Tenable SecurityCenter Data Feeds for RSA Archer IT Security Vulnerability Program
|
|
- Brent Black
- 5 years ago
- Views:
Transcription
1 <Partner Name> <Partner Product> RSA ARCHER GRC Platform Implementation Guide Tenable SecurityCenter Data Feeds for RSA Archer IT Security Vulnerability Program Wesley Loeffler, RSA Engineering Last Modified: August, 2018
2 Solution Summary As the creator of Nessus, Tenable extended its expertise in vulnerabilities to deliver Tenable.io, the world s first platform to see and secure any digital asset on any computing platform. Tenable SecurityCenter consolidates and evaluates vulnerability data across your organization, prioritizing security risks and providing a clear view of your security posture. The integration of Tenable SecurityCenter with the RSA Archer IT & Security Vulnerabilities Program use case enables customers to leverage the discovered devices and catalog those network devices with the vulnerability library. With RSA Archer, customers can then identify which assets require remediation based on the business priority of that asset. Integration Features The Tenable SecurityCenter integration with RSA Archer enables organizations to: Catalog network devices on a corporate network Discover network device vulnerabilities using scanning technology Supplement the Vulnerability Library with Tenable s knowledge base Partner Integration Overview RSA Archer Solution RSA Archer Use Case RSA Archer Applications Uses Custom Application Requires On-Demand License IT Security Vulnerabilities Program IT Security Risk Management Devices, Vulnerability Library, Vulnerability Scan Results No No The following diagram provides an overview of the use cases and application relationships. 2
3 Installation and Configuration Before You Begin This section provides instructions for configuring the Tenable SecurityCenter Data Feeds for the RSA Archer IT Security Vulnerability Program use case. This document is not intended to suggest optimum installations or configurations. It is assumed that the reader has both working knowledge of all products involved, and the ability to perform the tasks outlined in this section. Administrators should have access to the product documentation for all products in order to install the required components. The RSA Archer IT Security Vulnerability Program use case must be installed and working prior to performing the integration. Perform the necessary tests to confirm that this is true prior to proceeding. Important: The integration described in this guide is being provided as a reference implementation for evaluation and testing purposes. It may or may not meet the needs and use cases for your organization. If additional customizations or enhancements are needed, it is recommended that customers contact RSA Professional Services for assistance. Prerequisites (System Requirements) The Devices, Vulnerability Library, and Vulnerability Scan Results applications are required for installation and operation of the Tenable SecurityCenter Data Feeds for the IT Security Vulnerability Program use case. These applications serve as the targets for the data feeds. Components RSA Archer Pre-Requisite Applications Recommended Software RSA Archer 6.4 SP1 or later Devices, Vulnerability Library, Vulnerability Scan Results - (RSA Archer IT Security Vulnerability Program) 3
4 Data Feed Configuration The following data feeds are used as part of the Tenable SecurityCenter integration process: SecurityCenter Plugins is a JavaScript transporter data feed that fetches data from and creates/updates the records in the Vulnerability Library application. SecurityCenter Vulns is a JavaScript transporter data feed that fetches data from and creates/updates the records in the Vulnerability Scan Results application. SecurityCenter Vulns (Hosts) is a JavaScript transporter data feed that fetches data from and creates/updates the records in the Devices application. There are multiple data feeds available for the ITSVP use case. Depending on which data feeds you intend to use, they will need to be configured in the order listed below. Import and run the data feeds in the following order: 1. Set Up the NVD Data Feed 2. Set up the Qualys KnowledgeBase Data Feed 3. Set Up the Qualys Hosts Data Feed 4. Set Up the Qualys Hosts Extracted from Detections Data Feed 5. Set Up the Qualys Detections Data Feed 6. Set Up the Security Center Plugins Data Feed 7. Set Up the Security Center Vulnerabilities Data Feed 8. Set Up the Security Center Vulnerabilities (Hosts) Data Feed 9. Set Up the Data Feed for Vulnerability Historical Data After setting up the data feeds, you can schedule them to run when you want to. By default, the SecurityCenter Plugins data feed is scheduled to run on the 1st Sunday of every month and the remainder of the SecurityCenter feeds are reference feeds that will subsequently initiate after the completion of the preceding feed. For more information, see the Scheduling Data Feeds section. Configure the JavaScript Transporter Settings Before you upload a JavaScript file, you must configure JavaScript Transporter settings in the RSA Archer Control Panel. 1. On the General tab, go to the JavaScript Transporter section. a. Open the RSA Archer Control Panel. b. Go to Instance Management and select All Instances. c. Select the instance. 4
5 d. On the General tab, go to the JavaScript Transporter section. 2. In the Max Memory Limit field, set the value to 2048 MB (2 GB). 3. In the Script Timeout field, set the value to 120 minutes (2 hours). 4. (Optional) If you want to allow only digitally signed JavaScript files in the data feed, enable Require Signature. a. In the JavaScript Transporter Settings section, enable Require Signature. b. A new cell appears in the Signing Certificate Thumbprints section. c. Double-click an empty cell in the Signing Certificate Thumbprints section. d. Enter the digital thumbprint of the trusted certificate used to sign the JavaScript file. e. Note: For information on how to obtain digital thumbprints, see Obtaining Digital Thumbprints. f. Important: If you enable Require Signature and specify no thumbprints, no JavaScript files will be accepted by the system. g. (Optional) If you want to add additional thumbprint sources, repeat steps b-c for each thumbprint. 5. On the toolbar, click Save. Obtaining Digital Thumbprints When running JavaScript data feeds, you can set the system to only allow digitally signed JavaScript files from trusted sources for security considerations. For a certificate to be trusted, all the certificates in the chain including the Root CA Certificate and Intermediate CA certificates must be trusted on both the Web Server and Services Server machines. Obtaining a Certificate Thumbprint 1. On the RSA Archer Control Panel environment, open the Manage Computer Certificates program. a. Click Start. b. Type: certificate c. From the search results, click Manage computer certificates. 2. Ensure that your trusted source certificates are located in the Certificates sub-folder of the Trust Root Certification Authorities folder. 3. Within the Certificates sub-folder, double-click the certificate whose thumbprint you want to obtain. 4. Verify that the certificate is trusted. a. In the Certificate window, click the Certification Path tab. 5
6 b. Ensure that the Certificate Status windows displays the following message: c. This certificate is OK. Note: If the Certificate Status windows displays something different, follow the onscreen instructions. 5. Obtain the trusted certificate thumbprint. a. In the Certificate window, click the Details tab. b. Scroll to, and select, the Thumbprint field. c. The certificate's digital thumbprint appears in the window. Set Up the Security Center Plugins Data Feed Important: Before you upload a JavaScript file, configure JavaScript Transporter settings in the RSA Archer Control Panel. For more information, see Configure the JavaScript Transporter Settings. Important: Updates to the API files used in the JavaScript Transporter (SecurityCenterAPI.js) can only be achieved in a hosted environment with a Professional Services engagement. For more information, contact your account representative. 1. Go to the Manage Data Feeds page. a. From the menu bar, click. b. Under Integration, click Data Feeds. 2. In the Manage Data Feeds section, click Import. 3. Locate and select the Security_Center_Plugins.dfx5 file for the data feed. 4. Click Open. 5. In the General Information section, in the Status field, select Active. 6. In the Additional Properties section, enable Optimize Calculations. 7. Click the Transport tab. 8. In the Transport Configuration section, complete the following: a. Click Upload. b. From the Upload JavaScript File dialog, click Add New. c. Locate and select the SecurityCenterAPI.js file, and click Open. d. From the Upload JavaScript File dialog, click OK. 9. In the Custom Parameters section, enter key values. The following table describes the value to enter for each key in Custom Parameters. 6
7 Key Username Password datasource URL Value plugins For example, ignorelastruntime false verifycerts false Note: The listed values are in place by default. They can be configured to suit your environment. Important: The keys and values are case-sensitive, and cannot include extra spaces at the end of the strings. 10. (Optional) Add startoffset and endoffset as new keys. Note: The startoffset parameter specifies the first record in the range you want to retrieve and the endoffset parameter specifies the last record in the range you want to retrieve. Use these parameters to parse data into consumable sizes. For more information, see the Tenable Security Center API Best Practices Guide. a. Click Add New. b. Enter startoffset as the key. c. Define a valid value for the startoffset key. d. Click Add New. e. Enter endoffset as the key. f. Define a valid value for the endoffset key. 11. For each key type, determine whether you want it to be Protected or Plain Text. Selecting Protected encrypts the key value for the specified key in the log. 12. Click the Source Definition tab. a. Click the Tokens sub-tab. b. Verify token values. c. The following table describes token values to verify. 7
8 Token Value BatchContentSave 1000 LastRunTime LastFileProcessed PreviousRunContext Note: For more information about tokens, see "Data Feed Tokens" in the RSA Archer Online Documentation. 13. Verify that key field values are not missing from the data feed setup window. 14. Click Save. Set Up the Security Center Vulnerabilities Data Feed Important: Before you upload a JavaScript file, configure JavaScript Transporter settings in the RSA Archer Control Panel. For more information, see Configure the JavaScript Transporter Settings. Important: Updates to the API files used in the JavaScript Transporter (SecurityCenterAPI.js) can only be achieved in a hosted environment with a Professional Services engagement. For more information, contact your account representative. 1. Go to the Manage Data Feeds page. a. From the menu bar, click. b. Under Integration, click Data Feeds. 2. In the Manage Data Feeds section, click Import. 3. Locate and select the Security_Center_Vulns.dfx5 file for the data feed. 4. Click Open. 5. In the General Information section, in the Status field, select Active. 6. In the Additional Properties section, enable Optimize Calculations. 7. Click the Transport tab. 8. In the Transport Configuration section, complete the following: a. Click Upload. b. From the Upload JavaScript File dialog, click Add New. 8
9 c. Locate and select the SecurityCenterAPI.js file, and click Open. d. From the Upload JavaScript File dialog, click OK. 9. In the Custom Parameters section, enter key values. The following table describes the value to enter for each key in Custom Parameters. Key Username Password datasource URL Value vulns For example, ignorelastruntime false vulnseverities 4,3,2,1 vulndatefiltertype firstseen vulnloadactive true vulnloadpatched verifycerts true false Note: The listed values are in place by default. They can be configured to suit your environment. Important: The keys and values are case-sensitive, and cannot include extra spaces at the end of the strings. 10. (Optional) Add startoffset and endoffset as new keys. Note: The startoffset parameter specifies the first record in the range you want to retrieve, and the endoffset parameter specifies the last record in the range you want to retrieve. Use these parameters to parse data into consumable sizes. For more information, see the Tenable Security Center API Best Practices Guide. a. Click Add New. b. Enter startoffset as the key. 9
10 c. Define a valid value for the startoffset key. d. Click Add New. e. Enter endoffset as the key. f. Define a valid value for the endoffstart key. 11. For each key type, determine whether you want it to be Protected or Plain Text. Selecting Protected encrypts the key value for the specified key in the log. 12. Click the Source Definition tab. a. Click the Tokens sub-tab. b. Verify token values. The following table describes token values to verify. Token Value BatchContentSave 1000 LastRunTime LastFileProcessed PreviousRunContext CrossReferencesMode LinkOnly RelatedReferencesMode LinkOnly Note: For performance reasons, the CrossReferencesMode and RelatedReferencesMode tokens are link only to all other applications. Note: For more information about tokens, see "Data Feed Tokens" in the RSA Archer Online Documentation. 13. Verify that key field values are not missing from the data feed setup window. 14. Click Save. 10
11 Set Up the Security Center Vulnerabilities (Hosts) Data Feed Important: Before you upload a JavaScript file, configure JavaScript Transporter settings in the RSA Archer Control Panel. For more information, see Configure the JavaScript Transporter Settings. Important: Updates to the API files used in the JavaScript Transporter (SecurityCenterAPI.js) can only be achieved in a hosted environment with a Professional Services engagement. For more information, contact your account representative. 1. Go to the Manage Data Feeds page. a. From the menu bar, click. b. Under Integration, click Data Feeds. 2. In the Manage Data Feeds section, click Import. 3. Locate and select the Security_Center_Vulns_(Hosts).dfx5 file for the data feed. 4. Click Open. 5. In the General Information section, in the Status field, select Active. 6. In the Additional Properties section, enable Optimize Calculations. 7. Click the Transport tab. 8. In the Transport Configuration section, complete the following: a. Click Upload. b. From the Upload JavaScript File dialog, click Add New. c. Locate and select the SecurityCenterAPI.js file, and click Open. d. From the Upload JavaScript File dialog, click OK. 9. In the Custom Parameters section, enter key values. The following table describes the value to enter for each key in Custom Parameters. Key Username Password datasource Value hosts 11
12 Key URL Value For example, om ignorelastruntime false vulnseverities 4,3,2,1 vulndatefiltertype vulnloadactive firstseen true vulnloadpatched verifycerts true false Note: The listed values are in place by default. They can be configured to suit your environment. Important: The keys and values are case-sensitive, and cannot include extra spaces at the end of the strings. 10. (Optional) Add startoffset as a new key. Note: The startoffset parameter specifies the first record in the range you want to retrieve, and the endoffset parameter specifies the last record in the range you want to retrieve. Use these parameters to parse data into consumable sizes. For more information, see the Tenable Security Center API Best Practices Guide. a. Click Add New. b. Enter startoffset as the key. c. Define a valid value for the startoffset key. d. Click Add New. e. Enter endoffset at the key. f. Define a valid value for the endoffset key. 11. For each key type, determine whether you want it to be Protected or Plain Text. Selecting Protected encrypts the key value for the specified key in the log. 12. Click the Source Definition tab. a. Click the Tokens sub-tab. 12
13 b. Verify token values. The following table describes token values to verify. Token Value BatchContentSave 1000 LastRunTime LastFileProcessed PreviousRunContext Note: For more information about tokens, see Data Feed Tokens in the RSA Archer Online Documentation. 13. Verify that key field values are not missing from the data feed setup window. 14. Click Save. Scheduling Data Feeds Important: A data feed must be active and valid to successfully run. As you schedule your data feed, the Data Feed Manager validates the information. If any information is invalid, an error message displays. You can save the data feed and correct the errors later; but the data feed does not process until you make corrections. Note: All IT Security Vulnerabilities Program data feeds are set to run daily by default. 1. Go to the Schedule tab of the data feed that you want to modify. a. From the menu bar, click. b. Under Integration, click Data Feeds. c. Select the data feed. d. Click the Schedule tab. 2. Go to the Recurrences section and complete frequency, start and stop times, and time zone. The following table describes the fields in the Recurrences section. 13
14 Field Frequency Description Specifies the interval in which the data feed runs, for example, Minutely, Hourly, Daily, Weekly, Monthly, or Reference. Minutely. Runs the data feed by the interval set. For example, if you specify 45 in the Every list, the data feed executes every 45 minutes. Hourly. Runs the data feed by the interval set, for example, every hour (1), every other hour (2) and so forth. Daily. Runs the data feed by the interval set, for example, every day (1), every other day (2) and, so forth. Weekly. Runs the data feed based on a specified day of the week, for example, every Monday of the first week (1), every other Monday (2), and so forth. Monthly. Runs the data feed based on a specified week of the month, for example, 1st, 2nd, 3rd, 4th, or Last. Recurrence. Runs a specified data feed as runs before the current one. This option indicates to the Data Feed Service that this data feed starts as soon as the referenced data feed completes successfully. For example, you can select to have a Threats data feed run immediately after your Assets data feed finishes. From the Reference Feed list, select after which existing data feed the current data feed starts. A reference data feed will not run when immediately running a data feed. The Run Data Feed Now option only runs the current data feed. Every Start Time Start Date Time Zone Specifies the interval of the frequency in which the data feed runs. Specifies the time the data feed starts running. Specifies the date on which the data feed schedule begins. Specifies the time zone in of the server that runs the data feed. 3. (Optional) To override the data feed schedule and immediately run your data feed, in the Run Data Feed Now section, click Start. 4. Click Save. 14
15 Certification Environment for RSA Archer GRC Date Tested: August, 2018 Certification Environment Product Name Version Information Operating System RSA Archer GRC 6.4 SP1 Virtual Appliance Tenable Security Center NA NA 15
Digital Defense Frontline VM 6.0
RSA ARCHER GRC Platform Implementation Guide Digital Defense Jeffrey Carlson, RSA Partner Engineering Last Modified: October 16 th, 2017 Solution Summary Digital Defense
More information<Partner Name> <Partner Product> RSA ARCHER GRC Platform Implementation Guide. Swimlane 2.x
RSA ARCHER GRC Platform Implementation Guide Jeffrey Carlson, RSA Partner Engineering Last Modified: 11/02/2017 Solution Summary The RSA Archer integration allows Swimlane
More information<Partner Name> <Partner Product> RSA Ready Implementation Guide for. Rapid 7 Nexpose Enterprise 6.1
RSA Ready Implementation Guide for Rapid 7 Jeffrey Carlson, RSA Partner Engineering Last Modified: 04/11/2016 Solution Summary Rapid7 Nexpose Enterprise drives the collection
More informationHow-to Guide: Tenable for McAfee epolicy Orchestrator. Last Updated: April 03, 2018
How-to Guide: Tenable for McAfee epolicy Orchestrator Last Updated: April 03, 2018 Table of Contents How-to Guide: Tenable for McAfee epolicy Orchestrator 1 Introduction 3 Integration Requirements 4 Tenable
More information<Partner Name> <Partner Product> RSA ARCHER GRC Platform Implementation Guide. WhiteHat Security Sentinel
RSA ARCHER GRC Platform Implementation Guide WhiteHat Security Jeffrey Carlson, RSA Partner Engineering Last Modified: 12/13/2016 Solution Summary The integration of WhiteHat
More informationTenable for McAfee epolicy Orchestrator
How-To Guide Tenable for McAfee epolicy Orchestrator Introduction This document describes how to deploy Tenable SecurityCenter for integration with McAfee epolicy Orchestrator (epo). Please email any comments
More information<Partner Name> RSA ARCHER GRC Platform Implementation Guide. RiskLens <Partner Product>
RSA ARCHER GRC Platform Implementation Guide 2.4.1 Wesley Loeffler, RSA Engineering Last Modified: April 25 th, 2018 2.4 Solution Summary The & Archer integration connects
More informationTenable for McAfee epolicy Orchestrator
HOW-TO GUIDE Tenable for McAfee epolicy Orchestrator Introduction This document describes how to deploy Tenable SecurityCenter for integration with McAfee epolicy Orchestrator (epo). Please email any comments
More information<Partner Name> RSA NETWITNESS Security Operations Implementation Guide. Swimlane 2.x. <Partner Product>
RSA NETWITNESS Security Operations Implementation Guide Jeffrey Carlson, RSA Partner Engineering Last Modified: 05/01/2017 Solution Summary The RSA NetWitness integration
More information<Partner Name> RSA ARCHER GRC Platform Implementation Guide. Global-Regulation International Law Search V. 1. <Partner Product>
RSA ARCHER GRC Platform Implementation Guide Global-Regulation Jeffrey Carlson, RSA Partner Engineering Last Modified: May 15 th, 2017 Solution Summary Global-Regulation.com
More information<Partner Name> RSA ARCHER GRC Platform Implementation Guide. Gurucul Risk Analytics. <Partner Product>
RSA ARCHER GRC Platform Implementation Guide Jeffrey Carlson, RSA Partner Engineering Last Modified: August 1 st, 2017 Solution Summary Gurucul is changing the way enterprises
More informationTenable for Palo Alto Networks
How-To Guide Tenable for Palo Alto Networks Introduction This document describes how to deploy Tenable SecurityCenter and Nessus for integration with Palo Alto Networks next-generation firewalls (NGFW).
More informationHow-to Guide: Tenable Applications for Splunk. Last Revised: August 21, 2018
How-to Guide: Tenable Applications for Splunk Last Revised: August 21, 2018 Table of Contents Overview 3 Components 4 Tenable Add-on (TA-tenable) 5 Source and Source Types 6 CIM Mapping 7 Tenable App for
More informationTenable for ServiceNow. Last Updated: March 19, 2018
Tenable for ServiceNow Last Updated: March 19, 2018 Table of Contents Tenable for ServiceNow 1 Introduction 3 Integration Requirements 4 Integration Configuration 5 Set up a Query in SecurityCenter 5 Configure
More informationTenable.io for Thycotic
How-To Guide Tenable.io for Thycotic Introduction This document describes how to deploy Tenable.io for integration with Thycotic Secret Server. Please email any comments and suggestions to support@tenable.com.
More informationForeScout Extended Module for Tenable Vulnerability Management
ForeScout Extended Module for Tenable Vulnerability Management Version 2.7.1 Table of Contents About Tenable Vulnerability Management Module... 4 Compatible Tenable Vulnerability Products... 4 About Support
More informationA Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface
A Government Health Agency Trusts Tenable to Protect Patient Data and Manage Expanding Attack Surface ORGANIZATION SNAPSHOT The level of visibility Tenable.io provides is phenomenal, something we just
More informationTenable.io User Guide. Last Revised: November 03, 2017
Tenable.io User Guide Last Revised: November 03, 2017 Table of Contents Tenable.io User Guide 1 Getting Started with Tenable.io 10 Tenable.io Workflow 12 System Requirements 15 Scanners and Agents 16 Link
More informationChapter 5: Vulnerability Analysis
Chapter 5: Vulnerability Analysis Technology Brief Vulnerability analysis is a part of the scanning phase. In the Hacking cycle, vulnerability analysis is a major and important part. In this chapter, we
More informationTenable.sc-Tenable.io Upgrade Assistant Guide, Version 2.0. Last Revised: January 16, 2019
Tenable.sc-Tenable.io Upgrade Assistant Guide, Version 2.0 Last Revised: January 16, 2019 Table of Contents Welcome to the Tenable.sc-Tenable.io Upgrade Assistant 3 Get Started 4 Environment Requirements
More informationHow-to Guide: Tenable.io for Lieberman. Last Revised: August 14, 2018
How-to Guide: Tenable.io for Lieberman RED Last Revised: August 14, 2018 Table of Contents Introduction 3 Integrations 4 Windows Integration 5 SSH Integration 11 Database Integration 17 Additional Information
More informationScheduling WebEx Meetings with Microsoft Outlook
Scheduling WebEx Meetings with Microsoft Outlook About WebEx Integration to Outlook, page 1 Scheduling a WebEx Meeting from Microsoft Outlook, page 2 Starting a Scheduled Meeting from Microsoft Outlook,
More informationMcAfee Endpoint Encryption
Secured by RSA Implementation Guide for SecurID Authenticators Last Modified: December 4, 2013 Partner Information Product Information Partner Name McAfee Web Site www.mcafee.com Product Name (EEPC) Version
More informationSSH Product Overview
SSH Product Overview SSH Product Overview Understanding SSH SSH Discovery and Remediation Agentless SSH Agent Based SSH 2018 Venafi. All Rights Reserved. 2 Where is SSH used? File Transfer & Remote Script
More informationIntegration with Tenable Security Center
DEPLOYMENT GUIDE Integration with Tenable Security Center Outbound API 2017 Infoblox Inc. All rights reserved. Integration with Tenable Security Center August 2017 Page 1 of 10 Contents Introduction...
More informationTask Scheduling. Introduction to Task Scheduling. Configuring a Recurring Task
The following topics explain how to schedule tasks: Introduction to, on page 1 Configuring a Recurring Task, on page 1 Scheduled Task Review, on page 17 Introduction to You can schedule many different
More informationDetector Service Delivery System (SDS) Version 3.0
Detector Service Delivery System (SDS) Version 3.0 Detecting and Responding to IT Security Policy Violations Quick Start Guide 2018 RapidFire Tools, Inc. All rights reserved. V20180112 Contents Overview
More informationReporter User Guide RapidFire Tools, Inc. All rights reserved Ver 4T
Reporter User Guide 2017 RapidFire Tools, Inc. All rights reserved 20171102 Ver 4T Contents Overview... 3 Components of the Reporter... 3 Reporter Appliance... 3 Network Detective Application... 3 Diagnostic
More information<Partner Name> <Partner Product> RSA SECURID ACCESS Authenticator Implementation Guide. Check Point SmartEndpoint Security
RSA SECURID ACCESS Authenticator Implementation Guide Check Point SmartEndpoint Security Daniel R. Pintal, RSA Partner Engineering Last Modified: January 27, 2017 Solution
More informationRSA SecurID Implementation
Partner Information Partner Name Website Product Name Barracuda Networks Version & Platform x60 Series Product Description Product Category Solution Summary www.barracudanetworks.com Product Information
More informationUSM Anywhere AlienApps Guide
USM Anywhere AlienApps Guide Updated April 23, 2018 Copyright 2018 AlienVault. All rights reserved. AlienVault, AlienApp, AlienApps, AlienVault OSSIM, Open Threat Exchange, OTX, Unified Security Management,
More informationHow-to Guide: JIRA Plug-in for Tenable.io. Last Revised: January 29, 2019
How-to Guide: JIRA Plug-in for Tenable.io Last Revised: January 29, 2019 Table of Contents Welcome to JIRA Plug-in for Tenable.io 3 Prerequisites 4 Custom Fields Created in JIRA 5 Install 10 Configure
More informationHow-to Guide: Tenable Nessus for BeyondTrust. Last Revised: November 13, 2018
How-to Guide: Tenable Nessus for BeyondTrust Last Revised: November 13, 2018 Table of Contents Welcome to Nessus for BeyondTrust 3 Integrations 4 Windows Integration 5 SSH Integration 10 API Configuration
More informationSSH Communications Tectia SSH
Secured by RSA Implementation Guide for 3rd Party PKI Applications Last Modified: December 8, 2014 Partner Information Product Information Partner Name Web Site Product Name Version & Platform Product
More informationVMware Identity Manager vidm 2.7
RSA SECURID ACCESS Standard Agent Implementation Guide VMware Daniel R. Pintal, RSA Partner Engineering Last Modified: August 19, 2016 Solution Summary VMware Identity
More informationQualys SAML & Microsoft Active Directory Federation Services Integration
Qualys SAML & Microsoft Active Directory Federation Services Integration Microsoft Active Directory Federation Services (ADFS) is currently supported for authentication. The Qualys ADFS integration must
More informationBarracuda Networks NG Firewall 7.0.0
RSA SECURID ACCESS Standard Agent Implementation Guide Barracuda Networks.0 fal, RSA Partner Engineering Last Modified: 10/13/16 Solution Summary The Barracuda NG Firewall
More informationConfiguring Vulnerability Assessment Devices
CHAPTER 10 Revised: November 10, 2007 Vulnerability assessment (VA) devices provide MARS with valuable information about many of the possible targets of attacks and threats. They provide information useful
More informationCisco Threat Intelligence Director (TID)
The topics in this chapter describe how to configure and use TID in the Firepower System. Overview, page 1 Requirements for Threat Intelligence Director, page 4 How To Set Up, page 6 Analyze TID Incident
More informationSECARDEO. certbox. Help-Manual. Secardeo GmbH Release:
certbox Help-Manual Secardeo GmbH Release: 02.12.2014 certbox Help Manual 02.12.2014 Table of Contents 1 Search and retrieve Public Key Certificates... 1 1.1 Search by an e-mail address... 1 1.2 Download
More informationIpswitch MOVEit File Transfer (DMZ)
Secured by RSA Implementation Guide for RSA DLP Network Partner Information Last Modified: August 28 th, 2014 Product Information Partner Name Ipswitch Web Site http://www.ipswitch.com/ Product Name Version
More information<Partner Name> RSA ARCHER GRC Platform Implementation Guide. Wolters Kluwer Regulatory Data Feeds. <Partner Product>
RSA ARCHER GRC Platform Implementation Guide Wolters Kluwer Regulatory Data Feeds Jeffrey Carlson, RSA Partner Engineering Last Modified: May 11 th, 2018 Solution Summary
More informationIntegrate HEAT Software with Bomgar Remote Support
Integrate HEAT Software with Bomgar Remote Support 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the
More informationConfiguring SSL. SSL Overview CHAPTER
7 CHAPTER This topic describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section are:
More informationQualys Cloud Platform (VM, PC) v8.x Release Notes
Qualys Cloud Platform (VM, PC) v8.x Release Notes Version 8.18.1 April 1, 2019 This new release of the Qualys Cloud Platform (VM, PC) includes improvements to Vulnerability Management and Policy Compliance.
More informationVenafi Server Agent Agent Overview
Venafi Server Agent Agent Overview Venafi Server Agent Agent Intro Agent Architecture Agent Grouping Agent Prerequisites Agent Registration Process What is Venafi Agent? The Venafi Agent is a client/server
More informationHEAT Software Integration with Remote Support
HEAT Software Integration with Remote Support 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property of their
More informationForescout. eyeextend for Palo Alto Networks Wildfire. Configuration Guide. Version 2.2
Forescout Version 2.2 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191
More information<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. Pulse Connect Secure 8.x
RSA SECURID ACCESS Implementation Guide Pulse Connect Secure 8.x Daniel R. Pintal, RSA Partner Engineering Last Modified: January 24 th, 2018 Solution Summary The Pulse
More informationScheduling WebEx Meetings with Microsoft Outlook
Scheduling WebEx Meetings with Microsoft Outlook About WebEx Integration to Outlook, page 1 Scheduling a WebEx Meeting from Microsoft Outlook, page 2 Starting a Scheduled Meeting from Microsoft Outlook,
More informationHow to Transition from Nessus to SecurityCenter Reports
HOW-TO GUIDE How to Transition from Nessus to SecurityCenter Reports Using SecurityCenter for continuous network monitoring and vulnerability assessment will give you a greatly expanded set of features
More informationRSA NetWitness Logs. Tenable Nessus. Event Source Log Configuration Guide. Last Modified: Wednesday, August 09, 2017
RSA NetWitness Logs Event Source Log Configuration Guide Tenable Nessus Last Modified: Wednesday, August 09, 2017 Event Source Product Information: Vendor: Tenable Event Source: Tenable Nessus Versions:
More information0. Introduction On-demand. Manual Backups Full Backup Custom Backup Store Your Data Only Exclude Folders.
Backup & Restore 0. Introduction..2 1. On-demand. Manual Backups..3 1.1 Full Backup...3 1.2 Custom Backup 5 1.2.1 Store Your Data Only...5 1.2.2 Exclude Folders.6 1.3 Restore Your Backup..7 2. On Schedule.
More informationHow-to Guide: Tenable.io for Microsoft Azure. Last Updated: November 16, 2018
How-to Guide: Tenable.io for Microsoft Azure Last Updated: November 16, 2018 Table of Contents How-to Guide: Tenable.io for Microsoft Azure 1 Introduction 3 Auditing the Microsoft Azure Cloud Environment
More informationBarracuda Networks SSL VPN
RSA SecurID Ready Implementation Guide Partner Information Last Modified: October 24, 2013 Product Information Partner Name Barracuda Networks Web Site https://www.barracuda.com/ Product Name Barracuda
More informationAirWatch Mobile Device Management
RSA Ready Implementation Guide for 3rd Party PKI Applications Last Modified: November 26 th, 2014 Partner Information Product Information Partner Name Web Site Product Name Version & Platform Product Description
More informationUsing the VMware vcenter Orchestrator Client. vrealize Orchestrator 5.5.1
Using the VMware vcenter Orchestrator Client vrealize Orchestrator 5.5.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments
More information<Partner Name> <Partner Product> RSA SECURID ACCESS Authenticator Implementation Guide. Intel Security Drive Encryption 7.1.3
RSA SECURID ACCESS Authenticator Implementation Guide Intel Security Daniel R. Pintal, RSA Partner Engineering Last Modified: December 12, 2016 Solution Summary Intel Security/McAfee
More informationKey Technologies for Security Operations. Copyright 2014 EMC Corporation. All rights reserved.
Key Technologies for Security Operations 2 Traditional Security Is Not Working 97% of breaches led to compromise within days or less with 72% leading to data exfiltration in the same time Source: Verizon
More informationReporting Guide V7.0. iprism Web Security
V7.0 iprism Web Security 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo, iprism and iguard are trademarks of EdgeWave Inc. All other trademarks and registered
More informationScanning-Less Scanning. Installation Guide
Scanning-Less Scanning Installation Guide Last update: 9 February 2017 Table of Contents Scanning-Less Scanning Description... 3 1. A Traditional Approach... 3 2. Outpost24 s Unique Approach... 3 Enabling
More informationConfiguring SSL CHAPTER
7 CHAPTER This chapter describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section
More informationTenable SCAP Standards Declarations. June 4, 2015 (Revision 11)
Tenable SCAP Standards Declarations June 4, 2015 (Revision 11) Table of Contents Center for Internet Security (CIS)... 3 Common Criteria (NIAP)... 3 Common Vulnerability Enumeration (CVE)... 3 Common Configuration
More informationForeScout Extended Module for Qualys VM
ForeScout Extended Module for Qualys VM Version 1.2.1 Table of Contents About the Qualys VM Integration... 3 Additional Qualys VM Documentation... 3 About This Module... 3 Components... 4 Considerations...
More informationPalo Alto Networks PAN-OS
RSA Security Analytics Ready Implementation Guide Partner Information Last Modified: November 24 th, 2014 Product Information Partner Name Palo Alto Networks Web Site www.paloaltonetworks.com Product Name
More informationClearPass and Tenable.sc Integration Guide. Tenable.sc. Integration Guide. ClearPass. ClearPass and Tenable.sc - Integration Guide 1
ClearPass and Tenable.sc Integration Guide Tenable.sc ClearPass Integration Guide ClearPass and Tenable.sc - Integration Guide 1 ClearPass and Tenable.sc Integration Guide Change Log Version Date Modified
More informationUsing the VMware vrealize Orchestrator Client
Using the VMware vrealize Orchestrator Client vrealize Orchestrator 7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
More informationData Insight Feature Briefing Box Cloud Storage Support
Data Insight Feature Briefing Box Cloud Storage Support This document is about the new Box Cloud Storage Support feature in Symantec Data Insight 5.0. If you have any feedback or questions about this document
More informationvcenter Support Assistant User's Guide
vcenter Support Assistant 6.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions
More informationTRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. Ralf Kaltenbach, Regional Director RSA Germany
TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE Ralf Kaltenbach, Regional Director RSA Germany 1 TRUSTED IT Continuous Availability of Applications, Systems and Data Data Protection with Integrated
More informationHow-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018
How-to Guide: Tenable Nessus for Microsoft Azure Last Updated: April 03, 2018 Table of Contents How-to Guide: Tenable Nessus for Microsoft Azure 1 Introduction 3 Auditing the Microsoft Azure Cloud Environment
More informationOutlook 2007 Web Access User Guide
Outlook 2007 Web Access User Guide Table of Contents Page i TABLE OF CONTENTS OUTLOOK 2007 MAIL... 1 Launch Outlook Web Access... 1 Screen Elements... 2 Inbox... 3 Read Mail... 3 Delete a Message... 3
More informationAcronis Data Cloud plugin for ConnectWise Automate
Acronis Data Cloud plugin for ConnectWise Automate USER S GUIDE Revision: 17.01.2018 Table of contents 1 Introduction...3 2 What s new in Update 3...3 3 What s new in Update 2...3 4 What s new in Update
More information<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. Cisco Adaptive Security Appliance 9.5(2)
RSA SECURID ACCESS Implementation Guide Cisco Peter Waranowski, RSA Partner Engineering Last Modified: January 9 th, 2018 Solution Summary Cisco Adaptive Security Appliance
More informationZENworks 2017 Audit Management Reference. December 2016
ZENworks 2017 Audit Management Reference December 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights,
More informationIntel Security/McAfee Endpoint Encryption
RSA Ready Implementation Guide for RSA SecurID Last Modified: March 13, 2015 Partner Information Product Information Partner Name Intel Security formerly McAfee Web Site www.mcafee.com Product Name for
More informationvcenter Support Assistant User's Guide
vcenter Support Assistant 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions
More informationConfiguring SSL. SSL Overview CHAPTER
CHAPTER 8 Date: 4/23/09 This topic describes the steps required to configure your ACE (both the ACE module and the ACE appliance) as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination.
More informationRSA Ready Implementation Guide for. GlobalSCAPE EFT Server 7.3
RSA Ready Implementation Guide for GlobalSCAPE EFT Server 7.3 FAL, RSA Partner Engineering Last Modified: 5/19/2016 Solution Summary GlobalSCAPE Enhanced File Transfer (EFT) server can be configured to
More informationCisco Threat Intelligence Director (TID)
The topics in this chapter describe how to configure and use TID in the Firepower System. Overview, page 1 Using TID Sources to Ingest Feed Data, page 6 Using Access Control to Publish TID Data and Generate
More informationThe Scheduler & Hotkeys plugin PRINTED MANUAL
The Scheduler & Hotkeys plugin PRINTED MANUAL Scheduler & Hotkeys plugin All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including
More information12/05/2017. Geneva ServiceNow Security Management
12/05/2017 Security Management Contents... 3 Security Incident Response...3 Security Incident Response overview... 3 Get started with Security Incident Response... 6 Security incident creation... 40 Security
More informationScheduling WebEx Meetings with Microsoft Outlook
Scheduling WebEx Meetings with Microsoft Outlook About WebEx Integration to Outlook, on page 1 Scheduling a WebEx Meeting from Microsoft Outlook, on page 2 Starting a Scheduled Meeting from Microsoft Outlook,
More informationForeScout Extended Module for HPE ArcSight
ForeScout Extended Module for HPE ArcSight Version 2.7.1 Table of Contents About the HPE ArcSight Integration... 4 Use Cases... 4 Send Endpoint Status, Compliance, or Property Changes from CounterACT to
More informationScheduling WebEx Meetings with Microsoft Outlook
Scheduling WebEx Meetings with Microsoft Outlook About WebEx Integration to Outlook, page 1 Scheduling a WebEx Meeting from Microsoft Outlook, page 2 Starting a Scheduled Meeting from Microsoft Outlook,
More informationRSA Ready Implementation Guide for
RSA Ready Implementation Guide for AirTight Networks SpectraGuard Enterprise (SGE) 6.7 Daniel R. Pintal, RSA Partner Engineering Last Modified: February 12, 2016 Solution
More informationNETWRIX GROUP POLICY CHANGE REPORTER
NETWRIX GROUP POLICY CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 7.2 November 2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More information<Partner Name> <Partner Product> RSA NETWITNESS Security Operations Implementation Guide. Gurucul Risk Analytics
RSA NETWITNESS Security Operations Implementation Guide Jeffrey Carlson, RSA Partner Engineering Last Modified: June 27 th, 2017 (GRA) Overview Gurucul is changing the
More informationADFS integration with Ibistic Commerce Platform A walkthrough of the feature and basic configuration
IBISTIC TECHNOLOGIES ADFS integration with Ibistic Commerce Platform A walkthrough of the feature and basic configuration Magnus Akselvoll 19/02/2014 Change log 26/06/2012 Initial document 19/02/2014 Added
More information<Partner Name> <Partner Product> RSA SECURID ACCESS. Pulse Secure Connect Secure 8.3. Standard Agent Client Implementation Guide
RSA SECURID ACCESS Standard Agent Client Implementation Guide Pulse Secure John Sammon, Dan Pintal, RSA Partner Engineering Last Modified: July 11, 2018 Solution Summary
More informationXceedium Xsuite. Secured by RSA Implementation Guide for 3rd Party PKI Applications. Partner Information. Last Modified: February 10 th, 2014
Secured by RSA Implementation Guide for 3rd Party PKI Applications Last Modified: February 10 th, 2014 Partner Information Product Information Partner Name Xceedium Web Site www.xceedium.com Product Name
More informationPublishing and Subscribing to Cloud Applications with Data Integration Hub
Publishing and Subscribing to Cloud Applications with Data Integration Hub 1993-2015 Informatica LLC. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying,
More informationRevised: 22 November Integration Guide
Revised: 22 November 2016 Integration Guide About This Guide Guide Type Documented Integration WatchGuard or a Technology Partner has provided documentation demonstrating integration Guide Details WatchGuard
More informationBarracuda Threat Scanner for Exchange
The is a free Windows application that allows you to scan onpremises Microsoft Exchange Servers for threats in existing user mailboxes. This tool provides insight into what threats have already entered
More informationIntegrate Saint Security Suite. EventTracker v8.x and above
EventTracker v8.x and above Publication Date: June 6, 2018 Abstract This guide provides instructions to configure Saint Security Suite to send crucial events to EventTracker Enterprise by means of syslog.
More informationRSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Last Modified: August 26, 2011 Partner Information Product Information Partner Name Web Site Product Name Version & Platform Product Description Voice Innovate http://voiceinnovate.com/
More informationSecurityCenter 5.1 Administration Guide. November 12, 2015 (Revision 2)
SecurityCenter 5.1 Administration Guide November 12, 2015 (Revision 2) Table of Contents Introduction... 6 Standards and Conventions... 6 Abbreviations... 7 SecurityCenter Administrator Functions... 7
More informationKYOCERA Net Admin User Guide
KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable
More informationIBM Security AppScan Enterprise v9.0.1 Importing Issues from Third Party Scanners
IBM Security AppScan Enterprise v9.0.1 Importing Issues from Third Party Scanners Anton Barua antonba@ca.ibm.com October 14, 2014 Abstract: To manage the challenge of addressing application security at
More information