Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable One
Onboarding Portal

A Unified Approach to Exposure Management

We’re excited for you to get started with Tenable One. Use this page to familiarize yourself with critical milestones and resources to get up to speed better understand how to get the full value of the Tenable One platform.

Achieving Onboarding Success

By the end of your Tenable One onboarding you should be able to:

See All Assets and Vulnerabilities

Predict
and Prioritize

Effectively Communicate Cyber Risk

Getting Started

Tenable One Basics

Leverage these key resources and events to hit the ground running and stay informed of the latest product updates and releases.

Tenable One Education & Services

Need help getting started? Our Professional Services team is here to help with services, training and education to help you get up and running and make the most of Tenable One.

Things to Consider Before Deploying Tenable One

Tags: Tagging is a critical component of Tenable One. The way you tag your data is how you ultimately visualize that data in your Exposure Cards. Exposure Cards can include one or more tags. Therefore, the tags you create dictate the custom exposure cards you can create.

Onboarding Order: Onboarding order will vary by your needs and priorities. Below is our suggested order.

  1. Tenable Vulnerability Management
  2. Tenable Security Center
  3. Tenable Web App Scanning
  4. Tenable Identity Exposure
  5. Tenable Attack Surface Management
  6. Tenable Cloud Security
  7. Tenable OT Security
  8. Asset Inventory
  9. Lumin Exposure View
  10. Tenable Attack Path Analysis

Onboarding Products

The more Tenable applications you use the more comprehensive your data and cyber risk insight! Set up additional Tenable applications now to gain complete visibility across your attack surface.

As part of Tenable One, you have access to the following applications. Select an application to view onboarding details.

Tenable Vulnerability Management

The Value of Tenable Vulnerability Management

Tenable Vulnerability Management sets the foundation for Tenable One. You get:

  • Continuous discovery and assessment with always-on sensors
  • Built in threat intelligence
  • Automated vulnerability prioritization
  • Fully documented API and pre-build integrations

For full onboarding steps visit the Tenable Vulnerability Management onboarding page.

Important Onboarding Milestones

Set up tags

Tags are a critical component of Tenable One. The tags you create will determine the analysis that you can perform. When setting up tags consider how you want to visualize your assets. For example, tagging assets by geography, business unit and asset type allows for analysis on each of those groupings. All tags created in Tenable Vulnerability Management will automatically sync to Tenable One. This is how you will analyze data in Custom Exposure Cards within Tenable One.

Get comprehensive scan data

The more assets and asset types you scan, the more comprehensive your risk insight will be. We encourage you to also set up Tenable Identity Exposure, Tenable Cloud Security and Tenable Web App Scanning in your environment.

Scan frequently

We recommend you scan frequently. The more you scan, the more often your data refreshes in Tenable One, making the data being presented more relevant.

Review the Asset Criticality Rating of your most critical assets

Most organizations know about their critical assets (ACR = 10). From there, work backwards to identify the next most important assets and validate/adjust their ACR as necessary (Note: Tenable will score only up to an ACR of 8, it is up to the customer to assign a 9 or 10 if an asset warrants that.)

Applying Tenable Vulnerability Management to Tenable One