Tableau reports for Tenable.io

Use this section to become familiar with Tableau reports for Tenable.io

BigFix Insights for Vulnerability Remediation can now also consume vulnerability data from Tenable.io. With Tenable Lumin available, BigFix Insights for Vulnerability Remediation also consumes asset prioritization data:
  • Asset Criticality Rating (ACR): 1-10 rating that represents the asset’s relative criticality based on device type, device purpose, and network location/proximity to the Internet.
  • Asset Exposure Score (AES): A metric that combines ACR & VPR (Vulnerability Priority Rating) into a single score to represent an asset’s relative exposure.

Refer to the link for more information: Lumin Metrics

Additionally, uniquely for Tenable.io, BigFix sends its endpoint asset data to Tenable.io to give it visibility into potentially unmanaged assets.

Chart details:
  • Vulnerability Title - Vulnerability title
  • PluginID - a unique identifier assigned to a vulnerability detection
  • Applicable Devices - devices that have been scanned by Tenable and for which vulnerabilities have been identified
  • CVE List - list of CVE
  • CVSS2 - (Common Vulnerability Scoring System version 2), scoring system used to assess the severity and potential impact of security vulnerabilities.
  • CVSS3 - (Common Vulnerability Scoring System version 3), updated version of the scoring system
  • VPR - Vulnerability Priority Rating
  • VPR Score - numerical value ranging from 0 to 10, with 10 being the highest priority
  • Detected Date - the date when a vulnerability was first detected
  • Published Date - date when the information about a vulnerability was first available
  • ACR - Asset Criticality Rating: 1-10 rating that represents the asset’s relative criticality based on device type, device purpose, and network location/proximity to the Internet.
  • AES - Asset Exposure Score: A metric that combines ACR & VPR (Vulnerability Priority Rating) into a single score to represent an asset’s relative exposure.

Detected Vulnerabilities with Applicable Fixlets









Detected Vulnerabilities without Available Fixlets









Vulnerability Discrepancies