Skip to main content

Cortex ASM - Vulnerability Management Enrichment

This Playbook is part of the Cortex Attack Surface Management Pack.#

Supported versions

Supported Cortex XSOAR versions: 6.5.0 and later.

Playbook to Look up ASM discovered IPs in Tenable.io or Rapid7 InsightVM#

This playbook will look up an IP address in Tenable.io or Rapid7 InsightVM.

Dependencies#

This playbook uses the following sub-playbooks, integrations, and scripts.

Sub-playbooks#

There are no sub-playbooks for this playbook.

Integrations#

  • Tenable.io
  • Rapid7 Nexpose

Scripts#

There are no scripts for this playbook.

Commands#

  • tenable-io-get-vulnerabilities-by-asset
  • tanable-io-launch-scan
  • nexpose-search-assets
  • nexpose-start-assets-scan

Playbook Inputs#


NameDescriptionDefault ValueRequired
IPIP address to look up in VM tool.True
DaysPastHow many days to look in the past for scan results (Tenable only)30False
TenableScanIdOptional scan ID to provide for Tenable.io to use for scanning (Tenable only)False

Playbook Outputs#


There are no outputs for this playbook.

Playbook Image#


Cortex ASM - Vulnerability Management Enrichment