Is it possible to extract additional fields using the `nessus2splunk.py` script found within Splunk Add-on for Nessus?
Some useful fields would include the following:
false No known exploits are available
↧