Windows Integration

Tenable Vulnerability Management provides an option for BeyondTrust Windows integration. Complete the following steps to configure Tenable Vulnerability Management with BeyondTrust in Windows.

To integrate with Windows:

  1. Log in to your Tenable user interface.
  2. In the upper-left corner, click the Menu button.

    The left navigation plane appears.

  3. In the left navigation plane, click Scans.

    The Scans page appears.

  4. In the upper-right corner of the page, click the Create a Scan button.

    The Select a Scan Template page appears.

  5. Select a scan template.

    The scan configuration page appears.

  6. In the Name box, type a name for the scan.

  7. In the Targets box, type an IP address, hostname, or range of IP addresses.
  8. (Optional) Add a description, folder location, scanner location, and specify target groups.
  9. Click the Credentials tab.

    The Credentials pane appears.

  10. In the Select a Credential menu, select the Host drop-down.
  11. Select Windows.

    The Settings pane appears.

  12. In the Auth Type drop-down box, click BeyondTrust.

    The BeyondTrust options appear.

  13. Configure each option for the Windows authentication.

    Option Description Required


    The username to log in to the hosts you want to scan.


    Domain The domain of the username, which is recommended if using domain-linked accounts (managed accounts of a domain that are linked to a managed system).


    BeyondTrust host

    The BeyondTrust IP address or DNS address.


    BeyondTrust port

    The port on which BeyondTrust listens.


    BeyondTrust API user The API user provided by BeyondTrust.


    BeyondTrust API key

    The API key provided by BeyondTrust.


    Checkout duration

    The length of time, in minutes, that you want to keep credentials checked out in BeyondTrust. Configure the Checkout duration to exceed the typical duration of your Tenable Vulnerability Management scans. If a password from a previous scan is still checked out when a new scan begins, the new scan fails.

    Note: Configure the password change interval in BeyondTrust so that password changes do not disrupt your Tenable Vulnerability Management scans. If BeyondTrust changes a password during a scan, the scan fails.


    Use SSL

    When enabled, Tenable Vulnerability Management uses SSL through IIS for secure communications. You must configure SSL through IIS in BeyondTrust before enabling this option.


    Verify SSL certificate

    When enabled, Tenable Vulnerability Management validates the SSL certificate. You must configure SSL through IIS in BeyondTrust before enabling this option.


  14. Do one of the following:

    • If you want to save without launching the scan, click Save.

    • If you want to save and launch the scan immediately, click Save & Launch.

      Note: If you scheduled the scan to run at a later time, the Save & Launch option is not available.

What to do next:

Verify the integration is working.

  1. On the Scans page, click the Launch button to initiate an on-demand scan.

  2. Once the scan completes, click the scan.

    The scan details appear.

    Look for the following message - Microsoft Windows SMB Log In Possible: 10394. This validates that authentication was successful.