Tenable.sc (SecurityCenter)
  • 3 minutes to read
  • Print
  • Share
  • Dark
    Light

Tenable.sc (SecurityCenter)

  • Print
  • Share
  • Dark
    Light

Tenable.sc (formerly SecurityCenter) consolidates and evaluates vulnerability data, prioritizing security risks.

Parameters

The Tenable.sc Adapter connection requires the following parameters:

  1. URL (required) - The URL of the Tenable.sc management server. (e.g., https://tenable-sc.company.com)
  2. Username and Password (optional, default: empty) - The credentials for a user account that has the Required Permissions to fetch assets.
  3. API Token (optional, default: empty) - The API Token associated to a user account that has the Required Permissions to fetch assets.
NOTE

You must specify API Token or User Name and Password. It is recommended to use an API token.

  1. Verify SSL (required, default: False) - Verify the SSL certificate offered by the value supplied in URL. For more details, see SSL Trust & CA Settings.
    • If enabled, the SSL certificate offered by the value supplied in URL will be verified against the CA database inside of Axonius. If the SSL certificate cannot be validated against the CA database inside of Axonius, the connection will fail with an error.
    • If disabled, the SSL certificate offered by the value supplied in URL will not be verified against the CA database inside of Axonius.
  2. For details on the common adapter connection parameters and buttons, see Adding a New Adapter Connection.

image.png

Advanced Settings

  1. Do not fetch devices with no MAC address and no hostname (required, default: False) - Choose whether to exclude fetching devices without MAC address and without hostname.
    • If enabled, all connections for this adapter will only fetch devices having MAC address or hostname.
    • If disabled, all connections for this adapter will fetch devices even if those do not have MAC address and no hostname.
  2. Fetch Top N installed software (optional, default: 0) - Specify the number of the top most common installed software fetched from Tenable.sc.
    • If supplied, all connections for this adapter will fetch the top N most common installed software fetched from Tenable.sc.
    • If not supplied (or '0') - all connections for this adapter will not fetch any installed software from Tenable.sc.
  3. Fetch installed software per device (required, default: False) - Choose whether to fetch all installed software from Tenable.sc.
    • If enabled, all connections for this adapter will fetch installed software fetched from Tenable.sc.
      • If you have selected this option, set Fetch top N installed software as 0.
    • If disabled, all connections for this adapter will not fetch any installed software from Tenable.sc.
  4. Fetch vulnerabilities (required, default: False) - Choose whether to fetch devices' vulnerabilities from Tenable.sc.
    • If enabled, all connections for this adapter will fetch vulnerabilities data from Tenable.sc.
    • If disabled, all connections for this adapter will not fetch any vulnerabilities data from Tenable.sc.
  5. Do not fetch devices with unauthenticated scans only (required, default: False) - Choose whether to fetch devices with unauthenticated scans only Tenable.sc.
    • If enabled, all connections for this adapter will fetch devices with authenticated scans only from Tenable.sc.
    • If disabled, all connections for this adapter will fetch devices with authenticated and unauthenticated scans from Tenable.sc.
  6. Fetch info level vulnerabilities only for listed plugin IDs (optional, default: empty) - Specify a comma-separated list of Tenable.sc plugin IDs.
    • If supplied, all connections for this adapter will only collect info level vulnerabilities from Tenable.sc for the plugin IDs provided in this list.
    • If not supplied, all connections for this adapter will not collect any info level vulnerabilities from Tenable.sc.

image.png

NOTE

For details on general advanced settings under the Adapter Configuration tab, see Adapter Advanced Settings.

Required Permissions

The value supplied in User Name and Password or in API Token must be for an account in Tenable.sc that has the “Security Manager” role, with access to all the required repositories.

Fore details on generating API Token, see Tenable.sc - Generate API Keys.

Was this article helpful?