The Tenable connector gathers data about devices and vulnerabilities from Tenable.io. The connector imports vulnerability data for devices that have been scanned by Tenable within the last 30 days. If the last scan was more than 30 days ago, no vulnerability data is imported.
- Host name and display name
- MAC address and IP address
- OS type
- Tenable UUID, Agent UUID, and agent name
- Discovery date and last scan date
- Installed software
- Vulnerability status and severity
- VPR score
- Risk factors/scores
- Tenable plugin ID and family
- Asset tag values
- Azure VM ID and Resource ID
- AWS EC2 information, including the AWS ID
A Tenable connector has the following options:
- Connector name: A name for the connector.
- Connector server name: The name of the connector server that this connector is associated with. Each connector can only be associated with one connector server. If you added the connector to a specific connector server, this field may be populated for you. Otherwise, you can select the connector server from the list.
- Access key and Secret key. Keys for authentication and access to the data in Tenable. Create the keys
- Repeats: How often the connector should gather data.
- Start time: The time of day the connector should start running. To minimize the impact on your network and applications, we recommend that connectors generally run at night or on weekends.
- Active: Whether the connector is active or not. While the connector is active, it runs according to the schedule you create. If you clear the check box, the connector is inactive and will not gather data until the check box is enabled again and the connector is saved.
For details on configuring or using connectors, see Setting up connectors.