Tenable Vulnerability Management 2025 Release Notes
These release notes are listed in reverse chronological order.
January 15, 2025
You can now view all IPV4 addresses for an affected asset on the Findings workbench as follows:
-
In a new All IP4v4 Addresses column.
-
On the Asset Details page under Asset Information.
-
When using findings filters.
To learn more, see Vulnerability Details in the Tenable Vulnerability Management User Guide.
January 9, 2025
Tenable is pleased to announce a new way to export your vulnerability data: Tenable Data Stream. With this new feature, you connect an AWS S3 bucket to Tenable Vulnerability Management, which then continuously sends your vulnerability data to your AWS bucket in JSON format. This feature is an alternative to the Tenable export APIs.
Once configured, Tenable Data Stream sends the following file types:
File Type | Description |
---|---|
Assets payload |
New, updated, or deleted assets. |
Findings payload |
New or updated findings. |
Tags payload | New, updated, or deleted asset tags. |
Manifest | Event logs for the payload files sent to your AWS bucket. |
For comprehensive documentation, see Tenable Data Stream in the Tenable Vulnerability Management User Guide.
Tenable Vulnerability Management now supports the ability to recast Host Audit data using custom roles. This means that custom role users can recast/accept Tenable Vulnerability Management, Tenable Web App Scanning, and Host Audit findings.
For more information, see Custom Roles in the Tenable Vulnerability Management User Guide.
January 8, 2025
You can now create a GCP connector with keyless authentication to discover GCP assets and import them to Tenable Vulnerability Management. For more information creating a GCP keyless connector, see Create a GCP Connector with Keyless Authentication.