Tenable.io - Launch Scan
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Content Index
Once a new Microsoft Sentinel incident is created, this playbook gets triggered and performs the following actions: 1. Launches scan by scan id provided during the playbook deployment. 2. Adds information about launched scan as a comment to the incident.
Additional Documentation
📄 Source: Playbooks/Tenable-LaunchScan/readme.md
Tenable-LaunchScan
Summary
When a new sentinel incident is created, this playbook gets triggered and performs the following actions:
- Launches scan by scan id provided during the playbook deployment.
- Adds information about launched scan as a comment to the incident.

Prerequisites
- Prior to the deployment of this playbook, Tenable Vulnerability Management API Connector needs to be deployed under the same subscription.
- Obtain Tenable API credentials. Follow the instructions in the documentation.
Deployment instructions
- To deploy the Playbook, click the Deploy to Azure button. This will launch the ARM Template deployment wizard.
- Fill in the required paramteres:
- Playbook Name: Enter the playbook name here
- Scan Id: Scan Id to be launched
- Tenable Vulnerability Management Connector Name: name of the custom Logic App connector

Post-Deployment instructions
a. Authorize connections
Once deployment is complete, authorize each connection.
- Click the Microsoft Sentinel connection resource
- Click edit API connection
- Click Authorize
- Sign in
- Click Save
- Click the Tenable Vulnerability Management connection resource
- Click edit API connection
- Provide API key
- Click Save
Browse: 🏠 · Solutions · Connectors · Methods · Tables · Content · Parsers · ASIM Parsers · ASIM Products · 📊
↑ Back to Playbooks · Back to TenableIO