All Apps and Add-ons

Extract additional fields using nessus2splunk.py

TonyLeeVT
Builder

Is it possible to extract additional fields using the nessus2splunk.py script found within Splunk Add-on for Nessus?

Some useful fields would include the following:

<exploit_available>false</exploit_available>
<exploitability_ease>No known exploits are available</exploitability_ease>
0 Karma

rwang_splunk
Splunk Employee
Splunk Employee

Hi Tony

Not sure. Are you using Nessus 5.x? what are the fields you want to extract? you may have to update the script in the file to extract new fields.

0 Karma
Get Updates on the Splunk Community!

.conf24 | Personalize your .conf experience with Learning Paths!

Personalize your .conf24 Experience Learning paths allow you to level up your skill sets and dive deeper ...

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...

Splunk APM: New Product Features + Community Office Hours Recap!

Howdy Splunk Community! Over the past few months, we’ve had a lot going on in the world of Splunk Application ...