Tenable Web App Scanning-User Guide
Tenable Web App Scanning-User Guide
Guide
Last Revised: December 03, 2024
Copyright © 2024 Tenable, Inc. All rights reserved. Tenable, Tenable Nessus, Tenable Lumin, Assure, and the Tenable logo are registered trademarks of Tenable, Inc. or its affiliates. All other
products or services are trademarks of their respective owners.
Table of Contents
Prepare 13
Install 20
Configure Scans 21
Navigate Breadcrumbs 37
Navigate Planes 38
Filter a Table 41
-2-
Tenable Web App Scanning CI/CD Application Scan Overview 47
Tenable Web App Scanning CI/CD Scanning with Azure DevOps Integration 56
Tenable Web App Scanning CI/CD Scanning with Atlassian Bamboo Integration 57
Scanned Applications 70
Discovered Applications 73
Delete Assets 80
Vulnerability Details 93
Export Findings 96
-3-
Vulnerability States 112
HTTP Server Authentication Settings in Tenable Web App Scanning Scans 172
-4-
Client Certificate Authentication 176
My Account 203
-5-
License Types in Tenable Web App Scanning 224
Users 225
Permissions 261
-6-
Add a Permission Configuration to a User or Group 266
Roles 278
-7-
Access Group Rule Filters 325
Tags 335
-8-
Tenable FedRAMP Moderate Cloud Sensors 387
Credentials 387
-9-
Welcome to Tenable Web App Scanning
Tenable Web App Scanning offers significant improvements over the existing Web Application
Tests policy template provided by the Tenable Nessus scanner, which is incompatible with modern
web applications that rely on Javascript and are built on HTML5. This leaves you with an incomplete
understanding of your web application security posture.
Tenable Web App Scanning provides comprehensive vulnerability scanning for modern web
applications. Tenable Web App Scanning's accurate vulnerability coverage minimizes false positives
and false negatives, ensuring that security teams understand the true security risks in their web
applications. The product offers safe external scanning that ensures production web applications
are not disrupted or delayed, including those built using HTML5 and AJAX frameworks.
For more information on Tenable Web App Scanning architecture and scanning, refer to Get Started
with Tenable Web App Scanning.
Note: Tenable Vulnerability Management can be purchased alone or as part of the Tenable One package.
For more information, see Tenable One.
Tip: The Tenable Web App Scanning User Guide is available in English and Japanese. The Tenable Web App
Scanning user interface is available in English, Japanese, and French. To switch the user interface
language, see General Settings.
The platform combines the broadest vulnerability coverage spanning IT assets, cloud resources,
containers, web apps, and identity systems, builds on the speed and breadth of vulnerability
coverage from Tenable Research and adds comprehensive analytics to prioritize actions and
communicate cyber risk. Tenable One allows organizations to:
- 10 -
Tip: For additional information on getting started with Tenable One products, check out the Tenable One
Deployment Guide.
The Tenable Vulnerability Management API can be leveraged to develop your own applications using
various features of the Tenable Vulnerability Management platform, including scanning, creating
policies, and user management.
l Tenable Core + Web App Scanning - You can use the Tenable Core operating system to run an
instance of Tenable Web App Scanning in your environment. After you deploy Tenable Core +
Tenable Web App Scanning, you can monitor and manage your Tenable Web App Scanning
processes through the secure Tenable Core platform.
l Tenable Web App Scanning in Tenable Nessus Expert - Tenable Web App Scanning in Tenable
Nessus Expert allows you to scan and address web application vulnerabilities that traditional
Tenable Nessus scanners, Tenable Nessus Agents, or Tenable Nessus Network Monitor cannot
scan.
l Tenable Web App Scanning Docker Image - You can deploy Tenable Web App Scanning as a
Docker image to run on a container. The base image is an Oracle Linux 8 instance of Tenable
Web App Scanning. You can set up your Tenable Web App Scanning instance with
environment variables to deploy the Docker image with configuration settings automatically.
Once the Docker image is deployed, you can also update it, or collect scanner logs.
l Tenable Web App Scanning CI/CD Application Scan - You can deploy the Tenable Web App
Scanning Docker image as a continuous integration and continuous delivery/continuous
deployment (CI/CD) tool to run Tenable Web App Scanning scans on software before merging
it. Scanning your CI/CD applications and services at any point in your application's lifecycle
can greatly improve your security stance by finding vulnerabilities as early as possible.
- 11 -
Get Started with Tenable Web App Scanning
There are significant differences between scanning for vulnerabilities in web applications and
scanning for traditional vulnerabilities with Tenable Nessus, Tenable Nessus Agents or Tenable
Nessus Network Monitor. As a result, Tenable Web App Scanning requires a different approach to
vulnerability assessment and management.
Tenable Web App Scanning offers significant improvements over the legacy Tenable Nessus-based
web application scanning policy:
- 12 -
l The legacy scanning template for Tenable Nessus is incompatible with modern web
application frameworks such as Javascript, HTML 5, AJAX, or single page applications (SPA),
among others, which can potentially leave you with an incomplete understanding of your web
application security posture.
l Tenable Web App Scanning provides comprehensive vulnerability scanning for modern web
applications. Its accurate vulnerability coverage minimizes false positives and false negatives
to ensure that security teams understand the true security risks in their web applications. It
offers safe external scanning so that production web applications do not experience
disruptions or delays.
l Tenable Web App Scanning uses region-specific cloud scanners. There is no need for more
scanners if your web application analysis scope includes only publicly available assets. If your
web applications are not public, your installation plan depends on where your web applications
run and your organization's data storage needs.
Use the following sequence to configure and manage your Tenable Web App Scanning
deployment:
1. Prepare
2. Install
3. Configure Scans
Prepare
Before you begin, familiarize yourself with Tenable Web App Scanning basics to establish a
deployment plan and an analysis workflow for your implementation and configurations:
- 13 -
l Scan: The complete set of available checks which includes all other pre-built templates,
except for the API scan.
l Overview: A simplified version of the “Scan” template without several active tests to lower its
impact and speed up the scan.
l PCI: A special template used as part of the attestation offering that Tenable provides for the
payment card industry (PCI) security standard. Only submissions to attestation consume PCI
licenses; otherwise, this template is a simplified version of the "Scan" template.
l SSL/TLS: A health check scan focused on the current state of the web server encryption
settings and certificate state (for example, the remaining time on the certificate).
l Config Audit: A compliance audit that detects externally viewable web server settings that
external audit providers commonly review to evaluate the health of a security program.
l API Scan: A special template requiring more configuration to describe the application
programming interface (API), so that the scanner can successfully detect relevant
vulnerabilities This includes some similar tests in the “Scan” template but adds others unique
to API endpoints.
l Untuned Detailed Scans: Without requiring tuning or refinement, this approach uses the
“Scan” template to optimize detection of most vulnerabilities, and simulates drive-by style
attacks that sites commonly experience. These scans deploy quickly and return valuable
incremental visibility from the scan target while using basic validation to avoid obvious scan
errors. However, this approach may run into timeouts (such as the eight-hour default in
Tenable Vulnerability Management), or miss more complex sections of a site that requires
authentication or fine-tuning for correct scans. These drawbacks are common with sites that
have forums, blogs, large product volume, multiple languages, or a high number of pages.
l Authenticated Detailed Scans: While similar to the Untuned Detailed scan, this approach
uses authentication. You can do this in the scan configuration page or in the Chrome
- 14 -
extension from Tenable. In addition to the benefits of an untuned scan, authenticated scans
log on as a user to test for potential issues. Tenable recommends that you never log on as an
admin user, especially in production (see the "Key Considerations" section). Authentication
requires you to create and maintain the test user account and to update any unique site
configurations.
l Tuned Detailed Scans: In addition to authentication, you can use other methods to optimize
scans for speed or complexity (see “Key Considerations”). These refinements involve an initial
time investment before deployment and may require semi-regular adjustments depending on
the frequency of the site updates.
Pre-production Scanning
To limit scanner impact on a production site and maintain 100 percent uptime, you can consider
integrating scans using the Tenable Vulnerability Management API to trigger a scan based on a
weekly or monthly build, or a pre-production location on a regular schedule. This protects the more
exposed production site which may differ from internal builds. This scanning approach works to
varying degrees with most mature organizations and often depends on-site criticality and resource
availability.
API Scanning
Organizations are increasingly adopting APIs to power web applications, B2B transactions, mobile
applications, and automation scenarios. You can assess these potential exposures by using the API
scanning template within Tenable Web App Scanning to provide critical visibility into more cyber
risks. In general, high risk and exposure are drivers for mature programs or organizations to scan
APIs more frequently. Ultimately, as the security program develops, many organizations proactively
identify all vulnerable locations to ensure full coverage. This type of scan can require more input
from development staff and rely on an OpenAPI file to provide the endpoint definitions for the
scanner to communicate to the API itself.
- 15 -
Timeouts are common when you first build out your program. The default scan completion timeout
in Tenable Vulnerability Management is eight hours, and extending this may not “complete” the scan;
this may only be achievable via tuning for greater speed.
It is viable to run a program based on untuned scans while accepting the timeout. As many web
application vulnerabilities span multiple pages containing the same vulnerability, it is likely that a
scan automatically detects a significant proportion of vulnerabilities within the first several hours.
Tenable's own monitoring can confirm this. Tuned scans typically improve scan efficiency and
accuracy by only a small degree and cost more time to refine the scan configuration.
Most mature organizations tune scans on their most critical sites, which involve 10-20 minutes of
effort per site and improves with operator experience. An organization’s level of knowledge and
resource availability can determine the percentage of sites that undergo detailed tuning. It is rare
to see all sites tuned, especially in organizations with many websites. This is due partly to the
dynamic nature of websites; they often expand or change significantly every few years, and this
requires a review of scan settings to adapt to the development pace of the test site.
l Focus on the process first: Start with the Tenable Web App Scanning “Scan” (a complete set
of checks) or an “Overview” scan (fewer checks but lower impact) templates. Familiarize
yourself with the scanner output and work with your team to incorporate the findings into
your workflows. Develop your mitigation and resolution programs.
l Dig deeper into critical areas: Once you have established some of the baseline procedures
and identified the right owners within your organization for the output from the scanner, start
investing time in more advanced-tuned scans to gain better visibility into your most important
sites.
l Take action: The scans return a significant amount of data to drive organizational action.
Consider the potential consumers of the data. Developers want details to identify necessary
fixes and improve over time. Management must know which sites contribute the greatest risk
to the business, and therefore allocate resources. Security leadership needs general category
information such as the OWASP vulnerability categories for all sites to focus on a specific
classification of vulnerabilities.
Note: Tenable Professional Services offers a highly recommended quick-start program for new users of
Tenable Web App Scanning scanning to help establish the mechanics of developing a new program. Also,
the ProServe team runs a workshop to establish the internal processes and initial goals of developing a
- 16 -
broader vulnerability management program. These services help organizations get a solid foundation and
understanding of effective cybersecurity programs and familiarization with the product. Contact your
Tenable sales representative at sales@tenable.com.
l Public Websites
You can scan external websites from Tenable Vulnerability Management using the
internet-based Tenable Web App Scanning or an on-premises scanner.
l Private Websites
You can scan internal or intranet web applications from Tenable Vulnerability
Management using an on-premises Tenable Web App Scanning Scanner.
If the scanner cannot reach the web application, or cannot deliver an input and retrieve
results, scanning fails. Network constraints such as latency can affect scanning or network
controls (for example, host-based firewalls, network firewalls, network segregation, etc.).
Always include internal web application scanners on your "allow" list.
If there are too many timeouts during a scan, the session terminates. Choose a scanner
located as close as possible to the targets. Review the sitemap plugin attachments to check
for long page load times or timeouts. This can occur with too many concurrent tests on a
slower server, a scanner that’s not close enough to the web application (such as scanning
Australia from a US scanner), or the site setup that may lead to longer load times. Changing
your scanner location can help to prevent readjustments for advanced settings that slow the
scanner down. Counter-intuitively, slowing the scan speed settings can speed up results on a
site that responds slowly, by lowering the rate of queries and adding less variability to the
returned queries.
The scanner can follow links, press buttons, and simulate the actions of a user based on what
it can access. There can be undesired interaction on the site as a result of its site discovery
phase. For example, if a user can send an email, the scanner can fill out forms and press the
- 17 -
“send email” button potentially more than once. The scanner has no context for any specific
button action, unless you teach it or exclude either the whole page or page element to prevent
it from pressing a button unintentionally. (For more information, view our documentation on
Scope Settings.) Keep in mind that excluding page elements to prevent such actions lowers
the accuracy of the scan, so consider plans to scan sites like this in pre-production on a
regular schedule.
With its default settings, the scanner can operate as several users navigating the website at
the same time. On servers with good capacity, there is typically minimal impact from this
activity. However, if the state of the server is unknown, you can de-tune the speed of the scan
— at least for the first test — to alert to any potential site impact from simultaneous sessions.
For more details on configuring such a test, see Advanced Settings.
Customized tuning generally applies to most websites because each web application is
different. There are unique structures, sitemaps, third-party libraries, components, and
custom code working together. Your investment in tuned scans depends on resource
availability, criticality of the site, and impact to the business.
7. When tuning for authentication, never run a Tenable Web App Scanning scan as a web site
administrator in production – only in test or pre-production environments.
Running a web application scan with administrator credentials could create or delete users, or
perform other undesired administrative functions.
8. When tuning for speed, a rudimentary understanding of your sites can help accelerate
DAST scans.
- 18 -
c. Consider speeding up your scan settings if you obtain sub one-second responses and
only minimal impact to the web server.
d. Deduplicate site content: The scanner does not test site text, image, and video content
— only input fields and interactions. If you have redundant pages, such as a site that
uses multiple languages but has the same underlying code, you only need to test one
language version of the site.
e. Add more binary exclusions: Tenable Web App Scanning does not “test” text, images, or
videos and decide which file extensions to exclude. The scan scope section provides a
default set that you can adapt for a specific site.
f. Prioritize critical URLs: Identify the critical portions of the application, such as those
ones forms that can return sensitive data. Add those URLs to the scope of your testing,
either via “include” in the scan scope section, or through a manual crawl script. You can
also consider whether these sites require testing in pre-production.
9. When tuning for complexity, use session recordings to train the scanner.
You can do this either by using the Tenable Chrome extension or Selenium IDE, and adding
within the scope section of a scan configuration. With this process, you can perform manual
crawling to ensure that the scanner can test a highly complex location within a site. For
example, a site can require a specific series of button presses and a specific set of correct
input values to reach a page that isn’t available any other way. You can record the steps to
enable the scanner to play it back.
10. Map out whether there is a web application firewall (WAF), web proxy, or load balancer
between the scanner and the target:
Some network devices can interfere with the scanning or completely invalidate the results.
You may think it’s sufficient to receive only the “remote” view of results filtered by the firewall;
however, it’s possible the WAF’s built-in protections only prevent one or two methods of
executing the flaw. Gaining a full picture of the true state of the site is imperative to make
risk-based decisions. Configure your WAF to support bypass functionality to allow specific IPs
or a combination of IP and agent header strings to prove and authorize the incoming scan. A
list of Tenable scanner IP ranges is available here.
- 19 -
Check whether the application is compatible with the default user agent (configured as
“WAS/%v” by default). If not, it may need a specific or commonly available header from a
standard browser, such as Mozilla/5.0. Some server-side protections or a web application
firewall can require a specific set of results. In this case, you can copy the user agent string
from a known browser that can access the site successfully.
Is the target site production-facing, or in any other way critical? What is the business impact
if the web application scanner causes a service disruption? Always perform the first scan of a
site in a controlled manner, either with staff on-hand or within a pre-production environment.
Once you understand the nature of the site, you can begin full automation.
For more information and guided product walk-throughs, visit our Tenable Product Education
YouTube channel. These short, instructional videos explain how to make the best use of Tenable
Web App Scanning, including the authentication and tuning procedures mentioned above to help
you secure your vulnerable web applications.
Install
1. Preparation for Deployment
b. Determine whether you need a local scanner. You can deploy local or cloud-based
scanners and connect them to Tenable Vulnerability Management. You can use these
scanners on internet-facing web applications and development or pre-production
environments (if suitable firewall rules apply).
The Tenable Core + Tenable Web App Scanning scanner supports installation on VMware
(.ova), Hyper-V (.zip), or a physical machine (.ISO). You can deploy it locally on-premises
or within a cloud-based development environment to scan non-internet-facing web
applications. For more information on VMware/vCenter, refer to the VMware integration
documentation.
- 20 -
You can download the local scanner here. Check that you have the following:
l Inbound access via HTTPS on port 8000 for browser access to the management
interface.
a. Define the security objectives. Why are we scanning, what do we hope to achieve, and
what does success look like?
b. Determine scanning priorities. Identify which target web applications are within the
scope of quick scanning and which require more detailed scanning.
c. Ensure full coverage. Determine whether there are any other (possibly unidentified) web
servers, services, or applications that you need to scan, and how to find them.
3. Documentation
a. Track everything. Produce and manage documentation that captures full details of the
deployment requirements, deployed scanner resources (if applicable), web applications
identified for scanning, and the tuning you applied to the scans with an accompanying
rationale.
Configure Scans
After you prepare your analysis workflow and determine the scope of the web application assets,
you can configure and run scans on those assets.
Tenable recommends that you first run high-level overview scans to help you determine the
settings to configure for more in-depth scans.
- 21 -
1. Do one of the following:
l
To configure and run overview scans:
1. Do one of the following:
Note: The Tenable-provided scan templates for overview scans do not require
authentication. However, the plugin results from these scans can help you identify the
types of credentials your web applications require for more in-depth scans.
2. Review the scan results, along with your scanning strategy, and determine which
configuration settings you want to adjust when you run your standard web
application scans.
l
To configure and run standard scans:
1. Create a scan using the template that best matches your assessment needs:
2. (Optional) Configure your scan settings, including user permissions, and plugin
settings.
Note: You can also configure your credentials options in standard scans. However, you
need to add credentials only if your web application requires them for authentication.
- 22 -
3. View and analyze your scan results:
l Use the sitemap crawled as an input to detailed scanning, tuning and optimization,
reviewing for page timeouts, length of time to access a page, errors, or opportunities to
remove repetitive content.
l Review the “Scan notes” for any higher priority concerns, which may provide suggestions
for scan improvement.
a. Experiment with advanced settings. Perform scan tuning in a few locations based on
the data gathered in the previous step. You can then update and deploy the scan for the
targeted web applications. For more information, see
l Scope Settings
l Assessment Settings
l Advanced Settings
Note: With a Tenable Web App Scanning trial license, you can run up to five scans concurrently using your
cloud scanners. You can run any number of scans concurrently using on-premises scanners.
l If the scan must authenticate to the web application using methods required by your
server's HTTP protocol, add HTTP Server-Based authentication.
l If the scan must authenticate to the web application using methods required by the web
application, add Web App authentication.
2. Consider further custom adjustments, such as scan settings, user permissions, and plugin
settings.
- 23 -
Tip: Each application is unique. Running scans and analyzing the results reveal techniques that help
you run scans most efficiently and ensure coverage of all areas of the application. Depending on the
size or complexity of the web application, the scan may finish allowing you to analyze the results for
further optimization. Tenable highly recommends that you review the “scan notes” after a scan
completes and the attachment to the sitemap plugin regularly.
Note: This requires a Tenable One license. For more information about trying Tenable One, see Tenable One.
Integrate Tenable Web App Scanning with Tenable One and leverage the following features:
l In Lumin Exposure View, gain critical business context by getting business-aligned cyber
exposure score for critical business services, processes and functions, and track delivery
against SLAs. Track overall web application risk to understand the risk contribution of web
applications to your overall cyber exposure score.
o Review the Global exposure card to understand your holistic score. Click Per Exposure
to understand what factors are driving your score, and by how much.
o Review the Web Applications exposure card.
o Configure the exposure view settings to set a customized Card Target and configure
Remediation SLA and SLA Efficiency based on your company policy.
o Create a custom exposure card based on business context (for example, Web App
Owner, Asset Criticality, Application, Internal/External Web Servers, or
Ecommerce/Supporting Asset).
l In Tenable Inventory, enhance asset intelligence by accessing deeper asset insights, including
related attack paths, tags, exposure cards, users, relationships, and more. Improve risk
scoring by gaining a more complete view of asset exposure, with an asset exposure score that
assesses total asset risk and asset criticality.
o Review your Tenable Web App Scanning assets to understand the strategic nature of the
interface. This should help set your expectations on what features to use within Tenable
Inventory, and when.
o Review the Tenable Queries that you can use, edit, and bookmark.
- 24 -
o Familiarize yourself with the Global Search query builder and its objects and properties.
Bookmark custom queries for later use.
o Drill down into the asset details page to view asset properties and all associated context
views.
o (Optional) Create a tag that combines different asset classes.
l In Attack Path Analysis, optimize risk prioritization by exposing risky attack paths that
traverse the attack surface, including web apps, IT, OT, IoT, identities, ASM, and prevent
material impact. Streamline mitigation by identifying choke points to disrupt attack paths with
mitigation guidance, and gain deep expertise with AI insights.
o View the Attack Path Analysis Dashboard for a high-level view of your vulnerable assets
such as the number of attack paths leading to these critical assets, the number of open
findings and their severity, a matrix to view paths with different source node exposure
score and ACR target value combinations, and a list of trending attack paths.
n Review the Top Attack Path Matrix and click the Top Attack Paths tile to view
more information about the paths leading to your “Crown Jewels”, or assets with
an ACR of 7 or above.
You can adjust these if needed to ensure you’re viewing the most critical attack path
data and findings.
o On the Findings page, view all attack techniques that exist in one or more attack paths
that lead to one or more critical assets by pairing your data with advanced graph
analytics and the MITRE ATT&CK® Framework to create Findings, which allow you to
understand and act on the unknowns that enable and amplify threat impact on your
assets and information.
o On the Discover page, generate attack path queries to view your assets as part of
potential attack paths:
- 25 -
n Generate an Attack Path using a Built-in Query
n Generate an Asset Query using the Asset Query Builder
n Generate an Attack Path Query using the Attack Path Query Builder
Then, you can view and interact with the Attack Path Query and Asset Query data via the
query result list and the interactive graph.
Note: A Tenable Security Center license is required for the Tenable Web App Scanning on-premises
version.
To use Tenable Web App Scanning, you purchase licenses based on your organizational needs and
environmental details. Tenable Web App Scanning then assigns those licenses to assets in your
environment: unique fully qualified domain names (FQDNs). If you only scan IP addresses, the
system licenses those instead.
When your environment expands, so does your asset count, so you purchase more licenses to
account for the change. Tenable licenses use progressive pricing, so the more you purchase, the
lower the per-unit price. For prices, contact your Tenable representative.
Tip: To view your current license count and available assets, in the Tenable top navigation bar, click
and then click License Information. To learn more, see License Information Page.
- 26 -
Tenable Web App Scanning determines your licensed asset count by scanning resources in your
environment to identify FQDNs. FQDNs that have been scanned for vulnerabilities in the past 90
days count towards your license.
FQDNs are listed as complete URLs, as per the RFC-3986 internet standard. Under this standard,
each FQDN has the following components and format:
hostname.parent-domain.top-level-domain
When you specify a web application target in a scan, Tenable Web App Scanning counts that target
as a separate asset if any component of the FQDN differs from that of another scanned target or
previously scanned asset. Multiple targets with different paths appended to the FQDN count as a
single asset, as long as all components of the FQDNs match.
hostname.parent-domain.top-level-domain/path1
hostname.parent-domain.top-level-domain/path2
hostname.parent-domain.top-level-domain/path2/path3
The following table shows when scan targets are considered to be the same asset and when they
are considered to be separate assets, based on whether or not all the FQDN components match.
- 27 -
Included with Purchase Add-on Component
l Integration with
Tenable Vulnerability
Management (if owned).
Reclaiming Licenses
When you purchase licenses, your total license count is static for the length of your contract unless
you purchase more licenses. However, Tenable Web App Scanning reclaims licenses under some
conditions. You can also delete assets or set them to age out so that you do not run out of licenses.
The following table explains how Tenable Web App Scanning reclaims licenses.
Deleted Tenable Web App Scanning removes deleted assets from the Assets workbench
assets and reclaims their licenses within 24 hours.
Aged out In Settings > Sensors > Networks, if you enable Asset Age Out, Tenable Web
assets App Scanning reclaims assets after they have not been scanned for a period you
specify.
All other Tenable Web App Scanning reclaims all other assets—such as those imported
assets from other products or assets with no age-out setting—after they have not been
scanned for 90 days.
- 28 -
Scenario Result
You scan more assets than are A message appears in Tenable Web App Scanning.
licensed for three consecutive days.
You scan more assets than are A message and warning about reduced functionality
licensed for 15+ days. appears in Tenable Web App Scanning.
You scan more assets than are A message appears in Tenable Web App Scanning;
licensed for 45+ days. export features are disabled.
Tip: Improper scan hygiene or product misconfigurations can cause scan overages, which result in inflated
asset counts. To learn more, see Scan Best Practices.
Expired Licenses
The Tenable Web App Scanning licenses you purchase are valid for the length of your contract. 30
days before your license expires, a warning appears in the user interface. During this renewal
period, work with your Tenable representative to add or remove products or change your license
count.
After your license expires, you can no longer sign in to the Tenable platform.
Scanning Requirements
Scenario Hardware Recommendations
Tenable Web App Scanning Docker CPU: Tenable Web App Scanning docker image only
Image up to a maximum of four supported on AMD 64-bit systems and does not
concurrent web application scans. support ARM or Windows systems.
- 29 -
Application Requirements
All applications you want to scan must be compatible with Google Chrome, because Tenable Web
App Scanning uses Google Chrome browsers to run certain plugins.
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Note: If you are an administrator logging in to your Tenable Web App Scanning instance for the first
time, Tenable provides your first-time credentials during setup. After you log in for the first time,
you can set your new password. If you are logging in to Tenable Vulnerability Management after
initial setup, your username is the email address you used to register for your Tenable Web App
Scanning account.
l Review the System Requirements in the General Requirements User Guide and confirm that
your computer and browser meet the requirements.
2. In the username box, type your Tenable Web App Scanning username.
3. In the password box, type the Tenable Web App Scanning password you created during
registration.
4. (Optional) To retain your username for later sessions, select the Remember Me check box.
- 30 -
The landing page appears.
Note: Tenable Web App Scanning logs you out after a period of inactivity (typically, 30 minutes).
The quick actions menu displays a list of the most commonly performed actions.
Resource Center
The Resource Center displays a list of informational resources including product announcements,
Tenable blog posts, and user guide documentation.
- 31 -
2. Click a resource link to navigate to that resource.
Notifications
In Tenable Web App Scanning, the Notifications panel displays a list of system notifications. The
button shows the current number of unseen notifications. When you open the Notifications panel,
Tenable Web App Scanning marks those notifications as seen. Once you have seen a notification,
you can clear it to remove it from the Notifications panel.
To view notifications:
- 32 -
l In the upper-right corner, click the button.
o To expand a group of notifications, at the bottom of the grouped notification, click More
Notifications.
o To collapse an expanded group of notifications, at the top of the expanded notifications,
click Show Less.
o To clear an expanded group of notifications, at the top of the expanded notifications,
click Clear Group.
o To clear all notifications, at the bottom of the panel, click Clear All.
Settings Icon
Workspace
When you log in to Tenable, the Workspace page appears by default. On the Workspace page, you
can switch between your Tenable applications or set a default application to skip the Workspace
page in the future. You can also switch between your applications from the Workspace menu,
which appears in the top navigation bar.
Important: Tenable disables application tiles for expired applications. Tenable removes expired application
tiles from the Workspace page and menu 30 days after expiration.
1. From any Tenable application, in the upper-right corner, click the button.
- 33 -
2. Click an application tile to open it.
1. From any Tenable application, in the upper-right corner, click the button.
- 34 -
The Workspace page appears.
By default, users with the Administrator, Scan Manager, Scan Operator, Standard, and Basic roles can set
a default application. If you have another role, contact your administrator and request the Manage
permission under My Account. For more information, see Custom Roles.
1. Log in to Tenable.
A menu appears.
- 35 -
3. In the menu, click Make Default Login Page.
1. Log in to Tenable.
A menu appears.
The user account menu provides several quick actions for your user account.
- 36 -
2. Do one of the following:
l Click My Profile to configure your own user account. You navigate directly to the My
Account settings page.
l Click What's new to navigate directly to the Tenable Web App Scanning Release Notes.
l Click View Documentation to navigate directly to the Tenable Web App Scanning User
Guide documentation.
For additional information about navigating the Tenable Web App Scanning interface, see the
following topics:
Navigate Breadcrumbs
In the Tenable Web App Scanning interface, certain pages display breadcrumbs in the top
navigation bar. From left to right, the breadcrumbs show the path of pages you visited to reach your
current page:
To navigate breadcrumbs:
- 37 -
l In the top navigation bar, click a link in the breadcrumb trail to return to a previous page.
Navigate Planes
Tenable Web App Scanning combines fixed pages with overlapping planes.
l
Use the left navigation plane as follows:
a. In the upper-left corner, click the button.
With the exception of the left navigation plane, planes open from the right side of the screen.
2. Manipulate a plane using the following buttons at the left edge of the plane:
3. Return to a previous plane or page (and close a new plane or planes) by clicking the previous
plane.
Required Tenable Vulnerability Management User Role: Basic, VM Scan Operator, VM Standard, VM Scan
Manager, or Administrator
- 38 -
Tenable Web App Scanning Workbench Tables
Tenable Vulnerability Management Workbench tables are any tables in the Tenable Vulnerability
Management interface outside of the Explore section. These tables feature search and navigational
capabilities. They also include the ability to drag and drop columns in any order, change column
width, and sort the data in multiple columns at one time. For more information, see Tenable Web
App Scanning Workbench Tables.
Explore Tables
Explore tables are any tables within the Explore section in the Tenable Vulnerability Management
user interface. They include many of the features of Tenable Vulnerability Management Workbench
tables, but include additional customization and filtering capabilities. For more information, see
Explore Tables.
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Note: Customizable tables also include the ability to access the actions buttons by right-clicking a table
row. To access your browser menu, press the Ctrl key and right-click.
Tenable Web App Scanning Workbench tables are any tables in the Tenable Web App Scanning
interface outside of the Explore section.
l
Navigate the table:
o To adjust the sort order, click a column title.
Tenable Web App Scanning sorts all pages of the table by the data in the column
you selected.
- 39 -
o In Tenable Web App Scanning, to increase or decrease the number of rows
displayed per page, click Results per page and select a number.
This button appears instead of individual action buttons if 5 or more actions are
possible for the row.
o To navigate to another page of the table, click the arrows:
Button Action
Note: Due to limitations, the total number of findings is not always known past the 1000
limit. In this case, the table may display a modified interface, changes in pagination
labeling, and a disabled last page navigation button.
l
Search the table:
In the new interface, a search box appears above individual tables in various pages and
planes. In some cases, the search box appears next to the Filters box.
Your search criteria depends on the type of data in the table you want to search.
Tenable Web App Scanning filters the table by your search criteria.
l To change the column order, drag and drop a column header to another position in the
table.
l
Remove or add columns:
- 40 -
a. Roll over any column.
c. Select or clear the check box for any column you want to show or hide in the table.
l
Adjust column width:
a. Roll over the header between two columns until the resize cursor appears.
Tip: To automatically resize a column to the width of its content, double-click the right
side of the column header.
Tenable Web App Scanning sorts all pages of the table by the data in the column you
selected.
l To sort data in the table by multiple columns, press Shift and click one or more column
headers.
Tenable Web App Scanning sorts all pages of the table in the order in which you
selected the columns.
Filter a Table
Required Tenable Vulnerability Management User Role: Basic, VM Scan Operator, VM Standard, VM Scan
Manager, or Administrator
In Tenable Web App Scanning, a Filters box appears above individual tables in various pages and
planes.
- 41 -
To filter a table:
a. In the drop-down list, search for the filter you want to apply.
b. Select the check box next to the filter or filters you want to apply.
For example, you might select Severity if filtering findings or Asset ID if filtering assets.
Note: When using the contains or does not contain operators, use the following best
practices:
l For the most accurate and complete search results, use full words in your search
value.
l Do not use periods in your search value.
l Remember that when filtering assets, the search values are case sensitive.
l Where applicable, Tenable recommends using the contains or does not contain
instead of the is equal to or is not equal to operators.
An example of the expected input is present in the box until you start
typing. If what you type is invalid for the attribute, a red outline appears
- 42 -
around the text box.
Single valid If a default value is associated with the attribute, Tenable Web App
value Scanning selects the default value automatically.
To deselect values:
7. Click Apply.
Tenable Web App Scanning applies your filter or filters to the table.
- 43 -
9. (Optional) Clear the filters you applied:
Tenable Web App Scanning clears all filters from the table, including saved searches.
Note: Clearing filters does not change the date range selected in the upper-right corner of the
page. For more information, see Tenable Web App Scanning Tables.
Note: Tenable Web App Scanning does not have a command line interface or configuration wizard, users
must use environment variables to configure Tenable Web App Scanning.
Note: Tenable Web App Scanning docker image only works on AMD 64-bit systems and does not support
ARM or Windows systems.
1. Use the operators with the appropriate options for your deployment, as described in
Operators.
Example:
- 44 -
$ docker run -it -e WAS_LINKING_KEY='linkingkeyleavequotations' -e WAS_SCANNER_
NAME='samplescannername' tenable/was-scanner:latest
Note: Copying and pasting example text can sometimes change the quotation characters causing
the command to fail. Double-check the command before proceeding.
Note: When you remove Tenable Web App Scanning running as a Docker container, you lose the container
data.
1. In your terminal, stop the container from running using the docker stop command.
Operators
Operator Description
Environment Variables
Deploying a Tenable Web App Scanning image that is linked to Tenable Vulnerability Management.
- 45 -
WAS_SCANNER_ Yes The name of the Tenable Web App Scanning scanner to
NAME appear in Tenable Vulnerability Management.
Note: The Tenable Web App Scanning Docker Image does not update software or plugins. The latest
version of the scanner must be pulled to get the latest plugins and software updates.
- 46 -
l Run WAS_LOG_TO_STDOUT.
This prints the logs to stdout, and you should be able to collect them with docker logs
<container id>.
Note: This option should cause the log file to exist in your PWD even after the container has stopped.
Scan CI/CD build with Tenable Web App Scanning Docker image:
l Atlassian Bamboo
l Azure
- 47 -
l CircleCI
l GitHub
l GitLab
l Jenkins
4. Locate your scan in the Tenable Web App Scanning user interface.
Note: The Scanner Type and Scanner fields do not apply to CI/CD scans and should remain at their
default setting.
Note: When configuring a scan for integration into a CI/CD pipeline, Tenable recommends selecting
a Scan Template with a relatively short runtime to avoid potential delays in your build process. For
more information, refer to the Scan Templates section.
Note: Ensure that the target hostname is distinct from your production application. This ensures
that vulnerabilities found during builds do not intermix with your production application's
vulnerabilities.
5. Export the scan configuration for the selected scan to the scan pipeline stages.
On the Scans page, click the button for the scan you have chosen and select Export for
CI/CD.
- 48 -
Note: If you don't have an API Key, you can generate one on your Account page. For more
information, see Generate API Keys.
Caution: Tenable recommends that you always take measures to hide any sensitive information,
such as API keys used to link the scanner to Tenable and the username/password combination used
by the scanner to authenticate to the web app being scanned. Keep these out of source control and
placed in secure storage provided by the repository, or the continuous integration tooling in use.
11. Set the vulnerability_threshold field parameter to either Critical, High, Medium, or Low.
Note: The threshold you set for this field causes your build to pass or fail if your build meets, or does
not meet, the threshold, respectively. Builds can also fail due to scan errors or incomplete
configurations.
12. (Optional) Follow the specific outline of the pipeline workflow file required for your CI/CD
integration, as described in the following CI/CD Pipeline Workflow File section.
13. Go to the selected scan in the Scans page to view the results.
14. (Optional) Retrieve your logs. Refer to the following Reports and Logs section.
Note: The scanner Docker image uses the /scanner directory for seamless file exchange between the
host and the docker container. To mount your tenable_was.conf file located in your repository, use -v
$PWD:/scanner in the docker run command. If your configuration file is at the top level of your repository,
this directory is where you can retrieve the tenable_was_scan.html and scanner.log files after the
scan.
- 49 -
placeholder text instead of sensitive information related to those credentials (passwords, auth
tokens, etc.). For example, ${?USER_PASS_PASSWORD} and ${?USER_PASS_USERNAME} are
placeholders in the following example file:
Note: Credentialed scan edits are necessary for Login Form, Cookie Auth, and API Key authentication
methods.
scan {
credentials {
"user_pass" {
"auth_type"=auto
password=${?USER_PASS_PASSWORD}
username=${?USER_PASS_USERNAME}
}
}
When you run the docker image, those placeholders represent environment variables that where
the scanner retrieves the actual values from, so make sure they are present. In the previous
example, you would run the docker image with the environment variables necessary to fill in those
values, As shown in the following example:
In cases where values serve as both keys and values, you must provide them as a JSON object
containing the corresponding key-value pairs. For instance, if your web application uses Login Form
authentication and requires both field names and values, such as "username" and "password," you
should configure it as follows:
scan {
credentials {
"login_form" {
"auth_headers"=${?LOGIN_FORM_AUTH_HEADERS}
"login_check"=Welcome
"login_check_pattern"=Welcome
- 50 -
"login_check_url"="http://app:3000/home.html"
"login_parameters"=${?LOGIN_FORM_LOGIN_PARAMETERS};
}
}
Note: Make sure there is a value present for all placeholder values, even if the value is empty.
pipeline {
agent any
stages {
stage('build-run-scan') {
environment {
ACCESS_KEY = credentials('ACCESS_KEY')
SECRET_KEY = credentials('SECRET_KEY')
}
steps {
sh '''
docker pull swaggerapi/petstore
docker run -d -e SWAGGER_URL=http://petstore:8080 -e SWAGGER_BASE_
PATH=/v2 --name petstore swaggerapi/petstore
docker pull tenable/was-scanner:latest
docker run -v $(pwd):/scanner -t -e WAS_MODE=cicd -e ACCESS_
KEY=${ACCESS_KEY} -e SECRET_KEY=${SECRET_KEY} --link petstore tenable/was-
- 51 -
scanner:latest
'''
}
}
}
post {
always {
sh '''
docker rm $(docker stop $(docker ps -a -q --filter
ancestor="tenable/was-scanner:latest" --format="{{.ID}}")) || true
docker rm $(docker stop $(docker ps -a -q --filter
ancestor="swaggerapi/petstore" --format="{{.ID}}")) || true
docker system prune -f --volumes
'''
archiveArtifacts 'scanner.log'
publishHTML([allowMissing: false, alwaysLinkToLastBuild: false,
keepAll: true, reportDir: '', reportFiles: 'tenable_was_scan.html',
reportName: 'WAS Report'])
cleanWs()
}
}
}
Note: Tenable recommends that you retain scanner logs as they can be useful for debugging.
- 52 -
archiveArtifacts 'scanner.log' publishHTML([allowMissing: false,
alwaysLinkToLastBuild: false, keepAll: true, reportDir: '', reportFiles:
'tenable_was_scan.html', reportName: 'WAS Report']
- 53 -
- 54 -
Example integrations for CI/CD tools:
l Atlassian Bamboo
l Azure
l CircleCI
l GitHub
- 55 -
l GitLab
l Jenkins
Tenable Web App Scanning CI/CD Scanning with Azure DevOps Integration
You can deploy a Tenable Web App Scanning Docker image in continuous integration and
continuous delivery/continuous deployment CI/CD against your application in Azure DevOps. For
more information on this integration, see the Azure DevOps documentation.
# Starter pipeline
# Start with a minimal pipeline that you can customize to build and deploy
your code.
# Add steps that build, run tests, deploy, and more:
# https://aka.ms/yaml
trigger:
- main
pool:
vmImage: ubuntu-latest
steps:
- script: echo Hello, world!
displayName: 'Run a one-line script'
- script: |
echo Add other tasks to build, test, and deploy your project.
echo See https://aka.ms/yaml
- 56 -
docker pull swaggerapi/petstore
docker run -d -e SWAGGER_URL=http://petstore:8080 -e SWAGGER_BASE_PATH=/v2
--name petstore swaggerapi/petstore
docker pull tenable/was-scanner:latest
docker run -v $(pwd):/scanner -t -e WAS_MODE=cicd -e ACCESS_KEY=${ACCESS_
KEY} -e SECRET_KEY=${SECRET_KEY} --link petstore tenable/was-scanner:latest
displayName: 'Run a multi-line script'
l CircleCI
l GitHub
l GitLab
l Jenkins
Tenable Web App Scanning CI/CD Scanning with Atlassian Bamboo Integration
You can deploy a Tenable Web App Scanning Docker image in continuous integration and
continuous delivery/continuous deployment CI/CD against your application in Atlassian Bamboo. For
more information on this integration, see the Atlassian Bamboo documentation.
#!/usr/bin/env bash
- 57 -
docker run -d -e SWAGGER_URL=http://petstore:8080 -e SWAGGER_BASE_PATH=/v2 -
-name petstore swaggerapi/petstore
l CircleCI
l GitHub
l GitLab
l Jenkins
version: 2.1
jobs:
- 58 -
build-run-scan:
machine:
image: ubuntu-2204:2022.04.2
steps:
- checkout
- run: |
docker pull swaggerapi/petstore
docker run -d -e SWAGGER_URL=http://petstore:8080 -e SWAGGER_BASE_
PATH=/v2 --name petstore swaggerapi/petstore
docker pull tenable/was-scanner:latest
docker run -v $(pwd):/scanner -t -e WAS_MODE=cicd -e ACCESS_
KEY=${ACCESS_KEY} -e SECRET_KEY=${SECRET_KEY} --link petstore tenable/was-
scanner:latest
workflows:
was-workflow:
jobs:
- build-run-scan
l Azure
l GitHub
l GitLab
l Jenkins
- 59 -
l Be able to deploy your app to an integration environment available to your GitHub build agent,
or run it directly on the build agent for testing.
- 60 -
Example integrations for CI/CD tools:
l Atlassian Bamboo
l CircleCI
l GitHub
l GitLab
l Jenkins
stages:
- build
build-run-scan:
stage: build
image: docker
services:
- docker:dind
script:
- docker pull swaggerapi/petstore
- docker run -d -e SWAGGER_URL=http://petstore:8080 -e SWAGGER_BASE_
PATH=/v2 --name petstore swaggerapi/petstore
- docker pull tenable/was-scanner:latest
- 61 -
- docker run -v $(pwd):/scanner -t -e WAS_MODE=cicd -e ACCESS_KEY=${ACCESS_
KEY} -e SECRET_KEY=${SECRET_KEY} --link petstore tenable/was-scanner:latest
l Azure
l CircleCI
l GitHub
l Jenkins
pipeline {
agent any
stages {
stage('build-run-scan') {
environment {
ACCESS_KEY = credentials('ACCESS_KEY')
SECRET_KEY = credentials('SECRET_KEY')
}
steps {
- 62 -
sh '''
docker pull swaggerapi/petstore
docker run -d -e SWAGGER_URL=http://petstore:8080 -e SWAGGER_BASE_
PATH=/v2 --name petstore swaggerapi/petstore
docker pull tenable/was-scanner:latest
docker run -v $(pwd):/scanner -t -e WAS_MODE=cicd -e ACCESS_
KEY=${ACCESS_KEY} -e SECRET_KEY=${SECRET_KEY} --link petstore tenable/was-
scanner:latest
'''
}
}
}
post {
always {
sh '''
docker rm $(docker stop $(docker ps -a -q --filter
ancestor="tenable/was-scanner:latest" --format="{{.ID}}")) || true
docker rm $(docker stop $(docker ps -a -q --filter
ancestor="swaggerapi/petstore" --format="{{.ID}}")) || true
docker system prune -f --volumes
'''
archiveArtifacts 'scanner.log'
publishHTML([allowMissing: false, alwaysLinkToLastBuild: false,
keepAll: true, reportDir: '', reportFiles: 'tenable_was_scan.html',
reportName: 'WAS Report'])
cleanWs()
}
}
}
- 63 -
l Atlassian Bamboo
l Azure
l CircleCI
l GitHub
l GitLab
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
- 64 -
Tenable Web App Scanning Dashboard
The default Web Applications Scanning dashboard shows the data that Tenable Web App Scanning
collects.
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Did You Know? Web Application Exposure: The average exposure score for all applications across WAS
customers is 460.
Tenable Web App Scanning uses several metrics to help you assess your risk:
l Overall Score
l Remediation
l Prevention
- 65 -
The following tables describe the sections and widgets shown in the Global Applications Health
section of the Web Applications Scanning dashboard. You can view details about the data in a
widget by clicking the widget. The Global Applications Health widget in the left panel shows
information for Total Apps, Vulnerabilities, and Unscanned applications:
Overall Score
The outer circle of the dashboard ring chart tracks the Asset Exposure Score (AES) of four of your
scanned applications and a small Other segment of the remaining applications. You can click this
segment to see the next four of your applications and their related details. Each segment's color
changes along with the current AES score. The center of the dashboard ring chart shows your
overall Cyber Exposure Score (CES) score and the color changes along with your current CES grade.
For more information on your application details, see Findings.
Tip: Dashboard Ring Chart The inner circle represents the overall score across all applications (CES), while
the outer ring represents individual application scores (AES). While the inner circle may appear healthy, you
may have an unhealthy application appear in the outer ring.
Widget Description
Overall Score The number of findings Tenable Web App Scanning has discovered.
Tenable Web App Scanning categorizes the findings by severity (Critical
and High).
- 66 -
Widget Description
Scanned
Tenable Web App Scanning calculates AES based on the current ACR (Tenable-provided) and the
VPRs associated with the application.
Low 0 to 349
Note: Asset Exposure Score (AES) is only available in Tenable Web App Scanning for customers with a valid
Lumin license.
- 67 -
l You have (xyz amount) application vulnerabilities
Note:Tenable Web App Scanning only shows four items in the list. The first two always show the two
highest severity risks applications available. The last two contributing factor items are always present in
the dashboard.
Remediation
Remediation metrics help with addressing and resolving critical vulnerabilities and unauthenticated
scans across your web applications.
Widget Description
Fix Critical The number of findings Tenable Web App Scanning has discovered.
Vulnerabilities Tenable Web App Scanning categorizes the findings by severity (Critical
and High).
Fix OWASP Top The number of non-authenticated scans in the past 90 days.
10 Vulnerabilities
Prevention
- 68 -
Prevention metrics help with early identification and mitigation of potential vulnerabilities from
unscanned applications and total findings in your scanned applications.
Widget Description
Widget Description
Findings Number of findings Tenable Web App Scanning has discovered. Tenable
Web App Scanning categorizes the findings by severity (Critical and High).
OWASP Top 10
This chart shows the vulnerabilities discovered by Tenable Web App Scanning that appear in the
latest Open Web Application Security Project (OWASP) Top 10 Most Critical Web Application
Security Risks document.
- 69 -
Next Steps
To view scores and details of specific applications, see the following pages:
l Scanned Applications
l Discovered Applications
Scanned Applications
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
On the Applications page, you can drill down to view only your Scanned applications. While on the
Scanned applications tab, you can also export your scanned application assets. For more
information, see Export Applications.
- 70 -
1. In the upper-left corner, click the button.
The Applications page appears. By default, the Scanned tab is visible and applications
visualizations are shown.
3. In the scanned applications table, you can perform any, or all, of the following actions by
clicking the button:
You can view basic information about your scanned applications in the following table.
Filter Description
Application ID The UUID of the asset where a scan detected the finding. This value is
unique to Tenable Web App Scanning.
Created Date The time and date when Tenable Vulnerability Management created the
asset record.
First Seen The date when a scan first found the vulnerability on an application.
IPv4 Address The IPv4 address for the affected asset. You can add up to 256
IP addresses to this filter.
Last The date and time of the last authenticated scan run against the asset.
Authenticated An authenticated scan that only uses discovery plugins updates the Last
Scan Authenticated Scan field, but not the Last Licensed Scan field.
- 71 -
Last Licensed The time and date of the last scan that identified the asset as licensed.
Scan For more information about licensed assets, see License Information.
Last Scanned The date and time at which the asset was last observed as part of a scan.
Last Seen The date when a scan last found the vulnerability on an asset.
Licensed Specifies whether the asset is included in the asset count for the Tenable
Web App Scanning instance.
Name The asset identifier that Tenable Web App Scanning assigns based on the
presence of certain asset attributes in the following order:
2. NetBIOS Name
3. FQDN
4. IPv6 address
5. IPv4 address
For example, if scans identify a NetBIOS name and an IPv4 address for an
asset, the NetBIOS name appears as the Asset Name.
Operating System The operating system that a scan identified as installed on the asset.
Source The source of the scan that identified the asset. Possible values are:
l AWS Connector
l Azure Connector
l GCP Connector
l Qualys Connector
- 72 -
SSL/TLS Specifies whether the application on which the asset is hosted uses
SSL/TLS public-key encryption.
Tags Asset tags, entered in pairs of category and value (for example
Network: Headquarters). This includes the space after the colon (:). If
there is a comma in the tag name, insert a backslash (\) before the
comma. If your tag name includes double quotation marks (" "), use the
UUID instead. You can add a maximum of 100 tags.
Updated Date The time and date when a user last updated the asset.
Discovered Applications
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
On the Applications page, you can drill down to view only your Discovered applications.
- 73 -
To view your discovered applications:
The Applications page appears. By default, the Scanned tab is visible and applications
visualizations are shown.
4. In the discovered applications assets table, you can perform any, or all, of the following
actions by clicking the button:
l Create a Scan.
You can view basic information about your discovered applications in the following table.
Column Description
Application ID The UUID of the asset where a scan detected the vulnerability. This
value is unique to Tenable Web App Scanning.
Created Date The time and date when Tenable Vulnerability Management created
the asset record.
DNS (FQDN) (ASM) The fully qualified domain name of the asset host.
First Seen The date when a scan first found the vulnerability on an
application.
- 74 -
Host Name The hostname for the asset.
Last Seen The date when a scan last found the vulnerability on an asset.
Licensed Specifies whether the asset is included in the asset count for
Tenable Web App Scanning.
Name The asset name. Tenable Web App Scanning assigns this identifier
based on the presence of certain asset attributes in the following
order:
2. NetBIOS Name
3. FQDN
4. IPv6 address
5. IPv4 address
Source The source of the scan that identified the asset. Possible values
are:
- 75 -
l WAS (Tenable Web App Scanning)
l AWS Connector
l Azure Connector
l GCP Connector
l Qualys Connector
Tags Asset tags, entered in pairs of category and value (for example
Network: Headquarters). This includes the space after the colon (:).
If there is a comma in the tag name, insert a backslash (\) before
the comma. If your tag name includes double quotation marks (" "),
use the UUID instead. You can add a maximum of 100 tags.
Updated Date The time and date when a user last updated the asset.
On the Applications page, you can export assets in .csv or .json format. You can customize the
asset exports that you create. You can schedule exports, send them to a particular email address,
and set them to age out.
- 76 -
2. In the left navigation plane, click Applications.
3. On the left side, select the checkbox next to the assets to export. You can select up to 200
assets. If you need to export more than 200 assets, select all assets.
Format Description
Note: If your .csv export file includes a cell that begins with any
of the following characters (=, +, -, @), Tenable Web App Scanning
automatically inputs a single quote (') at the beginning of the cell.
For more information, see the related knowledge base article.
.json A .json file that contains a nested list of assets. Tenable Web App
Scanning does not include empty fields in the .json file.
c. (Optional) In the Configurations section, select the checkboxes next to the fields to
include. To view only selected fields, click View Selected.
Note: If you modify your field selections, Tenable Web App Scanning retains them
as default the next time you export from the Assets page.
d. (Optional) In the Expiration box, type the number of days before the export file ages out.
- 77 -
7. (Optional) Turn on the Schedule toggle to set a schedule for your export:
a. In the Start Date and Time section, select the date and time for the schedule to start.
Note: When you schedule an export with filters that do not specify a certain date, those filters
update the export as time passes. For example, if you schedule an export for assets that were
Last Seen after March 15, 2023, Tenable Web App Scanning increases the export count every
time it discovers more assets.
c. In the Repeat drop-down box, select how often you want the export to repeat.
d. In the Repeat Ends drop-down box, select the date when you want the schedule to end.
If you select Never, the schedule repeats until you modify or delete the export schedule.
8. (Optional) Enable the Email Notification toggle to send email notifications on completion of
the export:
a. In the Add Recipients box, type the email addresses to which you want to send a
notification.
b. In the Password box, type a password for the export file. Share this password with the
recipients to allow them to download the file.
9. Click Export.
Depending on the size of the export, Tenable Web App Scanning may take several minutes to
finish processing the export. When processing completes, Tenable Web App Scanning
downloads the export file to your computer.
If you close the Export window before the download completes, you can access your file in Settings
> Exports.
- 78 -
2. In the left navigation window, click Applications.
Format Description
Note: If your .csv export file includes a cell that begins with any
of the following characters (=, +, -, @), Tenable Web App Scanning
automatically inputs a single quote (') at the beginning of the cell.
For more information, see the related knowledge base article.
.json A .json file that contains a nested list of assets. Tenable Web App
Scanning does not include empty fields in the .json file.
c. (Optional) In the Configurations section, select the checkboxes next to the fields to
include. To view only selected fields, click View Selected.
Note: If you modify your field selections, Tenable Web App Scanning retains them
as default the next time you export from the Assets page.
d. (Optional) In the Expiration box, type the number of days before the export file ages out.
6. (Optional) Turn on the Schedule toggle to set a schedule for your export:
a. In the Start Date and Time section, select the date and time for the schedule to start.
Note: When you schedule an export with filters that do not specify a certain date, those filters
update the export as time passes. For example, if you schedule an export for assets that were
- 79 -
Last Seen after March 15, 2023, Tenable Web App Scanning increases the export count every
time it discovers more assets.
c. In the Repeat drop-down box, select how often you want the export to repeat.
d. In the Repeat Ends drop-down box, select the date on which you want the schedule to
end. If you select Never, the schedule repeats until you modify or delete the export
schedule.
7. (Optional) Turn on the Email Notification toggle to send email notifications on completion of
the export:
a. In the Add Recipients box, type the email addresses to which you want to send a
notification.
b. In the Password box, type a password for the export file. Share this password with the
recipients to allow them to download the file.
8. Click Export.
Tenable Vulnerability Management downloads the export file to your computer. If you close
the Export window before the download completes, you can access your file in Settings >
Exports.
Note: You can export all findings for an asset from the Findings tab of the Details page. For more
information, see Export Findings.
Delete Assets
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
When you delete an asset, Tenable Web App Scanning deletes the asset from the default view of
the assets table, deletes vulnerability data associated with the asset, and stops matching scan
results to the asset.
- 80 -
1. In the upper-left corner, click the button.
Location Action
b. In the assets table, in the row for the asset you want to delete,
click the button.
A menu appears.
c. Click Delete.
Note: Tenable Web App Scanning limits application deletion to 1,000 records at a time in the Applications
table. If you select more than the 1,000 record limit (through individual selections or the Select All
- 81 -
Applications function), the action button appears in the table's toolbar.
3. In the applications table, click the check box next to each asset you want to delete.
The action bar appears at the bottom of the pagetop of the table.
- 82 -
In the Applications section, you can filter your organization's applications and findings on the
Scanned and Discovered pages. For a list of available filters, see Discovered Applications or
Scanned Applications.
To optimize performance, Tenable limits the number of Findings filters that you can apply to 18 and the
number of Asset filters that you can apply to 35.
The Applications page appears. By default, the Scanned tab is visible and applications
visualizations are shown.
A drop-down box appears with the current filters as shown in the following image:
- 83 -
Tip: You can use the arrow keys to navigate the filter drop-down box and press the Enter key to
select an option.
4. In the drop-down box, select the AND or OR conditions or type them in the text box.
5. In the drop-down box, select a filter or type its name in the text box.
6. In the drop-down box, select one of the following operators or type it in the text box.
Note: If you want to filter on a value that starts with (') or ("), or includes (*) or (,), then you must wrap
the value in quotation marks (").
Operator Description
exists Filters for items for which the selected filter exists.
does not Filters for items for which the selected filter does not exist.
exist
is not equal Filters for items that do not include the filter value.
to
is greater Filters for items with a value greater than the specified filter value. If you
than want to include the value you specify in the filter, then use the is greater
than or equal to operator.
is greater
than or
equal to
is less than Filters for items with a value less than the specified filter value. If you
want to include the value you specify in the filter, then use the is less
is less than
than or equal to operator.
or equal to
within last Filters for items with a date within a number of hours, days, months, or
years before today. Type a number, then select a unit of time.
- 84 -
Operator Description
after Filters for items with a date after the specified filter value.
before Filters for items with a date before the specified filter value.
older than Filters for items with a date more than a number of hours, days, months,
or years before today. Type a number, then select a unit of time.
between Filters for items with a date between two specified dates.
contains Filters for items that contain the specified filter value.
does not Filters for items that do not contain the specified filter value.
contain
l Begin or end with – Filters for values that begin or end with text you
specify. For example, to find all values that begin with "1", type 1*. To
find all values that end in "1", type *1.
l Contains –Filters for values that contain text you specify. For
example, to find all values with a "1" between the first and last
characters, type *1*.
7. In the drop-down box, select a filter value or type one in the text box.
Tip: Some text filters support the character (*) as a wildcard to stand in for a section of
text in the filter value. For example, if you want the filter to include all values that end in 1,
type *1. If you want the filter to include all values that begin with 1, type 1*.
- 85 -
You can also use the wildcard operator to filter for values that contain certain text. For
example, if you want the filter to include all values with a 1 somewhere between the first
and last characters, type *1*.
l To add multiple filters, press Space and then select another condition, operator, filter,
and value.
l To remove one filter, click the button on the right side of the filter.
l To remove all filters, click the button in the right corner of the text box.
9. Click Apply.
10. (Optional) Save the filters to access later or share with other team members.
Tip: Tenable Web App Scanning runs Findings searches in the background so that you can navigate
away from the Findings page and return when a complex search is complete. You can also Cancel a
search. Finally, Tenable Web App Scanning caches your most recent search for 30 minutes, notes
the date and time in the top toolbar, and saves the state of the Findings page for your next visit.
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
- 86 -
4. In the applications table, click the row for the application for which you want to see details.
- 87 -
Tenable Web App Scanning Findings
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
The Findings page provides insight into your organization's vulnerability findings, and the
applications on which Tenable Web App Scanning identified the finding. A finding is a single
instance of a vulnerability appearing on an application, identified uniquely by plugin ID, port, and
protocol.
The Findings page contains a list view of web application findings identified, organized by findings
type. You can drill down to view findings for one of the following findings types. On the Findings
page, you can drill down to view only vulnerability findings for your web application vulnerabilities.
The Findings page appears, showing a table that lists your findings.
3. In the Findings table, you can perform any, or all, of the following actions by clicking the
button:
You can view basic information about your web application vulnerability findings in the following
table. Some column options that you can display are hidden by default. You must add them to your
display by selecting the Columns drop-down button and checking any additional options.
- 88 -
Column Description
Application ID The UUID of the asset where a scan detected the finding. This value is
unique to Tenable Web App Scanning.
Application The name of the application where the scanner detected the vulnerability.
Name This value is unique to Tenable Web App Scanning.
CVSSv2 Base The CVSSv2 base score (intrinsic and fundamental characteristics of a
Score vulnerability that are constant over time and user environments).
First Seen The date when a scan first found the vulnerability on an application.
ID The UUID of the application where a scan detected the vulnerability. This
value is unique to Tenable Web App Scanning.
IPv4 Address The IPv4 address for the affected asset. You can add up to 256 IP addresses
to this filter.
Last Seen The date when a scan last found the vulnerability on an asset.
Last Updated The date when a scan last found the vulnerability on an application.
This column appears in the table by default.
Name The name of the plugin that identified the vulnerability detected in the
finding.
Plugin ID The ID of the plugin that identified the vulnerability detected in the finding.
Severity The vulnerability's CVSS-based severity. For more information, see CVSS vs.
VPR.
- 89 -
State The state of the vulnerability.
Tags A unique filter that searches tag (category: value) pairs. When you type a tag
value, you must use the category: value syntax, including the space after the
colon (:). You can use commas (,) to separate values. If there is a comma in
the tag name, insert a backslash (\) before the comma. You can add a
maximum of 100 tags.
Note: If your tag name includes double quotation marks (" "), you must use the
UUID instead.
VPR The Vulnerability Priority Rating Tenable calculated for the vulnerability.
On the Findings page, you can click a Tenable Web App Scanning vulnerability finding to view basic
details about the finding in the preview panel.
The Findings page appears, showing a table that lists your findings.
3. In the findings table, click the row for the finding for which you want to see details.
4. (Optional) In the upper-right corner, turn on Include Info Severity to list findings with info-
- 90 -
level severity. This option is off by default. For more information on severity level, see
Vulnerability Severity Indicators.
The following tables describe the information that appears in each option:
Section Description
l Name — The name of the affected application. You can click the link
in the name to view details about the affected application on the Web
Application Asset Details page.
l First Seen — The date on which a scan first found the vulnerability on
the affected application.
l Last Seen — The date on which a scan last found the vulnerability on
the affected application.
Solution A brief summary of how you can remediate the vulnerability detected in the
finding. Only appears if an official solution is available.
See Also Links to external websites that contain helpful information about the
vulnerability detected in the finding.
Vulnerability Information about the vulnerability that the plugin identified, including:
Properties
l Severity — The severity of the vulnerability.
l Exploited With — The most common ways that the vulnerability may
be exploited.
l Vuln Published — The date when the vulnerability definition was first
published (for example, the date that the CVE was published).
- 91 -
for the vulnerability.
Discovery Information about when Tenable Web App Scanning first discovered the
vulnerability, including:
l First Seen — The date when a scan first found the vulnerability on an
application.
l Last Seen — The date when a scan last found the vulnerability on an
application.
l Age — The number of days since a scan first found the vulnerability
on an application in your network.
VPR Key Drivers VPR Key Drivers are the vulnerability and threat intelligence attributes that
were significant factors in the calculation of the VPR:
l Threat Sources — A list of all sources (e.g., social media, dark web,
etc.) where threat events (vulnerability and exploit activity) were
observed in recent weeks.
Plugin Details Information about the plugin that detected the vulnerability detected in the
finding, including:
- 92 -
l Plugin ID — The ID of the plugin that identified the vulnerability
detected in the finding.
l Publication Date — The date on which the plugin that identified the
vulnerability was published.
l Modification Date — The date on which the plugin was last modified.
Risk Information about the relative risk that the vulnerability presents to the
Information affected asset, including:
Note: Some CVSS score types may not be available for a particular plugin ID.
l Risk Factor — The CVSS-based risk factor associated with the plugin.
l Risk Modified — Indicates any action applied to modify the risk for the
plugin. Can be Accept or Recast.
Vulnerability Details
- 93 -
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
The Scans page appears, showing a table that lists your scans.
3. In the scans table, click the row for the scan for which you want to see details.
4. In the vulnerabilities table, click the row for the vulnerability for which you want to see details.
The Vulnerability Details page for vulnerabilities contains the following sections.
Section Description
Solution A brief summary of how you can remediate the vulnerability detected in
the finding. Only appears if an official solution is available.
See Also Links to websites that contain helpful information about the
vulnerability detected in the finding.
Plugin Details Information about the plugin that detected the vulnerability, including:
- 94 -
l Type — The general type of plugin check (for example, local or
remote).
Risk Information Information about the relative risk that the vulnerability presents to the
affected asset, including:
Note: Some CVSS score types may not be available for a particular plugin
ID.
- 95 -
l STIG Severity — A vulnerability's severity rating based on the
Department of Defense's Security Technical Implementation
Guide (STIG).
Export Findings
On the Findings page, you can export findings in .csv or .json format. You can customize the
exports that you create. You can schedule exports, send them to a particular email address, and set
them to age out.
3. On the left side, select the check box next to the findings to export. You can select up to 200
findings. If you need to export more than 200 findings, select all findings.
- 96 -
Format Description
Note: If your .csv export file includes a cell that begins with any of the
following characters (=, +, -, @), Tenable Web App Scanning automatically
inputs a single quote (') at the beginning of the cell. For more information,
see the related knowledge base article.
c. (Optional) In the Configurations section, select the checkboxes next to the fields to
include in the export. To view only selected fields, click View Selected.
Note: If you modify your field selections, Tenable Web App Scanning retains them
as the default and applies them the next time you export from the Findings page.
d. (Optional) In the Expiration box, type the number of days before the export file ages out.
6. (Optional) Turn on the Schedule toggle to set a schedule for your export:
a. In the Start Date and Time section, select the date and time for the schedule to start.
c. In the Repeat drop-down box, select how often you want the export to repeat.
d. In the Repeat Ends drop-down box, select the date when you want the schedule to end.
If you select Never, the schedule repeats until you modify or delete the export schedule.
7. (Optional) Enable the Email Notification toggle to send email notifications on completion of
the export:
a. In the Add Recipients box, type the email addresses to which you want to send a
notification.
b. In the Password box, type a password for the export file. Share this password with the
recipients to allow them to download the file.
8. Click Export.
- 97 -
Depending on the size of the export, Tenable Web App Scanning may take several minutes to
finish processing the export. When processing completes, Tenable Web App Scanning
downloads the export file to your computer.
If you close the Export plane before the download completes, you can access your file in Settings >
Exports.
Format Description
Note: If your .csv export file includes a cell that begins with any of the
following characters (=, +, -, @), Tenable Vulnerability Management
automatically inputs a single quote (') at the beginning of the cell. For
more information, see the related knowledge base article.
- 98 -
.json A .json file that contains a nested list of findings. Tenable Web App
Scanning does not include empty fields in the .json file.
c. (Optional) In the Configurations section, select the checkboxes next to the fields to
include. To view only selected fields, click View Selected.
Note: If you modify your field selections, Tenable Web App Scanning retains them
as default the next time you export from the Findings page.
d. (Optional) In the Expiration box, type the number of days before the export file ages out.
6. (Optional) Turn on the Schedule toggle to set a schedule for your export:
a. In the Start Date and Time section, select the date and time for the schedule to start.
c. In the Repeat drop-down box, select how often you want the export to repeat.
d. In the Repeat Ends drop-down box, select the date on which you want the schedule to
end. If you select Never, the schedule repeats until you modify or delete the export
schedule
7. (Optional) Turn on the Email Notification toggle to send email notifications on completion of
the export:
a. In the Add Recipients box, type the email addresses to which you want to send a
notification.
b. In the Password box, type a password for the export file. Share this password with the
recipients to allow them to download the file.
8. Click Export.
Tenable Web App Scanning downloads the export file to your computer. If you close the
Export plane before the download completes, you can access your file in Settings > Exports.
Note: It is not possible to generate a report from WAS Findings using more than 20 filters.
- 99 -
To create a report from the Findings page:
Scope Action
- 100 -
for a single l In the Actions column, click the button in the row for the
vulnerability vulnerability for which you want to create a report.
7. (Optional) In the Name box, type a new name for the report.
Report Type
l In the Start Date and Time box, select when to schedule the report. The default is
the current date and time.
l In the Time Zone box, select the required time zone or retain the default timezone.
- 101 -
l In the Repeat drop-down box, select frequency of report generation: Daily,
Weekly, Monthly, Custom, or Does not repeat. The default is Daily.
l In the Repeat Ends drop-down box, select when you want the scheduling to end:
On or Never. If you select On, specify a date in the End Date box for when you
want the report scheduling to end.
l In the Add Recipients box, type the email addresses of the recipients to whom you
want to send the report.
Tenable Web App Scanning schedules the report and displays a confirmation message.
Tenable Web App Scanning generates the report. In the notification message, you can click
the Report Results link and view the new report on the Report Results page. The new report
appears highlighted.
On the Findings page or the Finding Details page, you can create a remediation scan to run a
follow-up scan against existing scan results. Remediation scans allow you to validate whether your
vulnerability remediation actions on the scan targets have been successful. If a remediation scan
cannot identify a vulnerability on targets where the vulnerability was previously identified, the
system changes the status of the vulnerability to Fixed.
- 102 -
3. In the row, click the button.
(Optional) You can also access the Launch Remediation Scan button in the Findings
Details of a finding you select.
Note: If your original scan configuration was for a multi-target scan, Tenable attempts to
determine the correct target for remediation, but Tenable recommends that you double
check the target and confirm.
Note: The configuration page displays the same scan template settings used to create the
original scan except for three items: A file under Crawl Scripts is created and used by the
remediation scan process. The Elements to Audit section under Assessment which
displays aspects of the plugin to be remediated. The configured plugins are also different,
as only the plugin and related dependencies are enabled.
6. Click Save to save the scan setup, or click Save and Run to launch the scan.
Note: You may get an error displaying the note "Could not reproduce vulnerability page for
remediation." This scan note indicates that the scanner could not replicate the page seen
in the vulnerability data. To remediate this vulnerability, try rerunning the original scan.
What to do next:
l In the Remediation Scans folder on the Scans page, do one of the following:
o Edit the scan configuration.
o Launch the scan.
- 103 -
l Once the scan completes:
l Verify that the finding does not appear in your completed remediation scan by
clicking on it and reviewing the list of findings.
l Verify that the status for the selected vulnerabilities is now Fixed on the assets
that the remediation scan targeted.
These are plugins for which remediation scanning is not meaningful, or not currently supported.
- 104 -
Session Cookies Detected 112798
- 105 -
HTTP/2 Cleartext Upgrade Support Detected 114219
Screenshot 98138
- 106 -
Cookie Authentication Failed 98140
A full crawl of the application is performed for these plugins rather than the specific vulnerability
page replicated. It may take longer for this form of remediation scan to run.
- 107 -
Magento Administration Panel Login Form Bruteforced 113117
- 108 -
Missing Subresource Integrity 98647
Note: If a rule is targeted by IP address, that rule applies to the specified IP in each network in which it is
found. For more information, see Networks in the Tenable Vulnerability Management User Guide.
3. In the row for the finding to create a rule for, click the button.
4. Click Recast.
- 109 -
a. New Severity – Select the desired severity level for the vulnerability.
b. Targets – Select All to target all assets or Custom to specify targets that you want the
rule to run against.
Note: If you set the Targets drop-down to All, a warning appears indicating that this option
may override existing rules.
c. Target Hosts – Type one or more custom targets for the rule, if necessary. You can type
a comma-separated list that includes any combination of IP addresses, IP ranges, CIDR,
and hostnames.
Caution: You can only specify 1000 comma-separated custom entries. If you want to target a
larger number of custom entries, create multiple rules.
d. (Optional) Expires – Select when you want the rule to age out.
e. (Optional) Comments – Type a description of the rule. This option is only visible when the
rule is modified.
6. Click Save.
Tenable Web App Scanning starts applying the rule to existing findings. This process may take
some time, depending on the system load and the number of matching findings. Tenable Web
App Scanning updates your dashboards, where a label appears to indicate how many
instances of affected findings were recast.
Note: A recast rule does not affect the historical results of a scan.
3. In the row for the finding to create a rule for, click the button.
- 110 -
A drop-down menu appears.
4. Click Accept.
b. Target Hosts – Type one or more custom targets for the rule, if necessary. You can type
a comma-separated list that includes any combination of IP addresses, IP ranges, CIDR,
and hostnames.
Caution: You can only specify 1000 comma-separated custom entries. If you want to target a
larger number of custom entries, create multiple rules.
c. (Optional) Expires – Select when you want the rule to age out.
d. (Optional) Comments – Type a description of the rule. This option is only visible when the
rule is modified.
7. Click Save.
Tenable Web App Scanning starts applying the rule to existing findings. This process may take
some time, depending on the system load and the number of matching findings.
- 111 -
The Tenable Web App Scanning interface uses different icons for each severity category and
accepted or recasted status. For more information on recasting, see Create Recast Rules in
Findings.
Vulnerability States
Tenable assigns a vulnerability state to all vulnerabilities detected on your network. You can track
and filter by vulnerability state to see the detection, resolution, and reappearance of vulnerabilities
over time.
- 112 -
Vulnerability State Tracking Now Available As of January 2024, new, or additional scans run on your
assets with existing vulnerabilities may result in remediated vulnerabilities. Users can expect to see this
change in the Tenable Web App Scanning and the Tenable Vulnerability Management Explore workbench.
While no action is required, Tenable recommends you run one or more scans to see these updates.
Note: This feature is currently not available in Tenable Web App Scanning FedRAMP Moderate.
Note: If you filter vulnerabilities using the Active state, Tenable Web App Scanning also returns
vulnerabilities in the New state. For filtering purposes, New is a sub-category of Active.
Vulnerability
Visibility Description
State
New Visible in On the Explore page, New indicates that Tenable Web
dashboards App Scanning detected the vulnerability one time.
Active Visible in On the Explore page, Active indicates that Tenable Web
dashboards App Scanning detected the vulnerability more than one
time.
- 113 -
Vulnerability
Visibility Description
State
state until:
Findings Filters
On the Findings page, you can view analytics.
Column Description
Application ID The UUID of the asset where a scan detected the finding. This value is
unique to Tenable Web App Scanning.
Application The name of the application where the scanner detected the vulnerability.
Name This value is unique to Tenable Web App Scanning.
CVSSv2 Base The CVSSv2 base score (intrinsic and fundamental characteristics of a
Score vulnerability that are constant over time and user environments).
First Seen The date when a scan first found the vulnerability on an application.
IPv4 Address The IPv4 address for the affected asset. You can add up to 256 IP addresses
to this filter.
Last Seen The date when a scan last found the vulnerability on an asset.
Last Updated The date when a scan last found the vulnerability on an application.
This column appears in the table by default.
- 114 -
Plugin Name The name of the plugin that identified the vulnerability detected in the
finding.
Plugin ID The ID of the plugin that identified the vulnerability detected in the finding.
Severity The vulnerability's CVSS-based severity. For more information, see CVSS vs.
VPR.
Tags A unique filter that searches tag (category: value) pairs. When you type a tag
value, you must use the category: value syntax, including the space after the
colon (:). You can use commas (,) to separate values. If there is a comma in
the tag name, insert a backslash (\) before the comma. You can add a
maximum of 100 tags.
Note: If your tag name includes double quotation marks (" "), you must use the
UUID instead.
On the Findings page, you can group your vulnerability findings by specific attributes.
Note: When using the Group By feature, you can only export up to five findings at one time.
- 115 -
1. In the upper-left corner, click the button.
The Findings page appears, showing a table that lists your findings. By default, Group by None
is active
3. (Optional) To analyze web application vulnerability findings, click the Web Application
Findings tab.
Note: To optimize performance, Tenable limits the number of filters you can apply to any Explore >
Findings or Assets views (including Group By tables) to seven.
a. At the top of the Web Application Findings table, next to Group By, click one of the
following attributes by which to group your findings.
Note: By default, the None group by setting is active, so your findings display ungrouped.
l Asset — The unique name for the web application associated with the affected
asset.
l Plugin — The ID of the web application resource type (for example, a resource
group or virtual machine).
The web application findings table appears with your findings grouped by the selected
attribute.
Note: The details that appear in the table vary based on the attribute you select to group your
findings.
Column Description
- 116 -
Asset
Asset Name The name of the asset where a scan detected the
vulnerability. This value is unique to Tenable Vulnerability
Management.
Last Seen The date and time when a scan last found the vulnerability
on the asset.
Actions The actions you can perform with each set of grouped
findings.
Plugin
CVSSv2 Base Score The CVSSv2 base score (intrinsic and fundamental
characteristics of a vulnerability that are constant over
- 117 -
time and user environments).
Actions The actions you can perform with each set of grouped
findings.
5. (Optional) Refine the table data. For more information, see Tenable Web App Scanning Tables.
6. (Optional) To group by another attribute, next to Group By, click another attribute.
- 118 -
Tenable Web App Scanning Scan Workflow
Configure web application scans to collect data about your web applications for analysis. This
overview walks you through the main steps you need to create, configure, launch, and manage
Tenable Web App Scanning scans. Depending on your organization, one person may perform all of
the steps, or several people may share the steps.
Vulnerability State Tracking Now Available As of August 2023, new or additional scans run on your assets
with existing vulnerabilities may result in remediated vulnerabilities. Users can expect to see this change in
the Tenable Web App Scanning and the Tenable Vulnerability Management Explore workbench. While no
action is required, Tenable recommends you run one or more scans to see these updates.
Did You Know? Scanning: 65% of WAS customers prefer to run a Quick Scan.
My Scans
The My Scans page shows your total number of scans and visualization widgets for several
categories of scan statuses: Never Run, Canceled, Aborted, Completed. These visualizations can
be hidden, and unhidden, by clicking the Hide Visualizations (or Show Visualizations) button. For
more information, see Scan Status.
- 119 -
Tip: My Scans Ring Chart You can click on a segment of the ring chart to filter by that status. To deselect
a segment, click on the selected segment a second time.
3. On your My Scans page, you can perform any, or all, of the following actions to your scan by
clicking the button:
l Edit
l Launch
l Move
l Copy
l Trash
Note: Not all scan actions are available for all scans in your list. For example, a scan that is tagged
as imported only has Move and Trash actions.
Next steps:
l Create and Launch a Scan
- 120 -
Required Tenable Web App Scanning User Role: Scan Operator, Standard, Scan Manager, or
Administrator
Vulnerability State Tracking Now Available As of August 2023, new or additional scans run on your assets
with existing vulnerabilities may result in remediated vulnerabilities. Users can expect to see this change in
the Tenable Web App Scanning and the Tenable Vulnerability Management Explore workbench. While no
action is required, Tenable recommends you run one or more scans to see these updates.
a. In the scans table, click the button for the scan you want to launch.
The scan launches and the Status column updates to reflect the status of the
scan.
a. In the scans table, select one or more check boxes next to the scans you want to
launch.
The scans launch and the respective Status columns update to reflect the
statuses of the scans.
- 121 -
l To create and launch a new scan without a scan template:
a. In the upper-right corner of the page, click the Create Scan button.
The Create Scan page appears. By default, the Scans tab is active.
b. Enter your scan information and click Save to save the scan setup, or click Save
and Run to launch the scan.
a. In the upper-right corner of the page, click the Create Scan button.
The Create Scan page appears. By default, the Scans tab is active.
c. Select a template from the list. For more information on scan templates, see
Tenable-Provided Tenable Web App Scanning Templates.
l To create and launch a new scan with a previously created User Template:
a. In the upper-right corner of the page, click the Create Scan button.
The Create Scan page appears. By default, the Scans tab is active.
c. Select a template from the list. For more information on scan templates, see
Tenable-Provided Tenable Web App Scanning Templates.
4. Enter your scan information and click Save to save the scan setup, or click Save and Run to
launch the scan.
- 122 -
Note: When you launch a scan, the time the scanner takes to complete the scan varies depending on
the system load. To prevent lengthy scan times, avoid launching an excessive number of scans
simultaneously. Excessive numbers of concurrent scans may exhaust the system's scanning
capacity. If necessary, Tenable Web App Scanning automatically staggers concurrent scans to
ensure consistent scanning performance.
Note: Tenable Web App Scanning aborts scans that remain in pending status for more
than four hours. If Tenable Web App Scanning aborts a scan, modify your scan schedules
to reduce the number of overlapping scans. If you still have issues, contact Tenable
Support.
Did You Know? Scanning: 65% of WAS customers prefer to run a Quick Scan.
Scan Types
Scan
Types Description
Duration
Basic Scan Normal scan that crawls the entire application and Under an
discovers up to 85% of vulnerabilities. This scan focuses on hour
the misconfigurations and the component vulnerabilities.
Standard Scan Comprehensive scan that crawls the entire application and A few hours
discovers all known vulnerabilities. This scan focuses on the
misconfigurations, the component vulnerabilities, and the
common generic vulnerabilities.
Custom Scan Control all settings and choose the plugins you want to run. Variable
- 123 -
Note: Each scan type (and scan template) supports families of plugins and individual plugins. For more
information, see View Your Scan Plugins.
In an existing scan, you can add new user or group permissions or update existing permissions.
To add permissions:
2. In the left navigation plane, in the Web App Scanning section, click Scans.
Note: If your Tenable Web App Scanning license expires, your web application scans no longer
appear in the scans table.
3. In the scans table, hover over the row for the scan for which you want to set permissions.
- 124 -
6. In the Add Users or Groups drop-down box, select user name or group with whom you want to
share the scan.
The user name or group appears in the list of users below the drop-down box.
Tip: If you being typing the name of the user name or group in the drop-down box, Tenable Web App
Scanning displays a list of options that match your text.
7. Next to the user or group name, in the drop-down box, select the permissions you want to
apply to the user or group.
8. Click Add.
The user or group name appears under the User Permissions section, along with the
permissions you selected.
9. Click Save.
Note: You cannot update permissions for the user that owns the scan.
2. In the left navigation plane, in the Web App Scanning section, click Scans.
Note: If your Tenable Web App Scanning license expires, your web application scans no longer
appear in the scans table.
- 125 -
3. In the scans table, hover over the row corresponding to the scan for which you want to set
permissions.
Action Steps
Update permissions for a In the drop-down box next to the user or group name,
user or group select the permissions you want to apply.
6. Click Save.
Required Tenable Web App Scanning User Role: Scan Manager or Administrator
The settings you can configure in a Tenable Web App Scanning scan or user-defined scan template
depend on the Tenable-provided scan template type. For more information, see Tenable Web App
Scanning Scan Template Settings.
- 126 -
2. In the left navigation plane, click Scans.
3. In the list, click the button for the scan you want to edit.
Note: Specifying this token speeds up the scan by allowing the scanner to skip token verification.
Only available while you are editing an existing scan. For more information, see Advanced Settings.
7. Click Save.
Required Tenable Web App Scanning User Role: Scan Operator, Standard, Scan Manager, or
Administrator
Note: When you launch a scan, the time the scanner takes to complete the scan varies depending on the
system load. To prevent lengthy scan times, avoid launching an excessive number of scans simultaneously.
- 127 -
Excessive numbers of concurrent scans may exhaust the system's scanning capacity. If necessary, Tenable
Web App Scanning automatically staggers concurrent scans to ensure consistent scanning performance.
In Tenable Web App Scanning, you can create discovery, assessment, and API scans using scan
templates. For general information about templates and settings, see Scan Templates and Settings.
Note: If your Tenable Web App Scanning license ages out, your Tenable Web App Scanning scans no
longer appear in the scans table.
3. Click the Create Scan button in the upper right-hand corner of the page.
5. In the Settings section of the Create a Scan - API Scan page, populate the following minimum
required settings:
Note: While not required, Tenable recommends putting all scans on a repeating schedule. For more
information about Tenable Web App Scanning Scan schedules, see Schedule.
l Name
l Scanner
l Target
6. In the Scope section, add the OpenAPI (Swagger) file for the API you are scanning in one of
the following ways:
- 128 -
Note: The RESTful API file should be OpenAPI Specification (v2 or v3) compliant and represented in
either JSON or YAML format.
2. Enter the URL of your OpenAPI (Swagger) file in the text box.
Note: Attaching an OpenAPI (Swagger) file larger than 1 MB to an API scan, results in an error
message. For more information on this limit, see the Knowledge Article. For more information
on Swagger specification files. see OpenAPI (Swagger) Specification.
7. (Optional) Enter any URLs that you want to exclude from your scan in the Regex for excluded
URLs textbox.
Note: When unselected, the scanner attempts to audit the URL for which the response is in the
binary format. Therefore the scanner cannot read the URL, increasing web application detection
surface, but also causing longer scan times.
9. Click Save.
Tenable Vulnerability Management returns to the list of configured Tenable Web App Scanning
scans.
10. To launch the scan, click the button in the Actions column for the scan that needs to be run
and select Launch.
11. When the scan has been completed, click the scan to view the results.
- 129 -
Note: Tenable Web App Scanning aborts scans that remain in pending status for more than four
hours. If Tenable Web App Scanning aborts a scan, modify your scan schedules to reduce the
number of overlapping scans. If you still have issues, contact Tenable Support.
You can configure these settings in individual scans or in user-defined templates from which you
create individual scans.
l If you configure a setting in a user-defined template, that setting applies to any scans you
create based on that user-defined template.
l You base a user-defined template on a Tenable-provided template. Most of the settings are
identical to the settings you can configure in an individual scan that uses the same Tenable-
provided template.
However, certain Basic settings are unique to creating a user-defined template, and do not
appear when configuring an individual scan. For more information, see User-Defined
Templates.
l You can configure certain settings in a user-defined template, but cannot modify those
settings in an individual scan based on a user-defined template. If you want to modify these
settings for individual scans, create individual scans based on a Tenable-provided template
instead.
Tenable Web App Scanning scan settings are organized into the following categories:
- 130 -
l Scope Settings in Tenable Web App Scanning Scans
l If you configure Credentials in a user-defined template, other users can override these
settings by adding scan-specific or managed credentials to scans based on the template.
Note: Each scan type (and template) supports families of plugins and individual plugins. For more
information, see View Your Scan Plugins.
Template Description
API A scan that checks an API for vulnerabilities. This scan analyzes RESTful APIs
described via an OpenAPI (Swagger) specification (file upload or URL of the file
location). File attachment size is limited to 1 MB.
Tip: If the API you want to scan requires keys or a token for authentication, you
can add the expected custom headers in the Advanced settings in the HTTP
Settings section.
Note: Attaching an OpenAPI (Swagger) file larger than 1 MB to an API scan, results
in an error message. For more information on this limit, see the Knowledge Article.
For more information on Swagger specification files. see OpenAPI (Swagger)
Specification.
Config Audit A high-level scan that analyzes HTTP security headers and other externally
- 131 -
facing configurations on a web application to determine if the application is
compliant with common security industry standards.
If you create a scan using the Config Audit scan template, Tenable Web App
Scanning analyzes your web application only for plugins related to security
industry standards compliance.
Log4Shell Detects the Log4Shell vulnerability (CVE-2021-44228) in Apache Log4j via local
checks.
Overview A high-level preliminary scan that determines which URLs in a web application
Tenable Web App Scanning scans by default.
The Overview scan template does not analyze the web application for active
vulnerabilities. Therefore, this scan template does not offer as many plugin
family options as the Scan template.
PCI A scan that assesses web applications for compliance with Payment Card
Industry Data Security Standards (PCI DSS) for Tenable PCI ASV. (This scan
also allows you to view and edit the Request Redirect Limit. The default value
for this limit is 3.)
Quick Scan A high-level scan similar to the Config Audit scan template that analyzes
HTTP security headers and other externally facing configurations on a web
application to determine if the application is compliant with common security
industry standards. Does not include scheduling.
If you create a scan using the Quick Scan scan template, Tenable Web App
Scanning analyzes your web application only for plugins related to security
industry standards compliance.
Scan A comprehensive scan that assesses web applications for a wide range of
vulnerabilities.
The Scan template provides plugin family options for all active web
application plugins.
If you create a scan using the Scan template, Tenable Web App Scanning
analyzes your web application for all plugins that the scanner checks for when
- 132 -
you create a scan using the Config Audit, Overview, or SSL TLS templates, as
well as additional plugins to detect specific vulnerabilities.
A scan run with this scan template provides a more detailed assessment of a
web application and take longer to complete that other Tenable Web App
Scanning scans.
SSL TLS A scan to determine if a web application uses SSL/TLS public-key encryption
and, if so, how the encryption is configured.
When you create a scan using the SSL TLS template, Tenable Web App
Scanning analyzes your web application only for plugins related to SSL/TLS
implementation. The scanner does not crawl URLs or assess individual pages
for vulnerabilities.
The settings you can configure in a scan or in a user-defined scan template depend on the Tenable-
provided scan template type you use to create your scan.
User-Defined Templates
Tenable provides a variety of scan templates for specific scanning purposes. If you want to
customize a Tenable-provided scan template and share it with other users, you can create a user-
defined scan template.
You can create, edit, copy, export, or delete user-defined Tenable Web App Scanning templates
from the Scans page. You can also export Tenable Web App Scanning scan templates.
Click a template to view or edit its settings and parameters, or use the following procedures to
manage your user-defined templates:
You can create user-defined scan templates to save and share custom scan settings with other
Tenable Web App Scanning users.
- 133 -
When you define a scan template, Tenable Web App Scanning assigns you owner permissions for
the scan template. You can share the scan template by assigning template permissions to other
users, but only you can delete the scan template.
4. In the upper-right corner of the page, click the Create Template button.
5. Click the tile for the template you want to use as the base for your user-defined scan
template.
- 134 -
6. Configure the scan.
Tab Action
Settings Configure the settings available in the scan template. For more
information, see Basic Settings in Tenable Web App Scanning Scans.
Scope Specify the URLs and file types that you want to include in or exclude
from your scan. For more information, see Scope Settings in Tenable
Web App Scanning Scans.
- 135 -
The Scan Templates page appears.
4. In the scan templates table, In the row of the scan you want to edit, click the button.
5. Select Edit.
Tab Action
Settings Configure the settings available in the scan template. For more
information, see Basic Settings in Tenable Web App Scanning Scans.
Scope Specify the URLs and file types that you want to include in or exclude
from your scan. For more information, see Scope Settings in Tenable
Web App Scanning Scans.
7. Click Save.
Tenable Web App Scanning saves the user-defined scan template and adds it to the list of
templates on the Scan Templates page.
When you copy a user-defined scan template, Tenable Web App Scanning assigns you owner
permissions for the copy. You can share the copy by assigning template permissions to other users,
but only you can delete the copied scan template.
- 136 -
To copy a user-defined scan template:
4. In the scan templates table, In the row of the scan you want to edit, click the button.
A menu appears.
A Template copied message appears. Tenable Web App Scanning creates a copy of the scan
template with Copy of prepended to the name and assigns you owner permissions for the
copy. The copy appears in the scan templates table.
If you delete a user-defined scan template, Tenable Vulnerability Management deletes it from all
user accounts.
- 137 -
3. In the upper-right corner of the page, click the Scan Templates.
l
Select a single scan template:
a. In the scans table, roll over the scan you want to launch.
A menu appears.
l
Select multiple scan templates:
a. In the scan templates table, select the check box for each scan template you want
to delete.
The action bar appears at the bottom of the pagetop of the table.
Tenable Web App Scanning deletes the user-defined scan template or templates you
selected.
To view your current scan plugins, use one of the following two methods:
- 138 -
1. Go to the Web App Scanning Plugin Families page.
3. In the Add Filter box, select Product, and choose Web App Scanning.
4. In the Add Filter box, select WAS Scan Template, then select the template you want.
- 139 -
1. Go to the Web App Scanning Plugin Families page.
- 140 -
3. Select a specific plugin ID to display the plugin output that displays as seen in a report.
- 141 -
4. In the upper-right of the plugin information, view the Plugin Details and the scan types and
templates listed next to Scan Template:
- 142 -
Note: You can configure Plugin settings when you create a scan or user-defined scan template and select
the API, Overview, (Basic) Scan, Standard Scan, or Custom template or scan type. For more information,
see Plugin Settings in Tenable Web App Scanning Scans.
You can configure settings when you create a scan or user-defined scan template and select any
scan type. For more information, see Scan Templates.
Tip: If you want to save your settings configurations and apply them to other scans, you can create and
configure a user-defined scan template.
l General
l Schedule
l Notifications
l User Permissions
l Data Sharing
General
The general settings for a scan.
Default
Setting Description Required
Value
Target none Specifies the URL for the target you want to Yes
- 143 -
Default
Setting Description Required
Value
Folder My Scans Specifies the folder where the scan appears Yes
after being saved.
Schedule
The schedule settings for the scan.
- 144 -
Note: If you create a user-defined scan template, your schedule settings are not saved to the scan
template. Configure the schedule settings each time you create a new scan.
Click the toggle to enable the schedule and view the remaining
Schedule settings.
Note: The frequency with which you scan your target depends on
several factors (e.g., how often you update your web application,
the content your web application contains, etc.). For most web
applications, Tenable recommends at least monthly scans.
- 145 -
Setting Default Description
Starts varies Specifies the exact date and time at which a scan launches.
The starting date defaults to the date you create the scan. The
starting time is the next hour interval, displayed in 24-hour
clock format. For example, if you create your scan on October
31, 2019 at 9:12 PM, the default starting date and time is
10/31/2019 and 22:00.
Timezone varies The time zone of the value set for Starts.
Notifications
The notification settings for a scan.
Default
Setting Description
Value
User Permissions
- 146 -
Share the scan or user-defined scan template with other users by setting permissions for users. For
more information on adding or editing user permissions, see Set Scan Permissions.
Permission Description
No Access (Default) Users set to this permission cannot interact with the
scan in any way.
Can View Users set to this permission can view the results of the scan.
Can Control In addition to the tasks allowed by Can View, users with this
permission can launch and stop a scan. They cannot view or edit
the scan configuration or delete the scan.
Can Configure In addition to the tasks allowed by Can Control, users with this
permission can view the scan configuration and modify any
setting for the scan except scan ownership. They can also delete
the scan.
Data Sharing
Setting Default Value Description
Scan Show in Specifies whether the results of the scan should be kept
Results dashboard private or appear on your Dashboard and Findings pages.
When set to Keep private, the scan results Last Seen dates do
not update and you must access the scan directly to view the
results.
You can configure Advanced settings when you create a scan or user-defined scan template using
any Tenable-provided scan template. However, the Overview and Scan template types have more
configurable Advanced settings than the Config Audit and SSL TLS template types. For more
information, see Scan Templates.
The Advanced Settings options allow you to control the efficiency and performance of the scan.
- 147 -
l General
l HTTP Settings
l Screen Settings
l Limits
l Selenium Settings
l Performance Settings
l Session Settings
General
You can configure General options in scans and user-defined scan templates based on the
Overview and Scan templates only.
Target Scan 08:00:00 Specifies the maximum duration the scanner runs a scan
Max Time job runs before stopping, displayed in hours, minutes, and
(HH:MM:SS) seconds.
Maximum 08:00:00 Specifies the maximum duration the scan remains in the
Queue Time Queued state, displayed in hours, minutes, and seconds.
(HH:MM:SS)
Note: The maximum duration you can set is 48:00:00 (hours:
minutes: seconds).
Enable Debug disabled Specifies whether the scanner attaches available debug
logging for this logs from plugins to the vulnerability output of this scan.
scan
Debug Flags disabled (Only visible when you enable the Enable Debug logging for
this scan feature). Allows you to specify key and value
pairs, provided by support, for debugging.
- 148 -
HTTP Settings
These settings specify the user-agent you want the scanner to identify and the HTTP response
headers you want the scanner to include in requests to the web application.
You can configure Crawl Settings options in scans and user-defined scan templates based on any
Tenable-provided scan template.
Use a disabled Specifies whether you want the scanner to use a user-agent
different header other than Chrome when sending an HTTP request.
User Agent
to identify
scanner
User Agent Chrome's Specifies the name of the user-agent header you want the
user-agent scanner to use when sending an HTTP request.
You can configure this option only after you select the Use a
different User Agent to identify scanner checkbox.
Note: Not all requests from a scanner are guaranteed to have the
User Agent sent.
Add Scan ID disabled Specifies whether the scanner adds an additional X-Tenable-
HTTP Was-Scan-Id header (set with the scan ID) to all HTTP
- 149 -
Header requests sent to the target, which allows you to identify scan
jobs in web server logs and modify your scan configurations to
secure your sites.
Custom none Specifies the custom headers you want to inject into each
Headers HTTP request, in request and response format.
Screen Settings
You can configure Screen Settings options in scans and user-defined scan templates based on the
Overview and Scan templates only.
Screen 1600 Specifies the screen width, in pixels, of the browser embedded in
Width the scanner.
Screen 1200 Specifies the screen height, in pixels, of the browser embedded
Height in the scanner.
Limits
You can configure Limits options in scans and user-defined scan templates based on the Overview
and Scan templates only.
Number of URLS 10000 Specifies the maximum number of URLs the scanner
to Crawl and attempts to crawl.
Browse
- 150 -
Path Directory 10 Specifies the maximum number of sub-directories
Depth the scanner crawls.
Max Response 500000 Specifies the maximum load size of a page, in bytes,
Size which the scanner analyzes.
Selenium Settings
These settings specify how the scanner behaves when it attempts to authenticate to a web
application using your recorded Selenium credentials.
Configure these options if you configured your scan to authenticate to the web application with
Selenium credentials. For more information see Credentials in Tenable Web App Scanning Scans.
You can configure Selenium Settings options in scans and user-defined scan templates based on
the Overview and Scan templates only.
Page 30000 Specifies the time (in milliseconds) the scanner waits for the
Rendering page to render.
Delay
Command 500 Specifies the time (in milliseconds) the scanner waits after
Execution processing a command before proceeding to the next
- 151 -
Delay command.
Script 5000 Specifies the time (in milliseconds) the scanner waits for all
Completion commands to render new content to finish processing.
Delay
Performance Settings
Setting Default Description
Slow down the scan disabled Specifies whether the scanner throttles the scan in
when network the event of network congestion.
congestion is
detected
Network Timeout (In 30 Specifies the time, in seconds, the scanner waits for
Seconds) a response from a host before aborting the scan,
unless otherwise specified in a plugin.
Browser Timeout (In 60 Specifies the time, in seconds, the scanner waits for
Seconds) a response from a browser before aborting the scan,
unless otherwise specified in a plugin.
- 152 -
Timeout Threshold 100 Specifies the number of consecutive timeouts
allowed before the scanner aborts the scan.
Session Settings
Specifying these tokens speeds up the scan by allowing the scanner to skip token verification.
Session Settings are only available when you are editing an existing scan.
Token
Default Description
Type
Cookie None Name of your application's authentication cookie for the scanner
to use.
Header None Name of your application's authentication header for the scanner
to use.
You can configure Scope settings when you create a scan or user-defined scan template and select
the Overview or Scan template type. For more information, see Scan Templates.
Tip: If you want to save your settings configurations and apply them to other scans, you can create and
configure a user-defined scan template.
l Crawl Scripts
l Scan Inclusion
l Scan Exclusion
Crawl Scripts
- 153 -
Selenium scripts you want to add to your scan to enable the scanner to analyze pages with complex
access logic.
Setting Description
Add File Hyperlink that allows you to add one or more recorded Selenium script files to
your scan.
Setting Description
File Selecting this option in the drop-down list enables you to add one or more
OpenAPI (v2 or v3) specification files as a file upload. The specification files
should be represented in either JSON or YAML format.
URL Selecting this option in the drop-down list enables you to add one or more
OpenAPI (v2 or v3) specification files by entering the URL of the file location. The
specification files should be represented in either JSON or YAML format.
Scan Inclusion
The URLs you want the scanner to include, along with how you want the scanner to crawl them.
List of URLs none A list of any URLs you want to ensure the
scanner analyzes, in addition to the target URL
you specified in the Basic settings.
- 154 -
Setting Default Description
Specify how the scanner Crawl all Specifies the limits you want the scanner to
handles URLs found during URLs adhere to as it crawls URLs.
the application crawl detected
Select one of the following:
Scan Exclusion
The attributes of URLs you want the scanner to exclude from your scan.
Default
Setting Description
Value
Regex for logout Text box option in which you can specify a regex pattern
Excluded URLs that the scanner can look for in URLs to exclude from the
scan. You can specify multiple regex patterns separated by
new lines.
- 155 -
Default
Setting Description
Value
File Extensions js, css, png, Text box option in which you can specify the file types you
to Exclude jpeg, gif, want the scanner to exclude from the scan.
pdf, csv,
Separate each file type with a comma.
svn-base,
svg, jpg, Note: Excluding certain file extensions may be useful as the
ico, woff, scanner may not realize something is not a web page and
woff2, exe, attempt to scan it, as if it actually is a web page. This wastes
time and slows down the scan. You can add additional file
msi, zip
extensions if you know you use them, and are certain they do
not need to be scanned. For example, Tenable includes
different image extensions by default: .png, .jpeg, etc.
Decompose not Check box option that allows you to specify whether you
Paths selected want the scanner to break down each URL identified during
the scan into additional URLs, based on directory path level.
l www.example.com/dir1/dir2/dir3
l www.example.com/dir1/dir2
l www.example.com/dir1
- 156 -
Default
Setting Description
Value
Exclude selected Check box option that allows you to specify whether you
Binaries want the scanner to audit URLs with responses in binary
format.
Miscellaneous
Setting Description
Deduplicate Checkbox option that allows you to specify whether you want the scanner to
Similar Pages ignore pages in situations when similar pages have already been audited.
l Scan Type
l Credentials Bruteforcing
l Elements to Audit
- 157 -
l Optional
Scan Type
These settings specify the intensity of the assessment you want the scanner to perform.
- 158 -
Default
Setting Description
Value
Detection Most Drop-down box that allows you to choose from the following
Level Detected options to specify which pages you want the scanner to
Pages crawl.
Credentials Bruteforcing
The Credentials Bruteforcing setting is available only for the Scan template.
File Upload Disabled When enabled, the scanner attempts to detect file upload
Assessment vulnerabilities based on generic attacks against relevant
- 159 -
Setting Default Description
Elements to Audit
These settings specify the elements in your web application that you want the scanner to analyze
for vulnerabilities.
Links and Query Checks for vulnerabilities in links and their parameters.
String Parameters
Path Parameters Assesses path parameters. Path parameters are used in URL rewrite to
identify the object of the action within the URL. For example, scanId is
a path parameter for the following URL, used to identify the scan to
display results:
http://example.com/scan/scanId/results
- 160 -
Setting Scanner Action
(XML)
UI Forms Checks input and button groups associated with JavaScript code.
Note: With UI Forms, Tenable Web App Scanning takes the inputs on the
page, and any buttons, and creates form-like elements from them (UI
Forms). For each button, Tenable Web App Scanning creates a UIForm
element with inputs that are all the inputs on the page.
Note: UI Inputs are when there is an input that responds to an event. For
example, after typing in the input in a search bar, the search bar responds to
an "onEnter" event which loads the next page. So, Tenable Web App
Scanningcreates a UIInput element to audit this vector as well.
Optional
Setting Default Description
URL for None Specifies a file on a remote host that Tenable Web App
Remote Scanning can use to test for a Remote File Inclusion (RFI)
Inclusion vulnerability.
If the scanner cannot reach the internet, the scanner uses this
internally-hosted file for more accurate RFI testing.
Note: If you do not specify a file, Tenable Web App Scanning uses a
safe, Tenable-hosted file for RFI testing.
- 161 -
Note: When the scanner is deciding whether to exclude an element based on an attribute value, it
performs an equality check. So, if you want to exclude any element with css class foo, the scanner
excludes an element that has class="foo", but not an element that has class="foo bar".
You can add exclusions by clicking the button and selecting Text Contents or CSS Attribute.
You can configure Report settings when you create a scan or user-defined scan template using the
Tenable-provided scan template, PCI. For more information, see Scan Templates.
Default
Setting Description Required
Value
(Tenable PCI None Text box that allows you to enter a list of No
- 162 -
Default
Setting Description Required
Value
Required Tenable Web App Scanning User Role: Scan Manager or Administrator
Configure Plugin settings to specify the plugins and plugin families you want the scanner to use as
it scans your web application.
When you create and launch a scan, Tenable Web App Scanning uses plugins in various plugin
families, each designed to identify certain types of finding or vulnerabilities, to analyze your web
application. Tenable Web App Scanning uses the 98000-98999 and 112290-117290 plugin ID ranges
for scanning. For more information about Tenable Web App Scanning plugin families, see the
Tenable Web App ScanningTenable Web App Scanning Plugin Families site.
Note: Tenable Web App Scanning displays only the first detected 25 instances of an individual plugin per
scan in your scan results. If you see 25 instances of a single plugin in your scan results, Tenable
recommends taking remediation steps to address the corresponding vulnerability and then rescanning
your target.
You can configure Plugin settings when you create a scan or user-defined scan template and select
the API, Overview, (Basic) Scan, Standard Scan, or Custom template or scan type. For more
information, see View Your Scan Plugins.
Tip: If you want to save your settings configurations and apply them to other scans, you can create and
configure a user-defined scan template.
l All enabled
l Plugins table
All Enabled
- 163 -
A toggle you can click to enable or disable all plugins simultaneously.
Plugins Table
Column Description Actions
Name Specifies the plugin family to which the grouped l View the name of each
plugins belong. plugin family.
Total Specifies the number of plugins in the plugin l View the number of
family. plugins in the family.
Status Toggle that allows you to specify if you want the l Click the Status toggle
scanner to use the plugins in the plugin family to disable the plugins
to analyze your target. in the plugin family.
l (Optional) To enable a
disabled plugin family,
click the Status
toggle.
In the plugins table, you can view details about or disable individual plugins.
1. In the table, click the row for the family that contains a plugin you want to view.
A plugin family details plane appears, displaying the name, ID, and status for each plugin in the
family in a paginated list.
- 164 -
2. (Optional) To locate a specific plugin, in the Search box, type the name or ID.
1. In the table, click the row for the family that contains the plugin you want to disable.
A plugin family details plane appears, displaying the name, ID, and status for each plugin in the
family in a paginated list.
2. (Optional) To locate a specific plugin, in the Search box, type the name or ID.
3. In the Status column, select the check box next to the plugin you want to disable.
5. Click Save.
Scans in Tenable Web App Scanning use managed credentials. Managed credentials allow you to
store credential settings centrally in a credential manager. You can then add those credential
settings to multiple scan configurations instead of configuring credential settings for each
individual scan.
Tenable Web App Scanning scans support credentials in the following authentication types:
- 165 -
Tip: If want to scan an API with the API scan template, and your API requires keys or a token for
authentication, you can add the expected custom headers in the Advanced settings in the HTTP Settings
section.
You can configure credentials settings in Tenable Web App Scanning scans using the following
methods.
Credentials Authentication
Configuration Method
Category Type
HTTP Server – Use the Tenable Web App Scanning user interface
Authentication to manually configure credentials settings in
scans.
Web Application Login Form
Authentication
Cookie
Authentication
API Key Use the Tenable Web App Scanning user interface
to manually configure credentials settings in
Bearer
scans.
Authentication
Client Certificate - Use the Tenable Web App Scanning user interface
Authentication to manually configure credentials settings in
scans.
Required Tenable Web App Scanning User Role: Scan Manager or Administrator
l (Selenium authentication) In the Chrome Web Store, download the Selenium IDE extension, do
one of the following:
- 166 -
o To configure credentials using the Selenium IDE extension, download the Selenium IDE
extension.
o To configure credentials via the Tenable Web App Scanning Chrome Extension,
download the Tenable Web App Scanning Chrome Extension.
2. Click Credentials.
l
Add existing credentials.
The Managed Credentials section of the Select Credential Type plane contains any
credentials where you have Can Use or Can Edit permissions.
a. (Optional) Search for a managed credential in the list by typing your search criteria
in the text box and clicking the button.
b. In the Managed Credentials section, click each managed credential you want to
add.
c. To close the Select Credential Type plane, click the button in the upper-right
corner of the plane.
l
Create new credentials.
a. In the Web Application Authentication section, click the credentials type you want
to create:
- 167 -
l HTTP Server Application
c. (Optional) In the second text box, type a description for the credentials.
Tenable Web App Scanning closes the settings plane and adds the credentials to the
credentials table for the scan.
If you created new credentials, Tenable Web App Scanning adds the credentials to the
credential manager.
Support for Selenium commands in Tenable Web App Scanning is detailed below:
l addSelection l close
l answerOnNextPrompt l debugger
l assert l do
l assertAlert l else
- 168 -
l assertChecked l else if
l assertConfirmation l end
l assertNotChecked l if
l assertNotEditable l repeat if
l assertNotSelectedValue l run
l assertPrompt l store
l chooseCancelOnNextPrompt l times
l chooseOkOnNextConfirmation l while
l click
l clickAt
l doubleClick
l doubleClickAt
l echo
- 169 -
l editContent
l mouseDown
l mouseDownAt
l mouseMoveAt
l mouseOut
l mouseOver
l mouseUp
l mouseUpAt
l open
l pause
l removeSelection
l runScript
l select
l selectFrame
l sendKeys
l setSpeed
l setWindowSize
l submit
l type
- 170 -
l uncheck
l verify
l verifyChecked
l verifyEditable
l verifyElementNotPresent
l verifyElementPresent
l verifyNotChecked
l verifyNotEditable
l verifyNotSelectedValue
l verifyNotText
l verifySelectedLabel
l verifySelectedValue
l verifyText
l verifyTitle
l verifyValue
l waitForElementEditable
l waitForElementNotEditable
l waitForElementNotPresent
l waitForElementNotVisible
l waitForElementPresent
l waitForElementVisible
l webdriverAnswerOnNextPrompt
l webdriverAnswerOnVisiblePrompt
l webdriverChooseCancelOnNextConfirmation
- 171 -
l webdriverChooseCancelOnNextPrompt
l webdriverChooseCancelOnVisibleConfirmation
l webdriverChooseCancelOnVisiblePrompt
l webdriverChooseOkOnNextConfirmation
l webdriverChooseOkOnVisibleConfirmation
Option Action
Username Type the username Tenable Web App Scanning uses to authenticate to
the HTTP-based server.
Password Type the password Tenable Web App Scanning uses to authenticate to
the HTTP-based server.
Authentication In the drop-down list, select one of the following authentication types:
Type
l Basic/Digest
l NTLM
l Kerberos
Kerberos Domain (Required when enabling the Kerberos Authentication Type) The realm to
which Kerberos Target Authentication belongs, if applicable.
Key Distribution (Required when enabling the Kerberos Authentication Type) This host
Center (KDC) supplies the session tickets for the user.
Note: Tenable Web App Scanning does not support multiple HTTP authentication types for a single target.
- 172 -
In a Tenable Web App Scanning scan, you can configure one of the following types of Web
Application Authentication credentials:
l Cookie Authentication
l Selenium Authentication
l Bearer Authentication
Tip: If the log in process causes any headers or cookies to be set, the scanner should notice this and
include those in subsequent requests. If this is not happening as you expect, use selenium authentication
and record the log in process into a .side file, then use that in the scan. If you are still experiencing
issues, contact your Tenable representative for support.
Login Page Type the URL of the login page for the web application you want to scan.
Credentials For each field in the target's login form (that is, username, password, and
domain, etc.) complete a credential entry as follows:
a. In the left-hand text box, type the value of the login field's name or
id HTML DOM attribute.
b. In the right-hand text box in the row, type the literal value to insert
in that text field at login.
- 173 -
Tip: To see a text field's name or id HTML DOM attribute, right-click on the
text field and select "Inspect" in either your Firefox or Chrome browser.
Pattern to Verify Type a word, phrase, or regular expression that appears on the website
Successful only if the authentication is successful (for example, Welcome, your
Authentication username!). Note that leading slashes will be escaped and .* is not
required at the beginning or end of the pattern.
Page to Verify Type the URL that Tenable Web App Scanning can continually access to
Active Session validate the authenticated session.
Pattern to Verify Type a word, phrase, or regular expression that appears on the website
Active Session only if the session is still active (for example, Hello, your username.). Note
that leading slashes will be escaped and .* is not required at the
beginning or end of the pattern.
Cookie Authentication
Option Action
a. In the first text box, type the name of the cookie authentication
credentials.
b. In the second text box, type the value of the cookie authentication
credentials.
Page to Verify Type the URL that Tenable Web App Scanning can continually access to
Active Session validate the authenticated session.
Pattern to Verify Type a word, phrase, or regular expression that appears on the website
- 174 -
Active Session only if the session is still active (for example, Hello, your username.). Note
that leading slashes will be escaped and .* is not required at the
beginning or end of the pattern.
Selenium Authentication
Option Action
Page to Verify Type the URL that Tenable Web App Scanning can continually access to
Active Session validate the authenticated session.
Pattern to Verify Type a word, phrase, or regular expression that appears on the website
Active Session only if the session is still active (for example, Hello, your username.). Note
that leading slashes will be escaped and .* is not required at the
beginning or end of the pattern.
- 175 -
a. In the first text box, type the name of the HTTP header.
b. In the second text box, type the value of the HTTP header.
Page to Verify Type the URL that Tenable Web App Scanning can continually access to
Active Session validate the authenticated session.
Pattern to Verify Type a word, phrase, or regular expression that appears on the website
Active Session only if the session is still active (for example, Hello, your username.). Note
that leading slashes will be escaped and .* is not required at the
beginning or end of the pattern.
Bearer Authentication
Option Action
Note: Bearer Token is a part of OAuth. Tenable Web App Scanning supports
OAuth in cases where it is a part of OpenIDConnect and recordable via a
selenium script. Implementations of OAuth that are not a part of
OpenIDConnect are supported only where the token is dynamic, or you craft a
special static (non-dynamic) token for authentication purposes.
Page to Verify Type the URL that Tenable Web App Scanning can continually access to
Active Session validate the authenticated session.
Pattern to Verify Type a word, phrase, or regular expression that appears on the website
Active Session only if the session is still active (for example, Hello, your username.). Note
that leading slashes will be escaped and .* is not required at the
beginning or end of the pattern.
- 176 -
In a Tenable Web App Scanning scan, you can configure Client Certificate Authentication
credentials.
Option Action
Client Certificate The file that contains the PEM-formatted certificate used to
communicate with the host.
Client Certificate The file that contains the PEM-formatted private key for the client
Private Key certificate.
Page to Verify Type the URL that Tenable Web App Scanning can access to validate the
Successful authenticated session.
Authentication
Pattern to Verify Type a word, phrase, or regular expression that appears on the website
Successful only if the authentication is successful (for example, Welcome, your
Authentication username!). Leading slashes will be escaped and .* is not required at the
beginning or end of the pattern.
You can view scan results for web application scans you own or that the scan owners have shared
with you.
- 177 -
3. In the scans table, click the scan where you want to view details.
The Scan Details page appears. By default, this page displays details of the latest run of the
scan.
Section Action
Severity For the scan job currently displayed, view the number of vulnerabilities
summaries with a Critical, High, Medium, or Low vulnerability severity.
Scan Details For the scan job currently displaying, view the following details:
section l Status — The status of the scan.
l Start Time — The start date and time for the scan.
l Template — The scan template you used to configure and run the
scan.
l End Time — The end date and time for the scan.
Vulns by For the scan job currently displayed, view vulnerability data, organized
Plugin tab by plugin.
- 178 -
l Vulnerabilities — The number of vulnerability instances.
Notes tab For the scan job currently displayed, view the scan notes that Tenable
Web App Scanning generates to provide context about your scan's
success and efficiency.
The Notes tab appears and displays scan notes only if the scanner
identifies information during the scan that can help you configure your
scan for more effective results.
- 179 -
improve your overall scan quality.
This tab contains a table listing each time the scan has run. For the
scan run currently displaying in the Scan Details page, Tenable Web
App Scanning adds the label Current to the run. By default, the latest
scan run is labeled Current.
Note: Scan history is unavailable for imported scans and for configured
scans that have not yet run.
l View summary information about each time the scan was run:
l Created At — The start date and time the scan was created.
l Start Time — The start date and time the scan was started
by the scanner.
l End Time — The end date and time the scan was completed.
- 180 -
l View details for a historical scan by clicking a scan job row in the
table.
Tenable Web App Scanning marks the scan job you selected as
Current and updates the Scan Details section to show data for
the selected job.
Scan Status
In Tenable Web App Scanning, depending on its state, scans can have the following status values:
Note: The percentage on the Tenable Web App Scanning scan progress indicator represents the
percentage of completed tasks in the scan. A scan with one task shows 0% progress until the scan
completes.
Tip: For Tenable Web App Scanning scans, you can hover over the scan status to view more status
information in a pop-up window, such as the number of targets scanned and the elapsed or final scan time.
The window shows different information based on the scan's current status.
Status Description
Aborted The scanner did not complete the scan's latest scan job. Tenable Web App
Scanning may abort a scan job because the job was queued without running
for more than four hours, or because Tenable Web App Scanning, or the
scanner, encountered other problems and aborted the scan.
For more information about why Tenable Web App Scanning aborted a scan,
view the scan notes.
Canceled At the user's request, Tenable Web App Scanning successfully stopped the
latest scan job.
Never Run The scan is either empty (the scan is new or has yet to run) or pending
(Tenable Web App Scanning is processing a request to run the scan).
Pending Tenable Web App Scanning has the scan queued to launch.
- 181 -
Status Description
Note: Tenable Web App Scanning aborts scans that remain in Pending
status for more than four hours. If Tenable Web App Scanning aborts
your scan, modify your scan schedules to reduce the number of
overlapping scans. If you still have issues, contact Tenable Support.
Processing The scan has been completed but the results are still being processed. The
scanner is processing vulnerability findings, attachments, notes, and other
metadata.
Stopping The scanner acknowledged the stop request and is in the process of
stopping.
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
When you launch a Tenable Web App Scanning scan, you can view the progress of the scan as it
runs. Because scan progress information is based on historical data, Tenable Web App Scanning
scan progress data appears only for historical scans.
2. After the status changes from Pending to Running, next to the scan status, view the following
scan progress indicators:
Progress Description
- 182 -
Indicator
Percentage The portion of the scan job that the scanner has already completed,
displayed as a percentage of the total estimated scan time.
Estimate The estimated time remaining for the scanner to complete the scan,
displayed in minutes.
Overdue The amount of extra time the scan job is taking compared to previous
scan jobs. This indicator only appears if the scan is running longer than
previous scans.
Progress bar A visual indicator of the time remaining for the scanner to complete
the scan. When the scan is complete or stops for any other reason (for
example, if Tenable Vulnerability Management aborts the scan), the
progress bar disappears.
To view scan progress for a Tenable Web App Scanning scan not in progress, see Scan Status.
Critical Information explaining that the scan may Service Stopped Responding —
have impacted the web application's The scanner aborted the scan
availability or integrity. after encountering too many
consecutive request timeouts. The
The scan note title appears in red.
scan results may be incomplete,
and you should verify that the
target is not corrupted or
unavailable.
- 183 -
scanner sent. You may need to
decrease performance
configurations in the scan
template.
High Information explaining that the scan Scan Crashed — The scan crashed
stopped unexpectedly before the scanner for an unexpected reason. As a
finished analyzing the web application result, the scan results are missing
targets. As a result, the scan did not or incomplete.
sufficiently analyze the web application
for vulnerabilities, and the user should
troubleshoot and re-attempt the scan.
Medium Information explaining why scan results Out of Scope URL — The scanner
are missing or incomplete. The findings did not scan the target URL
usually concern scans that could not be because it matches one of the
started due to configuration errors. The scope exclusion criteria specified
web application is not impacted. in the scan template settings.
Info Information that does not impact the Authentication Detected — The
scan results, but that can help you scanner detected an HTTP server
configure your scan settings more authentication or login form. You
efficiently. can configure your credentials to
- 184 -
The scan note title appears in blue. allow the scanner to access more
pages.
Scan Filters
On the Scans page, you can filter Tenable Web App Scanning scans using Tenable-provided filters.
Filter Description
Last Modified The date on which the scan configuration was last modified.
Date
Last Scanned The date on which the scan was last ran.
Date
Status The status of the scan. For more information about scan statuses, see
Scan Status.
Template The Tenable-provided scan template the scan configuration was based on.
User Template The user-defined scan template the scan configuration was based on.
Column Description
Bugtraq ID The Bugtraq ID for the plugin that identified the vulnerability.
- 185 -
CPE The Common Platform Enumeration (CPE) numbers for vulnerabilities that
the plugin identifies.
CVE The Common Vulnerability and Exposure (CVE) IDs for the vulnerabilities
that the plugin identifies.
CVSSv2 Base The CVSSv2 base score (intrinsic and fundamental characteristics of a
Score vulnerability that are constant over time and user environments).
CVSSv2 Vector The raw CVSSv2 metrics for the vulnerability. For more information, see
CVSSv2 documentation.
CVSSv3 Base The CVSSv3 base score (intrinsic and fundamental characteristics of a
Score vulnerability that are constant over time and user environments).
CVSSv4 Base The CVSSv4 base score (intrinsic and fundamental characteristics of a
Score vulnerability that are constant over time and user environments).
OWASP 2010 The Open Web Application Security Project (OWASP) 2010 category for the
vulnerability targeted by the plugin.
OWASP 2013 The Open Web Application Security Project (OWASP) 2013 category for the
vulnerability targeted by the plugin.
OWASP 2017 The Open Web Application Security Project (OWASP) 2017 category for the
vulnerability targeted by the plugin.
OWASP 2021 The Open Web Application Security Project (OWASP) 2021 category for the
vulnerability targeted by the plugin.
- 186 -
Plugin The description of the Tenable plugin that identified the vulnerability
Description detected in the finding.
Plugin Family The family of the plugin that identified the vulnerability.
Plugin ID The ID of the plugin that identified the vulnerability detected in the finding.
Plugin Name The name of the plugin that identified the audit finding.
Plugin The date on which the plugin that identified the vulnerability was published.
Publication
Date
See Also Links to external websites that contain helpful information about the
vulnerability.
Severity The CVSS score-based severity. For more information, see CVSS Scores vs.
VPR in the Tenable Vulnerability Management User Guide.
This filter appears in the filters plane by default, with Critical, High,
Medium, and Low selected.
Solution A brief summary of how you can remediate the vulnerability detected in the
finding.
WASC The Web Application Security Consortium (WASC) category associated with
the vulnerability targeted by the plugin.
Required Tenable Web App Scanning User Role: Scan Operator, Standard, Scan Manager, or
Administrator
- 187 -
When you copy a scan configuration, Tenable Web App Scanning assigns you owner permissions for
the copy and assigns the copy scan permissions from the original scan.
4. Click Copy.
The Copy to Folder plane appears, which contains a list of your scan folders.
6. Click Copy.
Scan Copied Successfully: Tenable Web App Scanning creates a copy of the scan with Copy
of prepended to the name and assigns you owner permissions for the copy. The copy appears
in the scans table of the folder you selected.
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
- 188 -
Required Scan Permissions: Can View
You can export both imported scan results and results that Tenable Web App Scanning collects
directly from scanners.
Tenable Web App Scanning retains individual scan results until the results are 15 months old.
Note: Filters are not applicable for Tenable Web App Scanning exports, All results will are exported.
Note: For archived scan results (that is, results older than 35 days), the export format is limited to .nessus
and .csv files.
Note: When a scan is actively running, the Export button does not appear in the Tenable Vulnerability
Management interface. Wait until the scan completes, then export the scan results.
3. In the Folders section, click a folder to load the scans you want to view.
The scans table updates to display the scans in the folder you selected.
- 189 -
4. Do one of the following:
Scans table a. In the scans table, roll over the scan you want to export.
A menu appears.
c. Click Export.
Scan Details a. In the scans table, click the scan you want to export.
Supported for
Format Description Archived
Scan Results
HTML A web-based .html file that contains the list of targets, n/a
scan results, and scan notes.
PDF An Adobe .pdf file that contains the list of targets, scan n/a
results, and scan notes.
Nessus A .nessus file in XML format that contains the list of n/a
targets, scan settings defined by the user, and scan
results. Password credentials are stripped so they are
not exported as plain text in the XML.
- 190 -
Note: To learn more about the .nessus file format, see
Nessus File Format.
JSON A .json file that contains the list of targets, scan n/a
settings defined by the user, scan results, and scan
notes. Password credentials are stripped so they are not
exported as plain text in the .json file.
ZIP Returns a .zip file containing debug information for the Yes
specified Tenable Web App Scanning scan. The ZIP file
includes browser console logs, HTTP requests and
responses, and Selenium information if applicable.
6. For Tenable Vulnerability Management scans, if you select the PDF - Custom or HTML -
Custom formats:
l Select either Assets or Plugin from the Group By list, depending on how you want to
group the scan results in the export file.
7. Click Export.
Tenable Vulnerability Management generates the export file. Depending on your browser
settings, your browser may automatically download the export file to your computer, or may
prompt you to confirm the download before continuing.
Required Tenable Web App Scanning User Role: Scan Manager or Administrator
Note: Only cloud-based scans are able to be imported. If a scan target is an internal IP address and the
scanner used is internal, the JSON export cannot be imported back into Tenable Web App Scanning. The
import fails because it attempts to validate the IP address within an internal IP range.
- 191 -
1. In the upper-left corner, click the button.
Note: Only .json file types are supported in Tenable Web App Scanning scan import.
5. Click Open:
The Scans page appears, and the imported scan appears in the scans table.
Note: You can click on the Last Modified row in your scans table so your imported scan appears at
the top of your scans list.
Tenable Web App Scanning begins processing the imported scan results. Once this process is
complete, the imported data appears in the individual scan details and aggregated data views
(such as dashboards). This process can take up to 30 minutes, depending on the size of the
import file.
Tip: If the imported data does not appear in the individual scan results or aggregated data views
after a reasonable processing time, verify that you are assigned adequate permissions for the
imported targets in access groups.
You can move a scan from a default folder to either the My Scans default folder or a custom scan
folder. You can also move a scan from a custom folder to the My Scans default folder or a different
custom folder.
- 192 -
If you move a scan from the All Scans default folder, the scan appears in both the folder you select
and the All Scans folder.
If you move a scan from the My Scans default folder, the scan appears in the custom folder only.
For information about moving a scan to the trash, see Move a Scan to the Trash Folder.
3. In the Folders section, click a folder to load the scans you want to view.
The scans table updates to display the scans in the folder you selected.
4. In the scans table, roll over the scan you want to move.
A menu appears.
The Move to Folder plane appears. This plane contains a list of your scan folders.
Tenable Web App Scanning limits the list to folders that match your search.
8. In the folder list, click the folder where you want to move the scan.
9. Click Move.
Tenable Web App Scanning moves the scan to the selected folder.
- 193 -
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
When you move a shared scan to the Trash folder, Tenable Web App Scanning moves the scan for
your account only. The scan remains in the original folder for all other users who have Can View
permissions or higher for the scan.
Scans moved to the Trash folder also appear in the All Scans folder, marked with the label, Trash.
Note: After you move a scan to the Trash folder, the scan remains in the Trash folder until a user with Can
Configure permissions permanently deletes the scan.
Note:Scheduled scans do not run if they are in the scan owner's Trash folder.
- 194 -
l
Select a single scan:
a. In the scans table, roll over the scan you want to move.
A menu appears.
c. Click Trash.
l
Select multiple scans:
a. In the scans table, select the check box next to each scan you want to move.
The action bar appears at the bottom of the pagetop of the table.
Tenable Web App Scanning moves the scan, or scans, you selected to the Trash folder.
- 195 -
Tenable Web App Scanning Settings
The Settings page allows you to view and manage all of your Tenable Web App Scanning settings
and configurations.
2. Click Settings.
Note: All Settings options are managed directly within Tenable Vulnerability Management. When you
access the Settings section, you are automatically redirected to the Tenable Vulnerability Management
user interface and documentation.
General Settings
Required User Role: Administrator
On the General page, you can configure general settings for your Tenable Web App Scanning
instance.
- 196 -
Here, you can configure the following options:
Severity
By default, Tenable Web App Scanning uses CVSSv2 scores to calculate severity for individual
vulnerability instances. If you want Tenable Web App Scanning to calculate the severity of
vulnerabilities using CVSSv3 scores (when available), you can configure your severity metric setting.
Tip: A vulnerability instance is a single instance of a vulnerability appearing on an asset, identified uniquely
by plugin ID, port, and protocol.
For information about severity and the ranges for CVSSv2 and CVSSv3, see CVSS Scores vs. VPR.
Caution: When changing your CVSS severity metric setting, the new setting is only reflected in new
findings that come into your system. Any existing findings only reflect the previous severity setting (unless
otherwise recasted). For more information on recast rules, see Recast/Accept Rules.
- 197 -
1. On the Severity tab, select the metric that you want Tenable Web App Scanning to use for
severity calculations.
l CVSSv3 — Use CVSSv3 scores, when available, for all severity calculations. Use CVSSv2
only if a CVSSv3 score is not available.
2. Click Save.
3. The system saves your change and begins calculating severity based on your selection.
All vulnerabilities seen before the change retain their severity. After the change, all
vulnerabilities seen during scans receive severities based on your new selection. Because of
this, you could see two sightings of the same vulnerability have two different CVSS scores and
severities.
You can configure Service Level Agreement (SLA) settings to modify how Tenable calculates your
SLA data.
You can view this data in the SLA Progress: Vulnerability Age widget on the Vulnerability
Management Overview dashboard. For more information, see Vulnerability Management Overview.
- 198 -
2. Configure the following options:
l Medium 60
days
- 199 -
l Low 180
days
3. Click Save.
Language
On the General page, you can change the plugin language in your Tenable Web App Scanning
container to English, Japanese, Simplified Chinese, or Traditional Chinese. This setting affects all
users in the container.
- 200 -
4. Click the Language tab.
Tenable Web App Scanning updates the plugin language for your container.
Exports
When you create an export, you can set an expiration delay for the export file up to 30 calendar
days, which is the maximum number of days that Tenable Web App Scanning allows before your
export files expire.
By default, any exports you create in Tenable Web App Scanning have an expiration date of 30 days.
If you want to decrease the number of days that Tenable Web App Scanning allows before your
export files expire, you can configure your default export expiration days.
2. In the Default Expiration box, type the number of days you want to Tenable Web App
Scanning to allow before your exports expire.
Note: Tenable Web App Scanning allows you to set a maximum of 30 calendar days for export
expiration.
- 201 -
Note: You must type the number of days as an integer between 1 and 30.
3. Click Save.
Tenable Web App Scanning saves your settings and updates the number of allowable days
before your exports expire.
Search
Turn on Enable Plugin Output Search to store plugin output data each time you launch a scan. You
can then filter vulnerability findings by plugin output and view that output on dashboards such as
the AI/LLM Dashboard. Once you have enabled this setting, you must launch a scan to start storing
the data.
Caution: You cannot turn off Enable Plugin Output Search once you have turned it on, but the system
automatically turns it off when it goes unused for 35 days.
- 202 -
Email Allow List
In this section, type comma-separated email domains where the system can send export
files, for example, mycompany.com. Once you add domains, users can only send exports to
to those domains. An error appears when users try to email exports to unapproved
domains.
Turn on the Include Subdomains toggle to include email subdomains: for example,
sales.mycompany.com.
To learn more about the export types in Tenable Vulnerability Management, see Exports.
Note: When you turn on Email Allow List, it does not affect scan exports.
My Account
From the My Account page, you can make changes to your own user account.
- 203 -
You can navigate to the My Account page via one of the following methods:
- 204 -
d. Click the My Account tile.
The My Account page appears, where you can view and update your account details.
l To access the My Account page from the top navigation menu of any page:
b. Click My Profile.
Required Tenable Vulnerability Management User Role: Basic, VM Scan Operator, VM Standard, VM Scan
Manager, or Administrator
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
On the My Account page, you can view details about your account, including your log in
details, user role, and the groups and permissions assigned to you.
- 205 -
1. Access the My Account page.
2. On the left side of the page, you can select from the following:
Option Action
- 206 -
l (Optional) Update your basic account information, including
name and email address.
- 207 -
o The objects each permission applies to.
Caution: Any existing API keys are replaced when you click the
Generate button. You must update the applications where the
previous API keys were used.
Caution: Be sure to copy the access and secret keys before you
close the API Keys tab. After you close this tab, you cannot retrieve
the keys from Tenable Web App Scanning.
Note: User accounts expire according to when the Tenable Web App Scanning container they belong to
was created. Tenable controls this setting directly. For more information, contact Tenable Support.
Required Tenable Vulnerability Management User Role: Basic, VM Scan Operator, VM Standard, VM Scan
Manager, or Administrator
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
name@domain
- 208 -
where domain corresponds to a domain approved for your Tenable Web App Scanning
instance.
This email address overrides the email address set as your Username. If you leave this option
empty, Tenable Web App Scanning uses the Username value as your email address.
Note: During initial setup, Tenable configures approved domains for your Tenable Web App Scanning
instance. To add domains to your instance, contact Tenable Support.
4. Click Save.
Required Tenable Vulnerability Management User Role: Basic, VM Scan Operator, VM Standard, VM Scan
Manager, or Administrator
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
You can change the password for your own account as any type of user. The method of changing
your password varies slightly based on the role assigned to your user account.
3. In the New Password box, type a new password. See Tenable Web App Scanning Password
Requirements for more information.
- 209 -
Tenable Web App Scanning saves the new password and terminates any currently active
sessions for your account. Tenable Web App Scanning then prompts you to re-authenticate.
Required Tenable Vulnerability Management User Role: Basic, VM Scan Operator, VM Standard, VM Scan
Manager, or Administrator
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
On the My Account page, you can configure two-factor authentication for your account.
Tip: Administrators can also enforce two-factor authentication for other accounts when creating or editing
a user account.
Note: Before configuring two-factor authentication, check the International Phone Availability list to ensure
you are able to receive text messages from Tenable Web App Scanning.
b. In the Current Password box, type your Tenable Web App Scanning password.
Note: By default, Tenable Web App Scanning treats mobile numbers as U.S. numbers
and prepends the +1 country code. If your mobile phone number is a non-U.S. number,
be sure to prepend the appropriate country code.
d. Click Next.
- 210 -
The Verification Code plane appears and Tenable Web App Scanning sends a text
message with a verification code to the phone number.
e. In the Verification Code box, type the verification code you received.
f. Click Next.
A Two-Factor Setup Successful message appears and Tenable Web App Scanning
applies your settings to your Tenable Web App Scanning account.
b. Click Update.
Note: Once you save the phone number for this configuration, you cannot edit or change the
phone number. You must configure a new authentication setup for any additional phone
numbers you want to use.
b. In the Current Password box, type your Tenable Web App Scanning password.
c. Click Next.
e. In the Verification Code box, type the code provided by your authenticator
application.
- 211 -
Note: If you do not type the correct verification code, Tenable Web App Scanning locks
the QR code. Delete the setup from your authenticator application and scan a new QR
code.
f. Click Next.
A Two-Factor Setup Successful message appears and Tenable Web App Scanning
applies your settings to your Tenable Web App Scanning account.
The My Account page appears, where you can view and update your account
details.
- 212 -
a. Click My Profile.
2. In the Change Password section, in the Current Password box, type your current password.
Tenable Web App Scanning disables two-factor authentication for your account.
Required Tenable Vulnerability Management User Role: Basic, VM Scan Operator, VM Standard, VM Scan
Manager, or Administrator
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
The API keys associated with your user account enable you to access the API for all Tenable Web
App Scanning products for which your organization is licensed.
Note: Tenable Web App Scanning API access and secret keys are required to authenticate with the Tenable
Web App Scanning API.
- 213 -
Note: The API keys associated with your user account enable you to access the API for all Tenable
Vulnerability Management products for which your organization is licensed. You cannot set separate keys
for individual products. For example, if you generate API keys in Tenable Vulnerability Management, this
action also changes the API keys for Tenable Web App Scanning and Tenable Container Security.
Note: Be sure to use one API key per application. Examples include, but are not limited to:
l Tenable Web App Scanning integration
l Third-party integration
l Other custom applications, including those from Tenable Professional Services
The method to generate API keys varies depending on the role assigned to your user account.
Administrators can generate API keys for any user account. For more information, see Generate
Another User's API Keys. Other roles can generate API keys for their own account.
3. Click Generate.
Caution: Any existing API keys are replaced when you click the Generate button. You must update
the applications where the previous API keys were used.
Tenable Web App Scanning generates new access and secret keys, and displays the new keys
in the Custom API Keys section of the page.
Tip: If the Generate button is inactive, contact your administrator to ensure they've enabled
API access for your account. For more information, see Edit a User Account.
- 214 -
Caution: Be sure to copy the access and secret keys before you close the API Keys tab. After you
close this tab, you cannot retrieve the keys from Tenable Web App Scanning.
Required Tenable Vulnerability Management User Role: Basic, VM Scan Operator, VM Standard, VM Scan
Manager, or Administrator
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
Tenable Web App Scanning locks you out if you attempt to log in and fail 5 consecutive times.
Note: If you no longer have access to the email address specified in your account, an administrator for
your Tenable Web App Scanning instance can reset your password instead. If you are unsure which email
address to use, contact your Tenable representative.
Note: A user can be locked out of the user interface but still submit API requests if they are assigned the
appropriate authorizations (api_permitted). For more information, see the Tenable Developer Portal.
1. On the Tenable Web App Scanning login page, click the Forgot your password? link.
2. In the Username box, enter your Tenable Web App Scanning username.
4. Click Send.
Tenable Web App Scanning sends password recovery instructions to the email address
specified in your user account.
5. Reset your password using the instructions in the email message. See Password
Requirements for more information.
License Information
- 215 -
On the License Information page, you can view a complete breakdown of your Tenable products
and how many asset licenses they are using. You can view this information in multiple ways,
including visual overviews by product or time period that enable you to spot trends such as
temporary usage spikes or product misconfigurations.
l Asset License — License usage for all Tenable products in the current container.
Tip: For details on how Tenable licenses work and how assets or resources are licensed in each product,
see Licensing Tenable Products.
Asset License
- 216 -
View information about your Tenable licenses in the Asset License tab, which appears by
default when you open the License Information page.
The Asset License tab shows license usage for products in the current Tenable container.
Details appear in panels, broken down by product. If you have Tenable One, to view its
components, in the bottom-right corner, click Show More.
Section Description
Product Name of the product and the unique identifier for your Tenable container,
summary the date and time of the last update, and a ring chart which summarizes your
asset license usage.
l VM Plugin Set — The version for the product's Nessus plugin set.
l VM Plugin Updated — The date and time the Nessus plugin set was last
updated.
- 217 -
& Trend Tenable One component in a bar chart.
l Usage Over Time – View your asset license use over time in a line chart
where the X-axis is the time period and the Y-axis is the number of
asset licenses used. Filter the chart by time period. For Tenable One,
below the chart, click a component to show or hide it.
Licenses The total number of your Tenable asset licenses allocated to a product.
allocated
Licenses used The total number of Tenable asset licenses used in that product. If you have
Tenable One, this number is the total of all asset licenses used across all
Tenable One components.
Tip: The type of asset you license varies by product. To learn more, see Tenable
One Components.
Overused (Tenable One-only) If any, your license overage—that is, the number of extra
licenses licenses you are using. To learn more, see Tenable Cloud Overage Process.
License ratio If any, the ratio against which the assets in your environment are multiplied
to determine how many Tenable asset licenses you need to purchase. For
example, if you have 1,000 assets to assign to Tenable Identity Exposure,
you will need 500 Tenable asset licenses, since the ratio is 0.5. To learn
more, see Licensing Tenable One.
Tenable The total number of Tenable asset licenses you have assigned to a product,
assets accounting for any ratio.
allocated
Tenable The total number of Tenable asset licenses used by that product, accounting
assets used for any ratio.
Account Details
View your account details in the Account Details tab, which contains information about your
organization and your Tenable products. It is always the same, regardless of which Tenable
container you are using.
- 218 -
Required User Role: Administrator
Section Description
Tenable One Under Active Product Subscriptions, view information about your Tenable
Licenses One licenses, including version, your container's unique ID, your allocated
assets, and your Tenable asset license's start and end dates.
l Assets Allocated — The total number of assets available for all your
Tenable One products.
Tip: Next to a product, click the drop-down > to view information about your
Tenable One components by Product Type, Percent Allocated, Assets Used,
and Assets Allocated.
- 219 -
Note: On-premise products such as Tenable Nessus Agent or Tenable Cloud
Security do not appear here.
Note: A Tenable Security Center license is required for the Tenable Web App Scanning on-premises
version.
- 220 -
To use Tenable Web App Scanning, you purchase licenses based on your organizational needs and
environmental details. Tenable Web App Scanning then assigns those licenses to assets in your
environment: unique fully qualified domain names (FQDNs). If you only scan IP addresses, the
system licenses those instead.
When your environment expands, so does your asset count, so you purchase more licenses to
account for the change. Tenable licenses use progressive pricing, so the more you purchase, the
lower the per-unit price. For prices, contact your Tenable representative.
Tip: To view your current license count and available assets, in the Tenable top navigation bar, click
and then click License Information. To learn more, see License Information Page.
FQDNs are listed as complete URLs, as per the RFC-3986 internet standard. Under this standard,
each FQDN has the following components and format:
hostname.parent-domain.top-level-domain
When you specify a web application target in a scan, Tenable Web App Scanning counts that target
as a separate asset if any component of the FQDN differs from that of another scanned target or
previously scanned asset. Multiple targets with different paths appended to the FQDN count as a
single asset, as long as all components of the FQDNs match.
hostname.parent-domain.top-level-domain/path1
hostname.parent-domain.top-level-domain/path2
hostname.parent-domain.top-level-domain/path2/path3
The following table shows when scan targets are considered to be the same asset and when they
are considered to be separate assets, based on whether or not all the FQDN components match.
- 221 -
Same Asset Separate Assets
l Integration with
Tenable Vulnerability
Management (if owned).
Reclaiming Licenses
When you purchase licenses, your total license count is static for the length of your contract unless
you purchase more licenses. However, Tenable Web App Scanning reclaims licenses under some
conditions. You can also delete assets or set them to age out so that you do not run out of licenses.
The following table explains how Tenable Web App Scanning reclaims licenses.
- 222 -
Asset Type License Reclamation Process
Deleted Tenable Web App Scanning removes deleted assets from the Assets workbench
assets and reclaims their licenses within 24 hours.
Aged out In Settings > Sensors > Networks, if you enable Asset Age Out, Tenable Web
assets App Scanning reclaims assets after they have not been scanned for a period you
specify.
All other Tenable Web App Scanning reclaims all other assets—such as those imported
assets from other products or assets with no age-out setting—after they have not been
scanned for 90 days.
Scenario Result
You scan more assets than are A message appears in Tenable Web App Scanning.
licensed for three consecutive days.
You scan more assets than are A message and warning about reduced functionality
licensed for 15+ days. appears in Tenable Web App Scanning.
You scan more assets than are A message appears in Tenable Web App Scanning;
licensed for 45+ days. export features are disabled.
Tip: Improper scan hygiene or product misconfigurations can cause scan overages, which result in inflated
asset counts. To learn more, see Scan Best Practices.
Expired Licenses
The Tenable Web App Scanning licenses you purchase are valid for the length of your contract. 30
days before your license expires, a warning appears in the user interface. During this renewal
period, work with your Tenable representative to add or remove products or change your license
count.
- 223 -
After your license expires, you can no longer sign in to the Tenable platform.
View the following table to see the features each Tenable Web App Scanning license type supports.
License Matrix
AES/CES/ACR
License
Scores Supported
WAS Only No
Access Control
Required User Role: Administrator
From the Access Control page, you can view and configure the list of users and groups on your
account and the permissions assigned to them.
- 224 -
Users
Topics in this section have been modified to reflect feature updates in Tenable Vulnerability Management
Key Enhancements. For more information, see Tenable Vulnerability Management Key Enhancements.
On the Access Control page, in the Users tab, administrator users can create and manage user
accounts for an organization's resources in Tenable Web App Scanning.
To view users and user data for your Tenable Web App Scanning instance:
3. The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Web App Scanning account.
The Users page displays a table of all Tenable Web App Scanning user accounts. This
documentation refers to that table as the users table.
- 225 -
Users Table
Column Description
Last Login The date on which the user last successfully logged in to the Tenable Web App
Scanning interface.
Last Failed The date on which the user failed to log in to the Tenable Web App Scanning
interface.
Total Failed The total number of failed login attempts for the user.
This number resets when either an administrator or the user resets the
password for the user account.
Last API The date on which the user last generated API keys.
Access
Role The role assigned to the user. For more information, see Roles.
Actions The actions an administrator user can take with the user (e.g. export a user).
On the Users page, you can create an account for a new user.
Tip: Looking for account creation via a SAML IdP? See the SAML documentation.
Note: User accounts expire according to when the Tenable Web App Scanning container they belong to
was created. Tenable controls this setting directly. For more information, contact Tenable Support.
- 226 -
1. In the upper-left corner, click the button.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Web App Scanning account.
Note: To view and configure options in each section, you must select the section in the left menu.
Option Action
General Section
- 227 -
Full Name Type the first and family name of the user.
name@domain
- 228 -
In Tenable Web App Scanning, passwords must be at
least 12 characters long and contain the following:
l An uppercase letter
l A lowercase letter
l A number
l A special character
Role In the drop-down box, select the role that you want to
assign to the user.
- 229 -
Note: If you deselect this option, you cannot
select the MFA option.
User Groups Select the user group or groups to which you want to
assign the user.
- 230 -
Permission Section
7. Click Save.
Note: If you assign permissions to the user, the button appears as Add & Save.
Tenable Web App Scanning lists the new user account on the users table.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Web App Scanning account.
5. In the users table, click the name of the user that you want to edit.
Option Action
- 231 -
Account Settings
Full Name Edit the first and last name of the user.
This email address overrides the email address set in the Username
box. If you leave this option empty, Tenable Web App Scanning uses the
Username value as the user's email address.
l An uppercase letter
l A lowercase letter
l A number
l A special character
Role In the drop-down box, select the role that you want to assign to the
user.
Groups
User Groups Select the user group or groups to which you want to assign the user.
The user inherits the roles and permissions associated with the user
- 232 -
group.
security Select or deselect the available security setting options. When selected,
settings these settings:
Tip: You can select only this setting to create an API-only user
account.
Note: If you deselect this option, you cannot select the MFA option.
Tip: You can configure two-factor authentication for you own account on
the My Account page.
8. Click Save.
On the Access Control page, in the Users tab, you can view a list of all the users on your Tenable
Web App Scanning instance.
To view users and user data for your Tenable Web App Scanning instance:
- 233 -
1. In the upper-left corner, click the button.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Web App Scanning account.
The Users tab appears, containing a table of all Tenable Web App Scanning user accounts on
your Tenable Web App Scanning instance. This documentation refers to that table as the
users table.
Users Table
On the users table, you can view the following information about users on your Tenable Web App
Scanning instance.
Column Description
Last Login The date on which the user last successfully logged in to the Tenable Web App
Scanning interface.
Last Failed The date on which the user failed to log in to the Tenable Web App Scanning
interface.
Total Failed The total number of failed login attempts for the user.
This number resets when either an administrator or the user resets the
password for the user account.
Last API The date on which the user last generated API keys.
- 234 -
Access
Role The role assigned to the user. For more information, see Roles.
Actions The actions an administrator user can take with the user (e.g. export a user).
Password Criteria
l An uppercase letter
l A lowercase letter
l A number
l A special character
Password Expiration
Account Lockout
By default, after 5 failed login attempts, Tenable Web App Scanning locks the user out of their
account. When a user is locked out of their account, they can unlock their own account, or an
administrator can reset their password.
Password History
To change the password for another user's account, you must be an administrator. To change your
own password, see Change Your Password.
- 235 -
1. In the upper-left corner, click the button.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Web App Scanning account.
5. In the users table, click the name of the user that you want to edit.
6. In the New Password box, type a new password. See Password Requirements for more
information.
7. Click Save.
Tenable Web App Scanning saves the new password for the user account.
The following is not supported in Tenable FedRAMP Moderate environments. For more information, see the
Tenable FedRAMP Moderate Product Offering.
As an administrator, you can use the user assist functionality to simulate being logged in as another
account. While assisting a user account, you can perform operations in Tenable Vulnerability
Management as that user without needing to obtain their password or having to log out of your
administrator account.
Note: User Assist is available only for user accounts that have one or both of these authentication settings
enabled:
- 236 -
l Username/Password
l SAML
To enable these security settings, see Edit a User Account.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Web App Scanning account.
5. In the users table, click the check box for the user account you want to assist.
refreshes and displays the default dashboard for the user you are assisting. While you are
assisting the user, displays an overlay at the top of each page with the role of the user you are
assisting.
- 237 -
The API keys associated with your user account enable you to access the API for all Tenable
Vulnerability Management products for which your organization is licensed. These keys must be
used to authenticate with the Tenable Vulnerability Management REST API.
Administrators can generate API keys for any user account. Other roles can generate API keys for
their own accounts. For more information, see Generate API Keys.
Note: The API keys associated with your user account enable you to access the API for all Tenable
Vulnerability Management products for which your organization is licensed. You cannot set separate keys
for individual products. For example, if you generate API keys in Tenable Vulnerability Management, this
action also changes the API keys for Tenable Web App Scanning and Tenable Container Security.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Web App Scanning account.
5. In the users table, click the name of the user that you want to edit.
Caution: Any existing API keys are replaced when you generate new API keys. You must update the
applications where the previous API keys were used.
- 238 -
The Generate API Keys text box appears.
The new access and secret keys for the account appear in the text box.
Caution: Be sure to copy the access and secret keys before you navigate away from the Edit User
page. After you close this page, you cannot retrieve the keys from Tenable Web App Scanning.
Note: A user can be locked out of the user interface but still submit API requests if they are assigned the
appropriate authorizations (api_permitted). For more information, see the Tenable Developer Portal.
l If a user has access to the email address specified in the user account, they can unlock their
own account.
l If a user no longer has access to that email address, another user with administrator
privileges can reset the user's password.
Disabling a user account prevents the user from logging in and prevents their scans from running.
You can enable a disabled user account as described in Enable a User Account.
Important: Disabling a user account does not disable scheduled reports for that user. Additionally, if the
disabled user shared a report with other users, these other users can still generate that report. For more
information, see Reports.
- 239 -
1. In the upper-left corner, click the button.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Web App Scanning account.
l
Select a single user:
a. In the users table, in the row for the user account you want to disable, click the
button.
l
Select multiple users:
a. In the users table, click the check box for each user you want to disable.
The action bar appears at the bottom of the pagetop of the table.
Tenable Web App Scanning disables the selected user or users. In the users table, a disabled
user appears in light gray.
- 240 -
Note: If the user you disable has a session in progress, they may continue to have limited access.
However, once they log out, they cannot log back in.
When you disable a user account, you can enable an account again to restore a user's access.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Web App Scanning account.
- 241 -
a. In the users table, click the check box for each user you want to enable.
The action bar appears at the bottom of the pagetop of the table.
Tenable Web App Scanning enables the selected user or users. In the users table, an enabled
user appears in black.
l Tenable Web App Scanning REST API with API keys. For more information, see Generate
Another User's API Keys.
When you create a new user, all access methods are authorized by default. Depending on your
organization's security policies, you may need to disable certain access methods, for example,
disable username and password login to enforce SSO.
Use the Tenable Web App Scanning Platform API to view, grant, and revoke access authorizations
for a user. For more information, see Get User Authorizations and Update User Authorizations in the
Tenable Developer Portal.
In Tenable Web App Scanning, the audit log records user events that take place in your
organization's Tenable Web App Scanning account. For each event, the log includes information
about:
- 242 -
l The action taken
l The user ID
The audit log provides visibility into the actions that users in your organization take in Tenable Web
App Scanning, and can be helpful for identifying security issues and other potential problems.
To view the audit log for your organization's Tenable Web App Scanning account:
l Use the Audit Log endpoint as documented in the Tenable Developer Portal.
Logged Events
Audit log events include the following:
Action Description
session.create The system created a session for the user. A user login
triggers this event.
- 243 -
user.impersonation.start An administrator started impersonating another user.
Export Users
On the Users page, you can export one or more users in CSV or JSON format.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Web App Scanning account.
The Users page appears. This page contains a table that lists all users for your Tenable Web
App Scanning instance.
6. (Optional) Refine the table data. For more information, see Tenable Web App Scanning
Workbench Tables.
Export Action
- 244 -
Scope
-or-
In the users table, in the Actions column, click the button in the
row for the user you want to export.
b. Click Export.
- 245 -
l A text box to set the number of days before the export expires.
Format Description
Note: If your .csv export file includes a cell that begins with any of the following
characters (=, +, -, @), Tenable Web App Scanning automatically inputs a single
quote (') at the beginning of the cell. For more information, see the related
knowledge base article.
10. (Optional) Deselect any fields you do not want to appear in the export file.
11. In the Expiration box, type the number of days before the export file expires.
Note: Tenable Web App Scanning allows you to set a maximum of 30 calendar days for export
expiration.
l In the Start Date and Time section, select the date and time on which you want the
export schedule to start.
l In the Time Zone drop-down box, select the time zone to which you want the schedule
to adhere.
l In the Repeat drop-down box, select how often you want the export to repeat.
- 246 -
l In the Repeat Ends drop-down, select the date on which you want the schedule to end.
Note: If you select never, the schedule repeats until you modify or delete the export schedule.
Note: You can enable email notifications with or without scheduling exports.
l In the Add Recipients box, type the email addresses to which you want to send the
export notification.
l (Required) In the Password box, type a password for the export file. You must share this
password with the recipients to allow them to download the file.
Note: Tenable Web App Scanning sends an email to the recipients and from the link in the
email, the recipients can download the file by providing the correct password.
Tenable Web App Scanning begins processing the export. Depending on the size of the
exported data, Tenable Web App Scanning may take several minutes to process the export.
When processing completes, Tenable Web App Scanning downloads the export file to your
computer. Depending on your browser settings, your browser may notify you that the
download is complete.
15. Access the export file via your browser's downloads directory. If you close the export plane
before the download finishes, then you can access your export file in the Export Management
View.
Before you delete a user account, you must first disable the user account.
- 247 -
Caution: Once you delete a user account, the account cannot be recovered and the action cannot be
reversed.
Caution: Tenable Web App Scanning does not support object migration. When you delete a Tenable Web
App Scanning user, the application does not reassign objects belonging to the deleted users. Note that you
cannot reassign a Tenable Web App Scanning scan to a new owner if its owner is deleted.
Caution: Before you delete a user account, reassign any associated Remediation projects. These will not be
reassigned automatically.
The following table describes what objects are migrated, retained, or permanently deleted upon
user deletion:
Exclusions No Retained
- 248 -
Object Type Deleted Notes
Connectors No Retained
Sensors No Retained
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Web App Scanning account.
4. In the users table, in the row for the user account you want to delete, click the button.
A menu appears.
Note: If a user is not disabled, then the button does not appear. Disable the user before deleting
them.
Note: You cannot delete the Default Administrator account. If you want to delete the Default
Administrator account, you must contact Tenable Support.
- 249 -
6. In the Select New Object Owner drop-down box, select the user to which you want to transfer
any of the user's objects (e.g., scan results, user-defined scan templates).
7. Click Delete.
8. Click Delete.
Tenable Web App Scanning deletes the user and transfers any user objects to the user you
designated.
User Groups
User groups allow you to manage user permissions for various resources in Tenable Web App
Scanning. When you assign users to a group, the users inherit the permissions assigned to the
group. Your organization may utilize groups to provide permissions to batches of users based on
the roles of those users and your organization's security posture.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Web App Scanning account.
- 250 -
The Groups page appears.
The User Groups page displays a table of all user groups in your Tenable Web App Scanning
instance. This documentation refers to that table as the user groups table.
Column Description
Name The group name. You can define this name for all user groups except the
Tenable-provided All Users and Administrator groups.
l Create a Group
l Edit a Group
l Export Groups
l Delete a Group
- 251 -
2. In the left navigation plane, click Settings.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Web App Scanning account.
5. At the top of the user group table, click the Create User Group button.
6. In the User Group Name box, type a name for the new group.
- 252 -
Important: For this feature to function successfully, you must also enable the Group Management
Enabled toggle when creating/editing your SAML configuration. For more information on
SAML configuration steps, see the SAML Quick Reference Guide.
Once you configure the related claim within your IdP, anytime a user logs in via your SAML
configuration, Tenable Vulnerability Management automatically adds them to the specified
user group.
a. For each user you want to add, click the Users drop-down box and begin typing a
username.
As you type, Tenable Web App Scanning filters the list of users in the drop-down box to
match your search.
Tenable Web App Scanning adds the user to the list of users to be added to the user
group.
Tip: To remove a user from the list of users to be added, roll over the user and click the
button.
9. Click Save.
Tenable Web App Scanning creates the user group and adds the listed users as members.
The Groups page appears, where you can view the new group listed in the user groups table.
- 253 -
Required User Role: Administrator
To edit a group:
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Web App Scanning account.
5. In the user groups table, click the user group that you want to edit.
l
Add users to the group:
a. For each user you want to add, click the Users drop-down box and begin typing a
username.
As you type, Tenable Web App Scanning filters the list of users in the drop-down
box to match your search.
Tenable Web App Scanning adds the user to the list of users to be added to the
user group.
l
Remove a user from the group:
- 254 -
a. In the Users list, click the button next to the user account you want to remove.
Tenable Vulnerability Management removes the user from the Users list.
l
Enable/disable the optional Managed by SAML option.
(Optional) If you want to enable Tenable Vulnerability Management to automatically add
users who log in using your SAML configuration to this user group, in the General
section, select the Managed by SAML checkbox.
Important: For this feature to function successfully, you must also enable the Group
Management Enabled toggle when creating/editing your SAML configuration. For more
information on SAML configuration steps, see the SAML Quick Reference Guide.
Once you configure the related claim within your IdP, anytime a user logs in via your
SAML configuration, Tenable Vulnerability Management automatically adds them to the
specified user group.
7. Click Save.
Tenable Web App Scanning saves the user group with any changes you made.
Export Groups
On the Access Control page, in the Groups tab, you can export one or more user groups in CSV or
JSON format.
- 255 -
The Settings page appears.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Web App Scanning account.
The Groups tab appears, containing a table that lists all user groups in your Tenable Web App
Scanning instance.
6. (Optional) Refine the table data. For more information, see Tenable Web App Scanning
Workbench Tables.
-or-
In the groups table, in the Actions column, click the button in the row for the group
you want to export.
b. Click Export.
l A text box to set the number of days before the export expires.
- 256 -
To export multiple groups:
a. In the groups table, select the check box for each group you want to export.
Note: You can individually select and export up to 200 groups. If you want to export more than
200 groups, you must select all the groups on your Tenable Web App Scanning instance by
selecting the check box at the top of the groups table and then click Export.
l A text box to set the number of days before the export expires.
l A text box to set the number of days before the export expires.
- 257 -
Format Description
Note: If your .csv export file includes a cell that begins with any of the following
characters (=, +, -, @), Tenable Web App Scanning automatically inputs a single
quote (') at the beginning of the cell. For more information, see the related
knowledge base article.
10. (Optional) Deselect any fields you do not want to appear in the export file.
11. In the Expiration box, type the number of days before the export file expires.
Note: Tenable Web App Scanning allows you to set a maximum of 30 calendar days for export
expiration.
l In the Start Date and Time section, select the date and time on which you want the
export schedule to start.
l In the Time Zone drop-down box, select the time zone to which you want the schedule
to adhere.
l In the Repeat drop-down box, select how often you want the export to repeat.
l In the Repeat Ends drop-down, select the date on which you want the schedule to end.
Note: If you select never, the schedule repeats until you modify or delete the export schedule.
Note: You can enable email notifications with or without scheduling exports.
- 258 -
l Click the Email Notification toggle.
l In the Add Recipients box, type the email addresses to which you want to send the
export notification.
l (Required) In the Password box, type a password for the export file. You must share this
password with the recipients to allow them to download the file.
Note: Tenable Web App Scanning sends an email to the recipients and from the link in the
email, the recipients can download the file by providing the correct password.
Tenable Web App Scanning begins processing the export. Depending on the size of the
exported data, Tenable Web App Scanning may take several minutes to process the export.
When processing completes, Tenable Web App Scanning downloads the export file to your
computer. Depending on your browser settings, your browser may notify you that the
download is complete.
15. Access the export file via your browser's downloads directory. If you close the export plane
before the download finishes, then you can access your export file in the Export Management
View.
Delete a Group
Note: You cannot delete the Tenable-provided Administrator or All Users user group.
- 259 -
1. In the upper-left corner, click the button.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Web App Scanning account.
The Groups page appears. This page displays a table with all the user groups on your Tenable
Web App Scanning account.
l
To delete a single user group:
a. In the user groups table, click the button for the user group you want to delete.
A menu appears.
l
To delete multiple user groups.
a. In the user groups table, select the check box for each user group you want to
delete.
- 260 -
7. In the confirmation window, click Delete.
Tenable Web App Scanning deletes the selected user group or groups. The deleted group or
groups no longer appear in the user groups table.
Permissions
Tenable Web App Scanning allows you to create and manage configurations that determine which
users on your organization's account can perform specific actions with the organization's resources
and data. This documentation refers to these configurations as permission configurations1.
On the My Accounts page, each user can view the permission configurations assigned to them.
However, only administrator users can view or manage permission configurations for other users.
For more information, see Tenable-Provided Roles and Privileges.
When you create a user or user group, you can assign existing permission configurations to them
for assets that meet the criteria specified by a previously created tag. In Tenable Web App
Scanning, these assets and the tags that define them are called objects2.
l Roles — Roles allow you to manage privileges for major functions in Tenable Web App Scanning and
control which Tenable Web App Scanning modules and functions users can access.
l Permissions — Permissions allow you to manage access to your own data, such as Tags, Assets,
and their Findings.
1A configuration that administrators can create to determine what actions certain users and groups
- 261 -
When you create a permission configuration, you must select one or more of the following
predefined permissions. These permissions determine the actions users can take with the object or
objects defined in the permission configuration.
Permission Description
Can View Allows a user or group with this permission to view the assets defined by the
object.
Note: If you have a Tenable Lumin license, you must have the Can View
permission for an asset to view that asset's details. However, you can view the
total number of assets licensed to the account regardless of your permissions.
You can also view your Cyber Exposure Score (CES) and Asset Exposure Score
(AES) values, which are based on the combined risk of all assets licensed to the
account. For more information, see Tenable Lumin Metrics.
Can Scan Allows a user or group with this permission to scan the assets defined by the
object.
Note: For a manually entered target to be considered valid, it must meet the
following criteria:
Can Edit Allows a user or group with this permission to edit the tag that defines the
object.
Can Use Allows a user or group with this permission to use the tag that defines the
object.
- 262 -
To view your permission configurations in Tenable Web App Scanning:
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Web App Scanning account.
The Permissions tab appears. This tab contains a table that lists all of the permission
configurations on your Tenable Web App Scanning instance.
Note:The first row of the permissions table contains a read-only entry for Administrators. This entry
exists to remind you that Administrators have all permissions for every resource on your account.
For more information, see Roles.
- 263 -
l Edit a Permission Configuration
When you create a permission configuration in Tenable Web App Scanning, you can apply that
configuration to one or more users or groups.
l Create a tag for the object for which you want to create a permission.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Web App Scanning account.
The Permissions tab appears. This tab contains a table that lists all of the permission
configurations on your Tenable Web App Scanning instance.
- 264 -
6. At the top of the table, click Create Permission.
7. In the Permission Name box, type a name for the permission configuration.
Note: Although the Users box is optional, you cannot save the permission configuration unless at
least one user or user group is selected.
9. (Optional) In the Groups drop-down box, select one or more user groups.
Note: Although the Groups box is optional, you cannot save the permission configuration unless at
least one user or user group is selected.
Note: You can select All Users in the Groups drop-down box to assign the permission configuration
to all users on your Tenable Web App Scanning instance. However, Tenable recommends that you
use caution when assigning the permission configuration to all users because doing so goes against
security best practices.
- 265 -
Caution: Adding the Can Edit permission to your permission configuration along with the Can View
or Can Scan permission allows assigned users to change the scope of the assets they can view and
scan. Tenable recommends that you combine the Can Edit permission with the Can View or Can
Scan permission only for administrator users.
Note: If you select the Can Edit permission, Tenable Web App Scanning automatically adds the Can
Use permission.
11. In the Objects drop-down box, select one or more objects to which to apply the permission
configuration.
Note: The objects in the drop-down box are previously created tags that identify and define your
assets. For more information, see Permissions.
Tip: You can select All Assets to allow users and group to view or scan all the assets on your
instance, regardless of whether the assets match any existing objects. You can also select All Tags
to allow users and groups on your instance to edit or use all objects on your instance. For more
information about objects, see Permissions.
Tenable Web App Scanning saves your changes. The permission configuration appears on the
Permissions tab.
- 266 -
1. In the upper-left corner, click the button.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Web App Scanning account.
l
Add a permission configuration to a user:
a. Click the Users tab.
The Users tab appears. This tab contains a list of all the users on your Tenable
Web App Scanning instance.
b. In the users table, click the user to which you want to add a permission
configuration.
c. In the Permissions section, at the top of the table, click Add Permissions.
e. Click Add.
The permission configuration appears in the Permissions table on the Edit User
page.
l
Add a permission configuration to a user group:
- 267 -
a. Click the Groups tab.
The Groups tab appears. This tab contains a list of all the user groups on your
Tenable Web App Scanning instance.
b. In the groups table, click the group to which you want to add a permission
configuration.
c. In the Permissions section, at the top of the table, click Add Permissions.
e. Click Add.
The permission configuration appears in the Permissions table on the Edit User
Group page.
6. Click Save.
Tenable Web App Scanning saves your changes and adds the permission configuration to the
user or group.
- 268 -
4. Click the Access Control tile.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Web App Scanning account.
The Permissions tab appears. This tab contains a list of all the permission configurations on
your Tenable Web App Scanning instance.
7. (Optional) In the Permission Name box, type a new name for the permission configuration.
Caution: Adding the Can Edit permission to your permission configuration along with the Can View or
Can Scan permission allows the users selected in the permission configuration to change the scope
of the assets they can view and scan. Tenable recommends that you combine the Can Edit
permission with the Can View or Can Scan permission only for administrator users.
Note: If you select the Can Edit permission, Tenable Web App Scanning automatically adds the Can
Use permission.
Note: You cannot assign permissions to user or groups for a given object that overlap with
permissions assigned to them via another permission configuration. For example, if you selected the
Can Edit permission for an object, but a user listed under Users already has the ability to edit that
object based on an existing permission configuration, Tenable Web App Scanning generates an error
message and prevents you from saving the current permission configuration until you modify your
selections to remove the redundancy.
b. To remove a permission, in the Permissions drop-down box, click the button next to
each permission you want to remove.
- 269 -
10. (Optional) Add or remove an object.
a. To add an object, in the Objects drop-down box, select one or more objects.
b. To remove an object, in the Objects drop-down box, click the button next to each
object you want to remove.
Tenable Web App Scanning saves your changes. The updated permission configuration
appears on the Permissions tab.
On the Permissions page, you can export one or more permission configurations in CSV or JSON
format.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Web App Scanning account.
The Permissions tab appears. This tab contains a table that lists all of the permission
configurations on your Tenable Web App Scanning instance.
- 270 -
Note:The first row of the permissions table contains a read-only entry for Administrators. This entry
exists to remind you that Administrators have all permissions for every resource on your account.
For more information, see Roles.
6. (Optional) Refine the table data. For more information, see Tenable Web App Scanning
Workbench Tables.
-or-
In the permission configurations table, in the Actions column, click the button in the
row for the permission configuration you want to export.
b. Click Export.
A menu appears.
c. Click Export.
Note: You can individually select and export up to 200 permission configurations. If you want
to export more than 200 permission configurations, you must select all the permission
configurations on your Tenable Web App Scanning instance by selecting the check box at the
top of the permission configurations table and then click Export.
- 271 -
The Export plane appears. This plane contains the following:
l A text box to set the number of days before the export expires.
Format Description
Note: If your .csv export file includes a cell that begins with any of the following
characters (=, +, -, @), Tenable Web App Scanning automatically inputs a single
quote (') at the beginning of the cell. For more information, see the related
knowledge base article.
10. (Optional) Deselect any fields you do not want to appear in the export file.
11. In the Expiration box, type the number of days before the export file expires.
Note: Tenable Web App Scanning allows you to set a maximum of 30 calendar days for export
expiration.
- 272 -
l Click the Schedule toggle.
l In the Start Date and Time section, select the date and time on which you want the
export schedule to start.
l In the Time Zone drop-down box, select the time zone to which you want the schedule
to adhere.
l In the Repeat drop-down box, select how often you want the export to repeat.
l In the Repeat Ends drop-down, select the date on which you want the schedule to end.
Note: If you select never, the schedule repeats until you modify or delete the export schedule.
Note: You can enable email notifications with or without scheduling exports.
l In the Add Recipients box, type the email addresses to which you want to send the
export notification.
l (Required) In the Password box, type a password for the export file. You must share this
password with the recipients to allow them to download the file.
Note: Tenable Web App Scanning sends an email to the recipients and from the link in the
email, the recipients can download the file by providing the correct password.
Tenable Web App Scanning begins processing the export. Depending on the size of the
exported data, Tenable Web App Scanning may take several minutes to process the export.
When processing completes, Tenable Web App Scanning downloads the export file to your
computer. Depending on your browser settings, your browser may notify you that the
download is complete.
- 273 -
15. Access the export file via your browser's downloads directory. If you close the export plane
before the download finishes, then you can access your export file in the Export Management
View.
Note: You cannot remove a permission configuration from the Tenable-provided Administrator or All
Users user groups.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Web App Scanning account.
o
Remove the permission configuration via the Users tab:
a. Click the Users tab.
The Users tab appears. This tab contains a list of all the users on your
Tenable Web App Scanning instance.
- 274 -
b. In the users table, click the user from which you want to remove a
permission configuration.
c. In the Permissions table, in the Actions column, click the button next to
the permission configuration you want to remove.
Tenable Web App Scanning removes the permission configuration from the
user.
e. (Optional) Repeat for each user from which you want to remove a permission
configuration.
o
Remove the permission via the Permissions tab:
a. Click the Permissions tab.
The Permissions tab appears. This tab contains a table that lists all of the
permission configurations on your Tenable Web App Scanning instance.
c. Under Users, click the button next to each user from which you want to
remove the permission configuration.
- 275 -
l Do one of the following:
o
Remove the permission configuration via the Groups tab:
a. Click the Groups tab.
The Groups tab appears. This tab contains a list of all the user groups on
your Tenable Vulnerability Management instance.
b. In the user groups table, click the group from which you want to remove a
permission configuration.
c. In the Permissions table, in the Actions column, click the button next to
the permission configuration you want to remove.
e. (Optional) Repeat for each user group from which you want to remove a
permission configuration.
o
Remove the permission configuration via the Permissions tab:
a. Click the Permissions tab.
The Permissions tab appears. This tab contains a table that lists all of the
permission configurations on your Tenable Vulnerability Management
instance.
c. Under Groups, click the button next to each user group from which you
want to remove the permission configuration.
- 276 -
Tenable Vulnerability Management removes the permission configuration
from the Groups list.
7. Click Save.
Tenable Vulnerability Management saves your changes and removes the permission from the
user or group.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Web App Scanning account.
The Permissions tab appears. This tab contains a table that lists all of the permission
configurations on your Tenable Web App Scanning instance.
6. In the table, in the Actions column, click the button next to the permission configuration you
want to delete.
- 277 -
Roles
Roles allow you to manage privileges for major functions in Tenable Web App Scanning and control
which Tenable Web App Scanning resources users can access in Tenable Web App Scanning.
When you create a user, you must select a role for that user that broadly determine the actions the
user can perform.
Note: You can further refine user access to specific resources by assigning permissions to individual users
or groups. For more information, see Permissions.
l Roles — Roles allow you to manage privileges for major functions in Tenable Web App Scanning and
control which Tenable Web App Scanning modules and functions users can access.
l Permissions — Permissions allow you to manage access to your own data, such as Tags, Assets,
and their Findings.
On the Roles page, you can view all Tenable-provided roles and any custom roles created on your
Tenable Web App Scanning instance.
Tenable- Contains a predefined set of privileges determined by the Tenable Web App
Provided Scanning product specified on your account license. Each role encompasses
Roles and the privileges of lower roles and adds new privileges. Administrators have the
Privileges most privileges. Basic users have the fewest.
- 278 -
Custom Contains a custom set of privileges that allow you to tailor user privileges and
Roles access to resources on your Tenable Web App Scanning instance.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Web App Scanning account.
The Roles page appears. This page contains a table that lists all the user roles available on
your Tenable Web App Scanning instance.
l Duplicate a Role
- 279 -
l Edit a Custom Role
l Export Roles
Note: You can further refine user access to specific resources by assigning permissions to individual users
or groups. For more information, see Permissions.
- 280 -
Tenable Web App Scanning-Provided Roles and Privileges
Area Administrator Scan Standard Scan Basic
Manager Operator
Settings modify
- 281 -
Tenable Web App Scanning-Provided Roles and Privileges
Area Administrator Scan Standard Scan Basic
Manager Operator
Reports view, run, view, run, view, run, view, run, view
create, modify, create, create, create,
delete modify, modify, modify,
delete delete delete
1User roles determine a user's abilities, but the permissions that a user has for a particular scan are
- 282 -
Tenable Web App Scanning-Provided Roles and Privileges
Area Administrator Scan Standard Scan Basic
Manager Operator
1Assigning and Unassigning tags can be done from the Asset Details page.
2Standard users must have the Can Use permission to view, delete, assign, and unassign tags.
- 283 -
Tenable Web App Scanning-Provided Roles and Privileges
Area Administrator Scan Standard Scan Basic
Manager Operator
delete delete
1Can create scans using existing user-defined policies that are shared with the user.
2Administrator users can create, modify, and delete permissions for scans that any user on the
account owns.
3Scan Manager users can create, modify, or delete permissions only on scans they own.
4Standard users can create, modify, or delete permissions only on scans they own.
5Scan Operator users can create, modify, or delete permissions only on scans they own.
- 284 -
Lumin Exposure View-Provided Roles and Privileges
Area Administrator Scan Standard Scan Basic
Manager Operator
Export manage own manage own manage own manage own manage own
Export manage own manage own manage own manage own manage own
- 285 -
Attack Path Analysis-Provided Roles and Privileges
Area Administrator Scan Standard Scan Basic
Manager Operator
- 286 -
Business manage, modify - -
Note: By default, Tenable Attack Surface Management users created within Tenable One are given the
Active User role.
Custom Roles
You can create custom roles for users on your Tenable Web App Scanning instance to give those
users privileges that are specific to your organization's needs.
When you create a custom role, you can add all or some of the following privileges. You can also
edit a custom role to remove privileges. Which privileges you can add to or remove from a role
depend on the area of Tenable Web App Scanning where each privilege applies.
Note: A user's access to resources on the account may be limited by their permissions, regardless of their
role.
l Create — Allows users to create an exposure card or a tag. This privilege is specific to Lumin
Exposure View and Tenable Inventory, respectively.
- 287 -
l Manage — Allows the user to create, modify, and delete in the area where the privilege
applies.
Note: When you add the Manage privilege to a custom role, Tenable automatically adds the Read
privilege as well. You cannot disable the Read privilege unless you first disable the Manage privilege.
l Manage All — Allows the user to view, modify, and delete exports, including exports that
others created.
l Manage Own — Allows the user to view, modify, and delete only exports that the user created.
l Share — Allows the user to share objects with other users or groups.
Note: If a custom role does not also have the Read permission enabled, they cannot access a list of
other users with which to share objects.
l Read — Allows the user to view items in the area where the privilege applies.
l Use — Allows the user to use Tenable-provided scan templates during scan creation.
l Import — Allows the user to import Tenable Web App Scanning scan data. For more
information, see the Tenable Web App Scanning User Guide.
l Submit PCI — Allows the user to submit the scan for PCI validation. For more information, see
the Tenable PCI ASV User Guide.
l Search — Allows the user to search for a query where the privilege applies. This privilege is
specific to Attack Path Analysis.
l Save — Allows the user to save a query where the privilege applies. This privilege is specific to
Attack Path Analysis.
l Cloud Resource — Allows the user to access assets from Cloud Resource data sources. This
privilege is specific to Lumin Exposure View and Tenable Inventory.
l Computing Resource — Allows the user to access assets from Computing Resource data
sources. This privilege is specific to Lumin Exposure View and Tenable Inventory.
l Identity — Allows the user to access assets from Identity data sources. This privilege is
specific to Lumin Exposure View and Tenable Inventory.
- 288 -
l Web Application — Allows the user to access assets from Web Application data sources. This
privilege is specific to Lumin Exposure View and Tenable Inventory.
The following table describes the privilege options available for custom roles in different sections
of Tenable Web App Scanning.
Note: When you create a custom role, you must include Read privileges for the General Settings, License,
and My Account sections. If you do not include Read privileges for these sections, users assigned to the
role cannot log in to Tenable Web App Scanning.
Platform Settings
Asset Read
Findings Read
Caution: Adding the Manage privilege in Access Control allows any user with
that custom role to create an Administrator user, log in as that user, and
change the privileges or permissions for any user on your Tenable
Vulnerability Management instance, including their own. If you want to
create a user account with the ability to manage your Access Control
configurations, Tenable recommends that you assign that user the
Administrator role. For more information, see Tenable-Provided Roles and
Privileges.
License Read
Information
Tenable Attack
Surface
Management
- 289 -
Business Manage
Inventory Manage
Note: Selecting only the Inventory checkbox allows you to manage your
inventory, but does not allow you access to the Administrator interface.
Vulnerability Management
Note: Custom role privileges in the Dashboards section do not include the
ability to export a dashboard. Assign a Tenable-provided role to a user if you
want the user to be able to export dashboards.
Note: All users can view the dashboards they create or that others share with
them regardless of the privileges you assign to them.
Tenable-Provided Use
Scan Template
Note: For the Use privilege to function properly, you must also enable the
Manage privilege in the Web Application Scan and/or User-Defined Scan
Template sections.
- 290 -
Managed Read, Manage
Credential
Caution: To restrict managed credential access in Legacy Tenable Web App
Scanning, you must deselect the check boxes in this section AND the
Managed Credential check boxes in the Vulnerability Management > Scan
section of the custom role creation page.
Note: In the Legacy Tenable Web App Scanning interface, custom role users
must be assigned the Manage role to view managed credentials. In the new
Tenable Web App Scanning interface, users can view managed credentials
with the Read role alone.
Asset Inventory
Inventory Read
- 291 -
Exposure Card Read, Create, Share
Scan
Tenable-Provided Use
Scan Template
Note: Tenable applications do not currently support managing scans and sensors via Custom Roles.
- 292 -
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Web App Scanning account.
The Roles page appears. This page contains a table that lists all the user roles available on
your Tenable Web App Scanning instance.
l
Add a new role:
a. At the top of the table, click Add Role.
- 293 -
c. (Optional) In the Description box, type a description for your custom role.
ii. Click the Enable toggle to enable or disable access to this application for the
custom role you're creating.
- 294 -
iii. Select the checkbox for each privilege you want to add to your custom role.
For more information about available privileges, see Custom Roles.
e. Click Save.
Tenable Web App Scanning saves the role and adds it to the roles table.
Duplicate a Role
You can create a custom role by duplicating any existing custom role and then modifying
the new role configurations as desired.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Web App Scanning account.
The Roles page appears. This page contains a table that lists all the user roles available on
your Tenable Web App Scanning instance.
6. In the roles table, select the check box next to the role you want to duplicate.
- 295 -
7. In the action bar, click More.
A menu appears.
8. Click Duplicate.
A copy of the role appears in the table, with the prefix Copy of [role name].
The Roles Details page appears. The name, description, and selected privileges for the
duplicate role are copied from the original role.
Tenable Web App Scanning saves your changes to the duplicate role.
Note: Tenable applications do not currently support managing scans and sensors via Custom Roles.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Web App Scanning account.
- 296 -
5. Click the Roles tab.
The Roles page appears. This page contains a table that lists all the user roles available on
your Tenable Web App Scanning instance.
l Name — In the Name box, type a new name for the role.
l Privileges — Under each Tenable Web App Scanning area, select or deselect the check
box next to each privilege you want to add to or remove from the role.
8. Click Save.
Note: You can delete only custom roles. You cannot delete Tenable-Provided Roles and Privileges.
- 297 -
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Web App Scanning account.
The Roles page appears. This page contains a table that lists all the user roles available on
your Tenable Web App Scanning instance.
6. In the table, in the Actions column, click the button next to the role you want to delete.
Tenable Web App Scanning deletes the role and removes it from the roles table.
Export Roles
On the Roles page, you can export one or more user groups in CSV or JSON format.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Web App Scanning account.
The Roles page appears. This page contains a table that lists all the Tenable-provided and
custom roles on your Tenable Web App Scanning instance.
- 298 -
6. (Optional) Refine the table data. For more information, see Tenable Web App Scanning
Workbench Tables.
-or-
In the roles table, in the Actions column, click the button in the row for the role you
want to export.
b. Click Export.
Note: You can individually select and export up to 200 roles. If you want to export more than
200 roles, you must select all the roles on your Tenable Web App Scanning instance by
selecting the check box at the top of the roles table and then click Export.
l A text box to set the number of days before the export expires.
- 299 -
l A toggle to configure the export schedule.
Format Description
Note: If your .csv export file includes a cell that begins with any of the following
characters (=, +, -, @), Tenable Web App Scanning automatically inputs a single
quote (') at the beginning of the cell. For more information, see the related
knowledge base article.
10. (Optional) Deselect any fields you do not want to appear in the export file.
11. In the Expiration box, type the number of days before the export file expires.
Note: Tenable Web App Scanning allows you to set a maximum of 30 calendar days for export
expiration.
l In the Start Date and Time section, select the date and time on which you want the
export schedule to start.
l In the Time Zone drop-down box, select the time zone to which you want the schedule
to adhere.
l In the Repeat drop-down box, select how often you want the export to repeat.
- 300 -
l In the Repeat Ends drop-down, select the date on which you want the schedule to end.
Note: If you select never, the schedule repeats until you modify or delete the export schedule.
Note: You can enable email notifications with or without scheduling exports.
l In the Add Recipients box, type the email addresses to which you want to send the
export notification.
l (Required) In the Password box, type a password for the export file. You must share this
password with the recipients to allow them to download the file.
Note: Tenable Web App Scanning sends an email to the recipients and from the link in the
email, the recipients can download the file by providing the correct password.
Tenable Web App Scanning begins processing the export. Depending on the size of the
exported data, Tenable Web App Scanning may take several minutes to process the export.
When processing completes, Tenable Web App Scanning downloads the export file to your
computer. Depending on your browser settings, your browser may notify you that the
download is complete.
15. Access the export file via your browser's downloads directory. If you close the export plane
before the download finishes, then you can access your export file in the Export Management
View.
Access Groups
Tenable is retiring access groups. Moving forward, Tenable recommends that you use permissions to
manage user and group access to resources on your Tenable Vulnerability Management instance and that
you convert your existing access groups into permission configurations. For more information, see
Transition to Permission Configurations.
- 301 -
Note: System target group permissions that controlled viewing scan results and scanning specified targets
have been migrated to access groups. For more information, see Scan Permissions Migration.
With access groups, you can control which users or groups in your organization can:
l View specific assets and related vulnerabilities in aggregated scan result views.
l Run scans against specific targets and view individual scan results for the targets.
An access group contains assets or targets as defined by the rules you set. Access group rules
specify identifying attributes that Tenable Vulnerability Management uses to associate assets or
targets with the group (for example, an AWS Account ID, FQDN, or IP address). By assigning
permissions in the access group to users or user groups, you grant the usersthe users in the groups
view or scan permissions for assets or targets associated with the access group.
Note: When you create or edit an access group, Tenable Vulnerability Management may take
some time to assign assets to the access group, depending on the system load, the number of
matching assets, and the number of vulnerabilities.
You can view the status of this assignment process in the Status column of the access groups
table on the Access Groups page.
Only administrators can view, create, and edit access groups. As a user assigned any other role, you
can see the access groups to which you belong and the related rules, but not the other users that
are in the access group.
Note: The Access Group tile appears only if you have one or more assigned access groups or if you are an
administrator and users on your Tenable Vulnerability Management are assigned to access groups. Once
you convert all your access groups to permission configurations, the Access Group tile will no longer
appear on your account.
By default, all users have No Access to all assets on your Tenable Vulnerability Management
instance. Therefore, if you want to assign permissions for assets, you must create an access group
and configure user permissions for the group.
Note: Tenable Vulnerability Management applies dynamic tags to any assets, regardless of access group
scoping. As a result, it may apply tags you create to assets outside of the access groups to which you
belong.
- 302 -
Transition to Permission Configurations
Tenable is converting all access groups into permission configurations. As this conversion runs, you may
notice your existing access groups undergoing changes. Moving forward, Tenable recommends that you
use permissions to manage user and group access to resources on your Tenable Vulnerability Management
instance. For more information, see Transition to Permission Configurations.
Tenable Vulnerability Management has consolidated and moved user and group management to the
Access Control page to make access management more intuitive and efficient.
As part of this effort, Tenable Vulnerability Management is replacing Access Groups with
Permissions, a feature that allows you to create permission configurations. These permission
configurations use tags to determine which users and groups on your Tenable Vulnerability
Management instance can perform specific tasks with your organization's resources.
Previously, you had to create access groups to customize access settings for users on your
instance. When you create a permission configuration, you can view and manage access settings
for users and groups on the Access Control page, where you manage users and groups.
Tenable Vulnerability Management plans to retire access groups once all existing access groups are
converted into permissible configurations. Tenable Vulnerability Management encourages you to
use permission configurations to manage user access to your resources.
What to Expect
As Tenable Vulnerability Management converts your access group data into permission
configurations, you may notice the following changes:
l Tenable Vulnerability Management has split up your access groups that have more than one
access group type and recreated them as separate groups based on type. For more
information about access group types, see Access Group Types.
l Tenable Vulnerability Management has converted all your Scan Target type access groups into
Manage Assets type access groups.
l Tenable Vulnerability Management has updated access group rule filters to match tag rule
filters and operators.
- 303 -
l For each access group on your instance that is based on rules instead of tags, Tenable
Vulnerability Management has created tags based on the access group rules and updated the
groups to reference the new tags. For more information about tag rules, see Tag Rules.
l For each access group on your install, Tenable Vulnerability Management has created
permission configurations based on the rules and user permissions defined in that access
group.
Task Parity
The following table lists common tasks you may perform on the Access Groups page and their
equivalent tasks on the Permissions page.
Tenable is converting all access groups into permission configurations. As this conversion runs, you may
notice your existing access groups undergoing changes. Moving forward, Tenable recommends that you
use permissions to manage user and group access to resources on your Tenable Vulnerability Management
instance. For more information, see Transition to Permission Configurations.
On the Access Groups page, you can convert your existing access groups into permission
configurations.
- 304 -
Note: Once you convert an access group into a permission configuration, you cannot revert the converted
permission configuration into an access group.
Note: The Access Group tile appears only if you have one or more assigned access groups or if you are an
administrator and users on your Tenable Vulnerability Management are assigned to access groups. Once
you convert all your access groups to permission configurations, the Access Group tile will no longer
appear on your account.
The Access Groups pagetab appears. This pagetab contains a table that lists the access
groups to which you have access.
5. In the access groups table, select the check box for the access group you want to convert.
Tenable Vulnerability Management begins converting your access group into a permission
configuration.
Tenable Vulnerability Management updates the Status column for the access group to reflect
the current migration status.
- 305 -
Tenable is retiring access groups. Moving forward, Tenable recommends that you use permissions to
manage user and group access to resources on your Tenable Vulnerability Management instance and that
you convert your existing access groups into permission configurations. For more information, see
Transition to Permission Configurations.
You can create the following types of access groups. Select an access group type based on the
identifiers for the targets you want to scan.
Type Description
Manage Users can view the asset records created during previous scans and scan the
Assets associated targets for those assets.
Use this type of access group if the targets you want to view and scan have
been scanned before and can be best identified using tags based on asset
attributes (for example, operating system or AWS Account ID).
Scan Users can scan targets associated with the access group and view the results of
Targets those scans.
Use this type of access group if the targets you want to view and scan have
never been scanned before and can only be identified using certain asset
identifiers (specifically, FQDN, IPv4 address, or IPv6 address).
Note: The access group type names do not represent a limitation on the user actions that each group
controls in relation to the specified targets. For both Manage Assets and Scan Targets groups, you can
grant user permissions to view analytical results for the specified targets in dashboards, to scan the
specified targets, or to both view and scan. For more information on user permissions, see Configure User
Permissions for an Access Group. For more information on user permissions, see Edit a User Group.
Tip: You can add a user to both access group types if you want to allow the user to scan both types of scan
targets.
Tenable is retiring access groups. Moving forward, Tenable recommends that you use permissions to
manage user and group access to resources on your Tenable Vulnerability Management instance and that
you convert your existing access groups into permission configurations. For more information, see
Transition to Permission Configurations.
- 306 -
Required User Role: Administrator
The All Assets group is the default, system-generated access group to which all assets belong.
l The All Users user group, which contains all users in your organization, is assigned to the All
Assets access group.
l The permissions for the All Users group are set to Can View and Can Scan.
If you do not want all users to scan all assets and view the individual and aggregated results, you
must set the permissions for the All Users group to No Access. Optionally, you can then add
specific users or user groups to provide individuals with access to all assets.
Note: When you create or edit an access group, Tenable Vulnerability Management may take
some time to assign assets to the access group, depending on the system load, the number of
matching assets, and the number of vulnerabilities.
You can view the status of this assignment process in the Status column of the access groups
table on the Access Groups page.
The Access Groups pagetab appears. This pagetab contains a table that lists the access
groups to which you have access.
- 307 -
6. In the Users & Groups section, locate the listing for the All Users group.
7. Remove both the Can Edit and Can Scan labels from the All Users group listing:
Note: When configuring permissions for the All Users user group, Tenable recommends
keeping the following in mind:
l If you retain the permissions for All Assets as Can View, all users can view scan results for all
assets or targets for your organization.
l If you set the permissions for All Assets to Can Scan, all users can scan all assets or targets
for your organization and view the related scan results.
8. (Optional) Configure user permissions for each user or group you want to add to the All Assets
group.
9. Click Save.
The Access Groups page appears. Access to the All Assets group is restricted to the user(s)
or group(s) you added.
The User Groups tab appears. No users can access assets for your organization.
10. (Optional) In any user group you want to access the All Assets group, configure permissions
for the All Assets access group.
Tenable is retiring access groups. Moving forward, Tenable recommends that you use permissions to
manage user and group access to resources on your Tenable Vulnerability Management instance and that
you convert your existing access groups into permission configurations. For more information, see
Transition to Permission Configurations.
- 308 -
You can create an access group to group assets based on rules, using information such as an AWS
Account ID, FQDN, IP address, and other identifying attributes. You can then assign permissions for
users or user groups to view or scan the assets in the access group.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Web App Scanning account.
The Access Groups pagetab appears. This pagetab contains a table that lists the access
groups to which you have access.
6. In the upper-right corner of the page, click the Create Access Group button.
7. In the General section, in the Name box, type a name for the access group.
8. In the Type section, select the appropriate access group type based on the type of targets
you want to scan.
If you create an access group of one type, then change the type during configuration, Tenable
Vulnerability Management prompts you to confirm the action. If you confirm, Tenable
Vulnerability Management clears any previously added rule filterscriteria.
- 309 -
9. In the Rules section, add rules for the access group.
Access group rules specify the conditions Tenable Vulnerability Management evaluates when
determining whether to include assets or targets in the access group.
• is equal to: Tenable Vulnerability Management matches the rule to assets or targets
based on an exact match of the specified term.
Note: Tenable Vulnerability Management interprets the operator as 'equals' for rules that
specify a single IPv4 address, but interprets the operator as 'contains' for rules that specify an
IPv4 range or CIDR range.
• starts with: Tenable Vulnerability Management matches the rule to assets or targets
that start with the specified term.
• ends with: Tenable Vulnerability Management matches the rule to assets or targets
that end with the specified term.
c. In the text box, type a valid value for the selected category.
Tip: You can enter multiple values separated by commas. For IPV4 Address, you can use CIDR
notation (e.g., 192.168.0.0/24), a range (e.g., 192.168.0.1-192.168.0.255), or a comma-separated
list (e.g., 192.168.0.0, 192.168.0.1).
Note: If you configure multiple rules for an access group, the access group includes assets or
targets that match any of the rules. For example, if you configure two rules -- one that
- 310 -
matches on the Network Name attribute and one that matches on IPv4 Address, the access
group includes any assets in the specified network, plus any asset with the specified IPv4
address, regardless of whether that asset belongs to the specified network.
10. In the Criteria section, specify the criteria you want Tenable Vulnerability Management to
match assets or targets to the access group:
Option Action
Tags (Manage Assets groups only) To specify tags criteria for the access group:
c. Click a tag.
l To remove a tag, roll over a tag in the box , then click the
button next to the label.
Note: Use this option if you want to match assets to the access group using
tags as the only criteria. To match assets on tags and on additional asset
attributes, use the Rules option, then specify one or more tags as rules in
addition to other rules.
- 311 -
To specify rules criteria for the access group:
Note: You can create a rule based on an existing tag. For more
information, see Tags.
d. In the text box, type a valid value for the selected category.
Tip: You can enter multiple values separated by commas. For IPV4
Address, you can use CIDR notation (e.g., 192.168.0.0/24), a range (e.g.,
192.168.0.1-192.168.0.255), or a comma-separated list (e.g., 192.168.0.0,
192.168.0.1).
- 312 -
Note: If you configure multiple rules for an access group, the access
group includes assets or targets that match any of the rules. For example,
if you configure two rules -- one that matches on the Network Name
attribute and one that matches on IPv4 Address, the access group
includes any assets in the specified network, plus any asset with the
specified IPv4 address, regardless of whether that asset belongs to the
specified network.
Note: In the Users & Groups section, you can view the permissions assigned to user groups for the
access group. By default, Tenable Vulnerability Management assigns No Access permissions to the
All Users user group for any new access group. You can modify these permissions in the All Users
group, or you can retain the default permissions and assign higher levels of permissions for the
access group in additional user groups. For more information, see Edit a User Group.
11. In the Users & Groups section, configure user permissions for the access group.
Tenable Vulnerability Management creates the access group. The Access Groups page
appears.
Note: When you create or edit an access group, Tenable Vulnerability Management may
take some time to assign assets to the access group, depending on the system load, the
number of matching assets, and the number of vulnerabilities.
You can view the status of this assignment process in the Status column of the access
groups table on the Access Groups page.
What to do next:
l In a user group, assign permissions for this access group.
Tenable is retiring access groups. Moving forward, Tenable recommends that you use permissions to
manage user and group access to resources on your Tenable Vulnerability Management instance and that
you convert your existing access groups into permission configurations. For more information, see
Transition to Permission Configurations.
- 313 -
You can configure access group permissions for individual users or a user group. If you configure
access group permissions for a group, you assign all users in that group the same permissions. For
more information, see User Groups.
You can assign the following access group permissions to a user or user group:
l No Access — (All Users user group only) No users (except for users or groups you specifically
assign permissions) can scan the assets or targets specified in the access group. Also, no
users can view related individual or aggregated scan results for the specified assets or
targets.
l Can View — The user's view in aggregated scan results (workbenches/dashboards) includes
data from scans of the assets or targets specified in the access group. If you assign this
permission to the All Users group for the access group, all users can view aggregated scan
results for the assets or targets in the access group.
l Can Scan — Users can scan assets or targets specified in the access group and view individual
scan results for the assets or targets. If you do not have this permission, Tenable Vulnerability
Management does not prevent you from configuring a scan using assets or targets specified
in the access group; however, the scanner does not scan the assets or targets. If you assign
this permission to the All Users group for the access group, all users can scan the assets or
targets in the access group and view the related individual scan results.
User permissions in an access group are cumulative, rather than hierarchical. To allow a user to
scan an asset or target and view results for that asset or target in aggregated results, you must set
the user's permissions in the access group to both Can View and Can Scan.
Tip: To run scans auditing cloud infrastructure, configure a Scan Target access group that includes the
target 127.0.0.1, and set user permissions to Can Scan.
l
Edit permissions for the All Users user group.
The default values for the All Users user group depends on the access group:
- 314 -
l For the All Assets access group, Tenable Vulnerability Management assigns Can
View and Can Scan permissions to the All Users group by default. Tenable
recommends you restrict these permissions during initial configuration.
l For all other access groups, Tenable Vulnerability Management assigns No Access
permissions to the All Users group by default. For these access groups, set
permissions for the All Users group as follows:
a. Next to the permission drop-down for the All Users group, click the
button.
e. Click Save.
Tenable Vulnerability Management allows any user to view or scan the assets
or targets in the group.
l
Add a user to the access group.
a. In the search box, type the name of a user or group.
Tenable Vulnerability Management adds the user to the access group with the
default Can View permissions and adds the related label to the user listing.
i. Next to the permission drop-down for the user or group, click the button.
Tenable Vulnerability Management adds a Can Scan label to the user listing.
d. Click Save.
- 315 -
l
Add permissions for an existing user.
a. Locate the user or group you want to edit.
b. Next to the permission drop-down for the user or group, click the button.
d. Click Save.
l
Remove permissions from an existing user.
a. Locate the user or group you want to edit.
b. In the label representing the permission you want to remove, click the button.
Tenable Vulnerability Management removes the permission label from the user
listing.
If you remove the last permission for the All Users group, Tenable Vulnerability
Management sets the group permissions to No Access.
If you remove the last permission for an individual user or group, Tenable
Vulnerability Management prompts you to remove the user from the access group.
l
Remove a user from the access group.
a. Click the button next to the user or user group you want to delete.
The user or group disappears from the Users & Groups list.
b. Click Save.
Tenable is retiring access groups. Moving forward, Tenable recommends that you use permissions to
manage user and group access to resources on your Tenable Vulnerability Management instance and that
- 316 -
you convert your existing access groups into permission configurations. For more information, see
Transition to Permission Configurations.
You can edit rules for an existing access group, as well as add or remove users and user groups
assigned to the access group.
Note: You cannot edit the name or rulescriteria for the system-generated All Assets access group.
You can edit the name and criteria for a user-defined access group. You cannot edit the name or
criteria for the system-generated All Assets access group.
Note: In the Users & Groups section, you can view but not edit the user groups in which you've configured
permissions for the access group. To change these permissions, edit each user group.
The Access Control page appears. On this page, you can control user and group access to
resources in your Tenable Web App Scanning account.
The Access Groups pagetab appears. This pagetab contains a table that lists the access
groups to which you have access.
- 317 -
6. In the access groups table, click the access group you want to edit.
7. In the General section, in the Name box, type a new name for the access group.
b. Click Confirm.
l To edit an existing rule, modify the category, operator, and/or value as needed.
10. In the Criteria section, specify the criteria you want Tenable Vulnerability Management to use
when matching assets or targets to the access group:
Option Action
Tags (Manage Assets groups only) To specify tags criteria for the access group:
c. Click a tag.
- 318 -
Tenable Vulnerability Management adds a label representing the tag to
the Search box.
l To remove a tag, roll over a tag in the box , then click the
button next to the label.
Note: Use this option if you want to match assets to the access group using
tags as the only criteria. To match assets on tags and on additional asset
attributes, use the Rules option, then specify one or more tags as rules in
addition to other rules.
Note: You can create a rule based on an existing tag. For more
information, see Tags.
- 319 -
Note: Tenable Vulnerability Management interprets the operator as
'equals' for rules that specify a single IPv4 address, but interprets the
operator as 'contains' for rules that specify an IPv4 range or CIDR range.
d. In the text box, type a valid value for the selected category.
Tip: You can enter multiple values separated by commas. For IPV4
Address, you can use CIDR notation (e.g., 192.168.0.0/24), a range (e.g.,
192.168.0.1-192.168.0.255), or a comma-separated list (e.g., 192.168.0.0,
192.168.0.1).
Note: If you configure multiple rules for an access group, the access
group includes assets or targets that match any of the rules. For example,
if you configure two rules -- one that matches on the Network Name
attribute and one that matches on IPv4 Address, the access group
includes any assets in the specified network, plus any asset with the
specified IPv4 address, regardless of whether that asset belongs to the
specified network.
11. In the Users & Groups section, configure user permissions for the access group.
Tenable Vulnerability Management updates the access group with your changes. The Access
Groups page appears.
Note: When you create or edit an access group, Tenable Vulnerability Management may
take some time to assign assets to the access group, depending on the system load, the
number of matching assets, and the number of vulnerabilities.
- 320 -
You can view the status of this assignment process in the Status column of the access
groups table on the Access Groups page.
What to do next:
l (Optional) Modify the access group permissions in a user group.
Tenable is retiring access groups. Moving forward, Tenable recommends that you use permissions to
manage user and group access to resources on your Tenable Vulnerability Management instance and that
you convert your existing access groups into permission configurations. For more information, see
Transition to Permission Configurations.
If an asset does not match any access group rulescriteria, Tenable Vulnerability Management does
not assign the asset to any access group. These unassigned assets are only visible to usersuser
groups assigned permissions in the All Assets group. If your organization limits membership in the
All Assets group, users who are not members of users in user groups without permissions in the All
Assets group are unable to see these unassigned assets, but this limited visibility may not be
immediately obvious to them. If you are a member of a user group with permissions in the the All
Assets group, you can use a filter to identify these unassigned assets.
2. In the left navigation plane, in the Asset View section, click Assets.
- 321 -
l Category: Belongs to Access Group
l Operator: is equal to
l Value: false
4. Click Apply.
The assets table updates to display all assets that are not assigned to an access group.
Tenable is retiring access groups. Moving forward, Tenable recommends that you use permissions to
manage user and group access to resources on your Tenable Vulnerability Management instance and that
you convert your existing access groups into permission configurations. For more information, see
Transition to Permission Configurations.
Required Tenable Vulnerability Management User Role: Basic, VM Scan Operator, VM Standard, VM Scan
Manager, or Administrator
As an administrator, you can view the rules and assigned users and user groups for any access
group. You can also edit access group parameters.
As a user in any other role, you can view your assigned access groups. This view includes the rules
associated with each access group, but excludes the other users or user groups assigned to the
access group. You cannot edit any access group settings.
Note: The Access Group tile appears only if you have one or more assigned access groups or if you are an
administrator and users on your Tenable Vulnerability Management are assigned to access groups. Once
you convert all your access groups to permission configurations, the Access Group tile will no longer
appear on your account.
- 322 -
3. In the left navigation, click Settings.
The Access Groups pagetab appears. This pagetab contains a table that lists the access
groups to which you have access.
5. The Access Groups page contains a table that includes the following information:
l Last Modified — The date on which a user in your organization last changed the access
group configuration.
l Last Modified By — The user in your organization who last changed the access group
configuration.
l Status — The status of the Tenable Vulnerability Management process matching assets
to the access group. Possible values are Processing or Completed. To view the
percentage complete for an ongoing process, roll over the Processing status.
For administrators, this page contains both rules and assigned users and user groups, and you
can edit all access group parameters.
For users in any other role, this page contains rules only, and you cannot edit the rules.
Tenable is retiring access groups. Moving forward, Tenable recommends that you use permissions to
manage user and group access to resources on your Tenable Vulnerability Management instance and that
you convert your existing access groups into permission configurations. For more information, see
Transition to Permission Configurations.
- 323 -
Note: You cannot delete the system-generated All Assets group.
The Access Groups pagetab appears. This pagetab contains a table that lists the access
groups to which you have access.
l
Select a single access group:
a. In the access groups table, roll over the access group you want to delete.
l
Select multiple access groups:
a. In the access groups table, select the check boxes next to the access groups you
want to delete.
The action bar appears at the bottom of the pagetop of the table.
- 324 -
Tenable Vulnerability Management deletes the selected access group or groups and updates
the access group table.
Tenable is retiring access groups. Moving forward, Tenable recommends that you use permissions to
manage user and group access to resources on your Tenable Vulnerability Management instance and that
you convert your existing access groups into permission configurations. For more information, see
Transition to Permission Configurations.
You can use the filters described in the following sections to create rules for access groups. For
more information, see:
l Tenable-provided Filters
l Tag Filters
Tenable-provided Filters
The last two columns in the following table indicate whether you can use the filter with the Manage
Assets or Scan Targets group type.
Manage Scan
Filter Description
Assets Targets
AWS EC2 AMI ID The unique identifier of the Linux AMI yes no
- 325 -
image in Amazon Elastic Compute Cloud
(Amazon EC2). For more information, see
the Amazon Elastic Compute Cloud
Documentation.
AWS EC2 Product The product code associated with the yes no
Code AMI used to launch the virtual machine
instance in Amazon EC2.
AWS Region The region where AWS hosts the virtual yes no
machine instance, for example, 'us-east-
1'. For more information, see "Regions
and Availability Zones" in the AWS
documentation.
AWS Security Group The security group to which you have yes no
assigned the virtual machine instance in
Amazon EC2. For more information, see
Security Groups in the Amazon Virtual
Private Cloud User Guide.
- 326 -
Azure Resource ID The unique identifier of the resource in yes no
the Azure Resource Manager. For more
information, see the Azure Resource
Manager Documentation.
Google Cloud Zone The zone where the virtual machine yes no
instance runs in GCP. For more
information, see "Regions and Zones" in
the GCP documentation.
IPv4 Address An IPv4 address for the asset. For this yes yes
filter, you can use CIDR notation (e.g.,
192.168.0.0/24), a range (e.g., 192.168.0.1-
192.168.0.255), or a comma-separated
list (e.g., 192.168.0.0, 192.168.0.1).
- 327 -
IPv6 Address An IPv6 address for the asset. no yes
Tag Filters
In Tenable Vulnerability Management, tags allow you to add descriptive metadata to assets that
helps you group assets by business context. For more information, see Tags.
You can use the tags you create to assign assets to Manage Assets access groups.
- 328 -
1. In the Category drop-down box, select Tags.
3. In the text box, type the tag category and value you want to search for in the following format:
4. Continue creating rules and/or save the access group as described in Create an Access Group.
Note: Tag categories with 100,000 or more associated values cannot be applied as a rule to access groups.
Note: Tenable plans to deprecate access groups in the near future. Currently, you can still create and
manage access groups. However, Tenable recommends that you instead use permissions to manage user
and group access to resources on your Tenable Vulnerability Management instance.
This migration affects your existing Tenable Vulnerability Management configuration as follows:
Component Action
l Replaces the All Users toggle with a default All Users group.
Existing system For each existing system target group, Tenable Vulnerability
target groups Management:
- 329 -
l Moves any user with Can Scan permissions in the system target
group to the new access group, and assigns the user Can Scan
permissions for that access group. To ensure users can view
results for the targets, configure Can View permissions for users in
the access group.
Note: This migration does not delete existing system target groups. The
migration removes only the Can Scan permissions from the system target
groups.
Note: If, at the time of migration, an existing target group includes scan
permissions, a Scan label may appear for the group in the Permissions
column of the target groups table in the new Tenable Vulnerability
Management user interface. This label indicates historical scan permissions
only; access groups specify the current scan permissions.
Existing scan Existing scan configurations retain the system target group as a target
configurations, setting. Existing dashboard filters and saved searches retain the system
dashboard filters, target group as a filter setting. If you have Can Use permissions for a
and saved system target group, you can continue to use the system target group to
searches specify a group of targets in a scan configuration and to use the system
target group in filters for dashboards and searches. However, to specify
which users can view scan results for the targets, configure Can View
permissions in the appropriate access group.
Activity Logs
Required User Role: Administrator
On the Activity Logs page, you can view a list of events for all users in your organization's Tenable
Web App Scanning account. You can see when each activity took place, the action, the actor, and
other relevant information about the activity.
Important: Tenable currently retains activity log data for 3 years, after which it is deleted from the Tenable
database.
- 330 -
1. In the upper-left corner, click the button.
The Activity Logs page appears. This page shows a list of activities associated with your
organization's Tenable Web App Scanning account.
5. (Optional) Refine the table data. For more information, see Tenable Web App Scanning Tables.
Filter Description
- 331 -
7. (Optional) To refresh the activity logs table, in the upper-right corner, click the Refresh
button.
l Last 7 Days
l Last 14 Days
l Last 30 Days
l Last 90 Days
l All
What to do next:
l (Optional) Export one or more activity logs.
On the Activity Logs page, you can export one or more activity logs in CSV or JSON format.
The Activity Logs page appears. This page shows a list of activities associated with your
organization's Tenable Web App Scanning account.
5. (Optional) Refine the table data. For more information, see Filter a Table.
- 332 -
6. Select the activity logs that you want to export:
Export
Action
Scope
-or-
In the activity logs table, in the Actions column, click the button
in the row for the activity log you want to export.
b. Click Export.
- 333 -
Note: By default, all fields are selected.
l A text box to set the number of days before the export ages out.
Format Description
Note: If your .csv export file includes a cell that begins with any of the following
characters (=, +, -, @), Tenable Web App Scanning automatically inputs a single
quote (') at the beginning of the cell. For more information, see the related
knowledge base article.
9. (Optional) Deselect any fields you do not want to appear in the export file.
10. In the Expiration box, type the number of days before the export file ages out.
Note: Tenable Web App Scanning allows you to set a maximum of 30 calendar days for export
expiration.
l In the Start Date and Time section, select the date and time on which you want the
export schedule to start.
- 334 -
l In the Time Zone drop-down box, select the time zone to which you want the schedule
to adhere.
l In the Repeat drop-down box, select how often you want the export to repeat.
l In the Repeat Ends drop-down, select the date on which you want the schedule to end.
Note: If you select never, the schedule repeats until you modify or delete the export schedule.
Note: You can enable email notifications with or without scheduling exports.
l In the Add Recipients box, type the email addresses to which you want to send the
export notification.
l (Required) In the Password box, type a password for the export file. You must share this
password with the recipients to allow them to download the file.
Note: Tenable Web App Scanning sends an email to the recipients and from the link in the
email, the recipients can download the file by providing the correct password.
Tenable Web App Scanning begins processing the export. Depending on the size of the
exported data, Tenable Web App Scanning may take several minutes to process the export.
When processing completes, Tenable Web App Scanning downloads the export file to your
computer. Depending on your browser settings, your browser may notify you that the
download is complete.
14. Access the export file via your browser's downloads directory. If you close the export plane
before the download finishes, then you can access your export file from the Exports page.
Tags
You can add your own business context to assets by tagging them with descriptive metadata in
Tenable Web App Scanning. An asset tag is primarily composed of a Category:Value pair. For
- 335 -
example, if you want to group your assets by location, create a Location category with the value
Headquarters. You can then manually apply the tag to individual assets, or you can add rules to the
tag that enable Tenable Web App Scanning to apply the tag automatically to matching assets.
For more information about tag structure and related best practices, see:
Note: If you want to create tags without individual categories, Tenable recommends that you add the
generic category Category, which you can use for all your tags.
The Tags page appears. On this page, you can view your asset tag categories and values.
- 336 -
5. Do one of the following:
To view the categories to which all the tags in your Tenable Web App Scanning
instance are assigned:
a. View your tag categories and relevant data about them in the Categories table:
Column Description
Last Used The username of the user who most recently created or edited the
By tag value or category.
# of Values The number of tag values associated with the tag category.
To view all the tags in your Tenable Web App Scanning instance:
a. Click the Values tab.
The Values page appears, containing a table of all the tags on your Tenable Web App
Scanning instance.
b. View your tags and relevant data about them in the Values table:
Column Description
Updated By The username of the user who last updated the tag category or
value.
- 337 -
Applied Indicates whether the tag is applied Manually or Automatically.
Last Processed The date and time when Tenable Web App Scanning last
processed the scan and applied it to all relevant assets.
As an administrator, you can create an automatic tag for each software type. Then, employees can
search for assets by the Installed Software tag and filter Tenable Web App Scanning assets by the
software type they manage.
Note: For more precise results, set the tag value to the appropriate NVD Common Platform Enumeration
(CPE), for example, cpe:/a:microsoft:office.
- 338 -
1. Create and automatically apply a tag for Oracle assets using the following settings:
Option Value
Value Oracle
l Match All
l Operator: is equal to
l Value: Oracle
2. Create and automatically apply a tag for Wireshark assets using the following settings:
Option Value
Value Wireshark
l Match All
l Operator: is equal to
l Value: Wireshark
3. Instruct employees to use the new tags to filter assets in the assets table or to search for
assets from the tags table.
- 339 -
To make sure employees view and mediate these sensitive assets first, you can create a High
Priority tag and manually add it to assets that you want employees to prioritize. Then, employees
can search for assets using the High Priority tag to filter by the highest priority assets they
manage.
1. Create a tag for your highest priority assets using the following settings:
Option Value
Category Priority
3. Instruct employees to use the new tag to filter assets in the assets table or to search for
assets from the tags table.
To customize asset ACR values, you can use attribute settings within any tag to automatically
update the ACR value for any asset with that tag.
- 340 -
b. In the first box, select an attribute (for example, Asset Criticality Rating (ACR)).
3. Click Save.
Tenable Vulnerability Management updates the attribute for all assets with the tag.
Note: When you override an asset attribute via tags, Tenable Vulnerability Management may take
some time to update the attribute on assets with the tag, depending on the system load and the
number of assets.
Tip: For information about how Tenable Vulnerability Management prioritizes tag-updated ACR
values, see Asset Criticality Rating (ACR).
4. Instruct employees to view the updated ACR values in the assets table.
Note: If you want to create tags without individual categories, Tenable recommends that you add the
generic category Category, which you can use for all your tags.
l Every 12 hours
- 341 -
Note: When you create or edit an automatic tag, Tenable Web App Scanning may take some time to apply
the tag to existing assets, depending on the system load and the number of matching assets.
You can also create a tag without rules and then manually apply the tag to individual assets.
Alternatively, you can manually apply an automatic tag to additional assets that may not meet the
rules criteria for that tag. These manually applied tags are sometimes called static tags.
Manual tags appear with the icon, whereas automatic tags appear with the icon.
Tag
Scenarios Tag Type
Icon
When removing a tag it will display the icon appropriate to how N/A N/A
the tag was applied. For example, if you manually apply an
automatic tag to a host, when editing the tag selections on the
host, the tag appears as manual rather than automatic.
Note: When you create a tag from the Tagging page, you can select from a list of generic asset filters to
create tag rules. If you want to create a tag based on filters that are specific to certain asset types,
Tenable recommends that you create a tag from the Assets page, where you can select additional filters
that are specific to each asset type.
On the Create Tag page, you can create one of the following types of tags:
- 342 -
l Manual — You can create and save a tag to manually apply to individual assets at any time.
Tenable does not automatically apply manual tags to assets.
l Automatic — You can create a tag and add Tag Rules that Tenable Web App Scanning uses to
identify and tag matching assets. Tenable Web App Scanning automatically applies the tag to
assets identified by the rule at specific intervals.
Important: You must add a tag rule to the tag in order for Tenable Web App Scanning to identify and
tag the appropriate assets.
Tip: If your tags fail to apply, the tag rules you configured likely returned too many assets for
Tenable Web App Scanning to process. For example, a long list of Fully Qualified Domain Names
(FQDNs) with wildcards would cover a large number of assets. When this happens, Tenable
recommends reducing the number of assets through stricter tag rules. If needed, you can then use
an additional tag to join each list.
Note: You can create up to 100 tag categories, and each category can have up to 100,000 tags.
The Tags page appears. On this page, you can view your asset tag categories and values.
5. In the upper-right corner of the page, click the Create Tag button.
- 343 -
6. Click the Category drop-down box.
8. From the drop-down box, select an existing category, or if the category is new, click Create
"category name".
Note: You can create a maximum of 100 categories for your Tenable Web App Scanning instance.
9. (Optional) In the Category Description box, type a description of the tag category.
Note: Tag names cannot include commas or be more than 50 characters in length.
Tip: Tenable recommends that you provide a tag name that directly corresponds with the tag
category. For example, if the category is Location, Headquarters would be an appropriate value.
11. (Optional) In the Value Description box, type a description for the new tag.
Tenable Web App Scanning saves the tag to the tags table.
- 344 -
To save and apply the tag automatically:
a. Create a tag rule.
b. Click Save.
Tenable Web App Scanning creates the tag, evaluates existing assets, and automatically
applies the tag to assets that match the tag rules.
Note: When you create an automatic tag, Tenable Web App Scanning may take a few minutes
to apply the tag and update any excluded assets, depending on the system load and the
number of assets.
Tip: When you create a tag, Tenable Web App Scanning automatically creates and assigns "Tag:value
owner permissions" that allow you to manage the tag. If you are an administrator, you can give other users
or groups this permission via the Permissions page.
Automatic Application
Tenable Web App Scanning evaluates assets against tag rules in the following situations:
l When you add a new asset (via scan, connector import, or leveraging the Tenable Web App
Scanning API), Tenable Web App Scanning evaluates the asset against your tag rules.
l When you create or update a tag rule, Tenable Web App Scanning evaluates your assets
against the tag rule.
Note: When you create or edit a tag rule, Tenable Web App Scanning may take some time to apply
the tag to existing assets, depending on the system load and the number of matching assets.
l When you update an existing asset, Tenable Web App Scanning re-evaluates the asset and
removes the tag if the asset's attributes no longer match the tag rules.
Manual Application
If you manually apply a tag that has been configured with rules, Tenable Web App Scanning
excludes that asset from any further evaluation against the rules.
Tag Rules
- 345 -
Tag rules allow Tenable Web App Scanning to automatically apply tags you create to the assets on
your instance that match the tags rules. These automatically applied tags are called dynamic or
automatic tags.
Tag rules are composed of one or more filter-value pairs based on asset attributes. When you
create a rule and add it to a tag, Tenable Web App Scanning applies the tag to all assets on your
instance that match the tag rule.
Note: Tenable Web App Scanning supports a maximum of 35 rules per tag. This limit means that you can
specify a maximum of 35 and or or conditions for a single tag value. Additionally, Tenable Web App
Scanning supports a default maximum of 25 values per individual tag rule. For IPv4, IPv6, and FQDNs,
Tenable Web App Scanning supports a maximum of 1,024 values per individual tag rule.
In the Tags section, you can complete the following tasks with tag rules:
Required Tenable Vulnerability Management Permission: Can Edit, Can Use permission for applicable
asset tags.
When you create or edit a tag to apply automatically, you must create and apply rules to the tag
using tag rules filters. You can create a tag rule in either Basic or Advanced mode.
Caution: If you create a tag rule in Basic mode and then switch to Advanced mode, the rules you created
appear in the Advanced mode format. However, if you switch from Advanced mode to Basic mode,
Tenable Web App Scanning removes all rules from the rules section.
- 346 -
Note: When you create a tag from the Tagging page, you can select from a list of generic asset filters to
create tag rules. If you want to create a tag based on filters that are specific to certain asset types,
Tenable recommends that you create a tag from the Assets page, where you can select additional filters
that are specific to each asset type.
For more information about applying tags automatically, see Considerations for Tags with Rules.
The Tags page appears. On this page, you can view your asset tag categories and values.
The Values page appears, containing a table of all the tags on your Tenable Web App Scanning
instance.
7. For each tag rule you want to create, do one of the following:
- 347 -
To create a tag rule in Basic mode:
Note: Each tag rule filter has different limits on the number of values you can apply to a single
filter. For information about those limits, see Tag Rules Filters.
b. Select a filter.
e. In the first drop-down box, select the operator you want to apply to the filter.
f. In the second drop-down box, select or type one or more values for the filter.
In the Rules section, in the Match Any drop-down box, do one of the following:
l To apply the tag to assets that match any one of the defined rules, select Match
Any.
If an asset matches one or more of the filters defined in the tag rule, Tenable Web
App Scanning applies the tag to that asset.
l To apply the tag only to assets that match all of the filters defined in the tag rule,
select Match All.
- 348 -
An AND operator appears between each rule.
If an asset matches every individual filter defined within the rule, Tenable Web App
Scanning applies the tag to that asset.
Important: If you select Match All and separate the values by commas, Tenable Web
App Scanning processes the string using OR logic, similar to the Match Any option.
h. (Optional) To create another rule, repeat the steps to create a tag rule in Basic mode.
Note: Each tag rule filter has different limits on the number of values you can apply to a single
filter. For information about those limits, see Tag Rules Filters.
Note: If there is a typo in the tag rule, an error appears in the Rules box with a description of
the issue.
Tip: You can use the arrow keys to navigate filter drop-down boxes, and press the Enter key
to select an option.
d. Select one of the following operators. Available operators depend on the filter you
select:
Note: If you want to filter on a value that starts with (') or ("), or includes (*) or (,), then you
must wrap the value in quotation marks (").
- 349 -
Operator Description
exists Filters for items for which the selected filter exists.
does not Filters for items for which the selected filter does not exist.
exist
is not equal Filters for items that do not include the filter value.
to
is greater Filters for items with a value greater than the specified filter value.
than If you want to include the value you specify in the filter, then use
the is greater than or equal to operator.
is greater
than or
equal to
is less than Filters for items with a value less than the specified filter value. If
you want to include the value you specify in the filter, then use the
is less than
is less than or equal to operator.
or equal to
within last Filters for items with a date within a number of hours, days,
months, or years before today. Type a number, then select a unit of
time.
after Filters for items with a date after the specified filter value.
before Filters for items with a date before the specified filter value.
older than Filters for items with a date more than a number of hours, days,
months, or years before today. Type a number, then select a unit of
time.
between Filters for items with a date between two specified dates.
- 350 -
Operator Description
contains Filters for items that contain the specified filter value.
does not Filters for items that do not contain the specified filter value.
contain
l Begin or end with – Filters for values that begin or end with
text you specify. For example, to find all values that begin
with "1", type 1*. To find all values that end in "1", type *1.
l Contains –Filters for values that contain text you specify. For
example, to find all values with a "1" between the first and last
characters, type *1*.
e. Where applicable, to the right of the operator, select or type a value for the filter.
Tip: Some text filters support the character (*) as a wildcard to stand in for a section
of text in the filter value. For example, if you want the filter to include all values that
end in 1, type *1. If you want the filter to include all values that begin with 1, type 1*.
You can also use the wildcard operator to filter for values that contains certain text.
For example, if you want the filter to include all values with a 1 somewhere between
the first and last characters, type *1*.
l Select OR to "match any" assets tagged by the rule. If an asset matches one or
more of the filters defined in the tag rule, Tenable Web App Scanning applies the
- 351 -
tag to that asset.
l Select AND to "match all" assets tagged by the rule. If an asset matches every
individual filter defined within the rule, Tenable Web App Scanning applies the tag
to that asset.
Important: If you select AND and separate the values by commas, Tenable Web App
Scanning processes the string using OR logic, similar to the OR option.
g. (Optional) To create more rules for the tag, repeat steps c-f.
8. Click Save.
Tenable Web App Scanning creates the rule and applies it to the tag.
Tip: When you create a tag, Tenable Web App Scanning automatically creates and assigns "Tag:value
owner permissions" that allow you to manage the tag. If you are an administrator, you can give other users
or groups this permission via the Permissions page.
Required Tenable Vulnerability Management Permission: Can Edit, Can Use permission for applicable
asset tags.
Once you create an automatic tag, you can edit the rules that apply to the tag from the Edit Value
page.
Note: When you edit rules from the Tagging page, you can select from a list generic asset filters to create
tag rules. However, if you want to add filters that are specific to a certain asset type (e.g., web application
assets), Tenable recommends that you edit the tag from the Assets page, where you can select filters that
are specific to each asset type.
- 352 -
1. In the upper-left corner, click the button.
The Tags page appears. On this page, you can view your asset tag categories and values.
The Values page appears, containing a table of all the tags on your Tenable Web App Scanning
instance.
6. In the tags table, click the tag for which you want to edit a tag rule.
Tip: You can also navigate to the Edit Value page from the Edit Category page by clicking the tag
you want to review in the Values table.
8. In the Rules section, in the rule filter you want to edit, click the button.
A drop-down box appears with the lists of rule values previously selected for that filter.
- 353 -
Note: If the rule filter has selectable options (e.g., dates ranges), those options appear below the
filter. Otherwise, you must type the value.
Tenable Web App Scanning save your changes, evaluates existing assets, and automatically
applies the tag to assets that match the updated tag rules.
Note: Tenable Web App Scanning may take some time to apply the tag to assets and update asset
attributes, depending on the system load and the number of assets.
Required Tenable Vulnerability Management Permission: Can Edit, Can Use permission for applicable
asset tags.
When you delete a rule from an automatic tag, Tenable Web App Scanning removes the tag from
any assets that match the tag rule. When you delete all rules from an automatic tag, the tag
becomes a manual tag.
- 354 -
The Tags page appears. On this page, you can view your asset tag categories and values.
The Values page appears, containing a table with all the tags on your Tenable Web App
Scanning instance.
6. In the tags table, click the tag from which you want to delete a tag rule.
Tip: You can also navigate to the Edit Value page from the Edit Category page by clicking the tag
you want to review in the Values table.
7. In the Rules section, in the rule you want to delete, click the button.
8. Click Save.
Note: If there is a typo in the tag rule, an error appears in the Rules box with a description of the issue.
Note: Tenable Web App Scanning supports a maximum of 35 rules per tag. This limit means that you can
specify a maximum of 35 and or or conditions for a single tag value. Additionally, Tenable Web App
Scanning supports a default maximum of 25 values per individual tag rule. For IPv4, IPv6, and FQDNs,
Tenable Web App Scanning supports a maximum of 1,024 values per individual tag rule.
On the Tags page, you can select from the following filters to create rules for an automatic tag:
Filter Description
Account ID The unique identifier assigned to the asset resource in the cloud
service that hosts the asset.
ACR (Requires Tenable Lumin license) The asset's ACR (Asset Criticality
Rating).
- 355 -
ACR Severity (Requires Tenable Lumin license) (Requires Tenable One or Tenable
Lumin license) The ACR category of the ACR calculated for the asset.
AES Severity (Requires Tenable Lumin license) (Requires Tenable Lumin license) The
AES category of the AES calculated for the asset.
Agent Name The name of the Tenable Nessus agent that scanned and identified the
asset.
Assessed vs. Specifies whether Tenable Web App Scanning scanned the asset for
Discovered vulnerabilities or if Tenable Web App Scanning only discovered the
asset via a discovery scan. Possible values are:
l Assessed
l Discovered Only
AWS Availability The name of the Availability Zone where AWS hosts the virtual machine
Zone instance. For more information, see Regions and Zones in the AWS
documentation.
AWS EC2 AMI ID The unique identifier of the Linux AMI image in Amazon Elastic
Compute Cloud (Amazon EC2). For more information, see the Amazon
Elastic Compute Cloud Documentation.
AWS EC2 Instance The unique identifier of the Linux instance in Amazon EC2. For more
ID information, see the Amazon Elastic Compute Cloud Documentation.
AWS EC2 Name The name of the virtual machine instance in Amazon EC2.
AWS EC2 Product The product code associated with the AMI used to launch the virtual
Code machine instance in Amazon EC2.
- 356 -
AWS Instance State The state of the virtual machine instance in AWS at the time of the
scan. For possible values, see InstanceState in the Amazon Elastic
Compute Cloud Documentation.
AWS Instance Type The type of virtual machine instance in Amazon EC2. Amazon EC2
instance types dictate the specifications of the instance (for example,
how much RAM it has). For a list of possible values, see Amazon EC2
Instance Types in the AWS documentation.
AWS Owner ID A UUID for the Amazon AWS account that created the virtual machine
instance. For more information, see View AWS Account Identifiers in
the AWS documentation.
This attribute contains a value for Amazon EC2 instances only. For
other asset types, this attribute is empty.
AWS Region The region where AWS hosts the virtual machine instance, for example,
us-east-1.
AWS Security The AWS security group (SG) associated with the Amazon EC2 instance.
Group
AWS Subnet ID The unique identifier of the AWS subnet where the virtual machine
instance was running at the time of the scan.
AWS VPC ID The unique identifier of the public cloud that hosts the AWS virtual
machine instance. For more information, see the Amazon Virtual
Private Cloud Documentation.
Azure Resource The name of the resource group in the Azure Resource Manager. For
Group more information, see the Azure Resource Manager Documentation.
Azure Resource ID The unique identifier of the resource in the Azure Resource Manager.
For more information, see the Azure Resource Manager documentation.
Azure Resource The resource type of the resource in the Azure Resource Manager. For
Type more information, see the Azure Resource Manager Documentation.
Azure Subscription The unique subscription identifier of the resource in the Azure
ID Resource Manager. For more information, see the Azure Resource
- 357 -
Manager Documentation.
Azure VM ID The unique identifier of the Microsoft Azure virtual machine instance.
For more information, see the Azure Resource Manager documentation.
Cloud Provider The name of the cloud provider that hosts the asset.
Created Date The time and date when Tenable Web App Scanning created the asset
record.
Custom Attribute A filter that searches for custom attributes via a category-value pair.
For more information about custom attributes, see the Tenable
Developer Portal.
Deleted Date The date when a user deleted the asset record or the number of days
since a user deleted the asset. When a user deletes an asset record,
Tenable Web App Scanning retains the record until the asset ages out
of the license count.
Note: This does not apply to Web Application assets, for which you must
use the Name filter.
Domain The domain which has been added as a source or discovered by ASM as
belonging to a user.
First Seen The date and time when a scan first identified the asset.
Google Cloud The unique identifier of the virtual machine instance in Google Cloud
Instance ID Platform (GCP).
Google Cloud The customized name of the project to which the virtual machine
Project ID instance belongs in GCP. For more information, see Creating and
Managing Projects in the GCP documentation.
Google Cloud Zone The zone where the virtual machine instance runs in GCP. For more
- 358 -
information, see Regions and Zones in the GCP documentation.
Has Plugin Results Specifies whether the asset has plugin results associated with it.
Host Name (Domain The host name for assets found during attack surface management
Inventory) scans; only for use with Domain Inventory assets.
IaC Resource Type The Infrastructure as Code (IAC) resource type of the asset.
Installed Software A list of Common Platform Enumeration (CPE) values that represent
applications identified on an asset from a scan. This field supports the
CPE 2.2 format. For more information, see the Component Syntax
section of the CPE Specification documentation. For assets identified
in Tenable scans, this field only contains data when a scan using
Tenable Nessus Plugin 45590 has evaluated the asset.
IPv4 Address The IPv4 address associated with the asset record..
Note: A CIDR mask of /0 is not supported for this parameter, because that
value would match all IP addresses. If you submit a /0 value for this
parameter, Tenable Web App Scanning returns a 400 Bad Request error
message.
Note: Ensure the tag filter value does not end in a period.
IPv6 Address An IPv6 address that a scan has associated with the asset record.
- 359 -
Note: Ensure the tag filter value does not end in a period.
Last Audited The time and date at which the asset was last audited.
Last Authenticated The date and time of the last authenticated scan run against the asset.
Scan An authenticated scan that only uses discovery plugins updates the
Last Authenticated Scan field, but not the Last Licensed Scan field.
Last Licensed Scan The date and time of the last scan in which the asset was considered
"licensed" and counted towards Tenable's license limit. A licensed scan
uses non-discovery plugins and can identify vulnerabilities.
Unauthenticated scans that run non-discovery plugins update the Last
Licensed Scan field, but not the Last Authenticated Scan field. For
more information on how licenses work, see Tenable Web App
Scanning Licenses.
Last Seen The date and time of the scan that most recently identified the asset.
Licensed Specifies whether the asset is included in the asset count for the
Tenable Web App Scanning instance.
MAC Address A MAC address that a scan has associated with the asset record.
Mitigation Last The date and time of the scan that last identified mitigation software
Detected on the asset.
Name The asset identifier that Tenable Web App Scanning assigns based on
the presence of certain asset attributes in the following order:
2. NetBIOS Name
3. FQDN
- 360 -
4. IPv6 address
5. IPv4 address
For example, if scans identify a NetBIOS name and an IPv4 address for
an asset, the NetBIOS name appears as the Asset Name.
Network The name of the network object associated with scanners that
identified the asset. The default name is Default. For more information,
see Networks.
Operating System The operating system that a scan identified as installed on the asset.
Resource Category The name of the category to which the cloud resource type belongs (for
example, object storage or virtual network).
Resource Tags (By Tags synced from a cloud source, such as Amazon Web Services (AWS),
Key) matched by the tag key (for example, Name).
Resource Tags (By Tags synced from a cloud source, such as Amazon Web Services (AWS),
Value) matched by the tag value.
Resource Type The asset's cloud resource type (for example, network, virtual machine).
ServiceNow Sys ID Where applicable, the unique record identifier of the asset in
ServiceNow. For more information, see the ServiceNow
documentation.
Source The source of the scan that identified the asset. Possible filter values
- 361 -
are:
l AWS
l AWS FA
l Azure
l AZURE FA
l Cloud Connector
l Cloud IAC
l Cloud Runtime
l GCP
l Nessus Agent
l Nessus Scan
l NNM
l ServiceNow
l WAS
SSL/TLS Specifies whether the application on which the asset is hosted uses
SSL/TLS public-key encryption.
System Type The system types as reported by Plugin ID 54615. For more information,
see Tenable Plugins.
Tags Asset tags, entered in pairs of category and value (for example
Network: Headquarters). This includes the space after the colon (:). If
there is a comma in the tag name, insert a backslash (\) before the
comma. If your tag name includes double quotation marks (" "), use the
UUID instead. You can add a maximum of 100 tags.
Target Groups The target group to which the asset belongs. This attribute is empty if
the asset does not belong to a target group. For more information, see
- 362 -
Target Groups.
Type The system type on which the asset is managed. Possible filter values
are:
l Cloud Resource
l Container
l Host
l Cloud
Updated Date The time and date when a user last updated the asset.
VPC The unique identifier of the public cloud that hosts the AWS virtual
machine instance. For more information, see the Amazon Virtual
Private Cloud User Guide.
When you filter your assets, you can use the filters as tag rules to create a new automatic tag.
After you create the tag, Tenable Web App Scanning automatically applies the tag to any assets
identified through those filters.
You can also create a manual or automatic tag for your assets from the Tagging page.
- 363 -
3. In the left navigation, click Assets.
4. Filter the table, selecting and deselecting filters based on the rules you want to add to or
remove from your tag.
The filters you selected appear in the header above the filter plane.
5. In the header, to the left of the first filter, click Add Tags.
7. In the drop-down box, select an existing category, or if the category is new, click Create
"category ".
Tip: You can create a generic tag category and apply to different tag values to group your tags. For
example, if you create a Location category, you can apply it to multiple values such as Headquarters
or Offshore to create a group of location tags.
- 364 -
8. Under Create/Select Tag, in the second drop-down box, type a value for your new tag.
Tenable Web App Scanning saves the tag and applies it to applicable assets on your account.
Note: It can take up to several minutes for Tenable Web App Scanning to apply a tag to the
applicable assets.
Required Tenable Vulnerability Management Permission: Can Edit, Can Use permission for applicable
asset tags.
In the Tagging section, you can edit one or more components of a tag, including the category to
which the tag belongs as well as the tag's name and description and any rules applied to the tag.
The Tags page appears. On this page, you can view your asset tag categories and values.
- 365 -
a. On the Tags page, click the Values tab.
The Values page appears, containing a table with all the tags on your Tenable Web App
Scanning instance.
Tip: You can also navigate to the Edit Value page from the Edit Category page by clicking the
tag you want to review in the Values table.
d. (Optional) In the Value Description (Optional) box, edit the tag description.
Note: When you edit a tag category, Tenable Web App Scanning changes the category for all the
tags in that category.
a. In the tag categories table, click the category you want to edit.
b. In the tag categories table, click the category you want to edit.
c. (Optional) To edit the name, in the Category box, type a new name.
d. (Optional) To edit the description, in the Category Description box, type a new
description.
7. Click Save.
Required Tenable Vulnerability Management User Role: Basic, VM Scan Operator, VM Standard, VM Scan
Manager, or Administrator
- 366 -
Required Tenable Vulnerability Management Permission: Can Edit, Can Use permission for applicable
asset tags.
On the Assets page, you can use asset filters to edit a tag's rules, category, and value.
4. Filter the table, selecting and deselecting filters based on the rules you want to add to or
remove from your tag.
The filters you applied appear in the header above the filter plane.
5. In the header, to the left of the first filter, click the button.
a. Under Recently Used Tags, click the tag you want to edit.
The tag category appears in the Select or create Category drop-down box.
The tag value appears in the Select or create Value drop-down box.
- 367 -
b. Select the category for the tag you want to edit.
d. In the drop-down box, select the value for the tag you want to edit.
a. In the Select or create Category drop-down box, type a new name for your category.
a. In the Select or create Value drop-down box, type a new value for your tag.
9. (Optional) In the Chosen Search Filters for Tag box, click the inside any filters you want to
remove from the tag.
Required Tenable Vulnerability Management User Role: Basic, VM Scan Operator, VM Standard, VM Scan
Manager, or Administrator
Required Tenable Vulnerability Management Permission: Can Use permission for applicable asset tags.
After you create a tag, you can manually apply it to one or more assets on your Tenable Web App
Scanning instance.
- 368 -
1. View your assets list.
2. (Optional) Refine the table data. For more information, see Tenable Web App Scanning
Workbench Tables.
- 369 -
a. Select the page where you want to add the tag:
Location Action
-or-
- 370 -
The actions menu appears.
-or-
b. Click Add.
The assets table appears. A confirmation message also appears. Tenable Web App
Scanning adds the tags specified in Tags to be Added to the assets.
The assets table appears. A confirmation message also appears. Tenable Web App
Scanning adds the tags specified in Tags to be Added to the assets.
Tip: To remove a tag from Tags to be Added, roll over the tag and click the button.
- 371 -
b. From the drop-down box, select an existing category, or if the category is new, click
Create "category name".
Tip: You can create a generic tag category and apply to different tag values to group your
tags. For example, if you create a Location category, you can apply it to multiple values such
as Headquarters or Offshore to create a group of location tags.
d. From the drop-down box, select an existing value, or if the value is new, click Create
"value".
Note: The system does not save new tags you create by this method until you add the new tags to
the asset.
Tip: To remove a tag from Tags to be Added, roll over the tag and click the button.
5. Click Add.
The assets table appears. A confirmation message also appears. Tenable Web App Scanning
adds the tags specified in Tags to be Added to the assets.
When editing a tag to apply manually or automatically, you can specify asset attributes you want
Tenable Vulnerability Management to override for all assets with the tag.
For example, you can select the ACR attribute to bulk update a specific ACR value to all assets with
the tag.
Tip: For information about ACR prioritization, see Override Asset Attributes via Tag.
- 372 -
1. Begin creating a tag.
2. To automatically override an asset attribute for all assets with this tag, edit the attributes:
b. In the first box, select an attribute (for example, Asset Criticality Rating (ACR)).
3. Click Save.
Tenable Vulnerability Management updates the attribute for all assets with the tag.
Note: When you override an asset attribute via tags, Tenable Vulnerability Management may take
some time to update the attribute on assets with the tag, depending on the system load and the
number of assets.
Tip: For information about how Tenable Vulnerability Management prioritizes tag-updated ACR
values, see Asset Criticality Rating (ACR).
Export Tags
On the Tags page, you can export tag categories and values in CSV or JSON format.
- 373 -
4. Click the Tagging tile.
The Tags page appears. On this page, you can view your asset tag categories and values.
5. (Optional) Refine the table data. For more information, see Tenable Web App Scanning
Workbench Tables.
- 374 -
a. Select the tag categories that you want to export:
-or-
b. Click Export.
The Values tab appears. This tab consists of a table that contains all your tag values.
- 375 -
Export
Action
Scope
-or-
b. Click Export.
- 376 -
l A text box to set the number of days before the export expires.
Format Description
CSV A CSV text file that contains a list of tag categories or values.
Note: If your .csv export file includes a cell that begins with any of the following
characters (=, +, -, @), Tenable Web App Scanning automatically inputs a single
quote (') at the beginning of the cell. For more information, see the related
knowledge base article.
JSON A JSON file that contains a nested list of tag categories or values.
9. (Optional) Deselect any fields you do not want to appear in the export file.
10. In the Expiration box, type the number of days before the export file expires.
Note: Tenable Vulnerability Management allows you to set a maximum of 30 calendar days for export
expiration.
l In the Start Date and Time section, select the date and time on which you want the
export schedule to start.
l In the Time Zone drop-down box, select the time zone to which you want the schedule
to adhere.
l In the Repeat drop-down box, select how often you want the export to repeat.
- 377 -
l In the Repeat Ends drop-down, select the date on which you want the schedule to end.
Note: If you select never, the schedule repeats until you modify or delete the export schedule.
Note: You can enable email notifications with or without scheduling exports.
l In the Add Recipients box, type the email addresses to which you want to send the
export notification.
l (Required) In the Password box, type a password for the export file. You must share this
password with the recipients to allow them to download the file.
Note: Tenable Web App Scanning sends an email to the recipients and from the link in the
email, the recipients can download the file by providing the correct password.
Tenable Web App Scanning begins processing the export. Depending on the size of the
exported data, Tenable Web App Scanning may take several minutes to process the export.
When processing completes, Tenable Web App Scanning downloads the export file to your
computer. Depending on your browser settings, your browser may notify you that the
download is complete.
14. Access the export file via your browser's downloads directory. If you close the export plane
before the download finishes, then you can access your export file in the Export Management
View.
Required Tenable Vulnerability Management Permission: Can Edit, Can Use permission for applicable
asset tags.
- 378 -
When you delete a tag category, Tenable Web App Scanning deletes any tags created under that
category and removes those tags from all assets where they were applied.
Caution: When you delete a tag category, all associated values and assignments are also deleted. If you
want to remove a specific tag, see Delete a Tag .
The Tags page appears. On this page, you can view your asset tag categories and values.
A menu appears.
A confirmation window appears, asking if you are sure that you want to delete the
category and all associated tags and assignments.
- 379 -
a. In the tag category table, select the check box for each category you want to delete.
The action bar appears at the bottom of the pagetop of the table.
A confirmation window appears, asking if you are sure that you want to delete the
category and all associated tags and assignments..
7. Click Delete.
Tenable Web App Scanning deletes the tag category and any associated tags, and removes
those tags from all assets where you applied them.
Delete a Tag
Required Tenable Vulnerability Management Permission: Can Edit, Can Use permission for applicable
asset tags.
When you delete a tag, Tenable Web App Scanning removes that specific tag from all assets where
you applied the tag.
The Tags page appears. On this page, you can view your asset tag categories and values.
- 380 -
5. Delete a one or more tags:
Scope of
Action
Deletion
The Values tab appears, displaying a table with all the tags on your
Tenable Web App Scanning instance in Category:Value format.
b. In the tags table, right-click the row for the tag you want to delete.
-or-
In the tags table, in the Actions column, click the button for the
tag you want to delete.
c. Click Delete.
The Values tab appears, displaying a table with all the tags on your
Tenable Web App Scanning instance in Category:Value format.
b. In the tags table, select the check box for each tag you want to
delete.
-or-
- 381 -
7. To delete one tag:
a. In the tags table, roll over the tag you want to delete.
The action bar appears at the bottom of the pagetop of the table.
8. Click Confirm.
Tenable Web App Scanning deletes the tag and removes it from all assets where you applied
the tag.
Required Tenable Vulnerability Management User Role: VM Scan Operator, VM Standard, VM Scan
Manager, or Administrator
You can see which assets have a specific tag applied by searching for assets by tag.
- 382 -
4. Click the Tagging tile.
The Tags page appears. On this page, you can view your asset tag categories and values.
The Assets page appears and displays the assets table filtered by the tag you selected.
Cloud Sensors
By default, Tenable provides regional cloud sensors for use in Tenable Web App Scanning. You can
select these sensors when you create and launch scans.
The following table identifies each regional cloud sensor and, for allow list purposes, its IP address
ranges. These IP address ranges are exclusive to Tenable.
Note: If you use cloud connectors, Tenable recommends allowlisting the IP addresses for the region in which
the site resides.
- 383 -
Note: While these IP addresses are for outbound requests, only the tenable.io sensor group IP addresses
are used for inbound cloud.tenable.com requests.
Tip: The cloud sensor and IP address information contained in the table below is also provided in JSON
format for users that want to parse the data programmatically.
For Cloud IPs associated with Tenable Attack Surface Management, see Cloud Sensors in the
Tenable Attack Surface Management User Guide.
- 384 -
Sensor Region IPv4 Range IPv6 Range
35.93.174.0/24
Note: For troubleshooting Tenable Web App Scanning issues with Tenable Support, you may be asked to
add the following IP range to your allow list:
l 13.59.250.76/32
l US East Cloud Scanners: A group of scanners from the us-east-1 (Virginia) or the us-east-2
(Ohio) ranges.
l US West Cloud Scanners: A group of scanners from the us-west-1 (California) or the us-west-
2 (Oregon) ranges.
- 385 -
l AP Singapore Cloud Scanners: A group of scanners from the ap-southeast-1 (Singapore)
range.
l AP Sydney Cloud Scanners: A group of scanners from the ap-southeast-2 (Sydney) range.
l AP Tokyo Cloud Scanners: A group of scanners from the ap-northeast-1 (Tokyo) range.
l CA Central Cloud Scanners: A group of scanners from the ca-central-1 (Canada) range.
l EU Frankfurt Cloud Scanners: A group of scanners from the eu-central-1 (Frankfurt) range.
l Brazil Cloud Scanners: A group of scanners from the sa-east-1 (São Paulo) range.
l India Cloud Scanners: A group of scanners from the ap-south-1 (Mumbai) range.
l Amazon GOV-CLOUD: A group of scanners available for Federal Risk and Authorization
Management Program (FedRAMP) environments.
l us-east-1 (Virginia)
l us-east-2 (Ohio)
l us-west-1 (California)
l us-west-2 (Oregon)
l APAC Cloud Scanners: A group of scanners from the following AWS ranges:
o ap-northeast-1 (Tokyo)
o ap-southeast-1 (Singapore)
o ap-southeast-2 (Sydney)
o ap-south-1 (Mumbai)
l EMEA Cloud Scanners: A group of scanners from the following AWS ranges:
o eu-west-1 (Ireland)
o eu-west-2 (London)
- 386 -
o eu-central-1 (Frankfurt)
o me-central-1 (UAE)
Note: If you are connecting to Tenable Vulnerability Management through Tenable Nessus scanners,
Tenable Nessus Agents, Tenable Web App Scanning scanners, or Tenable Nessus Network Monitors (NNM)
located in mainland China, you must connect through sensor.cloud.tenablecloud.cn instead of
sensor.cloud.tenable.com.
l For internal scanner or agent communications, add the following IP ranges to your allow list:
o 52.61.37.84
o 15.200.117.191
o 172.65.64.208 (Available September 3, 2024)
o 172.65.64.209 (Available September 3, 2024)
o 172.65.64.210 (Available September 3, 2024)
o 172.65.64.211 (Available September 3, 2024)
o 2606:4700:78::120:0:1200 (Available September 3, 2024)
o 2606:4700:78::120:0:1201 (Available September 3, 2024)
o 2606:4700:78::120:0:1202 (Available September 3, 2024)
o 2606:4700:78::120:0:1203 (Available September 3, 2024)
Credentials
- 387 -
Note: This section describes creating and maintaining managed credentials. For more information about
scan-specific or policy-specific credentials, see Credentials in Tenable Vulnerability Management Scans or
Credentials in Tenable Web App Scanning Scans.
Managed credentials allow you to store credential settings centrally in a credential manager. You
can then add those credential settings to multiple scan configurations instead of configuring
credential settings for each individual scan.
You and users to whom you grant permissions can use managed credentials in scans. Credential
user permissions control which users can use and edit managed credentials.
Required Tenable Vulnerability Management User Role: Basic, VM Scan Operator, VM Standard, VM Scan
Manager, or Administrator
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
This topic describes creating a managed credential in the Tenable Web App Scanning credential
manager.
You can also create a managed credential during scan configuration, as well as convert a scan-
specific credential to a managed credential. For more information, see Add a Credential to a Scan
(Tenable Vulnerability Management) or Configure Credentials Settings in Tenable Web App
Scanning.
- 388 -
1. In the upper-left corner, click the button.
The Credentials page appears. The credentials table lists the managed credentials you have
permission to view.
5. In the upper-right corner of the page, click the Create Credential button.
- 389 -
6. Do one of the following:
- 390 -
8. (Optional) In the Description box, type a description for the credential.
For more information about credential settings, see Credentials (Tenable Vulnerability
Management) or Credentials (Tenable Web App Scanning).
Tenable Web App Scanning adds the credential to the credentials table in the Credentials
page.
Required Tenable Vulnerability Management User Role: Basic, VM Scan Operator, VM Standard, VM Scan
Manager, or Administrator
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
This topic describes editing a credential in the Tenable Vulnerability Management credential
manager.
You can also edit managed credentials during scan configuration. For more information, see Add a
Credential to a Scan for Tenable Vulnerability Management or Configure Credentials Settings in a
Tenable Web App Scanning Scan for Tenable Web App Scanning.
You can edit any credentials where you have Can Edit permission.
- 391 -
The Settings page appears.
The Credentials page appears. The credentials table lists the managed credentials you have
permission to view.
5. Filter or search the credentials table for the credential you want to edit. For more information,
see Tenable Web App Scanning Tables.
6. In the credentials table, click the name of the credential you want to edit.
l
Edit the credential name or description.
a. Roll over the name or description box.
d. Click the button at the lower right corner of the box to save your changes.
l Edit the settings for the credential type. For more information about these settings, see
Credentials (Tenable Vulnerability Management) or Credentials (Tenable Web App
Scanning).
8. Click Save.
Required Tenable Vulnerability Management User Role: Basic, VM Scan Operator, VM Standard, VM Scan
Manager, or Administrator
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
You configure user permissions for a managed credential separately from the permissions you
configure for the scans where you use the credential.
- 392 -
You can configure credential permissions for individual users or a user group. If you configure
credential permissions for a group, you assign all users in that group the same permissions. You
may want to create the equivalent of a credential manager role by creating a group for the users
you want to manage credentials. For more information, see User Groups.
If you create a managed credential, Tenable Web App Scanning automatically assigns you Can Edit
permissions.
Location Action
l
Add permissions for a user or user group.
Tip: Tenable recommends assigning permissions to user groups, rather than individual users,
to minimize maintenance as individual users leave or join your organization.
a. In the credential settings plane, click the button next to the User Permissions
title.
d. Click the button next to the permission drop-down for the user or group.
- 393 -
l Can Use — The user can view the credential in the managed credentials table
and use the credential in scans.
l Can Edit — The user can view and edit credential settings, delete the
credential, and use the credential in scans.
f. Click Add.
g. Click Save.
l
Edit permissions for a user or user group.
a. In the User Permissions section of the credential settings plane, click the
button next to the permission drop-down for the user or group.
l Can Use — The user can view the credential in the managed credentials table
and use the credential in scans.
l Can Edit — The user can view and edit credential settings, delete the
credential, and use the credential in scans.
c. Click Save.
l
Delete permissions for a user or user group.
a. In the User Permissions section of the credential settings plane, roll over the user
or group you want to delete.
c. Click Save.
Export Credentials
On the Credentials page, you can export the data for one or more managed credentials.
- 394 -
Note: When you export credential data, authentication details such as usernames, passwords, or keys are
not included in the export.
The Credentials page appears. The credentials table lists the managed credentials you have
permission to view.
5. (Optional) Refine the table data. For more information, see Tenable Web App Scanning
Workbench Tables.
- 395 -
A single To export a single credential:
credential
a. In the credentials table, right-click the row for the credential you
want to export.
-or-
b. Click Export.
l A text box to set the number of days before the export expires.
Format Description
Note: If your .csv export file includes a cell that begins with any of the following
characters (=, +, -, @), Tenable Web App Scanning automatically inputs a single
- 396 -
quote (') at the beginning of the cell. For more information, see the related
knowledge base article.
9. (Optional) Deselect any fields you do not want to appear in the export file.
10. In the Expiration box, type the number of days before the export file expires.
Note: Tenable Web App Scanning allows you to set a maximum of 30 calendar days for export
expiration.
l In the Start Date and Time section, select the date and time on which you want the
export schedule to start.
l In the Time Zone drop-down box, select the time zone to which you want the schedule
to adhere.
l In the Repeat drop-down box, select how often you want the export to repeat.
l In the Repeat Ends drop-down, select the date on which you want the schedule to end.
Note: If you select never, the schedule repeats until you modify or delete the export schedule.
Note: You can enable email notifications with or without scheduling exports.
- 397 -
l In the Add Recipients box, type the email addresses to which you want to send the
export notification.
l (Required) In the Password box, type a password for the export file. You must share this
password with the recipients to allow them to download the file.
Note: Tenable Web App Scanning sends an email to the recipients and from the link in the
email, the recipients can download the file by providing the correct password.
Tenable Web App Scanning begins processing the export. Depending on the size of the
exported data, Tenable Web App Scanning may take several minutes to process the export.
When processing completes, Tenable Web App Scanning downloads the export file to your
computer. Depending on your browser settings, your browser may notify you that the
download is complete.
14. Access the export file via your browser's downloads directory. If you close the export plane
before the download finishes, then you can access your export file from the Exports page.
Required Tenable Vulnerability Management User Role: Basic, VM Scan Operator, VM Standard, VM Scan
Manager, or Administrator
Required Tenable Web App Scanning User Role: Basic, Scan Operator, Standard, Scan Manager, or
Administrator
You can delete any credentials where you have Can Edit permission.
- 398 -
3. In the left navigation, click Settings.
The Credentials page appears. The credentials table lists the managed credentials you have
permission to view.
5. Filter or search the credentials table for the credential you want to delete. For more
information, see Tenable Web App Scanning Tables.
l
If any scans use the credential:
a. Click View Scans.
- 399 -
Allowlist
Files
/opt/ruby/lib/ruby/*/bundler/templates/newgem/bin/*.tt
/opt/ruby/lib/ruby/gems/*/gems/bundler-*/lib/bundler/templates/newgem/bin/*.tt
Processes
/opt/nessus-was-scanner-*/bin/*
/opt/nessus-was-scanner-*/bundle/ruby/*/bin/*
/opt/nessus-was-scanner-*/bundle/ruby/*/gems/*/bin/*
/opt/openssl/bin/*
/opt/ruby/bin/*
/opt/ruby/lib/ruby/*/bundler/templates/newgem/bin/*
/opt/ruby/lib/ruby/gems/*/gems/*/bin/*
- 400 -