Vulnerability Management
Vulnerability Management enables you to monitor and find vulnerabilities in your organization using the vulnerability scan reports from Nessus Vulnerability Scanner, Qualys, Rapid7 InsightVM, Holm Security, and Tenable.sc. You can also analyze the reports to examine the severity of each vulnerability. However, the vulnerability scan reports of Rapid7 InsightVM can only be fetched if the reports are in XML-export-v2 format and have the field report-id in them.
Package Details
Enhancement
Description |
Issue ID |
Reference ID |
---|---|---|
A new source, Tenable.io, is added. You can now fetch vulnerability management and web application scanning reports from it. To learn how to configure Tenable.io, go to the Vulnerability Management Guide. |
PLUG - 6130 |
43157, 45770, 53154, 64650, 71546 |
Bug Fixes
The following issues are fixed:
Description |
Issue ID |
Reference ID |
---|---|---|
The Rapid7 fetcher applied the timestamp from the first scan to all the subsequent scans, even though they all have a distinct startTime. |
PLUG- 9480 |
71053 |
The timestamp fields were in String format instead of the expected Datetime format. |
PLUG-11089 |
- |
The log_ts field displayed the time when the fetcher received logs instead of the time when the event in the log took place. |
PLUG-11089 |
- |
The Nessus Fetcher's charset was not working, resulting in an error while parsing vulnerability scan reports. |
PLUG-11213 |
79493 |
Package Details
Enhancement
Description |
Issue ID |
Reference ID |
---|---|---|
You can now fetch scheduled vulnerability scan reports from Rapid7. |
PLUG-7562 |
52001, 65033, 59144 |
Bug Fix
The following issue is fixed:
Description |
Issue ID |
Reference ID |
---|---|---|
The Tenable.sc fetcher did not fetch vulnerability scan reports from Tenable.sc. |
PLUG-8626 |
64709 |
Support
If you have any queries or require assistance, please feel free to contact our support team:
Email: servicedesk@logpoint.com
Phone: +45 7060 6100
Best regards,
Package Details
The application consists of the following components:
-
Fetchers
-
Tenable.sc Fetcher
-
Nessus Fetcher
-
Qualys Fetcher
-
Rapid7 InsightVM Fetcher
-
Holm Security Fetcher
-
Enhancement
You can now fetch vulnerability scan reports from Holm Security.
Installation
To install Vulnerability Management v6.1.0:
- Download the .pak file provided in the Download section in the Release Details table.
- Install the plugin by importing the .pak file to LogPoint under Settings >> System >> Applications.
To learn more, see the Vulnerability Management guide.
Verification
Enter the following query to search for the logs collected via the Nessus fetcher:
col_type = nessus
Enter the following query to search for the logs collected via the Qualys fetcher:
col_type = qualys_fetcher
Enter the following query to search for the logs collected via the Tenable.sc fetcher:
col_type = tenablesc
Enter the following query to search for the logs collected via the Rapid7 InsightVM fetcher:
col_type = rapid7_insightvm
Enter the following query to search for the logs collected via the Holm Security fetcher:
col_type = holm
Documentation
The Vulnerability Management guide is available on the LogPoint Documentation Portal.
Support
If you have any queries or require assistance, please feel free to contact our support team:
Email: servicedesk@logpoint.com
Phone: +45 7060 6100
Best regards,
Package Details
The application consists of the following components:
-
Fetchers
-
Tenable.sc Fetcher
-
Nessus Fetcher
-
Qualys Fetcher
-
Rapid7 InsightVM Fetcher
-
Enhancement
You can now enter a custom host URL while configuring the Qualys fetcher.
Installation
Follow these steps to install the VulnerabilityManagement v4.1.0 application:
- Download the VulnerabilityManagement_4.1.0.zip file provided in the Download section above.
- Extract the zip file to obtain the VulnerabilityManagement_4.1.0.pak file.
- Install the application by importing the pak file to LogPoint under Settings >> System >> Applications.
For more details, refer to the VulnerabilityManagement manual.
Verification
Enter the following query to search for the logs collected via the Nessus fetcher:
col_type = nessus
Enter the following query to search for the logs collected via the Qualys fetcher:
col_type = qualys_fetcher
Enter the following query to search for the logs collected via the TenableSecurityCenter fetcher:
col_type = tenablesecuritycenter
Documentation
You can download the VulnerabilityManagement manual from the Download section above.
Support
If you have any queries or require assistance, please feel free to contact our support team:
Email: servicedesk@logpoint.com
Phone: +45 7060 6100
Best regards,
Comments
Article is closed for comments.