Tenable OT Security Onboarding Portal
Tenable OT Security
Basics and Getting Started
Leverage these key resources and events to hit the ground running and stay informed of the latest product updates and releases.
Major Onboarding Steps
To get started with Tenable OT Security, follow the steps below.
- 1 Make a plan
- 2 Prepare for deployment
- 3 Deploy Tenable OT Security
- 4 Activate Your License
- 5 Launch Tenable OT Security
Review the Tenable OT Security system architecture, design, terms, and capabilities.
Resources:
Prepare to install your Industrial Core Platform (ICP)
Resources:
Tenable OT Security can be deployed one of two ways. We offer a physical appliance, and the ability to deploy a virtual machine in your environment.
To deploy Tenable OT Security on a physical appliance: Install, connect, and configure your Tenable-provided hardware appliance.
To deploy the ICP as a virtual appliance: Download and deploy the relevant .ova or .iso file.
Resources:
Note: Most virtual deployments use the .ova file, which is compatible with VMware. The .iso file can be used for both hardware and virtual installations, including customer-supplied hardware, Hyper-V, or Nutanix.
Get ready for launching the system.
Activate your license. After deployment, activate your Tenable OT Security license. If your asset count post-deployment exceeds your license limit, please contact your Tenable representative. Also, consider optimizing your deployment by hiding non-essential assets to stay within your license bounds.
Resources:
Power up your OT security journey by booting up the system and watching it come to life. As Tenable OT Security springs into action, take a moment to apply your initial configuration, tailoring it to your unique environment. Within minutes, you'll be exploring your first insights, seeing your OT landscape.
Activate your license.
Resources:
- Docs: Launch OT Security
For additional onboarding steps and more information review the Tenable OT Security Getting Started Guide.
Major Onboarding Steps
To get started with Tenable Vulnerability Management, follow the steps below.
Deploy Tenable OT Security using a physical appliance or virtual machine.
Resources:
Note: If you have not received your appliance after 7 days, please contact your Tenable representative.
Tenable OT Security may be deployed using a physical appliance or using a virtual machine. Review these steps if you are installing virtually.
Resources:
After you’ve installed Tenable OT Security, the next step is to activate your license using your license code.
Resources:
Best Practices
Get the most from your investment and set the foundation for becoming a power user with these proven practices:
- Accelerate your Tenable OT Security journey with the Tenable Solution Adoption Framework provided by our Professional Services team.
- Sign up for Tenable OT Security Training for in-depth, instructor-led courses to gain expert knowledge about the platform and how to maximize value.
- Customize the monitored network range and hide any unwanted assets.
- Enable Active Queries such as "Initial Asset Enrichment" and deploy sensors if you have them.
- Perform advanced queries such as WMI, Snapshots, or Nessus Scans where appropriate.
- Tune policy events to reduce noise and resolve any past events where policy was tuned.
- Integrate your Tenable OT Security data with other Tenable products or third-party products.
- Consider product integrations to increase efficiencies and gain context across your exposure data. For more information on available integrations, visit our Tenable Ecosystem Partner portal.