How-to Guide: Tenable Nessus® for BeyondTrust Last Revised: April 03, 2018

Table of Contents Introduction

3

Integrations

4

Windows Integration

5

SSH Integration

10

API Configuration

17

API Keys Setup

18

Enable API Access

20

Additional Information

22

Elevation

23

Customized Report

24

About Tenable

25

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

Introduction This document describes how to configure Tenable Nessus for integration with the BeyondTrust PowerBroker Password Safe. Please email comments or suggestions to [email protected]. Security administrators know that conducting network vulnerability assessments means getting access to and navigating an ever-changing sea of usernames, passwords and privileges. By integrating the BeyondTrust PowerBroker Password Safe with Tenable’s solutions, customers are now granted even more choice and flexibility for reducing the credentials headache. Benefits of integrating Tenable Nessus with the BeyondTrust PowerBroker Password Safe include: l

l

l

l

Credentials stored in the BeyondTrust PowerBroker Password Safe do not need to be managed and updated directly within Tenable Nessus. Reduce the time and effort needed to document where credentials are stored within the entire organizational environment. Automatically enforce security policies within specific departments or for specific business unit requirements, which simplifies compliance. Reduce the risk of unsecured privileged accounts and credentials across the enterprise.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

Integrations The BeyondTrust Powerbroker Password Safe can be configured using either Windows or SSH. Click the corresponding link to view the configuration steps.

Windows Integration SSH Integration

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

Windows Integration Use the following steps to configure Windows credentialed network scans using BeyondTrust's Powerbroker Password Safe solution.

Steps 1. Log in to Nessus and click Scans and then + New Scan to configure Nessus for credentialed scans of Windows systems using the BeyondTrust PowerBroker Password Safe.

2. Select a Scan Template for the scan type required for your scan. For this example, the Advanced Network Scan template will be used.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

3. To configure a credentialed scan for Windows systems using BeyondTrust’s password management solution, enter a descriptive Name and enter the IP address(es) or hostname(s) of the scan Targets .

4. Once the Name and Targets are configured, click Credentials and then select Windows from

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

the left-hand menu.

5. Click the Authentication method drop-down and select BeyondTrust.

6. Configure each field for Windows authentication. Refer to the table below for a description of each field. Once the Windows credentials are configured, click Save to finalize the changes.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

The table below contains a description of each option:

Option

Description

Username

The username to log in to the host being scanned.

Domain

The domain associated with the username, if applicable.

BeyondTrust host

The BeyondTrust IP/DNS address.

BeyondTrust port

The port on which BeyondTrust listens.

BeyondTrust API key

The API key provided by BeyondTrust.

Checkout duration

Specifies how long to keep the credentials “checked out” in BeyondTrust. Note: BeyondTrust can change the password

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

once it has checked back in. Therefore, the duration should be at least as long as a typical scan takes. Subsequent scans will fail if the password is still checked out when the next scan starts.

Use SSL

When enabled, Nessus uses SSL through IIS for secure communications. You must configure SSL through IIS in BeyondTrust before enabling this option.

Verify SSL certificate

When enabled, Nessus validates the SSL certificate. You must configure SSL through IIS in BeyondTrust before enabling this option.

7. Once the options to reach the BeyondTrust Powerbroker Password Safe are set, click Save. 8. To verify the integration is working, click the Launch button to initiate an on-demand scan.

9. Once the scan has completed, select the completed scan and look for the corresponding message - Microsoft Windows SMB Log In Possible: 10394. This validates that authentication was successful.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

SSH Integration Use the following steps to configure SSH credentialed network scans using BeyondTrust's Powerbroker Password Safe solution.

Steps 1. Log in to Nessus and click Scans and then + New Scan to configure Nessus for credentialed scans of Windows systems using the BeyondTrust PowerBroker Password Safe.

2. Select a Scan Template for the scan type required for your scan. For this example, the Advanced Network Scan template will be used.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

3. To configure a credentialed scan for Windows systems using BeyondTrust’s password management solution, enter a descriptive Name and enter the IP address(es) or hostname(s) of the scan Targets .

4. Once the Name and Targets are configured, click Credentials and then select SSH from the

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

left-hand menu.

5. Click the Authentication method drop-down and select BeyondTrust.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

6. Configure each field for Windows authentication. Refer to the table below for a description of each field. Once the Windows credentials are configured, click Save to finalize the changes.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

The table below contains a description of each option:

Option

Description

Username

The username to log in to the host being scanned.

BeyondTrust host

The BeyondTrust address.

BeyondTrust port

The port on which BeyondTrust listens.

BeyondTrust API key

The API key provided by BeyondTrust.

Checkout duration

Specifies how long to keep the credentials “checked out” in BeyondTrust.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

Note: BeyondTrust can change the password once it has checked back in. The duration should be at least as long as a typical scan takes. Subsequent scans will fail if the password is still checked out when the next scan starts.

Use SSL

When enabled, Nessus uses SSL through IIS for secure communications. You must configure SSL through IIS in BeyondTrust before enabling this option.

Verify SSL certificate

When enabled, Nessus validates the SSL certificate. You must configure SSL through IIS in BeyondTrust before enabling this option.

Use private key

When enabled, Nessus uses private key-based authentication for SSH connections instead of password authentication. If it fails, the password will be requested.

Use privilege escalation

When enabled, BeyondTrust uses the configured privilege escalation command. If it returns something, it will use it for the scan.

7. Once the options to reach the BeyondTrust Powerbroker Password Safe are set, click Save. 8. To verify the integration is working, click the Launch button to initiate an on-demand scan.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

9. Once the scan has completed, select the completed scan and look for the corresponding message - OS Identification and Installed Software Enumeration over SSH: 97993. This validates that authentication was successful.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

API Configuration API Keys Setup Enable API Access

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

API Keys Setup Steps 1. Log in to BeyondInsight. 2. Click Configuration .

3. Click API Registration .

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

4. Configure the source addresses that are white listed requests. 5. Click Save. Once saved, the API Key is available for future requests.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

Enable API Access Each Managed Account that you use for scanning must have API Access enabled.

Steps 1. Log in to BeyondInsight. 2. Go to Managed Accounts .

3. Click Edit Account.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

4. Click the Enable for API Access option.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

Additional Information Elevation Customized Report About Tenable

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

Elevation Elevation is used in BeyondInsight to handle privilege escalation for SSH accounts when performing scans. This option is used because some rules won't allow server login using root. The Elevation can be enforced on BeyondInsight at system level or account level.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

Customized Report You can build a customized report in BeyondInsight to import hosts from a CSV to scan in Nessus. The customized report defines the information needed for Nessus uploads. To build the report:

1. Log in to BeyondInsight . 2. Go to - Assets > Scan > Customize Report. 3. Select the Parameters . 4. Click Run Report. Note: This report can be run on any of your previous discovery scans, exported as an CSV, and uploaded as scan targets in Nessus .

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

About Tenable Tenable transforms security technology for the business needs of tomorrow through comprehensive solutions that provide continuous visibility and critical context, enabling decisive actions to protect your organization. Tenable eliminates blind spots, prioritizes threats, and reduces exposure and loss. With more than one million users and more than 20,000 enterprise customers worldwide, organizations trust Tenable for proven security innovation. Tenable's customers range from Fortune Global 500 companies, to the U.S. Department of Defense, to mid-sized and small businesses in all sectors, including finance, government, healthcare, higher education, retail, and energy. Transform security with Tenable, the creators of Nessus and leaders in continuous monitoring, by visiting tenable.com.

Copyright © 2018. Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability Scanner, and Log Correlation Engine are registered trademarks of Tenable Network Security, Inc. All other products or services are trademarks of their respective owners.

How-to Guide: Tenable Nessus for BeyondTrust

Apr 3, 2018 - Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability ...

1MB Sizes 1 Downloads 179 Views

Recommend Documents

Tenable Nessus for Thycotic
Apr 10, 2018 - 3. Integration Requirements. 4. Integrate with Thycotic Secret Server. 5 ... dentials (organizational users). The Credentials page appears. 3.

Tenable Nessus for Thycotic
Apr 10, 2018 - Store credentials in Thycotic Secret Server instead of managing and ... to perform credentialed network scans of Windows and Linux sys-.

Tenable Nessus for Lieberman RED
Apr 25, 2018 - Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are ...

Tenable Nessus for Lieberman RED
May 18, 2018 - Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of ...

How-to Guide: Tenable.io for BeyondTrust
Apr 3, 2018 - Tenable Network Security, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter Continuous View, Passive Vulnerability ...

How-to Guide: Tenable Applications for Splunk
Jun 20, 2018 - The Indexer must be installed to ensure Tenable data is properly indexed. Note: You can use a default index or create and set a custom index.

How-to Guide: SecurityCenter for CyberArk - Tenable
Mar 27, 2018 - ... with Tenable's solutions, customers are now granted even more ... Reduce the time and effort needed to document where credentials are ...

How-to Guide: Tenable Applications for Splunk
2 days ago - The Tenable Add-on for Splunk will store data with the following sources and ..... In the top right corner, click the Create New Content button.

How-to Guide: Tenable for McAfee ePolicy Orchestrator
Apr 3, 2018 - McAfee DXL 3.0 or higher. ○. SecurityCenter version 5.1.0 or higher, Tenable.io, or both. ○. SecurityCenter Security Manager account ...

Linux + Windows HOWTO
computer and run a dedicated server and firewall under linux. In accordance with her Microsoft End User. License Agreement she will transfer Windows 95 to ...

Program Library HOWTO
May 15, 2010 - a DL library, and some use the term DLL to mean a library meeting either .... Shared libraries must be placed somewhere in the filesystem. ..... platforms; HP-UX uses the different shl_load() mechanism, and Windows platforms.

Fonebridge 2 Installation Howto - VoxShop
May 15, 2009 - FONEBridge2 has two Ethernet 100bT ports and 1, 2 or 4 trunk TDM ... FONEBridge2 is delivered with two preprogrammed IPs that can be ...

red5: howto create new applications
the mailing lists and have also reported a bug in red5 pertaining to jruby scripting(see http://jira.red5.org/browse/APPSERVER-230). I have learned alot about ...

Tenable Core Web Application Scanner for Microsoft Azure
4 days ago - Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their ...

Open BEAGLE Compilation HOWTO
Oct 10, 2005 - This document is on the compilation of the Open BEAGLE1 C++ framework for evolutionary computations. ..... #define BEAGLE_FULL_DEBUG.

Tenable Core Web Application Scanner for Microsoft Azure
May 16, 2018 - izations trust Tenable for proven security innovation. Tenable's customers range from Fortune Global. 500 companies, to the U.S. Department of ...

program library howto pdf
Page 1 of 1. File: Program library howto pdf. Download now. Click here if your download doesn't start automatically. Page 1 of 1. program library howto pdf. program library howto pdf. Open. Extract. Open with. Sign In. Main menu. Displaying program l

CMDBuild and Shark Update - HowTo -
Nov 5, 2014 - 3. save possible loaded gis icons present in: ${tomcat_home_cmdbuild}/webapps/${cmdbuild_instance}/upload/images/gis. 4. delete the ...

CMDBuild and Shark Update - HowTo -
Nov 5, 2014 - Liquid Telecom. Progetto: CMDBuild and Shark Update - HowTo. Autore: Lisa Pedrazzi Tecnoteca srl. SOMMARIO. CMDBuild updating.