All Apps and Add-ons

Extract additional fields using nessus2splunk.py

TonyLeeVT
Builder

Is it possible to extract additional fields using the nessus2splunk.py script found within Splunk Add-on for Nessus?

Some useful fields would include the following:

<exploit_available>false</exploit_available>
<exploitability_ease>No known exploits are available</exploitability_ease>
0 Karma

rwang_splunk
Splunk Employee
Splunk Employee

Hi Tony

Not sure. Are you using Nessus 5.x? what are the fields you want to extract? you may have to update the script in the file to extract new fields.

0 Karma
Get Updates on the Splunk Community!

Splunk MCP & Agentic AI: Machine Data Without Limits

  Discover how the Splunk Model Context Protocol (MCP) Server can revolutionize the way your organization ...

Finding Based Detections General Availability

Overview  We’ve come a long way, folks, but here in Enterprise Security 8.4 I’m happy to announce Finding ...

Get Your Hands Dirty (and Your Shoes Comfy): The Splunk Experience

Hands-On Learning and Technical Seminars  Sometimes, you just need to see the code. For those looking for a ...