Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Identity Exposure
Onboarding Portal

Tenable Identity Exposure
Basics and Getting Started

Leverage these key resources so you can hit the ground running.

Major Onboarding Steps

To get started with Tenable Identity Exposure, follow the steps below.

Review the architectures and prerequisites to ensure your platform runs optimally

Resources:

Download and install Tenable Identity Exposure

Resources:

Deploy the Indicators of Attack (IoA) module in your Active Directory

Resources:

Use the Tenable Identity Exposure portal to review, manage and receive relevant information about the security state of the monitored infrastructure

Resources:

Use dashboards and reports to view and efficiently monitor the security in your active directory infrastructure

Resources:

Create and add users in Tenable Identity Exposure

Resources:

Secure access to data and functions within your organization with role-based access control (RBAC)

Resources:

Define an attack scenario by selecting the types of attack to monitor on specific domains

Resources:

Major Onboarding Steps

To get started with Tenable Vulnerability Management, follow the steps below.

1 Prepare Your Deployment

Review the architectures and prerequisites to ensure your platform runs optimally

Resources:

2 Install Tenable Identity Exposure

Download and install Tenable Identity Exposure

Resources:

3 Deploy IoA

Deploy the Indicators of Attack (IoA) module in your Active Directory

Resources:

4 Manage Your Infrastructure

Use the Tenable Identity Exposure portal to review, manage and receive relevant information about the security state of the monitored infrastructure

Resources:

5 Create a Dashboard

Use dashboards and reports to view and efficiently monitor the security in your active directory infrastructure

Resources:

6 Add Users

Create and add users in Tenable Identity Exposure

Resources:

7 Configure Access

Secure access to data and functions within your organization with role-based access control (RBAC)

Resources:

8 Defina a Scenario

Define an attack scenario by selecting the types of attack to monitor on specific domains

Resources:

Best Practices

Use these best practices to get the most from your investment and make your Active Directory security program more effective:

  • Make sure critical vulnerabilities have been remediated by following the recommendations specified in Indicators of Exposure (IoE) feedback.
  • Configure security profiles to maintain different types of users who can review security analysis from different reporting angles.
  • Anticipate the privilege escalation technique that an attacker will use to reach a business asset from a specific entry point using attack path.
  • Set up IoE and IoA alerts in the alerts panel.
  • Enable syslog notifications related to IoE.