The "Search for Vulnerabilities by Hostname in Tenable" workflow template is designed to enhance device and user compliance by automating the process of identifying vulnerabilities associated with a specific hostname. By integrating with Tenable, this workflow retrieves asset details and vulnerabilities, providing a comprehensive security overview. The results can be outputted as JSON for further processing or sent directly to a Slack user or channel, facilitating prompt incident response and informed decision-making.
Optional Triggers
["Slack","Microsoft Teams"]
Use Cases
Device \u0026 User Compliance
Workflow Breakdown
Lookup hostname in Tenable and if found, query vulnerabilities and asset information
Format the output for either a Slack message or JSON output to the parent workflow
Return the Slack message or JSON data.
Vendors
Slack, Utils, Tenable
Workflow Output
JSON data to the parent workflow or a Slack message to a user or channel.
