SSH Auto-Discovery
Note: The Address field in the CyberArk Account Details for an account/host must contain a valid IP/FQDN and must be resolvable on your network. This value is vetted during the collection and discovery process. Address values that are null, or unresolvable, are not added to the scan.
Note: Privilege Escalation is available, but only using the SUDO method at this time. More research is needed to explore other escalation methods.
Note: SSH Key authentication is supported, but escalated privileges after SSH Key authentication is not available at this time.
To configure SSH auto-discovery:
-
Log in to Tenable Vulnerability Management.
-
Click Scans.
The My Scans page appears.
-
Click + New Scan.
The Scan Templates page appears.
-
Select a Scan Template.
The scan configuration page appears.
- In the Name box, type a name for the scan.
- In the Targets box, type an IP address, hostname, or range of IP addresses.
-
(Optional) Add a description, folder location, scanner location, and specify target groups.
-
Click the Credentials tab.
The Credentials pane appears.
-
In the Select a Credential menu, select the Host drop-down..
-
Select SSH.
-
From the Authentication Method drop-down, select CyberArk SSH Auto-Discovery.
The CyberArk SSH Auto-Discovery field options appear:
-
Configure each field for the SSH authentication.
Caution: Tenable strongly recommends encrypting communication between your on-site scanner and the CyberArk AIM gateway using HTTPS and/or client certificates. For information on securing the connection, refer to the Tenable Vulnerability Management User Guide and the Central Credential Provider Implementation Guide located at cyberark.com (login required).
- Click Save.