vuln.tenable
Introduction
The tags beginning with vuln.tenable
identify events generated by Tenable.
Valid tags and data tables
The full tag must have four levels. The first two are fixed as vuln.tenable
. The third level identifies the source and the fourth level identifies the type of events sent.
The valid tags and tables include:
Product / Service | Tags | Data tables |
---|---|---|
Tenable Vulnerability Management (formerly known as Tenable.io) |
|
|
|
| |
|
| |
|
| |
|
| |
|
| |
|
| |
Tenable Security Center |
|
|
Tenable Web Application Scanning |
|
|
How is the data sent to Devo?
To send logs to these tables, Devo provides a collector that you can download and use to send the required events to your Devo domain. You can learn how to use it in Tenable.io collector.
Table structure
These are the fields displayed by these tables: