Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Security Center
Onboarding Portal

Tenable Security Center
Basics and Getting Started

Leverage these key resources and events to hit the ground running and stay informed of the latest product updates and releases.

Major Onboarding Steps

To get started with Tenable Security Center, follow the steps below.

Prepare your deployment plan and review the architecture and any prerequisites.

Resources:

Install and link scanners and sensors to Tenable Security Center.

Resources:

Launch a host discovery scan to understand your environment.

Resources:


For additional onboarding steps and more information review the Tenable Security Center Getting Started Guide.

Major Onboarding Steps

To get started with Tenable Security Center, follow the steps below.

1 Make a Plan

Prepare your deployment plan and review the architecture and any prerequisites.

Resources:

2 Install Tenable Security Center
3 Install Scanners

Install and link scanners and sensors to Tenable Security Center.

Resources:

4 Launch a Discovery Scan

Launch a host discovery scan to understand your environment.

Resources:

Best Practices

Use these best practices to get the most from your investment and set the foundation for becoming a power user:

  • Extend scan coverage and increase visibility into hard to scan assets by installing Nessus Agents locally on hosts and relayed through a Nessus Manager to Tenable Security Center.
  • Ensure Nessus Scanners are placed on the target side of any firewall, VPN, or geographical segregated connections to ensure the most accurate data and least disruption to network operations.
  • Utilize the Tenable vulnerability priority rating (VPR) and the Tenable Asset Criticality Rating (ACR) to prioritize the remediation of the highest risk vulnerabilities on the most important hosts first.
  • Run credentialed scans for the most accurate picture of your environment. Read benefits and limitations to learn which sensors are best for your environment.
  • Ensure previously discovered vulnerabilities have been remediated by running a remediation scan. Then, use the vulnerability state filter to track remediation metrics.
  • Set up accept/recast rules to modify vulnerability severity or accept the risk altogether based on your organization's unique environment.
  • Consider product integrations to increase efficiencies and gain context across your exposure data. For more information view Tenable Ecosystem Partners.