How-to Guide: Tenable for McAfee ePolicy Orchestrator Last Updated: April 03, 2018

Table of Contents How-to Guide: Tenable for McAfee ePolicy Orchestrator

1

Introduction

3

Integration Requirements

4

Tenable Configuration

5

Tenable.io Configuration SecurityCenter Configuration McAfee ePO Configuration

6 10 12

Download the Connector Extension

13

Install Extensions

14

Permissions

19

DXL Permissions

22

Configure Server

24

Test Connection

28

Schedule Import

29

Schedule Export

36

Run Server Tasks

42

View Dashboards

45

View System Tree

47

View in Tenable.io

49

View in SecurityCenter

51

About Tenable

52

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

Introduction This document describes how to deploy the integration component for Tenable™ Vulnerability Management and McAfee™ ePO console. With this connector, rich vulnerability data is delivered automatically to your McAfee ePO console. In addition to importing vulnerability data, this connector, also, provides: l

l

Asset synchronization - Tenable targeted lists are automatically created and updated from your existing ePO data. McAfee Data Exchange Layer (DXL) - Support allowing the retrieval of vulnerability data from any device running McAfee DXL protocol in your environment.

Tenable™ has partnered with McAfee™ to give McAfee ePO customers the ability to import Tenable vulnerability data into ePO for a consolidated view of their assets and vulnerability state. Tenable created a custom, McAfee-certified application that allows McAfee ePO to integrate with Tenable SecurityCenter™ and Tenable.io™. The custom application, which resides on the McAfee ePO system, calls to the Tenable.io and SecurityCenter APIs to retrieve vulnerability data. McAfee ePO customers have the ability to configure how often the connection is made and the amount of vulnerability data that is imported to meet their specific needs. The application also allows ePO customers to export their ePO managed systems to Tenable.io or SecurityCenter to be scanned. By simplifying and automating the access to Tenable vulnerability data, ePO customers can gain a more complete view of the assets, and the risk to those assets, within their organization. Please email any comments and suggestions to [email protected].

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

Integration Requirements The following is required to integrate SecurityCenter or Tenable.io with McAfee ePO: l

McAfee ePO version 5.9 or higher

l

McAfee Rogue System Detection (RSD) extension 5.0.2 or higher (refer to the McAfee Rogue Sys-

tem Detection Product Guide located at https://support.mcafee.com for download and installation instructions) l

McAfee DXL 3.0 or higher

l

SecurityCenter version 5.1.0 or higher, Tenable.io, or both

l

SecurityCenter Security Manager account dedicated for use with McAfee ePO

l

Tenable Connection Extension for ePO (available for download at

https://support.tenable.com, filename TenableConnector-1.1.0.zip )

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

Tenable Configuration McAfee ePolicy Orchestrator configuration is available for both Tenable.io™ and SecurityCenter™. Click the corresponding link to view the configuration steps.

Tenable.io Configuration SecurityCenter Configuration

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

Tenable.io Configuration 1. Log in to Tenable.io. 2. Click the user icon in the upper right corner.

3. Click My Account.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

4. Click the API Keys tab.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

5. Click the Generate button.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

Note: These API keys will only be shown once. Copy them and use them for the configuration of ePO.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

SecurityCenter Configuration 1. Log in to SecurityCenter using a previously created administrator account, navigate to Users , and select Users (highlighted below) from the drop-down menu.

2. Click +Add (highlighted below) to create a new user.

3. Enter an account username and password (confirm password). 4. Next, click the Role drop-down under the Membership section and select Security Manager.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

5. Click the Organization drop-down and select the organization for the account. Click Submit.

Note: The SecurityCenter Security Manager account and password will be required during the McAfee ePO configuration. McAfee ePO will authenticate to SecurityCenter via this account in order to pull the vulnerability assessment data into ePO.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

McAfee ePO Configuration View the following pages to complete the configuration. l

Download Connector Extension

l

Install Extensions

l

Permissions

l

DXL Permissions

l

Configure Server

l

Test Connection

l

Schedule Import

l

Schedule Export

l

Run Server Tasks

l

View Dashboards

l

View System Tree

l

View in SecurityCenter

l

View in Tenable.io™

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

Download the Connector Extension Prior to beginning the McAfee ePO configuration:

1. Log in to the Tenable Support Portal. 2. Navigate to Downloads > SecurityCenter. 3. Download the Tenable Connector Extension for McAfee ePO (TenableConnector-1.1.0.zip ). 4. Save the file in a location accessible from your McAfee ePO console. Note: Before the starting the configuration: 1. Uninstall the existing connector 2. Install the new 1.1 connector Note: When upgrading, change the name of the server. You cannot use the same name that you previously used. It can be adjusted by adding another character or number or completely change the name. Example - if the server was named securitycenterserver, name it securitycenterserver2.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

Install Extensions 1. Once the Tenable Connector Extension for ePO has been downloaded, log in to your McAfee ePO console and click the Menu drop-down (highlighted below) in the top left-hand corner.

2. Select Extensions (highlighted below) under the Software section.

3. Click Install Extension (highlighted below).

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

4. Select Choose File (highlighted below) from the Install Extension pop-up window.

5. Navigate to the previously downloaded TenableConnector-1.1.0.zip file and click Open (highlighted below).

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

6. Click OK to install the extension.

7. Verify the extension is listed as TenableConnector (as shown below) and click OK .

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

8. Select Tenable Connector (highlighted below) in the left-hand pane to ensure the extension has been installed. In the right-hand pane, verify that the extension is Running (highlighted below). If the extension is not listed as an installed extension or is not running, please contact Tenable Support.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

Note: The Tenable Connector extension is listed under the Unsigned section in this example. Once signed by McAfee, the extension will be listed under the “Signed” section.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

Permissions Once the extension has been installed, permissions will need to be added to the ePO user role. To add the permissions:

1. Navigate to Menu > Permissions Sets (highlighted below).

2. Select an existing Permission Set from the list in the left-hand menu, or select New Permission Set (highlighted below) to create a new set of permissions.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

3. Once a new permission set is created or selected, scroll down and click Edit next to the Tenable role (highlighted below).

Note: The Tenable role will not appear in the list until the Tenable Connector Extension for ePO has been installed.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

4. Select the Run Permission for Tenable Command and Queries radio button and click Save (highlighted below) to finalize the setting.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

DXL Permissions 1. Navigate to Menu > Server Settings (highlighted below) under Configuration .

2. Select DXL Topic Authorization in the left-hand menu.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

3. Configure Permissions as desired for environment.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

Configure Server After the Tenable permission is set:

1. Navigate to Menu > Registered Servers (highlighted below) under the Configuration section.

2. Select New Server.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

3. Click the Server Type drop-down and select Tenable Import or Tenable Export. Enter a descriptive name for the server and click Next.

Note: The Tenable Import option imports vulnerability data to ePO. The Tenable Export option exports assets as a target group.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

4. Enter the SecurityCenter or Tenable.IO settings. See Table 1 –Registered Server Configuration for a description of each field. Enter the username and password for SecurityCenter or enter access and secret keys for Tenable.IO.

Table 1 - Registered Server Configuration Tenable SecurityCenter Settings

Description

Import Server Type

Client type is either Tenable.io or SecurityCenter

IP Address

IP address of the Tenable SecurityCenter instance

Port Number

Port number used to connect to Tenable SecurityCenter (443 default)

Access Key

Access Key is the username for Tenable.io

Secret Key

Secret Key is the password for Tenable.io

User Name

Username of the “Security Manager” account created in Tenable SecurityCenter

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

Password

Password of the “Security Manager” account created in Tenable SecurityCenter

Import Results

Selects the amount of data (in days) to import from Tenable SecurityCenter

Debug Mode

Enables debug mode. Leave unchecked unless specified by Tenable Support

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

Test Connection Test Connection Click Test Connection to verify that McAfee ePO can successfully connect to Tenable.IO or SecurityCenter using the information provided above. If the connection is successful, it will display Tenable

connection successful (highlighted below). If you receive the success message, click Save. If the connection fails, please verify the information entered above is correct. If the problem persists, contact Tenable Support.

Note: Only one Tenable SecurityCenter type is allowed at any given time. To make changes, either edit the configured server or delete it and recreate it.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

Schedule Import Once the registered server has been configured:

1. Navigate to Menu > Server Tasks (highlighted below) under the Automation section.

2. In the Quick Find search box, type Tenable and click Apply.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

3. Click Edit (highlighted below) on the action for Tenable Import.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

4. Set the Schedule status to Enabled (default is disabled) and click Next.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

5. Click the Select the Server Name drop-down and select the previously configured registered server. Click Next.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

6. Schedule the frequency the Server Task should run and click Next. See Table 2 –Server Task Builder for a description of each option.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

Table 2 –Server Task Builder Server Task Builder Settings

Description

Schedule Type

Click the drop-down to select the frequency that log data will be collected from Tenable SecurityCenter. Options include: Hourly, Daily, Weekly, Monthly, Yearly, and Advanced. If “Advanced” is selected, you will be presented with the option to enter “Cron Syntax” instead of the scheduled start time.

Start Date

The date that log collection will begin

End Date

The date the log collection will end. To allow log collection to recur indefinitely, check the “No end date” radio button instead of setting an end date.

Schedule

Click the drop-down to set the log collection to begin at a specific time by selecting “at”, or select “between” to have the log collection only run between a certain time period.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

7. Once the schedule is configured, you will be presented with a Summary of the server task. Verify all the settings are correct and click Save.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

Schedule Export 1. In the Quick Find search box, type Tenable and click Apply.

2. Click Edit (highlighted below) on the action for Tenable Export.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

3. Set the Schedule status to Enabled (default is disabled) and click Next.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

4. Click the Select the Server Name drop-down and select the previously configured registered server. Click Next.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

5. Schedule the frequency the Server Task should run and click Next. See Table 2 –Server Task Builder for a description of each option.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

6. Once the schedule is configured, you will be presented with a Summary of the server task. Verify all the settings are correct and click Save.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

Run Server Tasks 1. Click the Menu drop-down in the top left-hand corner and select Server Tasks (highlighted below) under the Automation section.

2. To run the extension, select the Tenable Import Task from the list of Server Tasks and click Run .

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

3. To view the task status, click on the Tenable Import Task. It will display the status of the task on the Server Task Log Information screen as shown below. Click Close to return to the

Server Task Log screen.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

4. The configuration is now complete and the task will run on the previously configured automated schedule.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

View Dashboards Once a server task has completed and vulnerability data has been collected from Tenable SecurityCenter, the results can be viewed within McAfee ePO dashboards. To view the dashboards:

1. Click on the Menu drop-down in the top left-hand corner and select Dashboards (highlighted below) in the Reporting section.

2. Click the drop-down to the left of Dashboard Actions (highlighted below) and select Tenable Dashboard to display the vulnerability data collected from SecurityCenter. Clicking the dropdown arrow (highlighted below) in the top left-hand corner of each widget gives you the option

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

to Refresh the information within that widget or to display it Full Screen .

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

View System Tree 1. Click on the Menu drop-down in the top left-hand corner and select System Tree (highlighted below) in the Systems section.

2. Select a Managed Host from the System Tree.

3. If there is data on the Managed Host, it will be displayed on the Tenable Vulnerability

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

Details tab (highlighted below) of the selected host.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

View in Tenable.io 1. Click on the Scans option in the top menu.

2. Click the Target Groups option in the left navigation menu.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

3. Click the User tab. The ePO export will be listed here.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

View in SecurityCenter 1. Click on the Assets option in the top menu.

2. The exported ePO results are displayed in the Asset list.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

About Tenable Tenable transforms security technology for the business needs of tomorrow through comprehensive solutions that provide continuous visibility and critical context, enabling decisive actions to protect your organization. Tenable eliminates blind spots, prioritizes threats, and reduces exposure and loss. With more than one million users and more than 20,000 enterprise customers worldwide, organizations trust Tenable for proven security innovation. Tenable's customers range from Fortune Global 500 companies, to the U.S. Department of Defense, to mid-sized and small businesses in all sectors, including finance, government, healthcare, higher education, retail, and energy. Transform security with Tenable, the creators of Nessus and leaders in continuous monitoring, by visiting tenable.com.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

How-to Guide: Tenable for McAfee ePolicy Orchestrator

Apr 3, 2018 - McAfee DXL 3.0 or higher. ○. SecurityCenter version 5.1.0 or higher, Tenable.io, or both. ○. SecurityCenter Security Manager account ...

6MB Sizes 0 Downloads 134 Views

Recommend Documents

How-to Guide: Tenable Nessus for BeyondTrust
Apr 3, 2018 - Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability ...

How-to Guide: Tenable Applications for Splunk
Jun 20, 2018 - The Indexer must be installed to ensure Tenable data is properly indexed. Note: You can use a default index or create and set a custom index.

How-to Guide: SecurityCenter for CyberArk - Tenable
Mar 27, 2018 - ... with Tenable's solutions, customers are now granted even more ... Reduce the time and effort needed to document where credentials are ...

How-to Guide: Tenable Applications for Splunk
2 days ago - The Tenable Add-on for Splunk will store data with the following sources and ..... In the top right corner, click the Create New Content button.

Tenable Nessus for Thycotic
Apr 10, 2018 - 3. Integration Requirements. 4. Integrate with Thycotic Secret Server. 5 ... dentials (organizational users). The Credentials page appears. 3.

Tenable Nessus for Thycotic
Apr 10, 2018 - Store credentials in Thycotic Secret Server instead of managing and ... to perform credentialed network scans of Windows and Linux sys-.

Tenable Nessus for Lieberman RED
Apr 25, 2018 - Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are ...

Tenable Nessus for Lieberman RED
May 18, 2018 - Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of ...

Linux + Windows HOWTO
computer and run a dedicated server and firewall under linux. In accordance with her Microsoft End User. License Agreement she will transfer Windows 95 to ...

Program Library HOWTO
May 15, 2010 - a DL library, and some use the term DLL to mean a library meeting either .... Shared libraries must be placed somewhere in the filesystem. ..... platforms; HP-UX uses the different shl_load() mechanism, and Windows platforms.

Fonebridge 2 Installation Howto - VoxShop
May 15, 2009 - FONEBridge2 has two Ethernet 100bT ports and 1, 2 or 4 trunk TDM ... FONEBridge2 is delivered with two preprogrammed IPs that can be ...

Datasheet-Mcafee-Endpoint-threat-protection.pdf
Datasheet-Mcafee-Endpoint-threat-protection.pdf. Datasheet-Mcafee-Endpoint-threat-protection.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying ...

red5: howto create new applications
the mailing lists and have also reported a bug in red5 pertaining to jruby scripting(see http://jira.red5.org/browse/APPSERVER-230). I have learned alot about ...

Tenable Core Web Application Scanner for Microsoft Azure
4 days ago - Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their ...

Open BEAGLE Compilation HOWTO
Oct 10, 2005 - This document is on the compilation of the Open BEAGLE1 C++ framework for evolutionary computations. ..... #define BEAGLE_FULL_DEBUG.