Rumble 2.14: Sync assets, software, and vulnerability data from Tenable, run external discovery from our cloud, and extend your Microsoft Azure coverage
- Sync assets, software, & vulnerability data from Tenable
- Discover external assets with Rumble cloud-hosted scanners
- Track Azure Function Apps through the Microsoft Azure integration
Rumble Enterprise users can now enrich their inventory with an authenticated API connection to Tenable.io or a scan file import from Tenable Nessus. This allows you to search for Tenable attributes, software entries, and vulnerabilities in Rumble, as well as find assets not monitored by Tenable.io or Nessus. Rumble automatically correlates Tenable assets to Rumble assets based on unique fields. Vulnerability data can now be viewed in the asset detail view as well as a dedicated inventory tab. Vulnerability attributes include CVSS score, relevant CVEs, vulnerability description, and any recommended remediations.
View, search, and export vulnerability data through the new Vulnerabilities inventory. This inventory populates through third-party integrations or data imports, such as the Tenable.io integration or a Tenable Nessus scan file import.
After configuring the integration, explore results in your Vulnerabilities inventory.
Rumble Enterprise customers can now scan external-facing assets using the Rumble cloud. Configure a cloud-sourced scan by selecting a hosted zone from the scan configuration screen.
Hosted scans are available for Enterprise SaaS customers and can be enabled by contacting your account manager.
This release also includes support for specifying external scan targets (and exclusions) by AS number and geolocation country. For example, to scan all of AS #13 but exclude the UK, use the scan scope
asn4:13 and the scan exclusion of
The Microsoft Azure integration now supports importing Azure Function Apps through the Azure Web Apps API. When you configure this connector, you can also set it to automatically include new supported asset types as they are added.
Configure the Microsoft Azure integration to include importing Azure Function Apps now.
The Rumble 2.14 release includes a rollup of all the 2.13.x updates, which includes all of the following features, improvements, and updates.
- Scans can now specify
country4:<2-letter ISO code>in the scan and site scope and exclusion fields.
- User access and management improvements
- Single organization administrators can now manage non-global credentials for their organization.
- The size limit for cloud-hosted scans has been increased from 4GiB to 10GiB.
- Bogus results caused by firewall interference are now automatically ignored in more cases.
- Organization overview report now includes asset tags when available.
- The Censys integration now reports the
source_ipfor all services.
- New fingerprints for Atlassian Confluence Server and Atlassian Confluence Data Center.
- Improved ability to fingerprint exact version and build of Atlassian Jira.
- Improved ability to distinguish Oracle Enterprise Linux and Rocky Linux from Red Hat Enterprise Linux.
- New coverage for Docker to identify versions, host OSes, hostnames, and more.
- Improved fingerprint selection and fallback logic resulting in higher quality OS and hardware detection.
- General improvements in fingerprinting, specifically for VoIP, Cisco networking equipment, HP printers, and Lexmark printers.
- Additional support for products by Advantech, Apache, Apple, Ascom, Atos Unify, AudioCodes, Avocent, Belden, Blackberry, Bosch, DallasDelta, Darktrace, Dell, Eaton, EfonVNC, EMC, Encom, Echelon, Ericsson, F5, Fortinet, Gemalto, Grandstream, Hitachi, Honeywell, HPE, IBM, Intel, Juniper, Keycloak, KongHQ, LANDesk, Linksys, Micro Focus, Microsoft, Microware, MinIO, Mitel, NetApp, Netgate, OpenResty, OpenWRT, Pivotal, Polycom, Portainer, Red Hat, RemObjects, Reolink, Samsung, SAS, Schneider Electric, Shelly, Shibboleth, Siemens, Sipura, SoftEther, Spectralink, Steelcase, Sun, VMWare, Wind River, Wowza, Xerox, Yealink, and Zenitel.
- A bug that prevented searching software by version has been fixed.
- A bug that presented input fields for unselected credential types has been fixed.
- A bug that prevented the self-hosted installer from completing has been resolved.
- A bug affecting some users of scan templates has been fixed to ensure the scan configuration is followed.
- A bug preventing the “TLS JARM hashes” report from properly running has been fixed.
- A bug preventing the “TLS serial numbers” report from properly running has been fixed.
- A bug that could lead to event processing terminating early has been resolved.
Want to take Rumble for a spin? Sign up for a free trial to try out these capabilities free for 21 days.
June 14, 2022
One ping to find them: lean network discovery
Our engineering team focuses on getting the maximum amount of information from the network while sending as little traffic as possible. This lean approach to network discovery is driven by our goal of being fast and safe for all networks. The more we can learn about a system …Read More
June 7, 2022
A prize-winning community integration between Rumble and Microsoft Sentinel
Josh Lucas, a cybersecurity engineer at Loop Secure, recently took first place in Microsoft’s Sentinel Hackathon for his submission, “Rumble Network Discovery solution for Microsoft Sentinel.” For his project, Josh was looking for a way to better enable security teams during …Read More
May 10, 2022
Rumble 2.13: Sync assets & software from SentinelOne, track more cloud resources, view cross-organization inventory, and schedule automated reports
What’s new with Rumble 2.13? Sync asset and software inventory from SentinelOne Explore software identified through Rumble scans Track more cloud resources from AWS, Azure, and GCP Work with your asset inventory across organizations Schedule and email the …Read More