Tenable.io is the cloud platform that provides a rich capability for discovery, assessment, reporting, and prioritization of vulnerabilities across systems and services. It enhances visibility with asset discovery and helps organizations manage their security posture effectively.
The Tenable.io integration collects the following types of logs:
- Activity: This endpoint contains information of user actions, system events, scans, and security control tasks, such as managing permissions, assigning roles, and handling security events.
- Vulnerability: This endpoint contains information on vulnerabilities and the associated vulnerable assets.
This integration collects logs from the sources listed above and sends them to Datadog.
- Log in to your Tenable.io account.
- Click the profile icon and select My Profile.
- Navigate to the API Keys section.
- Click the Generate button in the lower right-corner of the page.
- Review the message in the warning dialog box and click Continue to generate the access Key and secret Key.
- Add your access key and secret key
Parameters Description Access Key The access key for your Tenable.io account. Secret Key The secret key for your Tenable.io account. - Click the Save button to save your settings.
The Tenable.io integration collects logs and forwards them to Datadog.
The Tenable.io integration does not include any metrics.
The Tenable.io integration does not include any events.
Need help? Contact Datadog support.