Configuring Vulnerability Management

Configuring the Vulnerability Management Sources

  1. Go to Settings >> Configuration >> Devices.

  2. Click the Add Collectors/Fetchers (add) icon from the Actions column of the localhost device.

_images/vm-localhost.png

Adding Fetchers in a Device

  1. Click Vulnerability Management.

_images/vm-available-collector-fetchers.png

Available Collectors Fetchers Panel

Configuring the Tenable.sc Fetcher

  1. Select Tenable.sc.

  2. Click Add.

_images/vm-add.png

Vulnerability Management Panel

  1. Enter the Url of the host machine where you have Tenable.sc configured.

  2. Enter the User and the Password for Tenable.sc.

  3. Select a Start Time to fetch all the SecurityCenter reports from this date onwards.

  4. Enter the number of Retries Count to fetch the failed reports.

    Note

    The Retries Count value is three by default and the maximum limit is five.

  5. Enter the Fetch Interval in minutes.

  6. Select a Processing Policy.

  7. Select a Charset.

  8. Click Test to check whether the fetcher configuration is working correctly.

  9. Select Enable Proxy if you use a proxy server.

  10. In the Proxy Configuration section:

    12.1. Enter the IP address and the Port number of the proxy server.

    12.2. Select HTTP or HTTPS protocol as required.

  11. Click Submit.

_images/vm-tenable-conf.png

Configuring Tenable.sc Fetcher

Configuring the Nessus Fetcher

  1. Select Nessus Fetcher.

  2. Click Add.

_images/vm-add1.png

Vulnerability Management Panel

  1. Enter the Host URL or IP address of the host machine where you have Nessus configured.

  2. Enter the Port of the Nessus configured host machine.

  3. Enter the Username and the Password for Nessus.

  4. Enter a Fetch Interval in minutes.

  5. Select a Processing Policy.

  6. Select a Charset.

  7. Click Test to check whether the fetcher configuration is working correctly.

  8. Select Enable Proxy if you use a proxy server.

  9. In the Proxy Configuration section:

    11.1. Enter the IP address and the Port number of the proxy server.

    11.2. Select HTTP or HTTPS protocol as required.

  10. Click Submit.

_images/vm-nessus-conf.png

Configuring Nessus Fetcher

Configuring the Qualys Fetcher

  1. Select Qualys Fetcher.

  2. Click Add.

_images/vm-add2.png

Vulnerability Management Panel

  1. Enter the Qualys Account Name.

  2. Enter the Hostname URL or IP address of the host machine where you have Qualys configured.

  3. Select the Qualys Scan type.

  4. Enter the Username and the Password for Qualys.

  5. Enter the Fetch Interval in minutes.

  6. Select a Processing Policy.

  7. Select a Charset.

  8. Click Test to check whether the fetcher configuration is working correctly.

  9. Select Enable Proxy if you use a proxy server.

  10. In the Proxy Configuration section:

    12.1. Enter the IP address and the Port number of the proxy server.

    12.2. Select HTTP or HTTPS protocol as required.

  11. Click Submit.

_images/vm-qualys-conf.png

Configuring Qualys Fetcher

Configuring the Rapid7 InsightVM Fetcher

  1. Select Rapid7 InsightVM Fetcher.

  2. Click Add.

_images/vm-add3.png

Vulnerability Management Panel

  1. Enter the Host URL or IP address of the host machine where you have Rapid7 InsightVM configured.

  2. Enter the Port of the Rapid7 InsightVM configured host machine.

  3. Enter the Username and the Password for Rapid7 InsightVM.

  4. Enter the Fetch Interval in minutes.

  5. Select a Processing Policy.

  6. Select a Charset.

  7. Click Test to check whether the fetcher configuration is working correctly.

  8. Select Enable Proxy if you use a proxy server.

  9. In the Proxy Configuration section:

    11.1. Enter the IP address and the Port number of the proxy server.

    11.2. Select HTTP or HTTPS protocol as required.

  10. Click Submit.

_images/vm-rapid7-conf.png

Configuring Rapid7 InsightVM Fetcher

Configuring the Holm Security Fetcher

  1. Select Holm Security Fetcher.

  2. Click Add.

_images/vm-addholm.png

Vulnerability Management Panel

  1. Enter a Name for the configuration.

  2. Enter the Base URL of API of Holm Security.

  3. Enter the API Token of Holm Security.

Note

Refer to the Appendix section of the manual to get information on obtaining Base URL of API and API Token of Holm Security.

  1. Select the Last Detected date of vulnerability after which they should be fetched.

  2. Select the Fetch Interval in minutes.

  3. Select a Processing Policy.

  4. Select a Charset.

  5. Click Test to check whether the fetcher configuration is working correctly.

  6. Select Enable Proxy if you use a proxy server.

  7. In the Proxy Configuration section:

    12.1. Enter the IP address and the Port number of the proxy server.

    12.2. Select HTTP or HTTPS protocol as required.

  8. Click Submit.

_images/vm-holm-conf.png

Configuring Holm Security Fetcher


Helpful?

We are glad this guide helped.


Please don't include any personal information in your comment

Contact Support