Tenable Vulnerability Management (formerly Tenable.io)
Tenable Vulnerability Management (formerly Tenable.io) Pack.#
This Integration is part of theA comprehensive asset-centric solution to accurately track resources while accommodating dynamic assets such as cloud, mobile devices, containers, and web applications. This integration was integrated and tested with January 2023 release of Tenable.io.
#
Configure Tenable Vulnerability Management on Cortex XSOARNavigate to Settings > Integrations > Servers & Services.
Search for Tenable Vulnerability Management. Click Add instance to create and configure a new integration instance.
Parameter Description Required URL Tenable URL. True Access Key Tenable API access key. True Secret Key Tenable API secret key. True Events Fetch Interval Fetch interval in minutes for events. False Assets Fetch Interval Fetch interval in minutes for assets and vulnerabilities. False Severity The severity of the vulnerabilities to include in the export. False First fetch timestamp (<number> <time unit>, e.g., 12 hours, 7 days) False Max Fetch The maximum number of audit logs to retrieve for each event type. For more information about event types see the help section. False Trust any certificate (not secure) False Use system proxy settings False Click Test to validate the URLs, token, and connection.
#
PermissionsCommand Name | Required Permissions |
---|---|
tenable-io-list-scans | BASIC [16] user permissions and CAN VIEW [16] scan permissions. |
tenable-io-launch-scan | SCAN OPERATOR [24] user permissions. |
tenable-io-get-scan-report | BASIC [16] user permissions. |
tenable-io-get-vulnerability-details | BASIC [16] user permissions. |
tenable-io-get-vulnerabilities-by-asset | BASIC [16] user permissions. |
tenable-io-get-scan-status | BASIC [16] user permissions and CAN VIEW [16] scan permissions. |
tenable-io-resume-scan | SCAN OPERATOR [24] user permissions and CAN EXECUTE [32] scan permissions. |
tenable-io-pause-scan | SCAN OPERATOR [24] user permissions and CAN EXECUTE [32] scan permissions. |
tenable-io-get-asset-details | BASIC [16] user permissions. |
tenable-io-export-assets | ADMINISTRATOR [64] user permissions. |
tenable-io-export-vulnerabilities | ADMINISTRATOR [64] user permissions. |
tenable-io-list-scan-filters | BASIC [16] user permissions |
tenable-io-get-scan-history | SCAN OPERATOR [24] user permissions and CAN VIEW [16] scan permissions |
tenable-io-export-scan | SCAN OPERATOR [24] user permissions and CAN VIEW [16] scan permissions |
#
Concurrency LimitsLimitations | Commands name |
---|---|
Three concurrent requests per Tenable.io customer instance. Note: This limit is subject to change. | tenable-io-list-scans tenable-io-launch-scan tenable-io-get-scan-report tenable-io-get-vulnerability-details tenable-io-get-vulnerabilities-by-asset tenable-io-get-scan-status tenable-io-resume-scan tenable-io-pause-scan tenable-io-get-asset-details |
Two concurrent asset exports per container. Tenable.io also prevents duplicate exports from running concurrently. For example, export requests with the same filters. | tenable-io-export-assets tenable-io-export-vulnerabilities |
#
Notes:- Fetch assets and vulnerabilities (Beta) command fetches assets and vulnerabilities from the last 90 days only.
#
CommandsYou can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook. After you successfully execute a command, a DBot message appears in the War Room with the command details.
#
tenable-io-list-scansRetrieves scans from the Tenable platform.
#
Base Commandtenable-io-list-scans
#
InputArgument Name | Description | Required |
---|---|---|
folderId | The ID of the folder whose scans should be listed. Scans are stored in specific folders on Tenable, e.g.: folderId=8. | Optional |
lastModificationDate | Limit the results to those that have only changed since this time. Date format will be YYYY-MM-DD format or relational expressions like “7 days ago”. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TenableIO.Scan.Id | number | The unique ID of the scan. |
TenableIO.Scan.Name | string | The name of the scan. |
TenableIO.Scan.Target | string | The targets to scan. |
TenableIO.Scan.Status | string | The status of the scan (completed, aborted, imported, pending, running, resuming, canceling, cancelled, pausing, paused, stopping, stopped). |
TenableIO.Scan.StartTime | date | The scheduled start time for the scan. |
TenableIO.Scan.EndTime | date | The scheduled end time for the scan. |
TenableIO.Scan.Enabled | boolean | If true, the schedule for the scan is enabled. |
TenableIO.Scan.Type | string | The type of scan (local, remote, or agent). |
TenableIO.Scan.Owner | string | The owner of the scan. |
TenableIO.Scan.Scanner | string | The scanner assigned for the scan. |
TenableIO.Scan.Policy | string | The policy assigned for the scan. |
TenableIO.Scan.CreationDate | date | The creation date for the scan in Unix time. |
TenableIO.Scan.LastModificationDate | date | The last modification date for the scan in Unix time. |
TenableIO.Scan.FolderId | number | The unique ID of the folder where the scan has been stored. |
#
Command example!tenable-io-list-scans
#
Context Example#
Human Readable Output#
Tenable.io - List of Scans
FolderId Id Name Targets Status StartTime EndTime Enabled Type Owner Scanner Policy CreationDate LastModificationDate 5 10 some_name 1.1.1.1, 0.0.0.0 aborted Thu Nov 07 11:11:05 2024 Thu Nov 07 11:11:05 2024 false remote some_owner Host Discovery Thu Nov 07 11:11:05 2024 Thu Nov 07 11:11:05 2024
#
tenable-io-launch-scanLaunches a scan with existing or custom targets. You can specify custom targets in the command arguments.
#
Base Commandtenable-io-launch-scan
#
InputArgument Name | Description | Required |
---|---|---|
scanId | The ID of the scan to launch. | Required |
scanTargets | If specified, targets to be scanned instead of the default. This value can be an array where each index is a target, or an array with a single index of comma-separated targets. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TenableIO.Scan.Id | number | The unique ID of the scan. |
TenableIO.Scan.Targets | string | The targets to scan. |
TenableIO.Scan.Status | string | The status of the scan (completed, aborted, imported, pending, running, resuming, canceling, cancelled, pausing, paused, stopping, stopped). |
#
Command example!tenable-io-launch-scan scanId="10"
#
Context Example#
The requested scan was launched successfully
Id Targets Status 10 target_1,target_2,target_3 pending
#
tenable-io-get-scan-reportRetrieves a scan report for the specified scan.
#
Base Commandtenable-io-get-scan-report
#
InputArgument Name | Description | Required |
---|---|---|
scanId | The ID of the scan to retrieve. | Required |
detailed | If true, the report will contain remediation and host information for the specified scan. Otherwise, the report will only contain vulnerabilities. Possible values: "yes" and "no". Possible values are: yes, no. Default is no. | Optional |
info | Whether to return the basic details of the specified scan. Possible values: "yes" and "no". Possible values are: yes, no. Default is no. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TenableIO.Scan.Id | number | The unique ID of the scan. |
TenableIO.Scan.Name | string | The name of the scan. |
TenableIO.Scan.Targets | string | The targets to scan. |
TenableIO.Scan.Status | string | The status of the scan ("completed", "aborted", "imported", "pending", "running", "resuming", "canceling", "cancelled", "pausing", "paused", "stopping", "stopped"). |
TenableIO.Scan.StartTime | string | The scheduled start time for the scan. |
TenableIO.Scan.EndTime | string | The scheduled end time for the scan. |
TenableIO.Scan.Scanner | string | The scanner assigned for the scan. |
TenableIO.Scan.Policy | string | The policy assigned to the scan. |
TenableIO.Vulnerabilities.Id | string | The unique ID of the vulnerability. |
TenableIO.Vulnerabilities.Name | string | The name of the vulnerability. |
TenableIO.Vulnerabilities.Severity | number | The severity level of the vulnerability. |
TenableIO.Vulnerabilities.Description | string | The description of the vulnerability. |
TenableIO.Vulnerabilities.Synopsis | string | A brief summary of the vulnerability. |
TenableIO.Vulnerabilities.Solution | string | Information on how to fix the vulnerability. |
TenableIO.Vulnerabilities.FirstSeen | date | When the vulnerability was first seen. |
TenableIO.Vulnerabilities.LastSeen | date | When the vulnerability was last seen. |
TenableIO.Vulnerabilities.VulnerabilityOccurences | number | A count of the vulnerability occurrences. |
TenableIO.Assets.Hostname | string | The name of the host. |
TenableIO.Assets.Score | number | The overall score for the host. |
TenableIO.Assets.Critical | number | The percentage of critical findings on the host. |
TenableIO.Assets.High | number | The number of high findings on the host. |
TenableIO.Assets.Medium | number | The number of medium findings on the host. |
TenableIO.Assets.Low | number | The number of low findings on the host. |
TenableIO.Remediations.Id | string | The unique ID of the remediation. |
TenableIO.Remediations.Description | string | Specific information related to the vulnerability and steps to remediate. |
TenableIO.Remediations.AffectedHosts | number | The number of hosts affected. |
TenableIO.Remediations.AssociatedVulnerabilities | number | The number of vulnerabilities associated with the remedy. |
#
Command example!tenable-io-get-scan-report scanId="10"
#
Context Example#
Human Readable Output#
Vulnerabilities
Id Name Severity Description Synopsis Solution FirstSeen LastSeen VulnerabilityOccurences 00000 some_name None description Synopsis Solution 2024-11-07T11:11:05Z 2024-11-07T11:11:05Z 26 11111 some_name None description Synopsis 2024-11-07T11:11:05Z 2024-11-07T11:11:05Z 12
#
tenable-io-get-vulnerability-detailsRetrieves details for the specified vulnerability.
#
Base Commandtenable-io-get-vulnerability-details
#
InputArgument Name | Description | Required |
---|---|---|
vulnerabilityId | The unique ID of the vulnerability. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
TenableIO.Vulnerabilities.Name | string | The name of the vulnerability. |
TenableIO.Vulnerabilities.Severity | number | Integer [0-4] indicating how severe the vulnerability is, where 0 is info only. |
TenableIO.Vulnerabilities.Type | string | The type of the vulnerability. |
TenableIO.Vulnerabilities.Family | string | Object containing plugin information such as family, type, and publication and modification dates. |
TenableIO.Vulnerabilities.Description | string | The description of the vulnerability. |
TenableIO.Vulnerabilities.Synopsis | string | A brief summary of the vulnerability. |
TenableIO.Vulnerabilities.Solution | string | Information on how to fix the vulnerability. |
TenableIO.Vulnerabilities.FirstSeen | date | When the vulnerability was first seen. |
TenableIO.Vulnerabilities.LastSeen | date | When the vulnerability was last seen. |
TenableIO.Vulnerabilities.PublicationDate | date | The publication date of the vulnerability. |
TenableIO.Vulnerabilities.ModificationDate | date | The last modification date for the vulnerability in Unix time. |
TenableIO.Vulnerabilities.VulnerabilityOccurences | number | A count of the vulnerability occurrences. |
TenableIO.Vulnerabilities.CvssVector | string | The Common Vulnerability Scoring System vector. |
TenableIO.Vulnerabilities.CvssBaseScore | string | The Common Vulnerability Scoring System allotted base score. |
TenableIO.Vulnerabilities.Cvss3Vector | string | The Common Vulnerability Scoring System version 3 vector. |
TenableIO.Vulnerabilities.Cvss3BaseScore | string | The Common Vulnerability Scoring System version 3 allotted base score. |
#
Command example!tenable-io-get-vulnerability-details vulnerabilityId=fake_id
#
Context Example#
Human Readable Output#
Vulnerability details - fake_id
Name Severity Type Family Description Synopsis FirstSeen LastSeen PublicationDate ModificationDate VulnerabilityOccurences Name None remote General Description Synopsis 2024-11-07T11:11:05Z 2024-11-07T11:11:05Z 2024-11-07T11:11:05Z 2024-11-07T11:11:05Z 1
#
tenable-io-get-vulnerabilities-by-assetGets a list of up to 5000 of the vulnerabilities recorded for a specified asset.
#
Base Commandtenable-io-get-vulnerabilities-by-asset
#
InputArgument Name | Description | Required |
---|---|---|
hostname | Hostname of the asset. | Optional |
ip | IP of the asset. | Optional |
dateRange | The number of days of data prior to and including today that should be returned. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TenableIO.Assets.Hostname | number | Hostname of the asset. |
TenableIO.Assets.Vulnerabilities | number | A list of all the vulnerability IDs associated with the asset. |
TenableIO.Vulnerabilities.Id | number | The vulnerability unique ID. |
TenableIO.Vulnerabilities.Name | string | The name of the vulnerability. |
TenableIO.Vulnerabilities.Severity | number | Integer [0-4] indicating how severe the vulnerability is, where 0 is info only. |
TenableIO.Vulnerabilities.Family | string | The vulnerability family. |
TenableIO.Vulnerabilities.VulnerabilityOccurences | number | The number of times the vulnerability was found. |
TenableIO.Vulnerabilities.VulnerabilityState | string | The current state of the reported vulnerability ("Active", "Fixed", "New", etc.). |
#
Command example!tenable-io-get-vulnerabilities-by-asset hostname="debian8628.aspadmin.net"
#
Context Example#
Human Readable Output#
Vulnerabilities for asset debian8628.aspadmin.net
Id Name Severity Family VulnerabilityOccurences VulnerabilityState 11111 Name_01 None General 2 Active 22222 Name_02 None General 2 Active
#
tenable-io-get-scan-statusChecks the status of a specific scan using the scan ID. Possible values: "Running", "Completed", and "Empty" (Ready to run).
#
Base Commandtenable-io-get-scan-status
#
InputArgument Name | Description | Required |
---|---|---|
scanId | The unique ID of the scan. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
TenableIO.Scan.Id | string | The unique ID of the scan specified. |
TenableIO.Scan.Status | string | The status of the scan specified. |
#
Command example!tenable-io-get-scan-status scanId="10"
#
Context Example#
Human Readable Output#
Scan status for 10
Id Status 10 aborted
#
tenable-io-resume-scanResumes all scans inputted as an array. Will resume scans whose status is 'Paused'.
#
Base Commandtenable-io-resume-scan
#
InputArgument Name | Description | Required |
---|---|---|
scanId | Comma-separated list of scan IDs. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
TenableIO.Scan.Id | String | The unique ID of the scan. |
TenableIO.Scan.Status | String | The status of the scan (completed, aborted, imported, pending, running, resuming, canceling, cancelled, pausing, paused, stopping, stopped). |
#
Command example!tenable-io-resume-scan scanId="13"
#
Context Example#
Human Readable Output#
The requested scan was resumed successfully
Id Status 13 Resuming
#
tenable-io-pause-scanPauses all scans inputted as an array. Will pause scans whose status is 'Running'.
#
Base Commandtenable-io-pause-scan
#
InputArgument Name | Description | Required |
---|---|---|
scanId | Comma-separated list of scan IDs. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
TenableIO.Scan.Id | String | The unique id of the scan. |
TenableIO.Scan.Status | String | The status of the scan (completed, aborted, imported, pending, running, resuming, canceling, cancelled, pausing, paused, stopping, stopped). |
#
Command example!tenable-io-pause-scan scanId="10"
#
Context Example#
Human Readable Output#
The requested scan was paused successfully
Id Status 13 Pausing
#
tenable-io-get-asset-detailsRetrieves details for the specified asset including custom attributes.
#
Base Commandtenable-io-get-asset-details
#
InputArgument Name | Description | Required |
---|---|---|
ip | IP Address of the asset. | Required |
#
Context OutputPath | Type | Description |
---|---|---|
TenableIO.AssetDetails.attributes | unknown | Array of custom attributes of asset. |
TenableIO.AssetDetails.counts | unknown | Array of audit statuses and vulnerabilities by type. |
TenableIO.AssetDetails.created_at | date | Date asset was created. |
TenableIO.AssetDetails.first_seen | date | Date asset was first seen. |
TenableIO.AssetDetails.fqdn | unknown | Array of fully-qualified domain names. |
TenableIO.AssetDetails.id | string | GUID of tenable.io asset. |
TenableIO.AssetDetails.interfaces | unknown | Array of interface information. |
TenableIO.AssetDetails.ipv4 | unknown | Array of IPv4 addresses. |
TenableIO.AssetDetails.operating_system | unknown | Array of operating systems. |
TenableIO.AssetDetails.tags | unknown | Array of tags added to asset. |
TenableIO.AssetDetails.updated_at | date | Date the asset was last updated. |
#
Command example!tenable-io-get-asset-details ip=1.3.2.1"
#
Context Example#
Human Readable Output#
Asset Info for 1.3.2.1
attributes fqdn interfaces ipv4 id last_seen test.com {'name': 'UNKNOWN', 'fqdn': ['test.com'], 'mac_address': [], 'ipv4': ['1.3.2.1'], 'ipv6': []} 1.3.2.1 fake_asset_id 2024-11-07T11:11:05.739Z
#
tenable-io-export-assetsRetrieves details for the specified asset to include custom attributes.
#
LimitationsWhen inserting invalid arguments, an error message could be returned.
#
Base Commandtenable-io-export-assets
#
InputArgument Name | Description | Required |
---|---|---|
chunkSize | Specifies the number of assets per exported chunk. The range is 100-10000. Default is 100. | Optional |
intervalInSeconds | The number of seconds until the next run. Default is 10. | Optional |
timeOut | The timeout for the polling in seconds. Default is 600. | Optional |
createdAt | When specified, the results returned in the list are limited to assets created later than the date specified. Date format will be epoch date format or relational expressions like “7 days ago”.'. | Optional |
updatedAt | When specified, the results returned in the list are limited to assets updated later than the date specified. Date format will be epoch date format or relational expressions like “7 days ago”.'. | Optional |
terminatedAt | When specified, the results returned in the list are limited to assets terminated later than the date specified. Date format will be epoch date format or relational expressions like “7 days ago”.'. | Optional |
isTerminated | When set to true, returns assets which have any value for the terminatedAt attribute. | Optional |
deletedAt | When specified, the results returned in the list are limited to assets deleted later than the date specified. Date format will be epoch date format or relational expressions like “7 days ago”.'. | Optional |
isDeleted | When set to true, returns assets which have any value for the deletedAt attribute. Possible values are: true, false. | Optional |
isLicensed | Specifies whether the asset is included in the asset count for the Tenable.io instance. If true, returns only licensed assets. If false, returns only unlicensed assets. Possible values are: true, false. | Optional |
firstScanTime | When specified, the results returned in the list are limited to assets with a first scan time later than the date specified. Date format will be epoch date format or relational expressions like “7 days ago”.'. | Optional |
lastAuthenticatedScanTime | When specified, the results returned in the list are limited to assets with a last credentialed scan time later than the date specified. Date format will be epoch date format or relational expressions like “7 days ago”.'. | Optional |
lastAssessed | When specified, the results returned in the list are limited to assets with a last assessed time later than the date specified. Date format will be epoch date format or relational expressions like “7 days ago”.'. | Optional |
serviceNowSysId | If true, returns all assets that have a ServiceNow Sys ID, regardless of value. If false, returns all assets that do not have a ServiceNow Sys ID. Possible values are: true, false. | Optional |
sources | A comma-separated list of sources. Possible values are: AWS, NESSUS_AGENT, PVS,NESSUS_SCAN, WAS. When specified, the results returned in the list are limited to assets that have the specified source. | Optional |
hasPluginResults | If true, returns all assets that have a plugin results associated with it. Possible values are: true, false. | Optional |
tagCategory | When specified, the results returned in the list are limited to assets with the specified tag category. | Optional |
tagValue | When specified, the results returned in the list are limited to assets with the specified tag value. | Optional |
exportUuid | The export uuid. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TenableIO.Asset.id | String | The UUID of the asset in Tenable.io. Use this value as the unique key for the asset. |
TenableIO.Asset.has_agent | Boolean | Specifies whether a Nessus agent scan identified the asset. |
TenableIO.Asset.has_plugin_results | Boolean | Specifies whether the asset has plugin results associated with it. |
TenableIO.Asset.created_at | Date | The time and date when Tenable.io created the asset record. |
TenableIO.Asset.terminated_at | Date | The time and date when a user terminated the Amazon Web Service (AWS) virtual machine instance of the asset. |
TenableIO.Asset.terminated_by | String | The user who terminated the AWS instance of the asset. |
TenableIO.Asset.updated_at | Date | The time and date when the asset record was last updated. |
TenableIO.Asset.deleted_at | Date | The time and date when a user deleted the asset record. When a user deletes an asset record, Tenable.io retains the record until the asset ages out of the license count. |
TenableIO.Asset.deleted_by | String | The user who deleted the asset record. |
TenableIO.Asset.first_seen | Date | The time and date when a scan first identified the asset. |
TenableIO.Asset.last_seen | Date | The time and date of the scan that most recently identified the asset. |
TenableIO.Asset.first_scan_time | Date | The time and date of the first scan run against the asset. |
TenableIO.Asset.last_scan_time | Date | The time and date of the last scan run against the asset. |
TenableIO.Asset.last_authenticated_scan_date | Date | The time and date of the last credentialed scan run on the asset. |
TenableIO.Asset.last_licensed_scan_date | Date | The time and date of the last scan that identified the asset as licensed. Tenable.io categorizes an asset as licensed if a scan of that asset has returned results from a non-discovery plugin within the last 90 days. |
TenableIO.Asset.last_scan_id | String | The UUID of the scan configuration used during the last scan of the asset. |
TenableIO.Asset.last_schedule_id | String | The schedule id for the last scan of the asset. |
TenableIO.Asset.azure_vm_id | String | The unique identifier of the Microsoft Azure virtual machine instance. For more information, see "Accessing and Using Azure VM Unique ID" in the Microsoft Azure documentation. |
TenableIO.Asset.azure_resource_id | String | The unique identifier of the resource in the Azure Resource Manager. For more information, see the Azure Resource Manager Documentation. |
TenableIO.Asset.gcp_project_id | String | The unique identifier of the virtual machine instance in Google Cloud Platform (GCP). |
TenableIO.Asset.gcp_zone | String | The customized name of the project to which the virtual machine instance belongs in GCP. For more information see "Creating and Managing Projects" in the GCP documentation. |
TenableIO.Asset.gcp_instance_id | String | The zone where the virtual machine instance runs in GCP. For more information, see "Regions and Zones" in the GCP documentation. |
TenableIO.Asset.aws_ec2_instance_ami_id | String | The unique identifier of the Linux AMI image in Amazon Elastic Compute Cloud (Amazon EC2). For more information, see the Amazon Elastic Compute Cloud Documentation. |
TenableIO.Asset.aws_ec2_instance_id | String | The unique identifier of the Linux instance in Amazon EC2. For more information, see the Amazon Elastic Compute Cloud Documentation. |
TenableIO.Asset.agent_uuid | String | The unique identifier of the Nessus agent that identified the asset. |
TenableIO.Asset.bios_uuid | String | The BIOS UUID of the asset. |
TenableIO.Asset.network_id | String | The ID of the network object associated with scanners that identified the asset. |
TenableIO.Asset.network_name | String | The ID of the network object associated with scanners that identified the asset. |
TenableIO.Asset.aws_owner_id | String | The canonical user identifier for the AWS account associated with the virtual machine instance. |
TenableIO.Asset.aws_availability_zone | String | The availability zone where Amazon Web Services hosts the virtual machine instance. |
TenableIO.Asset.aws_region | String | The region where AWS hosts the virtual machine instance. |
TenableIO.Asset.aws_vpc_id | String | The unique identifier for the virtual public cloud that hosts the AWS virtual machine instance. |
TenableIO.Asset.aws_ec2_instance_group_name | String | The virtual machine instance's group in AWS. |
TenableIO.Asset.aws_ec2_instance_state_name | String | The state of the virtual machine instance in AWS at the time of the scan. |
TenableIO.Asset.aws_ec2_instance_type | String | The type of instance in AWS EC2. |
TenableIO.Asset.aws_subnet_id | String | The unique identifier of the AWS subnet where the virtual machine instance was running at the time of the scan. |
TenableIO.Asset.aws_ec2_product_code | String | The product code associated with the AMI used to launch the virtual machine instance in AWS EC2. |
TenableIO.Asset.aws_ec2_name | String | The name of the virtual machine instance in AWS EC2. |
TenableIO.Asset.mcafee_epo_guid | String | The unique identifier of the asset in McAfee ePolicy Orchestrator (ePO). |
TenableIO.Asset.mcafee_epo_agent_guid | String | The unique identifier of the McAfee ePO agent that identified the asset. |
TenableIO.Asset.servicenow_sysid | String | The unique record identifier of the asset in ServiceNow. |
TenableIO.Asset.bigfix_asset_id | String | The unique identifiers of the asset in HCL BigFix. |
TenableIO.Asset.agent_names | String | The names of any Nessus agents that scanned and identified the asset. |
TenableIO.Asset.installed_software | String | A list of Common Platform Enumeration (CPE) values that represent software applications a scan identified as present on an asset. |
TenableIO.Asset.ipv4s | String | The IPv4 addresses that scans have associated with the asset record. |
TenableIO.Asset.ipv6s | String | The IPv6 addresses that scans have associated with the asset record. |
TenableIO.Asset.fqdns | String | The fully-qualified domain names that scans have associated with the asset record. |
TenableIO.Asset.mac_addresses | String | The MAC addresses that scans have associated with the asset record. |
TenableIO.Asset.netbios_names | String | The NetBIOS names that scans have associated with the asset record. |
TenableIO.Asset.operating_systems | String | The operating systems that scans have associated with the asset record. |
TenableIO.Asset.system_types | String | The system types as reported by Plugin ID 54615. Possible values include router, general-purpose, scan-host, and embedded. |
TenableIO.Asset.hostnames | String | The hostnames that scans have associated with the asset record. |
TenableIO.Asset.ssh_fingerprints | String | The SSH key fingerprints that scans have associated with the asset record. |
TenableIO.Asset.qualys_asset_ids | String | The Asset ID of the asset in Qualys. For more information, see the Qualys documentation. |
TenableIO.Asset.qualys_host_ids | String | The Host ID of the asset in Qualys. For more information, see the Qualys documentation. |
TenableIO.Asset.manufacturer_tpm_ids | String | The manufacturer's unique identifiers of the Trusted Platform Module (TPM) associated with the asset. |
TenableIO.Asset.symantec_ep_hardware_keys | String | The hardware keys for the asset in Symantec Endpoint Protection. |
TenableIO.Asset.sources.name | String | The name of the entity that reported the asset details. Sources can include sensors, connectors, and API imports. |
TenableIO.Asset.sources.first_seen | Date | The ISO timestamp when the source first reported the asset. |
TenableIO.Asset.sources.last_seen | Date | The ISO timestamp when the source last reported the asset. |
TenableIO.Asset.tags.uuid | String | The UUID of the tag. |
TenableIO.Asset.tags.key | String | The tag category (the first half of the category:value pair). |
TenableIO.Asset.tags.value | String | The tag value (the second half of the category:value pair). |
TenableIO.Asset.tags.added_by | String | The UUID of the user who assigned the tag to the asset. |
TenableIO.Asset.tags.added_at | Date | The ISO timestamp when the tag was assigned to the asset. |
TenableIO.Asset.network_interfaces.name | String | The name of the interface. |
TenableIO.Asset.network_interfaces.mac_address | String | The MAC addresses of the interface. |
TenableIO.Asset.network_interfaces.ipv6 | String | One or more IPv6 addresses belonging to the interface. |
TenableIO.Asset.network_interfaces.fqdns | String | One or more FQDNs belonging to the interface. |
TenableIO.Asset.network_interfaces.ipv4s | String | One or more IPv4 addresses belonging to the interface. |
TenableIO.Asset.acr_score | String | The Asset Criticality Rating (ACR) for the asset. |
TenableIO.Asset.exposure_score | String | The Asset Exposure Score (AES) for the asset. |
#
Command example!tenable-io-export-assets chunkSize=500
#
Context Example#
Human Readable Output#
Export Assets Results:
ASSET ID DNS NAME (FQDN) SYSTEM TYPE OPERATING SYSTEM IPV4 ADDRESS NETWORK FIRST SEEN LAST SEEN LAST LICENSED SCAN SOURCE TAGS fake_uuid test.com general-purpose Linux Kernel 2.6 1.3.2.1 Default 2024-11-07T11:11:05Z 2024-11-07T11:11:05Z 2024-11-07T11:11:05Z NESSUS_SCAN some_key:test.com fake_uuid test.net general-purpose Linux Kernel 2.6 1.3.2.1 Default 2024-11-07T11:11:05Z 2024-11-07T11:11:05Z 2024-11-07T11:11:05Z NESSUS_SCAN some_key:test.com
#
tenable-io-export-vulnerabilitiesRetrieves details for the specified asset to include custom attributes.
#
LimitationsWhen inserting invalid arguments, an error message could be returned.
#
Base Commandtenable-io-export-vulnerabilities
#
InputArgument Name | Description | Required |
---|---|---|
numAssets | The number of assets used to chunk the vulnerabilities. The range for number of assets in a chunk is 50-5000. Default is 50. | Optional |
intervalInSeconds | The number of seconds until the next run. Default is 10. | Optional |
timeOut | The timeout for the polling in seconds. Default is 600. | Optional |
includeUnlicensed | Specifies whether or not to include unlicensed assets. Possible values are: true, false. | Optional |
cidrRange | When specified, restricts the search for vulnerabilities to assets assigned an IP address within the specified CIDR range. | Optional |
firstFound | When specified, the results returned in the list are limited to vulnerabilities that were first found between the specified date and now. Date format will be epoch date format or relational expressions like “7 days ago”. | Optional |
lastFixed | When specified, the results returned in the list are limited to vulnerabilities that were fixed between the specified date and now. Date format will be epoch date format or relational expressions like “7 days ago”. | Optional |
lastFound | When specified, the results returned in the list are limited to vulnerabilities that were last found between the specified date and now. Date format will be epoch date format or relational expressions like “7 days ago”. | Optional |
networkId | The ID of the network object associated with scanners that detected the vulnerabilities you want to export. | Optional |
pluginId | A comma-separated list of plugin IDs for which you want to filter the vulnerabilities. | Optional |
pluginType | The plugin type for which you want to filter the vulnerabilities. If not set, export includes all vulnerabilities regardless of plugin type. Possible values are: remote, local, combined, settings, summary, third-party, reputation. | Optional |
severity | The severity of the vulnerabilities to include in the export. Defaults to all severity levels. The severity of a vulnerability is defined using the Common Vulnerability Scoring System (CVSS) base score. Supported array values are: info, low, medium, high, critical. | Optional |
since | The start date for the range of data you want to export. Date format will be epoch date format or relational expressions like “7 days ago”. Note: This filter cannot be used in conjunction with the firstFound, lastFound, or lastFixed. | Optional |
state | A comma-separated list of states of the vulnerabilities you want the export to include. Supported, case-insensitive values are: open, reopened, fixed. This parameter is required if your request includes firstFound, lastFound, or lastFixed parameters. If your request omits this parameter, the export includes default states open and reopened only. | Optional |
tagCategory | When specified, the results returned in the list are limited to assets with the specified tag category. | Optional |
tagValue | When specified, the results returned in the list are limited to assets with the specified tag value. | Optional |
vprScoreOperator | An operator that determines the limitation on Vulnerability Priority Rating (VPR), scores value specified at vprScoreValue argument. Supported values are: equal, not equal, lt-lesser, lte-lesser than or equal , gt-greater than , gte-greater than or equal. Possible values are: gte, gt, lte, lt, equal, not equal. | Optional |
vprScoreValue | When specified, the results returned in the list are limited to vulnerabilities with the specified Vulnerability Priority Rating (VPR), score or scores according to the score operator (vprScoreOperator) argument. | Optional |
vprScoreRange | When specified, the results returned in the list are limited to vulnerabilities with the specified Vulnerability Priority Rating (VPR) score range. Example value: 2.5-3.5. | Optional |
exportUuid | The export UUID. | Optional |
should_push_events | Set this argument to True in order to create vulnerabilities, otherwise the command will only display the vulnerabilities. Possible values are: true, false. Default is false. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TenableIO.Vulnerability.asset.agent_uuid | String | The UUID of the agent that performed the scan where the vulnerability was found. |
TenableIO.Vulnerability.asset.bios_uuid | String | The BIOS UUID of the asset where the vulnerability was found. |
TenableIO.Vulnerability.asset.device_type | String | The type of asset where the vulnerability was found. |
TenableIO.Vulnerability.asset.fqdn | String | The fully-qualified domain name of the asset where a scan found the vulnerability. |
TenableIO.Vulnerability.asset.hostname | String | The host name of the asset where a scan found the vulnerability. |
TenableIO.Vulnerability.asset.uuid | String | The UUID of the asset where a scan found the vulnerability. |
TenableIO.Vulnerability.asset.ipv6 | String | The IPv6 address of the asset where a scan found the vulnerability. |
TenableIO.Vulnerability.asset.last_authenticated_results | Date | The last date credentials that were used successfully to scan the asset. |
TenableIO.Vulnerability.asset.last_unauthenticated_results | Date | The last date when the asset was scanned without using credentials |
TenableIO.Vulnerability.asset.mac_address | String | The MAC address of the asset where a scan found the vulnerability. |
TenableIO.Vulnerability.asset.netbios_name | String | The NETBIOS name of the asset where a scan found the vulnerability. |
TenableIO.Vulnerability.asset.netbios_workgroup | String | The NETBIOS workgroup of the asset where a scan found the vulnerability. |
TenableIO.Vulnerability.asset.operating_system | String | The operating system of the asset where a scan found the vulnerability. |
TenableIO.Vulnerability.asset.network_id | String | The ID of the network object associated with scanners that identified the asset. |
TenableIO.Vulnerability.asset.tracked | Boolean | A value specifying whether Tenable.io tracks the asset in the asset management system. |
TenableIO.Vulnerability.output | String | The text output of the Nessus scanner. |
TenableIO.Vulnerability.plugin.bid | Number | The Bugtraq ID for the plugin. |
TenableIO.Vulnerability.plugin.canvas_package | String | The name of the CANVAS exploit pack that includes the vulnerability. |
TenableIO.Vulnerability.plugin.checks_for_default_account | Boolean | A value specifying whether the plugin checks for default accounts. |
TenableIO.Vulnerability.plugin.checks_for_malware | Boolean | A value specifying whether the plugin checks for malware. |
TenableIO.Vulnerability.plugin.cpe | String | The Common Platform Enumeration (CPE) number for the plugin. |
TenableIO.Vulnerability.plugin.cve | String | The Common Vulnerability and Exposure (CVE) ID for the plugin. |
TenableIO.Vulnerability.plugin.cvss3_base_score | Number | The CVSSv3 base score (intrinsic and fundamental characteristics of a vulnerability that are constant over time and user environments). |
TenableIO.Vulnerability.plugin.cvss3_temporal_score | Number | The CVSSv3 temporal score (characteristics of a vulnerability that change over time but not among user environments). |
TenableIO.Vulnerability.plugin.cvss3_temporal_vector.exploitability | String | The CVSSv3 Exploit Maturity Code (E) for the vulnerability the plugin covers. |
TenableIO.Vulnerability.plugin.cvss3_temporal_vector.remediation_level | String | The CVSSv3 Remediation Level (RL) temporal metric for the vulnerability the plugin covers. |
TenableIO.Vulnerability.plugin.cvss3_temporal_vector.report_confidence | String | The CVSSv3 Report Confidence (RC) temporal metric for the vulnerability the plugin covers. |
TenableIO.Vulnerability.plugin.cvss3_temporal_vector.raw | String | The complete CVSSv3 temporal vector metrics and result values for the vulnerability the plugin covers in a condensed and coded format. |
TenableIO.Vulnerability.plugin.cvss3_vector.access_vector | String | The CVSSv3 Attack Vector (AV) metric for the vulnerability the plugin covers. |
TenableIO.Vulnerability.plugin.cvss3_vector.access_complexity | String | The CVSSv3 Access Complexity (AC) metric for the vulnerability the plugin covers. |
TenableIO.Vulnerability.plugin.cvss3_vector.authentication | String | The CVSSv3 Authentication (Au) metric for the vulnerability the plugin covers. |
TenableIO.Vulnerability.plugin.cvss3_vector.confidentiality_impact | String | The CVSSv3 integrity impact metric for the vulnerability the plugin covers. |
TenableIO.Vulnerability.plugin.cvss3_vector.integrity_impact | String | The CVSSv3 integrity impact metric for the vulnerability the plugin covers. |
TenableIO.Vulnerability.plugin.cvss3_vector.availability_impact | String | The CVSSv3 availability impact metric for the vulnerability the plugin covers. |
TenableIO.Vulnerability.plugin.cvss3_vector.raw | String | The complete cvss3_vector metrics and result values for the vulnerability the plugin covers in a condensed and coded format. |
TenableIO.Vulnerability.plugin.cvss_temporal_vector.exploitability | String | The CVSSv2 Exploitability (E) temporal metric for the vulnerability the plugin covers. |
TenableIO.Vulnerability.plugin.cvss_temporal_vector.remediation_level | String | The CVSSv2 Remediation Level (RL) temporal metric for the vulnerability the plugin covers. |
TenableIO.Vulnerability.plugin.cvss_temporal_vector.report_confidence | String | The CVSSv2 Report Confidence (RC) temporal metric for the vulnerability the plugin covers |
TenableIO.Vulnerability.plugin.cvss_temporal_vector.raw | String | The complete CVSS temporal vector metrics and result values for the vulnerability the plugin covers in a condensed and coded format. |
TenableIO.Vulnerability.plugin.cvss_vector.access_vector | String | The CVSSv2 Access Vector (AV) metric for the vulnerability the plugin covers. |
TenableIO.Vulnerability.plugin.cvss_vector.access_complexity | String | The CVSSv2 Access Complexity (AC) metric for the vulnerability the plugin covers. |
TenableIO.Vulnerability.plugin.cvss_vector.authentication | String | The CVSSv2 Authentication (Au) metric for the vulnerability the plugin covers. |
TenableIO.Vulnerability.plugin.cvss_vector.confidentiality_impact | String | The CVSSv2 confidentiality impact metric for the vulnerability the plugin covers. |
TenableIO.Vulnerability.plugin.cvss_vector.integrity_impact | String | The CVSSv2 integrity impact metric for the vulnerability the plugin covers. |
TenableIO.Vulnerability.plugin.cvss_vector.availability_impact | String | The CVSSv2 availability impact metric for the vulnerability the plugin covers. |
TenableIO.Vulnerability.plugin.cvss_vector.raw | String | The complete CVSSv2 vector metrics and result values for the vulnerability the plugin covers in a condensed and coded format. |
TenableIO.Vulnerability.plugin.cvss_base_score | Number | The CVSSv2 base score (intrinsic and fundamental characteristics of a vulnerability that are constant over time and user environments). |
TenableIO.Vulnerability.plugin.cvss_temporal_score | Number | The CVSSv2 temporal score (characteristics of a vulnerability that change over time but not among user environments). |
TenableIO.Vulnerability.plugin.d2_elliot_name | String | The name of the exploit in the D2 Elliot Web Exploitation framework. |
TenableIO.Vulnerability.plugin.description | String | Full text description of the vulnerability. |
TenableIO.Vulnerability.plugin.exploit_available | Boolean | A value specifying whether a public exploit exists for the vulnerability. |
TenableIO.Vulnerability.plugin.exploit_framework_canvas | Boolean | A value specifying whether an exploit exists in the Immunity CANVAS framework. |
TenableIO.Vulnerability.plugin.exploit_framework_core | Boolean | A value specifying whether an exploit exists in the CORE Impact framework. |
TenableIO.Vulnerability.plugin.exploit_framework_d2_elliot | Boolean | A value specifying whether an exploit exists in the D2 Elliot Web Exploitation framework. |
TenableIO.Vulnerability.plugin.exploit_framework_exploithub | Boolean | A value specifying whether an exploit exists in the ExploitHub framework. |
TenableIO.Vulnerability.plugin.exploit_framework_metasploit | Boolean | A value specifying whether an exploit exists in the Metasploit framework. |
TenableIO.Vulnerability.plugin.exploitability_ease | String | Description of how easy it is to exploit the issue. |
TenableIO.Vulnerability.plugin.exploited_by_malware | Boolean | Whether the vulnerability discovered by this plugin is known to be exploited by malware. |
TenableIO.Vulnerability.plugin.exploited_by_nessus | Boolean | A value specifying whether Nessus exploited the vulnerability during the process of identification. |
TenableIO.Vulnerability.plugin.exploithub_sku | String | The SKU number of the exploit in the ExploitHub framework. |
TenableIO.Vulnerability.plugin.family | String | The family to which the plugin belongs. |
TenableIO.Vulnerability.plugin.family_id | Number | The ID of the plugin family. |
TenableIO.Vulnerability.plugin.has_patch | Boolean | A value specifying whether the vendor has published a patch for the vulnerability. |
TenableIO.Vulnerability.plugin.id | Number | The ID of the plugin that identified the vulnerability. |
TenableIO.Vulnerability.plugin.in_the_news | Boolean | A value specifying whether this plugin has received media attention (for example, ShellShock, Meltdown). |
TenableIO.Vulnerability.plugin.metasploit_name | String | The name of the related exploit in the Metasploit framework. |
TenableIO.Vulnerability.plugin.ms_bulletin | String | The Microsoft security bulletin that the plugin covers. |
TenableIO.Vulnerability.plugin.name | String | The name of the plugin that identified the vulnerability. |
TenableIO.Vulnerability.plugin.patch_publication_date | String | The date on which the vendor published a patch for the vulnerability. |
TenableIO.Vulnerability.plugin.modification_date | Date | The date on which the plugin was last modified. |
TenableIO.Vulnerability.plugin.publication_date | Date | The date on which the plugin was published. |
TenableIO.Vulnerability.plugin.risk_factor | String | The risk factor associated with the plugin. Possible values are: Low, Medium, High, or Critical. |
TenableIO.Vulnerability.plugin.see_also | String | Links to external websites that contain helpful information about the vulnerability. |
TenableIO.Vulnerability.plugin.solution | String | Remediation information for the vulnerability. |
TenableIO.Vulnerability.plugin.stig_severity | String | Security Technical Implementation Guide (STIG) severity code for the vulnerability. |
TenableIO.Vulnerability.plugin.synopsis | String | Brief description of the plugin or vulnerability. |
TenableIO.Vulnerability.plugin.type | String | The general type of plugin check (for example, local or remote). |
TenableIO.Vulnerability.plugin.unsupported_by_vendor | Boolean | Whether software found by this plugin is unsupported by the software's vendor (for example, Windows 95 or Firefox 3). |
TenableIO.Vulnerability.plugin.usn | String | Ubuntu security notice that the plugin covers. |
TenableIO.Vulnerability.plugin.version | String | The version of the plugin used to perform the check. |
TenableIO.Vulnerability.plugin.vuln_publication_date | Date | The publication date of the plugin. |
TenableIO.Vulnerability.plugin.xrefs.type | String | References to third-party information about the vulnerability, exploit, or update associated with the plugin. |
TenableIO.Vulnerability.plugin.xrefs.id | String | References to third-party information about the vulnerability, exploit, or update associated with the plugin. |
TenableIO.Vulnerability.plugin.vpr.score | Number | The Vulnerability Priority Rating (VPR) for the vulnerability. |
TenableIO.Vulnerability.plugin.vpr.drivers.age_of_vuln | Number | A range representing the number of days since the National Vulnerability Database (NVD) published the vulnerability. |
TenableIO.Vulnerability.plugin.vpr.drivers.age_of_vuln.lower_bound | Number | The lower bound of the range. |
TenableIO.Vulnerability.plugin.vpr.drivers.age_of_vuln.upper_bound | Number | The upper bound of the range. |
TenableIO.Vulnerability.plugin.vpr.drivers.exploit_code_maturity | String | The relative maturity of a possible exploit for the vulnerability based on the existence, sophistication, and prevalence of exploit intelligence from internal and external sources. |
TenableIO.Vulnerability.plugin.vpr.drivers.cvss3_impact_score | Number | The NVD-provided CVSSv3 impact score for the vulnerability. |
TenableIO.Vulnerability.plugin.vpr.drivers.cvss_impact_score_predicted | Boolean | A value specifying whether Tenable.io predicted the CVSSv3 impact score for the vulnerability. |
TenableIO.Vulnerability.plugin.vpr.drivers.threat_intensity_last28 | String | The relative intensity based on the number and frequency of recently observed threat events related to this vulnerability: Very Low, Low, Medium, High, or Very High. |
TenableIO.Vulnerability.plugin.vpr.drivers.threat_recency | String | A range representing the number of days since a threat event occurred for the vulnerability. |
TenableIO.Vulnerability.plugin.vpr.drivers.threat_recency.lower_bound | String | The lower bound of the range. |
TenableIO.Vulnerability.plugin.vpr.drivers.threat_recency.upper_bound | String | The upper bound of the range. |
TenableIO.Vulnerability.plugin.vpr.drivers.threat_sources_last28 | String | A list of all sources (for example, social media channels, the dark web, etc.) where threat events related to this vulnerability occurred. |
TenableIO.Vulnerability.plugin.vpr.drivers.product_coverage | String | The relative number of unique products affected by the vulnerability: 'Low', 'Medium', 'High', or 'Very High'. |
TenableIO.Vulnerability.plugin.vpr.updated | Date | The ISO timestamp when Tenable.io last imported the VPR for this vulnerability. |
TenableIO.Vulnerability.port.port | Number | The port the scanner used to communicate with the asset. |
TenableIO.Vulnerability.port.protocol | String | The protocol the scanner used to communicate with the asset. |
TenableIO.Vulnerability.port.service | String | The service the scanner used to communicate with the asset. |
TenableIO.Vulnerability.recast_reason | String | The text that appears in the Comment field of the recast rule in the Tenable.io user interface. |
TenableIO.Vulnerability.recast_rule_uuid | String | The UUID of the recast rule that applies to the plugin. |
TenableIO.Vulnerability.scan.completed_at | Date | The ISO timestamp when the scan completed. |
TenableIO.Vulnerability.scan.schedule_uuid | String | The schedule UUID for the scan that found the vulnerability. |
TenableIO.Vulnerability.scan.started_at | Date | The ISO timestamp when the scan started. |
TenableIO.Vulnerability.scan.uuid | String | The UUID of the scan that found the vulnerability. |
TenableIO.Vulnerability.severity | String | The severity of the vulnerability as defined using the Common Vulnerability Scoring System (CVSS) base score. |
TenableIO.Vulnerability.severity_id | Number | The code for the severity assigned when a user recast the risk associated with the vulnerability. |
TenableIO.Vulnerability.severity_default_id | Number | The code for the severity originally assigned to a vulnerability before a user recast the risk associated with the vulnerability. |
TenableIO.Vulnerability.severity_modification_type | String | The type of modification a user made to the vulnerability's severity. |
TenableIO.Vulnerability.first_found | Date | The ISO date when a scan first detected the vulnerability on the asset. |
TenableIO.Vulnerability.last_fixed | Date | The ISO date when a scan no longer detects the previously detected vulnerability on the asset. |
TenableIO.Vulnerability.last_found | Date | The ISO date when a scan last detected the vulnerability on the asset. |
TenableIO.Vulnerability.state | String | The state of the vulnerability as determined by the Tenable.io state service. |
TenableIO.Vulnerability.indexed | Date | The date and time (in Unix time) when the vulnerability was indexed into Tenable.io. |
#
Command example!tenable-io-export-vulnerabilities numAssets=500
#
Context Example#
Human Readable Output#
Export Vulnerabilities Results:
ASSET ID ASSET NAME IPV4 ADDRESS OPERATING SYSTEM SYSTEM TYPE DNS NAME (FQDN) SEVERITY PLUGIN ID PLUGIN NAME VULNERABILITY PRIORITY RATING CVSSV2 BASE SCORECVE PROTOCOL PORT FIRST SEEN LAST SEEN DESCRIPTION SOLUTION fake_uuid 1.1.1.1 1.1.1.1 Linux Kernel 3.13 on Ubuntu 14.04 (trusty) general-purpose fqdn info 00000 Name TCP 22 2024-11-07T11:11:05.906Z 2024-11-07T11:11:05.906Z Description N/A fake_uuid 1.3.2.1 1.3.2.1 Nutanix general-purpose fqdn info 00000 Name TCP 0 2024-11-07T11:11:05.906Z 2024-11-07T11:11:05.906Z Description N/A #
tenable-io-list-scan-filters
Lists the filtering, sorting, and pagination capabilities available for scan records on endpoints/commands that support them.
#
Base Commandtenable-io-list-scan-filters
#
InputThere are no inputs for this command.
#
Context OutputPath | Type | Description |
---|---|---|
TenableIO.ScanFilter.name | String | The name of the scan filter. |
TenableIO.ScanFilter.readable_name | String | The readable name of the scan filter. |
TenableIO.ScanFilter.control.type | String | The type of control associated with the scan filter. |
TenableIO.ScanFilter.control.regex | String | The regular expression used by the scan filter. |
TenableIO.ScanFilter.control.readable_regex | String | An example expression that the filter's regular expression would match. |
TenableIO.ScanFilter.operators | String | The operators available for the scan filter. |
TenableIO.ScanFilter.group_name | String | The group name associated with the scan filter. |
#
Command example!tenable-io-list-scan-filters
#
Context Example#
Human Readable Output#
Tenable IO Scan Filters
Filter name Filter Readable name Filter Control type Filter regex Readable regex Filter operators host.id Asset ID entry [0-9a-f]{8}-([0-9a-f]{4}-){3}[0-9a-f]{12}(,[0-9a-f]{8}-([0-9a-f]{4}-){3}[0-9a-f]{12})* 01234567-abcd-ef01-2345-6789abcdef01 eq,
neq,
match,
nmatchplugin.attributes.bid Bugtraq ID entry ^[0-9]+(,[0-9]+)* NUMBER eq,
neq,
match,
nmatch
#
tenable-io-get-scan-historyLists the individual runs of the specified scan.
#
Base Commandtenable-io-get-scan-history
#
InputArgument Name | Description | Required |
---|---|---|
scanId | The ID of the scan of which to get the runs. | Required |
sortFields | A comma-separated list of fields by which to sort, in the order defined by "sortOrder". Possible values are: start_date, end_date, status. | Optional |
sortOrder | A comma-separated list of directions in which to sort the fields defined by "sortFields". If multiple directions are chosen, they will be sequentially matched with "sortFields". If only one direction is chosen it will be used to sort all values in "sortFields". For example: If sortFields is "start_date,status" and sortOrder is "asc,desc", then start_date is sorted in ascending order and status in descending order. If sortFields is "start_date,status" and sortOrder is simply "asc", then both start_date and status are sorted in ascending order. . Possible values are: asc, desc. Default is asc. | Optional |
excludeRollover | Whether to exclude rollover scans from the scan history. Possible values are: true, false. Default is false. | Optional |
page | The page number of scan records to retrieve (used for pagination) starting from 1. The page size is defined by the "pageSize" argument. | Optional |
pageSize | The number of scan records per page to retrieve (used for pagination). The page number is defined by the "page" argument. | Optional |
limit | The maximum number of records to retrieve. If "pageSize" is defined, this argument is ignored. Default is 50. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
TenableIO.ScanHistory.time_end | Number | The end time of the scan. |
TenableIO.ScanHistory.scan_uuid | String | The UUID (Universally Unique Identifier) of the scan. |
TenableIO.ScanHistory.id | Number | The ID of the scan history. |
TenableIO.ScanHistory.is_archived | Boolean | Indicates whether the scan is archived or not. |
TenableIO.ScanHistory.time_start | Number | The start time of the scan. |
TenableIO.ScanHistory.visibility | String | The visibility of the scan. |
TenableIO.ScanHistory.targets.custom | Boolean | Indicates whether custom targets were used in the scan. |
TenableIO.ScanHistory.targets.default | Boolean | Indicates whether the default targets were used in the scan. |
TenableIO.ScanHistory.status | String | The status of the scan. |
#
Command example!tenable-io-get-scan-history scanId=16 excludeRollover=true sortFields=end_date,status sortOrder=desc page=2 pageSize=4
#
Context Example#
Human Readable Output#
Tenable IO Scan History
History id History uuid Status Is archived Targets default Visibility Time start Time end 17235445 69a55b8e-0d52-427a-81e0-7dfe4dc6eda6 completed true false public 1677424566 1677425182 17235342 2c592d52-df56-42e0-9f18-d892bdeb1e18 completed true false public 1677423906 1677424556 17235033 44586b4f-1051-415c-b375-db86f6bd8c13 completed true false public 1677423247 1677423865 17234969 06c12bf7-436f-489d-bb04-aae511ea9f5c completed true false public 1677422585 1677423205
#
tenable-io-export-scanExport and download a scan report. Scan results older than 35 days are supported in Nessus and CSV formats only, and filters cannot be applied. Scans that are actively running cannot be exported (run "tenable-io-list-scans" to view scan statuses)
#
Base Commandtenable-io-export-scan
#
InputArgument Name | Description | Required |
---|---|---|
scanId | The identifier for the scan to export. Run the "tenable-io-list-scans" command to get all available scans. | Required |
historyId | The unique identifier of the historical data to export. Run the "tenable-io-get-scan-history" command to get history IDs. | Optional |
historyUuid | The UUID of the historical data to export. Run the "tenable-io-get-scan-history" command to get history UUIDs. | Optional |
format | The file format to export the scan in. Scans can be export in the HTML and PDF formats for up to 35 days. For scans that are older than 35 days, only the Nessus and CSV formats are supported. The "chapters" argument must be defined if the chosen format is HTML or PDF. . Possible values are: Nessus, HTML, PDF, CSV. Default is CSV. | Required |
chapters | A comma-separated list of chapters to include in the export. This argument is required if the file format is PDF or HTML. Possible values are: vuln_hosts_summary, vuln_by_host, compliance_exec, remediations, vuln_by_plugin, compliance. | Optional |
filter | A comma-separated list of filters, in the format of "name quality value" to apply to the exported scan report. Example: "port.protocol eq tcp, plugin_id eq 1234567" Note: when used literally, commas and spaces should be escaped. (i.e. "\\," for comma and "\\s" for space) Filters cannot be applied to scans older than 35 days. Run "tenable-io-list-scan-filters" to get all available filters, ("Filter name" (name), "Filter operators" (quality) and "Readable regex" (value) in response). For more information: https://developer.tenable.com/docs/scan-export-filters-tio . | Optional |
filterSearchType | For multiple filters, specifies whether to use the AND or the OR logical operator. Possible values are: AND, OR. Default is AND. | Optional |
assetId | The ID of the asset scanned. | Optional |
#
Context OutputPath | Type | Description |
---|---|---|
InfoFile.Size | number | The size of the file in bytes. |
InfoFile.Name | string | The name of the file. |
InfoFile.EntryID | string | The War Room entry ID of the file. |
InfoFile.Info | string | The format and encoding of the file. |
InfoFile.Type | string | The type of the file. |
InfoFile.Extension | unknown | The file extension of the file. |
#
Command example!tenable-io-export-scan scanId=16 format=HTML chapters="compliance_exec,remediations,vuln_by_plugin" historyId=19540157 historyUuid=f7eaad37-23bd-4aac-a979-baab0e9a465b filterSearchType=OR filter="port.protocol eq tcp, plugin_id eq 1234567" assetId=10
#
Human Readable OutputPreparing scan report:
Returned file: scan_16_SSE-144f3dc6-cb2d-42fc-b6cc-dd20b807735f-html.html Download
#
tenable-io-get-audit-logsReturns audit logs extracted from Tenable io.
#
Base Commandtenable-io-get-audit-logs
#
InputArgument Name | Description | Required |
---|---|---|
should_push_events | Set this argument to True in order to create events, otherwise the command will only display the events. Possible values are: true, false. Default is false. | Required |
limit | The maximum number of alerts to return (maximum value - 5000). | Optional |
from_date | Return events that occurred after the specified date. | Optional |
to_date | Return events that occurred before the specified date. | Optional |
actor_id | Return events that contain the specified actor UUID. | Optional |
target_id | Return events matching the specified target UUID. | Optional |
#
Context OutputThere is no context output for this command.
#
Command example!tenable-io-get-audit-logs limit=1
#
Human Readable Output#
Audit Logs List:
Action Actor Crud Description Fields Id Is Anonymous Is Failure Received Target user.create id: test c {'key': 'X-Access-Type', 'value': 'apikey'},
{'key': 'X-Forwarded-For', 'value': '1.2.3.4'},
{'key': 'X-Request-Uuid', 'value': '12:12:12:12:12'}12 true false 2022-05-18T16:33:02Z id: 12-1-1-1-1
name: test@test.com
type: User