/
vuln.tenable
vuln.tenable
[ 1 Introduction ] [ 2 Tag structure ] [ 3 How is the data sent to Devo? ]
Introduction
The tags beginning with vuln.tenable identify events generated by Tenable.io.
Tag structure
The full tag must have four levels. The first three are fixed as vuln.tenable.io. The fourth level identifies the type of events sent.
Technology | Brand | Product | Type |
---|---|---|---|
vuln | tenable | io |
|
Therefore, the valid tags and tables include:
vuln.tenable.io.assets
vuln.tenable.io.agents
vuln.tenable.io.audit_log
vuln.tenable.io.plugins
vuln.tenable.io.scanners
vuln.tenable.io.scans
How is the data sent to Devo?
To send logs to these tables, Devo provides a collector that you can download and use to send the required events to your Devo domain. You can learn how to use it in Tenable.io collector.
, multiple selections available,
Related content
vuln.tenable
vuln.tenable
More like this
vuln.qualys
vuln.qualys
More like this
Tenable.io collector
Tenable.io collector
More like this
vuln.hackerone
vuln.hackerone
More like this
About Devo tags
About Devo tags
More like this
vuln - Vulnerability Detection
vuln - Vulnerability Detection
More like this