Database Integration

Tenable Vulnerability Management provides full database support for BeyondTrust.

Requirements

  • Tenable Vulnerability Management account
  • BeyondTrust account

Required User Role: Standard, Scan Manager, or Administrator

To configure Tenable for BeyondTrust database:

  1. Log in to Tenable Vulnerability Management.

  2. Click Scans.

    The My Scans page appears.

  3. Click + New Scan.

    The Scan Templates page appears.

  4. Select a scan template.

    The selected scan template Settings page appears.

  5. In the Name box, type a name for the scan.

  6. In the Targets box, type an IP address, hostname, or range of IP addresses.
  7. (Optional) Add a description, folder location, scanner location, and specify target groups.
  8. Click the Credentials tab.

    The Credentials pane appears.

  9. Click the Database option.

    The Database options appear.

  10. In the Database Type drop-down box, select Cassandra, Oracle, DB2, MongoDB, PostgreSQL, MySQL, SQL Server, or Sybase ASE.

  11. In the Auth Type drop-down box, click BeyondTrust.

    The BeyondTrust options appear.

  12. Configure each option for the Database authentication.

    Option Description

    Required

    Username

    The username to log in to the host you want to scan.

    yes
    Domain The domain of the username, which is recommended if using domain-linked accounts (managed accounts of a domain that are linked to a managed system). no
    BeyondTrust host The BeyondTrust IP address or DNS address. yes
    BeyondTrust port The port on which BeyondTrust listens. yes
    BeyondTrust API user

    The API user provided by BeyondTrust.

    yes
    BeyondTrust API key

    The API key provided by BeyondTrust.

    yes

    Checkout duration

    The length of time, in minutes, that you want to keep credentials checked out in BeyondTrust. Configure the checkout duration to exceed the typical duration of your Tenable Vulnerability Management scans. If a password from a previous scan is still checked out when a new scan begins, the new scan fails.

    Note: Configure the password change interval in BeyondTrust so that password changes do not disrupt your Tenable Vulnerability Management scans. If BeyondTrust changes a password during a scan, the scan fails.

    yes
    Use SSL When enabled, Tenable Vulnerability Management uses SSL through IIS for secure communications. Configure SSL through IIS in BeyondTrust before enabling this option. no
    Verify SSL certificate When enabled, Tenable Vulnerability Management validates the SSL certificate. Configure SSL through IIS in BeyondTrust before enabling this option. no
  13. Click Save.