TOC & Recently Viewed

Recently Viewed Topics

Before You Install

Note: A basic understanding of Linux is assumed throughout the installation, upgrade, and removal processes.

Understand SecurityCenter Licenses

Confirm your licenses are valid for your SecurityCenter deployment. SecurityCenter does not support an unlicensed demo mode – a license key is required.

For more information, see Licenses.

Disable Default Web Servers

SecurityCenter provides its own Apache web server listening on port 443. If the installation target already has another web server or other service listening on port 443, you must disable that service on that port or configure SecurityCenter to use a different port after installation.

Identify which services, if any, are listening on port 443 by running the following command:

# ss -pan | grep ':443 '

Modify Security Settings

The default Red Hat firewall settings cause issues with SecurityCenter’s web services. To alleviate this, set SELinux to Disabled in Enforcing mode or to Enabled in Permissive mode.

To disable SELinux in Enforcing mode:

  1. Navigate to: /etc/selinux.
  2. Edit the config file.
  3. Change the SELINUX line from SELINUX=enforcing to SELINUX=disabled or SELINUX=permissive.
  4. Save the file.
  5. Reboot the system.
  6. Confirm the following incoming services are permitted by the firewall rules:
    • SSH (port 22 by default)
    • HTTPS (port 443 by default)
    • RHEL 6, RHEL 7/CentOS 6, CentOS 7 - the local firewall may be disabled upon install and the user should re-enable it with the appropriate access information

  7. Confirm the following ports are open for SecurityCenter to communicate with other Tenable products:
    • PVS (port 8835 by default)
    • Nessus (port 8834 by default)
    • Log Correlation Engine (port 1243 by default)

Note: Please consult local security and best practices within your environment for the proper usage and configuration of SELinux. SecurityCenter is known to work with SELinux in Enforcing mode with some customization of the SELinux rules. However, permitted rules vary from organization to organization.

Perform Log File Rotation

The installation does not include a log rotate utility; however, the native Linux logrotate tool is supported post-installation. In most Red Hat environments, logrotate is installed by default. The following logs are rotated if the logrotate utility is installed:

  • All files in /opt/sc/support/logs matching *log
  • /opt/sc/admin/logs/sc-error.log

During an install/upgrade, the installer drops a file named SecurityCenter into /etc/logrotate.d/ that contains log rotate rules for the files mentioned above.

Log files are rotated on a monthly basis. This file is owned by root/root.

Obtain the Installation Package

The installer comes in a number of versions based on OS level and architecture:


- or -


Confirm the integrity of the installation package by comparing the download checksum with the checksum listed in the SecurityCenter release notes.

Depending on the OS of the host, you may also need to move the installer to it using your preferred file transfer tool.

Copyright © 2019 Tenable, Inc. All rights reserved. Tenable,, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc.., Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.