:
o Start crawling from "/"
o Crawl 1000 pages (max)
o Traverse 6 directories
(max)
o Test for known
vulnerabilities in commonly
used web applications
o Perform each generic web
app test for 5 minutes
(max)
l Web Applications:
- 350 -
o Start crawling from "/"
o Crawl 1000 pages (max)
o Traverse 6 directories
(max)
o Test for known
vulnerabilities in commonly
used web applications
o Perform each generic web
app test for 10 minutes
(max)
o Try all HTTP methods
o Attempt HTTP Parameter
Pollution
Host Discovery – –
l Web Applications:
o Disable web application
scanning
- 351 -
o Enable CGI scanning
l Web Applications:
o Start crawling from "/"
o Crawl 1000 pages (max)
o Traverse 6 directories
(max)
o Test for known
vulnerabilities in commonly
used web applications
o Generic web application
tests disabled
l Web Applications:
o Start crawling from "/"
o Crawl 1000 pages (max)
o Traverse 6 directories
(max)
o Test for known
vulnerabilities in commonly
used web applications
o Perform each generic web
app test for 5 minutes
(max)
- 352 -
vulnerabilities (complex) o Avoid potential false
alarms
o Enable CGI scanning
o Perform thorough tests
l Web Applications:
o Start crawling from "/"
o Crawl 1000 pages (max)
o Traverse 6 directories
(max)
o Test for known
vulnerabilities in commonly
used web applications
o Perform each generic web
app test for 10 minutes
(max)
o Try all HTTP methods
o Attempt HTTP Parameter
Pollution
l Web Applications:
o Start crawling from "/"
o Crawl 1000 pages (max)
- 353 -
o Traverse 6 directories
(max)
o Test for known
vulnerabilities in commonly
used web applications
o Generic web application
tests disabled
l Web Applications:
o Start crawling from "/"
o Crawl 1000 pages (max)
o Traverse 6 directories
(max)
o Test for known
vulnerabilities in commonly
used web applications
o Perform each generic web
app test for 5 minutes
(max)
- 354 -
l Web Applications:
o Start crawling from "/"
o Crawl 1000 pages (max)
o Traverse 6 directories
(max)
o Test for known
vulnerabilities in commonly
used web applications
o Perform each generic web
app test for 10 minutes
(max)
o Try all HTTP methods
o Attempt HTTP Parameter
Pollution
Mobile Device – –
Scan
PCI Quarterly – –
External Scan
Configuration Scans
Audit Cloud – –
Infrastructure
Policy Compliance – –
Auditing
- 355 -
Auditing
Tactical Scans
DROWN Detection – –
Shadow Brokers – –
Scan
Spectre and –
Meltdown
Detection – –
WannaCry – –
Ransomware
Detection
Note: If a scan is based on a user-defined template, you cannot configure Report settings in the scan. You
can only modify these settings in the related user-defined template.
l Processing
l Output
Default
Setting Description
Value
Processing
- 356 -
Default
Setting Description
Value
Override normal Disabled When disabled, provides the standard level of plugin
verbosity activity in the report. The output does not include the
informational plugins 56310, 64582, and 58651.
Hide results from Enabled When enabled, the list of dependencies is not included
plugins initiated as in the report. If you want to include the list of
a dependency dependencies in the report, disable this setting.
Output
Max Ports Reported 1,024 (Agent scans only) Determines the maximum number
of ports that can be included in the agent scan report.
Designate hosts by Disabled Uses the host name rather than IP address for report
their DNS name output.
Display hosts that Disabled Reports hosts that successfully respond to a ping.
respond to ping
Display Disabled When enabled, hosts that did not reply to the ping
- 357 -
Default
Setting Description
Value
Note: If a scan is based on a user-defined template, you cannot configure Advanced settings in the scan.
You can only modify these settings in the related user-defined template.
The Advanced settings provide increased control over scan efficiency and the operations of a scan,
as well as the ability to enable plugin debugging.
If you select the Custom preconfigured setting option, or if you are using a Nessus Scanner template
that does not include preconfigured advanced settings, you can manually configure Advanced
settings in the following categories:
l General Settings
l Performance Options
- 358 -
l Agent Performance (Agent scans only)
l Debug Settings
l Vulnerability Options
Note: The following tables include settings for the Advanced Network Scan template. Depending on the
template you select, certain settings may not be available, and default values may vary.
Default
Setting Description
Value
General Settings
Enable Safe Enabled When enabled, disables all plugins that may have an
Checks adverse effect on the remote host.
- 359 -
Default
Setting Description
Value
Scan targets with Disabled When disabled, to avoid overwhelming a host, Tenable
multiple domain Vulnerability Management prevents a single scanner
names in parallel from simultaneously scanning multiple targets that
resolve to a single IP address. Instead, Tenable
Vulnerability Management scanners serialize attempts to
scan the IP address, whether it appears more than once
in the same scan task or in multiple scan tasks on that
scanner. Scans may take longer to complete.
Create unique Enabled When enabled, the scanner creates a unique identifier
identifier on (Tenable UUID) . Tenable Vulnerability Management and
hosts scanned Tenable Security Center use the Tenable UUID to merge
using credentials incoming scan data with historical results for the asset
and ensure that license counts are accurately reflected.
- 360 -
Default
Setting Description
Value
Performance Options
Slow down the Disabled When enabled, Tenable detects when it is sending too
scan when many packets and the network pipe is approaching
network capacity. If network congestion is detected, throttles the
congestion is scan to accommodate and alleviate the congestion. Once
detected the congestion has subsided, Tenable automatically
attempts to use the available space within the network
pipe again.
Use Linux kernel Disabled When enabled, Tenable Vulnerability Management uses
congestion the Linux kernel to detect when it sends too many
detection packets and the network pipe approaches capacity. If
detected, Tenable Vulnerability Management throttles the
scan to accommodate and alleviate the congestion. Once
the congestion subsides, Tenable Vulnerability
Management automatically attempts to use the available
space within the network pipe again.
- 361 -
Default
Setting Description
Value
Network timeout 5 Specifies the time that Tenable waits for a response from
(in seconds) a host unless otherwise specified within a plugin. If you
are scanning over a slow connection, you may want to
set this to a higher number of seconds.
- 362 -
Default
Setting Description
Value
- 363 -
Default
Setting Description
Value
Exclude Filepath None A plain text file containing a list of filepaths to exclude
from all plugins that search using the find command on
Unix systems.
Include Filepath None A plain text file containing a list of filepaths to include
from all plugins that search using the find command on
Unix systems.
- 364 -
Default
Setting Description
Value
- 365 -
Default
Setting Description
Value
Windows Include None A plain text file containing a list of filepaths to include
Filepath from all plugins that search using Tenable's unmanaged
software directory scans.
Debug Settings
Enable plugin Disabled Attaches available debug logs from plugins to the
debugging vulnerability output of this scan.
- 366 -
Default
Setting Description
Value
Maximum delay 0 (Agents 8.2 and later) If set, each agent in the agent
(minutes) group delays starting the scan for a random number of
minutes, up to the specified maximum. Staggered starts
can reduce the impact of agents that use a shared
resource, such as virtual machine CPU.
Maximum 128,000 KB Controls the maximum output length for each individual
Compliance compliance check value that the target returns. If a
Output Length in compliance check value that is greater than this setting's
KB value, Tenable Vulnerability Management truncates the
result.
- 367 -
Default
Setting Description
Value
Maximum 300 seconds Controls the maximum timeout duration for compliance
Compliance checks.
Check Timeout in
This setting is used by checks with long run times,
Seconds
especially checks that run commands on remote targets
for Windows and Unix audits. This timeout setting
overrides all other timeout settings when it is available.
Vulnerability Options
- 368 -
Default
Setting Description
Value
Scan for Disabled Determines whether the scan searches for unpatched
unpatched vulnerabilities. This includes CVEs marked as Will Not
vulnerabilities Fix by the related vendor.
(no patches or
Enabling this setting may increase your overall findings
mitigations
count; each platform and package combination results in
available)
an individual plugin. If additional CVEs are found to affect
a platform and package combination, the CVEs are
added to the existing plugin.
Custom Red Hat Disabled, Upload a .json file that maps internal custom or mirrored
Repository requires you repositories to their official Red Hat repository
Mapping to upload a counterparts. For more information on how this works,
.json file see How Red Hat Local Vulnerability Checks Use
Repositories To Determine Scope.
- 369 -
o 30 simultaneous hosts (max)
o 4 simultaneous checks per host
(max)
o 5 second network read timeout
l Performance options:
o 30 simultaneous hosts (max)
o 4 simultaneous checks per host
(max)
o 5 second network read timeout
- 370 -
o Create unique identifier on
hosts scanned using
credentials
- 371 -
Host Discovery – –
- 372 -
(max)
o 5 second network read timeout
- 373 -
o Slow down the scan when
network congestion is detected
Configuration Scans
- 374 -
o 5 second network read timeout
- 375 -
Scan low l Performance options:
bandwidth links o 2 simultaneous hosts (max)
o 2 simultaneous checks per host
(max)
o 15 second network read
timeout
o Slow down the scan when
network congestion is detected
Tactical Scans
- 376 -
o Create unique identifier on
hosts scanned using
credentials
- 377 -
Credentialed scans can perform any operation that a local user can perform. The level of scanning
depends on the privileges granted to the user account. The more privileges the scanner has via the
login account (for example, root or administrator access), the more thorough the scan results.
In Tenable Vulnerability Management, you can create credentials for use in scans in the following
ways:
- 378 -
template, you must recreate the template-specific
credentials in the other template.
The settings you configure for a credential vary based on the credential type. Credential types
include:
l Cloud Services
l Database
l Host
l Miscellaneous
l Patch Management
l Plaintext authentication
- 379 -
l Add a Credential to a User-defined Template
Note: Tenable Vulnerability Management opens several concurrent authenticated connections. Ensure that
the host being audited does not have a strict account lockout policy based on concurrent sessions.
Note: By default, when creating credentialed scans or user-defined templates, hosts are
identified and marked with a Tenable Asset Identifier (TAI). This globally unique identifier is
written to the host's registry or file system, and subsequent scans can retrieve and use the TAI.
This option is enabled (by default) or disabled in the Advanced -> General Settings of a scan
configuration or template: Create unique identifier on hosts scanned using credentials.
Note: If a Tenable Vulnerability Management scan contains multiple instances of one type of credential,
Tenable Vulnerability Management attempts to log into a valid target using each credential in sequence, in
the same order in which they were added to the scan. Tenable Vulnerability Management uses the first
credential it is able to log in successfully with to perform credentialed checks on the target. Once Tenable
Vulnerability Management is able to log in successfully with a credential set, it does not attempt to log in
with any of the other credentials in the scan, regardless of their relative levels of access.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
In the event that a scan contains multiple instances of a single type of credential (SSH logins, SMB
logins, etc.), Tenable Vulnerability Management attempts to use them on a valid target in the order
that they were added to the scan configuration.
Note: The first credential that allows successful login is used to perform credentialed checks on the target.
After a credential provides successful login, Tenable Vulnerability Management does not try any of the
other credentials in the list, even if one of the latter credentials has a greater degree of access or privileges.
- 380 -
1. Create or edit a scan.
The Credentials page appears. This page contains a table of credentials configured for the
scan.
a. (Optional) Search for a managed credential in the list by typing your search criteria in the
text box and clicking the button.
b. In the Managed Credentials section, click the button to display all managed
credentials.
d. To close the Select Credential Type plane, click the button in the upper-right corner
of the plane.
- 381 -
a. In any section of the Select Credential Type plane except the Managed Credentials
section, click the button to display the credentials for that type.
e. In the first text box, type a name for the managed credential.
f. (Optional) In the second text box, type a brief description of the managed credential.
Tenable Vulnerability Management closes the settings plane and adds the credential to the
credentials table for the scan.
Note: Upon saving, Tenable Vulnerability Management automatically orders the credentials by
ascending ID and groups the credentials by type.
l If you want to save and launch the scan immediately, click Save & Launch.
Note: If you scheduled the scan to run at a later time, the Save & Launch option is not
available.
Note: If you are editing an imported scan, the Save & Launch option is not available.
- 382 -
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
1. Edit a scan.
6. (Managed credentials only) Click Yes to save the changes to the managed credential.
- 383 -
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
l You cannot use managed credentials in user-defined templates. To use a single set of
credentials for multiple scans, add managed credentials to scans, instead of adding
credentials to user-defined templates.
Note: In scan configurations, the Scan-wide Credential Type settings are located in individual credentials.
In user-defined templates, these settings are located in the Authentication section of the Basic settings for
the template.
The Credentials page appears. This page contains a table of credentials configured for the
template.
Tenable Vulnerability Management closes the settings plane and adds the credential to the
credentials table for the template.
- 384 -
7. Click Save to save your template changes.
Tenable Vulnerability Management adds the credential to the credentials table for the
template.
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
Required Tenable Vulnerability Management User Role: Basic, Scan Operator, Standard, Scan
Manager, or Administrator
A scan-specific credential can only be used in a single scan. To reuse a scan-specific credential in
multiple scans, convert it to a managed credential.
- 385 -
1. In the left navigation, click Scans.
2. In the Folders section, click a folder to load the scans you want to view.
The scans table updates to display the scans in the folder you selected.
6. In the credentials table, click the scan-specific credential you want to convert.
8. In the first text box, type a name for the managed credential.
9. (Optional) In the second text box, type a brief description of the managed credential.
Tenable Vulnerability Management closes the settings plane and adds the credential to the
credentials table for the scan.
Cloud Services
Tenable Vulnerability Management can authenticate a scan using accounts in the cloud services
listed below.
- 386 -
Note: Some credential types may not be available for configuration, depending on the scan template you
selected.
AWS
Default
Option Description Required
Value
l us-east-1
l us-east-2
l us-west-1
- 387 -
l us-west-2
l ca-central-1
l eu-west-1
l eu-west-2
l eu-central-1
l ap-northeast-1
l ap-northeast-2
l ap-southeast-1
l ap-southeast-2
l sa-east-1
l cn-north-1
l cn-northwest-1
Microsoft Azure
Default
Option Description Required
Value
- 388 -
Password – Password associated with the username. yes
Rackspace
l Chicago (ORD)
l London (LON)
l Syndney (SYD)
Salesforce.com
- 389 -
Value
Database Credentials
Note: Some credential types may not be available for configuration, depending on the scan template you
selected.
Cassandra
Option Description
Auth Type The authentication method for providing the required credentials.
l Password
l CyberArk
l Lieberman
l Hashicorp Vault
For descriptions of the options for your selected authentication type, see
Database Credentials Authentication Types.
Port The port the database listens on. The default is port 9042.
Delinea Host The Delinea Secret Server host to pull the secrets from. Yes
Delinea Port The Delinea Secret Server Port for API requests. By Yes
default, Tenable uses 443.
- 390 -
Option Description Required
Delinea API Key The API key generated in the Secret Server user Yes
interface. This setting is required if the API Key
authentication method is selected.
Folder ID Query accounts with the given folder ID. This option is No
only available if query mode is set to Simple.
Search Text Query accounts matching the given search text. This No
option is only available if query mode is set to Simple.
Search Field The field to search using the given search text. If not No
specified, the query will search the name field. This
option is only available if query mode is set to Simple.
Query String Provide a string of URL query parameters. This option is Yes
only available if query mode is set to Advanced, and in
that case it is required.
- 391 -
Option Description Required
DB2
The following table describes the additional options to configure for DB2 credentials.
Options Description
Auth Type The authentication method for providing the required credentials.
l Password
l Import
l CyberArk
l Lieberman
l Hashicorp Vault
For descriptions of the options for your selected authentication type, see
Database Credentials Authentication Types.
Database The TCP port that the IBM DB2 database instance listens on for
Port communications from Tenable Vulnerability Management. The default is port
50000.
Database The name for your database (not the name of your instance).
Name
MongoDB
Option Description
Auth Type The authentication method for providing the required credentials.
Note: This option is only available for non-legacy versions of the MongoDB
- 392 -
Option Description
authentication method.
l Password
l Client Certificate
l CyberArk
l Lieberman
l Hashicorp Vault
For descriptions of the options for your selected authentication type, see
Database Credentials Authentication Types.
Port (Required) The TCP port that the MongoDB database instance listens on for
communications from Tenable Vulnerability Management.
MySQL
The following table describes the additional options to configure for MySQL credentials.
Options Description
Auth Type The authentication method for providing the required credentials.
l Password
l Import
l CyberArk
l Lieberman
- 393 -
Options Description
l Hashicorp Vault
For descriptions of the options for your selected authentication type, see
Database Credentials Authentication Types.
Database The TCP port that the MySQL database instance listens on for
Port communications from Tenable Vulnerability Management. The default is port
3306.
Oracle
The following table describes the additional options to configure for Oracle credentials.
Options Description
Auth Type The authentication method for providing the required credentials.
l Password
l Import
l CyberArk
l Lieberman
l Hashicorp Vault
For descriptions of the options for your selected authentication type, see
Database Credentials Authentication Types.
Database The TCP port that the Oracle database instance listens on for communications
Port from Tenable Vulnerability Management. The default is port 1521.
Auth Type The type of account you want Tenable Vulnerability Management to use to
access the database instance:
l SYSDBA
- 394 -
Options Description
l SYSOPER
l NORMAL
Service Type The Oracle parameter you want to use to specify the database instance:
SID or SERVICE_NAME.
Service The SID value or SERVICE_NAME value for your database instance.
The Service value you enter must match your parameter selection for the
Service Type option.
PostgreSQL
The following table describes the additional options to configure for PostgreSQL credentials.
Options Description
Auth Type The authentication method for providing the required credentials.
l Password
l Client Certificate
l CyberArk
l Lieberman
l Hashicorp Vault
For descriptions of the options for your selected authentication type, see
Database Credentials Authentication Types.
Database The TCP port that the PostgreSQL database instance listens on for
Port communications from Tenable Vulnerability Management. The default is port
5432.
SQL Server
- 395 -
The following table describes the additional options to configure for SQL Server credentials.
Options Description
Auth Type The authentication method for providing the required credentials.
l Password
l Import
l CyberArk
l Lieberman
l Hashicorp Vault
For descriptions of the options for your selected authentication type, see
Database Credentials Authentication Types.
Database The TCP port that the SQL Server database instance listens on for
Port communications from Tenable Vulnerability Management. The default is port
1433.
AuthType The type of account you want Tenable Vulnerability Management to use to
access the database instance: SQL or Windows.
Sybase ASE
The following table describes the additional options to configure for Sybase ASE credentials.
Options Description
Auth Type The authentication method for providing the required credentials.
l Password
l CyberArk
- 396 -
Options Description
l Lieberman
l Hashicorp Vault
For descriptions of the options for your selected authentication type, see
Database Credentials Authentication Types.
Database The TCP port that the Sybase ASE database instance listens on for
Port communications from Tenable Vulnerability Management. The default is port
3638.
Auth Type The type of authentication used by the Sybase ASE database: RSA or Plain
Text.
Depending on the authentication type you select for your database credentials, you must configure
the options described in this topic.
Client Certificate
The Client Certificate authentication type is supported for PostgreSQL databases only.
Client Certificate The file that contains the PEM certificate for the yes
database.
Client CA Certificate The file that contains the PEM certificate for the yes
database.
Client Certificate The file that contains the PEM private key for the yes
Private Key client certificate.
- 397 -
Option Description Required
Password
Database
Option Description Required
Types
l SYSDBA
l SYSOPER
l NORMAL
l RSA
- 398 -
Database
Option Description Required
Types
l Plain Text
l SID
l SERVICE_NAME
Import
Upload a .csv file with the credentials entered in the specified format. For descriptions of valid
values to use for each item, see Database Credentials.
You must configure either CyberArk or HashiCorp credentials for a database credential in the same
scan so that Tenable Vulnerability Management can retrieve the credentials.
Database
CSV Format
Credential
- 399 -
Database
CSV Format
Credential
manager, accountname_or_secretname
Note: Include the required data in the specified order, with commas between each value, without spaces.
For example, for Oracle with CyberArk: 192.0.2.255,1521,SID,service_
id,username,SYSDBA,CyberArk,Database-Oracle-SYS.
BeyondTrust
Option Description Required
Username The username to log in to the host you want to scan. yes
Checkout duration The length of time, in minutes, that you want to keep yes
credentials checked out in BeyondTrust. Configure
the checkout duration to exceed the typical duration
of your scans. If a password from a previous scan is
still checked out when a new scan begins, the new
scan fails.
- 400 -
disrupt your scans. If BeyondTrust changes a
password during a scan, the scan fails.
Verify SSL certificate When enabled, the intergation validates the SSL no
certificate. Configure SSL through IIS in
BeyondTrust before enabling this option.
CyberArk
CyberArk is a popular enterprise password vault that helps you manage privileged credentials.
Tenable Vulnerability Management can get credentials from CyberArk to use in a scan.
CyberArk Host The IP address or FQDN name for the CyberArk AIM Web yes
Service. This can be the host, or the host with a custom
URL added on in a single string.
- 401 -
Option Description Required
Client The file that contains the PEM private key for the client yes, if private
Certificate certificate. key is
Private Key applied
Client The passphrase for the private key, if required. yes, if private
Certificate key is
Private Key applied
Passphrase
Get credential The method with which your CyberArk API credentials are yes
by retrieved. Can be Address, Identifier, Parameters, or
Username.
Use SSL If enabled, the scanner uses SSL through IIS for secure no
communications. Enable this option if CyberArk is
configured to support SSL through IIS.
- 402 -
Option Description Required
CyberArk (Legacy)
CyberArk is a popular enterprise password vault that helps you manage privileged credentials.
Tenable Vulnerability Management can get credentials from CyberArk to use in a scan.
Database
Option Description Required
Types
- 403 -
Database
Option Description Required
Types
- 404 -
Database
Option Description Required
Types
l SYSDBA
l SYSOPER
l NORMAL
l RSA
l Plain Text
- 405 -
Database
Option Description Required
Types
Instance Name SQL Server The name for your database instance. no
l SID
l SERVICE_NAME
Delinea
Option Description Required
Delinea Secret Name The value of the secret on the Delinea server. The yes
secret is labeled Secret Name on the Delinea
server.
Delinea Port The port on which Delinea Secret Server listens. yes
- 406 -
Delinea API key The API key provided by Delinea Secret Server. yes
Delinea Host The Delinea Secret Server host to pull the secrets from. Yes
Delinea Port The Delinea Secret Server Port for API requests. By Yes
default, Tenable uses 443.
Delinea API Key The API key generated in the Secret Server user Yes
interface. This setting is required if the API Key
authentication method is selected.
Folder ID Query accounts with the given folder ID. This option is No
only available if query mode is set to Simple.
Search Text Query accounts matching the given search text. This No
option is only available if query mode is set to Simple.
- 407 -
Option Description Required
Search Field The field to search using the given search text. If not No
specified, the query will search the name field. This
option is only available if query mode is set to Simple.
Query String Provide a string of URL query parameters. This option is Yes
only available if query mode is set to Advanced, and in
that case it is required.
HashiCorp Vault
HashiCorp Vault is a popular enterprise password vault that helps you manage privileged
credentials. Tenable Vulnerability Management can get credentials from HashiCorp Vault to use in a
scan.
Hashicorp Vault host The Hashicorp Vault IP address or DNS address. yes
Hashicorp Vault port The port on which Hashicorp Vault listens. yes
- 408 -
the instance: App Role or Certificates.
/v1/auth/approle/login
KV1 Engine URL (KV1) The URL Tenable Vulnerability yes, if you
Management uses to access the KV1 engine. select the KV1
Vault Type
Example: /v1/path_to_secret. No trailing /
KV2 Engine URL (KV2) The URL Tenable Vulnerability yes, if you
Management uses to access the KV2 engine. select the KV2
Vault Type
Example: /v1/path_to_secret. No trailing /
- 409 -
engine. Vault Type
LDAP Engine URL (LDAP) The URL Tenable Vulnerability yes, if you
Management uses to access the LDAP engine. select the
LDAP Vault
Example: /v1/path_to_secret. No trailing /
Type
Username Key (KV1 and KV2) The name in Hashicorp Vault that yes
usernames are stored under.
Password Key (KV1 and KV2) The key in Hashicorp Vault that yes
passwords are stored under.
Secret Name (KV1, KV2, and AD) The key secret you want to yes
retrieve values for.
Verify SSL Certificate If enabled, validates the SSL certificate. You must no
configure SSL in Hashicorp Vault before enabling
this option.
l SYSDBA
l SYSOPER
- 410 -
l NORMAL
Service Type (Oracle databases only) Valid values include: SID yes
and SERVICE_NAME.
Lieberman
Lieberman is a popular enterprise password vault that helps you manage privileged credentials.
Tenable Vulnerability Management can get credentials from Lieberman to use in a scan.
- 411 -
Option Database Type Description Required
Lieberman Client All The file that contains the PEM private no
Certificate key for the client certificate.
Private Key
- 412 -
Option Database Type Description Required
l SQL
l SYSDBA
l SYSOPER
l NORMAL
l RSA
l Plain Text
l SID
l SERVICE_NAME
- 413 -
Option Database Type Description Required
QiAnXin
QiAnXin is a popular enterprise password vault that helps you manage privileged credentials.
Tenable Vulnerability Management can get credentials from QiAnXin to use in a scan.
QiAnXin Host The IP address or URL for the QiAnXin host. yes
QiAnXin Port The port on which the QiAnXin API communicates. yes
By default, Tenable uses 443.
QiAnXin API Client ID The Client ID for the embedded account yes
application created in QiAnXin PAM
QiAnXin API Secret ID The Secret ID for the embedded account yes
application created in QiAnXin PAM
- 414 -
Option Description Required
l HP_UNIX — HP Unix
l SOLARIS — Solaris
l OPENLDAP — OpenLDAP
l POSTGRESQL — PostgreSQL
Region ID Specify the region ID of the asset containing the Only if using
account to use. multiple
regions
Verify SSL Certificate When enabled, Tenable verifies that the SSL no
Certificate on the server is signed by a trusted CA.
Senhasegura
Option Description Required
- 415 -
Option Description Required
Private Key File The Private Key used to decrypt Required if you have
encrypted sensitive data from A2A. enabled encryption of
sensitive data in A2A
Note: You can enable encryption of Application
sensitive data in the A2A Application
Authorizations.
Authorizations. If enabled, you must
provide a private key file in the scan
credentials. This can be downloaded from
the applicable A2A application in
Senhasegura.
Host
l SNMPv3
l Windows
- 416 -
Note: Some credential types may not be available for configuration, depending on the scan template you
selected.
SNMPv3
Use SNMPv3 credentials to scan remote systems that use an encrypted network management
protocol (including network devices). Tenable Vulnerability Management uses these credentials to
scan for patch auditing or compliance checks.
Note: SNMPv3 options are only available in the Advanced Network Scan template.
l Authentication and
privacy
Authentication The algorithm the remove SHA1 yes (if you select
algorithm service supports: SHA1, authentication)
SHA224, SHA-256, SHA-
- 417 -
Option Description Default Required
Privacy algorithm The encryption algorithm to AES-192 yes (if you select
use for SNMP traffic: AES, authentication
AES-192, AES-192C, AES- with privacy)
256, AES-256C, or DES.
SSH
Use SSH credentials for host-based checks on Unix systems and supported network devices.
Tenable Vulnerability Management uses these credentials to obtain local information from remote
Unix systems for patch auditing or compliance checks. Tenable Vulnerability Management uses
Secure Shell (SSH) protocol version 2 based programs (e.g., OpenSSH, Solaris SSH, etc.) for host-
based checks.
Tenable Vulnerability Management encrypts the data to protect it from being viewed by sniffer
programs.
Note: Non-privileged users with local access on Linux systems can determine basic security issues, such
as patch levels or entries in the /etc/passwd file. For more comprehensive information, such as system
configuration data or file permissions across the entire system, an account with root privileges is required.
Note: You can add up to 1000 SSH credentials in a single scan. For best performance, Tenable
recommends adding no more than 10 SSH credentials per scan.
Select SSH in the Credentials list to configure the settings for the following SSH authentication
methods:
- 418 -
SSH Authentication Method: Public Key
Public Key Encryption, also referred to as asymmetric key encryption, provides a more secure
authentication mechanism by the use of a public and private key pair. In asymmetric cryptography,
the public key is used to encrypt data and the private key is used to decrypt it. The use of public and
private keys is a more secure and flexible method for SSH authentication. Tenable Vulnerability
Management supports both DSA and RSA key formats.
Like Public Key Encryption, Tenable Vulnerability Management supports RSA and DSA OpenSSH
certificates. Tenable Vulnerability Management also requires the user certificate, which is signed by
a Certificate Authority (CA), and the user’s private key.
Note:Tenable Vulnerability Management supports the OpenSSH SSH public key format. Formats from
other SSH applications, including PuTTY and SSH Communications Security, must be converted to
OpenSSH public key format.
The most effective credentialed scans are when the supplied credentials have root privileges. Since
many sites do not permit a remote login as root, Tenable Vulnerability Management can invoke su,
sudo, su+sudo, dzdo, .k5login, or pbrun with a separate password for an account that has been set
up to have su or sudo privileges. In addition, Tenable Vulnerability Management can escalate
privileges on Cisco devices by selecting Cisco ‘enable’ or .k5login for Kerberos logins.
Note:Tenable Vulnerability Management supports the blowfish-cbc, aes-cbc, and aes-ctr cipher algorithms.
Some commercial variants of SSH do not have support for the blowfish algorithm, possibly for export
reasons. It is also possible to configure an SSH server to accept certain types of encryption only. Check
your SSH server to ensure the correct algorithm is supported.
Tenable Vulnerability Management encrypts all passwords stored in policies. However, the use of
SSH keys for authentication rather than SSH passwords is recommended. This helps ensure that
the same username and password you are using to audit your known SSH servers is not used to
attempt a log into a system that may not be under your control.
Note: For supported network devices, Tenable Vulnerability Management only supports the network
device’s username and password for SSH connections.
If an account other than root must be used for privilege escalation, it can be specified under the
Escalation account with the Escalation password.
- 419 -
Option Description Required
Private Key The RSA or DSA Open SSH key file of the user. yes
User The RSA or DSA Open SSH certificate file of the user. yes
Certificate
Private Key The RSA or DSA Open SSH key file of the user. yes
- 420 -
Option Description Required
CyberArk
CyberArk Host The IP address or FQDN name for the CyberArk AIM yes
Web Service.
- 421 -
Option Description Required
Client Certificate The file that contains the PEM certificate used to no
communicate with the CyberArk host.
Client Certificate The file that contains the PEM private key for the client yes, if private
Private Key certificate. key is
applied
Client Certificate The passphrase for the private key, if required. yes, if private
Private Key key is
Passphrase applied
- 422 -
Option Description Required
Get credential by The method with which your CyberArk API credentials yes
are retrieved. Can be Address, Identifier, Parameters,
or Username.
Use SSL If enabled, the scanner uses SSL through IIS for secure no
communications. Enable this option if CyberArk is
configured to support SSL through IIS.
- 423 -
Option Description Required
CyberArk Auto-Discovery
You can now take advantage of a significant improvement to Tenable’s CyberArk Integration which
gathers bulk account information for specific target groups without entering multiple targets. For
more information, see CyberArk Dynamic Scanning in the Tenable CyberArk Integrations Guide.
CyberArk Host The IP address or FQDN name for the user’s CyberArk yes
Instance.
- 424 -
Option Description Required
CCP Host The IP address or FQDN name for the user’s CyberArk no
CCP component.
CCP Port The port on which the CyberArk CCP (AIM Web no
Service) API communicates. By default, Tenable uses
443.
AIM Web Service There are two authentication methods established in the yes
Authentication feature. IIS Basic Authentication and Certificate
Type Authentication. Certificate Authentication can be either
encrypted or unencrypted.
CyberArk PVWA Password for the username to log in to CyberArk web yes
Web UI Login console. This is used to authenticate to the PVWA
- 425 -
Option Description Required