Tenable Vulnerability Management
  • 24 Sep 2024
  • 1 Minute to read
  • Contributors
  • Dark
    Light

Tenable Vulnerability Management

  • Dark
    Light

Article summary

Tenable Vulnerability Management allows you to find hidden vulnerabilities with continuous, always-on asset discovery and assessment of known and unknown assets in your environment, even highly dynamic cloud or remote workforce assets.

Integration

To connect Tenable IO Vulnerability Management with Databee to pull vulnerabilities data, Databee needs to connect with 3 API endpoints. To fetch the asset data also, Databee needs to connect with 3 API endpoints.

Integration Method: API

Tables: Device Inventory Info, Detection Finding

Event Types:

  • List Assets

  • Get Asset Details

  • Get Host Details

  • Export Vulnerabilities

  • Get vuln export status

  • Download vulnerabilities chunk

Tenable Configuration

This step creates the API credentials on the Tenable VM instance. You will need the API Key and Secret Key.

Before starting the configuration of data source on Databee UI (User Interface), the user will need to create the API Client and get the necessary information for API authentication such as API Key and API Secret Keyt.

  • Login to your Tenable IO Vulnerability Management dashboard.

  • Navigate to Settings on the top right 

  • The Settings page appears. Click the My Account tile.

  • The My Account page appears, where you can view and update your account details.

  • In the upper-right corner, click the user profile icon. The user account menu appears.

  • Navigate to the API Keys section and click Generate

  • The Generate API Keys window appears with a warning (Caution: Any existing API keys are replaced when you click the Generate button. You must update the applications where the previous API keys were used).

  • Review the warning and click the Continue Button.

  • Vulnerability Management generates new access and secret keys and displays the new keys in the Custom API Keys section of the page.

A screenshot of a computer  Description automatically generated

  • Save the new access and secret keys. This will be used when configuring DataBee
    Caution: Be sure to copy the access and secret keys before you close the API Keys tab. After you close this tab, you cannot retrieve the keys from Vulnerability Management.

Databee Configuration

  • To configure the Data Source, login into the Databee UI and click on Data and Add New Data Source.

  • Search and click on the Tenable Vulnerability Management as mentioned below.

  • Click on the API Ingest option for the collection method.


  • Give the name of the Data Source and other relevant information as mentioned below, and click Next

  • Enter the following in the configuration page

    • Authorization Method: Custom API Key

    • Access Key: Enter the API ID obtained in the previous step

    • Secret Key: Enter the API Secret Key obtained in the previous step

    • If the API URLs are not configured, enter the following


Was this article helpful?

What's Next
Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.
ESC

Eddy AI, facilitating knowledge discovery through conversational intelligence