tenable and splunk integration · splunk splunkreceivesvulnerabilitydatacollectedby securitycenter...

42
Tenable and Splunk Integration Guide Last Revised: April 06, 2018

Upload: vuthuy

Post on 20-Jun-2018

258 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

Tenable and SplunkIntegration Guide

Last Revised: April 06, 2018

Page 2: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 2 -

Table of Contents

Introduction 3

Recommended Configurations 4

SecurityCenter 6

Integration Requirements 7

Integration Configuration 8

Nessus 15

Integration Requirements 16

Integration Configuration 17

Nessus Network Monitor 23

Integration Requirements 24

Integration Configuration 25

Log Correlation Engine 31

Integration Requirements 32

Integration Configuration 33

About Tenable 42

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 3: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 3 -

Introduction

Tenable™ and Splunk have a history of collaboration and interaction between our enterprise securitysolutions. Many customers want Tenable vulnerability and continuous monitoring data shared withtheir Splunk environment.

This document describes how to deploy integrations between Tenable Nessus®, SecurityCenter®, Nes-sus Network Monitor (formerly Passive Vulnerability Scanner® or PVS™) and Log Correlation Engine®(LCE®) and Splunk solutions, specifically Splunk Enterprise, and covers multiple methods of integ-ration; we have worked to provide flexibility to support many different configurations. Please emailany comments and suggestions about this document or its instructions to [email protected].

Tenable Solu-tion

IntegrationType

Owner Description

SecurityCenter VulnerabilityMetrics

Splunk Splunk receives vulnerability data collected bySecurityCenter

Nessus Nessus HostScans, Nes-sus Plugins

Splunk Splunk receives vulnerability data collected by Nes-sus, Splunk collects Nessus plugin information fromthe Tenable Knowledgebase

Nessus Net-work Monitor

Passive Sys-log Col-lection

Tenable Real-time vulnerability and event data is sent fromNessus Network Monitor to Splunk via syslog

LCE Syslog For-warding (bi-directional)

Tenable LCE server collects data from Splunk, or log andevent data collected by a LCE Client is sent toSplunk

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 4: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 4 -

Recommended Configurations

SecurityCenter + SplunkSecurityCenter® API → Splunk Connector → Splunk DB

How it works: SecurityCenter collects vulnerability data. The Splunk connector then connects to theSecurityCenter API to extract the vulnerability data and insert it into the Splunk DB.

Why: Fast and easy export of your Tenable vulnerability data to Splunk allows your correlation of vul-nerabilities with the events in the Splunk console.

SecurityCenter Continuous View + Splunk (SecurityCenter + LCE + Nes-sus Network Monitor + Splunk)SecurityCenter API → Splunk Connector → Splunk DB

Event Traffic (syslog) → LCE (forward) → Splunk DB (syslog)

How it works: SecurityCenter collects vulnerability data. The Splunk connector connects to the Secur-ityCenter API to extract vulnerability data and insert the data into the Splunk DB. By forwarding eventtraffic to LCE first, rich vulnerability and threat data can be correlated with all the SecurityCenter vul-nerability sensor data.

Why: Fast and easy export of your Tenable vulnerability data to Splunk allows your correlation of vul-nerabilities with the events in the Splunk console. Using LCE’s Syslog Forwarding and Event Rules fea-tures, it can send all, or selected, logs to Splunk Enterprise for storage. This can result in a significantreduction in the cost of Splunk storage costs.

Optional ConfigurationSecurityCenter API → Splunk Connector → Splunk DB

Event Traffic (syslog) → Splunk DB (forward) → LCE

How it works: SecurityCenter collects vulnerability data. The Splunk connector connects to the Secur-ityCenter API to extract the vulnerability data and insert it into the Splunk DB. The Tenable LCE SplunkClient forwards data that Splunk collects to the LCE server. Once the data reaches the LCE server, thedata is reviewed and normalized so it can be queried in SecurityCenter.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 5: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 5 -

Why: In addition to having Splunk collect events, the LCE Client for Splunk (available on the TenableSupport Portal) allows you to extract event data for correlation with all SecurityCenter vulnerabilitysensor data, allowing a better view of vulnerabilities and their impact from the SecurityCenter console.Check out the many SecurityCenter dashboards for some ideas of the pre-built event data that can bereported: tenable.com/sc-dashboards.

Nessus Network Monitor Only (Standalone) + SplunkNessus Network Monitor (syslog) → Splunk Nessus Network Monitor Connector → Splunk DB

How it works: Nessus Network Monitor collects vulnerability data. The Splunk Nessus Network Mon-itor connector connects to Nessus Network Monitor to extract the vulnerability data and insert it intothe Splunk DB.

Why: Nessus Network Monitor performs the completely passive collection of vulnerability data (viaTAP/Mirror/SPAN). This data and device discovery provides tremendous insight into the applicationsand systems on your network, which is extremely important to incident response teams as deep know-ledge about unmanaged systems are automatically imported to Splunk.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 6: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 6 -

SecurityCenter

SecurityCenter consolidates and evaluates vulnerability data across an organization, prioritizing secur-ity risks and providing a clear view of the organization’s security posture. With SecurityCenter’s pre-built, highly customizable dashboards and reports, and the industry’s only Assurance Report Cards®(ARCs), users can visualize, measure and analyze the effectiveness of their security program. TheSplunk add-on for Tenable allows Splunk users to collect SecurityCenter data, which is then indexedfor further analysis.

This section assumes that the user has working knowledge of SecurityCenter and Splunk.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 7: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 7 -

Integration Requirements

The following are required in order to integrate SecurityCenter with Splunk:

l SecurityCenter 5.3.1 or higher

l Splunk 6.x or higher

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 8: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 8 -

Integration Configuration

Splunk Add-on for Tenable ConfigurationThe Splunk Add-on for Tenable is available for download at https://s-plunkbase.splunk.com/app/1710/ (login required).

From Splunk, click the Manage Apps gear icon, located in the upper-left side of the screen.

Select Install app from file.

Click Browse.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 9: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 9 -

Select the downloaded Splunk Add-on for Tenable file and click Upload.

When Splunk has completed processing, it will require a restart. After restarting and logging back intoSplunk, navigate back to Managing Apps, as described in the first step. You will now see a SplunkAdd-on for Tenable listed under Apps. Click the Launch app link under Actions to the right of theapp name.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 10: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 10 -

Click the Configuration tab at the top of the screen then the Add SecurityCenter Server button tothe right of the screen.

A window is displayed where users can uniquely name the SecurityCenter server, as well as input theURL and login credentials for SecurityCenter. Complete the fields and click Add.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 11: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 11 -

From the Inputs screen, select Create New Input and click SecurityCenter.

A window is displayed where users can name the SecurityCenter input, and utilize the Server para-meter to select the SecurityCenter server that was previously set up in the Configurations tab.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 12: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 12 -

Enter or select values for the remaining parameters (from the Splunk documentation):

l Metrics: Select Vulnerabilities to collect vulnerability data discovered on SecurityCenter. Thesource type for this data is automatically set to tenable:sc:vuln

l Start Time: The add-on starts collecting data with a date later than this time. The default is 30days before the configuration. The format is YYYY-DD-MMThh:mm:ssTZD, e.g., 2016-08-01T09:00:00+0800 stands for fetching data from 2016-08-01 09:00:00 in UTC+8 time zone.

l Interval: The number of seconds to wait before the Splunk platform runs the command again.The default is 60.

l Index: The index in which to store SecurityCenter data.

Click Add to finalize the Inputs configuration.

The SSL certificate from the SecurityCenter server must be copied to the Splunk server for full com-munication to occur between SecurityCenter and Splunk. Refer to Splunk’s documentation underCheck the warning messages of Tenable SecurityCenter.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 13: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 13 -

From the main Splunk screen, click Search & Reporting (or Search from the Splunk Add-on for Ten-able screen).

If configured correctly, the What to Search portion of the screen has populated with your Secur-ityCenter data. You can then click Data Summary for detailed information.

Click the Sources tab for access to the SecurityCenter scan data.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 14: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 14 -

If you encounter any issues with Splunk installation or configuration, or have any feature requests forthis integration, contact Splunk Support.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 15: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 15 -

Nessus

Tenable Nessus prevents network attacks by identifying the vulnerabilities and configuration issuesthat hackers use to penetrate your network. The Splunk Add-on for Tenable allows a Splunk softwareadministrator to collect Tenable vulnerability scan data from Nessus and SecurityCenter via the RESTAPI. The add-on supports Nessus 6.x, as well as 5.x for backwards compatibility.

This section assumes that the user has working knowledge of Nessus and Splunk, and a workinginstance of Splunk Enterprise. For information on obtaining and installing Splunk Enterprise, pleaserefer to the Splunk Enterprise Installation Manual.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 16: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 16 -

Integration Requirements

The following are required in order to integrate Tenable Nessus with Splunk:

l Nessus 6.x or 5.x

l Splunk Add-on for Tenable

l Splunk 6.x or higher

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 17: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 17 -

Integration Configuration

Splunk Add-on for Tenable ConfigurationThe Splunk Add-on for Tenable is available for download at http://s-plunkbase.splunk.com/app/1710 (login required).

From Splunk, click on the Manage Apps gear icon, located in the upper-left side of the screen.

Select Install app from file.

Click Browse.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 18: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 18 -

Select the downloaded Splunk Add-on for Tenable file and click Upload.

When Splunk has completed processing, it will require a restart. After restarting and logging back intoSplunk, navigate back to Managing Apps, as described in the first step. You will now see a SplunkAdd-on for Tenable listed under Apps. Click the Launch app link under Actions to the right of theapp name.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 19: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 19 -

From the Inputs screen, select Create New Input and click Nessus.

Fill in the required information and change the Nessus Metrics drop-down to Nessus Host Scans.

The Access Key and Secret Key required from Nessus are located in Nessus under User Profile > APIKeys.

Log in to Nessus and click the down arrow on the right side of the menu bar beside the user name.Next, select User Profile.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 20: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 20 -

Click API Keys.

Generate the API keys and then copy and paste the Access Key and Secret Key from the screen to theAccess Key and Secret Key fields of the Add Nessus Input screen in Splunk.

In Splunk, click Add to complete the action.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 21: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 21 -

From the main Splunk screen, click Search & Reporting (or Search from the Splunk Add-on for Ten-able screen).

If configured correctly, theWhat to Search portion of the screen has populated with your Nessusdata. You can then click Data Summary for detailed information.

Click the Sources tab for access to the Nessus scan data.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 22: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 22 -

If you encounter any issues with Splunk installation or configuration, or have any feature requests forthis integration, contact Splunk Support.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 23: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 23 -

Nessus Network Monitor

Tenable Nessus Network Monitor eliminates network blind spots by continuously monitoring networktraffic in real time to discover active assets, identify cloud applications and detect anomalous activity.The Nessus Network Monitor app for Splunk is able to process tens of terabytes of data per day andfind security-relevant information through comprehensive analysis. In order to uncover threats carriedon mobile, virtual and cloud devices, Splunk requires reliable data to analyze. The vulnerability anddevice discovery power of Nessus Network Monitor used with the comprehensive analysis of Splunkprovides network and security information for effective threat intelligence.

This section assumes that the user has working knowledge of Nessus Network Monitor and Splunk. Todownload the Tenable Nessus Network Monitor App for Splunk, see: https://s-plunkbase.splunk.com/app/1844/.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 24: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 24 -

Integration Requirements

The following are required in order to integrate Tenable Nessus Network Monitor with Splunk:

l Tenable Nessus Network Monitor version 4.x or higher (including 5.x)

Note: To obtain a Nessus Network Monitor evaluation, see: http://www.ten-able.com/products/nessus-network-monitor/evaluate.

l Splunk 6.x and higher.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 25: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 25 -

Integration Configuration

Tenable Nessus Network Monitor ConfigurationFrom the Nessus Network Monitor UI, navigate to Configuration.

Select Syslog in the Setting Type drop-down menu.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 26: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 26 -

In the Realtime Syslog Server List, click Add to enter the IP address and UDP port of the Splunkserver and then click Add to finalize the addition.

Click Update to complete the process.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 27: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 27 -

Note: The IP address and UDP port must be entered in the format of IP:PORT (e.g., 10.1.1.10:514).

Splunk ConfigurationDownload the Tenable Network Security Nessus Network Monitor App for Splunk from https://s-plunkbase.splunk.com/app/1844/. Log in to Splunk and click the gear icon next to Apps.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 28: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 28 -

On the Apps screen, click Install app from file, browse to the Tenable Network Security Nessus Net-work Monitor App for Splunk .tgz file and click Upload.

The app is now listed and enabled.

In the Splunk UI, navigate to Settings > Data > Data Inputs. To the right of UDP, click Add new.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 29: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 29 -

Under Select Source, select UDP and enter 514 for the port. Click Next.

In the Input Settings screen, click the drop-down for Select Source Type. Under OperatingSystem, select syslog. If not already selected, choose Tenable Network Security PVS next to AppContext and select IP next to Method.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 30: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 30 -

Click Review to review all changes and then Submit to finalize the configuration.

Select Apps and Tenable Network Security PVS in the upper-left corner of the screen to displayyour initial Nessus Network Monitor Dashboard.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 31: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 31 -

Log Correlation Engine

Tenable LCE unifies vulnerability collection and event analysis data through Tenable SecurityCenter,which provides easy-to-use dashboards to display multiple data points in a centralized view. Organ-izations that choose to send Splunk logs to the LCE have a unique advantage in that Splunk data is nor-malized by LCE and can be included for automatic anomaly detection, asset discovery and additionalvulnerability information, including botnet and malware detection.

The Tenable LCE Splunk Client forwards data that Splunk collects to the LCE server. Once the datareaches the LCE server, the data is reviewed and normalized so it can be queried in SecurityCenter.

Tenable LCE also has the ability to forward any log it receives to one or more syslog servers, includingSplunk. Using LCE’s Syslog Forwarding and Event Rules features, it can send all, or selected, logs toSplunk Enterprise. Once the logs are received in Splunk, the data can be filtered and queried to pro-duce meaningful dashboards and reports for a more complete view of the enterprise.

This section assumes that the user has working knowledge of Tenable LCE and Splunk, and a workinginstance of Splunk Enterprise. For information on obtaining and installing Splunk Enterprise, pleaserefer to the Splunk Enterprise Installation Manual.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 32: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 32 -

Integration Requirements

The following are required in order to integrate Tenable LCE with Splunk:

l Log Correlation Engine version 4.8 or higher

l Log Correlation Engine Splunk Client version 4.6 or higher

l Splunk 6.x or higher

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 33: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 33 -

Integration Configuration

To configure Splunk Enterprise to forward logs to Tenable LCE, follow the steps in the Tenable LCESplunk Client Configuration and Splunk Configuration sections.

For detailed steps on configuring syslog forwarding from Tenable LCE to Splunk Enterprise, see theTenable LCE Syslog Forwarding section.

Tenable LCE Splunk Client ConfigurationThe LCE Splunk Client is available for download from the Tenable Support Portal at https://sup-port.tenable.com (login required). Log in and navigate to the “Downloads > Log Correlation Engine”section and download the “Log Correlation Engine Splunk Client.”

Once downloaded, copy the LCE Splunk Client to the host it will be installed on. The LCE Client can beinstalled directly onto a Splunk server. For LCE Splunk Client installation tips, refer to the LCE 4.8 UserGuide.

After the LCE Splunk Client is installed, log in to the system it is installed on to begin the configuration.

Note: All shell commands need to be executed by a user with root privileges.

To configure the LCE Splunk client, execute the set-server-ip.sh script (as shown below). Onceprompted, enter the LCE server IP address or hostname and LCE server port (default is 31300). Oncethe information is updated, the LCE Splunk Client daemon is restarted.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 34: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 34 -

Optionally, you can execute the set-server-ip.sh script (as shown below) with the LCE server IPaddress or hostname and LCE server port as arguments. Once the information is updated, the LCESplunk Client daemon is restarted.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 35: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 35 -

If you encounter any issues with LCE Client installation or configuration, or have any feature requestsfor this integration, contact Tenable Support.

Splunk ConfigurationAfter the LCE Splunk Client is installed and configured, the Splunk Indexer has to be configured inorder to send data from Splunk to the LCE Splunk Client. That data is then sent from the LCE SplunkClient to the LCE server, where it is normalized before being forwarded on to SecurityCenter.

To begin the Splunk configuration, log in to Splunk Web (http://<IP address or hostname>:8000) as auser with administrator privileges. Once logged in, click Settings in the top menu bar and select For-warding and receiving.

Click Add new under the Configure forwarding action.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 36: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 36 -

In the Host box, enter the IP address or hostname and port (default 9800) of the LCE Splunk Clienthost. Click Save to finalize the settings.

Once saved, the LCE Splunk Client will be listed in the Host list. Verify that the Status is set toEnabled.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 37: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 37 -

To finalize the Splunk configuration, log in to the Splunk Indexer as a root user. Once logged in, editthe outputs.conf file and add the lines below in bold.

Note: The default location of the outputs.conf file is /op-t/splunk/etc/system/local/outputs.conf.

Save the file and then restart the Splunk services. Once the services restart, Splunk data is now able tobe forwarded to the LCE Splunk Client.

To complete the setup, log in to the web interface of the LCE server previously configured to com-municate with the LCE Splunk Client. Once logged in to the LCE server, the following steps will need tobe performed:

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 38: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 38 -

l Authorize the LCE Splunk Client

l Configure the LCE Splunk Client Policy

l Assign the Policy to the LCE Splunk Client

For detailed instruction on how to perform these steps and finalize the configuration, please refer tothe LCE 4.8 User Guide.

Tenable LCE Syslog ForwardingTo configure syslog forwarding from LCE to Splunk, log in to LCE’s web interface and navigate to Con-figuration.

Click Advanced in the left-hand menu.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 39: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 39 -

Scroll down until you reach the Data Forwarding section and enter the IP address or hostname of theSplunk server, the port number and the format flag (e.g., 172.26.37.23:601,2 as shown in the screenshotbelow) in the Syslog Forwarding TCP section. The format flag can be set as 0 (include LCE headertext), 1 (exclude LCE header text) or 2 (CEF format).

Tenable recommends using format flag 2 which sends the logs to Splunk in the Common Event Format(CEF), and prevents having to create new parsing rules. To use this format, download the SplunkCEFUtils Add-on from SplunkBase (login required) and install it on your Splunk Enterprise instance.Installation and configuration instructions are included on the download page.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 40: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 40 -

After entering the Splunk server information, scroll to the bottom of the window and click Update tosave changes.

Note: While Splunk Enterprise can be configured to accept syslog data on any TCP or UDP port, Splunkrecommends using TCP. The default TCP port is 610, but can be changed to a different port that suitsyour environment. Please refer to the Getting Data In document by Splunk for more details.

LCE can also be configured to send only selected events to Splunk through the use of Event Rules.Event rules are located in the Advanced section of the Configurationmenu.

In the example below, the Event Rule is set to filter on the sensor name TASL. Once the rule isapplied, LCE will only send those related events to Splunk.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 41: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 41 -

For more detailed instructions on creating event rules, refer to the LCE 4.8 User Guide.

If you encounter any issues with Splunk installation or configuration, or have any feature requests forthis integration, contact Splunk Support.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Page 42: Tenable and Splunk Integration · Splunk Splunkreceivesvulnerabilitydatacollectedby SecurityCenter Nessus NessusHost Scans,Nes-susPlugins Splunk SplunkreceivesvulnerabilitydatacollectedbyNes-

- 42 -

About Tenable

Tenable™ transforms security technology for the business needs of tomorrow through comprehensivesolutions that provide continuous visibility and critical context, enabling decisive actions to protectyour organization. Tenable eliminates blind spots, prioritizes threats and reduces exposure and loss.With more than one million users and more than 21,000 customers worldwide, organizations trust Ten-able for proven security innovation. Tenable customers range from Fortune Global 500 companies, tothe global public sector, to mid-sized enterprises in all sectors, including finance, government, health-care, higher education, retail and energy. Transform security with Tenable, the creators of Nessus®and leaders in continuous monitoring, by visiting tenable.com.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Ten-

able, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.