Perform a Vulnerability Scan Using Tenable

Use IoT Security integration with Tenable to perform a vulnerability scan.
Because active scanning can be disruptive to the services running on a scanned device, only account owners have permission to perform vulnerability scans by default. Owners can also set scanning permissions per administrator account, thereby delegating it to just a few individuals.
By default, vulnerability scanning is disabled for new administrator accounts. To enable it, log in to the IoT Security portal as an owner, click
User Accounts
, and then click the email address (username) of an administrator for whom you want to enable vulnerability scanning. Slide the
Allow device vulnerability scans
toggle from
and then
The ability to do vulnerability scanning is only available to owners and administrators. There is no option to enable vulnerability scanning for deployment and read-only users.
  1. Prepare to initiate a Tenable vulnerability scan from IoT Security.
    1. Log in as an owner or administrator who has vulnerability scanning enabled.
    2. Because IoT Security only supports one vulnerability scan of a device at a time, make sure no other scans of this device are currently in progress.
      Vulnerability Scan Reports
      and check the Status column. If you see
      for the device you want to scan, wait until the current scan finishes before starting a new one.
      When you see that the device isn’t already being scanned, you can continue with a new scan.
      Only initiate a scan of a device that’s not currently active (and will remain inactive until the scan completes).
    3. Click
      and then click the entry in the Device Name column for the device you want to scan.
    4. At the top of the Device Details page, click the Action menu (three vertical dots) and then click
    5. Read the caution about scanning active devices and, if the device is currently inactive,
  2. Set parameters for the scan that you want Tenable to perform.
    Scan Engine
    Tenable scan
    Tenable Scanner
    : Choose one of the scanners to scan the selected device.
    Tenable Profile
    : Choose a profile to define the type of scan to run.
  3. Click
    Depending on the type of scan you choose, it can take anywhere from a few minutes to half an hour, and sometimes even longer. However, it’s common for scans to take 20-30 minutes. If there is an issue, such as the scanner being unable to reach the target device, the effort eventually times out after two hours.
    After Tenable completes the scan, it reports results back to IoT Security. If there are any discovered Common Vulnerabilities and Exposures (CVEs), IoT Security adds them to the Risks section on the Device Details page and to the
    page. IoT Security learns the vulnerability CVE ID number, severity level (CVSS), and service port number from Tenable. IoT Security retrieves a description for the vulnerability from the NIST page for the CVE.
  4. After the scan completes, view the results.
    You have two options to view the report:
    Devices >
    and then click the
    Vulnerability Report Ready
    icon at the top of the page.
    Vulnerability Scan Reports
    and then click the link in the Report Name column for the scanned device whose report you want to see.
    This downloads the report as a PDF to your computer where you can open it in a PDF viewer.

Recommended For You