Skip to main content

Tenable Vulnerability Management Connector

Tenable Vulnerability Management Use the component to assess vulnerabilities; manage assets, users, agents, and more.

Connections

Tenable Connection

Connection to Tenable

InputCommentsDefault
Access Key
Secret Key

Actions

Add Agent to Group

Adds an agent to the agent group.

InputCommentsDefault
Connection
Group IDThe ID of the agent group.
Agent IDThe ID of the agent to add.
Debug RequestEnabling this flag will log out the current request.false

Add or Remove Asset Tags

Adds or removes tags from the specified assets, and returns the UUID of the asynchronous asset update job.

InputCommentsDefault
Connection
ActionSpecifies whether to add or remove tags.
AssetsAn array of asset UUIDs.
TagsAn array of tag value UUIDs.
Debug RequestEnabling this flag will log out the current request.false

Create Agent Group

Creates an agent group.

InputCommentsDefault
Connection
NameThe name of the agent group.
Debug RequestEnabling this flag will log out the current request.false

Create User

Creates a new user.

InputCommentsDefault
Connection
UsernameA valid username must be in the format, name@domain, where domain corresponds to a domain approved for your Tenable Vulnerability Management instance.
PasswordPasswords must be at least 12 characters long and contain at least one uppercase letter, one lowercase letter, one number, and one special character symbol.
PermissionsThe user permissions as described in Permissions. See https://developer.tenable.com/reference/users-create for more information.
NameThe name of the user (for example, first and last name).
EmailThe email address of the user. A valid email address must be in the format, name@domain, where domain corresponds to a domain approved for your Tenable Vulnerability Management instance. Administrators can create users with an email address that has a domain outside of the approved domains.
Debug RequestEnabling this flag will log out the current request.false

Delete Agent Group

Deletes an agent group.

InputCommentsDefault
Connection
Group IDThe ID or UUID of the agent group to delete.
Debug RequestEnabling this flag will log out the current request.false

Delete Asset

Deletes the specified asset.

InputCommentsDefault
Connection
Asset UUIDThe UUID of the asset.
Debug RequestEnabling this flag will log out the current request.false

Delete Scanner

Deletes and unlinks a scanner from Tenable Vulnerability Management.

InputCommentsDefault
Connection
Scanner IDThe ID of the scanner.
Debug RequestEnabling this flag will log out the current request.false

Delete User

Deletes a user.

InputCommentsDefault
Connection
User IDThe UUID (uuid) or unique ID (id) of the user.
Debug RequestEnabling this flag will log out the current request.false

Download Vulnerabilities

Downloads exported vulnerabilities as a JSON file.

InputCommentsDefault
Connection
Export UUIDThe UUID of the vulnerability export request.
Chunk IDThe ID of the chunk you want to export.
Debug RequestEnabling this flag will log out the current request.false

Export Assets

Exports all assets that match the request criteria.

InputCommentsDefault
Connection
Chunk SizeSpecifies the number of assets per exported chunk. The range is 100-10000.
Include Open PortsSpecifies whether or not to include open port findings from info-level plugins.false
FiltersSpecifies filters for exported assets. See https://developer.tenable.com/reference/exports-assets-request-export for more information.
Debug RequestEnabling this flag will log out the current request.false

Export Vulnerabilities

Exports vulnerabilities that match the request criteria.

InputCommentsDefault
Connection
Number of AssetsSpecifies the number of assets used to chunk the vulnerabilities.
Include UnlicensedSpecifies whether or not to include unlicensed assets.false
FiltersSpecifies filters for exported vulnerabilities. See https://developer.tenable.com/reference/exports-vulns-request-export for more information.
Debug RequestEnabling this flag will log out the current request.false

Get Agent

Returns the specified agent details for the specified scanner.

InputCommentsDefault
Connection
Agent IDThe ID of the agent to query.
Debug RequestEnabling this flag will log out the current request.false

Get Agent Group

Gets details for the agent group.

InputCommentsDefault
Connection
Group IDThe ID or UUID of the agent group to query.
Get AllIf true, all results will be returned (Offset and Limit will be ignored). If false, limit and offset will be used.true
FilterApply a filter in the format ::. For example, field1:match:sometext would match any records where the value of field1 contains sometext. You can use multiple query filters.
Filter TypeIf the filter type is 'and', the record is only returned if all filters match. If the filter type is 'or', the record is returned if any of the filters match.
Wildcard Filter TextWildcard search is a mechanism where multiple fields of a record are filtered against one specific filter string. If any one of the Wildcard Fields values matches against the filter string, then the record matches the wildcard filter. For a record to be returned, it must pass the wildcard filter (if there is one) AND the set of standard filters.
Wildcard FieldsA comma-delimited subset of Wildcard Fields to search when applying the wildcard filter. If Wildcard Filter Text is provided, but Wildcard Fields is not, then all 'wildcard_fields' values are searched against the wildcard filter text.
LimitThe number of records to retrieve. If this parameter is omitted, Tenable Vulnerability Management uses the default value of 50.
OffsetThe starting record to retrieve. If this parameter is omitted, Tenable Vulnerability Management uses the default value of 0.
SortThe field you want to use to sort the results by along with the sort order. The field is specified first, followed by a colon, and the order is specified second (asc or desc).
Debug RequestEnabling this flag will log out the current request.false

Get Asset

Returns details of the specified asset.

InputCommentsDefault
Connection
Asset UUIDThe UUID of the asset.
Debug RequestEnabling this flag will log out the current request.false

Get Asset Vulnerability Details

Retrieves the details for a vulnerability recorded on a specified asset.

InputCommentsDefault
Connection
Asset IDThe UUID of the asset.
Plugin IDThe ID of the plugin.
Date RangeThe number of days of data prior to and including today that should be returned.
Query Param FiltersFilters to apply in JSON format. See https://developer.tenable.com/reference/workbenches-asset-vulnerability-info for more information.
Debug RequestEnabling this flag will log out the current request.false

Get Plugin Details

Retrieves the details for a plugin.

InputCommentsDefault
Connection
Plugin IDThe ID of the plugin.
Date RangeThe number of days of data prior to and including today that should be returned.
Query Param FiltersFilters to apply in JSON format. See https://developer.tenable.com/reference/workbenches-vulnerability-info for more information.
Debug RequestEnabling this flag will log out the current request.false

Get Scanner

Returns details for the specified scanner.

InputCommentsDefault
Connection
Scanner IDThe ID of the scanner.
Debug RequestEnabling this flag will log out the current request.false

Get User

Returns details for a specific user.

InputCommentsDefault
Connection
User IDThe UUID (uuid) or unique ID (id) of the user.
Debug RequestEnabling this flag will log out the current request.false

Import Assets

Imports asset data in JSON format.

InputCommentsDefault
Connection
Asset ObjectsAn array of asset objects to import. Each asset object requires a value for at least one of the following properties: fqdn, ipv4, netbios_name, mac_address. See https://developer.tenable.com/reference/assets-import for more information.
SourceA user-defined name for the source of the import.
Debug RequestEnabling this flag will log out the current request.false

Import Vulnerabilities

Imports a list of vulnerabilities in JSON format.

InputCommentsDefault
Connection
VendorThe company that owns the product that is the source of the vulnerability data.
ProductThe name of the product from the vendor.
Data TypeThe type of scan that identified the vulnerabilities.
SourceA unique string value used to track the set of assets and vulnerabilities.
AssetsAn array of asset objects with vulnerabilities information. See https://developer.tenable.com/reference/vulnerabilities-import-v2 for more information.
CoverageThe coverage object. See https://developer.tenable.com/reference/vulnerabilities-import-v2 for more information.
Debug RequestEnabling this flag will log out the current request.false

List Agent Groups

Retrieves a list of agent groups.

InputCommentsDefault
Connection
Debug RequestEnabling this flag will log out the current request.false

List Agents

Returns a list of agents for the specified scanner.

InputCommentsDefault
Connection
Get AllIf true, all results will be returned (Offset and Limit will be ignored). If false, limit and offset will be used.true
FilterApply a filter in the format ::. For example, field1:match:sometext would match any records where the value of field1 contains sometext. You can use multiple query filters.
Filter TypeIf the filter type is 'and', the record is only returned if all filters match. If the filter type is 'or', the record is returned if any of the filters match.
Wildcard Filter TextWildcard search is a mechanism where multiple fields of a record are filtered against one specific filter string. If any one of the Wildcard Fields values matches against the filter string, then the record matches the wildcard filter. For a record to be returned, it must pass the wildcard filter (if there is one) AND the set of standard filters.
Wildcard FieldsA comma-delimited subset of Wildcard Fields to search when applying the wildcard filter. If Wildcard Filter Text is provided, but Wildcard Fields is not, then all 'wildcard_fields' values are searched against the wildcard filter text.
LimitThe number of records to retrieve. If this parameter is omitted, Tenable Vulnerability Management uses the default value of 50.
OffsetThe starting record to retrieve. If this parameter is omitted, Tenable Vulnerability Management uses the default value of 0.
SortThe field you want to use to sort the results by along with the sort order. The field is specified first, followed by a colon, and the order is specified second (asc or desc).
Debug RequestEnabling this flag will log out the current request.false

List Agents By Group

Returns a list of agents for the specified agent group.

InputCommentsDefault
Connection
Agent Group IDThe ID of the agent group to query for agents.
Get AllIf true, all results will be returned (Offset and Limit will be ignored). If false, limit and offset will be used.true
FilterApply a filter in the format ::. For example, field1:match:sometext would match any records where the value of field1 contains sometext. You can use multiple query filters.
Filter TypeIf the filter type is 'and', the record is only returned if all filters match. If the filter type is 'or', the record is returned if any of the filters match.
Wildcard Filter TextWildcard search is a mechanism where multiple fields of a record are filtered against one specific filter string. If any one of the Wildcard Fields values matches against the filter string, then the record matches the wildcard filter. For a record to be returned, it must pass the wildcard filter (if there is one) AND the set of standard filters.
Wildcard FieldsA comma-delimited subset of Wildcard Fields to search when applying the wildcard filter. If Wildcard Filter Text is provided, but Wildcard Fields is not, then all 'wildcard_fields' values are searched against the wildcard filter text.
LimitThe number of records to retrieve. If this parameter is omitted, Tenable Vulnerability Management uses the default value of 50.
OffsetThe starting record to retrieve. If this parameter is omitted, Tenable Vulnerability Management uses the default value of 0.
SortThe field you want to use to sort the results by along with the sort order. The field is specified first, followed by a colon, and the order is specified second (asc or desc).
Debug RequestEnabling this flag will log out the current request.false

List Assets

Lists up to 5,000 assets.

InputCommentsDefault
Connection
Debug RequestEnabling this flag will log out the current request.false

List Assets with Vulnerabilities

Returns a list of assets with vulnerabilities.

InputCommentsDefault
Connection
Date RangeThe number of days of data prior to and including today that should be returned.
Query Param FiltersFilters to apply in JSON format. See https://developer.tenable.com/reference/workbenches-assets-vulnerabilities for more information.
Debug RequestEnabling this flag will log out the current request.false

List Asset Tags

Returns a list of assigned tags for the specified asset UUID.

InputCommentsDefault
Connection
Asset UUIDThe UUID of the asset.
Debug RequestEnabling this flag will log out the current request.false

List Asset Vulnerabilities

Retrieves a list of the vulnerabilities recorded for a specified asset.

InputCommentsDefault
Connection
Asset IDThe UUID of the asset.
Date RangeThe number of days of data prior to and including today that should be returned.
Query Param FiltersFilters to apply in JSON format. See https://developer.tenable.com/reference/workbenches-asset-vulnerabilities for more information.
Debug RequestEnabling this flag will log out the current request.false

List Scanners

Returns the scanner list.

InputCommentsDefault
Connection
Debug RequestEnabling this flag will log out the current request.false

List Users

Returns a list of users.

InputCommentsDefault
Connection
Debug RequestEnabling this flag will log out the current request.false

List Vulnerabilities

Returns a list of recorded vulnerabilities.

InputCommentsDefault
Connection
Date RangeThe number of days of data prior to and including today that should be returned.
Query Param FiltersFilters to apply in JSON format. See https://developer.tenable.com/reference/workbenches-vulnerabilities for more information.
Debug RequestEnabling this flag will log out the current request.false

Move Assets

Moves assets from the specified network to another network.

InputCommentsDefault
Connection
Source Network UUIDThe UUID of the network currently associated with the assets.
Destination Network UUIDThe UUID of the network to associate with the specified assets.
TargetsThe IPv4 addresses of the assets to move. The addresses can be represented as a comma-separated list, a range, or CIDR.
Debug RequestEnabling this flag will log out the current request.false

Raw Request

Send raw HTTP request to Tenable.

InputCommentsDefault
Connection
URLInput the path only (/networks), The base URL is already included (https://cloud.tenable.com). For example, to connect to https://cloud.tenable.com/networks, only /networks is entered in this field.
MethodThe HTTP method to use.
DataThe HTTP body payload to send to the URL.
Form DataThe Form Data to be sent as a multipart form upload.
File DataFile Data to be sent as a multipart form upload.
File Data File NamesFile names to apply to the file data inputs. Keys must match the file data keys above.
Query ParameterA list of query parameters to send with the request. This is the portion at the end of the URL similar to ?key1=value1&key2=value2.
HeaderA list of headers to send with the request.
Response TypeThe type of data you expect in the response. You can request json, text, or binary data.json
TimeoutThe maximum time that a client will await a response to its request
Debug RequestEnabling this flag will log out the current request.false
Retry Delay (ms)The delay in milliseconds between retries. This is used when 'Use Exponential Backoff' is disabled.0
Retry On All ErrorsIf true, retries on all erroneous responses regardless of type. This is helpful when retrying after HTTP 429 or other 3xx or 4xx errors. Otherwise, only retries on HTTP 5xx and network errors.false
Max Retry CountThe maximum number of retries to attempt. Specify 0 for no retries.0
Use Exponential BackoffSpecifies whether to use a pre-defined exponential backoff strategy for retries. When enabled, 'Retry Delay (ms)' is ignored.false

Remove Agent from Group

Removes an agent from the specified agent group.

InputCommentsDefault
Connection
Group IDThe ID of the agent group.
Agent IDThe ID of the agent to remove.
Debug RequestEnabling this flag will log out the current request.false

Rename Agent

Renames an agent.

InputCommentsDefault
Connection
Agent IDThe ID of the agent to rename.
NameThe new name for the agent.
Debug RequestEnabling this flag will log out the current request.false

Unlinks an agent.

InputCommentsDefault
Connection
Agent IDThe ID of the agent to unlink.
Debug RequestEnabling this flag will log out the current request.false

Update Agent Group

Changes the name of the agent group.

InputCommentsDefault
Connection
Group IDThe ID or UUID of the agent group to update.
NameThe name of the agent group.
Debug RequestEnabling this flag will log out the current request.false

Update Scanner

Updates the specified scanner.

InputCommentsDefault
Connection
Scanner IDThe ID of the scanner.
NameThe new name for the scanner.
Force Plugin UpdatePass 1 to force a plugin update.
Force UI UpdatePass 1 to force a UI update.
Finish UpdatePass 1 to reboot the scanner and run the latest software update (only valid if automatic updates are disabled).
Registration CodeSets the registration code for the scanner.
AWS Update IntervalSpecifies how often, in minutes, the scanner checks in with Tenable Vulnerability Management (Amazon Web Services scanners only).
Debug RequestEnabling this flag will log out the current request.false

Update User

Updates an existing user account.

InputCommentsDefault
Connection
User IDThe UUID (uuid) or unique ID (id) of the user.
PermissionsThe user permissions as described in Permissions. See https://developer.tenable.com/reference/users-create for more information.
NameThe name of the user (for example, first and last name).
EmailThe email address of the user. A valid email address must be in the format, name@domain, where domain corresponds to a domain approved for your Tenable Vulnerability Management instance. Administrators can create users with an email address that has a domain outside of the approved domains.
EnabledSpecifies whether the user's account is enabled (true) or disabled (false).
Debug RequestEnabling this flag will log out the current request.false