<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: In the Tenable Add-On for Splunk, what is the best way to determine if a vulnerability still exists on a host system? in All Apps and Add-ons</title>
    <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/In-the-Tenable-Add-On-for-Splunk-what-is-the-best-way-to/m-p/421513#M51387</link>
    <description>&lt;P&gt;The state changes when 1) an open vulnerability is fixed (mitigated) OR 2) a previously fixed vulnerability is found again on the same machine. The possible states are open, reopened and fixed. &lt;/P&gt;</description>
    <pubDate>Thu, 11 Oct 2018 00:17:07 GMT</pubDate>
    <dc:creator>nkeuning</dc:creator>
    <dc:date>2018-10-11T00:17:07Z</dc:date>
    <item>
      <title>In the Tenable Add-On for Splunk, what is the best way to determine if a vulnerability still exists on a host system?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/In-the-Tenable-Add-On-for-Splunk-what-is-the-best-way-to/m-p/421506#M51380</link>
      <description>&lt;P&gt;Unless I'm missing something, it appears that the add-on only collects scan results if the vulnerability has not been previously discovered on a system.  An event is created in Splunk when a vulnerability is first discovered on a system, but no event is created on subsequent scans that continue to detect that vulnerability.  &lt;/P&gt;

&lt;P&gt;In order to determine if a vulnerability exists on a system, I believe I have to run an all-time search looking for the existence of the vulnerability and then excluding it if I find a later result where &lt;CODE&gt;hasBeenMitigated&lt;/CODE&gt; is set to true.  Is this correct?  Or is there an easier way to determine if a vulnerability still exists on a system?&lt;/P&gt;

&lt;P&gt;One use-case for this is to be able to compare vulnerabilities to details from our AV software.  For example: If we learn about a new vulnerability that exists in the wild and our AV software has released an update to cover the exploit, we need to be able to search for systems that are vulnerable to the exploit according to Tenable and have not yet received the update to the AV software.&lt;/P&gt;

&lt;P&gt;Is there a good way to accomplish this without needing to do an all-time search for the earliest instance of a vulnerability being discovered on a system?&lt;/P&gt;

&lt;P&gt;In the Splunk-built version of the add-on, it appears to import all scan results regardless of whether it has been previously discovered or not.  However, it does not include any adaptive responses, so I'd rather use the version built by Tenable.&lt;/P&gt;</description>
      <pubDate>Tue, 09 Oct 2018 19:09:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/In-the-Tenable-Add-On-for-Splunk-what-is-the-best-way-to/m-p/421506#M51380</guid>
      <dc:creator>rrustong</dc:creator>
      <dc:date>2018-10-09T19:09:29Z</dc:date>
    </item>
    <item>
      <title>Re: In the Tenable Add-On for Splunk, what is the best way to determine if a vulnerability still exists on a host system?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/In-the-Tenable-Add-On-for-Splunk-what-is-the-best-way-to/m-p/421507#M51381</link>
      <description>&lt;P&gt;Hi rrustong,&lt;/P&gt;

&lt;P&gt;You are correct, we store only one event for each open vulnerability. This event is created/stored based on the firstSeen/first_seen date field.  Your logic is correct, the only thing i might suggest is some de-duping and leveraging the state field.  Here is an example i would use for SecurityCenter data:&lt;BR /&gt;
&lt;CODE&gt;get_tenable_index\&lt;/CODE&gt; sourcetype="tenable:sc:vuln" | dedup ip, repository.id, pluginID, port, protocol | search state=open OR state=reopened&lt;/P&gt;

&lt;P&gt;basically this gets the correct index, limits data to SC vulnerabilities, dedupes data so we only get the most recent vuln events for every host and then limits the results to only open or reopened vulns so we dont show fixed vulns. &lt;/P&gt;

&lt;P&gt;Sincerely, &lt;/P&gt;

&lt;P&gt;Nick&lt;/P&gt;</description>
      <pubDate>Tue, 29 Sep 2020 21:35:03 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/In-the-Tenable-Add-On-for-Splunk-what-is-the-best-way-to/m-p/421507#M51381</guid>
      <dc:creator>nkeuning</dc:creator>
      <dc:date>2020-09-29T21:35:03Z</dc:date>
    </item>
    <item>
      <title>Re: In the Tenable Add-On for Splunk, what is the best way to determine if a vulnerability still exists on a host system?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/In-the-Tenable-Add-On-for-Splunk-what-is-the-best-way-to/m-p/421508#M51382</link>
      <description>&lt;P&gt;Thanks for the info.  Unfortunately this means that vulnerability status is dependent on our retention settings of the index.  I'm not a security guy so I don't know the likelihood of this happening, but if a vulnerability were to be first discovered on a system 4 months ago and we have a 3 month data retention, we would no longer show that system as being affected by that vulnerability.  &lt;/P&gt;</description>
      <pubDate>Wed, 10 Oct 2018 18:56:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/In-the-Tenable-Add-On-for-Splunk-what-is-the-best-way-to/m-p/421508#M51382</guid>
      <dc:creator>rrustong</dc:creator>
      <dc:date>2018-10-10T18:56:47Z</dc:date>
    </item>
    <item>
      <title>Re: In the Tenable Add-On for Splunk, what is the best way to determine if a vulnerability still exists on a host system?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/In-the-Tenable-Add-On-for-Splunk-what-is-the-best-way-to/m-p/421509#M51383</link>
      <description>&lt;P&gt;That is correct, we need the retention policy to be very long on our index.  This will stay a requirement moving forward as it is the only way to bring the size of our data in splunk down to a manageable level and report the state of vulnerabilities.  This will improve some in our next major release as we improve usability of our data. &lt;/P&gt;</description>
      <pubDate>Wed, 10 Oct 2018 19:01:21 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/In-the-Tenable-Add-On-for-Splunk-what-is-the-best-way-to/m-p/421509#M51383</guid>
      <dc:creator>nkeuning</dc:creator>
      <dc:date>2018-10-10T19:01:21Z</dc:date>
    </item>
    <item>
      <title>Re: In the Tenable Add-On for Splunk, what is the best way to determine if a vulnerability still exists on a host system?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/In-the-Tenable-Add-On-for-Splunk-what-is-the-best-way-to/m-p/421510#M51384</link>
      <description>&lt;P&gt;Can you give me any hints on how it will be improved?  I'm trying to determine if I should stick with this version or go with the Splunk-built version.  I'm sure you can't give dates, but any idea how far out the new version is?  weeks? months? a year?&lt;/P&gt;</description>
      <pubDate>Wed, 10 Oct 2018 19:27:48 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/In-the-Tenable-Add-On-for-Splunk-what-is-the-best-way-to/m-p/421510#M51384</guid>
      <dc:creator>rrustong</dc:creator>
      <dc:date>2018-10-10T19:27:48Z</dc:date>
    </item>
    <item>
      <title>Re: In the Tenable Add-On for Splunk, what is the best way to determine if a vulnerability still exists on a host system?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/In-the-Tenable-Add-On-for-Splunk-what-is-the-best-way-to/m-p/421511#M51385</link>
      <description>&lt;P&gt;The theme of the next release is simpler searching of the data structures and improved tracking of state information and assets. No timeline yet as we are still in planning phases. &lt;/P&gt;</description>
      <pubDate>Wed, 10 Oct 2018 19:47:38 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/In-the-Tenable-Add-On-for-Splunk-what-is-the-best-way-to/m-p/421511#M51385</guid>
      <dc:creator>nkeuning</dc:creator>
      <dc:date>2018-10-10T19:47:38Z</dc:date>
    </item>
    <item>
      <title>Re: In the Tenable Add-On for Splunk, what is the best way to determine if a vulnerability still exists on a host system?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/In-the-Tenable-Add-On-for-Splunk-what-is-the-best-way-to/m-p/421512#M51386</link>
      <description>&lt;P&gt;Another question for you, what causes the &lt;STRONG&gt;state&lt;/STRONG&gt; to change?  In looking at my events, I only have &lt;STRONG&gt;open&lt;/STRONG&gt; as a value for state.  Our Nessus install is relatively new, so I'm not sure if we would have anything with any other state.  Prior to your answer, I was looking at the hasBeenMitigated field where I do have both true and false values.  What's the difference between these fields?&lt;/P&gt;</description>
      <pubDate>Wed, 10 Oct 2018 23:41:33 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/In-the-Tenable-Add-On-for-Splunk-what-is-the-best-way-to/m-p/421512#M51386</guid>
      <dc:creator>rrustong</dc:creator>
      <dc:date>2018-10-10T23:41:33Z</dc:date>
    </item>
    <item>
      <title>Re: In the Tenable Add-On for Splunk, what is the best way to determine if a vulnerability still exists on a host system?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/In-the-Tenable-Add-On-for-Splunk-what-is-the-best-way-to/m-p/421513#M51387</link>
      <description>&lt;P&gt;The state changes when 1) an open vulnerability is fixed (mitigated) OR 2) a previously fixed vulnerability is found again on the same machine. The possible states are open, reopened and fixed. &lt;/P&gt;</description>
      <pubDate>Thu, 11 Oct 2018 00:17:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/In-the-Tenable-Add-On-for-Splunk-what-is-the-best-way-to/m-p/421513#M51387</guid>
      <dc:creator>nkeuning</dc:creator>
      <dc:date>2018-10-11T00:17:07Z</dc:date>
    </item>
    <item>
      <title>Re: In the Tenable Add-On for Splunk, what is the best way to determine if a vulnerability still exists on a host system?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/In-the-Tenable-Add-On-for-Splunk-what-is-the-best-way-to/m-p/421514#M51388</link>
      <description>&lt;P&gt;Thanks for confirming what I suspected.  However, the reason I asked is because that doesn't seem to line up with my results.  When looking at my tenable:sc:vuln events, 100% of them show state=open, with a small percentage of them where hasBeenMitigated=true.  What would cause them to be true for hasBeenMitigated but remain in an open state?&lt;/P&gt;</description>
      <pubDate>Thu, 11 Oct 2018 15:53:40 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/In-the-Tenable-Add-On-for-Splunk-what-is-the-best-way-to/m-p/421514#M51388</guid>
      <dc:creator>rrustong</dc:creator>
      <dc:date>2018-10-11T15:53:40Z</dc:date>
    </item>
    <item>
      <title>Re: In the Tenable Add-On for Splunk, what is the best way to determine if a vulnerability still exists on a host system?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/In-the-Tenable-Add-On-for-Splunk-what-is-the-best-way-to/m-p/421515#M51389</link>
      <description>&lt;P&gt;I'm checking with the dev team. It looks like there may be a logic issue.  If we pull data from the cumulative view we get what are otherwise active vulns. These fall into open or reopened. open should be when hasBeenMitigated == false/0 and reopened should be when hasBeenMitigated == true/1.  Thanks for double clicking into this.  Can you please open a support case with Tenable so we can track this appropriately?  &lt;/P&gt;</description>
      <pubDate>Thu, 11 Oct 2018 17:09:32 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/In-the-Tenable-Add-On-for-Splunk-what-is-the-best-way-to/m-p/421515#M51389</guid>
      <dc:creator>nkeuning</dc:creator>
      <dc:date>2018-10-11T17:09:32Z</dc:date>
    </item>
    <item>
      <title>Re: In the Tenable Add-On for Splunk, what is the best way to determine if a vulnerability still exists on a host system?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/In-the-Tenable-Add-On-for-Splunk-what-is-the-best-way-to/m-p/421516#M51390</link>
      <description>&lt;P&gt;I am pulling Tenable.io data into Splunk at this time.  I am noticing the "New" and "Resurfaced" tags on the vulnerabilities.  I am also noticing that those are the only ones that are input into Splunk.  I did see a prior Splunk Answers question at &lt;A href="https://answers.splunk.com/answers/691887/in-the-tenable-add-on-for-splunk-what-is-the-best.html"&gt;https://answers.splunk.com/answers/691887/in-the-tenable-add-on-for-splunk-what-is-the-best.html&lt;/A&gt;.&lt;BR /&gt;&lt;BR /&gt;
So, it appears that this is the way it works.  That you must look at data for "All Time" and dedup based on ip, plugin id, etc.&lt;BR /&gt;
What happens if you delete the History in Tenable?  Will it start fresh and all vulnerabilities will be seen as new?  Or, does it still have some historical relevance that it is looking at?  I wish to have all vulnerabilities at the time of the scan sent over to Splunk.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Mar 2019 16:31:47 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/In-the-Tenable-Add-On-for-Splunk-what-is-the-best-way-to/m-p/421516#M51390</guid>
      <dc:creator>bwindham</dc:creator>
      <dc:date>2019-03-25T16:31:47Z</dc:date>
    </item>
    <item>
      <title>Re: In the Tenable Add-On for Splunk, what is the best way to determine if a vulnerability still exists on a host system?</title>
      <link>https://community.splunk.com/t5/All-Apps-and-Add-ons/In-the-Tenable-Add-On-for-Splunk-what-is-the-best-way-to/m-p/421517#M51391</link>
      <description>&lt;P&gt;I would make an addition to the example as it is deduping but you may end up removing a version that isn't the latest state.&lt;/P&gt;

&lt;PRE&gt;&lt;CODE&gt;`get_tenable_index` sourcetype="tenable:sc:vuln" | dedup ip, repository.id, pluginID, port, protocol sortby - lastSeen | search state=open OR state=reopened
&lt;/CODE&gt;&lt;/PRE&gt;</description>
      <pubDate>Wed, 15 Apr 2020 20:09:24 GMT</pubDate>
      <guid>https://community.splunk.com/t5/All-Apps-and-Add-ons/In-the-Tenable-Add-On-for-Splunk-what-is-the-best-way-to/m-p/421517#M51391</guid>
      <dc:creator>robdanl</dc:creator>
      <dc:date>2020-04-15T20:09:24Z</dc:date>
    </item>
  </channel>
</rss>

