How-to Guide: Tenable.io™ for Lieberman RED Last Revised: May 18, 2018

Table of Contents Introduction

3

Integrations

4

Windows Integration

5

SSH Integration

11

Database Integration

17

Additional Information

19

Lieberman RED System

20

About Tenable

21

Copyright (missing or bad snippet) Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Introduction This document describes how to configure Tenable.io for integration with Lieberman RED Identity Management system. Please email any comments and suggestions to [email protected]. Security administrators know that conducting network vulnerability assessments means getting access to and navigating an ever-changing sea of usernames, passwords, and privileges. By integrating the Lieberman RED with Tenable’s solutions, customers are now granted even more options and flexibility for reducing the credentials headache. Benefits of integrating Tenable.io with Lieberman RED include: l

l

l

l

Credentials stored in Lieberman RED do not need to be managed and updated directly within Tenable.io. Reduce the time and effort needed to document where credentials are stored within the entire organizational environment. Automatically enforce security policies within specific departments or for specific business unit requirements, which simplifies compliance. Reduce the risk of unsecured privileged accounts and credentials across the enterprise.

Copyright (missing or bad snippet) Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Integrations The Lieberman RED Identity Management system can be configured using either Windows or SSH. Full database support is also provided. Click the corresponding link to view the configuration steps.

Windows Integration SSH Integration Database Integration

Copyright (missing or bad snippet) Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Windows Integration Before you begin: l

You must create an Explicit Account under Delegation > Delegation Identities in Lieberman.

To integrate with Windows: 1. In a browser, log in to Tenable.io. 2. Navigate to the Scans section. 3. Click the + New Scan button to configure Tenable.io for credentialed scans of Windows systems using Lieberman's password management solution.

4. Select a Scan Template for the scan type required for your scan. For demonstration purposes, the Advanced Network Scan template is used.

Copyright (missing or bad snippet) Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

5. Enter a descriptive Name and the IP address(es) or hostname(s) of the scan Targets .

6. Click on the Credentials tab.

Copyright (missing or bad snippet) Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

7. In the left-hand menu, select Windows .

8. From the Authentication method drop-down, select Lieberman .

Copyright (missing or bad snippet) Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

9. Configure each field for Windows authentication. Refer to the table below for a description of each field.

The table below contains a description of each option:

Copyright (missing or bad snippet) Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Option

Description

Username

(Required) The target system’s username.

Domain

The domain, if the username is part of a domain.

Lieberman host

(Required) The Lieberman IP/DNS address.

Lieberman port

(Required) The port on which Lieberman listens.

Lieberman user

(Required) The Lieberman explicit user for authenticating to the Lieberman RED API.

Lieberman password

(Required) The password for the Lieberman explicit user.

Use SSL

If Lieberman is configured to support SSL through IIS, check for secure communication.

Verify SSL Certificate

If Lieberman is configured to support SSL through IIS and you want to validate the certificate, check this. Refer to custom_CA.inc documentation for how to use selfsigned certificates.

10. Once the options to reach Lieberman are set, click Save. 11. To verify the integration works, click the Launch button to initiate an on-demand scan.

Copyright (missing or bad snippet) Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

12. Once the scan has completed, select the completed scan and look for the corresponding message - Microsoft Windows SMB Log In Possible: 10394. This validates that authentication was successful.

Copyright (missing or bad snippet) Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

SSH Integration Before you begin: l

You must create an Explicit Account under Delegation > Delegation Identities in Lieberman.

To integrate with SSH: 1. In a browser, log in to Tenable.io. 2. Navigate to the Scans section. 3. Click the + New Scan button to configure Tenable.io for credentialed scans of Windows systems using Lieberman's password management solution.

4. Select a Scan Template for the scan type required for your scan. For demonstration purposes, the Advanced Network Scan template is used.

Copyright (missing or bad snippet) Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

5. Enter a descriptive Name and the IP address(es) or hostname(s) of the scan Targets .

6. Click on the Credentials tab.

Copyright (missing or bad snippet) Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

7. In the left-hand menu, select SSH.

Copyright (missing or bad snippet) Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

8. From the Authentication method drop-down, select Lieberman .

9. Configure each field for SSH authentication. Refer to the table below for a description of each field.

Copyright (missing or bad snippet) Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

The table below contains a description of each option:

Option

Description

Username

(Required) The target system’s username.

Lieberman host

(Required) The Lieberman IP/DNS address.

Lieberman port

(Required) The port on which Lieberman listens.

Lieberman user

(Required) The Lieberman explicit user for authenticating to the Lieberman RED API.

Lieberman password

(Required) The password for the Lieberman explicit user.

Use SSL

If Lieberman is configured to support SSL through IIS, check for secure communication.

Copyright (missing or bad snippet) Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Verify SSL certificate

If Lieberman is configured to support SSL through IIS and you want to validate the certificate, check this. Refer to custom_CA.inc documentation for how to use self-signed certificates.

10. Once the options to reach Lieberman RED are set, click Save. 11. To verify the integration is working, click the Launch button to initiate an on-demand scan.

12. Once the scan has completed, select the completed scan and look for Plugin ID 97993 and the corresponding message - It was possible to log into the remote host via SSH using 'password'

authentication. This validates that authentication was successful.

Copyright (missing or bad snippet) Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Database Integration Tenable.io provides full database support for Lieberman. Enable the plugins in the scanner to display them in the output.

1. Go to the Plugins tab on the scan configurations page.

2. Click the Status button to Enable the database plugin.

Copyright (missing or bad snippet) Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

3. Click Save. Note: See the chart for database plugin ypes and corresponding IDs. Plugin Type

Plugin ID

MSSQL

91827

Oracle

91825

MySQL

91823

PostgresSQL

91826

Copyright (missing or bad snippet) Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Additional Information Lieberman RED System About Tenable

Copyright (missing or bad snippet) Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

Lieberman RED System For additional information and documentation about the Lieberman RED Identity Management system, go to https://liebsoft.com/support/documentation/.

Copyright (missing or bad snippet) Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

About Tenable Tenable transforms security technology for the business needs of tomorrow through comprehensive solutions that provide continuous visibility and critical context, enabling decisive actions to protect your organization. Tenable eliminates blind spots, prioritizes threats, and reduces exposure and loss. With more than one million users and more than 20,000 enterprise customers worldwide, organizations trust Tenable for proven security innovation. Tenable's customers range from Fortune Global 500 companies, to the U.S. Department of Defense, to mid-sized and small businesses in all sectors, including finance, government, healthcare, higher education, retail, and energy. Transform security with Tenable, the creators of Nessus and leaders in continuous monitoring, by visiting tenable.com.

Copyright (missing or bad snippet) Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.

How-to Guide: Tenable.io for Lieberman RED

Additional Information. 19 ... Inc. All other products or services are trademarks of their respective owners. ..... Tenable's customers range from Fortune Global.

1MB Sizes 1 Downloads 128 Views

Recommend Documents

Tenable Nessus for Lieberman RED
Apr 25, 2018 - Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are ...

Tenable Nessus for Lieberman RED
May 18, 2018 - Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of ...

Linux + Windows HOWTO
computer and run a dedicated server and firewall under linux. In accordance with her Microsoft End User. License Agreement she will transfer Windows 95 to ...

Lieberman A Working Guide to Process Equipment.pdf
Page 3 of 415. Lieberman A Working Guide to Process Equipment.pdf. Lieberman A Working Guide to Process Equipment.pdf. Open. Extract. Open with. Sign In.

Lieberman A Working Guide to Process Equipment.pdf
Whoops! There was a problem loading more pages. Retrying... Lieberman A Working Guide to Process Equipment.pdf. Lieberman A Working Guide to Process ...

Program Library HOWTO
May 15, 2010 - a DL library, and some use the term DLL to mean a library meeting either .... Shared libraries must be placed somewhere in the filesystem. ..... platforms; HP-UX uses the different shl_load() mechanism, and Windows platforms.

Fonebridge 2 Installation Howto - VoxShop
May 15, 2009 - FONEBridge2 has two Ethernet 100bT ports and 1, 2 or 4 trunk TDM ... FONEBridge2 is delivered with two preprogrammed IPs that can be ...

red5: howto create new applications
the mailing lists and have also reported a bug in red5 pertaining to jruby scripting(see http://jira.red5.org/browse/APPSERVER-230). I have learned alot about ...

Open BEAGLE Compilation HOWTO
Oct 10, 2005 - This document is on the compilation of the Open BEAGLE1 C++ framework for evolutionary computations. ..... #define BEAGLE_FULL_DEBUG.

An invisible hand - Erez Lieberman Aiden
x. Gaulish. Welsh. Bretton. C o rnish. Romanian. Latin. Baltic. Spanish. Italian. Fre n ch. English ..... capable of taking into account the multilayered complexity of cultural ... even successful syntheses often involve an impractical number of step

program library howto pdf
Page 1 of 1. File: Program library howto pdf. Download now. Click here if your download doesn't start automatically. Page 1 of 1. program library howto pdf. program library howto pdf. Open. Extract. Open with. Sign In. Main menu. Displaying program l

CMDBuild and Shark Update - HowTo -
Nov 5, 2014 - 3. save possible loaded gis icons present in: ${tomcat_home_cmdbuild}/webapps/${cmdbuild_instance}/upload/images/gis. 4. delete the ...

CMDBuild and Shark Update - HowTo -
Nov 5, 2014 - Liquid Telecom. Progetto: CMDBuild and Shark Update - HowTo. Autore: Lisa Pedrazzi Tecnoteca srl. SOMMARIO. CMDBuild updating.

red5: howto create new applications
Every handler configuration file must contain at least three beans: CONTEXT. The context bean has the reserved name web.context and is used to map paths to scopes, lookup services and handlers. The ... streams. A sample implementation that can be use

helical/helix antenna 2.4 GHz HOWTO
Jun 28, 2008 - GHz which can be used for e.g. high speed packet radio (S5-PSK, 1.288 Mbit/s), ... result in easy possibilities for high speed wireless internet.

HowTo Build with Crystal Space and Blender
The first version of this tutorial used a number of tools - GtkRadiant, Blender, Gimp, ... This document is separated out into two sections: creating artwork for Crystal .... more efficiently use the image when applying it as a texture to a 3D mesh.

Linux Wireless LAN Howto 1 Introduction
Jul 25, 2007 - version, how to get it and the main features. If you hear about ... Because of the large number of drivers, it has been divided in four sections, the first cover .... protocol, with fancy stuff such as RTS/CTS, virtual carrier sense an