IPv4/IPv6 Repositories

These are the most common types of repositories used with Tenable.sc. They store IPv4 and IPv6 data from active and passive scans. Data stored in local repositories can be shared between organizations and includes the full range of event and vulnerability metadata.

Caution: When creating Tenable.sc IPv4 or IPv6 repositories, LCE event source IP address ranges must be included along with the vulnerability IP address ranges or the event data and event vulnerabilities are not accessible from the Tenable.sc web interface.

For more information, see Add a Repository.

Option Description

General

Name

The repository name.

Description

(Optional) A description for the repository.

Data

IP Ranges

Specifies the IP address range of vulnerability data you want to store in the repository.

Type the range as a comma-delimited list of IP addresses, IP address ranges, and/or CIDR blocks.

Access

Organizations

Specifies which organizations have access to the vulnerability data stored in the repository.

If groups are configured for the organization, Tenable.sc prompts you to grant or deny access to all of the groups in the organization. For more granular control, grant access within the settings for that group.

Advanced Settings

Generate Trend Data

When enabled, Tenable.sc generates trend data by taking periodic snapshots of the cumulative database. Trend data is displayed in some Tenable.sc tools (e.g., trending line charts and trending area charts).

Tenable.sc also produces differential data (snapshot comparison data), which improves performance when displaying trend data in Tenable.sc tools.

Tip: Disable this option to reduce your disk space usage.

Days Trending

Specifies the number of days of cumulative vulnerability data that you want Tenable.sc to display in dashboard and report vulnerability trending displays.

Enable Full Text Search

When enabled, Tenable.sc includes vulnerability text in periodic snapshots of .nessus data for vulnerability trending purposes. For more information about the Vulnerability Text filter component, see Vulnerability Analysis Filter Components.

LCE Correlation

Not supported for IPv6 repositories.

The LCE server where you want Tenable.sc to retrieve data. The data retrieved depends on the Import Vulnerabilities setting in your LCE server configuration:

  • If Import Vulnerabilities is enabled, Tenable.sc retrieves vulnerability data and LCE events.
  • If Import Vulnerabilities is disabled, Tenable.sc retrieves LCE events.

Vulnerability Data Lifetime (Data Expiration Settings)

Active

The number of days you want Tenable.sc to retain active scan vulnerability data stored in IP repositories. The default value of this option is 365 days.

Passive

The number of days you want Tenable.sc to retain NNM vulnerability data stored in IP repositories. The default value of this option is 7 days.

Event

(IPv4 repositories only) The number of days you want Tenable.sc to retain LCE event data stored in IPv4 repositories. The default value of this option is 365 days.

Compliance

The number of days you want Tenable.sc to retain audit compliance data stored in agent repositories. The default value of this option is 365 days.

Mitigated

The number of days you want Tenable.sc to retain mitigated vulnerability data. The default value of this option is 365 days.