- Supported Cloud Connectors
- Armis Cloud Connector
- AWS Cloud Connector
- AWS Multi-Tenant Cloud Connector
- Azure Cloud Connector
- Azure Cloud Connector Overview
- Azure Audit Source and Event Support
- Prerequisites to Configure the Azure Cloud Connector
- Configure the Azure Cloud Connector
- Collect EventHub Information for Azure EventHub Endpoints
- Collect all Microsoft Defender ATP Events
- Configure Azure to Monitor Security Center Events in Azure VMs
- Bitglass Cloud Connector
- Box Cloud Connector
- Centrify Cloud Connector
- Cisco AMP for Endpoints Cloud Connector
- Cisco Meraki Cloud Connector
- Cisco Umbrella Cloud Connector
- Citrix ShareFile Cloud Connector
- Cloudflare Cloud Connector
- Code42 Incydr Cloud Connector
- CrowdStrike Falcon Cloud Connector
- Cybereason Cloud Connector
- CylanceProtect Cloud Connector
- Dropbox Business Cloud Connector
- Duo Security Cloud Connector
- Egnyte Cloud Connector
- Fidelis Cloud Connector
- GitHub Cloud Connector
- Google Cloud Platform (GCP) Cloud Connector
- Google Cloud Pub/Sub Cloud Connector
- Google Workspace (Formerly G Suite) Cloud Connector
- LastPass Enterprise Cloud Connector
- Mimecast Email Security Cloud Connector
- Netskope Cloud Connector
- Office 365 Cloud Connector
- Okta Cloud Connector
- OneLogin Cloud Connector
- Palo Alto Networks SaaS Security Cloud Connector
- Ping Identity Cloud Connector
- Proofpoint Cloud Connector
- Rapid7 InsightVM Cloud Connector
- Salesforce Cloud Connector
- SentinelOne Cloud Connector
- ServiceNow Cloud Connector
- Slack App Cloud Connector
- Slack Classic App Cloud Connector (Formerly known as Slack Enterprise Grid Cloud Connector)
- Snowflake Cloud Connector
- Sophos Central Cloud Connector
- Symantec CloudSOC Cloud Connector
- Symantec Endpoint Protection (SEP) Mobile Cloud Connector
- Symantec Email Security.cloud Cloud Connector
- Symantec WSS Cloud Connector
- Tenable.io Cloud Connector
- VMware Carbon Black Cloud Endpoint Standard Cloud Connector
- Workday Cloud Connector
- Zoom Cloud Connector
- Custom Cloud Connector
- Webhook Cloud Connector
Tenable.io Cloud Connector
The Tenable Cyber Exposure platform offers the vulnerability management solution Tenable.io, which provides actionable data to identify, investigate, and prioritize vulnerabilities. Tenable.io provides vulnerability coverage and dashboard visualizations for rapid analysis. For more information see the Tenable.io product information.
Prerequisites to Configure the Tenable.io Connector
Before you configure the Tenable.io connector you must obtain the following Tenable.io account information:
API access key and secret key
Scan folder name
Obtain API Access Key and Secret Key
Tenable.io REST API is authenticated via API access and secret keys. To generate the API access key and secret key:
Log in to the Tenable.io console.
In the left pane, click Settings.
Navigate to My Account > API Keys.
Click Generate. Tenable.io displays the values for API access key and secret key.
Note
The method of generating API access and secret keys varies based on the user role. Administrators can generate API keys for any user account. The users with other roles can generate API keys only for their own account. To generate API keys, a user must have the one of these user roles: Basic, Scan Operator, Standard, Scan Manager, or Administrator. For more information about roles and permissions see Tenable.io Permissions. As an administrator, to generate API keys for the other user, edit the user account by navigating to Settings > Users > Edit User. In the API Keys section, click Generate API Keys. For more information see the Tenable.io documentation.
Record the values for the API access key and secret key. Use these values to authenticate the API client while configuring the Tenable.io connector on the Exabeam Cloud Connector platform.
Obtain the Scan Folder Name
The Folder section in Tenable.io contains data for configured scans organized into the following default folders:
My Scans
All Scans
Trash
The Scans page displays the My Scans folder by default. The scan that you create appears in the My Scans folder. You can move the scan data to a new or existing folder. The All Scans folder displays data for all the scans to which you have access. For more information, see the Tenable.io documentation. If you create a separate folder, note the name of the folder to use while configuring the Tenable.io connector on the Exabeam Cloud Connector platform.
Configure Tenable.io Connector
The Tenable Cyber Exposure platform offers the vulnerability management solution Tenable.io, which provides actionable data to identify, investigate, and prioritize vulnerabilities. Tenable.io provides vulnerability coverage and dashboard visualizations for rapid analysis. For more information see the Tenable.io product information.
The following table displays audit source API and security events supported by the connector.
Audit Source: API | Service or Module Covered | Event Types | Event Included |
---|---|---|---|
Tenable.io scan results |
To configure the Tenable.io connector to import data into the Exabeam Cloud Connector platform:
Complete the Prerequisites to Configure the Tenable.io Connector.
Log in to the Exabeam Cloud Connectors platform with your registered credentials.
Navigate to Settings > Accounts > Add Account.
Click Select Service to Add, then select Tenable.io from the list.
In the Accounts section, enter the required information. Required fields are indicated with a red bar.
Account Name – Specify a name for the Tenable.io connector. For example, Tenable.io_vulnerability_management.
(Optional) Description – Describe the Tenable.io connector. For example, Tenable.io vulnerability management solution.
Access Key – Enter the value for the access key that you obtained while completing the prerequisites.
Secret Key – Enter the value for the secret key that you obtained while completing the prerequisites.
Scan Folder – Enter the name of the scan folder that you created to save vulnerability scan data. Otherwise, type All Scans.
Permit Recurrent Unresolved Vulnerabilities – Select Yes to have the cloud connector pull full vulnerability scan result data, regardless of the time when the vulnerabilities are found. SelectNo to pull only the data related to vulnerability scans of new events.
To confirm that the Exabeam Cloud Connector platform communicates with the service, click Test Connection.
Click Done to save your changes. The cloud connector is now set up on the Exabeam Cloud Connector platform.
To ensure that the connector is ready to send and collect data, Start the connector and check that the status shows
OK
.