Platform Performance Improvement FAQ - Info Plugins
What is the background and purpose of the improvement?
Nessus scanners collect informational (“Info”) data in all default scan configurations. There are over 20,000 different types of Info findings that Nessus scanners can collect. When Nessus scanners are enabled to collect Info data, the Info data can represent more than 90% of all findings per asset, and in the case of port scanning (open ports), Info data accounts for more than 40% of all findings data.
To optimize platform processing performance, Tenable has added a global platform setting - Process High Traffic Info Plugins - that allows customers to disable the processing of high traffic Info plugins.
What are "high traffic" Info plugins?
At this time, high traffic plugins are plugins that perform host port scans. See the "How do I know if this impacts me?" FAQ for a list of the high traffic Info plugins.
Who is improvement available to, and when will it be available?
The improvement is now available to all Tenable platform customers. Administrators can configure the improvement in the Scanning section of the General Settings user interface. To take advantage of the improvement, turn the Process High Traffic Info Plugins setting to the "off" position (for more information, see General Settings in the Tenable Vulnerability Management User Guide).
What are the benefits of the improvement?
By reducing the total number of findings processed substantially, you can expect improved export performance and end-to-end processing times per scan. The magnitude of improvement varies depending on the scale of your deployment, global region, and the breadth of adoption across each region.
Does this change vulnerability detection, reports, and export results?
No. All vulnerability data and features still function as expected. The improvement only impacts a small number of port scanning Info plugins post-scanning.
Does this change my scans, scan efficiency, and scan data?
No. This is a post-scan optimization. Scan results continue to retain all plugin results, including port scan data, and all data is still available for 45 days via the scan DB files.
Does this change my PCI scans?
No. Info plugin data is already filtered from the PCI product.
Can I revert back to processing these high traffic plugins if I change my mind?
Yes, you can revert back at-will by configuring the High Traffic Info Plugins setting.
What if I decide not to use this optimization?
In the short term, there are no changes to your environment. However, in a future release, Tenable will permanently restructure the high traffic findings to optimize their usage and processing performance. Tenable recommends that you use the optimization to minimize the impact of the future restructuring. Tenable will provide detailed transition documentation and instructions before the restructuring update is released.
Will I see any visual or data differences in the product as a result electing this change?
Yes. Your total finding counts when Severity = INFO will decrease. Note that this does not include “vulnerability findings”; this is only includes Info-level data.
The optimization may impact your integrations, reports, and exports if:
You use the following Info plugin results:
34220 - Netstat Portscanner (WMI)
34252 - Microsoft Windows Remote Listeners Enumeration (WMI)
11219 - Nessus SYN Scanner
14272 - Netstat Portscanner (SSH)
25221 - Remote listeners enumeration (Linux / AIX)
10736 - DCE Services Enumeration
99265 - macOS Remote Listeners Enumeration
10335 - Nessus TCP scanner
14274 - Nessus SNMP Scanner
34277 - Nessus UDP Scanner
You use the following filter or aggregation criteria:
Severity = INFO
The data in these plugins will not be available to query or export in the Tenable Vulnerability Management application or query APIs. However, your raw scan data is still available in the scan DBs. To collect your scan data, follow the instructions in the Collecting Scan Results from Tenable Products community article or use the export-scans API endpoint.
What do I do with old or stale data now that I am not processing these plugins anymore?
Any stale Info data may age out over time, or you can hide them by creating an accept rule or a filter rule for the affected plugins.
What do I need to do to take advantage of the benefits?
Configure whether Tenable Vulnerability Management processes the affected plugins with the High Traffic Info Plugins setting. Tenable recommends validating the following checklist to understand the potential impact on your process.
Before disabling the High Traffic Info Plugins setting, validate and acknowledge the following:
Report & Widget Results
Your total Info findings count will decline substantially, and any port scan results will be removed.
Export file size and duration will be reduced.
Queries and custom integrations that filter on or use open port findings for downstream processes will no longer receive data from the affected plugins.
If you do not use port scan Info findings within Tenable products or external processes, Tenable recommends taking advantage of this improvement.
This is not to be confused with port values in vulnerability findings; these values remain intact and are unaffected. To identify the Info findings that will not be processed, use the following filter: Severity = INFO and PluginID = 34220, 34252, 11219, 14272, 10736, 99265, 10335, 14274, 34277.