From the course: Data-Driven Network Security Essentials

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Collect vulnerability management system and SIEM data

Collect vulnerability management system and SIEM data

From the course: Data-Driven Network Security Essentials

Start my 1-month free trial

Collect vulnerability management system and SIEM data

- [Instructor] Unlike the packet capture and intrusion detection prevention systems which support standards like PCAP, vulnerability management systems and SIEMs tend to have more proprietary output data formats. This has a lot to do with the fact that vulnerability assessment systems and SIEMs are more so a data sink rather than a data source. Being less likely to send their own data to another system these systems are less obligated to make their output data format compatible with any known standards. For example, Nessus is a leading commercial vulnerability assessment tool. As a result of its vulnerability assessment it generates a report detailing the various weaknesses of a network and its constituents. There is an export option in the Nessus web application. When you export a Nessus report it generates a .Nessus file which is essentially an XML file and contains tags to indicate different parts of a typical Nessus report. The top level tags are policy and report. The starting…

Contents