Skip to main content


Splunk Lantern active scanning, agents, passive monitoring, cloud connectors and CMDB integrations provide unified visibility and a continuous view of all of your assets—both known and previously unknown. In the Common Information Model, data can be mapped to the Vulnerabilities data model.

Data visibility allows you to combine vulnerability data, threat intelligence, and data science for easy-to-understand risk scores to quickly assess risk and know which vulnerabilities to fix first.

Data application

When your Splunk deployment is ingesting, you can use the data to achieve the following:


Additional guidance for onboarding data can be found in the Spunk Documentation, Getting Data In (Splunk Enterprise) or Getting Data In (Splunk Cloud), and in the Tenable for Splunk documentation.

  • Was this article helpful?