Skip to main content

Tenable Nessus

Tenable Nessus is a vulnerability assessment solution that scans your organization's network and generates vulnerabilities based on the results of those scans. By integrating Tenable Nessus with Brinqa, you can bring in host and vulnerabilities data, giving you a more comprehensive view of your organization's attack surface. This can help you strengthen your cybersecurity posture and better protect against security threats.

This document details the information you must provide for the connector to authenticate with Tenable Nessus and how to obtain that information from Tenable. See create a data integration for step-by-step instructions on setting up the integration.

Required connection settings

When setting up a data integration, select Tenable Nessus from the Connector drop-down. If you cannot find the connector in the drop-down, make sure that you have installed it first. You must provide the following information to authenticate Tenable Nessus with Brinqa:

  • Server URL: The Nessus Server URL. The URL format is https://<server-name>:8834.

  • Access key and Secret key: The API keys associated with the Nessus user, who must have permissions to log in to the API server and return data.

Generate Tenable Nessus access key and secret key

For the Tenable Nessus connector to use the Nessus API, you must provide the access key and secret key to authenticate to the Nessus server. To do so, follow these steps:

  1. Log in to your organization's Tenable Nessus account.

  2. Navigate to Settings > My Account.

  3. Click the API Keys tab and click Generate.

  4. A confirmation dialog appears. Click Generate to display your new keys.

    Your new access key and secret key display. You cannot view the keys again. Copy the API keys and save them in a secure location.

note

If you do not have the permissions to create API keys, contact your Tenable Nessus administrator. For additional information, see Tenable Nessus documentation.

Additional settings

The Tenable Nessus connector contains additional options for specific configuration:

  • Page size: The maximum number of records to get per API request. The default setting is 1000. It is not recommended to go over 1000.

  • Parallel requests: The maximum number of parallel API requests. The default setting is 8.

  • Maximum retries: The maximum number of times that the integration attempts to connect to the Nessus API before giving up and reporting a failure. The default setting is 10.

  • Skip certificate verification: Select this option to allow for untrusted certificates.

Types of data to retrieve

The Tenable Nessus connector can retrieve the following types of data from the Nessus API:

Table 1: Data retrieved from Tenable Nessus

Connector ObjectRequiredMaps to Data Model
HostYesHost
ScanNoNot mapped
VulnerabilityYesVulnerability
Vulnerability DefinitionYesVulnerability Definition
info

For detailed steps on how to view the data retrieved from Tenable Nessus in the Brinqa Platform, see How to view your data.

Attribute mappings

Click the tabs below to view the mappings between the source and the Brinqa data model attributes.

Table 2: Host attribute mappings

Source Field NameMaps to Attribute
cpeLocal variable
folderIdLocal variable
host-fqdnpublicDnsName, privateDnsName
host-ippublicIpAddresses, privateIpAddresses, ipAddresses
HOST_END_TIMESTAMPLocal variable
mac-addressmacAddresses
nameuid, hostnames
netbios-namename
operating-systemdescription, os
scanIdLocal variable
STATUSstatus
system-typecategories
info

Local variable indicates that the field is processed within a specific context, such as a particular workflow or calculation. Unlike other attributes, local variables aren't mapped to the unified data models. They only exist on the source data model.

Operation options

The Tenable Nessus connector supports the following operation options. See connector operation options for information about how to apply them.

Table 5: Tenable Nessus connector operation options

Connector ObjectOptionAll Possible valuesDescriptionExample
Hostfolder_idThe unique number identifying the folder.Limit the results to those in the specified folder.Key: folder_id Value: 1234. This key and value combination retrieves scans from folder '1234' to obtain information on hosts.
Scanfolder_idThe unique number identifying the folder.Limit the results to those in the specified folder.Key: folder_id Value: 1234. This key and value combination retrieves scans from folder '1234'.
Vulnerabilityfolder_idThe unique number identifying the folder.Limit the results to those in the specified folder.Key: folder_id Value: 1234. This key and value combination retrieves scans from folder '1234' to obtain information on vulnerabilities.
last_modified_beforeA Unix time stamp value in milliseconds.Limit the results to those that have changed before this time.Key: last_modified_before Value: 1676333860829. This key and value combination retrieves scans that have changed before 2023 Feb 14 00:17:40 UTC to obtain information on vulnerabilities.
last_modified_afterA Unix time stamp value in milliseconds.Limit the results to those that have changed since this time.Key: last_modified_after Value: 1676333860829. This key and value combination retrieves scans that have changed since 2023 Feb 14 00:17:40 UTC to obtain information on vulnerabilities.
pluginAny supported Tenable Nessus plugin ID number or range of plugin IDs from 0-8388607.Retrieves vulnerabilities that are related to the specified plugin ID or range of plugin IDs. Plugin IDs are separated by a dash -.Key: plugin Value: 123456. This key and value combination only retrieves vulnerabilities associated with plugin ID 123456.
severityAny number from 0-4.Retrieves vulnerabilities based on their specified severity level. 0 = Informational, 1 = Low, 2 = Medium, 3 = High, and 4 = Critical.Key: severity Value: 4: This key and value combination only retrieves vulnerabilities with a severity level of 4, or critical vulnerabilities.
Vulnerability definitionfolder_idThe unique number identifying the folder.Limit the results to those in the specified folder.Key: folder_id Value: 1234. This key and value combination retrieves scans from folder '1234' to obtain information on vulnerability definitions.
note

The option keys and values are case-sensitive as they are shown in this documentation.

APIs

The Tenable Nessus connector uses the Nessus API. Specifically, it uses the following endpoints:

Table 6: Nessus API Endpoints

Connector ObjectAPI Endpoints
HostGET /scans
GET /scans/{scan_id}
POST /scans/{scan_id}/export
GET /scans/{scan_id}/export/{file_id}/download
GET /scans/{scan_id}/export/{file_id}/status
ScanGET /scans
GET /scans/{scan_id}
VulnerabilityGET /scans
GET /scans/{scan_id}
POST /scans/{scan_id}/export
GET /scans/{scan_id}/export/{file_id}/download
GET /scans/{scan_id}/export/{file_id}/status
Vulnerability DefinitionGET /scans
GET /scans/{scan_id}
GET /plugins/plugin

Changelog

The Tenable Nessus connector has undergone the following changes:

3.1.16

  • Addressed precision issues by changing the data type for CVSS scores from Float to Double.

3.1.15

  • Changed the SOURCE_SEVERITY attribute to a String type.
  • Added a SOURCE_SEVERITY_SCORE attribute in the Dynamic Code Finding Definition object.

3.1.12

  • Added a new setting to configure maximum retries.

3.1.2

  • Added a check for null or empty dates.

3.0.5

  • Added a PATCH_PUBLICATION_DATE attribute in the Vulnerability Definition object.

3.0.2