#1924: [don't merge until ~Oct] Notion Logs (Beta)
Change request updated
Overview
Tenable Vulnerability Management log ingestion is in open beta starting with Panther version 1.79, and is available to all customers. Please share any bug reports and feature requests with your Panther support team.
Panther supports pulling vulnerability logs directly from Tenable.
How to onboard Tenable Vulnerability Management logs to Panther
To onboard Tenable logs, you will generate an API key in Tenable, then set up a source in Panther.
The Trigger an alert when no events are processed setting defaults to YES. We recommend leaving this enabled, as you will be alerted if data stops flowing from the log source after a certain period of time. The timeframe is configurable, with a default of 24 hours.
Supported log types
Required fields in the schema are listed as "required: true"
Tenable.Vulnerability
The following defines the Tenable Vulnerability log schema:
schema:Tenable.Vulnerabilitydescription:Vulnerability logs from Tenable.ioreferenceURL:https://developer.tenable.com/reference/exports-vulns-download-chunkfields: - name:assettype:objectdescription:Information about the asset where the scan detected the vulnerability.fields: - name:agent_uuidtype:stringdescription:The UUID of the agent that performed the scan where the vulnerability was found. - name:bios_uuidtype:stringdescription:The BIOS UUID of the asset where the vulnerability was found. - name:device_typetype:stringdescription:The type of asset where the vulnerability was found. - name:fqdntype:stringindicators: [hostname]description:The fully-qualified domain name of the asset where a scan found the vulnerability. - name:hostnameindicators: [hostname]type:stringdescription:The host name of the asset where a scan found the vulnerability. - name:uuidtype:stringdescription:The UUID of the asset where a scan found the vulnerability. - name:ipv6type:stringindicators: [ip]description:The IPv6 address of the asset where a scan found the vulnerability. - name:ipv4indicators: [ip]type:stringdescription:The IPv4 address of the asset where a scan found the vulnerability. - name:last_authenticated_resultstype:timestamptimeFormats: [rfc3339]description:The last date credentials were used successfully to scan the asset. - name:last_unauthenticated_resultstype:timestamptimeFormats: [rfc3339]description:The last date when the asset was scanned without using credentials - name:mac_addressindicators: [mac]type:stringdescription:The MAC address of the asset where a scan found the vulnerability. - name:netbios_nametype:stringdescription:The NETBIOS name of the asset where a scan found the vulnerability. - name:netbios_workgrouptype:stringdescription:The NETBIOS workgroup of the asset where a scan found the vulnerability. - name:operating_systemtype:jsondescription:The operating system of the asset where a scan found the vulnerability. - name:network_idtype:string description: The ID of the network object associated with scanners that identified the asset. The default network ID is 00000000-0000-0000-0000-000000000000. For more information about network objects, see Manage Networks.
- name:trackedtype:boolean description: A value specifying whether Tenable.io tracks the asset in the asset management system. Tenable.io still assigns untracked assets identifiers in scan results, but these identifiers change with each new scan of the asset. This parameter is relevant to PCI-type scans and in certain cases where there is not enough information in a scan to identify the asset. Untracked assets appear in the scan history, but do not appear in workbenches or reports.
- name:outputtype:stringdescription:The text output of the Nessus scanner. - name:plugintype:jsondescription:Information about the plugin that detected the vulnerability. - name:porttype:jsondescription:Information about the port the scanner used to connect to the asset. - name:recast_reasontype:stringdescription:The text that appears in the Comment field of the recast rule in the Tenable.io user interface. - name:recast_rule_uuidtype:stringdescription:The UUID of the recast rule that applies to the plugin. - name:scantype:jsondescription:Information about the latest scan that detected the vulnerability. - name:severitytype:string description: The severity of the vulnerability as defined using the Common Vulnerability Scoring System (CVSS) base score. Possible values include info (CVSS score of 0), low (CVSS score between 0.1 and 3.9), medium (CVSS score between 4.0 and 6.9), high (CVSS score between 7.0 and 9.9), and critical (CVSS score of 10.0).
- name:severity_idtype:stringdescription:| The code for the severity assigned when a user recast the risk associated with the vulnerability. Possible values include:
0—The vulnerability has a CVSS score of 0, which corresponds to the "info" severity level. 1—The vulnerability has a CVSS score between 0.1 and 3.9, which corresponds to the "low" severity level. 2—The vulnerability has a CVSS score between 4.0 and 6.9, which corresponds to the "medium" severity level. 3—The vulnerability has a CVSS score between 7.0 and 9.9, which corresponds to the "high" severity level. 4—The vulnerability has a CVSS score of 10.0, which corresponds to the "critical" severity level. - name:severity_default_idtype:string description: The code for the severity originally assigned to a vulnerability before a user recast the risk associated with the vulnerability. Possible values are the same as for the severity_id attribute.
- name:severity_modification_typetype:stringdescription:| The type of modification a user made to the vulnerability's severity. Possible values include: none—No modification has been made. recasted—A user in the Tenable.io user interface has recast the risk associated with the vulnerability. accepted—A user in the Tenable.io user interface has accepted the risk associated with the vulnerability. - name:first_foundtype:timestampisEventTime:truerequired:truedescription:The ISO date when a scan first detected the vulnerability on the asset.timeFormats: - rfc3339 - name:last_foundtype:timestampisEventTime:truerequired:truedescription:The ISO date when a scan last detected the vulnerability on the asset.timeFormats: - rfc3339 - name:last_fixedtype:timestampdescription:The ISO date when a scan no longer detects the previously detected vulnerability on the asset.timeFormats: - rfc3339 - name:statetype:stringdescription:| The state of the vulnerability as determined by the Tenable.io state service. Possible values include: open—The vulnerability is currently present on an asset. reopened—The vulnerability was previously marked as fixed on an asset, but has been detected again by a new scan. fixed—The vulnerability was present on an asset, but is no longer detected. - name:indexedtype:timestampdescription:The date and time (in Unix time) when the vulnerability was indexed into Tenable.io.timeFormats: - rfc3339 - unix