TOC & Recently Viewed

Recently Viewed Topics

Log Correlation Engines

Tenable’s Log Correlation Engine (LCE) is a software module that aggregates, normalizes, correlates, and analyzes event log data from the myriad of devices within the infrastructure. LCE also has the ability to analyze logs for vulnerabilities.

SecurityCenter performs vulnerability, compliance, and event management, but without LCE integration it does not directly receive logs or IDS/IPS events. With LCE integration, LCE processes the events and passes the results to SecurityCenter.

LCE's close integration with SecurityCenter allows you to centralize log analysis and vulnerability management for a complete view of your organization’s security posture.

Tip: You can configure more than one Log Correlation Engine to work with SecurityCenter.

Option Description


Name for the integrated Log Correlation Engine.


Descriptive text for the integrated Log Correlation Engine.


IP address of the integrated Log Correlation Engine.

Check Authentication

Whether SecurityCenter checks the status of authentication between itself and the LCE server.


Organizations that can access data from the integrated Log Correlation Engine.


The repositories where you want SecurityCenter to store the imported LCE data.


The port where the LCE reporter is listening on the LCE server.

Username and Password

The username and Password you want SecurityCenter to use for authentication to the LCE server to retrieve vulnerability information.

This user account must be able to make changes on the remote system to enable the SSH key exchange between SecurityCenter and LCE. The appropriate permissions level is typically root, root equivalent, or other high-level user permissions on the LCE system. SecurityCenter uses these credentials a single time to exchange SSH keys for secure communication between SecurityCenter and LCE.

Note: If remote root or root equivalent user login is prohibited in your environment, refer to the LCE key exchange section for instructions on how to manually configure the LCE server using SSH key authentication.

To configure LCE servers in SecurityCenter:

  1. Click Resources > Log Correlation Engines.

    The LCE Servers page appears:

  2. Click Add. The Add LCE Server window appears:

  3. Configure the General options, as described in the table above.

  4. (Optional) To allow SecurityCenter to log in to the LCE server and retrieve vulnerability information:

    1. Enable Import Vulnerabilities.
    2. Select a Repository for the event vulnerability data.
    3. Type a Username and Password you want SecurityCenter to use for access to the LCE server.
  5. Click Submit.

  6. (Optional) If you enabled the Check Authentication option above, SecurityCenter checks its ability to authenticate with the LCE server.

    • If authentication is successful, SecurityCenter displays a message to acknowledge that fact.

    • If authentication fails, SecurityCenter prompts you for credentials to the LCE server:

      1. Type a username and password.

      2. Click Push Key to initiate the transfer of the SSH Key.

        If the transfer is successful, SecurityCenter displays a message to acknowledge that fact.

Copyright 2017-2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc. Tenable,, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.