Tenable Identity Exposure onboarding portal
We’re excited for you to get started with your
Tenable Identity Exposure onboarding.
Leverage these key resources and events to hit the ground running and stay informed of the latest product updates and releases.
Major onboarding steps
To get started with Tenable Identity Exposure, follow the steps below.
- 1 Prepare your deployment
- 2 Install Tenable Identity Exposure
- 3 Deploy IoA
- 4 Manage your infrastructure
- 5 Create a dashboard
- 6 Add users
- 7 Configure access
- 8 Define a scenario
Review the architectures and prerequisites to ensure your platform runs optimally
Resources:
Download and install Tenable Identity Exposure
Resources:
- Docs: Install Tenable Identity Exposure
- Docs: View best practices in On-premises installation guide
Deploy the Indicators of Attack (IoA) module in your Active Directory
Resources:
Use the Tenable Identity Exposure portal to review, manage and receive relevant information about the security state of the monitored infrastructure
Resources:
Use dashboards and reports to view and efficiently monitor the security in your active directory infrastructure
Resources:
- Docs: Create a dashboard
- Docs: Add widgets
Secure access to data and functions within your organization with role-based access control (RBAC)
Resources:
Define an attack scenario by selecting the types of attack to monitor on specific domains
Resources:
Major Onboarding Steps
To get started with Tenable Vulnerability Management, follow the steps below.
Review the architectures and prerequisites to ensure your platform runs optimally
Resources:
Download and install Tenable Identity Exposure
Resources:
- Docs: Install Tenable Identity Exposure
- Docs: View best practices in On-premises installation guide
Deploy the Indicators of Attack (IoA) module in your Active Directory
Resources:
Use the Tenable Identity Exposure portal to review, manage and receive relevant information about the security state of the monitored infrastructure
Resources:
Use dashboards and reports to view and efficiently monitor the security in your active directory infrastructure
Resources:
- Docs: Create a dashboard
- Docs: Add widgets
Secure access to data and functions within your organization with role-based access control (RBAC)
Resources:
Define an attack scenario by selecting the types of attack to monitor on specific domains
Resources:
Best practices
Use these best practices to get the most from your investment and set the foundation for becoming a power user:
- Make sure critical vulnerabilities have been remediated by following the recommendations specified in Indicators of Exposure (IoE) feedback.
- Configure security profiles to maintain different types of users who can review security analysis from different reporting angles.
- Anticipate the privilege escalation technique that an attacker will use to reach a business asset from a specific entry point using attack path.
- Set up IoE and IoA alerts in the alerts panel.
- Enable syslog notifications related to IoE.