configuration
4 TopicsCompliance Windows Command Execution Enhancement
Summary The Windows Compliance Check plugin is implementing an updated library to run commands on Windows targets. The enhancements will include the following benefits. The plugin will improve on its handling of command timeouts. There were issues when long running commands would timeout on the scanner but leave temporary files on the target. This update will force long running checks to close when timing out and remove temporary files. The recently released improved resource management controls for Windows plugins on agents will now be extended to running audits. Potential Impacts: Tenable has gone to great lengths to ensure that the content that it publishes will operate and produce the same results that it always has. Customized audits may exhibit some changes due to the introduced job control of the command execution. These changes tend to be compliance checks that generate different results (failure instead of passing), or the actual values of the check have different text that would affect baseline scans. If custom content does exhibit these issues, strategies to work with the new library can be found in Compliance WMI Library Enhancement. Tenable Plugins 21156 - Windows Compliance Checks Target Release Date February 9, 2026[GA Release] Tenable Add-on for Splunk v8.0.2 is Now Available!
Hi everyone! We’re thrilled to announce the latest quality release to the Tenable Add-on for Splunk – now live with version 8.0.2! Release Date: January 22, 2026 Get It Now: Tenable Add-on for Splunk on Splunkbase Documentation: Tenable Add-on for Splunk Documentation What’s New in v8.0.2? Resolve an index _time race condition with Tenable Security Center Known Issues and Limitations: None Shoutout to everyone who made this release possible! – Ahmad Maruf, Tenable Ecosystem Product Management29Views0likes0CommentsA Guide to Linux and MacOS Filesystem Malware Scanning in...
A Guide to Linux and MacOS Filesystem Malware Scanning in Tenable.io Understanding File System Scanning for Malware Tenable.io now has the ability to scan Linux and MacOS filesystems for malicious files. This allows organizations to detect malware that may have been deployed in their environment, even if that malware is not actively running or attempting to exploit assets. Malware Scanning Tools in Tenable.io There are four distinct plugins available for malware scanning: Linux Malicious File Detection (126258) Linux Malicious File Detection: User Defined Malware (126259) MacOS Malicious File Detection (126260) MacOS Malicious File Detection: User Defined Malware (126261) Preferences for these plugins can be found in your scan policy configuration located under Assessments > Malware. Users can provide text lists here for either known good or known bad file hash values, to increase the accuracy of a scan. Users can also select predefined system file paths for more efficient or targeted scanning or common directories, as seen below: Custom scan locations can also be specified by uploading a text file containing a directory list to the scan’s configuration. Once the malware scan has been performed, infected hosts will appear in the scan results. This scan data can then be correlated and shared using the Malicious Code Prevention Report in Tenable.io. Organizations that participate in information sharing groups like an ISAC can also use these reports to provide other members with relevant infection information without needing to give those other members access to their Tenable.io instance. Target Release Date Already Released Additional Notes This feature has already been released, however the purpose of this alert is to spread awareness of this feature. Thank you to @Ryan Seguin for authoring this post. __________________________________ Tenable Research Release Highlights are posted in advance of significant new releases or updates to existing plugins or audit files that are important for early customer notification.Enhanced Java Detection on Unix/Linux Plugin 64815 - Oracle...
Enhanced Java Detection on Unix/Linux Plugin 64815 - Oracle Java Runtime Environment (JRE) Detection (Unix) Target Release Date 17 June 2019 Change Nessus Plugin 64815 finds Java Runtime Environments (JREs) and other Java executable files on Unix and Linux OS platforms. This plugin contains improved search capabilities on common installation locations to find additional, previously undetected Java installs. The improved search capabilities will execute under the standard scan configuration, without enabling thorough checks. Impact Customers should expect improved detection of JRE and Java executables, potentially resulting in a significant increase in new vulnerability detections. This improvement may also result in slightly longer scan times and increased CPU utilization on the systems scanned. Additional Notes Please note that enabling thorough checks will increase the amount of time the plugin will search for additional Java executables, potentially yielding additional results and vulnerability detections. If the plugin is able to complete the search without thorough checks enabled, no additional results are expected. __________________________________ Tenable Research Release Highlights are posted in advance of significant new releases or updates to existing plugins or audit files that are important for early customer notification.7Views0likes1Comment