All Apps and Add-ons

Extract additional fields using nessus2splunk.py

TonyLeeVT
Builder

Is it possible to extract additional fields using the nessus2splunk.py script found within Splunk Add-on for Nessus?

Some useful fields would include the following:

<exploit_available>false</exploit_available>
<exploitability_ease>No known exploits are available</exploitability_ease>
0 Karma

rwang_splunk
Splunk Employee
Splunk Employee

Hi Tony

Not sure. Are you using Nessus 5.x? what are the fields you want to extract? you may have to update the script in the file to extract new fields.

0 Karma
Get Updates on the Splunk Community!

Splunk + ThousandEyes: Correlate frontend, app, and network data to troubleshoot ...

 Are you tired of troubleshooting delays caused by siloed frontend, application, and network data? We've got a ...

Splunk Observability for AI

Don’t miss out on an exciting Tech Talk on Splunk Observability for AI!Discover how Splunk’s agentic AI ...

🔐 Trust at Every Hop: How mTLS in Splunk Enterprise 10.0 Makes Security Simpler

From Idea to Implementation: Why Splunk Built mTLS into Splunk Enterprise 10.0  mTLS wasn’t just a checkbox ...