You are viewing docs on Elastic's new documentation system, currently in technical preview. For all other Elastic docs, visit elastic.co/guide.

Tenable Vulnerability Management

Collect logs from Tenable Vulnerability Management with Elastic Agent.

Version
2.9.0 (View all)
Compatible Kibana version(s)
8.12.0 or higher
Supported Serverless project types

Security
Observability
Subscription level
Basic
Level of support
Elastic

Overview

The Tenable Vulnerability Management integration allows users to monitor asset, plugin, and vulnerability activity. It provides the industry's most comprehensive vulnerability coverage with the ability to predict which security issues to remediate first. Tenable Vulnerability Management is the user's complete end-to-end vulnerability management solution.

Use the Tenable Vulnerability Management integration to collects and parses data from the REST APIs. Then visualize that data in Kibana.

Data streams

The Tenable Vulnerability Management integration collects logs for three types of events: Asset, Plugin, and Vulnerability.

Asset is used to get details related to assets that belong to the user's organization. See more details in the API documentation here.

Plugin is used to get detailed plugin information. See more details in the API documentation here.

Vulnerability is used to retrieve all vulnerabilities on each asset, including the vulnerability state. See more details in the API documentation here.

Scan is used to retrieve details about existing scans, including scan statuses, assigned targets, and more. See more details in the API documentation here.

Compatibility

This module has been tested against Tenable Vulnerability Management release December 6, 2022.

Requirements

Elasticsearch is needed to store and search data, and Kibana is needed for visualizing and managing it. You can use our hosted Elasticsearch Service on Elastic Cloud, which is recommended, or self-manage the Elastic Stack on your hardware.

Note:

  • In this integration, export and plugin endpoints of vulnerability management are used to fetch data.
  • The default value is the recommended value for a batch size by Tenable. Using a smaller batch size can improve performance. A very large value might not work as intended depending on the API and instance limitations.
  • If you have a large amount of data and are having trouble with data ingestion in the integration package, you can try to increase the Max Retries and Min Wait Time parameter.

Setup

To collect data from the Tenable Vulnerability Management REST APIs, follow the below steps:

  1. Create a valid user account with appropriate permissions on Tenable Vulnerability Management.
  2. Generate the API keys for the account to access all Tenable Vulnerability Management APIs.

Note:

  • For the Tenable Vulnerability Management asset and vulnerability API, ADMINISTRATOR [64] and Can View access control is required in created user's access key and secret key.
  • For the Tenable Vulnerability Management plugin, BASIC [16] user permissions are required in created user's access key and secret key.
  • For more details related to permissions, refer to the link here.

Logs reference

asset

This is the asset dataset.

Example

An example event for asset looks as following:

{
    "@timestamp": "2018-12-31T22:27:58.599Z",
    "agent": {
        "ephemeral_id": "b3014c52-baa0-4157-a405-a7c7aba233d9",
        "id": "9fcad6fb-106f-48a9-a13e-3a4026b60340",
        "name": "docker-fleet-agent",
        "type": "filebeat",
        "version": "8.11.3"
    },
    "cloud": {
        "availability_zone": "12",
        "instance": {
            "id": "12"
        },
        "project": {
            "id": "12"
        }
    },
    "data_stream": {
        "dataset": "tenable_io.asset",
        "namespace": "ep",
        "type": "logs"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "9fcad6fb-106f-48a9-a13e-3a4026b60340",
        "snapshot": false,
        "version": "8.11.3"
    },
    "event": {
        "agent_id_status": "verified",
        "category": [
            "host"
        ],
        "created": "2024-01-05T11:54:49.061Z",
        "dataset": "tenable_io.asset",
        "ingested": "2024-01-05T11:54:52Z",
        "kind": "state",
        "original": "{\"acr_score\":\"3\",\"agent_names\":[],\"agent_uuid\":\"22\",\"aws_availability_zone\":null,\"aws_ec2_instance_ami_id\":\"12\",\"aws_ec2_instance_group_name\":null,\"aws_ec2_instance_id\":\"12\",\"aws_ec2_instance_state_name\":null,\"aws_ec2_instance_type\":null,\"aws_ec2_name\":null,\"aws_ec2_product_code\":null,\"aws_owner_id\":\"44\",\"aws_region\":null,\"aws_subnet_id\":null,\"aws_vpc_id\":null,\"azure_resource_id\":\"12\",\"azure_vm_id\":\"12\",\"bigfix_asset_id\":null,\"bios_uuid\":\"33\",\"created_at\":\"2017-12-31T20:40:44.535Z\",\"deleted_at\":\"2017-12-31T20:40:44.535Z\",\"deleted_by\":\"user\",\"exposure_score\":\"721\",\"first_scan_time\":\"2017-12-31T20:40:23.447Z\",\"first_seen\":\"2017-12-31T20:40:23.447Z\",\"fqdns\":[\"example.com\"],\"gcp_instance_id\":\"12\",\"gcp_project_id\":\"12\",\"gcp_zone\":\"12\",\"has_agent\":false,\"has_plugin_results\":true,\"hostnames\":[],\"id\":\"95c2725c-7298-4a44-8a1d-63131ca3f01f\",\"installed_software\":[\"cpe:/a:test:xyz:12.8\",\"cpe:/a:test:abc:7.7.3\",\"cpe:/a:test:pqr:6.9\",\"cpe:/a:test:xyz\"],\"ipv4s\":[\"89.160.20.112\"],\"ipv6s\":[],\"last_authenticated_scan_date\":\"2017-12-31T20:40:44.535Z\",\"last_licensed_scan_date\":\"2018-12-31T22:27:52.869Z\",\"last_scan_id\":\"00283024-afee-44ea-b467-db5a6ed9fd50ab8f7ecb158c480e\",\"last_scan_time\":\"2018-03-31T22:27:52.869Z\",\"last_schedule_id\":\"72284901-7c68-42b2-a0c4-c1e75568849df60557ee0e264228\",\"last_seen\":\"2018-12-31T22:27:52.869Z\",\"mac_addresses\":[],\"manufacturer_tpm_ids\":[],\"mcafee_epo_agent_guid\":null,\"mcafee_epo_guid\":null,\"netbios_names\":[],\"network_interfaces\":[{\"fqdns\":[\"example.com\"],\"ipv4s\":[\"89.160.20.112\",\"81.2.69.144\"],\"ipv6s\":[\"2a02:cf40::\"],\"mac_addresses\":[\"00-00-5E-00-53-00\",\"00-00-5E-00-53-FF\"],\"name\":\"test.0.1234\"}],\"operating_systems\":[],\"qualys_asset_ids\":[],\"qualys_host_ids\":[],\"servicenow_sysid\":null,\"sources\":[{\"first_seen\":\"2017-12-31T20:40:23.447Z\",\"last_seen\":\"2018-12-31T22:27:52.869Z\",\"name\":\"TEST_SCAN\"}],\"ssh_fingerprints\":[],\"symantec_ep_hardware_keys\":[],\"system_types\":[],\"tags\":[{\"added_at\":\"2018-12-31T14:53:13.817Z\",\"added_by\":\"ac2e7ef6-fac9-47bf-9170-617331322885\",\"key\":\"Geographic Area\",\"uuid\":\"47e7f5f6-1013-4401-a705-479bfadc7826\",\"value\":\"APAC\"}],\"terminated_at\":\"2017-12-31T20:40:44.535Z\",\"terminated_by\":\"user\",\"updated_at\":\"2018-12-31T22:27:58.599Z\"}",
        "type": [
            "info"
        ]
    },
    "host": {
        "domain": [
            "example.com"
        ],
        "id": "95c2725c-7298-4a44-8a1d-63131ca3f01f",
        "ip": [
            "89.160.20.112"
        ],
        "mac": [
            "00-00-5E-00-53-00",
            "00-00-5E-00-53-FF"
        ]
    },
    "input": {
        "type": "httpjson"
    },
    "related": {
        "hosts": [
            "example.com"
        ],
        "ip": [
            "89.160.20.112",
            "81.2.69.144",
            "2a02:cf40::"
        ]
    },
    "tags": [
        "preserve_original_event",
        "preserve_duplicate_custom_fields",
        "forwarded",
        "tenable_io-asset"
    ],
    "tenable_io": {
        "asset": {
            "acr_score": 3,
            "agent_uuid": "22",
            "aws": {
                "ec2_instance": {
                    "ami_id": "12",
                    "id": "12"
                },
                "owner_id": "44"
            },
            "azure": {
                "resource_id": "12",
                "vm_id": "12"
            },
            "bios_uuid": "33",
            "created_at": "2017-12-31T20:40:44.535Z",
            "deleted_at": "2017-12-31T20:40:44.535Z",
            "deleted_by": "user",
            "exposure_score": 721,
            "first_scan_time": "2017-12-31T20:40:23.447Z",
            "first_seen": "2017-12-31T20:40:23.447Z",
            "fqdns": [
                "example.com"
            ],
            "gcp": {
                "instance_id": "12",
                "project_id": "12",
                "zone": "12"
            },
            "has_agent": false,
            "has_plugin_results": true,
            "id": "95c2725c-7298-4a44-8a1d-63131ca3f01f",
            "installed_software": [
                "cpe:/a:test:xyz:12.8",
                "cpe:/a:test:abc:7.7.3",
                "cpe:/a:test:pqr:6.9",
                "cpe:/a:test:xyz"
            ],
            "ipv4s": [
                "89.160.20.112"
            ],
            "last_authenticated_scan_date": "2017-12-31T20:40:44.535Z",
            "last_licensed_scan_date": "2018-12-31T22:27:52.869Z",
            "last_scan_id": "00283024-afee-44ea-b467-db5a6ed9fd50ab8f7ecb158c480e",
            "last_scan_time": "2018-03-31T22:27:52.869Z",
            "last_schedule_id": "72284901-7c68-42b2-a0c4-c1e75568849df60557ee0e264228",
            "last_seen": "2018-12-31T22:27:52.869Z",
            "network_interfaces": [
                {
                    "fqdns": [
                        "example.com"
                    ],
                    "ipv4s": [
                        "89.160.20.112",
                        "81.2.69.144"
                    ],
                    "ipv6s": [
                        "2a02:cf40::"
                    ],
                    "mac_addresses": [
                        "00-00-5E-00-53-00",
                        "00-00-5E-00-53-FF"
                    ],
                    "name": "test.0.1234"
                }
            ],
            "sources": [
                {
                    "first_seen": "2017-12-31T20:40:23.447Z",
                    "last_seen": "2018-12-31T22:27:52.869Z",
                    "name": "TEST_SCAN"
                }
            ],
            "tags": [
                {
                    "added_at": "2018-12-31T14:53:13.817Z",
                    "added_by": "ac2e7ef6-fac9-47bf-9170-617331322885",
                    "key": "Geographic Area",
                    "uuid": "47e7f5f6-1013-4401-a705-479bfadc7826",
                    "value": "APAC"
                }
            ],
            "terminated_at": "2017-12-31T20:40:44.535Z",
            "terminated_by": "user",
            "updated_at": "2018-12-31T22:27:58.599Z"
        }
    }
}

Exported fields

FieldDescriptionType
@timestamp
Event timestamp.
date
cloud.account.id
The cloud account or organization id used to identify different entities in a multi-tenant environment. Examples: AWS account id, Google Cloud ORG Id, or other unique identifier.
keyword
cloud.availability_zone
Availability zone in which this host is running.
keyword
cloud.image.id
Image ID for the cloud instance.
keyword
cloud.instance.id
Instance ID of the host machine.
keyword
cloud.instance.name
Instance name of the host machine.
keyword
cloud.machine.type
Machine type of the host machine.
keyword
cloud.project.id
Name of the project in Google Cloud.
keyword
cloud.provider
Name of the cloud provider. Example values are aws, azure, gcp, or digitalocean.
keyword
cloud.region
Region in which this host is running.
keyword
container.id
Unique container id.
keyword
container.image.name
Name of the image the container was built on.
keyword
container.labels
Image labels.
object
container.name
Container name.
keyword
data_stream.dataset
Data stream dataset.
constant_keyword
data_stream.namespace
Data stream namespace.
constant_keyword
data_stream.type
Data stream type.
constant_keyword
ecs.version
ECS version this event conforms to. ecs.version is a required field and must exist in all events. When querying across multiple indices -- which may conform to slightly different ECS versions -- this field lets integrations adjust to the schema version of the events.
keyword
event.category
This is one of four ECS Categorization Fields, and indicates the second level in the ECS category hierarchy. event.category represents the "big buckets" of ECS categories. For example, filtering on event.category:process yields all events relating to process activity. This field is closely related to event.type, which is used as a subcategory. This field is an array. This will allow proper categorization of some events that fall in multiple categories.
keyword
event.created
event.created contains the date/time when the event was first read by an agent, or by your pipeline. This field is distinct from @timestamp in that @timestamp typically contain the time extracted from the original event. In most situations, these two timestamps will be slightly different. The difference can be used to calculate the delay between your source generating an event, and the time when your agent first processed it. This can be used to monitor your agent's or pipeline's ability to keep up with your event source. In case the two timestamps are identical, @timestamp should be used.
date
event.dataset
Event dataset
constant_keyword
event.kind
This is one of four ECS Categorization Fields, and indicates the highest level in the ECS category hierarchy. event.kind gives high-level information about what type of information the event contains, without being specific to the contents of the event. For example, values of this field distinguish alert events from metric events. The value of this field can be used to inform how these kinds of events should be handled. They may warrant different retention, different access control, it may also help understand whether the data is coming in at a regular interval or not.
keyword
event.module
Event module
constant_keyword
event.original
Raw text message of entire event. Used to demonstrate log integrity or where the full log message (before splitting it up in multiple parts) may be required, e.g. for reindex. This field is not indexed and doc_values are disabled. It cannot be searched, but it can be retrieved from _source. If users wish to override this and index this field, please see Field data types in the Elasticsearch Reference.
keyword
event.type
This is one of four ECS Categorization Fields, and indicates the third level in the ECS category hierarchy. event.type represents a categorization "sub-bucket" that, when used along with the event.category field values, enables filtering events down to a level appropriate for single visualization. This field is an array. This will allow proper categorization of some events that fall in multiple event types.
keyword
host.architecture
Operating system architecture.
keyword
host.containerized
If the host is a container.
boolean
host.domain
Name of the domain of which the host is a member. For example, on Windows this could be the host's Active Directory domain or NetBIOS domain name. For Linux this could be the domain of the host's LDAP provider.
keyword
host.hostname
Hostname of the host. It normally contains what the hostname command returns on the host machine.
keyword
host.id
Unique host id. As hostname is not always unique, use values that are meaningful in your environment. Example: The current usage of beat.name.
keyword
host.ip
Host ip addresses.
ip
host.mac
Host mac addresses.
keyword
host.name
Name of the host. It can contain what hostname returns on Unix systems, the fully qualified domain name, or a name specified by the user. The sender decides which value to use.
keyword
host.os.build
OS build information.
keyword
host.os.codename
OS codename, if any.
keyword
host.os.family
OS family (such as redhat, debian, freebsd, windows).
keyword
host.os.kernel
Operating system kernel version as a raw string.
keyword
host.os.name
Operating system name, without the version.
keyword
host.os.name.text
Multi-field of host.os.name.
text
host.os.platform
Operating system platform (such centos, ubuntu, windows).
keyword
host.os.version
Operating system version as a raw string.
keyword
host.type
Type of host. For Cloud providers this can be the machine type like t2.medium. If vm, this could be the container, for example, or other information meaningful in your environment.
keyword
input.type
Input type
keyword
log.offset
Log offset
long
message
For log events the message field contains the log message, optimized for viewing in a log viewer. For structured logs without an original message field, other fields can be concatenated to form a human-readable summary of the event. If multiple messages exist, they can be combined into one message.
match_only_text
network.name
Name given by operators to sections of their network.
keyword
related.hosts
All hostnames or other host identifiers seen on your event. Example identifiers include FQDNs, domain names, workstation names, or aliases.
keyword
related.ip
All of the IPs seen on your event.
ip
tags
List of keywords used to tag each event.
keyword
tenable_io.asset.acr_score
The Asset Criticality Rating (ACR) for the asset. With Lumin, Tenable assigns an ACR to each asset on your network to represent the asset's relative risk as an integer from 1 to 10.
long
tenable_io.asset.agent_names
The names of any Nessus agents that scanned and identified the asset.
keyword
tenable_io.asset.agent_uuid
The unique identifier of the Nessus agent that identified the asset.
keyword
tenable_io.asset.aws.availability_zone
The availability zone where Amazon Web Services hosts the virtual machine instance, for example, `us-east-1a``. Availability zones are subdivisions of AWS regions. For more information, see "Regions and Availability Zones" in the AWS documentation.
keyword
tenable_io.asset.aws.ec2_instance.ami_id
The unique identifier of the Linux AMI image in Amazon Elastic Compute Cloud (Amazon EC2). For more information, see the Amazon Elastic Compute Cloud Documentation.
keyword
tenable_io.asset.aws.ec2_instance.group_name
The virtual machine instance's group in AWS.
keyword
tenable_io.asset.aws.ec2_instance.id
The unique identifier of the Linux instance in Amazon EC2. For more information, see the Amazon Elastic Compute Cloud Documentation.
keyword
tenable_io.asset.aws.ec2_instance.state_name
The state of the virtual machine instance in AWS at the time of the scan.
keyword
tenable_io.asset.aws.ec2_instance.type
The type of instance in AWS EC2.
keyword
tenable_io.asset.aws.ec2_name
The name of the virtual machine instance in AWS EC2.
keyword
tenable_io.asset.aws.ec2_product_code
The product code associated with the AMI used to launch the virtual machine instance in AWS EC2.
keyword
tenable_io.asset.aws.owner_id
he canonical user identifier for the AWS account associated with the virtual machine instance. For example, 79a59df900b949e55d96a1e698fbacedfd6e09d98eacf8f8d5218e7cd47ef2be
keyword
tenable_io.asset.aws.region
The region where AWS hosts the virtual machine instance, for example, us-east-1. For more information, see "Regions and Availability Zones" in the AWS documentation.
keyword
tenable_io.asset.aws.subnet_id
The unique identifier of the AWS subnet where the virtual machine instance was running at the time of the scan.
keyword
tenable_io.asset.aws.vpc_id
The unique identifier for the virtual public cloud that hosts the AWS virtual machine instance. For more information, see the Amazon Virtual Private Cloud User Guide.
keyword
tenable_io.asset.azure.resource_id
The unique identifier of the resource in the Azure Resource Manager. For more information, see the Azure Resource Manager Documentation.
keyword
tenable_io.asset.azure.vm_id
The unique identifier of the Microsoft Azure virtual machine instance. For more information, see "Accessing and Using Azure VM Unique ID" in the Microsoft Azure documentation.
keyword
tenable_io.asset.bigfix_asset_id
The unique identifiers of the asset in HCL BigFix.
keyword
tenable_io.asset.bios_uuid
The BIOS UUID of the asset.
keyword
tenable_io.asset.created_at
The time and date when Tenable Vulnerability Management created the asset record.
date
tenable_io.asset.deleted_at
The time and date when a user deleted the asset record. When a user deletes an asset record, Tenable Vulnerability Management retains the record until the asset ages out of the license count.
date
tenable_io.asset.deleted_by
The user who deleted the asset record.
keyword
tenable_io.asset.exposure_score
The Asset Exposure Score (AES) for the asset.
long
tenable_io.asset.first_scan_time
The time and date of the first scan run against the asset.
date
tenable_io.asset.first_seen
The time and date when a scan first identified the asset.
date
tenable_io.asset.fqdns
The fully-qualified domain names that scans have associated with the asset record.
keyword
tenable_io.asset.gcp.instance_id
The zone where the virtual machine instance runs in GCP. For more information, see "Regions and Zones" in the GCP documentation.
keyword
tenable_io.asset.gcp.project_id
The unique identifier of the virtual machine instance in Google Cloud Platform (GCP).
keyword
tenable_io.asset.gcp.zone
The customized name of the project to which the virtual machine instance belongs in GCP.
keyword
tenable_io.asset.has_agent
Specifies whether a Nessus agent scan identified the asset.
boolean
tenable_io.asset.has_plugin_results
Specifies whether the asset has plugin results associated with it.
boolean
tenable_io.asset.hostnames
The hostnames that scans have associated with the asset record.
keyword
tenable_io.asset.id
The UUID of the asset in Tenable Vulnerability Management. Use this value as the unique key for the asset.
keyword
tenable_io.asset.installed_software
A list of Common Platform Enumeration (CPE) values that represent software applications a scan identified as present on an asset. This attribute supports the CPE 2.2 format.
keyword
tenable_io.asset.ipv4s
The IPv4 addresses that scans have associated with the asset record.
ip
tenable_io.asset.ipv6s
The IPv6 addresses that scans have associated with the asset record.
ip
tenable_io.asset.last_authenticated_scan_date
The time and date of the last credentialed scan run on the asset.
date
tenable_io.asset.last_licensed_scan_date
The time and date of the last scan that identified the asset as licensed. Tenable Vulnerability Management categorizes an asset as licensed if a scan of that asset has returned results from a non-discovery plugin within the last 90 days.
date
tenable_io.asset.last_scan_id
The UUID of the scan configuration used during the last scan of the asset.
keyword
tenable_io.asset.last_scan_time
The time and date of the last scan run against the asset.
date
tenable_io.asset.last_schedule_id
The schedule_uuid for the last scan of the asset.
keyword
tenable_io.asset.last_seen
The time and date of the scan that most recently identified the asset.
date
tenable_io.asset.mac_addresses
The MAC addresses that scans have associated with the asset record.
keyword
tenable_io.asset.manufacturer_tpm_ids
The manufacturer's unique identifiers of the Trusted Platform Module (TPM) associated with the asset.
keyword
tenable_io.asset.mcafee_epo.agent_guid
The unique identifier of the McAfee ePO agent that identified the asset. For more information, see the McAfee documentation.
keyword
tenable_io.asset.mcafee_epo.guid
The unique identifier of the asset in McAfee ePolicy Orchestrator (ePO). For more information, see the McAfee documentation.
keyword
tenable_io.asset.netbios_names
The NetBIOS names that scans have associated with the asset record.
keyword
tenable_io.asset.network.id
The ID of the network object associated with scanners that identified the asset. The default network ID is 00000000-0000-0000-0000-000000000000
keyword
tenable_io.asset.network.name
The ID of the network object associated with scanners that identified the asset. The default network name is Default. All other network names are user-defined
keyword
tenable_io.asset.network_interfaces.aliased
boolean
tenable_io.asset.network_interfaces.fqdns
One or more FQDN belonging to the interface.
keyword
tenable_io.asset.network_interfaces.ipv4s
One or more IPv4 addresses belonging to the interface.
ip
tenable_io.asset.network_interfaces.ipv6s
One or more IPv6 addresses belonging to the interface.
ip
tenable_io.asset.network_interfaces.mac_addresses
The MAC addresses of the interface.
keyword
tenable_io.asset.network_interfaces.name
The name of the interface.
keyword
tenable_io.asset.network_interfaces.virtual
keyword
tenable_io.asset.operating_systems
The operating systems that scans have associated with the asset record.
keyword
tenable_io.asset.qualys.asset_ids
The Asset ID of the asset in Qualys.
keyword
tenable_io.asset.qualys.host_ids
The Host ID of the asset in Qualys.
keyword
tenable_io.asset.servicenow_sysid
The unique record identifier of the asset in ServiceNow.
keyword
tenable_io.asset.sources.first_seen
The ISO timestamp when the source first reported the asset.
date
tenable_io.asset.sources.last_seen
The ISO timestamp when the source last reported the asset.
date
tenable_io.asset.sources.name
The name of the entity that reported the asset details. Sources can include sensors, connectors, and API imports. Source names can be customized by your organization.
keyword
tenable_io.asset.ssh_fingerprints
The SSH key fingerprints that scans have associated with the asset record.
keyword
tenable_io.asset.symantec_ep_hardware_keys
The hardware keys for the asset in Symantec Endpoint Protection.
keyword
tenable_io.asset.system_types
The system types as reported by Plugin ID 54615. Possible values include router, general-purpose, scan-host, and embedded.
keyword
tenable_io.asset.tags.added_at
The ISO timestamp when the tag was assigned to the asset.
date
tenable_io.asset.tags.added_by
The UUID of the user who assigned the tag to the asset.
keyword
tenable_io.asset.tags.key
The tag category (the first half of the category:value pair).
keyword
tenable_io.asset.tags.uuid
The UUID of the tag.
keyword
tenable_io.asset.tags.value
The tag value (the second half of the category:value pair).
keyword
tenable_io.asset.terminated_at
The time and date when a user terminated the Amazon Web Service (AWS) virtual machine instance of the asset.
date
tenable_io.asset.terminated_by
The user who terminated the AWS instance of the asset.
keyword
tenable_io.asset.updated_at
The time and date when the asset record was last updated.
date

plugin

This is the plugin dataset.

Example

An example event for plugin looks as following:

{
    "@timestamp": "2018-07-19T00:00:00.000Z",
    "agent": {
        "ephemeral_id": "c773a1f3-b256-46c0-8b0f-d59137734081",
        "id": "3c385f00-c1f1-40dd-b812-1cf0a8cc55cf",
        "name": "docker-fleet-agent",
        "type": "filebeat",
        "version": "8.7.1"
    },
    "data_stream": {
        "dataset": "tenable_io.plugin",
        "namespace": "ep",
        "type": "logs"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "3c385f00-c1f1-40dd-b812-1cf0a8cc55cf",
        "snapshot": false,
        "version": "8.7.1"
    },
    "event": {
        "agent_id_status": "verified",
        "created": "2023-10-04T07:02:44.312Z",
        "dataset": "tenable_io.plugin",
        "ingested": "2023-10-04T07:02:48Z",
        "kind": "state",
        "original": "{\"attributes\":{\"cpe\":[\"p-cpe:/a:fedoraproject:fedora:kernel-source\",\"cpe:/o:fedoraproject:fedora_core:1\",\"p-cpe:/a:fedoraproject:fedora:kernel-BOOT\",\"p-cpe:/a:fedoraproject:fedora:kernel-debuginfo\",\"p-cpe:/a:fedoraproject:fedora:kernel\",\"p-cpe:/a:fedoraproject:fedora:kernel-doc\",\"p-cpe:/a:fedoraproject:fedora:kernel-smp\"],\"cve\":[\"CVE-2003-0984\"],\"cvss3_base_score\":0,\"cvss3_temporal_score\":0,\"cvss_base_score\":4.6,\"cvss_temporal_score\":0,\"cvss_vector\":{\"AccessComplexity\":\"Low\",\"AccessVector\":\"Local-access\",\"Authentication\":\"None required\",\"Availability-Impact\":\"Partial\",\"Confidentiality-Impact\":\"Partial\",\"Integrity-Impact\":\"Partial\",\"raw\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\"},\"default_account\":false,\"description\":\"Various RTC drivers had the potential to leak...\",\"exploit_available\":false,\"exploit_framework_canvas\":false,\"exploit_framework_core\":false,\"exploit_framework_d2_elliot\":false,\"exploit_framework_exploithub\":false,\"exploit_framework_metasploit\":false,\"exploited_by_malware\":false,\"exploited_by_nessus\":false,\"has_patch\":true,\"in_the_news\":false,\"malware\":false,\"patch_publication_date\":\"2004-01-07T00:00:00Z\",\"plugin_modification_date\":\"2018-07-19T00:00:00Z\",\"plugin_publication_date\":\"2004-07-23T00:00:00Z\",\"plugin_type\":\"local\",\"plugin_version\":\"1.17\",\"risk_factor\":\"Medium\",\"see_also\":[\"http://example.com/u?07bc9e7f\"],\"solution\":\"Update the affected packages.\",\"synopsis\":\"The remote Fedora Core host is missing a security update.\",\"unsupported_by_vendor\":false,\"vpr\":{\"drivers\":{\"age_of_vuln\":{\"lower_bound\":366,\"upper_bound\":730},\"cvss3_impact_score\":5.9,\"cvss_impact_score_predicted\":false,\"exploit_code_maturity\":\"UNPROVEN\",\"product_coverage\":\"LOW\",\"threat_intensity_last28\":\"VERY_LOW\",\"threat_recency\":{\"lower_bound\":366,\"upper_bound\":730},\"threat_sources_last28\":[\"No recorded events\"]},\"score\":5.5,\"updated\":\"2018-07-19T00:00:00Z\"},\"xref\":[\"FEDORA:2003-047\"],\"xrefs\":[{\"id\":\"2003-047\",\"type\":\"FEDORA\"}]},\"id\":13670,\"name\":\"Fedora Core 1 : kernel-2.4.22-1.2140.nptl (2003-047)\"}",
        "type": [
            "info"
        ]
    },
    "input": {
        "type": "httpjson"
    },
    "tags": [
        "preserve_original_event",
        "preserve_duplicate_custom_fields",
        "forwarded",
        "tenable_io-plugin"
    ],
    "tenable_io": {
        "plugin": {
            "attributes": {
                "cpe": [
                    "p-cpe:/a:fedoraproject:fedora:kernel-source",
                    "cpe:/o:fedoraproject:fedora_core:1",
                    "p-cpe:/a:fedoraproject:fedora:kernel-BOOT",
                    "p-cpe:/a:fedoraproject:fedora:kernel-debuginfo",
                    "p-cpe:/a:fedoraproject:fedora:kernel",
                    "p-cpe:/a:fedoraproject:fedora:kernel-doc",
                    "p-cpe:/a:fedoraproject:fedora:kernel-smp"
                ],
                "cve": [
                    "CVE-2003-0984"
                ],
                "cvss": {
                    "base_score": 4.6,
                    "temporal": {
                        "score": 0
                    },
                    "vector": {
                        "access": {
                            "complexity": "Low",
                            "vector": "Local-access"
                        },
                        "authentication": "None required",
                        "availability_impact": "Partial",
                        "confidentiality_impact": "Partial",
                        "integrity_impact": "Partial",
                        "raw": "AV:L/AC:L/Au:N/C:P/I:P/A:P"
                    }
                },
                "cvss3": {
                    "base_score": 0,
                    "temporal": {
                        "score": 0
                    }
                },
                "default_account": false,
                "description": "Various RTC drivers had the potential to leak...",
                "exploit_available": false,
                "exploit_framework": {
                    "canvas": false,
                    "core": false,
                    "d2_elliot": false,
                    "hub": false,
                    "metasploit": false
                },
                "exploited_by": {
                    "malware": false,
                    "nessus": false
                },
                "has_patch": true,
                "in_the_news": false,
                "malware": false,
                "patch_publication_date": "2004-01-07T00:00:00.000Z",
                "plugin": {
                    "modification_date": "2018-07-19T00:00:00.000Z",
                    "publication_date": "2004-07-23T00:00:00.000Z",
                    "type": "local",
                    "version": "1.17"
                },
                "risk_factor": "Medium",
                "see_also": [
                    "http://example.com/u?07bc9e7f"
                ],
                "solution": "Update the affected packages.",
                "synopsis": "The remote Fedora Core host is missing a security update.",
                "unsupported_by_vendor": false,
                "vpr": {
                    "drivers": {
                        "age_of_vuln": {
                            "lower_bound": 366,
                            "upper_bound": 730
                        },
                        "cvss3_impact_score": 5.9,
                        "cvss_impact_score_predicted": false,
                        "exploit_code_maturity": "UNPROVEN",
                        "product_coverage": "LOW",
                        "threat_intensity_last28": "VERY_LOW",
                        "threat_recency": {
                            "lower_bound": 366,
                            "upper_bound": 730
                        },
                        "threat_sources_last28": [
                            "No recorded events"
                        ]
                    },
                    "score": 5.5,
                    "updated": "2018-07-19T00:00:00.000Z"
                },
                "xref": [
                    "FEDORA:2003-047"
                ],
                "xrefs": [
                    {
                        "id": "2003-047",
                        "type": "FEDORA"
                    }
                ]
            },
            "id": "13670",
            "name": "Fedora Core 1 : kernel-2.4.22-1.2140.nptl (2003-047)"
        }
    },
    "vulnerability": {
        "id": [
            "CVE-2003-0984"
        ],
        "reference": [
            "http://example.com/u?07bc9e7f"
        ],
        "scanner": {
            "vendor": "Tenable"
        },
        "score": {
            "base": 0,
            "temporal": 0
        }
    }
}

Exported fields

FieldDescriptionType
@timestamp
Event timestamp.
date
cloud.account.id
The cloud account or organization id used to identify different entities in a multi-tenant environment. Examples: AWS account id, Google Cloud ORG Id, or other unique identifier.
keyword
cloud.availability_zone
Availability zone in which this host is running.
keyword
cloud.image.id
Image ID for the cloud instance.
keyword
cloud.instance.id
Instance ID of the host machine.
keyword
cloud.instance.name
Instance name of the host machine.
keyword
cloud.machine.type
Machine type of the host machine.
keyword
cloud.project.id
Name of the project in Google Cloud.
keyword
cloud.provider
Name of the cloud provider. Example values are aws, azure, gcp, or digitalocean.
keyword
cloud.region
Region in which this host is running.
keyword
container.id
Unique container id.
keyword
container.image.name
Name of the image the container was built on.
keyword
container.labels
Image labels.
object
container.name
Container name.
keyword
data_stream.dataset
Data stream dataset.
constant_keyword
data_stream.namespace
Data stream namespace.
constant_keyword
data_stream.type
Data stream type.
constant_keyword
ecs.version
ECS version this event conforms to. ecs.version is a required field and must exist in all events. When querying across multiple indices -- which may conform to slightly different ECS versions -- this field lets integrations adjust to the schema version of the events.
keyword
event.created
event.created contains the date/time when the event was first read by an agent, or by your pipeline. This field is distinct from @timestamp in that @timestamp typically contain the time extracted from the original event. In most situations, these two timestamps will be slightly different. The difference can be used to calculate the delay between your source generating an event, and the time when your agent first processed it. This can be used to monitor your agent's or pipeline's ability to keep up with your event source. In case the two timestamps are identical, @timestamp should be used.
date
event.dataset
Event dataset
constant_keyword
event.kind
This is one of four ECS Categorization Fields, and indicates the highest level in the ECS category hierarchy. event.kind gives high-level information about what type of information the event contains, without being specific to the contents of the event. For example, values of this field distinguish alert events from metric events. The value of this field can be used to inform how these kinds of events should be handled. They may warrant different retention, different access control, it may also help understand whether the data is coming in at a regular interval or not.
keyword
event.module
Event module
constant_keyword
event.original
Raw text message of entire event. Used to demonstrate log integrity or where the full log message (before splitting it up in multiple parts) may be required, e.g. for reindex. This field is not indexed and doc_values are disabled. It cannot be searched, but it can be retrieved from _source. If users wish to override this and index this field, please see Field data types in the Elasticsearch Reference.
keyword
event.type
This is one of four ECS Categorization Fields, and indicates the third level in the ECS category hierarchy. event.type represents a categorization "sub-bucket" that, when used along with the event.category field values, enables filtering events down to a level appropriate for single visualization. This field is an array. This will allow proper categorization of some events that fall in multiple event types.
keyword
host.architecture
Operating system architecture.
keyword
host.containerized
If the host is a container.
boolean
host.domain
Name of the domain of which the host is a member. For example, on Windows this could be the host's Active Directory domain or NetBIOS domain name. For Linux this could be the domain of the host's LDAP provider.
keyword
host.hostname
Hostname of the host. It normally contains what the hostname command returns on the host machine.
keyword
host.id
Unique host id. As hostname is not always unique, use values that are meaningful in your environment. Example: The current usage of beat.name.
keyword
host.ip
Host ip addresses.
ip
host.mac
Host mac addresses.
keyword
host.name
Name of the host. It can contain what hostname returns on Unix systems, the fully qualified domain name, or a name specified by the user. The sender decides which value to use.
keyword
host.os.build
OS build information.
keyword
host.os.codename
OS codename, if any.
keyword
host.os.family
OS family (such as redhat, debian, freebsd, windows).
keyword
host.os.kernel
Operating system kernel version as a raw string.
keyword
host.os.name
Operating system name, without the version.
keyword
host.os.name.text
Multi-field of host.os.name.
text
host.os.platform
Operating system platform (such centos, ubuntu, windows).
keyword
host.os.version
Operating system version as a raw string.
keyword
host.type
Type of host. For Cloud providers this can be the machine type like t2.medium. If vm, this could be the container, for example, or other information meaningful in your environment.
keyword
input.type
Input type
keyword
log.offset
Log offset
long
message
For log events the message field contains the log message, optimized for viewing in a log viewer. For structured logs without an original message field, other fields can be concatenated to form a human-readable summary of the event. If multiple messages exist, they can be combined into one message.
match_only_text
tags
List of keywords used to tag each event.
keyword
tenable_io.plugin.attributes.always_run
boolean
tenable_io.plugin.attributes.bid
long
tenable_io.plugin.attributes.compliance
boolean
tenable_io.plugin.attributes.cpe
A list of plugin target systems identified by Common Platform Enumeration (CPE).
keyword
tenable_io.plugin.attributes.cve
A list of Common Vulnerabilities and Exposures (CVE) IDs for vulnerabilities associated with the plugin.
keyword
tenable_io.plugin.attributes.cvss.base_score
The CVSSv2 base score (intrinsic and fundamental characteristics of a vulnerability that are constant over time and user environments).
double
tenable_io.plugin.attributes.cvss.temporal.score
The raw CVSSv2 temporal metrics for the vulnerability.
double
tenable_io.plugin.attributes.cvss.temporal.vector.exploitability
keyword
tenable_io.plugin.attributes.cvss.temporal.vector.raw
keyword
tenable_io.plugin.attributes.cvss.temporal.vector.remediation_level
keyword
tenable_io.plugin.attributes.cvss.temporal.vector.report_confidence
keyword
tenable_io.plugin.attributes.cvss.vector.access.complexity
This metric measures the complexity of the attack required to exploit the vulnerability once an attacker has gained access to the target system. The possible values for this metric are High (H), Medium (M), and Low (L).
keyword
tenable_io.plugin.attributes.cvss.vector.access.vector
This metric reflects how the vulnerability is exploited. The possible values for this metric are Local (L), Adjacent Network (A), and Network (N).
keyword
tenable_io.plugin.attributes.cvss.vector.authentication
This metric measures the number of times an attacker must authenticate to a target in order to exploit a vulnerability. The possible values for this metric are Multiple (M), Single (S) and None (N).
keyword
tenable_io.plugin.attributes.cvss.vector.availability_impact
This metric measures the impact to availability of a successfully exploited vulnerability. The possible values for this metric are None (N), Partial (P), and Complete (C).
keyword
tenable_io.plugin.attributes.cvss.vector.confidentiality_impact
This metric measures the impact on confidentiality of a successfully exploited vulnerability. The possible values for this metric are None (N), Partial (P), and Complete (C).
keyword
tenable_io.plugin.attributes.cvss.vector.integrity_impact
This metric measures the impact to integrity of a successfully exploited vulnerability. The possible values for this metric are None (N), Partial (P), and Complete (C).
keyword
tenable_io.plugin.attributes.cvss.vector.raw
keyword
tenable_io.plugin.attributes.cvss3.base_score
The CVSSv3 base score (intrinsic and fundamental characteristics of a vulnerability that are constant over time and user environments).
double
tenable_io.plugin.attributes.cvss3.temporal.score
The CVSSv3 temporal metrics for the vulnerability.
double
tenable_io.plugin.attributes.cvss3.temporal.vector.exploit_code_maturity
keyword
tenable_io.plugin.attributes.cvss3.temporal.vector.raw
keyword
tenable_io.plugin.attributes.cvss3.temporal.vector.remediation_level
keyword
tenable_io.plugin.attributes.cvss3.temporal.vector.report_confidence
keyword
tenable_io.plugin.attributes.cvss3.vector.attack.complexity
This metric measures the complexity of the attack required to exploit the vulnerability once an attacker has gained access to the target system. The possible values for this metric are High (H), Medium (M), and Low (L).
keyword
tenable_io.plugin.attributes.cvss3.vector.attack.vector
This metric reflects how the vulnerability is exploited. The possible values for this metric are Local (L), Adjacent Network (A), and Network (N).
keyword
tenable_io.plugin.attributes.cvss3.vector.availability_impact
This metric measures the impact to availability of a successfully exploited vulnerability. The possible values for this metric are None (N), Partial (P), and Complete (C).
keyword
tenable_io.plugin.attributes.cvss3.vector.confidentiality_impact
This metric measures the impact on confidentiality of a successfully exploited vulnerability. The possible values for this metric are None (N), Partial (P), and Complete (C).
keyword
tenable_io.plugin.attributes.cvss3.vector.integrity_impact
This metric measures the impact to integrity of a successfully exploited vulnerability. The possible values for this metric are None (N), Partial (P), and Complete (C).
keyword
tenable_io.plugin.attributes.cvss3.vector.privileges_required
keyword
tenable_io.plugin.attributes.cvss3.vector.raw
keyword
tenable_io.plugin.attributes.cvss3.vector.scope
keyword
tenable_io.plugin.attributes.cvss3.vector.user_interaction
keyword
tenable_io.plugin.attributes.default_account
Indicates whether the plugin checks for default accounts requiring the use of credentials other than the credentials provided in the scan policy.
boolean
tenable_io.plugin.attributes.description
The extended description of the plugin.
keyword
tenable_io.plugin.attributes.exploit_available
Indicates whether a known public exploit exists for the vulnerability.
boolean
tenable_io.plugin.attributes.exploit_framework.canvas
Indicates whether an exploit exists in the Immunity CANVAS framework.
boolean
tenable_io.plugin.attributes.exploit_framework.core
Indicates whether an exploit exists in the CORE Impact framework.
boolean
tenable_io.plugin.attributes.exploit_framework.d2_elliot
Indicates an exploit exists in the D2 Elliot Web Exploitation framework.
boolean
tenable_io.plugin.attributes.exploit_framework.hub
Indicates whether an exploit exists in the ExploitHub framework.
boolean
tenable_io.plugin.attributes.exploit_framework.metasploit
Indicates whether an exploit exists in the Metasploit framework.
boolean
tenable_io.plugin.attributes.exploited_by.malware
Indicates whether the vulnerability discovered by this plugin is known to be exploited by malware.
boolean
tenable_io.plugin.attributes.exploited_by.nessus
Indicates whether Nessus exploited the vulnerability during the process of identification.
boolean
tenable_io.plugin.attributes.has_patch
Indicates whether the vendor has published a patch for the vulnerability. This attribute is true if there is a published patch for the vulnerability (that is, the patch_publication_date attribute contains data) and false if there is no published patch or a patch is not relevant to remediating the vulnerability (that is, patch_publication_date does not contain data).
boolean
tenable_io.plugin.attributes.in_the_news
Indicates whether this plugin has received media attention (for example, ShellShock, Meltdown).
boolean
tenable_io.plugin.attributes.intel_type
keyword
tenable_io.plugin.attributes.malware
Indicates whether the plugin targets potentially malicious files or processes.
boolean
tenable_io.plugin.attributes.patch_publication_date
The date when the vendor published a patch for the vulnerability.
date
tenable_io.plugin.attributes.plugin.modification_date
The date when Tenable last updated the plugin.
date
tenable_io.plugin.attributes.plugin.publication_date
The date when Tenable originally published the plugin.
date
tenable_io.plugin.attributes.plugin.type
Plugin type, for example, local, remote, or combined.
keyword
tenable_io.plugin.attributes.plugin.version
The version of the plugin.
version
tenable_io.plugin.attributes.risk_factor
The risk factor associated with the plugin. Possible values are: Low (The vulnerability has a CVSS score between 0.1 and 3.9), Medium (The vulnerability has a CVSS score between 4.0 and 6.9), High (The vulnerability has a CVSS score between 7.0 and 9.9), or Critical (The vulnerability has a CVSS score of 10.0).
keyword
tenable_io.plugin.attributes.see_also
Links to external websites that contain helpful information about the vulnerability.
keyword
tenable_io.plugin.attributes.solution
Remediation information for the vulnerability.
keyword
tenable_io.plugin.attributes.synopsis
A brief summary of the vulnerability or vulnerabilities associated with the plugin.
keyword
tenable_io.plugin.attributes.unsupported_by_vendor
Indicates whether the software found by this plugin is unsupported by the software's vendor (for example, Windows 95 or Firefox 3).
boolean
tenable_io.plugin.attributes.vpr.drivers.age_of_vuln.lower_bound
The lower bound of the range. For example, for the 0-7 days range, this attribute is "0". For the highest range (more than 730 days), this value is "731".
long
tenable_io.plugin.attributes.vpr.drivers.age_of_vuln.upper_bound
The upper bound of the range. For example, for the 0-7 days range, this attribute is "7". For the highest range (more than 730 days), this value is "0", which signifies that there is no higher category.
long
tenable_io.plugin.attributes.vpr.drivers.cvss3_impact_score
The NVD-provided CVSSv3 impact score for the vulnerability. If the NVD did not provide a score, Tenable Vulnerability Management displays a Tenable-predicted score.
double
tenable_io.plugin.attributes.vpr.drivers.cvss_impact_score_predicted
A value specifying whether Tenable predicted the CVSSv3 impact score for the vulnerability because NVD did not provide one (true) or used the NVD-provided CVSSv3 impact score (false) when calculating the VPR.
boolean
tenable_io.plugin.attributes.vpr.drivers.exploit_code_maturity
The relative maturity of a possible exploit for the vulnerability based on the existence, sophistication, and prevalence of exploit intelligence from internal and external sources (for example, Reversinglabs, Exploit-db, Metasploit, etc.). The possible values ("High", "Functional", "PoC", or "Unproven") parallel the CVSS Exploit Code Maturity categories.
keyword
tenable_io.plugin.attributes.vpr.drivers.product_coverage
The relative number of unique products affected by the vulnerability: 'Low', 'Medium', 'High', or 'Very High'.
keyword
tenable_io.plugin.attributes.vpr.drivers.threat_intensity_last28
The relative intensity based on the number and frequency of recently observed threat events related to this vulnerability: Very Low, Low, Medium, High, or Very High.
keyword
tenable_io.plugin.attributes.vpr.drivers.threat_recency.lower_bound
The lower bound of the range. For example, for the 0-7 days range, this attribute is "0". For the highest range (more than 365 days), this value is "366".
long
tenable_io.plugin.attributes.vpr.drivers.threat_recency.upper_bound
The upper bound of the range. For example, for the 0-7 days range, this attribute is "7". For the highest range (more than 730 days), this value is "0", which signifies that there is no higher category.
long
tenable_io.plugin.attributes.vpr.drivers.threat_sources_last28
A list of all sources (for example, social media channels, the dark web, etc.) where threat events related to this vulnerability occurred. Item type: string.
keyword
tenable_io.plugin.attributes.vpr.score
The Vulnerability Priority Rating (VPR) for the vulnerability. If a plugin is designed to detect multiple vulnerabilities, the VPR represents the highest value calculated for a vulnerability associated with the plugin.
double
tenable_io.plugin.attributes.vpr.updated
The ISO timestamp when Tenable Vulnerability Management last imported the VPR for this vulnerability. Tenable Vulnerability Management imports updated VPR values every time you run a scan.
date
tenable_io.plugin.attributes.vuln_publication_date
date
tenable_io.plugin.attributes.xref
References to third-party information about the vulnerability, exploit, or update associated with the plugin presented as an array of strings. Each reference includes a type, for example, "FEDORA", and an ID, for example, "2003-047".
keyword
tenable_io.plugin.attributes.xrefs.id
keyword
tenable_io.plugin.attributes.xrefs.type
keyword
tenable_io.plugin.id
The ID of the plugin.
keyword
tenable_io.plugin.name
The name of the plugin.
keyword
vulnerability.id
The identification (ID) is the number portion of a vulnerability entry. It includes a unique identification number for the vulnerability. For example (https://cve.mitre.org/about/faqs.html#what\_is\_cve\_id)\[Common Vulnerabilities and Exposure CVE ID]
keyword
vulnerability.reference
A resource that provides additional information, context, and mitigations for the identified vulnerability.
keyword
vulnerability.scanner.vendor
The name of the vulnerability scanner vendor.
keyword
vulnerability.score.base
Scores can range from 0.0 to 10.0, with 10.0 being the most severe. Base scores cover an assessment for exploitability metrics (attack vector, complexity, privileges, and user interaction), impact metrics (confidentiality, integrity, and availability), and scope. For example (https://www.first.org/cvss/specification-document)
float
vulnerability.score.temporal
Scores can range from 0.0 to 10.0, with 10.0 being the most severe. Temporal scores cover an assessment for code maturity, remediation level, and confidence. For example (https://www.first.org/cvss/specification-document)
float

vulnerability

This is the vulnerability dataset.

Example

An example event for vulnerability looks as following:

{
    "@timestamp": "2018-12-31T20:59:47.000Z",
    "agent": {
        "ephemeral_id": "42734433-3701-4961-aa7e-b3e499d63cdf",
        "id": "9fcad6fb-106f-48a9-a13e-3a4026b60340",
        "name": "docker-fleet-agent",
        "type": "filebeat",
        "version": "8.11.3"
    },
    "data_stream": {
        "dataset": "tenable_io.vulnerability",
        "namespace": "ep",
        "type": "logs"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "9fcad6fb-106f-48a9-a13e-3a4026b60340",
        "snapshot": false,
        "version": "8.11.3"
    },
    "event": {
        "agent_id_status": "verified",
        "category": [
            "vulnerability"
        ],
        "created": "2024-01-05T11:53:21.505Z",
        "dataset": "tenable_io.vulnerability",
        "ingested": "2024-01-05T11:53:24Z",
        "kind": "state",
        "original": "{\"asset\":{\"fqdn\":\"example.com\",\"hostname\":\"89.160.20.112\",\"ipv4\":\"81.2.69.142\",\"network_id\":\"00000000-0000-0000-0000-000000000000\",\"operating_system\":[\"Test Demo OS X 10.5.8\"],\"tracked\":true,\"uuid\":\"cf165808-6a31-48e1-9cf3-c6c3174df51d\"},\"first_found\":\"2018-12-31T20:59:47Z\",\"indexed\":\"2022-11-30T14:09:12.061Z\",\"last_found\":\"2018-12-31T20:59:47Z\",\"output\":\"The observed version of Test  is : \\n /21.0.1180.90\",\"plugin\":{\"cve\":[\"CVE-2016-1620\",\"CVE-2016-1614\",\"CVE-2016-1613\",\"CVE-2016-1612\",\"CVE-2016-1618\",\"CVE-2016-1617\",\"CVE-2016-1616\",\"CVE-2016-1615\",\"CVE-2016-1619\"],\"cvss_base_score\":9.3,\"cvss_temporal_score\":6.9,\"cvss_temporal_vector\":{\"exploitability\":\"Unproven\",\"raw\":\"E:U/RL:OF/RC:C\",\"remediation_level\":\"Official-fix\",\"report_confidence\":\"Confirmed\"},\"cvss_vector\":{\"access_complexity\":\"Medium\",\"access_vector\":\"Network\",\"authentication\":\"None required\",\"availability_impact\":\"Complete\",\"confidentiality_impact\":\"Complete\",\"integrity_impact\":\"Complete\",\"raw\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\"},\"description\":\"The version of Test  on the remote host is prior to 48.0.2564.82 and is affected by the following vulnerabilities: \\n\\n - An unspecified vulnerability exists in Test V8 when handling compatible receiver checks hidden behind receptors.  An attacker can exploit this to have an unspecified impact.  No other details are available. (CVE-2016-1612)\\n - A use-after-free error exists in `PDFium` due to improper invalidation of `IPWL_FocusHandler` and `IPWL_Provider` upon destruction.  An attacker can exploit this to dereference already freed memory, resulting in the execution of arbitrary code. (CVE-2016-1613)\\n - An unspecified vulnerability exists in `Blink` that is related to the handling of bitmaps.  An attacker can exploit this to access sensitive information.  No other details are available. (CVE-2016-1614)\\n - An unspecified vulnerability exists in `omnibox` that is related to origin confusion.  An attacker can exploit this to have an unspecified impact.  No other details are available. (CVE-2016-1615)\\n - An unspecified vulnerability exists that allows an attacker to spoof a displayed URL.  No other details are available. (CVE-2016-1616)\\n - An unspecified vulnerability exists that is related to history sniffing with HSTS and CSP. No other details are available. (CVE-2016-1617)\\n - A flaw exists in `Blink` due to the weak generation of random numbers by the ARC4-based random number generator.  An attacker can exploit this to gain access to sensitive information.  No other details are available. (CVE-2016-1618)\\n - An out-of-bounds read error exists in `PDFium` in file `fx_codec_jpx_opj.cpp` in the `sycc4{22,44}_to_rgb()` functions. An attacker can exploit this to cause a denial of service by crashing the application linked using the library. (CVE-2016-1619)\\n - Multiple vulnerabilities exist, the most serious of which allow an attacker to execute arbitrary code via a crafted web page. (CVE-2016-1620)\\n - A flaw in `objects.cc` is triggered when handling cleared `WeakCells`, which may allow a context-dependent attacker to have an unspecified impact. No further details have been provided. (CVE-2016-2051)\",\"family\":\"Web Clients\",\"family_id\":1000020,\"has_patch\":false,\"id\":9062,\"name\":\"Test  \\u0026lt; 48.0.2564.82 Multiple Vulnerabilities\",\"risk_factor\":\"HIGH\",\"see_also\":[\"http://testreleases.blogspot.com/2016/01/beta-channel-update_20.html\"],\"solution\":\"Update the  browser to 48.0.2564.82 or later.\",\"synopsis\":\"The remote host is utilizing a web browser that is affected by multiple vulnerabilities.\",\"vpr\":{\"drivers\":{\"age_of_vuln\":{\"lower_bound\":366,\"upper_bound\":730},\"cvss3_impact_score\":5.9,\"cvss_impact_score_predicted\":false,\"exploit_code_maturity\":\"UNPROVEN\",\"product_coverage\":\"LOW\",\"threat_intensity_last28\":\"VERY_LOW\",\"threat_sources_last28\":[\"No recorded events\"]},\"score\":5.9,\"updated\":\"2019-12-31T10:08:58Z\"}},\"port\":{\"port\":\"0\",\"protocol\":\"TCP\"},\"scan\":{\"completed_at\":\"2018-12-31T20:59:47Z\",\"schedule_uuid\":\"6f7db010-9cb6-4870-b745-70a2aea2f81ce1b6640fe8a2217b\",\"started_at\":\"2018-12-31T20:59:47Z\",\"uuid\":\"0e55ec5d-c7c7-4673-a618-438a84e9d1b78af3a9957a077904\"},\"severity\":\"low\",\"severity_default_id\":3,\"severity_id\":3,\"severity_modification_type\":\"NONE\",\"state\":\"OPEN\"}",
        "type": [
            "info"
        ]
    },
    "host": {
        "domain": "example.com",
        "id": "cf165808-6a31-48e1-9cf3-c6c3174df51d",
        "ip": [
            "89.160.20.112",
            "81.2.69.142"
        ],
        "os": {
            "full": [
                "Test Demo OS X 10.5.8"
            ]
        }
    },
    "input": {
        "type": "httpjson"
    },
    "related": {
        "hosts": [
            "example.com"
        ],
        "ip": [
            "89.160.20.112",
            "81.2.69.142"
        ]
    },
    "tags": [
        "preserve_original_event",
        "preserve_duplicate_custom_fields",
        "forwarded",
        "tenable_io-vulnerability"
    ],
    "tenable_io": {
        "vulnerability": {
            "asset": {
                "fqdn": "example.com",
                "ip_address": "89.160.20.112",
                "ipv4": "81.2.69.142",
                "network_id": "00000000-0000-0000-0000-000000000000",
                "operating_system": [
                    "Test Demo OS X 10.5.8"
                ],
                "tracked": true,
                "uuid": "cf165808-6a31-48e1-9cf3-c6c3174df51d"
            },
            "first_found": "2018-12-31T20:59:47.000Z",
            "indexed": "2022-11-30T14:09:12.061Z",
            "last_found": "2018-12-31T20:59:47.000Z",
            "output": "The observed version of Test  is : \n /21.0.1180.90",
            "plugin": {
                "cve": [
                    "CVE-2016-1620",
                    "CVE-2016-1614",
                    "CVE-2016-1613",
                    "CVE-2016-1612",
                    "CVE-2016-1618",
                    "CVE-2016-1617",
                    "CVE-2016-1616",
                    "CVE-2016-1615",
                    "CVE-2016-1619"
                ],
                "cvss": {
                    "base_score": 9.3,
                    "temporal": {
                        "score": 6.9,
                        "vector": {
                            "exploitability": "Unproven",
                            "raw": "E:U/RL:OF/RC:C",
                            "remediation_level": "Official-fix",
                            "report_confidence": "Confirmed"
                        }
                    },
                    "vector": {
                        "access": {
                            "complexity": "Medium",
                            "vector": "Network"
                        },
                        "authentication": "None required",
                        "availability_impact": "Complete",
                        "confidentiality_impact": "Complete",
                        "integrity_impact": "Complete",
                        "raw": "AV:N/AC:M/Au:N/C:C/I:C/A:C"
                    }
                },
                "description": "The version of Test  on the remote host is prior to 48.0.2564.82 and is affected by the following vulnerabilities: \n\n - An unspecified vulnerability exists in Test V8 when handling compatible receiver checks hidden behind receptors.  An attacker can exploit this to have an unspecified impact.  No other details are available. (CVE-2016-1612)\n - A use-after-free error exists in `PDFium` due to improper invalidation of `IPWL_FocusHandler` and `IPWL_Provider` upon destruction.  An attacker can exploit this to dereference already freed memory, resulting in the execution of arbitrary code. (CVE-2016-1613)\n - An unspecified vulnerability exists in `Blink` that is related to the handling of bitmaps.  An attacker can exploit this to access sensitive information.  No other details are available. (CVE-2016-1614)\n - An unspecified vulnerability exists in `omnibox` that is related to origin confusion.  An attacker can exploit this to have an unspecified impact.  No other details are available. (CVE-2016-1615)\n - An unspecified vulnerability exists that allows an attacker to spoof a displayed URL.  No other details are available. (CVE-2016-1616)\n - An unspecified vulnerability exists that is related to history sniffing with HSTS and CSP. No other details are available. (CVE-2016-1617)\n - A flaw exists in `Blink` due to the weak generation of random numbers by the ARC4-based random number generator.  An attacker can exploit this to gain access to sensitive information.  No other details are available. (CVE-2016-1618)\n - An out-of-bounds read error exists in `PDFium` in file `fx_codec_jpx_opj.cpp` in the `sycc4{22,44}_to_rgb()` functions. An attacker can exploit this to cause a denial of service by crashing the application linked using the library. (CVE-2016-1619)\n - Multiple vulnerabilities exist, the most serious of which allow an attacker to execute arbitrary code via a crafted web page. (CVE-2016-1620)\n - A flaw in `objects.cc` is triggered when handling cleared `WeakCells`, which may allow a context-dependent attacker to have an unspecified impact. No further details have been provided. (CVE-2016-2051)",
                "family": "Web Clients",
                "family_id": 1000020,
                "has_patch": false,
                "id": 9062,
                "name": "Test  < 48.0.2564.82 Multiple Vulnerabilities",
                "risk_factor": "HIGH",
                "see_also": [
                    "http://testreleases.blogspot.com/2016/01/beta-channel-update_20.html"
                ],
                "solution": "Update the  browser to 48.0.2564.82 or later.",
                "synopsis": "The remote host is utilizing a web browser that is affected by multiple vulnerabilities.",
                "vpr": {
                    "drivers": {
                        "age_of_vuln": {
                            "lower_bound": 366,
                            "upper_bound": 730
                        },
                        "cvss3_impact_score": 5.9,
                        "cvss_impact_score_predicted": false,
                        "exploit_code_maturity": "UNPROVEN",
                        "product_coverage": "LOW",
                        "threat_intensity_last28": "VERY_LOW",
                        "threat_sources_last28": [
                            "No recorded events"
                        ]
                    },
                    "score": 5.9,
                    "updated": "2019-12-31T10:08:58.000Z"
                }
            },
            "port": {
                "protocol": "TCP",
                "value": 0
            },
            "scan": {
                "completed_at": "2018-12-31T20:59:47.000Z",
                "schedule_uuid": "6f7db010-9cb6-4870-b745-70a2aea2f81ce1b6640fe8a2217b",
                "started_at": "2018-12-31T20:59:47.000Z",
                "uuid": "0e55ec5d-c7c7-4673-a618-438a84e9d1b78af3a9957a077904"
            },
            "severity": {
                "default_id": 3,
                "id": 3,
                "modification_type": "NONE",
                "value": "low"
            },
            "state": "OPEN"
        }
    },
    "vulnerability": {
        "category": [
            "Web Clients"
        ],
        "classification": "CVSS",
        "description": "The version of Test  on the remote host is prior to 48.0.2564.82 and is affected by the following vulnerabilities: \n\n - An unspecified vulnerability exists in Test V8 when handling compatible receiver checks hidden behind receptors.  An attacker can exploit this to have an unspecified impact.  No other details are available. (CVE-2016-1612)\n - A use-after-free error exists in `PDFium` due to improper invalidation of `IPWL_FocusHandler` and `IPWL_Provider` upon destruction.  An attacker can exploit this to dereference already freed memory, resulting in the execution of arbitrary code. (CVE-2016-1613)\n - An unspecified vulnerability exists in `Blink` that is related to the handling of bitmaps.  An attacker can exploit this to access sensitive information.  No other details are available. (CVE-2016-1614)\n - An unspecified vulnerability exists in `omnibox` that is related to origin confusion.  An attacker can exploit this to have an unspecified impact.  No other details are available. (CVE-2016-1615)\n - An unspecified vulnerability exists that allows an attacker to spoof a displayed URL.  No other details are available. (CVE-2016-1616)\n - An unspecified vulnerability exists that is related to history sniffing with HSTS and CSP. No other details are available. (CVE-2016-1617)\n - A flaw exists in `Blink` due to the weak generation of random numbers by the ARC4-based random number generator.  An attacker can exploit this to gain access to sensitive information.  No other details are available. (CVE-2016-1618)\n - An out-of-bounds read error exists in `PDFium` in file `fx_codec_jpx_opj.cpp` in the `sycc4{22,44}_to_rgb()` functions. An attacker can exploit this to cause a denial of service by crashing the application linked using the library. (CVE-2016-1619)\n - Multiple vulnerabilities exist, the most serious of which allow an attacker to execute arbitrary code via a crafted web page. (CVE-2016-1620)\n - A flaw in `objects.cc` is triggered when handling cleared `WeakCells`, which may allow a context-dependent attacker to have an unspecified impact. No further details have been provided. (CVE-2016-2051)",
        "enumeration": "CVE",
        "id": [
            "CVE-2016-1620",
            "CVE-2016-1614",
            "CVE-2016-1613",
            "CVE-2016-1612",
            "CVE-2016-1618",
            "CVE-2016-1617",
            "CVE-2016-1616",
            "CVE-2016-1615",
            "CVE-2016-1619"
        ],
        "reference": [
            "http://testreleases.blogspot.com/2016/01/beta-channel-update_20.html"
        ],
        "report_id": "0e55ec5d-c7c7-4673-a618-438a84e9d1b78af3a9957a077904",
        "scanner": {
            "vendor": "Tenable"
        },
        "score": {
            "version": "3.0"
        },
        "severity": "low"
    }
}

Exported fields

FieldDescriptionType
@timestamp
Event timestamp.
date
cloud.account.id
The cloud account or organization id used to identify different entities in a multi-tenant environment. Examples: AWS account id, Google Cloud ORG Id, or other unique identifier.
keyword
cloud.availability_zone
Availability zone in which this host is running.
keyword
cloud.image.id
Image ID for the cloud instance.
keyword
cloud.instance.id
Instance ID of the host machine.
keyword
cloud.instance.name
Instance name of the host machine.
keyword
cloud.machine.type
Machine type of the host machine.
keyword
cloud.project.id
Name of the project in Google Cloud.
keyword
cloud.provider
Name of the cloud provider. Example values are aws, azure, gcp, or digitalocean.
keyword
cloud.region
Region in which this host is running.
keyword
container.id
Unique container id.
keyword
container.image.name
Name of the image the container was built on.
keyword
container.labels
Image labels.
object
container.name
Container name.
keyword
data_stream.dataset
Data stream dataset.
constant_keyword
data_stream.namespace
Data stream namespace.
constant_keyword
data_stream.type
Data stream type.
constant_keyword
ecs.version
ECS version this event conforms to. ecs.version is a required field and must exist in all events. When querying across multiple indices -- which may conform to slightly different ECS versions -- this field lets integrations adjust to the schema version of the events.
keyword
event.category
This is one of four ECS Categorization Fields, and indicates the second level in the ECS category hierarchy. event.category represents the "big buckets" of ECS categories. For example, filtering on event.category:process yields all events relating to process activity. This field is closely related to event.type, which is used as a subcategory. This field is an array. This will allow proper categorization of some events that fall in multiple categories.
keyword
event.created
event.created contains the date/time when the event was first read by an agent, or by your pipeline. This field is distinct from @timestamp in that @timestamp typically contain the time extracted from the original event. In most situations, these two timestamps will be slightly different. The difference can be used to calculate the delay between your source generating an event, and the time when your agent first processed it. This can be used to monitor your agent's or pipeline's ability to keep up with your event source. In case the two timestamps are identical, @timestamp should be used.
date
event.dataset
Event dataset
constant_keyword
event.kind
This is one of four ECS Categorization Fields, and indicates the highest level in the ECS category hierarchy. event.kind gives high-level information about what type of information the event contains, without being specific to the contents of the event. For example, values of this field distinguish alert events from metric events. The value of this field can be used to inform how these kinds of events should be handled. They may warrant different retention, different access control, it may also help understand whether the data is coming in at a regular interval or not.
keyword
event.module
Event module
constant_keyword
event.original
Raw text message of entire event. Used to demonstrate log integrity or where the full log message (before splitting it up in multiple parts) may be required, e.g. for reindex. This field is not indexed and doc_values are disabled. It cannot be searched, but it can be retrieved from _source. If users wish to override this and index this field, please see Field data types in the Elasticsearch Reference.
keyword
event.type
This is one of four ECS Categorization Fields, and indicates the third level in the ECS category hierarchy. event.type represents a categorization "sub-bucket" that, when used along with the event.category field values, enables filtering events down to a level appropriate for single visualization. This field is an array. This will allow proper categorization of some events that fall in multiple event types.
keyword
host.architecture
Operating system architecture.
keyword
host.containerized
If the host is a container.
boolean
host.domain
Name of the domain of which the host is a member. For example, on Windows this could be the host's Active Directory domain or NetBIOS domain name. For Linux this could be the domain of the host's LDAP provider.
keyword
host.hostname
Hostname of the host. It normally contains what the hostname command returns on the host machine.
keyword
host.id
Unique host id. As hostname is not always unique, use values that are meaningful in your environment. Example: The current usage of beat.name.
keyword
host.ip
Host ip addresses.
ip
host.mac
Host mac addresses.
keyword
host.name
Name of the host. It can contain what hostname returns on Unix systems, the fully qualified domain name, or a name specified by the user. The sender decides which value to use.
keyword
host.os.build
OS build information.
keyword
host.os.codename
OS codename, if any.
keyword
host.os.family
OS family (such as redhat, debian, freebsd, windows).
keyword
host.os.kernel
Operating system kernel version as a raw string.
keyword
host.os.name
Operating system name, without the version.
keyword
host.os.name.text
Multi-field of host.os.name.
text
host.os.platform
Operating system platform (such centos, ubuntu, windows).
keyword
host.os.version
Operating system version as a raw string.
keyword
host.type
Type of host. For Cloud providers this can be the machine type like t2.medium. If vm, this could be the container, for example, or other information meaningful in your environment.
keyword
input.type
Input type
keyword
log.offset
Log offset
long
message
For log events the message field contains the log message, optimized for viewing in a log viewer. For structured logs without an original message field, other fields can be concatenated to form a human-readable summary of the event. If multiple messages exist, they can be combined into one message.
match_only_text
related.hosts
All hostnames or other host identifiers seen on your event. Example identifiers include FQDNs, domain names, workstation names, or aliases.
keyword
related.ip
All of the IPs seen on your event.
ip
tags
List of keywords used to tag each event.
keyword
tenable_io.vulnerability.asset.agent_uuid
The UUID of the agent that performed the scan where the vulnerability was found.
keyword
tenable_io.vulnerability.asset.bios_uuid
The BIOS UUID of the asset where the vulnerability was found.
keyword
tenable_io.vulnerability.asset.device_type
The type of asset where the vulnerability was found.
keyword
tenable_io.vulnerability.asset.fqdn
The fully-qualified domain name of the asset where a scan found the vulnerability.
keyword
tenable_io.vulnerability.asset.hostname
The host name of the asset where a scan found the vulnerability.
keyword
tenable_io.vulnerability.asset.ip_address
keyword
tenable_io.vulnerability.asset.ipv4
The IPv4 address of the asset where a scan found the vulnerability.
ip
tenable_io.vulnerability.asset.ipv6
The IPv6 address of the asset where a scan found the vulnerability.
ip
tenable_io.vulnerability.asset.last_authenticated_results
The last date credentials were used successfully to scan the asset.
date
tenable_io.vulnerability.asset.last_unauthenticated_results
The last date when the asset was scanned without using credentials
date
tenable_io.vulnerability.asset.mac_address
The MAC address of the asset where a scan found the vulnerability.
keyword
tenable_io.vulnerability.asset.netbios.name
The NETBIOS name of the asset where a scan found the vulnerability.
keyword
tenable_io.vulnerability.asset.netbios.workgroup
The NETBIOS workgroup of the asset where a scan found the vulnerability.
keyword
tenable_io.vulnerability.asset.network_id
The ID of the network object associated with scanners that identified the asset. The default network ID is 00000000-0000-0000-0000-000000000000
keyword
tenable_io.vulnerability.asset.operating_system
The operating system of the asset where a scan found the vulnerability.
keyword
tenable_io.vulnerability.asset.tracked
A value specifying whether Tenable Vulnerability Management tracks the asset in the asset management system. Tenable Vulnerability Management still assigns untracked assets identifiers in scan results, but these identifiers change with each new scan of the asset. This parameter is relevant to PCI-type scans and in certain cases where there is not enough information in a scan to identify the asset. Untracked assets appear in the scan history, but do not appear in workbenches or reports.
boolean
tenable_io.vulnerability.asset.uuid
The UUID of the asset where a scan found the vulnerability.
keyword
tenable_io.vulnerability.first_found
The ISO date when a scan first detected the vulnerability on the asset.
date
tenable_io.vulnerability.indexed
The date and time (in Unix time) when the vulnerability was indexed into Tenable Vulnerability Management.
date
tenable_io.vulnerability.last_fixed
The ISO date when a scan no longer detects the previously detected vulnerability on the asset.
date
tenable_io.vulnerability.last_found
The ISO date when a scan last detected the vulnerability on the asset.
date
tenable_io.vulnerability.output
The text output of the Nessus scanner.
keyword
tenable_io.vulnerability.plugin.always_run
boolean
tenable_io.vulnerability.plugin.bid
The Bugtraq ID for the plugin.
long
tenable_io.vulnerability.plugin.canvas_package
The name of the CANVAS exploit pack that includes the vulnerability.
keyword
tenable_io.vulnerability.plugin.checks_for_default_account
A value specifying whether the plugin checks for default accounts.
boolean
tenable_io.vulnerability.plugin.checks_for_malware
A value specifying whether the plugin checks for malware.
boolean
tenable_io.vulnerability.plugin.compliance
boolean
tenable_io.vulnerability.plugin.cpe
The Common Platform Enumeration (CPE) number for the plugin.
keyword
tenable_io.vulnerability.plugin.cve
The Common Vulnerability and Exposure (CVE) ID for the plugin.
keyword
tenable_io.vulnerability.plugin.cvss.base_score
The CVSSv2 base score (intrinsic and fundamental characteristics of a vulnerability that are constant over time and user environments)
double
tenable_io.vulnerability.plugin.cvss.temporal.score
The CVSSv2 temporal score (characteristics of a vulnerability that change over time but not among user environments).
double
tenable_io.vulnerability.plugin.cvss.temporal.vector.exploitability
The CVSSv2 Exploitability (E) temporal metric for the vulnerability the plugin covers. Possible values include: U, POC, F, H and ND.
keyword
tenable_io.vulnerability.plugin.cvss.temporal.vector.raw
The complete cvss_temporal_vector metrics and result values for the vulnerability the plugin covers in a condensed and coded format. For example, E:U/RL:OF/RC:C.
keyword
tenable_io.vulnerability.plugin.cvss.temporal.vector.remediation_level
The CVSSv2 Remediation Level (RL) temporal metric for the vulnerability the plugin covers. Possible values include: OF, TF ,W, U and ND.
keyword
tenable_io.vulnerability.plugin.cvss.temporal.vector.report_confidence
The CVSSv2 Report Confidence (RC) temporal metric for the vulnerability the plugin covers. Possible values include: UC, UR, C and ND.
keyword
tenable_io.vulnerability.plugin.cvss.vector.access.complexity
The CVSSv2 Access Complexity (AC) metric for the vulnerability the plugin covers. Possible values include: H, M and L.
keyword
tenable_io.vulnerability.plugin.cvss.vector.access.vector
The CVSSv2 Access Vector (AV) metric for the vulnerability the plugin covers. Possible values include: L,A and N.
keyword
tenable_io.vulnerability.plugin.cvss.vector.authentication
The CVSSv2 Authentication (Au) metric for the vulnerability the plugin covers. Possible values include N, S and M.
keyword
tenable_io.vulnerability.plugin.cvss.vector.availability_impact
The CVSSv2 availability impact metric for the vulnerability the plugin covers. Possible values include N, P and C.
keyword
tenable_io.vulnerability.plugin.cvss.vector.confidentiality_impact
The CVSSv2 confidentiality impact metric for the vulnerability the plugin covers. Possible values include: N, P and C.
keyword
tenable_io.vulnerability.plugin.cvss.vector.integrity_impact
The CVSSv2 integrity impact metric for the vulnerability the plugin covers. Possible values include: N, P and C.
keyword
tenable_io.vulnerability.plugin.cvss.vector.raw
The complete cvss_vector metrics and result values for the vulnerability the plugin covers in a condensed and coded format. For example, AV:N/AC:M/Au:N/C:C/I:C/A:C.
keyword
tenable_io.vulnerability.plugin.cvss3.base_score
The CVSSv3 base score (intrinsic and fundamental characteristics of a vulnerability that are constant over time and user environments).
double
tenable_io.vulnerability.plugin.cvss3.temporal.score
The CVSSv3 temporal score (characteristics of a vulnerability that change over time but not among user environments).
double
tenable_io.vulnerability.plugin.cvss3.temporal.vector.exploit_code_maturity
keyword
tenable_io.vulnerability.plugin.cvss3.temporal.vector.exploitability
The CVSSv3 Exploit Maturity Code (E) for the vulnerability the plugin covers. Possible values include: Unproven, Proof-of-concept, Functional, High and Not-defined.
keyword
tenable_io.vulnerability.plugin.cvss3.temporal.vector.raw
The complete cvss3_temporal_vector metrics and result values for the vulnerability the plugin covers in a condensed and coded format. For example, E:U/RL:OF/RC:C.
keyword
tenable_io.vulnerability.plugin.cvss3.temporal.vector.remediation_level
The CVSSv3 Remediation Level (RL) temporal metric for the vulnerability the plugin covers. Possible values include:O, T, W, U, X.
keyword
tenable_io.vulnerability.plugin.cvss3.temporal.vector.report_confidence
The CVSSv3 Report Confidence (RC) temporal metric for the vulnerability the plugin covers. Possible values include: U R, C, X.
keyword
tenable_io.vulnerability.plugin.cvss3.vector.access.complexity
The CVSSv3 Access Complexity (AC) metric for the vulnerability the plugin covers. Possible values include: H, M, L.
keyword
tenable_io.vulnerability.plugin.cvss3.vector.access.vector
The CVSSv2 Attack Vector (AV) metric for the vulnerability the plugin covers. Possible values include: Network ,Adjacent Network, Local.
keyword
tenable_io.vulnerability.plugin.cvss3.vector.attack.complexity
keyword
tenable_io.vulnerability.plugin.cvss3.vector.attack.vector
keyword
tenable_io.vulnerability.plugin.cvss3.vector.authentication
The CVSSv2 Authentication (Au) metric for the vulnerability the plugin covers. Possible values include: None required, Requires-single-instance, Requires-multiple-instances.
keyword
tenable_io.vulnerability.plugin.cvss3.vector.availability_impact
The CVSSv2 availability impact metric for the vulnerability the plugin covers. Possible values include: H, M, L.
keyword
tenable_io.vulnerability.plugin.cvss3.vector.confidentiality_impact
The CVSSv3 confidentiality impact metric of the vulnerability the plugin covers to the vulnerable component. Possible values include: H, M, L.
keyword
tenable_io.vulnerability.plugin.cvss3.vector.integrity_impact
The CVSSv3 integrity impact metric for the vulnerability the plugin covers. Possible values include: H. M, L.
keyword
tenable_io.vulnerability.plugin.cvss3.vector.privileges_required
keyword
tenable_io.vulnerability.plugin.cvss3.vector.raw
The complete cvss3_vector metrics and result values for the vulnerability the plugin covers in a condensed and coded format. For example, AV:N/AC:M/Au:N/C:C/I:C/A:C.
keyword
tenable_io.vulnerability.plugin.cvss3.vector.scope
keyword
tenable_io.vulnerability.plugin.cvss3.vector.user_interaction
keyword
tenable_io.vulnerability.plugin.d2_elliot_name
The name of the exploit in the D2 Elliot Web Exploitation framework.
keyword
tenable_io.vulnerability.plugin.description
Full text description of the vulnerability.
keyword
tenable_io.vulnerability.plugin.exploit_available
A value specifying whether a public exploit exists for the vulnerability.
boolean
tenable_io.vulnerability.plugin.exploit_framework.canvas
A value specifying whether an exploit exists in the Immunity CANVAS framework.
boolean
tenable_io.vulnerability.plugin.exploit_framework.core
A value specifying whether an exploit exists in the CORE Impact framework.
boolean
tenable_io.vulnerability.plugin.exploit_framework.d2_elliot
A value specifying whether an exploit exists in the D2 Elliot Web Exploitation framework.
boolean
tenable_io.vulnerability.plugin.exploit_framework.hub
A value specifying whether an exploit exists in the ExploitHub framework.
boolean
tenable_io.vulnerability.plugin.exploit_framework.metasploit
A value specifying whether an exploit exists in the Metasploit framework.
boolean
tenable_io.vulnerability.plugin.exploitability_ease
Description of how easy it is to exploit the issue.
keyword
tenable_io.vulnerability.plugin.exploited_by.malware
The vulnerability discovered by this plugin is known to be exploited by malware.
boolean
tenable_io.vulnerability.plugin.exploited_by.nessus
A value specifying whether Nessus exploited the vulnerability during the process of identification.
boolean
tenable_io.vulnerability.plugin.exploithub_sku
The SKU number of the exploit in the ExploitHub framework.
keyword
tenable_io.vulnerability.plugin.family
The family to which plugin belongs.
keyword
tenable_io.vulnerability.plugin.family_id
The ID of the plugin family.
long
tenable_io.vulnerability.plugin.has_patch
A value specifying whether the vendor has published a patch for the vulnerability.
boolean
tenable_io.vulnerability.plugin.id
The ID of the plugin that identified the vulnerability.
long
tenable_io.vulnerability.plugin.in_the_news
A value specifying whether this plugin has received media attention (for example, ShellShock, Meltdown).
boolean
tenable_io.vulnerability.plugin.intel_type
keyword
tenable_io.vulnerability.plugin.io_address
keyword
tenable_io.vulnerability.plugin.metasploit_name
The name of the related exploit in the Metasploit framework.
keyword
tenable_io.vulnerability.plugin.modification_date
The date on which the plugin was last modified.
date
tenable_io.vulnerability.plugin.ms_bulletin
The Microsoft security bulletin that the plugin covers.
keyword
tenable_io.vulnerability.plugin.name
The name of the plugin that identified the vulnerability.
keyword
tenable_io.vulnerability.plugin.patch_publication_date
The date on which the vendor published a patch for the vulnerability.
date
tenable_io.vulnerability.plugin.plugin_modification_date
date
tenable_io.vulnerability.plugin.plugin_publication_date
date
tenable_io.vulnerability.plugin.publication_date
The date on which the plugin was published.
date
tenable_io.vulnerability.plugin.risk_factor
The risk factor associated with the plugin. Possible values are: Low, Medium, High, or Critical.
keyword
tenable_io.vulnerability.plugin.see_also
Links to external websites that contain helpful information about the vulnerability.
keyword
tenable_io.vulnerability.plugin.solution
Remediation information for the vulnerability.
keyword
tenable_io.vulnerability.plugin.stig_severity
Security Technical Implementation Guide (STIG) severity code for the vulnerability.
keyword
tenable_io.vulnerability.plugin.synopsis
Brief description of the plugin or vulnerability.
keyword
tenable_io.vulnerability.plugin.type
The general type of plugin check (for example, local or remote).
keyword
tenable_io.vulnerability.plugin.unsupported_by_vendor
Software found by this plugin is unsupported by the software's vendor (for example, Windows 95 or Firefox 3).
boolean
tenable_io.vulnerability.plugin.usn
Ubuntu security notice that the plugin covers.
keyword
tenable_io.vulnerability.plugin.version
The version of the plugin used to perform the check.
version
tenable_io.vulnerability.plugin.vpr.drivers.age_of_vuln.lower_bound
The lower bound of the range. For example, for the 0-7 days range, this attribute is "0". For the highest range (more than 730 days), this value is "731".
long
tenable_io.vulnerability.plugin.vpr.drivers.age_of_vuln.upper_bound
The upper bound of the range. For example, for the 0-7 days range, this attribute is "7". For the highest range (more than 730 days), this value is "0", which signifies that there is no higher category.
long
tenable_io.vulnerability.plugin.vpr.drivers.cvss3_impact_score
The NVD-provided CVSSv3 impact score for the vulnerability. If the NVD did not provide a score, Tenable Vulnerability Management displays a Tenable-predicted score.
double
tenable_io.vulnerability.plugin.vpr.drivers.cvss_impact_score_predicted
A value specifying whether Tenable predicted the CVSSv3 impact score for the vulnerability because NVD did not provide one (true) or used the NVD-provided CVSSv3 impact score (false) when calculating the VPR.
boolean
tenable_io.vulnerability.plugin.vpr.drivers.exploit_code_maturity
The relative maturity of a possible exploit for the vulnerability based on the existence, sophistication, and prevalence of exploit intelligence from internal and external sources (for example, Reversinglabs, Exploit-db, Metasploit, etc.). The possible values ('High', 'Functional', 'PoC', or 'Unproven') parallel the CVSS Exploit Code Maturity categories.
keyword
tenable_io.vulnerability.plugin.vpr.drivers.product_coverage
The relative number of unique products affected by the vulnerability: 'Low', 'Medium', 'High', or 'Very High'.
keyword
tenable_io.vulnerability.plugin.vpr.drivers.threat_intensity_last28
The relative intensity based on the number and frequency of recently observed threat events related to this vulnerability: Very Low, Low, Medium, High, or Very High.
keyword
tenable_io.vulnerability.plugin.vpr.drivers.threat_recency.lower_bound
The lower bound of the range. For example, for the 0-7 days range, this attribute is "0". For the highest range (more than 365 days), this value is "366".
long
tenable_io.vulnerability.plugin.vpr.drivers.threat_recency.upper_bound
The upper bound of the range. For example, for the 0-7 days range, this attribute is "7". For the highest range (more than 730 days), this value is "0", which signifies that there is no higher category.
long
tenable_io.vulnerability.plugin.vpr.drivers.threat_sources_last28
A list of all sources (for example, social media channels, the dark web, etc.) where threat events related to this vulnerability occurred. Item type: string.
keyword
tenable_io.vulnerability.plugin.vpr.score
The Vulnerability Priority Rating (VPR) for the vulnerability. If a plugin is designed to detect multiple vulnerabilities, the VPR represents the highest value calculated for a vulnerability associated with the plugin.
double
tenable_io.vulnerability.plugin.vpr.updated
The ISO timestamp when Tenable Vulnerability Management last imported the VPR for this vulnerability. Tenable Vulnerability Management imports updated VPR values every time you run a scan.
date
tenable_io.vulnerability.plugin.vuln_publication_date
The publication date of the plugin.
date
tenable_io.vulnerability.plugin.xref.id
keyword
tenable_io.vulnerability.plugin.xref.type
keyword
tenable_io.vulnerability.plugin.xrefs.id
keyword
tenable_io.vulnerability.plugin.xrefs.type
keyword
tenable_io.vulnerability.port.protocol
The protocol the scanner used to communicate with the asset.
keyword
tenable_io.vulnerability.port.service
The service the scanner used to communicate with the asset.
keyword
tenable_io.vulnerability.port.value
The port the scanner used to communicate with the asset.
long
tenable_io.vulnerability.recast.reason
The text that appears in the Comment field of the recast rule in the Tenable Vulnerability Management user interface.
keyword
tenable_io.vulnerability.recast.rule_uuid
The UUID of the recast rule that applies to the plugin.
keyword
tenable_io.vulnerability.scan.completed_at
The ISO timestamp when the scan completed.
date
tenable_io.vulnerability.scan.schedule_uuid
The schedule UUID for the scan that found the vulnerability.
keyword
tenable_io.vulnerability.scan.started_at
The ISO timestamp when the scan started.
date
tenable_io.vulnerability.scan.uuid
The UUID of the scan that found the vulnerability.
keyword
tenable_io.vulnerability.severity.default_id
The code for the severity originally assigned to a vulnerability before a user recast the risk associated with the vulnerability. Possible values are the same as for the severity_id attribute.
long
tenable_io.vulnerability.severity.id
The code for the severity assigned when a user recast the risk associated with the vulnerability. Possible values include: 0,1,2,3 and 4.
long
tenable_io.vulnerability.severity.modification_type
The type of modification a user made to the vulnerability's severity. Possible values include:none, recasted and accepted.
keyword
tenable_io.vulnerability.severity.value
The severity of the vulnerability as defined using the Common Vulnerability Scoring System (CVSS) base score. Possible values include info, low, medium, high and critical.
keyword
tenable_io.vulnerability.state
The state of the vulnerability as determined by the Tenable Vulnerability Management state service. Possible values include: open, reopen and fixed.
keyword
vulnerability.category
The type of system or architecture that the vulnerability affects. These may be platform-specific (for example, Debian or SUSE) or general (for example, Database or Firewall). For example (https://qualysguard.qualys.com/qwebhelp/fo\_portal/knowledgebase/vulnerability\_categories.htm\[Qualys vulnerability categories]) This field must be an array.
keyword
vulnerability.classification
The classification of the vulnerability scoring system. For example (https://www.first.org/cvss/)
keyword
vulnerability.description
The description of the vulnerability that provides additional context of the vulnerability. For example (https://cve.mitre.org/about/faqs.html#cve\_entry\_descriptions\_created\[Common Vulnerabilities and Exposure CVE description])
keyword
vulnerability.description.text
Multi-field of vulnerability.description.
match_only_text
vulnerability.enumeration
The type of identifier used for this vulnerability. For example (https://cve.mitre.org/about/)
keyword
vulnerability.id
The identification (ID) is the number portion of a vulnerability entry. It includes a unique identification number for the vulnerability. For example (https://cve.mitre.org/about/faqs.html#what\_is\_cve\_id)\[Common Vulnerabilities and Exposure CVE ID]
keyword
vulnerability.reference
A resource that provides additional information, context, and mitigations for the identified vulnerability.
keyword
vulnerability.report_id
The report or scan identification number.
keyword
vulnerability.scanner.vendor
The name of the vulnerability scanner vendor.
keyword
vulnerability.score.base
Scores can range from 0.0 to 10.0, with 10.0 being the most severe. Base scores cover an assessment for exploitability metrics (attack vector, complexity, privileges, and user interaction), impact metrics (confidentiality, integrity, and availability), and scope. For example (https://www.first.org/cvss/specification-document)
float
vulnerability.score.temporal
Scores can range from 0.0 to 10.0, with 10.0 being the most severe. Temporal scores cover an assessment for code maturity, remediation level, and confidence. For example (https://www.first.org/cvss/specification-document)
float
vulnerability.score.version
The National Vulnerability Database (NVD) provides qualitative severity rankings of "Low", "Medium", and "High" for CVSS v2.0 base score ranges in addition to the severity ratings for CVSS v3.0 as they are defined in the CVSS v3.0 specification. CVSS is owned and managed by FIRST.Org, Inc. (FIRST), a US-based non-profit organization, whose mission is to help computer security incident response teams across the world. For example (https://nvd.nist.gov/vuln-metrics/cvss)
keyword
vulnerability.severity
The severity of the vulnerability can help with metrics and internal prioritization regarding remediation. For example (https://nvd.nist.gov/vuln-metrics/cvss)
keyword

scan

This is the scan dataset.

Example

An example event for scan looks as following:

{
    "@timestamp": "2023-10-04T07:03:32.179Z",
    "agent": {
        "ephemeral_id": "b5449981-ac71-4706-a83f-fa759d85bc4e",
        "id": "3c385f00-c1f1-40dd-b812-1cf0a8cc55cf",
        "name": "docker-fleet-agent",
        "type": "filebeat",
        "version": "8.7.1"
    },
    "data_stream": {
        "dataset": "tenable_io.scan",
        "namespace": "ep",
        "type": "logs"
    },
    "ecs": {
        "version": "8.11.0"
    },
    "elastic_agent": {
        "id": "3c385f00-c1f1-40dd-b812-1cf0a8cc55cf",
        "snapshot": false,
        "version": "8.7.1"
    },
    "event": {
        "agent_id_status": "verified",
        "category": [
            "configuration"
        ],
        "created": "2023-10-04T07:03:32.179Z",
        "dataset": "tenable_io.scan",
        "ingested": "2023-10-04T07:03:36Z",
        "kind": "state",
        "original": "{\"control\":true,\"creation_date\":1683282785,\"enabled\":true,\"has_triggers\":false,\"id\":195,\"last_modification_date\":1683283158,\"legacy\":false,\"name\":\"Client Discovery\",\"owner\":\"jdoe@contoso.com\",\"permissions\":128,\"policy_id\":194,\"progress\":100,\"read\":false,\"rrules\":\"FREQ=WEEKLY;INTERVAL=1;BYDAY=FR\",\"schedule_uuid\":\"11c56dea-as5f-65ce-ad45-9978045df65ecade45b6e3a76871\",\"shared\":true,\"starttime\":\"20220708T033000\",\"status\":\"completed\",\"status_times\":{\"initializing\":2623,\"pending\":52799,\"processing\":1853,\"publishing\":300329,\"running\":15759},\"template_uuid\":\"a1efc3b4-cd45-a65d-fbc4-0079ebef4a56cd32a05ec2812bcf\",\"timezone\":\"America/Los_Angeles\",\"total_targets\":21,\"type\":\"remote\",\"user_permissions\":128,\"uuid\":\"a456ef1c-cbd4-ad41-f654-119b766ff61f\",\"wizard_uuid\":\"32cbd657-fe65-a45e-a45f-0079eb89e56a1c23fd5ec2812bcf\"}",
        "type": [
            "info"
        ]
    },
    "input": {
        "type": "httpjson"
    },
    "tags": [
        "preserve_original_event",
        "forwarded",
        "tenable_io-scan"
    ],
    "tenable_io": {
        "scan": {
            "control": true,
            "creation_date": "2023-05-05T10:33:05.000Z",
            "enabled": true,
            "has_triggers": false,
            "id": 195,
            "last_modification_date": "2023-05-05T10:39:18.000Z",
            "legacy": false,
            "name": "Client Discovery",
            "owner": "jdoe@contoso.com",
            "permissions": 128,
            "policy_id": 194,
            "progress": 100,
            "read": false,
            "rrules": "FREQ=WEEKLY;INTERVAL=1;BYDAY=FR",
            "schedule_uuid": "11c56dea-as5f-65ce-ad45-9978045df65ecade45b6e3a76871",
            "shared": true,
            "starttime": "2022-07-08T03:30:00.000Z",
            "status": "completed",
            "status_times": {
                "initializing": 2623,
                "pending": 52799,
                "processing": 1853,
                "publishing": 300329,
                "running": 15759
            },
            "template_uuid": "a1efc3b4-cd45-a65d-fbc4-0079ebef4a56cd32a05ec2812bcf",
            "timezone": "America/Los_Angeles",
            "total_targets": 21,
            "type": "remote",
            "user_permissions": 128,
            "uuid": "a456ef1c-cbd4-ad41-f654-119b766ff61f",
            "wizard_uuid": "32cbd657-fe65-a45e-a45f-0079eb89e56a1c23fd5ec2812bcf"
        }
    }
}

Exported fields

FieldDescriptionType
@timestamp
Event timestamp.
date
cloud.account.id
The cloud account or organization id used to identify different entities in a multi-tenant environment. Examples: AWS account id, Google Cloud ORG Id, or other unique identifier.
keyword
cloud.availability_zone
Availability zone in which this host is running.
keyword
cloud.image.id
Image ID for the cloud instance.
keyword
cloud.instance.id
Instance ID of the host machine.
keyword
cloud.instance.name
Instance name of the host machine.
keyword
cloud.machine.type
Machine type of the host machine.
keyword
cloud.project.id
Name of the project in Google Cloud.
keyword
cloud.provider
Name of the cloud provider. Example values are aws, azure, gcp, or digitalocean.
keyword
cloud.region
Region in which this host is running.
keyword
container.id
Unique container id.
keyword
container.image.name
Name of the image the container was built on.
keyword
container.labels
Image labels.
object
container.name
Container name.
keyword
data_stream.dataset
Data stream dataset.
constant_keyword
data_stream.namespace
Data stream namespace.
constant_keyword
data_stream.type
Data stream type.
constant_keyword
ecs.version
ECS version this event conforms to. ecs.version is a required field and must exist in all events. When querying across multiple indices -- which may conform to slightly different ECS versions -- this field lets integrations adjust to the schema version of the events.
keyword
event.category
This is one of four ECS Categorization Fields, and indicates the second level in the ECS category hierarchy. event.category represents the "big buckets" of ECS categories. For example, filtering on event.category:process yields all events relating to process activity. This field is closely related to event.type, which is used as a subcategory. This field is an array. This will allow proper categorization of some events that fall in multiple categories.
keyword
event.created
event.created contains the date/time when the event was first read by an agent, or by your pipeline. This field is distinct from @timestamp in that @timestamp typically contain the time extracted from the original event. In most situations, these two timestamps will be slightly different. The difference can be used to calculate the delay between your source generating an event, and the time when your agent first processed it. This can be used to monitor your agent's or pipeline's ability to keep up with your event source. In case the two timestamps are identical, @timestamp should be used.
date
event.dataset
Event dataset
constant_keyword
event.kind
This is one of four ECS Categorization Fields, and indicates the highest level in the ECS category hierarchy. event.kind gives high-level information about what type of information the event contains, without being specific to the contents of the event. For example, values of this field distinguish alert events from metric events. The value of this field can be used to inform how these kinds of events should be handled. They may warrant different retention, different access control, it may also help understand whether the data is coming in at a regular interval or not.
keyword
event.module
Event module
constant_keyword
event.original
Raw text message of entire event. Used to demonstrate log integrity or where the full log message (before splitting it up in multiple parts) may be required, e.g. for reindex. This field is not indexed and doc_values are disabled. It cannot be searched, but it can be retrieved from _source. If users wish to override this and index this field, please see Field data types in the Elasticsearch Reference.
keyword
event.type
This is one of four ECS Categorization Fields, and indicates the third level in the ECS category hierarchy. event.type represents a categorization "sub-bucket" that, when used along with the event.category field values, enables filtering events down to a level appropriate for single visualization. This field is an array. This will allow proper categorization of some events that fall in multiple event types.
keyword
host.architecture
Operating system architecture.
keyword
host.containerized
If the host is a container.
boolean
host.domain
Name of the domain of which the host is a member. For example, on Windows this could be the host's Active Directory domain or NetBIOS domain name. For Linux this could be the domain of the host's LDAP provider.
keyword
host.hostname
Hostname of the host. It normally contains what the hostname command returns on the host machine.
keyword
host.id
Unique host id. As hostname is not always unique, use values that are meaningful in your environment. Example: The current usage of beat.name.
keyword
host.ip
Host ip addresses.
ip
host.mac
Host mac addresses.
keyword
host.name
Name of the host. It can contain what hostname returns on Unix systems, the fully qualified domain name, or a name specified by the user. The sender decides which value to use.
keyword
host.os.build
OS build information.
keyword
host.os.codename
OS codename, if any.
keyword
host.os.family
OS family (such as redhat, debian, freebsd, windows).
keyword
host.os.kernel
Operating system kernel version as a raw string.
keyword
host.os.name
Operating system name, without the version.
keyword
host.os.name.text
Multi-field of host.os.name.
text
host.os.platform
Operating system platform (such centos, ubuntu, windows).
keyword
host.os.version
Operating system version as a raw string.
keyword
host.type
Type of host. For Cloud providers this can be the machine type like t2.medium. If vm, this could be the container, for example, or other information meaningful in your environment.
keyword
input.type
Input type
keyword
log.offset
Log offset
long
message
For log events the message field contains the log message, optimized for viewing in a log viewer. For structured logs without an original message field, other fields can be concatenated to form a human-readable summary of the event. If multiple messages exist, they can be combined into one message.
match_only_text
related.hosts
All hostnames or other host identifiers seen on your event. Example identifiers include FQDNs, domain names, workstation names, or aliases.
keyword
related.ip
All of the IPs seen on your event.
ip
tags
List of keywords used to tag each event.
keyword
tenable_io.scan.control
If true, the scan has a schedule and can be launched.
boolean
tenable_io.scan.creation_date
For newly-created scans, the date on which the scan configuration was originally created. For scans that have been launched at least once, this attribute does not represent the date on which the scan configuration was originally created. Instead, it represents the date on which the scan was first launched, in Unix time format.
date
tenable_io.scan.enabled
Indicates whether the scan schedule is active (true) or inactive (false).
boolean
tenable_io.scan.has_triggers
boolean
tenable_io.scan.id
The unique ID of the scan.
long
tenable_io.scan.last_modification_date
For newly-created scans, the date on which the scan configuration was created. For scans that have been launched at least once, this attribute does not represent the date on which the scan configuration was last modified. Instead, it represents the date on which the scan was last launched, in Unix time format. Tenable Vulnerability Management updates this attribute each time the scan launches.
date
tenable_io.scan.legacy
A value indicating whether the scan results were created before a change in storage method. If true, Tenable Vulnerability Management stores the results in the old storage method. If false, Tenable Vulnerability Management stores the results in the new storage method.
boolean
tenable_io.scan.name
The name of the scan.
keyword
tenable_io.scan.owner
The owner of the scan.
keyword
tenable_io.scan.permissions
The requesting user's permissions for the scan.
long
tenable_io.scan.policy_id
The unique ID of the user-defined template (policy) on which the scan configuration is based.
long
tenable_io.scan.progress
The progress of the scan ranging from 0 to 100.
long
tenable_io.scan.read
A value indicating whether the user account associated with the request message has viewed the scan in the Tenable Vulnerability Management user interface. If 1, the user account has viewed the scan results.
boolean
tenable_io.scan.rrules
The interval at which the scan repeats. The interval is formatted as a string of three values delimited by semi-colons. These values are the frequency (FREQ=ONETIME or DAILY or WEEKLY or MONTHLY or YEARLY), the interval (INTERVAL=1 or 2 or 3 ... x), and the days of the week (BYDAY=SU,MO,TU,WE,TH,FR,SA). For a scan that runs every three weeks on Monday Wednesday and Friday, the string would be FREQ=WEEKLY;INTERVAL=3;BYDAY=MO,WE,FR. If the scan is not scheduled to recur, this attribute is null. For more information, see rrules Format.
keyword
tenable_io.scan.schedule_uuid
The UUID for a specific instance in the scan schedule.
keyword
tenable_io.scan.shared
If true, the scan is shared with users other than the scan owner. The level of sharing is specified in the acls attribute of the scan details.
boolean
tenable_io.scan.starttime
For one-time scans, the starting time and date for the scan. For recurrent scans, the first date on which the scan schedule is active and the time that recurring scans launch based on the rrules attribute.
date
tenable_io.scan.status
The status of the scan. Possible values are - aborted, canceled, completed, empty, imported, initializing, pausing, paused, pending, processing, publishing, resuming, running, stopped, stopping
keyword
tenable_io.scan.status_times.initializing
long
tenable_io.scan.status_times.pending
long
tenable_io.scan.status_times.processing
long
tenable_io.scan.status_times.publishing
long
tenable_io.scan.status_times.running
long
tenable_io.scan.template_uuid
The UUID of the template.
keyword
tenable_io.scan.timezone
The timezone of the scheduled start time for the scan.
keyword
tenable_io.scan.total_targets
The total number of targets in the scan.
long
tenable_io.scan.type
The type of scan.
keyword
tenable_io.scan.user_permissions
The sharing permissions for the scan.
long
tenable_io.scan.uuid
The UUID of the scan.
keyword
tenable_io.scan.wizard_uuid
The UUID of the Tenable-provided template used to create either the scan or the user-defined template (policy) on which the scan configuration is based.
keyword

Changelog

VersionDetailsKibana version(s)

2.9.0

Enhancement View pull request
Set sensitive values as secret.

8.12.0 or higher

2.8.1

Enhancement View pull request
Changed owners

8.7.1 or higher

2.8.0

Enhancement View pull request
Add request tracing to vulnerability datastream.

Enhancement View pull request
Add chain request/response tracers to asset and vulnerability.

8.7.1 or higher

2.7.0

Enhancement View pull request
Limit request tracer log count to five.

8.7.1 or higher

2.6.0

Enhancement View pull request
ECS version updated to 8.11.0.

8.7.1 or higher

2.5.0

Enhancement View pull request
Improve 'event.original' check to avoid errors if set.

8.7.1 or higher

2.4.0

Enhancement View pull request
Update interval and initial interval for asset, vulnerability and plugin data stream.

8.7.1 or higher

2.3.0

Enhancement View pull request
ECS version updated to 8.10.0.

8.7.1 or higher

2.2.0

Enhancement View pull request
The format_version in the package manifest changed from 2.11.0 to 3.0.0. Removed dotted YAML keys from package manifest. Added 'owner.type: elastic' to package manifest.

8.7.1 or higher

2.1.1

Enhancement View pull request
Update interval for asset and vulnerability and enable plugin data stream.

8.7.1 or higher

2.1.0

Enhancement View pull request
Add tags.yml file so that integration's dashboards and saved searches are tagged with "Security Solution" and displayed in the Security Solution UI.

8.7.1 or higher

2.0.1

Bug fix View pull request
Update dashboards for 2.0 changes.

Bug fix View pull request
Fix timestamp to refer to last seen rather than indexed.

Bug fix View pull request
Improve fingerprinting behavior.

8.7.1 or higher

2.0.0

Enhancement View pull request
Adjust default collection interval and remove Scanner data stream.

8.7.1 or higher

1.3.0

Enhancement View pull request
Update package to ECS 8.9.0.

8.7.1 or higher

1.2.0

Enhancement View pull request
Document duration units.

8.7.1 or higher

1.1.0

Enhancement View pull request
Convert visualizations to lens.

8.7.1 or higher

1.0.0

Enhancement View pull request
Release Tenable.io as GA.

8.7.1 or higher

0.8.0

Enhancement View pull request
Update package to ECS 8.8.0.

—

0.7.0

Enhancement View pull request
Update package-spec version to 2.7.0.

—

0.6.1

Bug fix View pull request
Resolve customer suggested bugs.

—

0.6.0

Enhancement View pull request
Added datasets for scanner and scan logs.

—

0.5.0

Enhancement View pull request
Add a new flag to enable request tracing

—

0.4.0

Enhancement View pull request
Update data collection and pipeline by adding state filter and ecs fields respectively.

—

0.3.0

Enhancement View pull request
Update package to ECS 8.7.0.

—

0.2.1

Bug fix View pull request
Added response.save_first_response parameter to hbs.yml files to support latest httpjson change.

—

0.2.0

Enhancement View pull request
Add user-configurable Max Retries and Min Wait Time parameter.

—

0.1.0

Enhancement View pull request
Initial Release.

—

On this page