and Configuration Workflow
Use the following workflow to complete the installation and configuration of the Tenable applications for Splunk.
Before you begin:
Generate an API key in Tenable Attack Surface Management to complete the configuration. See the Tenable Attack Surface Management User Guide for instructions on how to generate an API key. Do not use this API key for any other third-party or custom-built application or integration. It must be unique for each installed instance of the integration.
To install and configure Tenable applications for Splunk:
- Install the Tenable application.
Configure the required Tenable application for Splunk:Tenable Attack Surface Management.
Note: You need unique credentials for each Splunk environment.
- Create an input for the configured Tenable application for Splunk.