All Apps and Add-ons

Extract additional fields using nessus2splunk.py

TonyLeeVT
Builder

Is it possible to extract additional fields using the nessus2splunk.py script found within Splunk Add-on for Nessus?

Some useful fields would include the following:

<exploit_available>false</exploit_available>
<exploitability_ease>No known exploits are available</exploitability_ease>
0 Karma

rwang_splunk
Splunk Employee
Splunk Employee

Hi Tony

Not sure. Are you using Nessus 5.x? what are the fields you want to extract? you may have to update the script in the file to extract new fields.

0 Karma
Get Updates on the Splunk Community!

Enterprise Security Content Update (ESCU) | New Releases

In December, the Splunk Threat Research Team had 1 release of new security content via the Enterprise Security ...

Why am I not seeing the finding in Splunk Enterprise Security Analyst Queue?

(This is the first of a series of 2 blogs). Splunk Enterprise Security is a fantastic tool that offers robust ...

Index This | What are the 12 Days of Splunk-mas?

December 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...