Configure Tenable Vulnerability Management with ARCON (Windows)
In Tenable Vulnerability Management, you can integrate with ARCON using Windows credentials. Complete the following steps to configure Tenable Vulnerability Management with ARCON using Windows.
- Tenable Vulnerability Management account
- ARCON account
Required User Role: Standard, Scan Manager, or Administrator
To integrate Tenable Vulnerability Management with ARCON using Windows credentials:
- Log in to Tenable Vulnerability Management.
In the upper-left corner, click the button.
The left navigation plane appears.
In the left navigation plane, click Settings.
The Settings page appears.
Click the Credentials widget.
The Credentials page appears. The credentials table lists the managed credentials you have permission to view.
Click the button next to the Credentials title.
The credential form plane appears.
In the Host section, click Windows.
The Windows credential options appear.
In the Authentication Method drop-down, select ARCON.
The ARCON options appear.
- Configure the ARCON credentials.
Option Default Value
(Required) The Arcon IP address or DNS address.
Note: If your Arcon installation is in a subdirectory, you must include the subdirectory path. For example, type IP address or hostname/subdirectory path.
The port on which Arcon listens.
(Required) The API user provided by Arcon.
(Required) The API key provided by Arcon.
Authentication URL The URL Tenable Vulnerability Management uses to access Arcon.
Password Engine URL
The URL Tenable Vulnerability Management uses to access the passwords in Arcon.
Username (Required) The username to log in to the hosts you want to scan. Arcon Target Type (Optional) The name of the target type. . Depending on the Arcon PAM version you are using and the system type the SSH credential has been created with, this is set to linux by default. Refer to the Arcon PAM Specifications document (provided by Arcon) for target type/system type mapping for the correct target type value. Checkout Duration
(Required) The length of time, in hours, that you want to keep credentials checked out in Arcon.
Configure the Checkout Duration to exceed the typical duration of your Tenable Vulnerability Management scans. If a password from a previous scan is still checked out when a new scan begins, the new scan fails.
Note: Configure the password change interval in Arcon so that password changes do not disrupt your Tenable Vulnerability Management scans. If Arcon changes a password during a scan, the scan fails.
Use SSL When enabled, Tenable Vulnerability Management uses SSL through IIS for secure communications. You must configure SSL through IIS in Arcon before enabling this option. Verify SSL When enabled, Tenable Vulnerability Management validates the SSL certificate. You must configure SSL through IIS in Arcon before enabling this option. Targets to Prioritize Credentials (missing or bad snippet)
The credential saves and the My Scans page appears.
What to do next:
Verify the integration is working.
On the My Scans page, click the Launch button to initiate an on-demand scan.
Once the scan completes, click the completed scan.
The scan details appear.
Look for a message similar to the following- Microsoft Windows SMB Log In Possible: 10394. This result validates that authentication was successful.