SSH Integration
Complete the following steps to configure SSH credentialed network scans using BeyondTrust.
To integrate Tenable Nessus with BeyondTrust using Windows:
- Log in to Tenable Nessus Manager
-
Click Scans.
The My Scans page appears.
-
Click +New Scan.
The Scan Templates page appears.
-
Select a scan template.
The selected scan template Settings page appears.
-
In the Name box, type a name for the scan.
- In the Targets box, type an IP address, hostname, or range of IP addresses.
- (Optional) Add a Description, Folder location, Scanner location, and specify Target groups.
-
Click the Credentials tab.
The Credentials options appear. By default, the Categories drop-down box displays Host.
-
In the Categories drop-down, click Host.
-
In the Categories list, click Windows configuration.
The selected configuration options appear.
-
In the selected configuration window, click the Authentication method drop-down box.
The Authentication method options appear.
-
Select BeyondTrust.
The BeyondTrust options appear.
-
Configure the credentials.
Option Description Required Username
The username to log in to the hosts you want to scan.
yes
Domain The domain of the username, which is recommended if using domain-linked accounts (managed accounts of a domain that are linked to a managed system). no
BeyondTrust host
The BeyondTrust IP address or DNS address.
yes
BeyondTrust port
The port on which BeyondTrust listens.
yes
BeyondTrust API user The API user provided by BeyondTrust. yes
BeyondTrust API key
The API key provided by BeyondTrust.
yes
Checkout duration
The length of time, in minutes, that you want to keep credentials checked out in BeyondTrust. Configure the Checkout duration to exceed the typical duration of your Tenable Nessus scans. If a password from a previous scan is still checked out when a new scan begins, the new scan fails.
Note: Configure the password change interval in BeyondTrust so that password changes do not disrupt your Tenable Nessus scans. If BeyondTrust changes a password during a scan, the scan fails.
yes
Use SSL
When enabled, Tenable Nessus uses SSL through IIS for secure communications. You must configure SSL through IIS in BeyondTrust before enabling this option.
no
Verify SSL certificate
When enabled, Tenable Nessus validates the SSL certificate. You must configure SSL through IIS in BeyondTrust before enabling this option.
no
- Click Save.
-
To verify the integration is working, click the Launch button to initiate an on-demand scan.
-
Once the scan is complete, select the completed scan and look for the corresponding message - OS Identification and Installed Software Enumeration over SSH: 97993. This validates that authentication was successful.