Configure Tenable One Synchronization

Required Additional License: Tenable Lumin

Required Tenable Security Center User Role: Administrator

Required Tenable Vulnerability Management User Role: Administrator

You can configure Tenable Security Center to send limited Tenable Security Center data to Tenable Vulnerability Management for use in Tenable One analysis. For more information, see Tenable One Synchronization.

Before you begin:

  • License and enable Tenable Lumin in Tenable Vulnerability Management, as described in License and Enable Tenable Lumin in the Tenable Vulnerability Management User Guide.

  • Plan your synchronization strategy and review known limitations and dependencies, as described in Plan Your Tenable One Synchronization.

  • Note that Tenable Security Center repositories are not case-sensitive, but networks in Tenable Vulnerability Management are case-sensitive. When you synchronize a repository, ensure that the name is unique from any existing Tenable Vulnerability Management networks.

  • Plan your strategy for avoiding data merge issues and perform any required cleanup, as described in Network Support and Repository Overlap.

    Caution:You cannot resolve data merge issues after synchronizing a repository with Tenable Vulnerability Management; you must enable Network Support or resolve overlapping repositories in Tenable Security Center before synchronizing a repository for the first time.

  • Generate Tenable Vulnerability Management API keys for a Tenable Vulnerability Management user with Administrator permissions, as described in Generate API Keys in the Tenable Vulnerability Management User Guide.

  • Share any assets you want to synchronize with the Full Access group, as described in Groups. You cannot synchronize assets with more limited sharing.

To configure data synchronization between Tenable Security Center and Tenable One in Tenable Vulnerability Management:

  1. Log in to Tenable Security Center via the user interface.

  2. Click System > Configuration.

    The Configuration page appears.

  3. Click the Tenable One tile.

    The Tenable One Configuration page appears.

  4. In the Tenable Vulnerability Management Connection Settings section, type an Access Key and Secret Key for the Tenable Vulnerability Management user you want to have full access to your data in Tenable Vulnerability Management. For more information, see Tenable One Synchronization Options.

    Tenable Security Center validates the connection to Tenable Vulnerability Management and locks the key configuration.

  5. (Optional) To test the connection to Tenable Vulnerability Management, click Test Connection.

    Tenable Security Center tests the connection to Tenable Vulnerability Management using the access key and secret key you provided.

    Tenable Security Center displays a notification indicating the status of the connection to Tenable Vulnerability Management.

  6. In the Vulnerability Data Synchronization section:

    1. (Optional) If you did not enable Network Support and you want to synchronize each Tenable Security Center repository to its own network in Tenable Vulnerability Management, contact your Tenable representative to enable Network Support. For more information, see Tenable One Synchronization Options.

      Note: Once enabled, you cannot disable Network Support.

    2. Select one or more repositories that contain the scan result data you want to synchronize with Tenable Vulnerability Management.

      The initial synchronization includes all cumulative database data from the repository. All subsequent synchronizations include only the new or modified scan result data imported to the repository.

      Note: You cannot synchronize passive scan result vulnerability data. Tenable Security Center identifies vulnerability data by plugin family and excludes Tenable Nessus Network Monitor and LCE plugin families from synchronization.

      Caution: To avoid data merge issues in Tenable Vulnerability Management, Tenable recommends enabling Network Support or resolving all repository overlaps before synchronizing data to Tenable Vulnerability Management. You cannot resolve data merge issues after synchronizing a repository with Tenable Vulnerability Management; you must enable Network Support or resolve overlapping repositories in Tenable Security Center before synchronizing a repository for the first time. For more information, see Network Support and Repository Overlap.

      Tip: Hover over the to view details for a repository (including information about unresolved repository overlaps).

    3. Click Synchronize.

      A confirmation window appears.

    4. Click Synchronize.

      Tenable Security Center begins synchronizing your vulnerability data to Tenable Vulnerability Management.

  7. In the Asset to Tag Synchronization section:

    1. If you want to synchronize asset data at a scheduled time:

      1. Click to enable the Custom Schedule slider.

      2. Next to the schedule link, click the button.

      3. Modify the Time and Timezone options to specify when you want synchronizations to occur.

        Tip: You cannot modify the Frequency or Repeat Every options; all Tenable One synchronizations occur once daily.

      If you do not schedule your asset synchronizations, Tenable Security Center automatically synchronizes once daily, after business hours for your local time zone.

    2. If you want to filter the assets that appear in the Unstaged Assets section, do any of the following:

      • Select an organization from the Organization Filter drop-down list and click Apply Filters.

      • Select an asset type from the Asset Type Filter drop-down list and click Apply Filters.

      • Type an asset name in the Search Name box and press Enter.

      Note: You can synchronize any assets shared with the Full Access group. You cannot synchronize assets with more limited sharing.

      Tenable Security Center applies your filter to the Unstaged Assets section.

    3. To stage one or more assets for synchronization, do one of the following:

      • Click the Add All button to stage all visible assets for synchronization.

        Tenable Security Center stages all visible assets for synchronization and displays them in the Staged Assets section.

      • In the rows for individual assets you want to stage for synchronization, click the button.

        Tenable Security Center stages your selected assets for synchronization and displays them in the Staged Assets section.

      Note: You cannot synchronize IPv6 addresses within static assets. If an asset contains a mix of IPv4 and IPv6 addresses, Tenable Security Center synchronizes only the IPv4 addresses.

      Note: You cannot synchronize non-IPv4 assets within dynamic assets. If a dynamic asset contains other asset types, Tenable Security Center synchronizes only the IPv4 addresses.

      Note: You cannot synchronize DNS name list assets, LDAP query assets, combination assets, watchlist assets, or import assets.

      Tip: Click an asset row to view details for an asset.

    4. Click Synchronize Staged Assets.

      A confirmation window appears.

    5. Click Synchronize.

      Tenable Security Center begins synchronizing your assets to Tenable Vulnerability Management.

  8. Wait for data transfer and Tenable One data calculations to complete. For more information, see How long does synchronization take to complete?.

  9. Monitor the synchronization and confirm there were no errors, as described in View Tenable One Synchronization Status or View Tenable One Data Synchronization Logs.

What to do next:

  • Begin using Tenable Vulnerability Management and Tenable One, as described in Where will I see synchronized data in Tenable Vulnerability Management?.

  • View Tenable One metrics information within Tenable Security Center, as described in View Tenable One Metrics.

  • By default, synchronized data is visible to the Tenable Vulnerability Management Administrator account used for synchronization and to all other users in Tenable Vulnerability Management. If you want to restrict privileges for synchronized data, configure access groups as described in Access Groups in the Tenable Vulnerability Management User Guide.