Академический Документы
Профессиональный Документы
Культура Документы
8 User Guide
December 16, 2014
(Revision 7)
Table of Contents
Introduction ......................................................................................................................................... 5
Standards and Conventions........................................................................................................................... 5
Abbreviations ................................................................................................................................................. 6
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
Vulnerability Filters................................................................................................................................... 52
Mobile Analysis............................................................................................................................................ 58
Event Analysis ............................................................................................................................................. 59
Raw Syslog Events .................................................................................................................................. 60
Filter History............................................................................................................................................. 61
Date Selection ......................................................................................................................................... 62
Right-Click Functionality........................................................................................................................... 62
Active vs. Archived................................................................................................................................... 63
Analysis Tool ........................................................................................................................................... 63
Load Query .............................................................................................................................................. 68
Additional Event Analysis Options ............................................................................................................... 68
Save Query .............................................................................................................................................. 68
Save Asset............................................................................................................................................... 69
Open Ticket ............................................................................................................................................. 70
More Options ........................................................................................................................................... 71
Save Watchlist ......................................................................................................................................................... 71
Export as CSV .......................................................................................................................................................... 72
Create Report ........................................................................................................................................................... 72
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
Workflow.................................................................................................................................................... 152
Alerts ..................................................................................................................................................... 152
Tickets ................................................................................................................................................... 156
Accept Risk Rules .................................................................................................................................. 158
Recast Risk Rules.................................................................................................................................. 158
Plugins ...................................................................................................................................................... 158
Update Plugins ...................................................................................................................................... 159
Upload Plugins ....................................................................................................................................... 159
Other Plugin Options.............................................................................................................................. 160
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
Introduction
This document provides instructions for using Tenable Network Securitys SecurityCenter 4.8 and related components.
Since many of Tenables customers have requirements to maintain separation of duties, the SecurityCenter 4.8
documentation has been separated into the following documents to better organize the material based on organizational
roles. Note that there is some overlap in roles as well as content provided with each of the following guides:
SecurityCenter 4.8 Installation Guide This document provides instructions for the installation of
SecurityCenter 4.8. The target audience for this document is system administrators who need to install the
SecurityCenter application. Included in this document are quick instructions for the admin user to add a Nessus
scanner and create a user account to launch a test scan to ensure SecurityCenter is correctly installed.
SecurityCenter 4.8 Upgrade Guide This document describes the process of upgrading to version 4.8 of
SecurityCenter.
SecurityCenter 4.8.x Upgrade Guide This document describes the process of upgrading to version 4.8.x of
SecurityCenter.
SecurityCenter 4.8 Administration Guide This document provides instructions for the administration of
SecurityCenter by the admin user. The admin user is the first user to log into the SecurityCenter after the initial
installation and is responsible for configuration tasks such as defining organizations, repositories, Nessus scanners,
LCE servers and PVS sensors. The admin user does not have the ability to create and launch Nessus scans.
SecurityCenter 4.8 User Guide This document provides instructions for using SecurityCenter from a Security
Manager user or lesser account.
Tips, examples, and best practices are highlighted with this symbol and white on blue text.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
Abbreviations
The following abbreviations are used throughout this documentation:
LCE
PVS
SC
SecurityCenter
SSH
Secure Shell
IDS
Updated user model to a more common grouping method vs the previously used hierarchal model
Combination asset support adds the ability to create a new dynamic asset list based on exiting asset lists
Combination asset filtering is supported when creating filters to apply set logic against multiple assets
Database Credentials are now created in SecurityCenter for ease of reuse and assigned to a scan policy versus
the previous method of adding the database credentials to each scan policy individually
Dynamic asset lists now support Perl Compatible Regular Expressions allowing for negative operators in addition
to positive operators
Full Perl Compatible Regular Expressions (PCRE) support is now available when filtering on vulnerability text.
This can be used in all areas of SecurityCenter where vulnerability queries are used including Vulnerability
Analysis, Dashboard, Reporting, and Alerts.
To support Nessus functionality, the ability for a user to select .k5login has been added as an option in the
privilege escalation dropdown for SSH credentials
Communication between SecurityCenter and PVS uses XMLRPC only. All attached PVS scanners must be 4.0 or
newer
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
Details on how to configure and manage these functions are provided in the section titled SecurityCenter Functions. If
you are already familiar with SecurityCenter functions, you may wish to proceed directly to the Getting Started section.
System Status
The Job Scheduler process is restarted by logging in as an admin user and using the Stop/Start options
available to that user in this interface. The Stop/Start options are not available for non-admin users, but they
are able to view the status.
The SecurityCenter status is displayed from the web management interface. Simply click on the status circle in the lower
right-hand corner of the web page. A pop-up similar to the one below is displayed:
SecurityCenter Status
Within the system status are the current plugin feed status, SecurityCenter (SC) feed status, license status, and Job
Scheduler service state.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
provide an easy starting point for creating dashboards. They are created and maintained by Tenable and are based on
industry standards, trends, and customer requests. Templates are added and updated via the SecurityCenter feed.
Assets
SecurityCenter supports a flexible dynamic asset discovery system that can also import static asset lists from many
commercial and open source systems. This allows high level asset lists to be constructed as well as very detailed lists of
specific items. Some examples of assets to be grouped together include, but are not limited to, hardware device types,
particular service types, certain vulnerability types, machines with outdated software, OS types, and other lists based on
discovered information. There are many Asset templates available by default in SecurityCenter and, if configured,
templates are automatically updated and added to by Tenable.
To create a static list of assets in SecurityCenter, users can either manually enter IP addresses into the Addresses field
or upload a text file that contains IP addresses, ranges of IP addresses, or CIDR notation. Once uploaded, the asset list is
named and can be immediately used.
SecurityCenter can implement rules that consider discovered information for dynamic asset discovery. These rules are
run against the vulnerability data and results in assigning an IP address to one or more asset lists. For example,
SecurityCenter could create a rule stating that any Windows system that belongs to the CORPORATE-NY domain be
placed on an asset list named New York Domain. Another example would be any host discovered to have LimeWire
software running (Nessus plugin 11427 or PVS plugin 4110) could be assigned to a dynamic asset list for special review.
Tenable also provides a variety of asset templates that may be used as is or may be customized for the local
environment.
Audit Files
A configuration audit is one where the auditors verify that servers and devices are configured according to an established
standard and maintained with an appropriate procedure. SecurityCenter can perform configuration audits on key assets
through the use of Nessus local checks that can log directly onto a Unix or Windows server without an agent.
SecurityCenter supports a variety of audit standards. Some of these come from best practice centers like the PCI Security
Standards Council and the SANS Institute. Some of these are based on Tenables interpretation of audit requirements to
comply with specific industry standards such as PCI DSS or legislation such as Sarbanes-Oxley.
In addition to the base audits, it is easy to create customized audits for the particular requirements of any organization.
These customized audits can be loaded into the SecurityCenter and made available to anyone performing configuration
audits within an organization.
NIST SCAP files can be uploaded and used in the same manner as an audit file. Navigate to NISTs SCAP website
(http://scap.nist.gov) and under the SCAP Content section, download the desired SCAP security checklist zip file. The
file may then be uploaded to SecurityCenter and selected for use in Nessus scan jobs.
Once the audit policies have been configured in SecurityCenter, they can be repeatedly used with little effort.
SecurityCenter can also perform audits intended for specific assets. Through the use of audit policies and asset lists, a
SecurityCenter user can quickly determine the compliance posture for any specified asset.
Credentials
Credentials are reusable objects that facilitate a login to a scan target. Various types of credentials can be configured for use
within scan policies. Credentials may be shared between users for scanning purposes. Available credential types include:
Windows
SSH
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
Kerberos
Database
SecurityCenter supports the use of one SSH credential set, one Kerberos credential set, one Database credential set, up
to four Windows credential sets, and four SNMP credential sets per scan configuration.
Queries
Queries allow SecurityCenter users to save custom views of vulnerability or event data for repeated access. This enables
SecurityCenter users to quickly update data for a particular query type without having to configure complex query
parameters each time.
Scan Policies
Scan policies consist of configuration options related to performing a vulnerability scan. These options include, but are not
limited to:
Parameters that control technical aspects of the scan such as timeouts, number of hosts, type of port scanner,
and more
Compliance policy checks (Windows, Linux, Database, etc.), report verbosity, service detection scan settings,
audit files, patch management systems, and more
Manage Users
The Users screen provides the ability to add, edit, delete, or view the details of SecurityCenter user accounts. Users are
assigned roles and groups to determine the level of access they have and are also assigned assets, depending on the
level of access required. The list of users and actions is limited to the Organization and the permissions of the user
viewing the list.
Roles
SecurityCenter users can be created with default or customized roles. Roles are adjustable and allow for user creation
based on specific business/security models and needs. User accounts created by other users inherit the creating users
permissions or a subset of the permissions as desired while not exceeding the access or permissions of the creating user.
This granular user control and customization enables large organizations to comply with regulations and standards that
mandate separation of duties and layers of control.
There are several pre-defined Organizational roles including:
Security Manager
A Security Manager is the account within an organization that has a broad range of responsibilities. This is the role assigned
to the initial user that is created when a new organization is created. They have the ability to launch scans, configure users
(except for administrator user roles), vulnerability policies, and other objects belonging to their organization. Each
organization has a Security Manager account that cannot be deleted without deleting the entire Organization.
Auditor
The Auditor role can access summary information to perform third party audits. An Auditor can view dashboards, reports,
and logs, but cannot perform scans or analyze vulnerability or event data.
Credential Manager
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
The Credential Manager role can be used specifically for handling credentials. A Credential Manager can create and
share credentials without revealing the contents of the credential. This can be used by someone outside the security team
to keep scanning credentials up to date.
Executive
The Executive role is intended for users who are interested in a high-level overview of their security posture and risk profile.
Executives would most likely browse dashboards and review reports, but would not be concerned with monitoring running
scans or managing users. Executives would also be able to assign tasks to other users using the ticketing interface.
No Role
This role is available as a catch-all role if a role is deleted. It has virtually no permissions.
Security Analyst
The Security Analyst role has permissions to perform all actions at the Organizational level except managing groups and
users. A Security Analyst is most likely an advanced user who can be trusted with some system related tasks such as
setting blackout windows or updating plugins.
Vulnerability Analyst
The Vulnerability Analyst role can perform basic tasks within the application. A Vulnerability Analyst is allowed to view
security data, perform scans, share objects, view logs, and work with tickets.
Groups
User Groups are a way to group rights to objects within an Organization for quick assignment to one or more users. When
a user creates various objects such as reports, scan policies, dashboards, and other similar items, they are automatically
shared among the members if the Group permissions allow the view and control.
When creating a new Group, the basic information includes giving a name and description of the Group being created. In
addition, selecting the Repositories, LCEs, and Viewable IPs that are available to the Group are made on the Basic tab.
On the Group Sharing tab, shared Assets, Dashboards, Credentials, Policies, and Queries are selected.
After the Groups initial creation, it may be edited, deleted, or have its details viewed from the main Groups page list.
Manage Scanning
Scans are managed from the Scanning tab on the dashboard. There are three basic categories of scans: active
vulnerability scanning, credentialed scanning, and continuous passive discovery. Using all three types provides a
comprehensive view of the organizations security posture and reduces false positives. SecurityCenter can manage one
or more Nessus vulnerability scanners. Scan policies that discover new hosts, new applications, and new vulnerabilities
can be scheduled and automatically distributed to multiple scanners for load balancing. SecurityCenter manages which
Nessus scanners are best suited to scan a particular host. There are a large number of scanning options, including the
ability to specify the maximum length of time a scan is allowed to run. If a scan exceeds the limit, the un-scanned targets
are captured in a rollover scan that can be run manually or scheduled for a later time. This feature is very useful for
organizations that have a limited scanning window available, enabling them to pick up a scan where it left off.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
10
Credentialed Scanning
Nessus credentialed scans can be leveraged to perform highly accurate and rapid patch, configuration, and vulnerability
audits on Unix, Windows, Cisco, and database systems by actually logging in to the target system with provided
credentials. Credentialed scans can also enumerate all UDP and TCP ports in just a few seconds. SecurityCenter can
securely manage these credentials across thousands of different systems and also share the results of these audits only
with users who have a need to know.
For more information on Nessus credentialed scanning, please refer to the Nessus Credentialed Checks for
Unix and Windows document available from https://support.tenable.com.
Analyze Data
The Analysis tab on the SecurityCenter dashboard provides a great many filters to analyze vulnerability, mobile, and
event data.
Generate Reports
Tenable provides extremely flexible and simplified reporting through an assortment of report templates and a user-friendly
report creation interface. Supported report types include the well-known standard formats of PDF, RTF, and CSV
standards for a high level of compatibility and ease of use. For specialized needs, CyberScope, DISA ASR, and DISA
ARF types are available as well. Reports can be run as part of a post-scan process, scheduled by time, or run on demand
and the results automatically emailed or shared to multiple recipients who have an interest in the report details.
To see a list of templated and scheduled reports to be run, click on the Reporting tab from the dashboard and then
Reports. To see a list of completed reports, click the Reporting tab from the dashboard and then Report Results.
Manage Workflow
The Workflow tab contains options for alerting, ticketing, and managing risk rules. These functions allow users to be
notified of and properly handle vulnerabilities and events as they are identified.
Manage Plugins
The Plugins tab provides the ability to perform a wide variety of plugin-related functions including updating active,
passive and event plugins, upload custom plugins, view plugin details/source, and search for specific plugins.
Plugins are scripts used by Nessus, the Passive Vulnerability Scanner, and the Log Correlation Engine to collect and
interpret vulnerability data. For ease of operation, active and passive plugins are managed centrally by SecurityCenter
and pushed out to their respective scanners.
Getting Started
New users to SecurityCenter may find the rich functionality a bit daunting at first. The first steps are to ensure you have
the correct browser settings and to establish system settings specific to your account.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
11
Adobe Flash Player must be installed to use the SecurityCenter web interface. It can be obtained at
http://get.adobe.com/flashplayer/.
The minimum recommended browser window size is 1024x580. Resizing the browser window below this size
when viewing the SecurityCenter web interface causes some objects to display incorrectly.
To launch SecurityCenter, bring up a web browser on a system that has access to the SecurityCenters network address
space and enter the URL in the following format:
https://<SERVER ADDRESS OR NAME>/
The SecurityCenter web interface must be accessed using a secure web connection (https). SecurityCenter
does not listen on port 80 by default. TLS 1.0 must be enabled by the browser in order to complete the secure
connection to SecurityCenter.
This will present a SecurityCenter login screen:
Log in using the credentials provided by the user who created your account.
System Functions
System functions in SecurityCenter are managed from the System tab, displayed in the upper right-hand corner of the
SecurityCenter user interface. This tab allows users to create custom preferences for their account.
Preferences
The Preferences option enables basic options and notifications to be modified to customize the user experience.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
12
Basic
The Basic tab modifies several location and workflow options. First, it enables the user to modify the time zone
displayed within the SecurityCenter user interface. This does not affect the underlying event or vulnerability time stamps,
which are set by the server system time. The user can also configure the Email on Ticket Assignment option, which
ensures that an email is sent by the system to the currently logged in user for all newly assigned tickets. No additional
configuration is required.
Basic Preferences
Notifications
Notifications are a feature of SecurityCenter that allows specified events to display a pop-up in the lower right-hand corner
of the SecurityCenter user interface.
Sample Notifications
Current notifications can be viewed by clicking on the left-hand circle at the lower right-hand corner of the SecurityCenter
web page. Unread notifications will have a blue circle to the left of the notification text. Clicking on Mark All as Read
removes the blue circle from all displayed notifications. To view notification details, click on the highlighted title to expand
the notification details.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
13
Notifications can also be deleted by clicking on the X to the right of the notification text or clicking on the Delete All
command button within the Notification dialog box. User configurable notifications are shown in the screen capture below:
Notification Preferences
Logs
The Logs menu is only available to users with the View Organizational Logs permission set.
SecurityCenter logs contain detailed functionality to troubleshoot unusual system or user activity. The logs include filters
that allow the user to search logs based on parameters such as date, user, module, severity and keywords. An example
keyword and user search is displayed below:
SecurityCenter Logging
Attribute Sets
This section allows users with the appropriate permission to create and manage operational attribute sets to apply to
CyberScope Lightweight Asset Summary Results Schema (LASR) reports and Defense Information Systems Agency
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
14
(DISA) Asset Report Format (ARF) report types. Each operational attribute set contains a name and optional description
of the set. Two options are available within the Type drop-down box: ARF and CyberScope.
When DISA ARF is selected, there are six attribute sections displayed. These must be filled in to correctly populate
certain fields in DISA ARF reports. These sections include owning unit, owning service, administration unit, administration
POC, CND service provider, and location.
When CyberScope is selected, attributes for ReportingComponent, ComponentBureau, and Enclaves are available.
These fields are available to complete the CyberScope fields by entering the organizations name, FISMA reporting entity,
and enclave within the FISMA reporting entity.
Once saved, the Attribute Set will be available by its name in a drop-down menu for selection in CyberScope or DISA
reports as appropriate to the format.
Feed
The Feed option allows the user to update the SecurityCenter feed with new templates for reports, assets, and
dashboards from Tenable. A file may be selected for upload or a direct connection to Tenables website may be made if
the SecurityCenter has appropriate connectivity.
SecurityCenter Functions
The SecurityCenter task bar contains eight major elements: Home, Analysis, Scanning, Reporting, Support, Users,
Workflow, and Plugins. Each of these elements provides a drop-down menu for subsections, which may also contain a
number of options. The Table of Contents of this document provides a listing of the functions that may be helpful in
searching for a particular capability.
Dashboard
The dashboard is the first screen displayed when you login to the SecurityCenter user interface and displays vulnerability
and event data using various predefined components. The Dashboard can also be displayed by selecting Dashboard
from the Dashboard tab.
Because components draw from vulnerability, event, and other data sources, it is advisable to create and
configure the data sources before adding any components.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
15
The dashboard is configured with one or more tabs that contain different views and layouts populated with multiple
components including tables and custom charts (e.g., bar, line, area, pie, and matrix). The dashboard tables and charts
are fully customizable and allow data to be retrieved from various sources using a wide variety of configurations. Each of
these component types allows the user to view the vulnerability, event, ticket, user, and alert data in a way that provides
instant analysis of the important data anomalies with the ability to drill into the underlying data set for further evaluation
(vulnerability and event data only).
SecurityCenter utilizes a matrix layout that provides for customizable displays based on the intersection of row and
column data. These displays can integrate if-then-else logic to vary the display depending on the current state of the
underlying data set.
There are many dashboard templates provided with SecurityCenter. The SecurityCenter feed provides new and updated
dashboard templates created by Tenables team based on industry standards and customer requests.
For some good examples of SecurityCenter dashboards, please visit the SecurityCenter Dashboard blog at
http://blog.tenable.com/sc4dashboards/.
Adding Dashboards
To create a new dashboard, simply click on the Add Dashboard tab on the left side of the Dashboard page, which is
located at the bottom of the list of tabs.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
16
A new window displays the list of available dashboard template categories, along with options to create a custom
dashboard or import a dashboard.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
17
The categories may be selected by clicking on the box, which displays a list of available dashboards. Once chosen, a
selection of template names and descriptions are listed and a choice of sub-categories is available to further narrow the
list. Selection of an individual template will add the dashboard.
If Import Dashboard is selected, a dialog window will be displayed. This window provides options to name the
dashboard and browse to the dashboard file to be imported from the local computer. After the selections are completed,
clicking the Import button will create the new dashboard.
If Create Custom Component is selected, a window opens to provide the name, description, and layout of the new
dashboard. After submitting that information, the dashboard template selection window is displayed and individual
components may be added to the new dashboard. The components may be selected from the templates already provided
or by creating a custom component.
Please refer to the Working with Components section below for information about how to create, edit, and delete custom
dashboard components.
Editing Dashboards
To modify the dashboard configuration, simply click on the arrow next to the Dashboard title in the upper left-hand corner
of the dashboard screen and select the desired option from the drop-down items:
Add Components
Click on Add Components to display the list of available dashboard component template categories. The categories
may be selected by clicking on the box, which displays a list of available components. Once chosen, a selection of
template names and descriptions are listed and a choice of sub-categories is available to further narrow the list. Selection
of an individual template will add the component to the currently selected dashboard. If Create Custom Component is
selected, the created component will appear on the current dashboard.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
18
Please refer to the Working with Components section below for information about how to create, edit, and delete custom
dashboard components.
The table below contains a detailed description of the available dashboard options.
Table 1 Tab Options
Tab Option
Description
Add Components
This option allows you to add individual components to the selected dashboard.
Components may be added using available templates or creating a custom component.
Edit Dashboard
This option allows the user to edit an existing dashboard based on the options
available in the dashboard configuration. These include the name, description, and
layout of the dashboard.
Export Dashboard
Dashboards can be exported as XML files for use on other SecurityCenter systems.
This is particularly useful where complex component definitions have been created
and must be used in other locations. This function provides three options for
component objects:
1. Remove All References all object references will be removed, altering the
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
19
definitions of the components. Importing users will not need to make any
changes for components to be useable.
2. Keep All References object references will be kept intact. Importing users
must be in the same organization and have access to all relevant objects for
the components to be useable.
3. Replace With Placeholders object references will be removed and replaced
with their respective names. Importing users will see the name of the reference
object, but will need to replace it with an applicable object within their
organization before the component is useable.
Due to changes in the dashboard XML file formats over SecurityCenter
versions, exported dashboards are not always compatible for import
between SecurityCenter versions.
Share Dashboard
Use this function to share a dashboard with any Group in your current Organization.
Revoking a previously shared tab may also be performed using this option.
Send to Report
This option creates a report based on the dashboard components. When selected, a
window offers options to customize the name and description, and define the schedule
for when the report is run or if it is created as a report template.
Delete Dashboard
Chart Option
Description
Name
Chart name
Description
Chart description
Update Frequency
Frequency with which the component polls the data source to obtain updates.
Available frequency options include: 15 minutes, 20 minutes, 30 minutes, hourly, 2
hours, 4 hours, 6 hours, 8 hours, 12 hours, daily (default), weekdays, weekends, once
a week, once a month (by day or date), and never.
Excessively frequent tab updates may cause the application to become
less responsive due to the added processing load imposed on the host
OS.
Data Type
Source
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
20
The Source option is not available because only active event data is
permitted for event-based components.
Query
Predefined query used to further narrow down the data source options. If a query does
not exist or is not desired, it may be left unselected. The query may be used as is or as
a template on which to base the Filters option.
Filters
Additional filters to use on the data source. For more information on these filters, see
the Vulnerability Filters, Mobile Filters, Event Filters, Ticket Query, Alert Query, and
User Query sections.
Results Displayed
The number of displayed results (Table Chart maximum: 999). If the Viewport Size
setting is smaller than this setting, the results display is limited to the Viewport Size
setting with a scrollbar to display the additional results.
Viewport Size
The number of records (maximum: 50) to display along with a scrollbar to handle
additional records. For example, if Results Displayed is set to 100 and Viewport Size
is 15, fifteen records are displayed with a scrollbar to view the additional 85 records.
Sort Column
(Except Event Data Type) Column that the results are sorted by.
Sort Direction
Display Columns
Chart Option
Description
Name
Chart name
Description
Chart description
Update Frequency
Frequency with which the component polls the data source to obtain updates.
Available frequency options include: 15 minutes, 20 minutes, 30 minutes, hourly, 2
hours, 4 hours, 6 hours, 8 hours, 12 hours, daily (default), weekdays, weekends, once
a week, once a month (by day or date), and never.
Excessively frequent tab updates may cause the application to become
less responsive due to the added processing load imposed on the host
OS.
Data Type
Source
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
21
Query
Predefined query used to further narrow down the data source options. If a query does
not exist or is not desired, it may be left unselected. The query may be used as is or as
a template on which to base the Filters option.
Filters
Additional filters to use on the data source. For more information on these filters, see
the Vulnerability Filters, Mobile Filters, Event Filters, Ticket Query, Alert Query, and
User Query sections.
Results Displayed
Sort Column
(Vulnerability/Ticket Data Type only) Column that the results are sorted by.
Sort Direction
Display Columns
Chart Option
Description
Name
Description
Update Frequency
Frequency with which the component polls the data source to obtain updates.
Available frequency options include: 15 minutes, 20 minutes, 30 minutes, hourly, 2
hours, 4 hours, 6 hours, 8 hours, 12 hours, daily (default), weekdays, weekends, once
a week, once a month (by day or date), and never.
Excessively frequent tab updates may cause the application to become
less responsive due to the added processing load imposed on the host
OS.
Data Type
Source
Query
Predefined query used to further narrow down the data source options. If a query does
not exist or is not desired, it may be left unselected. The query may be used as is or as
a template on which to base the Filters option.
Filters
Vulnerability, Event or Ticket filters used to narrow down the series source. For more
information on these filters see the Vulnerability Filters, Mobile Filters, Event Filters,
and Ticket Query sections.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
22
Results Displayed
Sort Column
Sort Direction
Display Columns
Chart Option
Description
Name
Chart name
Description
Chart description
Update Frequency
Frequency with which the component polls the data source to obtain updates.
Available frequency options include: 15 minutes, 20 minutes, 30 minutes, hourly, 2
hours, 4 hours, 6 hours, 8 hours, 12 hours, daily (default), weekdays, weekends, once
a week, once a month (by day or date), and never.
Excessively frequent tab updates may cause the application to become
less responsive due to the added processing load imposed on the host
OS.
Time (x-axis)
Relative Includes time relative to the current time. Available options include:
Absolute This option allows one to select a from and to date range.
Add/Edit Series
Label
Data Type
Series label
For line/area charts, vulnerability data analysis often requires that the
underlying repository be a trending repository. If the selected repository is
not a trending repository, no historical analysis will be available.
Vulnerability or Event
Query
Predefined query used to further narrow down the data source options. If a query does
not exist or is not desired, it may be left unselected. The query may be used as is or as
a template on which to base the Filters option.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
23
Filters
Filters used to narrow down the series source. For more information on these filters
see the Vulnerability Filters and Event Filters sections.
Series Data
Data to display in the chart (Total, Info, Low, Medium, High, Critical).
Chart Option
Description
Name
Description
Add Column
(max 10)
Columns are normally used to define a group of vulnerability, mobile, event, ticket,
user, or alert data. For example, five columns could be used in a matrix component,
one each for critical, high, medium, low, and informational vulnerabilities. Hovering the
cursor over the right-hand side of the top cell of a column enables a drop-down similar
to the screen capture below:
Click on Column Settings to set the column name and update frequency. The
update frequency determines how often the underlying data set is refreshed.
Refreshing the data more often is useful for seeing a more current view of the data;
however, it can have a detrimental effect on system performance. Matrix columns are
updated as clusters and not individually. For example if column A and C have an
update frequency of Daily and column B has an update frequency of Every 12 Hours,
columns A and C will be updated together and column B will be updated by itself. What
this means is that if there is a missing query in column A, column C will not update.
However, if there is a missing query in column B, columns A and C will update.
When adding a column, an option called Intersect Settings is available for selection.
When chosen, the new column will analyze the existing cells across the rows and
populate the new cells with the information common to the existing cells.
For example, if all of the previous columns have a severity of High but differing asset
lists, the newly created columns cells will have a condition specifying the High severity
level, but no asset list designation. This feature improves the speed with which matrix
elements can be created by reusing previously used configuration options and
eliminating repetitive manual steps.
Add Row
(max 10)
Rows are another grouping element, used to define the operations being performed
against each column element for that row. For example, if each column determines the
vulnerability type (critical, high, medium, low, and informational), a row could be
created labelled ratio. Each cell in that row could be used to calculate the ratio of the
particular vulnerability type count against the total vulnerability count.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
24
Hovering the cursor over the right-hand side of the first cell in a row entry enables a
drop-down similar to the screen capture below:
When adding a row, an option called Intersect Settings is available for selection. When
chosen, the new column will analyze the existing cells across the columns and populate
the new cells with the information common to the existing cells. For example, if all of the
previous rows have a severity of High but differing asset lists, the newly created rows
cells will have a condition specifying the High severity level, but no asset list designation.
This feature improves the speed with which matrix elements can be created by reusing
previously used configuration options and eliminating repetitive manual steps.
Cells
Cells contain the actual data operations. Cells are defined by query and condition
options. The options are described below:
Query Options
Option
Description
Data Type
Query
Filters
Conditions
Option
Description
Type
Available types include: Query Value, Static Text, Icon, Bar, and
Ratio
Rule
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
25
Multiselect
Cells in a matrix component can be edited across rows and columns by selecting a single cell, and then dragging the
cursor over other cells until the entire range to be edited is highlighted. After doing this an Edit Cells dialog is displayed
for the highlighted range. In the example below, the highlighted ranges all use the same repository, but differing
vulnerability severity levels and asset lists. Edit the data type, query and filters as needed.
Multiselect Options
Conditions
There are two basic types of conditions in a matrix cell definition: the default (or fallback) condition and conditions that are
added. By default, a single editable condition is added to each cell definition. This condition cannot be deleted and
describes what will be displayed in the cell if no other conditions have been defined or triggered. A default condition looks
similar to the following:
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
26
This condition can be edited to display any of the available display options. Added conditions may look similar to the
following:
The first two buttons on the left hand side of the condition are up and down arrows that allow the conditions to be moved
up or down in review order. These are followed by an edit button and a delete button.
Conditions are reviewed from top to bottom and will trigger the display condition on the first condition match. Once a
condition triggers, none of the subsequent conditions are reviewed. If none of the added conditions match, the default
condition is automatically performed.
Creating a Simple Matrix Component
The matrix component has a great deal of power and functionality. The section below contains steps used to create the
matrix display shown below:
Matrix Component
This display shows IPs grouped by operating system and displayed with three columns:
Pass/Fail displays an icon that varies between red or green depending on the number of high vulnerabilities (>
1 in our sample).
Failure IP Count Total number of IPs in the dynamic asset list that contain at least one high vulnerability.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
27
Modify and use the steps below based on your dashboard needs.
1. Create a dynamic asset list for each operating system type desired. An example dynamic asset list is displayed
below. This asset list captures only those hosts whose operating system is based on the Linux 2.6x kernel. This
asset list is used for the Total IP Count fields and is used to generate the query created in step 2.
2. Create a query based on each asset list that contains only those assets with a High vulnerability. Note that in the
query below, we chose only those hosts that resided in the New IPv6 repository. Adjust the query to select hosts
from the desired repository.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
28
3. Hover over the desired tab and click the arrow to display the drop-down containing the tab options. Select Add
Component. Choose the Matrix component type.
4. Enter the desired name and description. The name is displayed as the component title, while the description is
displayed as a tooltip when hovering the cursor over the component.
5. Click the first row and select Set Row Name to define the first row. Name the row Linux 2.6. This row will be
copied in future row additions to save time.
6. Click the three columns and select Column Settings to define three columns: Pass/Fail, Failure IP Count, and
Total IP Count.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
29
7. Hover over the cell below Pass/Fail and click Set Cell. Choose data type of Vulnerability and then the
Linux_2_6 query under the query drop-down. Next, choose Add Condition and select values as shown in the
screen capture below:
This condition specifies that if at least one IP in the specified asset list has a vulnerability severity value of High,
we will display the red icon. Next we will create a default condition (else statement) for cases where an IP has
no High severity vulnerabilities:
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
30
The complete cell condition statement looks like the screen capture below:
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
31
The resulting cell values will look like the screen capture below:
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
32
Under condition options, choose a type of Query Value and a rule of IP Count. Leave the background and
foreground options at default values for this example. The resulting cell parameters will look similar to the screen
capture below:
Submit the changes made so far. Add additional conditions as desired. For example, having a condition where a
red icon is displayed if the IP count is >=1 and a second condition where a green icon is displayed where the IP
count is zero would be a common condition configuration.
9. Add new rows for each operating system type. When adding the new rows, choose Intersect Settings to
duplicate the previous rows parameters. Adjust the row name based on the asset list and adjust each column
based on the new query and asset list.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
33
10. Once completed, the matrix definitions will look similar to the screen capture below:
Cell Set indicates that both target and query filters have been configured. Target Set indicates that only
target filters (in this case the asset list IPs) have been configured. Query Set means that you have selected a
query filter, but no target filters. Any one of these three settings is a valid cell configuration.
The matrix element will display and refresh daily as configured.
For more information about configuring matrix components and downloadable samples that you may find useful, please
visit the Tenable SecurityCenter Dashboards blog at: http://blog.tenable.com/sc4dashboards/.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
34
The Copy Component options are the same as the Edit Component tab except that the user is given the option of
choosing the destination tab where the component will be copied.
The left-hand Browse Component Data icon gives the user the ability to drill into the dataset behind the dashboard
view and display the data for further analysis.
Various dashboards do not provide this option because their underlying data snapshot source does not
support browse capability.
For example, the screen capture below contains a vulnerability summary view displayed after clicking on the Browse
Component Data icon:
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
35
Notice the white arrow on the left-hand portion of this screen next to Load Query. Clicking this arrow or anywhere along
the grey bar returns the user to the initial dashboard view.
The center Refresh Component Data icon refreshes the component data based on the most recent underlying data.
After first login, it may be necessary for the user to initially manually refresh the dashboard component to
obtain the most current data set.
There is a blue arrow icon to indicate when the component is updating, and a red exclamation mark icon to indicate when
something has gone wrong. Hovering over the icon will show a tooltip with more details on what went wrong. For example,
if the underlying query behind a dashboard component becomes disabled (e.g., asset lists that were shared with the user
are no longer shared), the refresh will fail and the user will be presented with the tooltip notification of why it failed.
The right-hand arrow icon gives the user more options that are described above including: Edit Component, Copy
Component, Delete Component, and Export PNG. The Export PNG option allows for saving a PNG image of the
dashboard element to facilitate the use of the elements displayed results outside of SecurityCenter.
Vulnerability Analysis
The Vulnerabilities display screen is the focal point for the display and analysis of vulnerabilities from either the
cumulative or mitigated vulnerability database. Vulnerability data is displayed at varying levels and views ranging from the
highest level summary down to a detailed vulnerability list data. Clicking through Analysis and Vulnerabilities
displays a screen with information from the cumulative vulnerability database using the selected default filter. The
Vulnerability Summary filter is shown here:
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
36
This screen displays vulnerabilities in both a table and graphical view for rapid analysis and mitigation.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
37
Filter History
Below the Cumulative/Mitigated tabs is a listing of previously loaded filter options. Hover the cursor over a previously
selected filter to display a white dot to the right of the analysis tool type name for each filter option along with a pop-up
window to the right with the filter parameters. Notice in the example screen capture above, there are three white dots to
the right of the highlighted filter, one for Address, one for Repository, and one for Plugin ID.
Click on the desired filter to change the view to use the previously selected filter. Click on Clear to remove all previously
loaded filters from the history panel.
Right-Click Functionality
Right-Click Options
Selecting and right-clicking on a particular vulnerability in the vulnerabilities screen gives the user additional options that
are useful in the content of the highlighted vulnerability. Available options include: Copy To Clipboard, Add To
Scratch Pad, Recast Risk, Accept Risk, and Launch Remediation Scan. These options are described in more
detail in the table below:
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
38
Type
Description
Copy To Clipboard
Use this option to copy the vulnerability details to your clipboard for reuse elsewhere.
For example, you could copy the vulnerability details to the clipboard and then paste
them into an email if so desired.
The Scratch Pad allows users to store the current drilldown value as a filter option.
For example, if the current view allows for a plugin drilldown, selecting a vulnerability
with a particular plugin, right-clicking and choosing Add to Scratch Pad will add that
plugin ID to the Scratch Pad. This allows the user to quickly switch back and forth
between scratch pad items for rapid analysis. Scratch Pad filters also persist between
different analysis tool views, allowing the user to apply the same Scratch Pad filter to
more than one desired view.
Recast Risk
Apply a new risk level to the selected vulnerability. For example, a particular
vulnerability may be rated as CVSS 7.5 (high) based on the overall scoring; however,
due to local variables could be recast as a critical risk. This would impact the overall
vulnerability scoring of hosts whose vulnerabilities have been recast.
There can be a short delay between clicking on Add Rule and
vulnerabilities showing the recast risk. Navigate away from the page and
then back to it to view the applied changes.
Deletion of recast risk rules is performed only by a SecurityCenter admin user and is
described in detail in the SecurityCenter 4.8 Administration Guide available on the
Tenable Support Portal.
Accept Risk
Any vulnerabilities that match the chosen criteria will be automatically accepted and
not show in a vulnerability search unless the Accepted Risk filter flag is set.
There can be a short delay between clicking on Add Rule and
vulnerabilities showing the new risk acceptance. Navigate away from the
page and then back to it to view the applied changes.
Deletion of accept risk rules is performed only by a SecurityCenter admin user and is
described in detail in the SecurityCenter 4.8 Administration Guide available on the
Tenable Support Portal.
This option provides the user with the ability to launch a new remediation scan based
on the selected vulnerability. This option is only available through the Vulnerability
List and Vulnerability Summary analysis tools.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
39
The screen capture above contains available scan options. Based on the results of this
remediation scan, the vulnerability will be either kept in the cumulative database or
moved to the mitigated database. For more information on the available scan options,
please refer to the Scanning section of this document.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
40
Analysis Tools
A wide variety of analysis tools are available for comprehensive vulnerability analysis. Clicking on the analysis tool dropdown displays a list of available tools.
Vulnerability filters can be reset at any time by clicking on the Clear link. If multiple filters are currently in use, filters can
be individually removed without affecting other filters by clicking on the X next to the individual filter under the Active
Filters section.
The table below contains detailed descriptions of all available analysis tools:
Table 8 Vulnerability Analysis Tools
Analysis Tool
Description
IP Summary
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
41
Class A Summary
Class B Summary
Class C Summary
Info - 0
Low 1
Medium 3
High 10
Critical 40
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
42
Severity Summary
Vulnerability Summary
CVE Summary
MS Bulletin Summary
Asset Summary
This tool summarizes the scores and counts of vulnerabilities for all
dynamic or static asset lists.
A breakdown of each assets specific vulnerabilities and counts for
each severity level is also included.
Clicking on any of the counts displays a Vulnerability List screen
with the corresponding filter.
This displays a list of the users who are assigned responsibility for
the vulnerability based on the users assigned asset list. Multiple
users with the same responsibility are displayed on the same line.
Users without any assigned responsibilities are not displayed in the
list.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
43
CCE Summary
Port Summary
This tool will chart each present the Nessus, PVS, or Event plugin
family as well as their relative counts based on severity level for all
matching vulnerabilities.
Clicking on any of the counts will display a Vulnerability List
page filtered by the selected plugin family.
Protocol Summary
Vulnerability List
This tool lists out the Plugin ID, Severity, NetBIOS Name, DNS
Name, MAC Address, Repository Name, Vulnerability Name, and
Family for each matching vulnerability.
Clicking on any IP address will open a window that shows the
Detailed Vulnerability List for that IP address.
List OS
List Software
List Services
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
44
This tool takes the passive output from PVS plugin ID 1442 and the
active output from Nessus plugin ID 10107 and creates a unique
list of known web servers.
The method of discovery (active or passive) is also indicated in the
tool.
Clicking on the count displays the IP Summary screen of
matching addresses using that web server.
Not all web servers run on port 80 or 443. Do not be
surprised if you encounter web servers running on
unexpected ports.
This tool takes the passive output from PVS plugin ID 1967 and the
active output from Nessus plugin ID 10267 and creates a unique
list of known SSH servers.
The method of discovery (active or passive) is also indicated in the
tool.
Clicking on the count displays the IP Summary screen of
matching addresses using that SSH server.
Not all SSH servers run on port 22. Do not be
surprised if you encounter SSH servers running on
unexpected ports.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
45
CVSS Scoring
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
46
Choose the new risk to assign to the current vulnerability and the selected filter options (Repository, Targets, Ports, and
Protocol). If any of the selected options are modified, they will filter what vulnerabilities will inherit the new risk rating. In
addition, a comment can be added to describe why the risk is being recast.
There can be a short delay between clicking on Add Rule and vulnerabilities showing the new risk. It may be
necessary to reload the filters to view the applied changes.
Similar to recasting risks, risk acceptance is performed from the same screens and displays a pop-up similar to the one
below:
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
47
The Acceptance Rule has the ability to have an expiration date added to it. This adds a method to accept a risk on a
temporary basis. Any vulnerabilities that match the chosen criteria will be automatically accepted and not show in a
vulnerability search unless the Accepted Risk filter flag is set.
There can be a short delay between clicking on Add Rule and vulnerabilities showing the new risk
acceptance. It may be necessary to reload the filters to view the applied changes.
Deletion of both accept and recast risk rules is performed only by a SecurityCenter admin user and is described in detail
in the SecurityCenter Administration Guide available on the Tenable Support Portal.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
48
Load Query
The Load Query option enables users to load a predefined query and display the current dataset against that query.
Click on Load Query to display a box with all available queries. The first line is a text search box that will narrow the list
of queries to the text entered. The query names are displayed with their associated group (if assigned to one) in blue.
After clicking on an individual query, the vulnerability view is changed to match the query view for the current dataset.
Save Query
This option, available in the upper right-hand corner of the web interface, saves the current vulnerability view as a query
for reuse. If this link is clicked, a dialog similar to the one below is displayed:
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
49
Option
Description
Name
Query name
Tag
This option provides a tag for organizing created query objects. Tag names can be
reused as desired. This reduces lengthy lists of queries with no logical grouping.
Objects shared with new users will retain the tag specified by the creator.
Description
Save Asset
Vulnerability results can be saved to an asset list for later use by clicking on the Save Asset link in the upper right-hand
side of the screen.
Option
Description
Name
Asset name
Tag
A logical grouping for created asset objects. Tag names can be reused as desired.
This reduces lengthy lists of assets with no logical grouping. Objects shared with new
users will retain the tag specified by the creator.
Description
Asset description
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
50
Open Ticket
Ticket Options
Tickets are used within SecurityCenter to assist with the assessment and remediation of vulnerabilities and security
events. Use this option to open a ticket based on the current event view. Click on the Open Ticket link and complete the
relevant fields as described below:
Table 11 Ticket Options
Option
Description
Name
Ticket name
Description
Ticket description
Notes
Notes to be used within the ticket and read by the ticket assignee.
Assign To
Ticket assignee
Classification
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
51
More Options
Export as CSV
Vulnerability results can be exported to a comma-separated file for detailed analysis outside of SecurityCenter by clicking
on the More link and then the Export as CSV option.
If the record count (rows displayed) of any CSV export is greater than 1,000 records, a pop-up is displayed that prompts
for the name of the CSV report to be generated. When complete, the report can be downloaded from the Report Results
screen.
Create Report
This option is used to create a report based on the existing vulnerability view.
More information about SecurityCenter reports is available in this document in the Reporting section of this document.
Vulnerability Filters
Filters limit the results of the vulnerability display and can be added, modified or reset as desired. The screen capture
below shows a search based on a Cumulative database filtering on vulnerabilities from the selected repositories with an
available exploit and High and Critical severity levels.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
52
The Mitigated database filter does not contain the Accepted Risk or Recast Risk options under the
Workflow Filters tab.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
53
The screen capture below displays results from the previous Cumulative database search:
The Severity (set to High and Critical in this example) and Exploit Available filters are displayed in the lower left-hand
corner of the screen and can be reset by clicking the X icon next to the filter name. In addition, clicking on the view title
(Detailed Vulnerability List) in the upper left-hand corner of the screen navigates to the previously used Detailed
Vulnerability List view and filters. The table below describes the options available with the Edit Filters command
button.
Table 12 Vulnerability Filter Options
Filters
Description
This drop-down is used to choose the analysis tool used by the filter. This is the same
as selecting the desired analysis tool from the Analysis -> Vulnerabilities dialog.
These tools are described in detail in the Analysis Tools section.
Active Filters
This field displays the existing filters and allows the user to selectively remove filters as
needed. In the example below, the Active Filters displayed are Severity and Exploit
Available. Clicking the X next to any one of these filters will remove that filter from the
displayed vulnerabilities and reset that field to its default options.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
54
Target Filters
Address
This filter specifies an IPv4 or IPv6 address, range, or CIDR block to limit the viewed
vulnerabilities. For example, entering 192.168.10.0/24 and/or 2001:DB8::/32 limits any
of the web tools to only show vulnerability data from the selected network(s).
Addresses can be comma separated or separate lines.
DNS Name
This filter specifies a DNS name to limit the viewed vulnerabilities. For example,
entering host.example.com limits any of the web tools to only show vulnerability data
from that DNS name.
Repository
Asset
This filter displays systems from the chosen asset list. If more than one asset list
contains the systems from the primary asset list (i.e., there is an intersect between the
asset lists), those asset lists are displayed as well. The operand NOT, OR, and/or
AND may be used to exclude unwanted asset lists from the view.
Port
This filter is in two parts. First the equality operator is specified to allow matching
vulnerabilities with the same ports, different ports, all ports less than or all ports greater
than the port filter. The port filter allows a comma separated list of ports. For the larger
than or less than filters, only one port may be used.
All host-based vulnerability checks are reported with a port of 0 (zero).
Protocol
This filter provides check boxes to select TCP, UDP, or ICMP-based vulnerabilities.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
55
Responsible Users
Allows selection of one or more users who are responsible for the vulnerabilities.
Vulnerability Filters
Plugin Family
This filter chooses a Nessus or PVS plugin family. Only vulnerabilities from that family
will be shown.
Plugin Name
Enter all or a portion of the actual plugin name. For example, entering MS08-067 in
the plugin name filter will display vulnerabilities using the plugin named MS08-067:
Microsoft Windows Server Service Crafted RPC Request Handling Remote Code
Execution (958644) (uncredentialed check). Similarly, entering the string
uncredentialed will display a list of vulnerabilities with that string in the plugin name.
Vulnerability Text
Scan Policy
This filter chooses a scan policy. Only vulnerabilities from that scan policy will be
shown.
Audit File
This filter displays vulnerabilities detected when a scan was performed using the
chosen .audit file.
Plugin Type
Select whether to view all plugin types or passive, active, event, or compliance
vulnerabilities.
Severity
Displays vulnerabilities with the selected severity (Info, Low, Medium, High, Critical)
CVSS Score
Exploit Available
If set to yes, displays only vulnerabilities for which a known public exploit exists.
CPE
Allows a text string search to match against available CPEs. The filter may be set to
search based on a contains or is equal to filter.
ID Filters
Plugin ID
Enter the plugin ID desired or range based on a plugin ID. Available operators are
equal to (=), not equal to (!=), greater than or equal (>=) and less than or equal to (<=).
CVE ID
CCE ID
MS Bulletin ID
IAVM ID
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
56
Date Filters
Vulnerability Last Observed
(Cumulative only)
This filter allows the user to see when the vulnerability was last observed by Nessus,
LCE, or PVS.
The observation date is based on when the vulnerability was most
recently imported into SecurityCenter. For PVS, this will not match the
exact vulnerability discovery as there is normally a lag between the time
that PVS discovers a vulnerability and the import occurs.
Vulnerability Mitigated
(Mitigated only)
This filter allows the user to filter results based on when the vulnerability was
mitigated.
This filter allows the user to track the number of days since a vulnerability was moved
to the mitigated database.
Vulnerability Discovered
SecurityCenter tracks when each vulnerability was first discovered. This filter allows
the user to see when vulnerabilities were discovered less than, more than or within a
specific count of days.
The discovery date is based on when the vulnerability was first imported
into SecurityCenter. For PVS, this will not match the exact vulnerability
discovery time as there is normally a lag between the time that PVS
discovers a vulnerability and the import occurs.
Days are calculated based on 24-hour periods prior to the current time
and not calendar days. For example, if the report run time was 1/8/2012
at 1 PM, using a 3-day count would include vulnerabilities starting
1/5/2012 at 1 PM and not from 12:00 AM.
Plugin Published
Tenable plugins contain information about when a plugin was first published. This filter
allows users to search based on when a particular plugin was created; less than, more
than, or within a specific count of days.
Plugin Modified
Tenable plugins contain information about when a plugin was last modified. This filter
allows users to search based on when a particular plugin was modified; less than,
more than, or within a specific count of days.
Vulnerability Published
When available, Tenable plugins contain information about when a vulnerability was
published. This filter allows users to search based on when a particular vulnerability
was published; less than, more than, or within a specific count of days.
Patch Published
When available, Tenable plugins contain information about when a patch was
published for a vulnerability. This filter allows the user to search based on when a
patch became available; less than, more than, or within a specific count of days.
Workflow
Mitigated Status
Display vulnerabilities that were at one time mitigated, but have been discovered again
in a subsequent scan. This option is not used in conjunction with other options unless all
options within the selected combination are set (e.g., selecting the Was Mitigated
checkbox will return no results if both the Was Mitigated and the Accepted Risk flags
are set).
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
57
Display vulnerabilities based on their Recast Risk workflow status. Available choices
include Recast Risk or Non-Recast Risk. Choosing both options displays all
vulnerabilities regardless of recast risk status.
Mobile Analysis
The Mobile analysis display screen contains a list of vulnerabilities discovered by scanning an ActiveSync, Apple Profile
Manager, AirWatch, Good, and/or MobileIron MDM servers.
The table below indicates the options available for mobile queries:
Table 13 Mobile Filter Options
Option
Description
This drop-down is used to choose the analysis tool used by the filter. This is the same
as selecting the desired analysis tool from the Analysis -> Mobile dialog.
Active Filters
This field displays the existing filters and allows the user to selectively remove filters as
needed. In the example below, the Active Filters displayed are MDM Type, Model,
Plugin Output, and Days Since Observation. Clicking the X next to any one of these
filters will remove that filter from the filter list.
Mobile Filters
Target Filters
Repository
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
58
Device Filters
Identifier
This is a text based search filter that looks at the Identifier field in the repository.
Model
This is a text based search filter that looks at the Model field in the repository.
This is a text based search filter that looks at the Operating System CPE field in the
repository.
Version
This is a text based search filter that looks at the OS Version field in the repository.
Serial Number
This is a text based search filter that looks at the Serial Number field in the repository.
MDM Type
The MDM type field is a drop-down menu to select the MDM server type of
ActiveSync, Apple Profile Manager, Good, AirWatch, and MobileIron MDM server.
Username
This is a text based search filter that looks at the User field in the repository.
Vulnerability Filters
Plugin ID
Plugin Output
Severity
Displays vulnerabilities with the selected severity (Info, Low, Medium, High, Critical).
Date Filters
Vulnerability Last Observed
(Cumulative only)
This filter allows the user to see when the vulnerability was last observed.
Event Analysis
The Events display screen contains an aggregation of security events from a variety of sources including LCE, IDS/IPS,
and syslog servers. Events can be viewed in a list format with options similar to the Vulnerability interface. Clicking
through Analysis and Events displays a high-level view screen similar to the following:
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
59
SecurityCenter includes a Search bar above the results of the Events display screen. The Search bar can be used to
narrow down the scope of a set of events, and supports the use of keyword searches for active filters. In the example
above, a mix of collapsed and expanded events are seen. Selecting the Collapse Logs or Expand Logs option from the
top right will perform that action for all of the results en masse. By hovering over a particular event a + or - icon will be
displayed on the right side of the event to expand or collapse that one event.
A search for an IP address of 192.168.0.5 with associated text of window has been used to narrow down the results of a
Raw Syslog Events view. The text used to search is displayed in red within the results. If a specifier such as ip= or type=
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
60
is not used, the Search bar will use text= as the default search method and display all results that match the exact string
used in the search. If the text to search on contains a space, the text must be enclosed in quotes, such as PHP Warning.
In order to create the search, the search criteria may be entered in different ways. Manually typing in the search is the first
option. Once entered, clicking the check icon to the right of the search box will display the filtered results.
Another option to search the Raw Syslog Events is to highlight a term to search for in a currently displayed and expanded
log entry. In the above screen capture the search has been narrowed down to the text of IP address 192.168.20.240. That
IP address has been selected from within one of the expanded results. When a text string from the results has been
highlighted with a mouse, a magnifying glass icon is shown on the information line. When clicked, this provides one or
both options as described in the following table.
Table 14 Search Options
Option
Description
Search Events
Performs a text search against the currently filtered results and returns the more
narrowly filtered event results.
View IP Information
Filter History
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
61
Below the Active/Archived tabs is a listing of previously loaded filter options. Hovering the cursor over a previously
selected filter displays a pop-up window to the right that contains the filter parameters. Notice in the example screen
capture above, there are three white dots to the right of the highlighted filter, one for Type, one for Normalized Event
and one for Timeframe.
Click on the desired filter to change the view to use the previously selected filter. Click on Clear to remove all previously
loaded filters from the history panel.
Date Selection
Clicking on the date field directly below the analysis tool (in the example above, List of Events) opens up a dialog that
allows the user to specify a new timeframe for the event view. When the user selects Explicit, depicted as E on the
slider, as shown in the screen capture above, a checkmark and X icon are displayed to the right of the date selection.
Clicking the checkmark icon applies the specified timeframe. Clicking the X icon abandons the most recent changes that
were not applied using the checkmark icon and closes the time frame window.
If the slider is used, the user is presented with incremented date ranges from the Last 15 minutes to All, depicted as
A on the slider. In this example, Last 72 Hours is selected. Closing this dialog allows the event view to be navigated
and shows all events under the current filter that have been received in the last 72 hours. In addition, an Initial
Timeframe checkbox is made available. This checkbox allows users to set a default time range based on the slider
selection when navigating to the Raw Syslog page in the future.
Right-Click Functionality
Right-Click Options
Selecting and right-clicking on a particular event in the events screen gives the user additional options that are useful in
the content of the highlighted event. Available options include: Copy To Clipboard and Add To Scratch Pad. These
options are described in more detail in the table below:
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
62
Type
Description
Copy To Clipboard
Use this option to copy the displayed event information to your clipboard for reuse
elsewhere. For example, you could copy the event name to the clipboard and then
paste it into an email if so desired.
The Scratch Pad allows users to store the current drilldown value as a filter option.
For example, if the current view allows for an event drilldown, selecting an event with a
particular normalized event, right-clicking and choosing Add to Scratch Pad will add
that search to the Scratch Pad. This allows the user to quickly switch back and forth
between Scratch Pad items for rapid analysis.
Analysis Tool
A wide variety of analysis tools are available for comprehensive event analysis. Clicking on the current view (Type
Summary by default) displays an analysis tool:
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
63
Loading one of the analysis filters generates an event filter that may be reset at any time by clicking on the Clear link.
The table below contains detailed descriptions of all available analysis tools:
Table 16 Event Analysis Tools
Tool
Description
Type Summary
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
64
List of Events
This tool displays a line of data for each matching event. The line
includes many pieces of information such as time, event name,
number of correlated vulnerabilities and involved IP addresses and
sensor.
Two links of great use are available. First, if the IDS event
correlates with a particular systems vulnerabilities, clicking on the
number of vulnerabilities will switch the user to the cumulative
vulnerability display for that host. This is very useful to determine a
target systems profile.
Second, if an LCE is present, links are generated that can take the
user to a log analysis query based on the source or destination
addresses of the IDS event. This filter is applied to all searched
LCEs. These queries are available for the 30-minute window or 24hour window surrounding the IDS event. This is a very efficient way
to find an IDS event of interest and see if the target or the attacker
has generated any other system logs of interest.
Other links of interest in the List of Events view include time,
event name, and source/destination IP address Clicking on the
event name adds a filter to only display events matching that event
name. Finally, clicking on the source or destination IP address
loads a system information summary of data available for the IP
address in question.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
65
Sensor Summary
The Sensor Summary displays the unique event counts for any
query from unique sensor types.
In Log Analysis mode, the LCE attempts to learn any system
names of the remote devices through log analysis. Not all remote
log sources will have detectable sensor names.
Event Trend
This analysis tool displays an event trend area graph with total
events over the last 24 hours. Modify the filters for this graph to
display the desired event trend view.
Date Summary
Asset Summary
This tool can be used to see how certain types of activity, remote
attackers, or non-compliant events have occurred across different
asset groups.
Clicking on the Total count for the listed asset displays a Type
Summary page that shows the event type, total number of each
event, and a plot that displays the event occurrences over the
queried time period.
User Summary
This tool displays the matching unique event types and the number
of corresponding events for each user when user tracking is
enabled in LCE.
The unique event types are based on normalized logs such as
firewall, system, correlated, network, and IDS.
Clicking on any of the event counts under the Total column will
display a Type Summary of matching events.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
66
Port Summary
Protocol Summary
IP Summary
Class A Summary
Class B Summary
Class C Summary
Users can choose to view the original log message or IDS event for
full forensic analysis.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
67
Load Query
This option loads a predefined query and displays the current dataset against that query. Click on Load Query to display
a box with all available queries and their group name (if applicable) next to it. Entering text in the search box will narrow
the list to the matching criteria. After clicking on an individual query, the event view is changed to match that query view
for the current dataset.
Save Query
This option, available in the upper right-hand corner of the web interface, saves the current event view as a query for
reuse. If this link is clicked, a dialog similar to the one below is displayed:
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
68
Option
Description
Name
Query name
Tag
This option provides a logical grouping for created query objects. Tag names can be
reused as desired. This reduces lengthy lists of queries with no logical grouping.
Objects shared with new users will retain the tag specified by the creator.
Description
Visibility
Save as [Timeframe]
When the query is run subsequently, use the relative event time frame currently in use
rather than the explicit time frame in use. For example, the relative time frame ranges
is set to the last 72 hours. The explicit time frame is 11/5/2012 at 1pm through
11/8/2012 at 1pm. Checking this box will save the query as the last 72 hours from the
time it is selected. Leaving the box unchecked will save the query from 11/5/2012 at
1pm through 11/8/2012 at 1pm.
Save Asset
Event results can be saved to an asset list for later use by clicking on the Save Asset link in the upper right-hand side of
the screen.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
69
Option
Description
Name
Asset name
Tag
A logical grouping for created asset objects. Tag names can be reused as desired.
This reduces lengthy lists of assets with no logical grouping. Objects shared with new
users will retain the tag specified by the creator.
Description
Asset description
Visibility
User or Organizational. If User is specified, only the current user has access to the
saved query, otherwise, all users within the organization have query access.
Open Ticket
Ticket Options
Tickets are used within SecurityCenter to assist with the assessment and remediation of vulnerabilities and security
events. Use this option to open a ticket based on the current event view. Click on the Open Ticket link and complete the
relevant fields as described below:
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
70
Option
Description
Name
Ticket name
Description
Ticket description
Notes
Notes to be used within the ticket and read by the ticket assignee.
Assign To
Ticket assignee
Classification
More Options
Save Watchlist
A watchlist is an asset list that is used to maintain lists of IPs not in the users managed range of IP addresses. The
screen capture below demonstrates a sample watchlist configuration:
Watchlist Options
IPs from a watchlist can be filtered on regardless of your IP range configuration. This proves to be beneficial when
analyzing event activity originating outside of the users managed range. For example, if a block of IP addresses is a
known source of malicious activity, it could be added to a watchlist called malicious IPs and added to a custom query.
If Exclude Managed Ranges is selected, the watchlist will encompass the IPs within the current view, except those that
are part of the organizations managed ranges. Otherwise, the watchlist will encompass all IPs within the current view.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
71
Export as CSV
Event results can be exported to a comma-separated file for detailed analysis outside of SecurityCenter by clicking on the
More link and then the Export as CSV option.
If the record count (rows displayed) of any CSV export is greater than 1,000 records, a pop-up is displayed that prompts
for the name of the CSV report to be generated. When complete, the report can be downloaded from the Report Results
screen. For CSV exports of under 1,000 records, the browsers standard Save As dialog window is displayed.
Create Report
This option is used to create a report based on the existing event view.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
72
Event Filters
Clicking on Edit Filters displays a page similar to one available for searching vulnerability data:
Filter
Description
This drop-down is used to choose the analysis tool used by the filter. This is the same
as selecting the desired analysis tool from the Analysis -> Events dialog. These
tools are described in detail in the Analysis Tools section.
Active Filters
This field displays the existing filters and allows the user to selectively remove filters as
needed. In the example below, the Active Filters displayed are Timeframe, Type, and
Targeted IDS Events. Clicking the X next to any one of these filters will remove that
filter from the displayed events.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
73
Event Filters
Target Filters
Address
Specifies an IP address, range, or CIDR block to limit the displayed events. For
example, entering 192.168.10.0/24 limits any of the web tools to only show event data
from that network. Addresses can be entered on separate lines or comma separated.
Port
This filter is in two parts. First the type of filter can be specified to allow matching
vulnerabilities with the specified ports (=) or excluding ports (!=). The port filter may
specify a single port, comma separated list of ports, or range of ports (e.g., 8000-8080).
All host-based vulnerability checks are reported with a port of 0 (zero).
Protocol
Specify the protocol of the event (Any, TCP, UDP, ICMP, or Unknown).
Direction
Asset
Filter the event by asset list. Select an asset list from those available. To narrow down
the number of displayed asset lists, enter text to filter on in the search box.
Event Filters
Timeframe
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
74
Normalized Event
The Normalized Event is the name given to the event by the LCE after the LCE runs
its PRM and TASL scripts against it.
Detailed Event
This is the detailed event name given by the IDS vendor. For example, an event
received from a Snort sensor can have a detailed event name of DOUBLE DECODING
ATTACK, which means that HTTP_INSPECT 119:2:1 fired and was sent to the LCE.
Type
Clicking in this box generates a drop-down that allows one to select the event type
(e.g., error, lce, login, intrusion, etc.).
Sensor
Filter the events by sensor using the equal (=) or not equal (!=) operators.
User
This filter checkbox selects IDS events that have targeted systems and ports with
vulnerabilities likely to be exploited by the detected attack. This is determined by
comparing the hosts vulnerabilities (CVE, etc.) against those tied to the actual IDS
event.
Syslog Text
(Raw Syslog Events Analysis Tool) String to search for within the filtered event. When
using LCE server version 4.0.1 and newer, the text search is case-insensitive and
Boolean operators may be used. For example:
text="(drive AND serial) OR utilization"
This filter is case-sensitive when using LCE version 4.0.0 and earlier.
Advanced Filters
LCEs
Specify the LCEs to obtain events from. Use <CTRL> or <Shift> + click to select more
than one.
Repositories
Specify the Repositories to obtain events from. Use <CTRL> or <Shift> + click to
select more than one.
Source Address
Specifies an IP address or CIDR block to limit the displayed events based on source.
For example, entering 192.168.10.0/24 limits any of the web tools to only show event
data with source IPs in that block. Addresses can be comma separated.
Destination Address
Source Port
This filter is in two parts. First the type of filter can be specified to allow matching
events with the same ports (=) or different ports (!=). The port filter may specify a
single, comma separated list of ports or range of ports (e.g., 8000-8080).
Destination Port
This filter is in two parts. First the type of filter can be specified to allow matching
events with the same ports (=) or different ports (!=). The port filter may specify a
single, comma separated list of ports or range of ports (e.g., 8000-8080).
Source Asset
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
75
Destination Asset
Clicking on Reset View causes the display to return to the default screen.
Scanning
The Scans function of the SecurityCenter provides the ability to create, view, configure, control, and schedule Nessus
scans. Clicking on Scans under the Scanning tab displays a list of all available Nessus scans along with their
associated Policy Name/Plugin ID, Start Time, Status, Group/Owner, and Schedule:
Scans
Authorized users can create a scan by clicking on Add under the Scans tab or by copying an existing scan template.
Newly created scans are shared to everyone within the same user group when users have the appropriate permissions. A
menu selection similar to the screen capture below is displayed showing five page tabs: Basic, Policy and Credential,
Policy, Plugin Preferences, and Post Scan. While adding a new scan, if a required field is omitted, the user interface will
display the omitted field with a red border and not allow for the page submission to occur until a valid entry has been added.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
76
Basic Options
The table below describes options available on the Basic tab.
Table 21 Basic Scan Options
Parameter
Description
Name
The scan name will be associated with the scans results and may be any name or
phrase (e.g., SystemA, DMZ Scan, Daily Scan of the Web Farm, etc.).
Description
Schedule
The drop down menu provides the ability to schedule a scan for Now, Once, Daily,
Weekly, Monthly(Day), Monthly(Date), Template, or Dependent. The
Template selection provides the ability to create a scan template that may be
launched manually at any time. The Dependent selection enables the scan to be
scheduled after the completion of a scan selected from the displayed drop down menu.
Import Repository
Specifies the repository where the scan results will be imported. Select a repository to
receive IPv4 or IPv6 results appropriate to the scan being conducted.
When scanning one or more asset lists, the asset list must contain IPs in
the repository IP ranges or the following error is displayed: Entered IPs
and Assets are empty. Log in as the administrator user to view the
contents and associated repositories of an asset list.
Scan Targets
The scan can target one or more of a users Asset Lists or manually entered Targets.
IPv4 or IPv6 addresses or hostnames entered into the Targets box must be complete
IP addresses, network ranges, CIDR blocks, or DNS hostnames. The addresses or
hostnames entered into the Targets box will be merged with any selected asset lists,
preventing scanning of unauthorized targets.
Scanning both IPv4 and IPv6 addresses in the same scan is not
supported due to the ability to only select one Import Repository.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
77
The scan policy contains plugin settings and advanced directives used during the course of the Nessus scan. Within the
Scan Type section, two radio buttons are available, Policy and Plugin. If the Policy radio button is selected, the side
tabs for Policy and Plugin Preferences are grayed out. If the Plugin radio tab is selected, both options are available for
further configuration.
If Scan Zone is set to Selectable for the user, a drop-down box will be available to allow for the selection of the scan
zone to be used for the scan. If All Zones are selected, the Scan Zone that most closely matches the host or range of
hosts to be scanned will be selected from the zones available. When Scan Zone is set to forced, the Scan Zone box is
greyed out and is not able to be modified.
The Authentication section allows users to select pre-configured credential sets for authenticated scanning.
SecurityCenter supports the use of up to four Windows credential sets, four SNMP credential sets, a SSH credential set,
one Database credential set, and a Kerberos credential set per scan.
Policy Options
This tab is only available if a single plugin scan was selected in the Policy and Credential tab. Scan policies
are modified by navigating to Support -> Scan Policies.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
78
The table below contains a description of all available options on the Policy configuration page.
Table 22 Scan Options
Option
Description
Safe Checks
Silent Dependencies
If this option is checked, the list of dependencies is not included in the report. To
include the list of dependencies in the report, uncheck the box.
With this setting enabled, ports that are not enumerated by the port scan will not be
tested. For example, scanning ports 21, 22, and 23 will only test those ports and not
any other port.
The Port Scanners frame controls which methods of port scanning should be enabled for the scan:
Table 23 Port Scanners Options
Option
Description
TCP Scan
Use Nessus built-in TCP scanner to identify open TCP ports on the targets. This
scanner is optimized and has some self-tuning features.
On some platforms (e.g., Windows and Mac OS X), if the operating
system is causing serious performance issues using the TCP scanner,
Nessus will launch the SYN scanner.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
79
UDP Scan
This option engages Nessus built-in UDP scanner to identify open UDP ports on the
targets.
UDP is a stateless protocol, meaning that communication is not done
with handshake dialogues. UDP-based communication is not always
reliable, and because of the nature of UDP services and screening
devices, they are not always remotely detectable. Scans using the UDP
scanner will take significantly longer to complete.
SYN Scan
Use Nessus built-in SYN scanner to identify open TCP ports on the targets. SYN
scans are a popular method for conducting port scans and generally considered to be
a bit less intrusive than TCP scans. The scanner sends a SYN packet to the port, waits
for SYN-ACK reply and determines port state based on a reply, or lack of reply.
SNMP Scan
Direct Nessus to scan targets for a SNMP service. Nessus will guess relevant SNMP
settings during a scan. If the settings are provided by the user under Preferences,
this will allow Nessus to better test the remote host and produce more detailed audit
results. For example, there are many Cisco router checks that determine the
vulnerabilities present by examining the version of the returned SNMP string. This
information is necessary for these audits.
This option uses netstat to check for open ports from the local machine. It relies on
the netstat command being available via a SSH connection to the target. This scan
is intended for Unix-based systems and requires authentication credentials.
This option uses netstat to check for open ports from the local machine. It relies on
the netstat command being available via a WMI connection to the target. This scan
is intended for Windows-based systems and requires authentication credentials.
Ping Host
This option enables the pinging of remote hosts on multiple ports to determine if they
are alive.
The Port Scan Options frame directs the scanner to target a specific range of ports. The following values are allowed
for the Port Scan Range option:
Table 24 Values for Port Scan Options
Value
Description
default
Using the keyword default, Nessus will scan approximately 4,789 common ports
(found in the nessus-services file).
Custom List
A custom range of ports can be selected by using a comma delimited list of ports or
port ranges. For example, 21,23,25,80,110 or 1-1024,8080,9000-9200 are allowed.
Specifying 1-65535 will scan all ports.
The range specified for a port scan will be applied to both TCP and UDP scans.
The Performance frame provides two options that control how many scans will be launched. These options are perhaps
the most important when configuring a scan as they have the biggest impact on scan times and network activity.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
80
Option
Description
This setting limits the maximum number of checks a Nessus scanner will perform
against a single host at one time.
This setting limits the maximum number of hosts that a Nessus scanner will scan at
the same time. If the scan is using a zone with multiple scanners, each scanner will
accept up to the amount specified in the Max Hosts Per Scan option. For example, if
the Max Hosts Per Scan is set to 5 and there are five scanners per zone, each
scanner will accept five hosts to scan, allowing a total of 25 hosts to be scanned
between the five scanners.
This setting limits the length of time a scan is allowed to run. If a scan reaches this
limit, the unscanned targets are captured in a new rollover scan that can be run
manually or scheduled at a later time.
This setting limits the maximum number of TCP sessions established by any of the
active scanners while scanning a single host.
Plugin Preferences
The Plugin Preferences tab includes means for granular control over scan settings. Selecting an item from the dropdown menu will display further configuration items for the selected category. Note that this is a dynamic list of
configuration options that is dependent on the plugin feed, audit policies, and additional functionality that the connected
Nessus scanner has access to. This list may also change as plugins are added or modified.
The Antivirus Software Check (plugin 16193) option determines the delay in the number of days of reporting the
software as being outdated. The valid values are between 0 (no delay, default) and 7.
The Cisco IOS Compliance Checks (plugin 46689) options determine the Cisco IOS configuration file to audit. The
available options are Saved, Running, or Startup. Only one type of configuration file may be selected.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
81
If a secure method of performing credentialed checks is not available, users can force Nessus to attempt to perform
checks over insecure protocols by configuring the Cleartext protocols settings (plugin 21744) drop-down menu item.
The cleartext protocols supported for this option are telnet, rsh, and rexec. The unsafe! warning serves as a reminder
that the information is being sent across the network in an unencrypted manner.
The Database settings (plugin 33815) is not used in SecurityCenter 4.8 and newer. Database credentials and settings
are now a part of the Credentials setting under the Support tab.
Dell Force10 FTOS Compliance Checks (plugin 72461) allows for assigning up to 5 compliance policy files to check the
configuration file uploaded after exporting from a Dell Force10 FTOS device.
Do not scan fragile devices (plugin 22481) instructs the Nessus scanner to scan network printers or Novell Netware
hosts if unselected. Since both of these technologies are more prone to denial of service conditions, Nessus can skip
scanning them once identified. This is particularly recommended if scanning is performed on production networks.
Global variable settings (plugin 12288) contains a wide variety of configuration options for the Nessus server.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
82
Option
Description
Attempts to map each open port with the service that is running on that port. Note that in
some rare cases, this might disrupt some services and cause unforeseen side effects.
Used to prevent account lockouts if the password policy is set to lock out accounts
after several invalid attempts.
Activates CGI checking. Disabling this option will greatly speed up the audit of a local
network.
Network type
Specifies if the network type uses public routable IPs, private non-internet routable IPs
or a mix of these. Select Mixed if using RFC 1918 addresses and there are multiple
routers within the network.
Enable experimental
scripts
Causes plugins that are considered experimental to be used in the scan. Do not
enable this setting while scanning a production network.
Tenable does not release scripts flagged as experimental in either
plugin feed.
Causes various plugins to work harder. For example, when looking through SMB file
shares, a plugin can analyze 3 levels deep instead of 1. This could cause much more
network traffic and analysis in some cases. Note that by being more thorough, the
scan will be more intrusive and is more likely to disrupt the network, while potentially
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
83
Some plugins will try to capture output during a scan to prove that a vulnerability
exists. The Normal setting (default) uses the plugin settings to determine how much
output to capture. The Quiet setting disables capturing of most data. The Verbose
setting removes most of the high limits of the data capture settings and reports the
entire contents of the file.
Report paranoia
In some cases, Nessus cannot remotely determine whether a flaw is present or not. If
the report paranoia is set to Paranoid (more false alarms) then a flaw will be
reported every time, even when there is a doubt about the remote host being affected.
Conversely, a paranoia setting of Avoid false alarm will cause Nessus to not report
any flaw whenever there is a hint of uncertainty about the remote host. The default
option (Normal) is a middle ground between these two settings.
HTTP User-Agent
Specifies which type of web browser Nessus will impersonate while scanning.
Allows Nessus to use a client-side SSL certificate for communicating with a remote host.
SSL CA to trust
Specifies a local SSL key to use for communicating with the remote host.
Hosts File Whitelisted Entries (plugin 73980) allows entries in a customized hosts file to be upload and whitelisted
against plugins that check for abnormalities in the hosts file on scanned systems.
HTTP cookies import (plugin 42893) facilitates web application testing. Nessus can import HTTP cookies from another
piece of software (web browser, web proxy, etc.) with these settings. A cookie file can be uploaded so that Nessus uses
the cookies when attempting to access a web application. The cookie file must be in Netscape format.
The HTTP login page (plugin 11149) settings provide control over where authenticated testing of a custom web-based
application begins. See this whitepaper for more details about configuring web applications that require authentication.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
84
Option
Description
Login page
Login form
The action parameter for the form method. For example, the login form for <form
method="POST" name="auth_form" action="/login.php"> would be /login.php.
This option is not required if the Automated login page search option
specified below is used.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
85
Gives Nessus the option to parse the login page for form options and attempt to login
based on detected fields. This option works in conjunction with the HTTP cookies
import (plugin 42893) to simplify form-based authentication.
If more than one form is available on a web page (uncommon), use the
manual login form parameters specified above instead.
Re-authenticate delay
(seconds)
The time delay between authentication attempts. This is useful to avoid triggering brute
force lockout mechanisms.
Check authentication on
page
The URL of a protected web page that requires authentication, to better assist Nessus
in determining authentication status.
If a 30x redirect code is received from a web server, this directs Nessus to follow the
link provided or not.
Authenticated regex
A regex pattern to look for on the login page. Simply receiving a 200 response code is
not always sufficient to determine session state. Nessus can attempt to match a given
string such as Authentication successful!
A regex pattern to look for on the login page, that if found, tells Nessus authentication
was not successful (e.g., Authentication failed!).
Rather than search the body of a response, Nessus can search the HTTP response
headers for a given regex pattern to better determine authentication state.
The regex searches are case sensitive by default. This instructs Nessus to ignore case.
If authentication fails to the web page, further actions by the plugin will be halted.
Huawei VRP Compliance Checks (plugin 73157) allows for assigning up to 5 compliance policy files to check the
configuration file uploaded after exporting from a Huawei VRP device.
IBM iSeries Credentials (plugin 57861) are used to specify the credentials for an IBM iSeries system to be tested.
The ICCP/COTP TSAP Addressing (plugin 23812) menu deals specifically with SCADA checks. It determines a Connection
Oriented Transport Protocol (COTP) Transport Service Access Points (TSAP) value on an Inter-Control Center
Communications Protocol (ICCP) server by trying possible values. The start and stop values are set to 8 by default.
LDAP Domain Admins Group Membership Enumeration (plugin 58038) allows for the entry of an LDAP user and
password to be used to attempt to enumerate the members of the Domain Admins group on an LDAP server search
base, which is identified using the LDAP Crafted Search Request Server Information Disclosure plugin (25701). The Max
Results setting limits the enumeration of users to the number entered (1,000 by default).
Login configurations (plugin 10870) allows the Nessus scanner to use credentials when testing HTTP, NNTP, FTP,
POP2, POP3 or IMAP. By supplying credentials, Nessus may have the ability to do more extensive checks to determine
vulnerabilities. HTTP credentials supplied here will be used for Basic and Digest authentication only. For configuring
credentials for a custom web application, use the HTTP login page pull-down menu. Two checkboxes are available on
this page, Never send SMB credentials in clear text and Only use NTLMv2. Both of these settings affect the security of
credentials sent out during Nessus scans.
Using cleartext credentials in any fashion is not recommended! If the credentials are sent remotely, via a
Nessus scan or e-mailing a policy to another administrator, the credentials could be intercepted by anyone
with access to the network. Use encrypted authentication mechanisms whenever possible.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
86
Malicious Process Detection (plugin 59275) allows you to upload a custom list of MD5 hashes to identify running
processes on scanned hosts when plugin 65548 is enabled. The format of the file is one MD5 hash per line without any
surrounding whitespace. Optionally a description may be added by putting a comma after the hash and the text of the
description to be displayed in the scan results. Lines beginning with a # symbol are treated as comments and are ignored.
All other items are considered invalid.
# hashes for the foobar malware
11b95ccc1427be5f6c7f0e547bde34e6,foobar malware 1.0
333459378f2d53d861ed2819b8b298af,foobar malware 1.1
f80a405f55c2cd651e58a8fc59550830,foobar malware 1.2
# example.exe
4f8793a9c7560af2cb48f062cd7879af
The Modbus/TCP Coil Access (plugin 23817) drop-down menu item is dynamically generated by the SCADA plugins.
Modbus uses a function code of 1 to read coils in a Modbus slave. Coils represent binary output settings and are
typically mapped to actuators. The ability to read coils may help an attacker profile a system and identify ranges of
registers to alter via a write coil message. The defaults for this are 0 for the Start reg and 16 for the End reg.
Nessus SYN scanner (plugin 11219) and Nessus TCP scanner (plugin 10335) options allow you to better tune the
native SYN and TCP scanner to detect the presence of a firewall.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
87
Value
Description
Automatic (normal)
This option can help identify if a firewall is located between the scanner and the target
(default).
Disabled (softer)
Disables the ability to monitor how often resets are set and to determine if there is a
limitation configured by a downstream network device.
Will attempt to run plugins even if the port appears to be closed. It is recommended
that this option not be used on a production network.
Oracle settings (plugin 22076) allows the user to enter the Oracle database SID to specify which database to test. In
addition, Test default accounts (slow) enables the Nessus scan to probe for default accounts within the remote database
for vulnerabilities.
Palo Alto Networks PAN-OS Settings (plugin 64286) allows you to set the Username and Password for logging into a
Palo Alto device. Additionally the Port may be customized and the ability to verify the SSL certificate presented.
Patch Management: IBM Tivoli Endpoint Manager Server Settings (plugin 62558) allows the user to enter credentials
for an IBM Tivoli Endpoint Manager Server.
Patch Management: Red Hat Satellite Server Settings (plugin 57063) allows users to enter credentials for Red Hat
Satellite servers. When a Red Hat host is scanned without local credentials, the Satellite server will be queried for and
report the current patch status for the scanned host.
Patch Management: SCCM Server Settings (plugin 57029) allows users to enter credentials for a SCCM server. When
a machine is scanned without local credentials, the SCCM server will be queried for and report the current patch status for
the scanned host.
Patch Management: VMware Go Server Settings (plugin 57026) allows users to enter credentials for a VMware Go
Server. When a machine is scanned without local credentials, the VMware Go server will be queried for and report the
current patch status for the scanned host.
Patch Management: WSUS Server Settings (plugin 57031) allows users to enter credentials for a WSUS server. When
a machine is scanned without local credentials, the WSUS server will be queried for and report the current patch status for
the scanned host.
Patch Report (plugin 66334) allows the user to display superseded patches in the scan report when available. This
setting is turned on by default.
When the preference Display the superseded patches in the report for plugin 66334 is disabled,
vulnerabilities for superseded patches will not appear in SecurityCenter scan results. Disabling this preference
could result in an appearance of mitigated vulnerabilities due to the consolidation of patches as reported by
SecurityCenter.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
88
Ping the remote host (plugin 10180) options allow for granular control over Nessus ability to ping hosts during discovery
scanning. This can be done via ARP ping, TCP ping, ICMP ping or applicative UDP ping.
Option
Description
Specifies the list of ports that will be checked via TCP ping. If you are not sure of the
ports, leave this setting to the default of built-in.
Do an ARP ping
Do a TCP ping
Do an ICMP ping
Allows you to specify the number of attempts to try to ping the remote host. The default
is set to 2.
Perform a UDP ping against specific UDP-based applications including DNS (port 53),
RPC (port 111), NTP (port 123), and RIP (port 520).
If this option is selected, hosts that did not reply to the ping request will be included in
the security report as dead hosts.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
89
Select this option to specifically report on the ability to successfully ping a remote host.
This option allows you to include or exclude the local Nessus host from the scan. This
is used when the Nessus host falls within the target network range for the scan.
By default, when Nessus pings a remote IP and receives a reply, it performs extra
checks to make sure that it is not a transparent proxy or a load balancer that would
return noise but no result (some devices answer to every port 1-65535 but there is no
service behind). Such checks can take some time, especially if the remote host is
firewalled. If the fast network discovery option is enabled, Nessus will not perform
these checks.
When a ping is sent to a host that is down, its gateway may return an ICMP unreach
message. When enabled, this option will consider this to mean the host is dead. This is
to help speed up discovery on some networks.
Note that some firewalls and packet filters use this same behavior for hosts that are up
but are connecting to a port or protocol that is filtered. With this option enabled, this will
lead to the scan considering the host is down when it is indeed up.
Port scanner settings (plugin 33812) provide two options for further controlling port scanning activity.
Table 30 Port Scanner Settings
Option
Description
If a local port enumerator (e.g., WMI or netstat) finds a port, Nessus will also verify it is
open remotely. This helps determine if some form of access control is being used
(e.g., TCP wrappers, firewall).
SMB Registry: Start the Registry Service during the scan (plugin 35703) enables the service to facilitate some of the
scanning requirements for machines that may not have the Remote Registry service running all the time. The
administrative shares may be enabled during the scan if they are not enabled at the beginning of the scan.
Under the SMB Scope (plugin 10917) menu, if the option Request information about the domain is set, then domain
users will be queried instead of local users.
SMB Use Domain SID to Enumerate Users (plugin 10399) specifies the SID range to use to perform a reverse lookup
on usernames on the domain. The default setting (1000 to 1200) is recommended for most scans.
SMB Use Host SID to Enumerate Local Users (plugin 10860) specifies the SID range to use to perform a reverse
lookup on local usernames. The default setting (1000 to 1200) is recommended for most scans.
SMTP settings (plugin 11038) specify options for SMTP (Simple Mail Transport Protocol) tests that run on all devices
within the scanned domain that are running SMTP services. Nessus will attempt to relay messages through the device to
the specified Third party domain. If the message sent to the Third party domain is rejected by the address specified
in the To address field, the spam attempt failed. If the message is accepted, then the SMTP server was successfully
used to relay spam.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
90
Option
Description
Nessus will attempt to send spam through each SMTP device to the address listed in
this field. This third party domain address must be outside the range of the site being
scanned or the site performing the scan. Otherwise, the test might be aborted by the
SMTP server.
From address
The test messages sent to the SMTP server(s) will appear as if they originated from
the address specified in this field.
To address
Nessus will attempt to send messages addressed to the mail recipient listed in this
field. The postmaster address is the default value since it is a valid address on most
mail servers.
SNMP settings (plugin 19762) allow you to configure Nessus to connect and authenticate to the SNMP service of the
target. During the course of scanning, Nessus will make some attempts to guess the community string and use it for
subsequent tests. If Nessus is unable to guess the community string and/or password, it may not perform a full audit
against the service.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
91
Option
Description
UDP port
Direct Nessus to scan a different port should SNMP be running on a port other than 161.
SNMPv3 authentication
password
SNMPv3 authentication
algorithm
Select MD5 or SHA1 based on which algorithm the remote service supports.
SSH settings (plugin 14273) Users can select SSH settings from the drop-down menu and enter a known_hosts
file for scanning Unix systems. There is also a field for entering the Preferred SSH Port. By default, Nessus will use the
standard TCP port 22 for credentialed Unix scans; however, this setting enables the user to specify a non-standard port
for SSH login attempts.
Service Detection (plugin 22964) controls how Nessus will test SSL based services; known SSL ports (e.g., 443), all
ports or none. Testing for SSL capability on all ports may be disruptive for the tested host.
Unix File Contents Compliance Checks (plugin 72095) audits Unix systems for non-compliant content utilizing a
compliance check.
VMware SOAP API Settings (plugin 57395) provides Nessus with the credentials required to authenticate to VMware
ESX, ESXi, and vSphere Hypervisor management systems via their own SOAP API, as SSH access has been
deprecated. This API is intended for auditing vSphere 4.x / 5.x, ESXi, and ESX hosts, not the virtual machines running on
the hosts. This authentication method can be used to perform credentialed scans or perform compliance audits.
VMware vCenter SOAP API Settings (plugin 63060) provides Nessus with the credentials required to authenticate to
VMware vCenter management systems via their own SOAP API. The API is intended for auditing vCenter, not the virtual
machines running on the hosts. This authentication method can be used to perform credentialed scans or perform
compliance audits.
Wake-on-LAN (plugin 52616) controls which hosts to send WOL magic packets to before performing a scan and how
long to wait (in minutes) for the systems to boot. The list of MAC addresses for WOL is entered using an uploaded text file
with one host MAC address per line.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
92
For example:
00:11:22:33:44:55
aa:bb:cc:dd:ee:ff
Web Application Tests Settings (plugin 39471) tests the arguments of the remote CGIs (Common Gateway Interface)
discovered in the web mirroring process by attempting to pass common CGI programming errors such as cross-site
scripting, remote file inclusion, command execution, traversal attacks or SQL injection. Enable this option by selecting the
Enable web applications tests checkbox.
These tests are not intended to target web applications implementing client-side technologies such as AJAX
or Flash.
The following web application related plugins depend on plugin 39471:
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
93
The screen capture below is the Web Application Tests Settings input page:
Option
Description
This check box enables web application tests and causes the settings below to be
evaluated during the test.
This option manages the amount of time in minutes spent per NASL script performing
web application tests. These NASL scripts are listed above. At the time of this writing,
there are 25 web application test NASLs. The run time of each script varies widely,
however the following generic formula applies to the Maximum_run_time:
scan_time = (num_scripts/max_checks)*Maximum_run_time
For example:
(25/5) * 60 = 300 minutes
This option defaults to 60 minutes and applies to all ports and CGIs for a given web
site.
By default, the Nessus web application tests will only use GET requests, unless this
option is enabled. Generally, more complex applications use the POST method when
a user submits data to the application. This setting provides more thorough testing, but
may considerably increase the time required. When selected, Nessus will test each
script/variable with both GET and POST requests.
Combinations of
arguments values
This option manages the combination of argument values used in the HTTP requests.
This drop-down has five options:
one value This tests one parameter at a time with an attack string, without trying
non-attack variations for additional parameters. For example, Nessus would attempt
/test.php?arg1=XSS&b=1&c=1 where b and c allow other values, without testing
each combination. This is the quickest method of testing with the smallest result set
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
94
generated.
some pairs Like all pairs testing, this will try to test a representative data set based
on the All-pairs method. However, for each parameter discovered, Nessus will only
test using a maximum of three valid input variables.
all pairs (slower but efficient) This form of testing is slightly slower but more
efficient than the one value test. While testing multiple parameters, it will test an
attack string, variations for a single variable and then use the first value for all other
variables. For example, Nessus would attempt /test.php?a=XSS&b=1&c=1&d=1
and then cycle through the variables so that one is given the attack string, one is
cycled through all possible values (as discovered during the mirror process) and any
other variables are given the first value. In this case, Nessus would never test for
/test.php?a=XSS&b=3&c=3&d=3 when the first value of each variable is 1.
some combinations Like all combinations testing, this will perform tests using a
combination of attack strings and valid input. However, for each parameter discovered,
Nessus will only test using a maximum of three valid input variables.
all combinations (extremely slow) This method of testing will do a fully exhaustive
test of all possible combinations of attack strings with valid input to variables. Where
All-pairs testing seeks to create a smaller data set as a tradeoff for speed, all
combinations makes no compromise on time and uses a complete data set of tests.
This testing method may take a long time to complete.
HTTP Parameter Pollution
When performing web application tests, attempt to bypass any filtering mechanisms by
injecting content into a variable while supplying the same variable with valid content as
well. For example, a normal SQL injection test may look like
/target.cgi?a='&b=2. With HTTP Parameter Pollution (HPP) enabled, the
request may look like /target.cgi?a='&a=1&b=2.
This option determines when a new flaw is targeted. The drop-down has four options:
per CGI (default) As soon as a flaw is found on a CGI by a script, Nessus switches
to the next known CGI on the same server, or if there is no other CGI, to the next
port/server.
per port (quicker) As soon as a flaw is found on a web server by a script, Nessus
stops and switches to another web server on a different port. This applies at the script
level; finding an XSS flaw will not disable searching for SQL injection or header
injection, but you will have at most one report for each type on a given port.
per parameter (slow) As soon as one flaw is found in a parameter of a CGI, Nessus
stops and switches to the next parameter of the same script.
look for all flaws (slower) Perform extensive tests regardless of flaws found. This
option can take a long time and is not recommend in most cases.
Embedded web servers are often static and contain no customizable CGI scripts. In
addition, embedded web servers may be prone to crash or become non-responsive
when scanned. Tenable recommends scanning embedded web servers separately
from other web servers using this option.
During Remote File Inclusion (RFI) testing, this option specifies a file on a remote host
to use for tests. By default, Nessus will use a safe file hosted on Tenables web server
for RFI testing. If the scanner cannot reach the Internet, using an internally hosted file
is recommended for more accurate RFI testing.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
95
Web mirroring (plugin 10662) sets configuration parameters for Nessus native web server content mirroring utility. Nessus
will mirror web content to better analyze the contents for vulnerabilities and help minimize the impact on the server.
Option
Description
Maximum depth
Limit the number of links Nessus will follow for each start page.
Start page
The URL of the first page that will be tested. If multiple pages are required, use a colon
delimiter to separate them (e.g., /:/php4:/base).
Enable exclusion of portions of the web site from being crawled. For example, to
exclude the /manual directory and all Perl CGI, set this field to:
(^/manual)|(\.pl(\?.*)?$).
Note that in the example above, the period (.) in front of pl is escaped
out with a backslash to prevent it from being interpreted as a regex
metacharacter and not as a literal period.
If this checkbox is selected, Nessus will follow dynamic links and may exceed the other
Web mirroring parameters.
When all of the options have been configured as desired, click Next to progress to the post scan options.
Post Scan
These options determine what will occur immediately after the scan has completed. The table below describes the post
scan options available to users:
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
96
Option
Description
This option generates an email to the user launching the scan as soon as the scan is
launched.
This option generates an email to the user launching the scan after the scan has
completed.
This option removes vulnerabilities from the scanned host that have been inactive for
the specified period. Use the drop-down to select the time frame ranging from Now to
360 days. This option is useful in cases where hosts may have been removed from the
network and should not appear on the vulnerability report.
This option uses the DNS name, NetBIOS name, and MAC address (if known), in that
order, of the computer to track it when the IP address of the computer may have
changed. Once a match has been made, SecurityCenter will not search further for
matches. For example, if a DNS name is not matched, but a NetBIOS name is, the
MAC address will not be checked. Networks using DHCP require that this option be
set to properly track hosts.
This option treats new DNS entries for an IP address as a virtual host as opposed to a
DNS name update. When selected, this option will result in two DNS name/IP address
entries in the IP Summary analysis tool if a new DNS name is found for an IP address.
If this option is not selected and a new DNS name is found for an IP address,
vulnerability data for the two DNS names will be merged into the single IP address
entry in the IP Summary analysis tool.
Scan Recovery
Scan Timeout Action
Provides a drop-down selection of three options in the event a scan is not completed.
Import Results With Rollover is the default option, and will import the results from the
scan into the database and create a rollover scan that may be launched at a later time
to complete the scan. Import Current Results will import the results of the current
scan and discard the information for the unscanned hosts. Discard will not import any
of the results obtained by the scan to the database.
Rollover Option
When the Scan Timeout Action is set to Import results with Rollover, this option
determines through a drop-down menu how to handle the rollover scan. The rollover
scan may be created as a template to launch manually or scheduled at a specific time.
The second option is to configure the rollover scan to launch the next day at the same
start time as the just completed scan.
Auto-Run Reports
Auto-Run Reports
This field provides a list of report templates available to the user. Selecting the
checkbox next to one or more reports will launch that report once the scan has
completed. Additionally, the report generated may be based on the current scans
results or the results in the Cumulative database.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
97
In a case where report results are desired based on both the current scan
and the cumulative database, simply make a copy of the report from the
reports page, and select both reports and the appropriate desired results.
Scan Progress
On the Scans page, selecting a scan while in progress will allow the Detail button to be selected. The Detailed Scan
Progress screen is then displayed allowing the scan progress to be monitored as it occurs. The available information is
the name of the scan, the status, the scan progress bar, and the scanner summary.
The completed hosts are colored in green and the hosts currently being scanned are colored in blue. The Scan Progress
bar shows the number of hosts completed, in progress, and yet to be scanned in grey. The senor summary lists the
Nessus scanners being used in the scan, the number of completed and in-progress hosts. The boxes are dynamically
sized and when there are too many hosts scanned/being scanned will display an appropriate message.
Scan Results
Clicking on Scan Results under the Scanning tab displays the status of completed scans. Results are displayed in a
list view with the ability to drill down into individual scan details. If a scan is launched on behalf of another user, the scan
results show in the list of the other user. An example screen capture of this page is shown below:
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
98
Filters are available at the top of the screen to allow the user to view only desired scan results. Filter parameters include
the Name, Owner (by username, group, or all), Status, and Finish Time. To return to the original scan result view,
click on the Reset button to the right of the filter options.
The results of individual scans are viewable by double-clicking on the desired scan or highlighting the scan and using the
Browse button. This option displays a subset of the Analysis vulnerability data covered by the selected scan. In
addition, Nessus scans performed from other systems can be uploaded to SecurityCenter using the Upload Nessus
Results command button. The scan results can be either raw .nessus or compressed (.zip) with one .nessus file per
archive before uploading. This allows for scan results from scans run in remote locations without network connectivity to
be imported into SecurityCenter. If uploads greater than 500MB are required, upload_max_filesize in
/opt/sc4/support/etc/php.ini must be modified to accommodate the larger uploads.
Nessus v2 scan results with hostnames have the hostname converted during import and display both the IP
address and hostname. IPv6 addresses are only contained in Nessus v2 files.
The Share button is used to share a selected report result with other users who do not have access to it by default.
Selecting a Group from the drop-down list displays a list of users from that Group. One or more users may be selected
from that list. Also email addresses may be entered into the Email Addresses field to have a copy of the report sent to a
user(s) outside of the SecurityCenter environment.
The Download button may be used to download the results of the selected scan. On a standard scan, a Nessus results
file may be downloaded. If the scan contains SCAP results, there is an additional option to download the SCAP results.
The Import button is used for manually importing scans that are listed in the scan results screen. This is useful for cases
where a scan may have not fully imported after it completed. For example, if a scan was blocked because it would have
exceeded the licensed IP count, after increasing the IP count, the import option could be used to import the scan results
previously not imported.
Selecting the Report button will allow an on-demand report to be created based on the results of the selected scan.
After selecting a scan result from the list and clicking the button, a window opens with a report template selection box and
a space for a report name and description. This will launch a report to be run immediately. The report progress may be
seen in the Reports screen, and the completed result may be obtained from the Report Results screen when completed.
Scan result details are available using the Detail button or by right-clicking on the scan and selecting Detail Scan
Result. For example, if a scan fails and more information is required, click on the details to find a more complete
summary of the root cause.
Finally, scans may be removed from SecurityCenter using the Delete button. For more information about navigating this
interface, refer to the Analysis Tools section of this document.
Blackout Windows
Currently running scans are stopped at the beginning of the blackout window period.
The blackout window in SecurityCenter specifies a timeframe where new scans are prohibited from launching. This
prevents remediation or ad-hoc scans from being performed during timeframes when they are not desired, such as
production hours.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
99
During a blackout window, the Scans window indicates the active window in red in the upper left-hand corner and no
new scans can be run during this time:
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
100
To see all available blackout windows and their current status, click the Blackout Window box and a dialog similar to the
one below is displayed:
Alternatively, click on Scans and then Blackout Windows to see the current status of or manage existing blackout
windows. When the system is no longer in a blackout window condition, the box changes back to indicate the inactive state:
Blackout windows are organizational and will affect all scans in the creating users organization. Only users with the
Manage Blackout Windows permission can perform blackout window additions.
To create a blackout window, click on Scanning, Blackout Windows and then Add.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
101
Next, enter in the desired name and description. Make sure Enabled is checked and enter in the desired schedule and
blackout time range and then click Submit. The next time that date/time window occurs, no new scans will be permitted.
To disable a blackout window without actually removing it, click Edit to modify the desired window and deselect
Enabled. Click Submit to apply the changes. These blackout windows will show with a state of Disabled in the
blackout window display list.
Click Detail to see existing blackout window details and click Delete to remove any blackout windows that are no
longer required for the Organization.
Reporting
Tenable provides extremely flexible and simplified reporting through an assortment of report templates and user-friendly
report creation interface. Quick reporting options are also available while browsing data by clicking on the More option in
the upper right-hand corner of the screen and selecting Create Report. Supported report types include the well-known
PDF, RTF, and CSV standards for a high level of compatibility and ease of use. For some specialized needs, additional
DISA ASR, DISA ARF, and CyberScope reporting options are available. These specialized reporting types are enabled or
disabled by an admin user of the SecurityCenter. Reports can be scheduled and automatically emailed, shared to one or
more specified SecurityCenter users and/or published to one or more sites on completion. Reports can be copied and
reused as required. When configuring a scan, an existing report template can also be set to run on completion.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
102
Reports
To see a list of available reports, click on Reporting and then Reports.
Reports Listing
When creating a new report, the first step is to click the Add button. A window opens and lists high-level categories for
available report templates from the SecurityCenter feed. Each category is represented by a name and description and
lists the number of templates available in the category.
From the Add Report screen, the templates may be searched by keyword in the Search Template field across all the
categories or by clicking the high-level category name. Selecting a category such as Monitoring displays a list of the
report templates and a list of tags that each of the available reports belongs to. Selecting a tag will further narrow the list
of templates and list of tags to only those applicable to the prior selection. The remaining tags will become a lighter shade
of blue. At any time in the search, the Search Templates text entry may be used to filter on keywords. Selecting any of
the report templates will provide a screen with information about the report and a selectable list of chapters to disable as
desired before adding the template.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
103
Once a report template is added to the list of reports, it may be modified from the Edit Report screen to customize the
report. The reports are created as a template report and may be scheduled as desired.
If an existing template does not satisfy the need, a custom report may be created. From the initial Add Report screen
select Create Custom Report at the bottom. The screen captures below show each page of the Create Custom
Report dialog:
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
104
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
105
These tabs allow the user to configure, define and schedule custom vulnerability and event reports. The tables below
describe available reporting options.
Table 36 Report Options
Option
Description
General
Name
Description
Type
PDF, RTF, and CSV. These three types are the most commonly used formats.
DISA ASR, DISA ARF, and CyberScope. These three specialized reporting types are
enabled or disabled by an admin user of the SecurityCenter.
Available options depend on the report type chosen. Many of the options
listed below are not available for reports other than PDF.
Report paper type/orientation. Available report types are selected from the drop-down
shown in the image below and affect the reports printability.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
106
Determines how often the report will be run. Options are Template, Now, Once, Daily,
Weekly, or Monthly (Day or Date). The schedule may be altered by editing the report.
Include a cover page in the report. A sample cover page is displayed below:
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
107
Choose the logo to display on the cover page (lower right-hand corner).
Add a Confidential or other custom uploaded watermark to each page of the report.
Protect the PDF with a password. This password must be used to open the report and
view its contents. For more information about this encryption mechanism, please refer
to the following URL: http://xmlgraphics.apache.org/fop/0.95/pdfencryption.html.
When creating a report, this drop-down offers a selection of Benchmark, IAVM, CVE,
or Plugin ID to be included.
This drop-down determines the format (Summary or Detail) of the DISA ASR report.
When enabled, allows for the inclusion of a DISA ARF attribute set for the report.
Benchmarks
Benchmarks are generated after a scan using certain audit files that have been
successfully run against at least one target system.
Definition
To determine what data will show up in your report, browse to the desired data view using the Analysis
Tool and locate the desired data set. Save the data set as a query and then select the query as a data
source for your report element (chart, table, etc.).
The definition will appear differently for different report types.
CSV reports will offer a drop-down to define a data type of Vulnerability, Event, Alert, Ticket, or User, and the ability to
define an appropriate filter set or to use a predefined query. A selection to define the columns and number of results to
appear in the report is then available for configuration.
DISA ARF, DISA ASR, and CyberScope reports offer a Vulnerability data filter or predefined Query selection from
which the report may be defined.
When PDF and RTF reports are selected, this section allows the user to define report elements such as charts, tables and
chapters along with their underlying data sources. Each element described below can be used more than once to create
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
108
multifunction reports with great flexibility. A sample definition section for PDF and RTF reports is displayed below:
Click the chapter button to add a chapter element to the report. A chapter is used to
group elements by arbitrary characteristics such as compliance benchmark, repository,
plugin type, etc.
The chapter level filter is only a means of specifying a default query that
is used to populate any new elements added to the report when building
the report initially. It is not saved or intended to be used to make global
changes to its sub-elements.
Templates provide predefined report configurations based on known standards and are
a good way to become familiar with SecurityCenter reporting. Click the template button
to add a predefined template to the report. More than one template can be used in each
report. The screen capture below shows the initial category view of available reports.
The templates provide reports based on SANS CAG, PCI DSS, CIS, FISMA, OWASP,
HIPAA, and generic security best practices. A detailed description of the report source
and parameters is displayed in the Description field when a particular template is
selected. Once selected for the report, the template objects may be edited for the
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
109
Click the group button to add a group element to the report. Grouping will attempt to
keep associated elements on the same page, but does not affect the content of the
report.
Click to add an iterator to the report. Iterators are grouping elements that determine
the field a report is grouped by. For example, if an Iterator Type of Port is chosen
for a vulnerability report, the report is displayed with vulnerability data grouped by
detected ports.
To use an iterator, click the iterator button. When adding elements to the report, the
iterator may be selected for the location defined in the element. The resulting iterator
grouping will look similar to the screen capture below:
Notice that the count is of medium vulnerabilities (the filtered field) grouped by TCP
port (the iterator). In the example below, the same vulnerability filter is chosen, with an
iterator of IP Address using an IPv6 address. This groups vulnerabilities based on IP
address.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
110
IP Iterator
If an iterator is not selected, the hosts and vulnerabilities are listed in the report
individually.
Table (PDF and RTF)
Click to add a table element to the report (max results displayed: 999).
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
111
The underlying data set has a big effect on the report display. The default view for most
reports is host-centric and SecurityCenter presents the user with the ability to choose a
vulnerability-centric report (a listing of vulnerabilities with all associated hosts).
Click to add a paragraph element to the report. A paragraph is simply descriptive text
that can be inserted anywhere into the report. Use this option to describe table
elements or report output for the viewer.
Click to add a Matrix chart to the report. Matrix charts have a variety of useful methods
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
112
Click to add a pie chart element to the report. A sample pie chart is displayed below:
Click to add a bar chart element to the report. A sample bar chart is displayed below:
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
113
Click to add an area chart element to the report. A sample area chart is displayed below:
Area charts are defined by time (x-axis) and series data (y-axis). When selecting the
time, available options include Relative time and Absolute time. One or more series
data elements can be chosen and displayed as a stackable view for easy comparison.
Line Chart (PDF and RTF)
Click to add a line chart element to the report. A sample line chart is displayed below:
Line charts are defined by time (x-axis) and series data (y-axis). When selecting the
time, available options include Relative time and Absolute time. One or more series
data elements can be chosen and displayed as discrete lines for easy comparison.
Distribution
Email on Completion
When a report has run, an email will be sent to selected users (with a defined email
address) and additionally specified email address.
Share on Completion
When a report has run, the completed report will be shared in SecurityCenter with
other users within the Organization. This is useful if emailing potentially sensitive data
is prohibited by organizational policies.
Publish on Completion
Upon completion of the report, it may be uploaded to one or more defined publishing
sites selected from the list.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
114
Report Results
Either the Oracle Java JRE or OpenJDK along with their accompanying dependencies must be installed on
the system hosting the SecurityCenter for PDF reporting to function.
Clicking on Report Results opens a view to the status of running or completed reports. Results are displayed in a list
view with the ability to drill down into individual report details. An example screen capture of this page is shown below:
Filters are available at the top of the screen to allow the user to view only desired report results. Filter parameters include
the Name, Owner, Status, and Finish Time. The Owner filter allows you to view reports owned by your user,
shared with your group, or any users managed by your user. Status allows you to view any or only completed reports
and Finish Time gives you the ability to filter reports for the finish time (today, last seven days, last 30 days, specific
month). To return to the original report result view, click on the Reset button to the right of the filter options.
The results of individual reports are available by highlighting the report and using the Download button. The report is
downloaded as a PDF, RTF, CSV, DISA ARF, DISA ASR, or CyberScope file as it was originally created. The Share
button will allow sharing a selected report with other SecurityCenter Organization users, groups, or sharing the report via
email by entering the individual email address(es). The Send button allows you to send a completed report to a defined
publishing site. Basic report parameters are available using the Details button. Finally, reports may be removed from
SecurityCenter using the Delete button.
Report Images
Image files must be of type .png or .jpg. Images used must be consistent when selecting the bit depth (8bit, 16-bit, 24-bit, etc.). Otherwise, errors may be encountered when generating reports.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
115
The Report Images interface allows a user with permissions to add, edit, or delete PDF report images. Two types of
images are managed from this interface: logos and watermarks. Logos are displayed at the bottom of each page, while
watermarks are displayed prominently across the center of the report page.
Table 37 Report Image Options
Option
Description
Add
Add a new logo or watermark image. Note that only PNG and JPEG formats are
supported. The default image sizes are as follows, all at 300 DPI:
Cover page logo 1287x347
Footer logo 458x123
Watermark 887x610
While there are no set limitations on image size or resolution, using images that are
different from these specifications can have a negative impact on report appearance.
Edit
Edit any of the selected images fields, including name, description, type and file.
Detail
View image details including: name, description, date uploaded, last modified and type.
Delete
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
116
The Import Report button allows users to import a report definition exported from another SecurityCenter. This is useful
for Organizations running multiple SecurityCenters to provide consistent reports without duplicating the work needed to
create the definition templates. Clicking Export brings up the following dialog box:
The Export button allows users to export the report definition for use by other SecurityCenter users in other Organizations.
This allows one user to create a report and other users to import it for consistency in reporting across their Organization.
Support
SecurityCenter support objects (assets, audit files, credentials, queries, and scan policies) are defined from the Support
tab on the dashboard. This section provides details on configuring these objects.
Assets
This option lists the available asset lists along with their defined parameters and attributes. Asset lists are dynamically or
statically generated lists of assets within the Organization. Asset lists can be shared with one or more users based on
local security policy requirements.
Assets can be defined as a grouping of devices (laptops, servers, tablets, phones, etc.), that are grouped together using
common search terms within SecurityCenter. A network that assigns a departments laptops by a defined IP range can
create a static asset list using that block of IP addresses. A dynamic asset list can be created based on Plugin ID 21642,
Session Initiation Protocol Detection, and Plugin ID 6291, SIP Server Detection. Any devices with a positive for these IDs
will be added to the asset list automatically.
SecurityCenter makes use of an asset list type known as a Watchlist. A watchlist is an asset list, intended only for
events, that is used to maintain lists of IPs not in the users managed range of IP addresses. This proves beneficial when
analyzing event activity originating outside of the users managed range. For example, if a block of IP addresses is a
known source of malicious activity, they could be added to a watchlist called malicious IPs and added to a custom query.
Dynamic Asset Discovery
SecurityCenter has the ability to parse the results of Nessus, PVS, or event data obtained to build dynamic lists of assets.
For example, a dynamic rule can be created that generates a list of IP addresses that each have ports 25 and 80 open.
These rules can be very sophisticated and take into account addressing, open ports, specific vulnerability IDs, and
discovered vulnerability content. SecurityCenter ships with a number of example rule templates and new rules are
generated easily with a web-based wizard.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
117
Dynamic asset lists take advantage of the flexible grouping of condition statements to obtain lists of systems on the
network that meet those conditions. For example, in the asset above, we are looking for Linux systems (operating system
contains the pattern inux) listening on TCP Port 80 and the number of days since it was observed is greater than 7.
Adding Assets
There are two methods for adding asset lists: selecting from Tenable-provided templates or creating a Custom Asset.
Tenable assets are updated via the SecurityCenter feed. They are searchable by using the text search field on the Add
Asset page or selecting the major category and selecting from the list presented. Once a list of asset templates is
displayed, it may be searched by refining the original text query or selecting from the category tags. Clicking on the title of
the asset list displays details of the criteria used to build the asset list. Once added to the list of assets, the entry may be
edited to refine the criteria for particular requirements.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
118
The table below outlines available fields for adding a Custom Asset List.
Table 38 Asset List Fields
Option
Description
Tag
A logical grouping for created asset objects. Tag names can be reused as desired.
This reduces lengthy lists of asset lists with no logical grouping. Objects shared with
new users will retain the tag specified by the creator. For example, if the Security
Manager creates an Organizational asset and assigns it to the DMZ tag, all users will
now have a DMZ tag containing that Organizational asset. Asset tag names are
entered by selecting the text field and typing a new tag name or selecting from the
drop-down menu of previously used tag names.
Description
Addresses
IP addresses to include within the asset list (20 K character limit). One address, CIDR
address, or range can be entered per line.
Using the Expand link will open a window to enter octets in a range and expand them
for appropriate use in the Addresses field. The list may then be copied to the
clipboard for pasting into the field.
Assets
A listing of currently configured asset lists is available, from which a new asset list may
be created. One or more asset lists may be selected.
It may be desirable to create an asset list from some combination of an existing asset
list and a new selection of addresses. The available options for these selections are:
Union
Intersection
Removes Addresses that are not present in the selected Asset list(s)
Difference
Combines the Addresses and selected Asset lists, then removes the
common addresses
Compliment
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
119
Watchlist Upload
Name
Tag
A logical grouping for created asset objects. Tag names can be reused as desired.
This reduces lengthy lists of asset lists with no logical grouping. Objects shared with
new users will retain the tag specified by the creator. For example, if the Security
Manager creates an Organizational asset and assigns it to the DMZ tag, all users will
now have a DMZ tag containing that Organizational asset. Asset tag names are
entered by selecting the text field and typing a new tag name or selecting from the
drop-down menu of previously used tag names.
Description
File
File that contains the IP address(es) to include within the asset list.
Addresses
IP address(es) that will be used with the asset list. (20 K character limit).
DNS
Name
Tag
A logical grouping for created asset objects. Tag names can be reused as desired.
This reduces lengthy lists of asset lists with no logical grouping. Objects shared with
new users will retain the tag specified by the creator. For example, if the Security
Manager creates an Organizational asset and assigns it to the DMZ tag, all users will
then have a DMZ tag containing that Organizational asset. Asset tag names are
entered by selecting the text field and typing a new tag name or selecting from the
drop-down menu of previously used tag names.
Description
DNS Names
File that contains the IP address(es) to include within the asset list.
Uploaded Lists
IP address(es) that will be used with the asset list. (20K character limit).
"Asset1","Description","group","visibility","IP Address(es)"
...
For example:
"Internal","Int IPs","ranges","user","10.0.0.1,10.0.0.2"
"External","Ext IPs","ranges","user","9.9.9.9-9.9.9.10"
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
120
Double quotes are required within the uploaded file around all fields.
Dynamic
Name
Tag
A logical grouping for created asset objects. Tag names can be reused as desired.
This reduces lengthy lists of asset lists with no logical grouping. Objects shared with
new users will retain the tag specified by the creator. For example, if the Security
Manager creates an Organizational asset and assigns it to the DMZ tag, all users will
now have a DMZ tag containing that Organizational asset. Asset tag names are
entered by selecting the text field and typing a new tag name or selecting from the
drop-down menu of previously used tag names.
Description
Combination
Name
Tag
A logical grouping for created asset objects. Tag names can be reused as desired.
This reduces lengthy lists of asset lists with no logical grouping. Objects shared with
new users will retain the tag specified by the creator. For example, if the Security
Manager creates an Organizational asset and assigns it to the DMZ tag, all users will
now have a DMZ tag containing that Organizational asset. Asset tag names are
entered by selecting the text field and typing a new tag name or selecting from the
drop-down menu of previously used tag names.
Description
Combination Parameters
This field accepts multiple existing asset lists utilizing the operators AND, OR, and
NOT. Using these operators and multiple existing asset lists, new unique asset lists
may be created. If the source asset lists change, the Combination asset list will change
to match the new conditions.
When this field is initially selected, the options of NOT and a list of existing asset lists
are displayed. Selecting one of those options followed by a space will display the next
valid option for building the asset list and continue until the selections are complete. A
green circle with a check mark will appear after the fields title to indicate the query is
valid, while a red circle with an X will be displayed if there is an error.
LDAP Query
Name
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
121
Tag
A logical grouping for created asset objects. Tag names can be reused as desired.
This reduces lengthy lists of asset lists with no logical grouping. Objects shared with
new users will retain the tag specified by the creator. For example, if the Security
Manager creates an Organizational asset and assigns it to the DMZ tag, all users will
now have a DMZ tag containing that Organizational asset. Asset tag names are
entered by selecting the text field and typing a new tag name or selecting from the
drop-down menu of previously used tag names.
Description
Search Base
This is the LDAP search base used as the starting point to search for the user
information.
Search String
This string may be modified to create a search based on a location or filter other than
the default search base or attribute.
Preview Query
The preview query is displayed after selecting the Generate Preview button. The
preview lists the LDAP objects that match the defined search string.
This table describes what type of logic can be used when writing a dynamic rule.
Table 39 Dynamic Rule Logic
Valid Operators
Effect
Plugin ID
is equal to
not equal to
is less than
is greater than
Plugin Text
is equal to
not equal to
Field value must contain the text specified (e.g., ABCDEF contains ABC).
regex
where Plugin ID is
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
122
Operating System
is equal to
not equal to
Field value must contain the text specified (e.g., ABCDEF contains ABC).
regex
Address
is equal to
not equal to
DNS, NetBIOS Host, NetBIOS Workgroup, MAC, SSH v1 Fingerprint, SSH v2 Fingerprint
is equal to
not equal to
Field value must contain the text specified (e.g., 1.2.3.124 contains 124).
regex
not equal to
is less than
is greater than
Field value must be equal to value specified. Scroll arrows are provided to allow for
entry selection or the value can be manually entered. Max 365.
not equal to
Field value must be not equal to value specified. Scroll arrows are provided to allow for
entry selection or the value can be manually entered. Max 365.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
123
is less than
Field value is less than value specified. Scroll arrows are provided to allow for entry
selection or the value can be manually entered. Max 365.
is greater than
Field value is greater than the value specified. Scroll arrows are provided to allow for
entry selection or the value can be manually entered. Max 365.
Severity
is equal to
Field value must be equal to value specified (info, low, medium, high, or critical).
not equal to
Field value must be not equal to value specified (info, low, medium, high, or critical).
is less than
Field value must be less than the value specified (info, low, medium, high, or critical).
is greater than
Field value must be greater than the value specified (info, low, medium, high, or
critical).
where Plugin ID is
Audit Files
The Nessus vulnerability scanner includes the ability to perform compliance audits of numerous platforms including, but
not limited to, databases, Linux, Unix, Cisco IOS, IBM iSeries, and Windows server configurations as well as sensitive
data discovery based on regex contained in audit files. Audit files are text files that contain the specific configuration, file
permission and access control tests to be performed. Additionally, NIST SCAP security checklist files may be uploaded in
the same manner as a standard audit file.
Tenable provides a wide range of audit files and new ones are easy to write. These audit files are maintained on the
Tenable Support Portal for users who wish to perform compliance and configuration auditing.
NIST SCAP security checklist files may be obtained from NISTs site at http://scap.nist.gov under the link for SCAP
Content and then Security checklists. Links under the Resources column to the SCAP content files will take you to the
appropriate page to download the checklist zip file. Only Tier IV files are supported by Tenable for this process. The
complete .zip file obtained from the NIST site is needed for use with SecurityCenter.
The screen capture below contains a listing of an audit file page with PCI and CIS-based audits.
Audit files are added, edited, downloaded, viewed, and deleted from this web interface. Clicking on Add an Add Audit
File dialog screen similar to the following:
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
124
Option
Description
Name
A descriptive name assigned to the audit file (not the actual file name).
Description
File
An interface that allows you to browse on your local system for the actual audit file
itself. When selecting an audit file, no further options are available and the audit file
may be submitted. If a SCAP file is to be uploaded, the complete .zip file acquired from
the NIST SCAP website must be uploaded and additional options are presented.
When selecting a NIST SCAP file as an audit resource, the Benchmark field is
displayed with a drop-down menu of the available benchmarks. Select an appropriate
benchmark for the purpose of the audit. SecurityCenter attempts to determine if the file
is for SCAP Windows or SCAP Linux. This is not always possible due to different
SCAP file versions; a benchmark OS version must be manually selected from the
drop-down menu if one is not automatically determined by SecurityCenter.
As of SCAP version 1.2, an XML tailoring file may be selected to customize certain
results based on the local environment. If needed, a tailoring file may be uploaded
through this option.
Once an audit or SCAP file has been uploaded, it may be referenced from within scan policies for enhanced security
policy auditing. It may also be downloaded for review or uploaded to another SecurityCenter or Nessus scanner to ensure
the same audit file is being used throughout the Organization.
SCAP based scans requires sending an executable to the remote host. For systems that run security software
(e.g., McAfee Host Intrusion Prevention), they may block or quarantine the executable required for auditing.
For those systems, an exception must be made for the either the host or the executable sent.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
125
Credentials
Credentials are reusable objects that facilitate scan target login. Various types of credentials can be configured for use
within scan policies. Additionally, credentials may be shared between users for scanning purposes. When shared, the
other users cannot see a cleartext version of the passwords. This enables sensitive credential sets to be shared in a more
secure manner. Available credential types include:
Windows Nessus has vulnerability checks that can use a Microsoft Windows domain account to find local
information from a remote Windows host. For example, using credentials enables Nessus to determine if
important security patches have been applied. To use this feature, enter the Username, Password, and Domain in
the text boxes.
SSH (password with optional privilege escalation and key-based) SSH credentials are used to obtain local
information from remote Unix and Cisco IOS systems for patch auditing or compliance checks. There is a field for
entering the SSH user name for the account that will perform the checks on the target system, along with either
the SSH password or the SSH public key and private key pair. There is also a field for entering the Passphrase
for the SSH key, if it is required. In case of invalid or expired SSH keys, use the Clear button to remove the
current SSH keys.
The most effective credentialed scans are those with root privileges (enable privileges for Cisco IOS). Since many
sites do not permit a remote login as root, a Nessus user account can invoke a variety of privilege escalation
options including: su, sudo, su+sudo, DirectAuthorize dzdo, Powerbroker pbrun, k5login, and Cisco
enable.
Scans run using su+sudo allow users to login to the remote host with a non-privileged account and then scan
with sudo privileges on the remote host. This is important for locations where remote privileged login is
prohibited.
Scans run using sudo vs. the root user do not always return the same results because of the different
environmental variables applied to the sudo user and other subtle differences. Please refer to the sudo man
pages or the following web page for more information:
http://www.sudo.ws/sudo/sudo.man.html#Security%20Notes
To direct the Nessus scanner to use privilege escalation, click on the drop-down menu labeled Privilege
Escalation and select the appropriate option for your target system. Enter the escalation information in the
provided box.
If an SSH known_hosts file is available and provided as part of the scan policy (located within the SSH Settings
in the scan policy preferences), Nessus will only attempt to log into hosts in this file. This ensures that the same
username and password used to audit your known SSH servers is not used to attempt a login to a system that
may not be under your control.
SNMP community string Enter the appropriate private or public SNMP community string used for authentication.
Kerberos The Kerberos IP, Port, Protocol, and Realm are available for this type of authentication.
Database This setting defines the login credentials and other information such as port, SID, type, and other
specific settings determined by the database type selection. The currently available database types are DB2,
Informix/DRDA, MSSQL Server, MySQL, Oracle, and PostgreSQL.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
126
For more information on Nessus credentialed scanning, please refer to the Nessus Credentialed Checks for
Unix and Windows document available from https://support.tenable.com.
Queries
Queries provide the ability to save custom views of vulnerability, event, ticket, user, and alert data for repeated access.
Common fields for all query types are described in the following table:
Table 41 Common Query Options
Option
Description
Name
Tag
A logical grouping for created query objects. Tag names can be reused as desired.
This reduces lengthy lists of asset lists with no logical grouping. Objects shared with
new users will retain the tag specified by the creator. For example, if the Security
Manager creates an organizational query and assigns it to the DMZ tag, all users will
now have a DMZ tag containing that organizational query.
Description
Type
This option specifies whether the query will use vulnerability, mobile, event, ticket,
user, or alert data.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
127
The table below indicates other options available for vulnerability queries:
Table 42 Vulnerability Query Options
Option
Description
Target Filters
Address
This filter specifies an IPv4 or IPv6 address, range, or CIDR block to limit the viewed
vulnerabilities. For example, entering 192.168.10.0/24 and/or 2001:DB8::/32 limits any
of the web tools to only show vulnerability data from the selected network(s).
Addresses can be comma separated or on separate lines.
DNS Name
This filter specifies a DNS name to limit the viewed vulnerabilities. For example,
entering host.example.com limits any of the web tools to only show vulnerability data
from that DNS name.
Repository
Asset
This filter displays systems from the chosen asset list. If more than one asset list
contains the systems from the primary asset list (i.e., there is an intersect between the
asset lists), those asset lists are displayed as well.
Port
The equality operator is specified to allow matching vulnerabilities with the same ports,
different ports, all ports less than, or all ports greater than the port filter. The port filter
allows a comma separated list of ports. For the larger than or less than filters, only
one port may be used.
All host-based vulnerability checks are reported with a port of 0 (zero).
Protocol
This filter provides check boxes to select TCP, UDP, or ICMP-based vulnerabilities.
Responsible Users
Allows selection of one or more users who are responsible for the vulnerabilities.
Vulnerability Filters
Plugin Family
This filter allows for the selection of a Nessus or PVS plugin family. Only vulnerabilities
from the selected family will be shown.
Plugin Name
Enter all or a portion of the actual plugin name. For example, entering MS08-067 in
the plugin name filter will display vulnerabilities using the plugin named: MS08-067:
Microsoft Windows Server Service Crafted RPC Request Handling Remote Code
Execution (958644) (uncredentialed check). Similarly, entering the string
uncredentialed will display a list of vulnerabilities with that string in their plugin name.
Vulnerability Text
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
128
Scan Policy
This filter allows for the selection of a scan policy. Only vulnerabilities from the
selected scan policy will be shown.
Audit File
This filter displays vulnerabilities detected when a scan was performed using the
chosen .audit file.
Plugin Type
Severity
Displays vulnerabilities with the selected severity (Info, Low, Medium, High, Critical).
CVSS Score
Exploit Available
If set to yes, displays only vulnerabilities for which a known public exploit exists.
CPE
Allows a text string search to match against available CPEs. The filter may be set to
search based on a contains or is equal to filter.
ID Filters
Plugin ID
Enter the plugin ID desired or range based on a plugin ID. Available operators are
equal to (=), not equal to (!=), greater than or equal (>=) and less than or equal to (<=).
CVE ID
CCE ID
MS Bulletin ID
IAVM ID
Date Filters
Vulnerability Last Observed
(Cumulative only)
This filter allows the user to see when the vulnerability was last observed by Nessus or
PVS.
The observation date is based on when the vulnerability was most
recently imported into SecurityCenter. For PVS, this will not match the
exact vulnerability discovery as there is normally a lag between the time
that PVS discovers a vulnerability and when the import occurs.
This filter allows the user to track the number of days since a vulnerability was moved
to the mitigated database.
Vulnerability Discovered
SecurityCenter tracks when each vulnerability was first discovered. This filter allows
the user to see when vulnerabilities were discovered less than, more than or within a
specific count of days.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
129
The discovery date is based on when the vulnerability was first imported
into SecurityCenter. For PVS, this will not match the exact vulnerability
discovery time as there is normally a lag between the time that PVS
discovers a vulnerability and when the import occurs.
Days are calculated based on 24-hour periods prior to the current time
and not calendar days. For example, if the report run time was 11/8/2012
at 1 PM, using a 3-day count would include vulnerabilities starting
11/5/2012 at 1 PM and not from 12:00 AM.
Plugin Published
Tenable plugins contain information about when a plugin was published. This filter
allows the user to search based on when a particular plugin was created; less than,
more than or within a specific count of days.
Plugin Modified
Tenable plugins contain information about when a plugin was last modified. This filter
allows the user to search based on when a particular plugin was modified; less than,
more than or within a specific count of days.
Vulnerability Published
When available, Tenable plugins contain information about when a vulnerability was
published. This filter allows the user to search based on when a particular vulnerability
was published; less than, more than, or within a specific count of days.
Patch Published
When available, Tenable plugins contain information about when a patch was
published for a vulnerability. This filter allows the user to search based on when a
patch became available; less than, more than or within a specific count of days.
Workflow
Mitigated Status
Display vulnerabilities that were at one time mitigated, but have been discovered again
in a subsequent scan. This option is not used in conjunction with other options unless
all options within the selected combination are set (e.g., selecting the Was Mitigated
checkbox will return no results if both the Was Mitigated and the Accepted Risk
flags are set).
Display vulnerabilities based on their Recast Risk workflow status. Available choices
include Recast Risk or Non-Recast Risk. Choosing both options displays all
vulnerabilities regardless of recast risk status.
The table below indicates the options available for mobile queries:
Table 43 Mobile Query Options
Option
Description
This drop-down is used to choose the analysis tool used by the filter. This is the same
as selecting the desired analysis tool from the Analysis -> Mobile dialog.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
130
Active Filters
This field displays the existing filters and allows the user to selectively remove filters as
needed. In the example below, the Active Filters displayed are MDM Type, Model,
Plugin Output, and Days Since Observation. Clicking the X next to any one of these
filters will remove that filter from the filter list.
Mobile Filters
Target Filters
Repository
Device Filters
Identifier
This is a text based search filter that looks at the Identifier field in the repository.
Model
This is a text based search filter that looks at the Model field in the repository.
This is a text based search filter that looks at the Operating System CPE field in the
repository.
Version
This is a text based search filter that looks at the OS Version field in the repository.
Serial Number
This is a text based search filter that looks at the Serial Number field in the repository.
MDM Type
The MDM type field is a drop-down menu to select the MDM server type of
ActiveSync, Apple Profile Manager, Good, AirWatch, or MobileIron.
Username
This is a text based search filter that looks at the User field in the repository.
Vulnerability Filters
Plugin ID
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
131
Plugin Output
Severity
Displays vulnerabilities with the selected severity (Info, Low, Medium, High, Critical).
Date Filters
Vulnerability Last Observed
(Cumulative only)
This filter allows the user to see when the vulnerability was last observed.
The table below indicates the options available for event queries:
Table 44 Event Query Options
Filter
Description
This drop-down is used to choose the analysis tool used by the filter. This is the same
as selecting the desired analysis tool from the Analysis -> Events dialog. These
tools are described in detail in the Analysis Tools section.
Active Filters
This field displays the existing filters and allows the user to selectively remove filters as
needed. In the example below, the Active Filters displayed are Timeframe, Type, and
Targeted IDS Events. Clicking the X next to any one of these filters will remove that
filter from the displayed events.
Event Filters
Target Filters
Address
Specifies an IP address, range, or CIDR block to limit the displayed events. For
example, entering 192.168.10.0/24 limits any of the web tools to only show event data
from that network. Addresses can be entered on separate lines or comma separated.
Port
This filter type of filter can be specified to allow matching vulnerabilities with the
specified ports (=) or excluding ports (!=). The port filter may specify a single port,
comma separated list of ports, or range of ports (e.g., 8000-8080).
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
132
Protocol
Specify the protocol of the event (Any, TCP, UDP, ICMP, or Unknown).
Direction
Asset
Filter the event by asset list. Select an asset list from those available. To narrow down
the number of displayed asset lists, enter text to filter on in the search box.
Event Filters
Timeframe
The Normalized Event is the name given to the event by the LCE after the LCE runs
its PRM and TASL scripts against it.
Detailed Event
This is the detailed event name given by the IDS vendor. For example, an event
received from a Snort sensor can have a detailed event name of DOUBLE DECODING
ATTACK, which means that HTTP_INSPECT 119:2:1 fired and was sent to the LCE.
Type
Clicking in this box generates a drop-down that allows one to select the event type
(e.g., error, lce, login, intrusion, etc.).
Sensor
Filter the events by sensor using the equal (=) or not equal (!=) operators.
User
This filter checkbox selects IDS events that have targeted systems and ports with
vulnerabilities likely to be exploited by the detected attack. This is determined by
comparing the hosts vulnerabilities (CVE, etc.) against those tied to the actual IDS
event.
Syslog Text
(Raw Syslog Events Analysis Tool) String to search for within the filtered event. When
using LCE server version 4.0.1 and newer, the text search is case insensitive and
Boolean operators may be used. For example:
text="(drive AND serial) OR utilization"
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
133
This filter is case-sensitive when using LCE version 4.0.0 and earlier.
Advanced Filters
LCEs
Specify which LCEs to obtain events from. Use <CTRL> or <Shift> + click to select
more than one.
Repositories
Specify which Repositories to obtain events from. Use <CTRL> or <Shift> + click to
select more than one.
Source Address
Specifies an IP address or CIDR block to limit the displayed events based on source.
For example, entering 192.168.10.0/24 limits any of the web tools to only show event
data with source IPs in that block. Addresses can be comma separated.
Destination Address
Source Port
This type of filter can be specified to allow matching events with the same ports (=) or
different ports (!=). The port filter may specify a single, comma separated list of ports
or range of ports (e.g., 8000-8080).
Destination Port
This type of filter can be specified to allow matching events with the same ports (=) or
different ports (!=). The port filter may specify a single, comma separated list of ports
or range of ports (e.g., 8000-8080).
Source Asset
Destination Asset
Ticket queries are a useful way of determining what tickets to alert against. For example, if you want to be alerted when a
user named Joe is assigned a ticket, you could create a query with a ticket filter based on the Assignee value of Joe.
You could then create an alert to email you when Joe was assigned a ticket. The table below contains a list of the ticket
query options.
Table 45 Ticket Query Options
Option
Description
Ticket Filters
Name
Status
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
134
Classification
Owner
Assignee
Created Timeframe
Ticket creation date/time to filter against. Either specify an explicit timeframe, including
the start and end time or choose one of the predefined periods (e.g., last 15 minutes,
last hour, etc.)
Assigned Timeframe
Modified Timeframe
Ticket modified date/time to filter against. Either specify an explicit timeframe, including
the start and end time or choose one of the predefined periods (e.g., last 15 minutes,
last hour, etc.)
Resolved Timeframe
Closed Timeframe
Ticket closed date/time to filter against. Either specify an explicit timeframe, including
the start and end time or choose one of the predefined periods (e.g., last 15 minutes,
last hour, etc.)
User queries are useful for reporting, dashboards and alerts based on user actions. For example, it can be used for
tracking and alerting on user logins and locked accounts. It could also be used to track user logins from accounts not
authorized on the monitored systems.
Table 46 User Query Options
Option
Description
User Filters
First Name
Last Name
Username
Group
Role
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
135
Filters against users whose last login was that the timeframe specified. Either specify
an explicit timeframe, including the start and end time or choose one of the predefined
periods (e.g., last 15 minutes, last hour, etc.).
Account State
The Alert query is useful for reporting, dashboards and alerting when an alert has triggered. This is useful for situations
where a report, dashboard element or conditional alert is required after the specified alert filter conditions have been met.
For example, a daily report could be scheduled containing a query of all active alerts and their details.
Table 47 Alert Query Options
Option
Description
Alert Filters
Name
Description
State
Created Timeframe
Filters against the alert creation timeframe specified. Either specify an explicit
timeframe, including the start and end time or choose one of the predefined periods
(e.g., last 15 minutes, last hour, etc.).
Modified Timeframe
Filters against the most recent alert modification timeframe specified. Either specify an
explicit timeframe, including the start and end time or choose one of the predefined
periods (e.g., last 15 minutes, last hour, etc.).
Filters against the most recent alert trigger timeframe specified. Either specify an
explicit timeframe, including the start and end time or choose one of the predefined
periods (e.g., last 15 minutes, last hour, etc.).
Filters against the most recent alert evaluation timeframe specified. Either specify an
explicit timeframe, including the start and end time or choose one of the predefined
periods (e.g., last 15 minutes, last hour, etc.).
Scan Policies
The scan policy contains plugin settings and advanced directives used during the course of the Nessus scan. Click on
Support and then Scan Policies to display a listing of all currently available policies. Tabs at the upper-right hand
portion of this page give the user the ability to Add, Copy, Edit, Share, Download, Detail (view details of), and Delete
existing policies.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
136
Basic
Audit Files
Plugins
Preferences
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
137
Basic
The Basic tab contains basic scan policy settings and allows the user to load a predefined scan policy template if desired.
The Load Policy Template option is a command button located in the upper right-hand corner of the Basic tab
page and allows the user to load scan policy options based on a variety of predefined scan policy templates. Available
templates include: Web Safe Scan, FTP Safe Scan, SMTP Safe Scan, Cisco Safe Scan, Full Safe Scan All
Ports, Full Safe Scan Common Ports, Microsoft Scan, PCI DSS Scan, Topology Scan, Peer-To-Peer Scan,
Virus Check Scan, Operating System Identification, Patch Audit and Local Security Checks, and Netstat Port Scan.
These templates use optimized plugin and configuration settings for their specified scan type.
The tables below contain detailed descriptions of options available on each of the five frames displayed under the Basic
tab:
Table 48 Basic Options
Option
Description
Name
Description
Tag
Policy tag name (optional) to organize various policies to make searching for similar
policies easy.
Type
Family or Plugin. If Family is chosen then when plugin updates occur, new plugins
will automatically be enabled for plugin families that are enabled. If Plugin is enabled,
only the currently enabled plugins are enabled. New plugins must be manually enabled
by the user. This is beneficial where strict control over new plugins is required.
Changing from Family to Plugin, or vice-versa, clears all currently
enabled plugins. Please make a note of all enabled plugins before
changing this option so that they can be enabled afterwards.
The Scan frame controls basic scan options for the scan:
Table 49 - Scan Options
Option
Description
Safe Checks
Silent Dependencies
If this option is checked, the list of dependencies is not included in the report. If you
want to include the list of dependencies in the report, uncheck this box.
With this setting enabled, ports that are not enumerated by the port scan will not be
tested. For example, scanning ports 21, 22 and 23 will only test those ports and not
any other port.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
138
The Port Scanners frame controls which methods of port scanning should be enabled for the scan:
Table 50 Port Scanner Options
Option
Description
TCP Scan
Use Nessus built-in TCP scanner to identify open TCP ports on the targets. This
scanner is optimized and has some self-tuning features.
On some platforms (e.g., Windows and Mac OS X), if the operating
system is causing serious performance issues using the TCP scanner,
Nessus will launch the SYN scanner.
UDP Scan
This option engages Nessus built-in UDP scanner to identify open UDP ports on the
targets.
UDP is a stateless protocol, meaning that communication is not done
with handshake dialogues. UDP based communication is not always
reliable, and because of the nature of UDP services and screening
devices, they are not always remotely detectable.
SYN Scan
Use Nessus built-in SYN scanner to identify open TCP ports on the targets. SYN
scans are a popular method for conducting port scans and generally considered to be
a bit less intrusive than TCP scans. The scanner sends a SYN packet to the port, waits
for SYN-ACK reply and determines port state based on a reply, or lack of reply.
SNMP Scan
Direct Nessus to scan targets for a SNMP service. Nessus will guess relevant SNMP
settings during a scan. If the settings are provided by the user under Preferences,
this will allow Nessus to better test the remote host and produce more detailed audit
results. For example, there are many Cisco router checks that determine the
vulnerabilities present by examining the version of the returned SNMP string. This
information is necessary for these audits.
This option uses netstat to check for open ports from the local machine. It relies on
the netstat command being available via a SSH connection to the target. This scan
is intended for Unix-based systems and requires authentication credentials.
This option uses netstat to check for open ports from the local machine. It relies on
the netstat command being available via a WMI connection to the target. This scan
is intended for Windows-based systems and requires authentication credentials.
Ping Host
This option enables the pinging of remote hosts on multiple ports to determine if they
are alive.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
139
The Port Scan Options frame directs the scanner to target a specific range of ports. The following values are allowed
for the Port Scan Range option:
Table 51 Values for Port Scan Options
Value
Description
default
Using the keyword default, Nessus will scan approximately 4,605 common ports.
Custom List
The range specified for a port scan will be applied to both TCP and UDP scans.
The Performance frame provides two options that control how many scans will be launched. These options are perhaps
the most important when configuring a scan as they have the biggest impact on scan times and network activity.
Table 52 Performance Options
Option
Description
This setting limits the maximum number of checks a Nessus scanner will perform
against a single host at one time.
This setting limits the maximum number of hosts that a Nessus scanner will scan at
the same time. If the scan is using a zone with multiple scanners, each scanner will
accept up to the amount specified in the Max Hosts Per Scan option. For example, if
the Max Hosts Per Scan is set to 5 and there are five scanners per zone, each
scanner will accept five hosts to scan, allowing a total of 25 hosts to be scanned
between the five scanners.
This setting limits the length of time a scan is allowed to run. If a scan reaches this
limit, the unscanned targets are captured in a new rollover scan that can be run
manually or scheduled at a later time.
This setting limits the maximum number of TCP sessions established by any of the
active scanners while scanning a single host.
Audit Files
The Audit Files tab contains two options related to Nessus compliance scans. Note that you must at least name the scan
from the Basic frame to be able to open the Audit Files tab.
Table 53 Audit File Options
Option
Description
Tenable provides a variety of audit files that provide a template check for compliance
audits against various established standards, such as the Center for Internet Security
(CIS) benchmarks, healthcare industry standards (HIPAA), Payment Card Industry
(PCI) requirements and many more. To perform a compliance check, you must have
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
140
The Payment Card Industry Data Security Standard (PCI DSS) is a comprehensive set
of security standards established by the founding members of the PCI Security
Standards Council, including Visa, American Express, Discover Financial Services,
and MasterCard. The PCI DSS is intended to provide a common baseline to safeguard
sensitive cardholder data for all bankcard brands and is in use by many e-commerce
vendors who accept and store credit card data.
Tenable provides three plugins to all SecurityCenter users that automate the process
of performing a PCI DSS audit. These plugins are:
These plugins evaluate the results of your scan and the actual configuration of your
scan to determine if the target server is PCI compliant. The plugins do not perform
actual scanning; they just look at the results from other plugins.
To activate the PCI DSS plugins, simply check the box labeled Perform PCI DSS
Analysis from the Compliance screen.
It is important to note that a secure infrastructure is achieved through a
fusion of people, processes, and technology. Tenables solutions provide
the technology to aid in compliance requirements and are intended to be
used in conjunction with a comprehensive security strategy. Please
consult with your organizations Audit and Compliance group for guidance
and directives specific to your organization.
Generate SCAP XML
Results
When performing a compliance scan with a qualifying SCAP audit file, the Generate
SCAP XML Results option is enabled by default. When the scan completes, it will
generate a SCAP result file, which may be downloaded from the scan result page
when the scan is selected.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
141
Plugins
The Plugins tab gives the user the option to customize which plugins will be utilized during the policys Nessus scan.
Clicking on the circle next to a plugin family allows you to enable or disable the entire family. When the circle next to a
family is green, that family is enabled and all plugins within that family are enabled. Selecting a family will display the list
of its plugins in the upper right pane. Individual plugins can be enabled or disabled to create very specific scan policies.
As adjustments are made, the total number of families and plugins selected is displayed at the bottom. The circles next to
the Family name will show green when some or all of the plugins for that Family are enabled. The green will show as full if
all the plugins are selected, or , , or full when some plugins in the family are selected, where the circles green fill
approximates the percentage of plugins selected.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
142
Selecting a specific plugin will display the plugin output that will be displayed as seen in a report. The synopsis and
description will provide more details of the vulnerability being examined. Scrolling down in the Plugin Description pane
will also show solution information, additional references, the CVSSv2 score that provides a basic risk rating, and/or any
other information that is available in the plugin.
When a policy is created and saved, it records all of the plugins that are initially selected. When new plugins are received
via a plugin feed update, they will automatically be enabled if the family they are associated with is enabled. If the family
has been disabled or partially enabled, new plugins in that family will automatically be disabled as well.
The Denial of Service family contains some plugins that could cause outages on a corporate network if the
Safe Checks option is not enabled, but does contain some useful checks that will not cause any harm. The
Denial of Service family can be used in conjunction with Safe Checks to ensure that any potentially
dangerous plugins are not run. However, it is recommended that the Denial of Service family not be used on
a production network.
The following table describes options that will assist you in selecting plugins.
Table 54 Plugin Options
Option
Description
Plugin Filters
Display plugins based on selected parameters (Name, ID, and Family). Select the
parameter you wish to search and type in some text to look for and hit Enter.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
143
Preferences
Configures optional settings for various plugins. Scan Policy preferences are discussed in detail in the Plugin
Preferences section of this document.
Users
The Users tab is used to define Users, Roles, and Groups.
Users
Organizational users can be added, edited, viewed and deleted by selecting Users from the drop down menu in the
Users tab. The username, group, role, title, and last login of the user are displayed as shown by the screen capture
below:
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
144
Add User
Clicking on Add displays a two-tab configuration dialog with the following options:
Table 55 User Basic Options
Option
Description
Authentication Information
Type TNS
Username
This is the name the user will use to login to SecurityCenter. When selecting this
account name, it is sometimes easier to focus on the persons real name as a
convention (e.g., Bob Smirth would become bsmirth). However, it may also be useful
to assign names based on role, such as auditNY.
Password
Login password.
It is recommended to use passwords that are at least eight characters in
length and include a combination of lower and upper-case letters along
with non-alphabetic characters.
Type LDAP
Search String
This is the LDAP search string to use to narrow down user searches. Proper format is:
attribute=<filter text>. Wildcards are permitted and the field accepts up to 1024
characters.
For Example:
sAMAccountName=*
mail=a*
displayName=C*
Users
Username
Notification
Email user their account
information
When the user is created, you can choose to have them notified via email of their
account by selecting this check box.
If the following error message is received when attempting to add a user:
Error creating email notifying user 'test'. Invalid
address: noreply@localhost
Login as the administrator user and check the System -> Configuration ->
Mail -> Return Address settings. The email address defaults to
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
145
There is an option to include the users password within the email if desired. If this is
not included, contact information of the security manager will be included.
Dashboard Template
Assigns the user being created a dashboard that has been created from a previously
exported dashboard. Selecting the Browse button opens a dialog box to enable
locating and uploading the desired dashboard template.
Basic/Contact Information
Name, Title, Address
Information, Email, Phone
Option
Description
Role
The role assigned to the user. The default roles that may be used during user creation
include:
Auditor
Credential Manager
Executive
No Role
Security Analyst
Vulnerability Analyst
A user may only create new users with permissions that the creating user currently
has. For example, if a user has the Auditor role, they can only create new users with
the Auditor or lesser role.
Group
This option assigns the user to a designated group. This determines the rights to which
SecurityCenter resources the user is granted.
Group Permissions
This option controls the permissions of the user within a group. A user may have
control of groups outside of which they are assigned. They may be assigned manage
objects and/or manage user rights to all available groups or select groups.
This option is only viewable to users with the Manage Groups permission in their role.
Responsibility
Optionally assigns a user to an asset list for which the user is responsible for. By
utilizing this, it is easier to determine who in a group or Organization is to be assigned
tickets, notifications, and similar to resolve issues with particular issues.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
146
Edit
Clicking on the Edit button allows editing of any information described in the previous section after the user has been
created. Additionally, the users account may be locked or unlocked from the edit screens Basic tab.
Detail
Clicking on the Detail button displays a summary of the users information, such as name, role, last login, repositories
and defined assets.
Delete
Clicking on the Delete button displays a window asking to confirm the deletion of the user. Organization objects
assigned to the user will be moved to Security Manager.
Roles
Custom roles can be edited by the administrator and Security Manager users.
Roles determine what a user can or cannot do when they access their account and are configurable to a great degree.
SecurityCenter comes with a variety of pre-defined roles; however, custom roles may be created by the Security
Manager user to facilitate organizations with complex security policy needs. In keeping with the SecurityCenter
convention, role assignments are hierarchical. Users may only create new users with roles that have the same
permissions or a subset of permissions of their current Role. For example, if a user has a custom role with View
Vulnerability Data enabled and Update Plugins disabled, they can only create users with View Vulnerability Data
enabled.
Available pre-defined roles include:
No Role
Security Manager
Security Analyst
Vulnerability Analyst
Executive
Credential Manager
Auditor
These roles are static and cannot be modified. An administrator is an account that has management responsibility over
the console. The primary task of the administrator is to correctly install and configure each organization. In addition, the
administrator adds components to SecurityCenter such as PVS, LCE, and Nessus to extend its capability. The
administrator is automatically assigned the Manage Application permission.
A Security Manager is the account within an organization that has a broad range of security roles. This is the role
assigned to the initial user that is created when a new organization is created. They have the ability to launch scans,
configure users (except for administrator user roles), vulnerability policies, and other objects belonging to their
organization. Each organization has a Security Manager account that cannot be deleted without deleting the entire
Organization.
Additional users may be created and assigned one of the default roles or a custom role. Viewing the details of the roles
describes the purpose of the role, the number of users assigned to the role, and the permissions granted.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
147
Add Role
Only the administrator and Security Manager users can add new roles. Other user roles do not have this
privilege.
A powerful feature of SecurityCenter is the ability to add new roles. These custom roles can be configured and fine-tuned
to match the duties to be performed by users who are assigned them. Clicking on Add Role displays a screen similar to
the one below:
Please reference the table below for detailed descriptions of each role item:
Table 57 Add User Role
Option
Description
Basic
Name
Description
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
148
Scan Permissions
Scan Privileges
Allow user with this role to perform Nessus scans. Available options include:
Allows user with this role to upload Nessus scan results to SecurityCenter.
Create Policies
Allows user with this role to add, remove, or edit blackout windows.
Asset Permissions
Create LDAP Query Assets
Analysis Permissions
Accept Risks
Recast Risks
Organizational Permissions
Share Objects Between
Groups
Allows a user with this role to share an object between different groups.
Allows user with this role to view logs for all Organizational users.
User Permissions
Manage Roles
Allows user with this role to manage roles for non-admin SecurityCenter users.
Manage Groups
Allows user with this role to manage group permissions for objects.
Manage Group
Relationships
Allows user with this role to manage the relationships between different groups.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
149
Report Permissions
Manage Report Images
Allows user with this role to add or remove images used in SecurityCenter reports.
Allows user with this role to manage the attributes used in reporting.
System Permissions
Update Feeds
Allow user with this role to manually update Nessus, LCE, and PVS plugins and the
SecurityCenter feed.
Workflow Permissions
Create Alerts
Create Tickets
Purge Tickets
Edit
Clicking on the Edit button allows you to change any of the information for any custom role that has been created.
Detail
Clicking on the Detail button displays a summary of the role, such as name, description, number of users and
permissions.
Delete
Clicking on the Delete button displays a window asking if you really want to delete the role and then deletes it after
confirmation.
Deleting a role will cause all users with that role to lose all assigned permissions.
Groups
Beginning in SecurityCenter 4.8, access to security data (repositories and LCEs intersected with defining assets) is now
controlled through a group hierarchy rather than individual users. User access to security data is granted based on the
users group membership. Users will be able to automatically use Policies, Assets, and other objects created by others in
the same group with the appropriate permissions. The new group-based model also allows for more flexibility in user
management, object management, and visibility into running scans and reports that is not constrained by the previouslyused user hierarchy. Utilizing groups in SecurityCenter makes it quicker and simpler to create, maintain, and assign
resources to multiple users.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
150
From the Groups page, the name of the group and at least a partial list of users included in the group are displayed in the
table. From this page, groups may be added, edited, view the details of, and deleted.
Add Group
The following table describes the fields available from the Basic and Group Sharing tabs when adding (or editing) a group.
Table 58 Add Group
Option
Description
Basic
Name
Description
A text field used to create a description of what the group is used for, such as the
security team at the central office, the executives on the east coast, and other desired
information.
Repositories
Viewable IPs
Assigns the IP addresses that are viewable by the group. The selection is made by all
available IP addresses or the selection of one or more asset lists.
LCEs
Group Sharing
Shared Assets
Shared Dashboards
Shared Credentials
Shared Policies
Shared Queries
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
151
Edit
Clicking on the Edit button allows you to change any of the information for any custom group that has been created.
Detail
Clicking on the Detail button displays a summary of the group, such as name, description, assigned LCEs, available
repositories, viewable IP addresses, and users assigned to the group.
Delete
Clicking on the Delete button displays a window asking if you really want to delete the group, and then deletes it after
confirmation.
Workflow
The Workflow tab contains options for alerting and ticketing. These functions allow the user to be notified of and properly
handle vulnerabilities and events as they come in.
Alerts
SecurityCenter can be configured to perform actions, such as email alerts, for select vulnerability or alert occurrences to
various users regardless of whether the events correlate to a local vulnerability or not. Other alert actions include UI
notification, ticket creation/assignment, remediation scans, launching a report, and syslog alerting. Many actions can be
assigned per ticket.
The user is presented with the ability to Add, Edit, Evaluate, Detail (view details of), and Delete alerts. The
Evaluate option allows an alert to be tested whether it has met the configured time criteria or not.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
152
Option
Description
Name
Alert name
Description
Data Type
Query
Filters
Apply advanced filters to the vulnerability or event data. The complete filter set may be
created here, or if a Query was selected those parameters may be edited. See tables
8 and 10 for filter options.
Trigger
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
153
Frequency
Behavior
If set to alert on the first occurrence, the alert will only trigger when the condition
initially changes from false to true.
Clicking on Add New Action will present you with the following options:
Use email alerts to interface with third-party ticketing systems by adding variables in the message field.
Option
Description
Email
Subject
Message
Message of the alert email. Within the message body, the following variables can be
defined for email message customization:
Alert ID Designated with the variable: %alertID%, this specifies the unique
identification number assigned to the alert by SecurityCenter.
Alert name Designated with the variable: %alertName%, this specifies the name
assigned to the alert (e.g., Test email alert).
Trigger Name Designated with the variable: %triggerName%, this specifies if the
trigger is IP count, Vulnerability count or Port count
Trigger Operator Designated with the variable: %triggerOperator%, this specifies
which operator was used for the count: >=, =, >= or !=
Trigger value Designated with the variable: %triggerValue%, this specifies the
specific threshold value set that will trigger the alert.
Calculated value Designated with the variable: %calculatedValue%, this specifies
the actual value that triggered the alert.
Alert Name Designated with the variable: %alertName%, this specifies the name
given to the alert within SecurityCenter.
Alert owner Designated with the variable: %owner%, this specifies the user that
created the alert.
SC4 URL Designated with the variable: %url%, this specifies the URL that the
SecurityCenter can be accessed with. This is useful where the URL that users can
access SecurityCenter with differs from the URL known by SecurityCenter.
The sample email alert below contains some of these keywords embedded into an
HTML email:
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
154
If this check box is checked, the query results (maximum of 500) that triggered the
alert are included in the email.
Users
Users who will be emailed. The user email address is used with this function.
If a user is configured within the email action and that user is deleted, the
action field within the alert turns red. In addition, a notification is displayed
for the new alert owner with the new alert status. To resolve this, edit the
alert action definitions and choose Edit Action to apply the correct
users(s).
Email Addresses
Additional email addresses to send the alert to. For multiple recipients, add one email
address per line or use a comma-separated list.
Notify
Notification Message
Assignees
Syslog
Host
Port
Severity
Message
Assign Ticket
Name
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
155
Description
Ticket description
Assignee
Scan
Scan Template
Scan template to be used for the alert scan. Allows the user to select from a list of
available scan templates to launch a scan against a triggered host.
The scanned host will be the host that triggered the scan and not the host
within the scan template itself. IPs used for the scan targets are limited to
the top 100 results of the alert query.
Report
Report Template
Allows the user to select an existing report template and generate the report based on
triggered alert data.
Tickets
Tickets can be created both manually and automatically by a predefined set of conditions through the alerting functionality
described above.
Tickets are created from the Workflow -> Tickets view or when viewing vulnerabilities or events through the analysis tools.
Tickets contain the following fields:
Table 61 Ticket Options
Option
Description
Name
Description
Notes
The following ticket statuses become available after a ticket has been created and are
available from the Edit screen:
Assignee
Assigned
More Information
Not Applicable
Duplicate
Resolved
Closed
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
156
Ticket classification can be selected from a drop-down list containing such items as
Information, Configuration, Patch, Disable, False Positive, and many others.
Data Type
Vulnerability or Event
Take Snapshot
Queries
List of queries generated from the Take Snapshot option for the ticket assignee to
assist with resolution.
In addition to adding and editing tickets, a Browse command button is available. This option enables the user to view
the vulnerability snapshot added during ticket creation. The displayed view matches the query that was used by the ticket.
To return to the ticket view, click on the white arrow displayed on the left-hand side of the screen.
To view details about an existing ticket, either use the Edit button to view options that were set during the Add Ticket
process or use the Details button to view a Ticket Detail summary with the name, status, creator, assignee, history,
queries, description, and ticket notes.
Once a ticket has been mitigated, click on Update to provide ticket resolution.
Ticket Resolution
Within the Status drop-down, the user can select from one of three status options: Resolved, More Information,
Duplicate, or Not Applicable. Choose the correct status and add notes relevant to the ticket resolution. Resolved tickets
still show up in the users ticket queue with an Active status. Closing a ticket removes the ticket from the Active status
filter view, but does not provide the ability to add notes similar to the Update Ticket function. Tickets in the Resolved
or Closed state can always be reopened as needed. The final option is Purge Tickets.
Purged tickets are removed completely from SecurityCenter. Do not perform this option unless you are certain
that the tickets are no longer needed.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
157
This option is available, by default, only to the Security Manager user and is used to remove tickets based on date criteria.
Clicking on the Purge Tickets command button displays the following dialog:
Only closed tickets can be purged and purged tickets are removed permanently from the system.
Plugins
Plugins are scripts used by the Nessus, PVS, and LCE servers to interpret vulnerability data. For ease of operation,
Nessus and PVS plugins are managed centrally by SecurityCenter and pushed out to their respective scanners. LCE
servers download their own event plugins and SecurityCenter downloads event plugins for its local reference.
SecurityCenter does not currently push event plugins to LCE servers.
Within the Plugins interface, the user has the ability to perform a wide variety of plugin-related functions including
updating active, passive and event plugins, upload custom plugins, view plugin details/source, and search for specific
plugins. Clicking on the Plugins tab displays a page similar to the one below:
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
158
Plugin Listing
Update Plugins
Immediately after installing SecurityCenter, plugins are automatically updated and then updated on a regular scheduled
basis. Manually updating plugins simply involves clicking on the command button and waiting for the process to complete.
Due to the large quantity of plugins and inconsistency of network speeds, this process can take a long time to complete.
The date and time of the last successful plugin update is displayed for each type at the top of the page to the right of the
Upload Plugins command button. After a successful download, the plugins are displayed in the plugin table with the date
or number of hours or days of the last successful download in the Date Downloaded field.
Upload Plugins
Clicking on Upload Plugins opens a dialog box that allows the user to upload one or more active, passive, event, or
custom plugins. Choose Custom for any active, passive, or event plugins that you have created. All custom plugins
must have unique Plugin ID numbers and have family associations based on existing SecurityCenter families. Choose
Active, Passive, or Event for the appropriate type of Tenable provided signed plugins.
Custom plugin uploads must now be a complete feed. In order to upload custom plugins the provided
tar.gz file must include the relevant NASLs and a custom_feed_info.inc file comprised of the
following two lines:
PLUGIN_SET = "201202131526";
PLUGIN_FEED = "Custom";
The administrator must manage this file and update the PLUGIN_SET option for each upload. The
PLUGIN_SET format is YYYYMMDDHHMM.
For example, running the following command against the custom_feed_info.inc file and custom plugins
in a directory will create a new tar and gziped uploadable archive file called
custom_nasl_archive.tar.gz that contains both custom plugins:
# tar -cvzf custom_nasl_archive.tar.gz custom_feed_info.inc *.nasl
It is recommended that the custom_nasl_archive.tar.gz file be updated for each addition and update of
custom NASLs.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
159
After browsing for the plugin archive and uploading it, confirm the plugin type and whether you wish to override previous
custom plugins and then click on Add to extract the plugins to your SecurityCenter. Shortly after completion a
notification message is displayed indicating a successful plugin upload.
Copyright 2014. Tenable Network Security, Inc. All rights reserved. Tenable Network Security and Nessus are registered trademarks of Tenable Network Security, Inc.
160