- 22 Sep 2024
- 1 Minute to read
- Print
- DarkLight
- PDF
Tenable.io - Create Assets
- Updated on 22 Sep 2024
- 1 Minute to read
- Print
- DarkLight
- PDF
Tenable.io - Create Assets adds an asset in Tenable.io for:
- Assets that match the results of the selected saved query, and match the Enforcement Action Conditions, if defined or assets selected on the relevant asset page.
Tenable.io assets are entities of value on a network, that can be exploited. This includes laptops, desktops, servers, routers, mobile phones, virtual machines, software containers, and cloud instances.
- Not all asset categories are supported for all Enforcement Actions.
- See Actions supported for Activity Logs, Adapters Fetch History, and Asset Investigation modules.
- See Actions supported for Vulnerabilities.
- See Actions supported for Software.
General Settings
- Action name - The name of this Enforcement Action. The system sets a default name. You can change the name.
- Configure Dynamic Values - Toggle on to enter a Dynamic Value statement. See Creating Enforcement Action Dynamic Value Statements to learn more about Dynamic Value statement syntax.
- Use stored credentials from the Tenable.io Adapter - Select this option to use the the first connected Tenable.io adapter credentials.NOTETo use this option, you must successfully configure a Tenable.io adapter connection.
Required Fields
These fields must be configured to run the Enforcement Set.
Compute Node - The Axonius node to use when connecting to the specified host. For more details, see Connecting Additional Axonius Nodes.
Additional Fields
These fields are optional.
Tenable.io domain - The IP address or hostname of your Tenable.io management server.
Access API key and Secret API key (required) - These values must be created in the Tenable.io console. To generate an API key in the Tenable.io console, see Tenable.io - Generate an API Key.
- Verify SSL (optional) - Select whether to verify the SSL certificate of the server against the CA database inside of Axonius. For more details, see SSL Trust & CA Settings.
- HTTPS Proxy (optional) - Connect the adapter to a proxy instead of directly connecting it to the domain.
For more details about other Enforcement Actions available, see Action Library.