If you are running version 220.127.116.11 or later, you can upgrade directly to version 5.11.0 If you are running a version earlier than 18.104.22.168, upgrade to version 22.214.171.124 before upgrading to version 5.11.0.
Note: If your upgrade path skips versions of Tenable.sc (e.g., upgrading from 126.96.36.199 to 5.11.0), Tenable recommends reviewing the release notes for all skipped versions. You may need to update your configurations because of features and functionality added in skipped versions.
You can download the update files from the Tenable.sc Downloads page.
Group Preference for Sample Content
This setting allows customers to choose whether a group will receive a default set of objects for users in the group. You can disable this option to reduce undesired content for performance and overhead concerns.
For more information, see Groups in the Tenable.sc User Guide.
You can now sort by VPR in dashboards, reports, and on the Vulnerability Analysis page.
Increased Password Security
Tenable.sc updated existing password storage logic to use a SHA512 hash and use PBKDF2 for increased security and FIPS compliance.
For more information, see Encryption Strength in the Tenable.sc User Guide.
Security-Enhanced Linux (SELinux) Support
Tenable.sc now supports enforcing mode for the Linux kernel security module, SELinux.
For more information, see System Requirements in the Tenable.sc User Guide.
Scan ID in reports
Reports generated from scan results now include relevant scan information on the cover page.
For more information, see Report Options in the Tenable.sc User Guide.
The following audit files are now supported: F5, Acatel Lucent TiMOS devices, and NetApp 9.
For more information, see Add a Template-Based Audit File in the Tenable.sc User Guide.
|Bug Fix||Defect ID|
|Resolved several issues to reduce database locking.||n/a|
|An issue with BeyondTrust integration 401 errors has been resolved.||00778027|
|Miscellaneous warnings have been cleaned up.||n/a|
|Resolved an issue where Vulnerability Analysis view counts did not include all vulnerabilities for very large repositories.||n/a|
|Minor fixes for log file formatting / wording.||n/a|
|Resolved an issue where creating a scan with an incorrect date format could cause system instability.||00841517|
|Resolved an issue where you could not use the Event Analysis views if you installed Tenable.sc on RHEL 6.||00828770|
|Resolved an issue where an admin was unable to add an LDAP user when SAML is enabled.||00809428|
|Resolved an issue where an Organization's Accept Risk Rules and Recast Risk Rules were not being properly cleaned up when the organization was being deleted.||00806638|
|Resolved an issue where BeyondTrust Credentials were not being recognized by Tenable.sc.||00778027|
|Resolved an issue causing remote repositories to fail synchronization.||00773719|
|Fixed an issue where failed credentials to a given host were mitigating remote check vulnerabilities detected locally.||00765334|
|Resolved an issue where the Diagnostics page System Status incorrectly reported Java version 10 or later as unsupported.||00758526|
|Resolved an issue where Industrial Security debug information was not properly being displayed in the logs.||00761607|
|Resolved an issue where Tenable.sc would incorrectly parse IPv4 addresses from imported .nessus files.||00691735|
|Resolved an issue where Plugin Family Filters was not filtering correctly.||00692598|
|Resolved upgrade issues around SAML.||00834761|
|Resolved an issue that prevented LCE information from being queried in Analysis.||00828770|
|Resolved potential 500 errors when accessing alerts.||00808440|
For more information about the API changes for this release, see the Tenable.sc API Changelog.
Filenames and MD5 Checksums
Filenames and MD5 checksums are located on the Tenable.sc Downloads page.
Tenable Integrated Product Compatibility
The following table lists the Tenable product versions tested with Tenable.sc 5.11.0:
8.5.1 and later
|Log Correlation Engine||5.1.1 and later|
|Nessus Network Monitor||5.9.0 and later|
|Industrial Security||1.4.0 and later|