Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
| Attribute | Value |
|---|---|
| Connector ID | TenableIE |
| Publisher | Tenable |
| Used in Solutions | Tenable App |
| Collection Method | MMA |
| Connector Definition Files | TenableIE.json |
Tenable Identity Exposure connector allows Indicators of Exposure, Indicators of Attack and trailflow logs to be ingested into Microsoft Sentinel.The different work books and data parsers allow you to more easily manipulate logs and monitor your Active Directory environment. The analytic templates allow you to automate responses regarding different events, exposures and attacks.
This connector ingests data into the following tables:
| Table | Transformations | Ingestion API | Lake-Only |
|---|---|---|---|
Tenable_IE_CL |
? | ✓ | ? |
Tenable_ad_CL |
? | ✓ | ? |
💡 Tip: Tables with Ingestion API support allow data ingestion via the Azure Monitor Data Collector API, which also enables custom transformations during ingestion.
Resource Provider Permissions: - Workspace (Workspace): read and write permissions are required. - Keys (Workspace): read permissions to shared keys for the workspace are required. See the documentation to learn more about workspace keys.
Custom Permissions: - Access to TenableIE Configuration: Permissions to configure syslog alerting engine
⚠️ Note: These instructions were automatically generated from the connector's user interface definition file using AI and may not be fully accurate. Please verify all configuration steps in the Microsoft Sentinel portal.
This data connector depends on afad_parser based on a Kusto Function to work as expected which is deployed with the Microsoft Sentinel Solution.
1. Configure the Syslog server
You will first need a linux Syslog server that TenableIE will send logs to. Typically you can run rsyslog on Ubuntu. You can then configure this server as you wish, but it is recommended to be able to output TenableIE logs in a separate file.
Configure rsyslog to accept logs from your TenableIE IP address. Choose one of the following options:
Option 1: Using AllowedSender directive
This configuration restricts which hosts can send logs to your syslog server at the network level. It's more secure as it rejects unauthorized connections before processing them.
sudo -iexport TENABLE_IE_IP={Enter your IP address}systemctl restart rsyslogOption 2: Filter logs by source IP (For environments with multiple syslog sources)
This configuration accepts all incoming logs but only processes those from the specified TenableIE IP address. It's particularly useful when you have multiple syslog servers or applications sending logs to the same syslog server, and you want to selectively process only TenableIE logs.
sudo -iexport TENABLE_IE_IP={Enter your IP address}systemctl restart rsyslog2. Install and onboard the Microsoft agent for Linux
The OMS agent will receive the TenableIE syslog events and publish it in Microsoft Sentinel : Choose where to install the agent:
Install agent on Azure Linux Virtual Machine
Select the machine to install the agent on and then click Connect. - Install agent on Linux Virtual Machine
Install agent on a non-Azure Linux Machine
Download the agent on the relevant machine and follow the instructions. - Install agent on Linux (Non-Azure)
3. Check agent logs on the Syslog server
tail -f /var/opt/microsoft/omsagent/log/omsagent.log
4. Configure TenableIE to send logs to your Syslog server
On your TenableIE portal, go to System, Configuration and then Syslog. From there you can create a new Syslog alert toward your Syslog server.
Once this is done, check that the logs are correctly gathered on your server in a separate file (to do this, you can use the Test the configuration button in the Syslog alert configuration in TenableIE). If you used the Quickstart template, the Syslog server will by default listen on port 514 in UDP and 1514 in TCP, without TLS.
Note: Both configuration options from Step 1 configure the syslog server to listen on port 514 for both UDP and TCP connections.
5. Configure the custom logs
Configure the agent to collect the logs.
/var/log/TenableIE.log if you have a Tenable version <3.1.0, you must also add this linux file location /var/log/AlsidForAD.log.6. Enjoy !
You should now be able to receive logs in the Tenable_IE_CL table, logs data can be parse using the afad_parser() function, used by all query samples, workbooks and analytic templates.
This data connector allows Tenable Identity Exposure (formerly AlsidForAD) logs to be ingested into Microsoft Sentinel. The connector captures Indicators of Exposure, Indicators of Attack, and trailflow logs to help monitor your Active Directory environment.
The data connector provides two rsyslog configuration options:
80-tenable-allowedsender.confRecommended for most setups
This configuration uses the AllowedSender directive to restrict which hosts can send logs to your syslog server at the network level.
Features:
Use Case: Ideal when you have a dedicated syslog server for TenableIE or want maximum security.
80-tenable-filter.confFor environments with multiple syslog sources
This configuration accepts all incoming logs but only processes those from the specified TenableIE IP address using source IP filtering.
Features:
Use Case: Perfect when your syslog server receives logs from multiple applications and you need to selectively process only TenableIE logs.
Choose one of the following options:
https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Tenable%20App/Data%20Connectors/TenableIE/80-tenable-allowedsender.conf
bash
sudo -i
bash
export TENABLE_IE_IP={Enter your actual TenableIE IP address}
Execute the commands from the downloaded configuration file to create /etc/rsyslog.d/80-tenable.conf
Restart rsyslog:
bash
systemctl restart rsyslog
https://github.com/Azure/Azure-Sentinel/blob/master/Solutions/Tenable%20App/Data%20Connectors/TenableIE/80-tenable-filter.conf
bash
sudo -i
bash
export TENABLE_IE_IP={Enter your actual TenableIE IP address}
Execute the commands from the downloaded configuration file to create /etc/rsyslog.d/80-tenable.conf
Restart rsyslog:
bash
systemctl restart rsyslog
The OMS agent will receive the TenableIE syslog events and publish them to Microsoft Sentinel.
Option A: Install agent on Azure Linux Virtual Machine
Option B: Install agent on a non-Azure Linux Machine
Verify the agent is running correctly:
tail -f /var/opt/microsoft/omsagent/log/omsagent.log
Default Port Configuration:
/var/log/TenableIE.log
- For Tenable version < 3.1.0: /var/log/AlsidForAD.logTenable_IE_CL (Azure automatically adds *_CL)You should now be able to receive logs in the Tenable_IE_CL table. Use the afad_parser() function to parse the log data, which is used by all query samples, workbooks, and analytic templates.
| Parameter | Description | Value |
|---|---|---|
$ModLoad imudp |
Load UDP module for syslog reception | Required |
$UDPServerRun 514 |
Run UDP server on port 514 | Standard syslog port |
$ModLoad imtcp |
Load TCP module for syslog reception | Required |
$InputTCPServerRun 514 |
Run TCP server on port 514 | Standard syslog port |
$AllowedSender |
Restrict allowed sender IPs (Option 1 only) | 127.0.0.1, TENABLE_IE_IP |
$MsgTemplate |
Format log messages with timestamp | RFC3339 format |
$remote-incoming-logs |
Template for log file location | /var/log/%PROGRAMNAME%.log |
Logs not appearing in Sentinel:
- Check rsyslog service: systemctl status rsyslog
- Verify agent logs: tail -f /var/opt/microsoft/omsagent/log/omsagent.log
- Confirm firewall rules allow ports 514/UDP and 514/TCP
Permission denied errors:
- Ensure running commands with sudo -i
- Check file permissions in /etc/rsyslog.d/
Incorrect IP filtering:
- Verify TENABLE_IE_IP environment variable is set correctly
- Check if TenableIE IP matches the actual source IP
# Check rsyslog status
systemctl status rsyslog
# Check if configuration file exists
ls -la /etc/rsyslog.d/80-tenable.conf
# Monitor syslog in real-time
tail -f /var/log/TenableIE.log
# Check OMS agent status
systemctl status omsagent
# Test network connectivity
telnet <syslog-server-ip> 514
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊