Tenable.io Vulnerability Management provides the most accurate information about dynamic assets and vulnerabilities in ever-changing environments.
This document provides information about the Tenable.io connector, which facilitates automated interactions, with a Tenable.io server using FortiSOAR™ playbooks. Add the Tenable.io connector as a step in FortiSOAR™ playbooks and perform automated operations, such as retrieving a list along with details of all the completed scans for a specified time duration, retrieving information about assets that are associated with a specified scan, and retrieving information about the vulnerabilities associated with a particular asset.
Use the Data Ingestion Wizard to easily ingest data into FortiSOAR™ by pulling scan data from Tenable.io. Currently, scan data ingested from Tenable.io is mapped to "scans" in FortiSOAR™. For more information, see the Data Ingestion Support section.
Connector Version: 1.3.0
Authored By: Fortinet
Certified: No
The following enhancements have been made to the Tenable.io connector in version 1.3.0:
Use the Content Hub to install the connector. For the detailed procedure to install a connector, click here.
You can also use the following yum command as a root user to install connectors from an SSH session:
yum install cyops-connector-tenable-io
For the procedure to configure a connector, click here.
In FortiSOAR™, on the Content Hub (or Connector Store) page, click the Manage tab, and then click the Tenable.io connector card. On the connector popup, click the Configurations tab to enter the required configuration details:
| Parameter | Description |
|---|---|
| Server URL | Specify the URL of the Tenable.io server to which you will connect and perform the automated operations. For example, cloud.tenable.com |
| Access Key | Specify the Access Key that is configured for your account to access the Tenable.io server to which you will connect and perform the automated operations. |
| Secret Key | Specify the Secret Key that is configured for your account to access the Tenable.io server to which you will connect and perform the automated operations. |
| Verify SSL | Specifies whether the SSL certificate for the server is to be verified or not. By default, this option is set as True. |
The following automated operations can be included in playbooks, and you can also use the annotations to access operations from FortiSOAR™:
| Function | Description | Annotation and Category |
|---|---|---|
| List Scans | Retrieves a list and the details of all the completed scans from the Tenable.io server, based on the time duration (such as 24 hours or the last 3 days) you have specified. | search_scans Investigation |
| Trigger Scan | Triggers a scan on the Tenable.io server based on the scan ID and optionally targets you have specified. | trigger_scan Investigation |
| List Scan's Assets | Retrieves information about assets from the Tenable.io server that are associated with a particular scan, based on the scan ID you have specified. | get_endpoints Investigation |
| List Asset's Vulnerabilities | Retrieves information about vulnerabilities from the Tenable.io server that are associated with a particular asset based on the asset UUID you have specified. | get_vulnerabilities Investigation |
| Get Vulnerability Information | Retrieves information about vulnerabilities from the Tenable.io server that are associated with a particular plugin based on the plugin ID you have specified. | vuln_details Investigation |
| Get Plugin Information | Retrieves information about a specific plugin from the Tenable.io server, based on the plugin ID you have specified. | plugin_details Investigation |
| Submit Vulnerability Export Job | Submits vulnerability export job used to export the vulnerabilities, which match the specified request criteria, from Tenanable.io. Vulnerabilities are exported from the Tenable.io server based on the chuck size and other input parameters you have specified. | submit_vuln_export_job Investigation |
| Get Vulnerability Export Status | Returns the status of a vulnerability export job from Tenanable.io based on the export UUID you have specified. | get_vuln_export_status Investigation |
| Download Vulnerability Export Chunk | Downloads the exported vulnerabilities, as a JSON file, from Tenable.io based on the export UUID and chunk ID you have specified. | download_vuln_export Investigation |
| List Vulnerability Export Jobs | Retrieves a list of vulnerability export jobs. This list includes the 1,000 most recent export jobs regardless of status. However, this list includes completed jobs only if the job was completed in the previous three days. | list_vuln_export_jobs Investigation |
| Cancel Vulnerability Export Job | Cancels the specified vulnerability export job in Tenanable.io based on the export UUID you have specified. | cancel_vuln_export_job Investigation |
| Submit Asset Export Job | Submits asset export job used to export the assets, which match the specified request criteria, from Tenanable.io. Assets are exported from the Tenable.io server based on the chuck size and other input parameters you have specified. | submit_asset_export_job Investigation |
| Get Asset Export Status | Returns the status of an asset export job from Tenanable.io based on the export UUID you have specified. | get_asset_export_status Investigation |
| Download Asset Export Chunk | Downloads the exported assets, as a JSON file, from Tenable.io based on the export UUID and chunk ID you have specified. | download_asset_export_chunk Investigation |
| List Asset Export Jobs | Retrieves a list of asset export jobs. This list includes the 1,000 most recent export jobs regardless of status. However, this list includes completed jobs only if the job was completed in the previous three days. | list_asset_export_jobs Investigation |
| Cancel Asset Export Job | Cancels the specified asset export job in Tenanable.io based on the export UUID you have specified. | cancel_asset_export_job Investigation |
| Parameter | Description |
|---|---|
| Completion Time | Select the time duration for which you want to retrieve a list and details of all the completed scans from Tenable.io. For example, if you choose Last 24 Hours, then the details of all the scans that were completed in the last 24 hours will be retrieved from the Tenable.io server. You can choose from the following options: Last 24 Hours, Last 3 Days, Last 5 Days, Last 7 Days, Last 15 Days, Last 25 Days, Last 30 Days, Last 50 Days, Last 60 Days, Last 90 Days, Last 120 Days, and Last 180 Days. |
The JSON output contains a list along with the details of all the completed scans retrieved from Tenable.io, based on the time duration you have specified.
The output contains the following populated JSON schema:
{
"starttime": "",
"uuid": "",
"enabled": "",
"legacy": "",
"read": "",
"owner": "",
"control": "",
"schedule_uuid": "",
"permissions": "",
"id": "",
"status": "",
"user_permissions": "",
"name": "",
"rrules": "",
"type": "",
"creation_date": "",
"last_modification_date": "",
"timezone": "",
"shared": ""
}
| Parameter | Description |
|---|---|
| Scan ID | Specify the ID of the scan that you want to trigger on Tenable.io. |
| Targets | (Optional) Specify the targets to be scanned instead of the default targets. Value for this field can be an array where each index is a target or an array with a single index of comma-separated targets. For example, ['111.122.22.1', 'example.com'] |
The JSON output contains the status of the trigger scan operation. The JSON output returns a Success message if the scan is triggered successfully or an Error message containing the reason for failure. The JSON output also contains the UUID of the triggered scan.
The output contains the following populated JSON schema:
{
"scan_uuid": ""
}
| Parameter | Description |
|---|---|
| Scan ID | Specify the ID of the scan whose associated assets' information you want to retrieve from Tenable.io. |
The JSON output contains information about the asset(s) associated with a specific scan retrieved from Tenable.io, based on the scan ID you have specified.
The output contains the following populated JSON schema:
{
"uuid": "",
"mac": [],
"ip": [],
"time_start": "",
"fqdn": [],
"os": [],
"time_end": ""
}
| Parameter | Description |
|---|---|
| Asset UUID | Specify the UUID of the asset whose associated vulnerabilities information you want to retrieve from Tenable.io. |
The JSON output contains information about the vulnerabilities associated with a specific asset retrieved from Tenable.io, based on the asset UUID you have specified.
The output contains the following populated JSON schema:
{
"plugin_id": "",
"plugin_family": "",
"counts_by_severity": [
{
"value": "",
"count": ""
}
],
"count": "",
"severity": "",
"vulnerability_state": "",
"plugin_name": "",
"accepted_count": "",
"recasted_count": ""
}
| Parameter | Description |
|---|---|
| Plugin ID | Specify the ID of the plugin whose associated vulnerabilities details you want to retrieve from Tenable.io. |
The JSON output contains information about the vulnerabilities associated with a specific plugin retrieved from Tenable.io, based on the plugin ID you have specified.
The output contains the following populated JSON schema:
{
"info": {
"count": "",
"vuln_count": "",
"description": "",
"synopsis": "",
"solution": "",
"discovery": {
"seen_first": "",
"seen_last": ""
},
"severity": "",
"plugin_details": {
"name": "",
"type": "",
"family": "",
"version": "",
"severity": "",
"plugin_id": "",
"publication_date": "",
"modification_date": ""
},
"reference_information": [
{
"name": "",
"url": "",
"values": []
}
],
"risk_information": {
"risk_factor": "",
"cvss_vector": "",
"cvss_base_score": "",
"cvss_temporal_vector": "",
"cvss_temporal_score": "",
"cvss3_vector": "",
"cvss3_base_score": "",
"cvss3_temporal_vector": "",
"cvss3_temporal_score": "",
"stig_severity": ""
},
"see_also": [],
"vulnerability_information": {
"vulnerability_publication_date": "",
"exploited_by_malware": "",
"patch_publication_date": "",
"exploit_available": "",
"exploitability_ease": "",
"asset_inventory": "",
"default_account": "",
"exploited_by_nessus": "",
"in_the_news": "",
"malware": "",
"unsupported_by_vendor": "",
"cpe": "",
"exploit_frameworks": [
{
"name": ""
},
{
"name": "",
"exploits": [
{
"name": "",
"url": ""
}
]
}
]
},
"vpr": {
"score": "",
"drivers": {
"age_of_vuln": {
"lower_bound": "",
"upper_bound": ""
},
"exploit_code_maturity": "",
"cvss3_impact_score": "",
"cvss_impact_score_predicted": "",
"threat_intensity_last28": "",
"threat_recency": {
"lower_bound": "",
"upper_bound": ""
},
"threat_sources_last28": [],
"product_coverage": ""
},
"updated": ""
}
}
}
| Parameter | Description |
|---|---|
| Plugin ID | Specify the ID of the plugin whose details you want to retrieve from Tenable.io. |
The JSON output contains information about the specific plugin retrieved from Tenable.io, based on the plugin ID you have specified.
The output contains the following populated JSON schema:
{
"id": "",
"family_name": "",
"name": "",
"attributes": [
{
"attribute_name": "",
"attribute_value": ""
}
]
}
| Parameter | Description |
|---|---|
| Chunk Size | Specify the maximum number of vulnerabilities that you want to export, per chunk, from Tenable.io. |
| CIDR Range | Specify the CIDR range to restrict the search for vulnerabilities in Tenable.io. If specified, the search gets restricted to assets that are assigned to IP addresses specified within the specified CIDR range. |
| Severity | Select one or more severities that are assigned to the vulnerabilities that you want to export from Tenable.io. You can choose from the following options: Info, Low, Medium, High, or Critical. By default, all severity levels are selected. |
| From | (Optional) Select the start date for the range of data (vulnerabilities) you want to export from Tenable.io |
| State | (Optional) Select one or more states of the vulnerabilities that you want to export from Tenable.io. You can choose from the following options: Open, Reopened or Fixed. |
The output contains the following populated JSON schema:
{
"export_uuid": ""
}
| Parameter | Description |
|---|---|
| Export UUID | Specify the UUID of the vulnerability export request whose export status you want to retrieve from Tenable.io. |
The output contains the following populated JSON schema:
{
"uuid": "",
"status": "",
"chunks_available": [],
"chunks_failed": [],
"chunks_cancelled": [],
"total_chunks": "",
"chunks_available_count": "",
"empty_chunks_count": "",
"finished_chunks": "",
"filters": {
"state": [],
"tags": {},
"since": "",
"first_found": "",
"last_found": "",
"last_fixed": "",
"first_seen": "",
"last_seen": "",
"indexed_at": ""
},
"num_assets_per_chunk": "",
"created": ""
}
| Parameter | Description |
|---|---|
| Export UUID | Specify the UUID for the vulnerability export request whose chunk you want to download from Tenable.io. |
| Chunk ID | Specify the ID of the chunk of the vulnerability export request that you want to download from Tenable.io. |
The output contains the following populated JSON schema:
{
"asset": {
"fqdn": "",
"hostname": "",
"uuid": "",
"ipv4": "",
"operating_system": [],
"network_id": "",
"tracked": ""
},
"output": "",
"plugin": {
"cve": [],
"cvss_base_score": "",
"cvss_temporal_score": "",
"cvss_temporal_vector": {
"exploitability": "",
"remediation_level": "",
"report_confidence": "",
"raw": ""
},
"cvss_vector": {
"access_complexity": "",
"access_vector": "",
"authentication": "",
"confidentiality_impact": "",
"integrity_impact": "",
"availability_impact": "",
"raw": ""
},
"description": "",
"family": "",
"family_id": "",
"has_patch": "",
"id": "",
"name": "",
"risk_factor": "",
"see_also": [],
"solution": "",
"synopsis": "",
"vpr": {
"score": "",
"drivers": {
"age_of_vuln": {
"lower_bound": "",
"upper_bound": ""
},
"exploit_code_maturity": "",
"cvss_impact_score_predicted": "",
"cvss3_impact_score": "",
"threat_intensity_last28": "",
"threat_sources_last28": [],
"product_coverage": ""
},
"updated": ""
}
},
"port": {
"port": "",
"protocol": ""
},
"scan": {
"completed_at": "",
"schedule_uuid": "",
"started_at": "",
"uuid": ""
},
"severity": "",
"severity_id": "",
"severity_default_id": "",
"severity_modification_type": "",
"first_found": "",
"last_found": "",
"indexed_at": "",
"state": ""
}
None.
The output contains the following populated JSON schema:
{
"exports": [
{
"uuid": "",
"status": "",
"total_chunks": "",
"chunks_available_count": "",
"empty_chunks_count": "",
"finished_chunks": "",
"filters": {
"state": [],
"tags": {
"tag.": []
},
"since": "",
"first_found": "",
"last_found": "",
"last_fixed": "",
"first_seen": "",
"last_seen": "",
"indexed_at": ""
},
"num_assets_per_chunk": "",
"created": ""
}
]
}
| Parameter | Description |
|---|---|
| Export UUID | Specify the UUID of the vulnerability export job that you want to cancel in Tenable.io. |
The output contains the following populated JSON schema:
{
"status": ""
}
| Parameter | Description |
|---|---|
| Chunk Size | Specify the maximum number of assets that you want to export, per chunk, from Tenable.io. |
| Last Assessed Time | Select the last assessed DateTime of the assets from when you want to export assets from Tenable.io. |
The output contains the following populated JSON schema:
{
"export_uuid": ""
}
| Parameter | Description |
|---|---|
| Export UUID | Specify the UUID of the asset export request whose export status you want to retrieve from Tenable.io. |
The output contains the following populated JSON schema:
{
"status": "",
"chunks_available": []
}
| Parameter | Description |
|---|---|
| Export UUID | Specify the UUID for the asset export request whose chunk you want to download from Tenable.io. |
| Chunk ID | Specify the ID of the chunk of the asset export request that you want to download from Tenable.io. |
The output contains the following populated JSON schema:
{
"id": "",
"has_agent": "",
"has_plugin_results": "",
"created_at": "",
"terminated_at": "",
"terminated_by": "",
"updated_at": "",
"deleted_at": "",
"deleted_by": "",
"first_seen": "",
"last_seen": "",
"first_scan_time": "",
"last_scan_time": "",
"last_authenticated_scan_date": "",
"last_licensed_scan_date": "",
"last_scan_id": "",
"last_schedule_id": "",
"azure_vm_id": "",
"azure_resource_id": "",
"gcp_project_id": "",
"gcp_zone": "",
"gcp_instance_id": "",
"aws_ec2_instance_ami_id": "",
"aws_ec2_instance_id": "",
"agent_uuid": "",
"bios_uuid": "",
"aws_owner_id": "",
"aws_availability_zone": "",
"aws_region": "",
"aws_vpc_id": "",
"aws_ec2_instance_group_name": "",
"aws_ec2_instance_state_name": "",
"aws_ec2_instance_type": "",
"aws_subnet_id": "",
"aws_ec2_product_code": "",
"aws_ec2_name": "",
"mcafee_epo_guid": "",
"mcafee_epo_agent_guid": "",
"servicenow_sysid": "",
"bigfix_asset_id": "",
"agent_names": [],
"installed_software": [],
"ipv4s": [],
"ipv6s": [],
"fqdns": [],
"mac_addresses": [],
"netbios_names": [],
"operating_systems": [],
"system_types": [],
"hostnames": [],
"ssh_fingerprints": [],
"qualys_asset_ids": [],
"qualys_host_ids": [],
"manufacturer_tpm_ids": [],
"symantec_ep_hardware_keys": [],
"sources": [
{
"name": "",
"first_seen": "",
"last_seen": ""
}
],
"tags": [
{
"uuid": "",
"key": "",
"value": "",
"added_by": "",
"added_at": ""
}
],
"network_interfaces": [
{
"name": "",
"mac_address": [],
"ipv4": [],
"ipv6": [],
"fqdn": []
}
],
"acr_score": "",
"exposure_score": ""
}
None.
The output contains the following populated JSON schema:
{
"exports": [
{
"uuid": "",
"status": "",
"total_chunks": "",
"filters": "",
"finished_chunks": "",
"num_assets_per_chunk": "",
"created": ""
}
]
}
| Parameter | Description |
|---|---|
| Export UUID | Specify the UUID of the asset export job that you want to cancel in Tenable.io. |
The output contains the following populated JSON schema:
{
"status": ""
}
The Sample - Tenable.io - 1.3.0 playbook collection comes bundled with the Tenable.io connector. This playbook contains steps using which you can perform all supported actions. You can see the bundled playbooks in the Automation > Playbooks section in FortiSOAR™ after importing the Tenable.io connector.
Note: If you are planning to use any of the sample playbooks in your environment, ensure that you clone those playbooks and move them to a different collection since the sample playbook collection gets deleted during the connector upgrade and delete.
Use the Data Ingestion Wizard to easily ingest data into FortiSOAR™ by pulling scan data from Tenable.io. Currently, scan data ingested from Tenable.io is mapped to "Scans" in FortiSOAR™. For more information on the Data Ingestion Wizard, see the "Connectors Guide" in the FortiSOAR™ product documentation.
You can configure data ingestion using the “Data Ingestion Wizard” to seamlessly map the incoming Tenable.io "Scan data" to FortiSOAR™ "Scans".
The Data Ingestion Wizard enables you to configure the scheduled pulling of data from Tenable.io into FortiSOAR™. It also lets you pull some sample data from Tenable.io using which you can define the mapping of data between Tenable.io and FortiSOAR™. The mapping of common fields is generally already done by the Data Ingestion Wizard; users are mostly required to only map any custom fields that are added to the Tenable.io scan data.
Note: For the ingestion playbooks to work you must install and configure the 'SOAR Framework' and 'Vulnerability Management' Solution Packs on your FortiSOAR instance. For more information on solution packs see the respective solution pack document on the Content Hub Portal.



1, 0, and 1 respectively. This means that the scan data will be pulled from Tenable.io on the first day of every month at 12:01 AM:
Tenable.io Vulnerability Management provides the most accurate information about dynamic assets and vulnerabilities in ever-changing environments.
This document provides information about the Tenable.io connector, which facilitates automated interactions, with a Tenable.io server using FortiSOAR™ playbooks. Add the Tenable.io connector as a step in FortiSOAR™ playbooks and perform automated operations, such as retrieving a list along with details of all the completed scans for a specified time duration, retrieving information about assets that are associated with a specified scan, and retrieving information about the vulnerabilities associated with a particular asset.
Use the Data Ingestion Wizard to easily ingest data into FortiSOAR™ by pulling scan data from Tenable.io. Currently, scan data ingested from Tenable.io is mapped to "scans" in FortiSOAR™. For more information, see the Data Ingestion Support section.
Connector Version: 1.3.0
Authored By: Fortinet
Certified: No
The following enhancements have been made to the Tenable.io connector in version 1.3.0:
Use the Content Hub to install the connector. For the detailed procedure to install a connector, click here.
You can also use the following yum command as a root user to install connectors from an SSH session:
yum install cyops-connector-tenable-io
For the procedure to configure a connector, click here.
In FortiSOAR™, on the Content Hub (or Connector Store) page, click the Manage tab, and then click the Tenable.io connector card. On the connector popup, click the Configurations tab to enter the required configuration details:
| Parameter | Description |
|---|---|
| Server URL | Specify the URL of the Tenable.io server to which you will connect and perform the automated operations. For example, cloud.tenable.com |
| Access Key | Specify the Access Key that is configured for your account to access the Tenable.io server to which you will connect and perform the automated operations. |
| Secret Key | Specify the Secret Key that is configured for your account to access the Tenable.io server to which you will connect and perform the automated operations. |
| Verify SSL | Specifies whether the SSL certificate for the server is to be verified or not. By default, this option is set as True. |
The following automated operations can be included in playbooks, and you can also use the annotations to access operations from FortiSOAR™:
| Function | Description | Annotation and Category |
|---|---|---|
| List Scans | Retrieves a list and the details of all the completed scans from the Tenable.io server, based on the time duration (such as 24 hours or the last 3 days) you have specified. | search_scans Investigation |
| Trigger Scan | Triggers a scan on the Tenable.io server based on the scan ID and optionally targets you have specified. | trigger_scan Investigation |
| List Scan's Assets | Retrieves information about assets from the Tenable.io server that are associated with a particular scan, based on the scan ID you have specified. | get_endpoints Investigation |
| List Asset's Vulnerabilities | Retrieves information about vulnerabilities from the Tenable.io server that are associated with a particular asset based on the asset UUID you have specified. | get_vulnerabilities Investigation |
| Get Vulnerability Information | Retrieves information about vulnerabilities from the Tenable.io server that are associated with a particular plugin based on the plugin ID you have specified. | vuln_details Investigation |
| Get Plugin Information | Retrieves information about a specific plugin from the Tenable.io server, based on the plugin ID you have specified. | plugin_details Investigation |
| Submit Vulnerability Export Job | Submits vulnerability export job used to export the vulnerabilities, which match the specified request criteria, from Tenanable.io. Vulnerabilities are exported from the Tenable.io server based on the chuck size and other input parameters you have specified. | submit_vuln_export_job Investigation |
| Get Vulnerability Export Status | Returns the status of a vulnerability export job from Tenanable.io based on the export UUID you have specified. | get_vuln_export_status Investigation |
| Download Vulnerability Export Chunk | Downloads the exported vulnerabilities, as a JSON file, from Tenable.io based on the export UUID and chunk ID you have specified. | download_vuln_export Investigation |
| List Vulnerability Export Jobs | Retrieves a list of vulnerability export jobs. This list includes the 1,000 most recent export jobs regardless of status. However, this list includes completed jobs only if the job was completed in the previous three days. | list_vuln_export_jobs Investigation |
| Cancel Vulnerability Export Job | Cancels the specified vulnerability export job in Tenanable.io based on the export UUID you have specified. | cancel_vuln_export_job Investigation |
| Submit Asset Export Job | Submits asset export job used to export the assets, which match the specified request criteria, from Tenanable.io. Assets are exported from the Tenable.io server based on the chuck size and other input parameters you have specified. | submit_asset_export_job Investigation |
| Get Asset Export Status | Returns the status of an asset export job from Tenanable.io based on the export UUID you have specified. | get_asset_export_status Investigation |
| Download Asset Export Chunk | Downloads the exported assets, as a JSON file, from Tenable.io based on the export UUID and chunk ID you have specified. | download_asset_export_chunk Investigation |
| List Asset Export Jobs | Retrieves a list of asset export jobs. This list includes the 1,000 most recent export jobs regardless of status. However, this list includes completed jobs only if the job was completed in the previous three days. | list_asset_export_jobs Investigation |
| Cancel Asset Export Job | Cancels the specified asset export job in Tenanable.io based on the export UUID you have specified. | cancel_asset_export_job Investigation |
| Parameter | Description |
|---|---|
| Completion Time | Select the time duration for which you want to retrieve a list and details of all the completed scans from Tenable.io. For example, if you choose Last 24 Hours, then the details of all the scans that were completed in the last 24 hours will be retrieved from the Tenable.io server. You can choose from the following options: Last 24 Hours, Last 3 Days, Last 5 Days, Last 7 Days, Last 15 Days, Last 25 Days, Last 30 Days, Last 50 Days, Last 60 Days, Last 90 Days, Last 120 Days, and Last 180 Days. |
The JSON output contains a list along with the details of all the completed scans retrieved from Tenable.io, based on the time duration you have specified.
The output contains the following populated JSON schema:
{
"starttime": "",
"uuid": "",
"enabled": "",
"legacy": "",
"read": "",
"owner": "",
"control": "",
"schedule_uuid": "",
"permissions": "",
"id": "",
"status": "",
"user_permissions": "",
"name": "",
"rrules": "",
"type": "",
"creation_date": "",
"last_modification_date": "",
"timezone": "",
"shared": ""
}
| Parameter | Description |
|---|---|
| Scan ID | Specify the ID of the scan that you want to trigger on Tenable.io. |
| Targets | (Optional) Specify the targets to be scanned instead of the default targets. Value for this field can be an array where each index is a target or an array with a single index of comma-separated targets. For example, ['111.122.22.1', 'example.com'] |
The JSON output contains the status of the trigger scan operation. The JSON output returns a Success message if the scan is triggered successfully or an Error message containing the reason for failure. The JSON output also contains the UUID of the triggered scan.
The output contains the following populated JSON schema:
{
"scan_uuid": ""
}
| Parameter | Description |
|---|---|
| Scan ID | Specify the ID of the scan whose associated assets' information you want to retrieve from Tenable.io. |
The JSON output contains information about the asset(s) associated with a specific scan retrieved from Tenable.io, based on the scan ID you have specified.
The output contains the following populated JSON schema:
{
"uuid": "",
"mac": [],
"ip": [],
"time_start": "",
"fqdn": [],
"os": [],
"time_end": ""
}
| Parameter | Description |
|---|---|
| Asset UUID | Specify the UUID of the asset whose associated vulnerabilities information you want to retrieve from Tenable.io. |
The JSON output contains information about the vulnerabilities associated with a specific asset retrieved from Tenable.io, based on the asset UUID you have specified.
The output contains the following populated JSON schema:
{
"plugin_id": "",
"plugin_family": "",
"counts_by_severity": [
{
"value": "",
"count": ""
}
],
"count": "",
"severity": "",
"vulnerability_state": "",
"plugin_name": "",
"accepted_count": "",
"recasted_count": ""
}
| Parameter | Description |
|---|---|
| Plugin ID | Specify the ID of the plugin whose associated vulnerabilities details you want to retrieve from Tenable.io. |
The JSON output contains information about the vulnerabilities associated with a specific plugin retrieved from Tenable.io, based on the plugin ID you have specified.
The output contains the following populated JSON schema:
{
"info": {
"count": "",
"vuln_count": "",
"description": "",
"synopsis": "",
"solution": "",
"discovery": {
"seen_first": "",
"seen_last": ""
},
"severity": "",
"plugin_details": {
"name": "",
"type": "",
"family": "",
"version": "",
"severity": "",
"plugin_id": "",
"publication_date": "",
"modification_date": ""
},
"reference_information": [
{
"name": "",
"url": "",
"values": []
}
],
"risk_information": {
"risk_factor": "",
"cvss_vector": "",
"cvss_base_score": "",
"cvss_temporal_vector": "",
"cvss_temporal_score": "",
"cvss3_vector": "",
"cvss3_base_score": "",
"cvss3_temporal_vector": "",
"cvss3_temporal_score": "",
"stig_severity": ""
},
"see_also": [],
"vulnerability_information": {
"vulnerability_publication_date": "",
"exploited_by_malware": "",
"patch_publication_date": "",
"exploit_available": "",
"exploitability_ease": "",
"asset_inventory": "",
"default_account": "",
"exploited_by_nessus": "",
"in_the_news": "",
"malware": "",
"unsupported_by_vendor": "",
"cpe": "",
"exploit_frameworks": [
{
"name": ""
},
{
"name": "",
"exploits": [
{
"name": "",
"url": ""
}
]
}
]
},
"vpr": {
"score": "",
"drivers": {
"age_of_vuln": {
"lower_bound": "",
"upper_bound": ""
},
"exploit_code_maturity": "",
"cvss3_impact_score": "",
"cvss_impact_score_predicted": "",
"threat_intensity_last28": "",
"threat_recency": {
"lower_bound": "",
"upper_bound": ""
},
"threat_sources_last28": [],
"product_coverage": ""
},
"updated": ""
}
}
}
| Parameter | Description |
|---|---|
| Plugin ID | Specify the ID of the plugin whose details you want to retrieve from Tenable.io. |
The JSON output contains information about the specific plugin retrieved from Tenable.io, based on the plugin ID you have specified.
The output contains the following populated JSON schema:
{
"id": "",
"family_name": "",
"name": "",
"attributes": [
{
"attribute_name": "",
"attribute_value": ""
}
]
}
| Parameter | Description |
|---|---|
| Chunk Size | Specify the maximum number of vulnerabilities that you want to export, per chunk, from Tenable.io. |
| CIDR Range | Specify the CIDR range to restrict the search for vulnerabilities in Tenable.io. If specified, the search gets restricted to assets that are assigned to IP addresses specified within the specified CIDR range. |
| Severity | Select one or more severities that are assigned to the vulnerabilities that you want to export from Tenable.io. You can choose from the following options: Info, Low, Medium, High, or Critical. By default, all severity levels are selected. |
| From | (Optional) Select the start date for the range of data (vulnerabilities) you want to export from Tenable.io |
| State | (Optional) Select one or more states of the vulnerabilities that you want to export from Tenable.io. You can choose from the following options: Open, Reopened or Fixed. |
The output contains the following populated JSON schema:
{
"export_uuid": ""
}
| Parameter | Description |
|---|---|
| Export UUID | Specify the UUID of the vulnerability export request whose export status you want to retrieve from Tenable.io. |
The output contains the following populated JSON schema:
{
"uuid": "",
"status": "",
"chunks_available": [],
"chunks_failed": [],
"chunks_cancelled": [],
"total_chunks": "",
"chunks_available_count": "",
"empty_chunks_count": "",
"finished_chunks": "",
"filters": {
"state": [],
"tags": {},
"since": "",
"first_found": "",
"last_found": "",
"last_fixed": "",
"first_seen": "",
"last_seen": "",
"indexed_at": ""
},
"num_assets_per_chunk": "",
"created": ""
}
| Parameter | Description |
|---|---|
| Export UUID | Specify the UUID for the vulnerability export request whose chunk you want to download from Tenable.io. |
| Chunk ID | Specify the ID of the chunk of the vulnerability export request that you want to download from Tenable.io. |
The output contains the following populated JSON schema:
{
"asset": {
"fqdn": "",
"hostname": "",
"uuid": "",
"ipv4": "",
"operating_system": [],
"network_id": "",
"tracked": ""
},
"output": "",
"plugin": {
"cve": [],
"cvss_base_score": "",
"cvss_temporal_score": "",
"cvss_temporal_vector": {
"exploitability": "",
"remediation_level": "",
"report_confidence": "",
"raw": ""
},
"cvss_vector": {
"access_complexity": "",
"access_vector": "",
"authentication": "",
"confidentiality_impact": "",
"integrity_impact": "",
"availability_impact": "",
"raw": ""
},
"description": "",
"family": "",
"family_id": "",
"has_patch": "",
"id": "",
"name": "",
"risk_factor": "",
"see_also": [],
"solution": "",
"synopsis": "",
"vpr": {
"score": "",
"drivers": {
"age_of_vuln": {
"lower_bound": "",
"upper_bound": ""
},
"exploit_code_maturity": "",
"cvss_impact_score_predicted": "",
"cvss3_impact_score": "",
"threat_intensity_last28": "",
"threat_sources_last28": [],
"product_coverage": ""
},
"updated": ""
}
},
"port": {
"port": "",
"protocol": ""
},
"scan": {
"completed_at": "",
"schedule_uuid": "",
"started_at": "",
"uuid": ""
},
"severity": "",
"severity_id": "",
"severity_default_id": "",
"severity_modification_type": "",
"first_found": "",
"last_found": "",
"indexed_at": "",
"state": ""
}
None.
The output contains the following populated JSON schema:
{
"exports": [
{
"uuid": "",
"status": "",
"total_chunks": "",
"chunks_available_count": "",
"empty_chunks_count": "",
"finished_chunks": "",
"filters": {
"state": [],
"tags": {
"tag.": []
},
"since": "",
"first_found": "",
"last_found": "",
"last_fixed": "",
"first_seen": "",
"last_seen": "",
"indexed_at": ""
},
"num_assets_per_chunk": "",
"created": ""
}
]
}
| Parameter | Description |
|---|---|
| Export UUID | Specify the UUID of the vulnerability export job that you want to cancel in Tenable.io. |
The output contains the following populated JSON schema:
{
"status": ""
}
| Parameter | Description |
|---|---|
| Chunk Size | Specify the maximum number of assets that you want to export, per chunk, from Tenable.io. |
| Last Assessed Time | Select the last assessed DateTime of the assets from when you want to export assets from Tenable.io. |
The output contains the following populated JSON schema:
{
"export_uuid": ""
}
| Parameter | Description |
|---|---|
| Export UUID | Specify the UUID of the asset export request whose export status you want to retrieve from Tenable.io. |
The output contains the following populated JSON schema:
{
"status": "",
"chunks_available": []
}
| Parameter | Description |
|---|---|
| Export UUID | Specify the UUID for the asset export request whose chunk you want to download from Tenable.io. |
| Chunk ID | Specify the ID of the chunk of the asset export request that you want to download from Tenable.io. |
The output contains the following populated JSON schema:
{
"id": "",
"has_agent": "",
"has_plugin_results": "",
"created_at": "",
"terminated_at": "",
"terminated_by": "",
"updated_at": "",
"deleted_at": "",
"deleted_by": "",
"first_seen": "",
"last_seen": "",
"first_scan_time": "",
"last_scan_time": "",
"last_authenticated_scan_date": "",
"last_licensed_scan_date": "",
"last_scan_id": "",
"last_schedule_id": "",
"azure_vm_id": "",
"azure_resource_id": "",
"gcp_project_id": "",
"gcp_zone": "",
"gcp_instance_id": "",
"aws_ec2_instance_ami_id": "",
"aws_ec2_instance_id": "",
"agent_uuid": "",
"bios_uuid": "",
"aws_owner_id": "",
"aws_availability_zone": "",
"aws_region": "",
"aws_vpc_id": "",
"aws_ec2_instance_group_name": "",
"aws_ec2_instance_state_name": "",
"aws_ec2_instance_type": "",
"aws_subnet_id": "",
"aws_ec2_product_code": "",
"aws_ec2_name": "",
"mcafee_epo_guid": "",
"mcafee_epo_agent_guid": "",
"servicenow_sysid": "",
"bigfix_asset_id": "",
"agent_names": [],
"installed_software": [],
"ipv4s": [],
"ipv6s": [],
"fqdns": [],
"mac_addresses": [],
"netbios_names": [],
"operating_systems": [],
"system_types": [],
"hostnames": [],
"ssh_fingerprints": [],
"qualys_asset_ids": [],
"qualys_host_ids": [],
"manufacturer_tpm_ids": [],
"symantec_ep_hardware_keys": [],
"sources": [
{
"name": "",
"first_seen": "",
"last_seen": ""
}
],
"tags": [
{
"uuid": "",
"key": "",
"value": "",
"added_by": "",
"added_at": ""
}
],
"network_interfaces": [
{
"name": "",
"mac_address": [],
"ipv4": [],
"ipv6": [],
"fqdn": []
}
],
"acr_score": "",
"exposure_score": ""
}
None.
The output contains the following populated JSON schema:
{
"exports": [
{
"uuid": "",
"status": "",
"total_chunks": "",
"filters": "",
"finished_chunks": "",
"num_assets_per_chunk": "",
"created": ""
}
]
}
| Parameter | Description |
|---|---|
| Export UUID | Specify the UUID of the asset export job that you want to cancel in Tenable.io. |
The output contains the following populated JSON schema:
{
"status": ""
}
The Sample - Tenable.io - 1.3.0 playbook collection comes bundled with the Tenable.io connector. This playbook contains steps using which you can perform all supported actions. You can see the bundled playbooks in the Automation > Playbooks section in FortiSOAR™ after importing the Tenable.io connector.
Note: If you are planning to use any of the sample playbooks in your environment, ensure that you clone those playbooks and move them to a different collection since the sample playbook collection gets deleted during the connector upgrade and delete.
Use the Data Ingestion Wizard to easily ingest data into FortiSOAR™ by pulling scan data from Tenable.io. Currently, scan data ingested from Tenable.io is mapped to "Scans" in FortiSOAR™. For more information on the Data Ingestion Wizard, see the "Connectors Guide" in the FortiSOAR™ product documentation.
You can configure data ingestion using the “Data Ingestion Wizard” to seamlessly map the incoming Tenable.io "Scan data" to FortiSOAR™ "Scans".
The Data Ingestion Wizard enables you to configure the scheduled pulling of data from Tenable.io into FortiSOAR™. It also lets you pull some sample data from Tenable.io using which you can define the mapping of data between Tenable.io and FortiSOAR™. The mapping of common fields is generally already done by the Data Ingestion Wizard; users are mostly required to only map any custom fields that are added to the Tenable.io scan data.
Note: For the ingestion playbooks to work you must install and configure the 'SOAR Framework' and 'Vulnerability Management' Solution Packs on your FortiSOAR instance. For more information on solution packs see the respective solution pack document on the Content Hub Portal.



1, 0, and 1 respectively. This means that the scan data will be pulled from Tenable.io on the first day of every month at 12:01 AM: