SNMPv3 Integration
Required User Role: Standard, Scan Manager, or Administrator
Tenable Nessus Manager provides an option for CyberArk SNMPv3.
Before you begin:
- Ensure you have both a Tenable Nessus Manager and CyberArk account.
To integrate Tenable Nessus Manager with CyberArk using SNMPv3 credentials:
-
Log in to your Tenable user interface.
-
In the left navigation plane, click
Scans.The Scans page appears.
-
Click + New Scan.
The Select a Scan Template page appears.
-
Select a scan template.
The scan configuration page appears.
- In the Name box, type a name for the scan.
- In the Targets box, type an IP address, hostname, or range of IP addresses.
-
(Optional) Add a description, folder location, scanner location, and specify target groups.
-
Click the Credentials tab.
The Credentials pane appears.
-
In the Select a Credential menu, select the Host drop-down.
-
Select SNMPv3.
The Settings pane appears.
-
In the SNMPv3 Authentication Method drop-down, select CyberArk.
The CyberArk options appear.
-
Configure each option for SNMPv3 authentication.
Caution: Tenable strongly recommends encrypting communication between the Nessus scanner and the CyberArk AIM gateway using HTTPS and/or client certificates. For information on securing the connection, refer to the Nessus User Guide and the Central Credential Provider Implementation Guide located at cyberark.com (login required).
Note: The SNMPv3 credential with the CyberArk authentication type always uses the same account for all the targets. Unlike SSH, Windows, and Database, there is no way to separate accounts by target IP/FQDN. This is because the credential currently does not collect an Account Name/Identifier and has no other way of specifying the Authentication Password and Privacy Password. Tenable recommends that the same username and address be assigned to a single pairing of SNMPv3 and SNMPv3PrivacyKey within CyberArk.
Option Description Required Username
(Required) The username for the SNMPv3 account that Tenable Vulnerability Management uses to perform checks on the target system.
yes
Port
The TCP port that SNMPv3 listens on for communications from Tenable Vulnerability Management. By default, Tenable uses 161.
yes
SNMPv3 Authentication Method
The authentication method to SNMPv3. Available options:
- Password Entry
- CyberArk
Note: Select CyberArk from the options.
yes
Security Level The security level for SNMP (set to Authentication and privacy by default):
-
No authentication and no privacy
-
Authentication without privacy
-
Authentication and privacy
yes
Authentication Algorithm The algorithm the remove service supports the following: SHA1, SHA224, SHA-256, SHA-384, SHA-512, or MD5. yes
Privacy Algorithm The encryption algorithm to use for SNMP traffic: AES, AES-192, AES-192C, AES-256, AES-256C, or DES. yes
CyberArk Host
The IP address or FQDN name for the CyberArk AIM Web Service. This can be the host, or the host with a custom URL added on in a single string.
yes
CyberArk Port
The port on which the CyberArk API communicates. By default, Tenable uses 443.
yes
AppID
The Application ID associated with the CyberArk API connection.
yes
Safe
The CyberArk safe, the credential should be retrieved from.
no
Username
(If Get credential by is set to Username) The username of the CyberArk user to request a password from.
no
Account Name (If Get credential by is Identifier) The unique account name or identifier assigned to the CyberArk API credential.
no CyberArk Address The option should only be used if the Address value is unique to a single CyberArk account credential.
no Folder The folder of the credential.
no Database The database of the credential. no Query
Specify a custom “free query” using account properties. When this method is specified, all other search criteria are ignored.
no
Query Format
Defines the query format. Allowed values are Exact and Regexp. The default is Exact. This value is ignored unless the Query option was specified.
no
Client Certificate The file that contains the PEM certificate used to communicate with the CyberArk host. no Client Certificate Private Key The file that contains the PEM private key for the client certificate. yes, if private key is applied Client Certificate Private Key Passphrase The passphrase for the private key, if required. yes, if private key is applied Use SSL If enabled, the scanner uses SSL through IIS for secure communications. Enable this option if CyberArk is configured to support SSL through IIS. no Verify SSL Certificate If enabled, the scanner validates the SSL certificate. Enable this option if CyberArk is configured to support SSL through IIS and you want to validate the certificate. no
-
Do one of the following:
-
If you want to save without launching the scan, click Save.
-
If you want to save and launch the scan immediately, click Save & Launch.
Note: If you scheduled the scan to run at a later time, the Save & Launch option is not available.
-
What to do next
Verify the integration is working:
-
On the My Scans page, click the Launch button to initiate an on-demand scan.
-
Once the scan completes, select the completed scan and look for the following message:
For SNMPv3 : Plugin ID 141118. This result validates if It was possible to log into the target SNMPv3 host via the provided credentials from CyberArk.