All Apps and Add-ons

Ingesting Tenable Vulerability and STIG Audit separately. . .

KglassCACI
Explorer

We use Tenable Nessus (and Security Center) for enterprise scanning of both vulnerabilities and STIG compliance. Can someone suggest a way to split that feed into two separate indexes, one for Vulns and one for Audit ? I was thinking along the lines of an intermediate index, and then filtering on the "(compliance)true(/compliance)" (that's actually XML) field in the plugin-text field. and then pushing the result for records with, and without, the value, to the appropriate index.. . The problem is, that the string is the BEGINNING of the plugin-text field, and not the entire field. . .

0 Karma

stevesmd
New Member

If you are using the Tenable Add-on for Splunk
You can pull out compliance scan results separately with sourcetype=tenable:sc:vuln "family.type"=compliance. Within the pluginText field values you can find the results of your compiance scan, PASSED, INFO, FAILED, & ERROR.

I had to use some regex to pull out the results cleanly. You should also look at the xref field if your compliance scans include more than just Windows systems. I had to separate out database and Windows on my systems where SQL and Windows are installed so I could see specific resullts.

0 Karma
Get Updates on the Splunk Community!

Threat Hunting Unlocked: How to Uplevel Your Threat Hunting With the PEAK Framework ...

WATCH NOWAs AI starts tackling low level alerts, it's more critical than ever to uplevel your threat hunting ...

Splunk APM: New Product Features + Community Office Hours Recap!

Howdy Splunk Community! Over the past few months, we’ve had a lot going on in the world of Splunk Application ...

Index This | Forward, I’m heavy; backward, I’m not. What am I?

April 2024 Edition Hayyy Splunk Education Enthusiasts and the Eternally Curious!  We’re back with another ...