Document toolboxDocument toolbox

vuln.tenable

Introduction

The tags beginning with vuln.tenable identify events generated by Tenable.

Valid tags and data tables

The full tag must have four levels. The first two are fixed as vuln.tenable. The third level identifies the source and the fourth level identifies the type of events sent.

The valid tags and tables include:

Product / Service

Tags

Data tables

Product / Service

Tags

Data tables

Tenable Vulnerability Management (formerly known as Tenable.io)

vuln.tenable.io.agents

vuln.tenable.io.agents

vuln.tenable.io.assets

vuln.tenable.io.assets

vuln.tenable.io.audit_log

vuln.tenable.io.audit_log

vuln.tenable.io.plugins

vuln.tenable.io.plugins

vuln.tenable.io.scanners

vuln.tenable.io.scanners

vuln.tenable.io.scans

vuln.tenable.io.scans

vuln.tenable.io.vulnerabilities

vuln.tenable.io.vulnerabilities

Tenable Security Center

vuln.tenable.sc.organization

vuln.tenable.sc.organization

Tenable Web Application Scanning

vuln.tenable.io.was_vulnerability

vuln.tenable.io.was_vulnerability

How is the data sent to Devo?

To send logs to these tables, Devo provides a collector that you can download and use to send the required events to your Devo domain. You can learn how to use it in Tenable.io collector.

Table structure

These are the fields displayed by these tables: