Tenable Attack Path Analysis
Onboarding Portal
We’re excited for you to get started with your
Attack Path Analysis onboarding.
Leverage these key resources and events to hit the ground running and stay informed of the latest product updates and releases.
Prerequisites
- Familiarize yourself with the key terms as well as categories and data metrics within Tenable One.
- To learn more about your attack paths, review the Tenable One Example Workflow that showcases specific scenarios that you can
leverage after onboarding.
Major Onboarding Steps
To get started with Tenable Attack Path Analysis, follow the steps below:
- 1 Launch a vulnerability scan
- 2 Deploy Identity Exposure
- 3 Launch a Tenable Web App Scan
- 4 Launch a Tenable Cloud Security Scan
- 5 Go to the Workspace
- 6 View your Findings
- 7 Dive Deeper
Deploy Tenable Vulnerability Management and launch a vulnerability scan
Resources:
Major Onboarding Steps
To get started with Tenable Vulnerability Management, follow the steps below.
Best Practices
Use the best practices below to gain the best results for you organizations attack path analysis
- Utilize authenticated scans. We recommend that at least 60% of scanned assets are authenticated.
- Set a scan frequency of at least weekly (highly recommended).
- When deploying Indentity Exposure, ensure the following scan settings are on:
- Collect identity data from Active Directory and
- Have the Override Normal Verbosity Option on