Configure QRadar with Tenable Vulnerability Management
Required Tenable Vulnerability Management User Role: Basic,
Complete the following steps to configure the Tenable App For QRadar to sync data from Tenable Vulnerability Management to QRadar.
To configure the Tenable App For Qradar:
- Log in to the IBM QRadar SIEM Console.
-
Click the button.
The Menu options appear.
-
Click Admin.
The Admin options appear.
- Scroll to the Tenable section.
-
Click Tenable App Settings.
The Tenable Configuration appears.
-
Click Add Tenable Vulnerability Management Account.
-
Configure the settings for Tenable Vulnerability Management.
- In the Address box, enter the the domain name used to access Tenable Vulnerability Management.
- In the Access Key box, enter the API access key for Tenable Vulnerability Management. For information on generating API keys see the Generate API Key section in the Tenable Vulnerability Management User Guide.
- In the Secret Key box, enter the API secret key for Tenable Vulnerability Management. For information on generating API keys see the Generate API Key section in the Tenable Vulnerability Management User Guide.
-
In the Rule based Scan Name box, enter a scan name that exists in Tenable Vulnerability Management.
Note: If a scan does not exist, you must create one. The scan needs to be associated to the Tenable user that Qradar logs into the Tenable product with. This scan is used for the rule-based scan function.
-
In the Right Click Scan Name box, enter a scan name that exists in Tenable Vulnerability Management.
Note: If a scan does not exist, you must create one. The scan needs to be associated to the Tenable user that Qradar logs into the Tenable product with. This scan is used for the right-click scan function.
Note: This scan can be the same as the Rule Based Scan Name.
-
In the Authorized Service Token box, enter your QRadar authorized service token. Authorized tokens are found under User Management in the Authorized Services section.
See the IBM QRadar SIEM website for steps on creating an authorized service token.
- (Optional) Click the toggle to enable or disable SSL verification.
-
(Optional) Connect to Tenable Vulnerability Management using a proxy.
- Click the toggle to Enable/Disable Proxy.
- Type an IP/Hostname.
- Type a Port.
- (Optional) Select the Require Authentication for Proxy check box.
-
If you required authentication for proxy, type the proxy Username, Password, and Confirm Password.
-
Click Save.
The Tenable Configuration window appears and displays a success message.
- Create an Offense Rule to generate offenses for the offense rule. For steps on creating offense rules, see the IBM QRadar SIEM documentation.