IPv4/IPv6 Repositories

These are the most common types of repositories used with Tenable Security Center. They store IPv4 and IPv6 data from active and passive scans. Data stored in local repositories can be shared between organizations and includes the full range of event and vulnerability metadata.

Caution: When creating Tenable Security Center IPv4 or IPv6 repositories, Log Correlation Engine event source IP address ranges must be included along with the vulnerability IP address ranges or the event data and event vulnerabilities are not accessible from the Tenable Security Center user interface.

For more information, see Add a Repository.

IP Repository Options

Option Description

General

Name

The repository name.

Description

(Optional) A description for the repository.

Data

IP Ranges

Specifies the IP address range of vulnerability data you want to store in the repository.

Type the range as a comma-separated list of IP addresses, IP address ranges, and/or CIDR blocks.

Access

Organizations

Specifies which organizations have access to the vulnerability data stored in the repository.

If groups are configured for the organization, Tenable Security Center prompts you to grant or deny access to all of the groups in the organization. For more granular control, grant access within the settings for that group.

Advanced Settings

Generate Trend Data

When enabled, Tenable Security Center generates trend data by taking periodic snapshots of the cumulative database. Trend data is displayed in some Tenable Security Center tools (e.g., trending line charts and trending area charts).

Tenable Security Center also produces differential data (snapshot comparison data), which improves performance when displaying trend data in Tenable Security Center tools.

Tip: Disable this option to reduce your disk space usage.

Days Trending

Specifies the number of days of cumulative vulnerability data that you want Tenable Security Center to display in dashboard and report vulnerability trending displays.

Enable Full Text Search

When enabled, Tenable Security Center includes vulnerability text in periodic snapshots of .nessus data for vulnerability trending purposes. For more information about the Vulnerability Text filter component, see Vulnerability Analysis Filter Components.

Log Correlation Engine Correlation

Not supported for IPv6 repositories.

The Log Correlation Engine server where you want Tenable Security Center to retrieve data. The data retrieved depends on the Import Vulnerabilities setting in your Log Correlation Engine server configuration:

  • If Import Vulnerabilities is enabled, Tenable Security Center retrieves vulnerability data and Log Correlation Engine events.
  • If Import Vulnerabilities is disabled, Tenable Security Center retrieves Log Correlation Engine events.

Vulnerability Data Lifetime (Data Expiration Settings)

Active

The number of days you want Tenable Security Center to retain active scan vulnerability data stored in IP repositories. The default value of this option is 365 days.

Passive

The number of days you want Tenable Security Center to retain Tenable Nessus Network Monitor vulnerability data stored in IP repositories. The default value of this option is 7 days.

Event

(IPv4 repositories only) The number of days you want Tenable Security Center to retain Log Correlation Engine event data stored in IP repositories. The default value of this option is 365 days.

Compliance

The number of days you want Tenable Security Center to retain audit compliance data stored in IP repositories. The default value of this option is 365 days.

Mitigated

The number of days you want Tenable Security Center to retain mitigated vulnerability data. The default value of this option is 365 days.