Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Attack Path Analysis onboarding portal

We’re excited for you to get started with your
Attack Path Analysis onboarding.

Leverage these key resources and events to hit the ground running and stay informed of the latest product updates and releases.

Major onboarding steps

To get started with Tenable Attack Path Analysis, follow the steps below.

Deploy Tenable Vulnerability Management and launch a VM scan

Resources:

Deploy Identity Exposure

Resources:

Include injection plugins

Resources:

Include vulnerabilities and available AWS resources

Resources:

Access Attack Path Analysis

Resources:

View your findings

Resources:

Discover additional Attack data

Resources:

Major Onboarding Steps

To get started with Tenable Vulnerability Management, follow the steps below.

1 Launch a scan

Deploy Tenable Vulnerability Management and launch a scan

Resources:

2 Deploy Identity Exposure

Deploy Identity Exposure

Resources:

3 Go to the workspace

Access Attack Path Analysis

Resources:

4 View your findings

View your findings

Resources:

5 Discover additional attack data

Discover additional attack data

Resources:

Best practices

Use these Best practices to get the most from your investment and set the foundation for becoming a power user:

  • Utilize authenticated scans. We recommend that at least 60% of scanned assets are authenticated.
  • Set a scan frequency of at least weekly (highly recommended).
  • When deploying Indentity Exposure, ensure the following scan settings are on:
    1. Collect identity data from Active Directory and
    2. Have the Override Normal Verbosity Option on