Tenable Identity Exposure
Onboarding Portal
Tenable Identity Exposure
Basics and Getting Started
Leverage these key resources so you can hit the ground running.
Major Onboarding Steps
To get started with Tenable Identity Exposure, follow the steps below.
- 1 Prepare your Deployment
- 2 Install Tenable Identity Exposure
- 3 Deploy IoA
- 4 Manage Your Infrastructure
- 5 Create a Dashboard
- 6 Add Users
- 7 Configure Access
- 8 Define a Scenario
Review the architectures and prerequisites to ensure your platform runs optimally
Resources:
Download and install Tenable Identity Exposure
Resources:
- Docs: Install Tenable Identity Exposure
- Docs: View best practices in On-premises installation guide
Deploy the Indicators of Attack (IoA) module in your Active Directory
Resources:
Use the Tenable Identity Exposure portal to review, manage and receive relevant information about the security state of the monitored infrastructure
Resources:
Use dashboards and reports to view and efficiently monitor the security in your active directory infrastructure
Resources:
- Docs: Create a Dashboard
- Docs: Add widgets
Secure access to data and functions within your organization with role-based access control (RBAC)
Resources:
Define an attack scenario by selecting the types of attack to monitor on specific domains
Resources:
Major Onboarding Steps
To get started with Tenable Vulnerability Management, follow the steps below.
Review the architectures and prerequisites to ensure your platform runs optimally
Resources:
Download and install Tenable Identity Exposure
Resources:
- Docs: Install Tenable Identity Exposure
- Docs: View best practices in On-premises installation guide
Deploy the Indicators of Attack (IoA) module in your Active Directory
Resources:
Use the Tenable Identity Exposure portal to review, manage and receive relevant information about the security state of the monitored infrastructure
Resources:
Use dashboards and reports to view and efficiently monitor the security in your active directory infrastructure
Resources:
- Docs: Create a Dashboard
- Docs: Add widgets
Secure access to data and functions within your organization with role-based access control (RBAC)
Resources:
Define an attack scenario by selecting the types of attack to monitor on specific domains
Resources:
Best Practices
Use these best practices to get the most from your investment and make your Active Directory security program more effective:
- Make sure critical vulnerabilities have been remediated by following the recommendations specified in Indicators of Exposure (IoE) feedback.
- Configure security profiles to maintain different types of users who can review security analysis from different reporting angles.
- Anticipate the privilege escalation technique that an attacker will use to reach a business asset from a specific entry point using attack path.
- Set up IoE and IoA alerts in the alerts panel.
- Enable syslog notifications related to IoE.