Tenable Lumin Synchronization

You can use Tenable Lumin to quickly and accurately assess your Cyber Exposure risk and compare your health and remediation performance to other Tenable customers in your Salesforce industry and the larger population. Tenable Lumin correlates raw vulnerability data with asset business criticality and threat context data to support faster, more targeted analysis workflows than traditional vulnerability management tools. For more information about Tenable Lumin, see Tenable Lumin in the Tenable Vulnerability Management User Guide.

After you acquire a Tenable Lumin license for use with Tenable Security Center, you can configure Tenable Security Center synchronization to send limited Tenable Security Center data to Tenable Vulnerability Management for use in Tenable Lumin analysis. Tenable Security Center communicates with Tenable Vulnerability Management using an encrypted connection, as described in Encryption Strength.

When you send data to Tenable Vulnerability Management, the system does not remove the data from your Tenable Security Center. You can continue normal operation of Tenable Security Center.

For more information, see:

Tenable Lumin Synchronization Options

Option

Description

Access Key

The Tenable Vulnerability Management API access key for a Tenable Vulnerability Management user with Administrator permissions.

Secret Key

The Tenable Vulnerability Management API secret key for a Tenable Vulnerability Management user with Administrator permissions.

Network Support

Supports accurate tracking of assets in repositories with overlapping IPv4 addresses.

  • Enabled — Tenable Security Center synchronizes each IPv4 repository and agent repository to its own network in Tenable Vulnerability Management, named TSC-Repository Name. You do not need to resolve repository overlaps if you enable Network Support.

    Note: Once enabled, you cannot disable Network Support.

  • Disabled — Tenable Security Center synchronizes all repository data to the Default network in Tenable Vulnerability Management. You must resolve all repository overlaps before synchronizing your Tenable Security Center data to Tenable Vulnerability Management.

For more information, see Networks in the Tenable Vulnerability Management User Guide.

Contact your Tenable representative to enable Network Support.