Tenable.sc
About Tenable.sc
Tenable.sc is a vulnerability management platform. Managed on premises and powered by Nessus technology, the Tenable.sc suite of products provides the industry's most comprehensive vulnerability coverage with real-time continuous assessment of your network. It’s your complete end-to-end vulnerability management solution.
Use Tenable.sc to get a risk-based view of your IT, security, and compliance posture so that you can quickly identify, investigate, and prioritize vulnerabilities.
Why You Should Integrate Tenable.sc
Adding Tenable.sc as a source provides visibility into devices scanned by Tenable.sc.
The Data We Collect and How We Use It
The table below lists the fields we collect from Tenable.sc and how they map to the fields in our Sevco platform. This data is only used internally; we do not share it with any parties outside of Sevco. Refer to our privacy policy for details.
Tenable.sc Field | Sevco Field |
---|---|
os | OS |
Macaddress | ID |
Macaddress | Macaddresses |
IP | IP |
Netbiosname , Dnsname | Hostnames |
lastScan | LastUpdatedTime |
Integrate Tenable.sc
- Install a runner: Follow our instructions to install a runner.

- Add a source: Follow our instructions to add a Sevco source.

- Provide credentials: You'll be asked to provide source credentials that Sevco will use to connect to Tenable.sc:
Credential or Parameter | Description | Where You Can Find This Value |
---|---|---|
url | URL of Tenable.sc (Example: https://hostname.domain.org) | |
access_key | Tenable.sc API access key | To find your API Keys, follow these instructions. |
secret_key | Tenable.sc API secret key | To find your API Keys, follow these instructions. |
If you are using a self-signed certification, you can skip TLS certification validation.
- Set permissions: In Tenable.sc, ensure that:
- the API keys are generated with the
Security Manager
role - the API keys have access to all repositories
- the group associated with the user has access to all repositories
For details refer to the Tenable.sc documentation on user roles.
- the API keys are generated with the
If you encounter any errors, they are most likely related to incorrect credentials or insufficient permissions. Verify your work in steps 3 and 4.
Contact Us
If you're having problems integrating a source, or if you've found something wrong in this document, please email us at [email protected].
Updated about 1 month ago