TOC & Recently Viewed

Recently Viewed Topics

Organizations

An organization is a set of distinct users and groups and the resources (e.g., scanners, repositories, and LDAP servers) they have available to them.

The organization is managed primarily by the administrator users and security manager users. The administrator user creates the organization and creates, assigns, and maintains the security manager user account. The security manager user (or any organizational user with appropriate permissions) creates other users within the organization. Groups allow you to manage users and share permissions to resources and objects among the group. For more information, see User Access.

Multiple organizations can share the same repositories, and the vulnerability data associated with the overlapping ranges is shared between each organization. Conversely, organizations can be configured with their own discrete repositories to facilitate situations where data must be kept confidential between different organizational units.

Creation of an organization is a multi-step process. After you create an organization, SecurityCenter prompts you to create the initial security manager user.

The following table describes the items that you can specify and configure when creating an organization.

Option Description

General

Name

(Required) The organization name.

Description

A description for the organization.

Contact Information

The relevant contact information for the organization including address, city, state, country, and phone number.

Scanning

Distribution Method

The scan distribution mode you want to use for this organization:

  • Automatic Distribution Only: SecurityCenter chooses one or more scan zones to run the scan.

    If you allow SecurityCenter to choose the best scanner for a scan, the targets for the scan are given to scanners in the most appropriate scan zone available based on the scan zone’s specified ranges. This facilitates optimal scanning and is very useful if an organization has devices placed behind a firewall or NAT device or has conflicting RFC 1918 non-internet-routable address spaces.

  • Locked Zone: SecurityCenter uses the one Available Zone you specify to run the scan.

  • Selectable Zones: SecurityCenter allows organizational users to select one of the Available Zones you specify to run the scan.

    Some organizational users may benefit from the option to override their default scanner(s) instead of always using the most optimal scanner for a target.

    Organizational users can use overrides to run internal and external vulnerability scans and analyze the vulnerability stance from a new perspective. For example, an organizational user can choose an external scanner to see the attack surface from an external attacker’s perspective.

    Note: If an organizational user selects a single scan zone when performing a scan in Selectable Zones mode, SecurityCenter ignores the ranges in the scan zone and scans all of the targets you specified in the scan configuration.

For more information about scan zones, see Scan Zones.

Available Zones

If you selected Locked Zone for the Distribution Method, specify the scan zone you want SecurityCenter to use when performing a scan.

If you selected Selectable Zone for the Distribution Method, specify one or more scan zones you want users to choose from when performing a scan.

Allow for Automatic Distribution

If you selected Selectable Zone for the Distribution Method, enable or disable this option to specify whether you want to allow automatic scan zone distribution.

When enabled, organizational users have the option to allow SecurityCenter to choose one or more scan zones to run the scan.

Restricted Scan Ranges The IP address ranges you do not want users in this organization to scan.

Analysis

Accessible LCEs

The LCEs that you want this organization to have access to. You can search for the LCEs by name or scroll through the list.

Accessible Repositories

The repositories that you want this organization to have access to. You can search for the repositories by name or scroll through the list.

Accessible Agent Capable Scanners

The Nessus scanners (with Nessus Agents enabled) that you want this organization to have access to. Select one or more of the available scanners to allow the organization to import Nessus Agent results from the selected scanner.

Accessible LDAP Servers

The LDAP servers that you want this organization to have access to. An organization must have access to an LDAP server in order to perform LDAP authentication on user accounts within that organization, and to configure LDAP query assets.

Note: If you revoke access to an LDAP server, users in the organization cannot authenticate and LDAP query assets cannot run.

Custom Analysis Links

A list of custom analysis links provided to users within the host vulnerability details when analyzing data outside of SecurityCenter is desired. Click Add Custom Link to create a new option to type the link name and URL to look up additional data external to SecurityCenter.

For example: http://example.com/index.htm?ip=%ip%

The %ip% reference is a variable that inserts the IP address of the current host into the specified URI.

Vulnerability Weights

Low

The vulnerability weighting to apply to Low criticality vulnerabilities for scoring purposes. (Default: 1)

Medium

The vulnerability weighting to apply to Medium criticality vulnerabilities for scoring purposes. (Default: 3)

High

The vulnerability weighting to apply to High criticality vulnerabilities for scoring purposes. (Default: 10)

Critical

The vulnerability weighting to apply to Critical criticality vulnerabilities for scoring purposes.(Default: 40)

For more information, see Add an Organization and Delete an Organization.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.