Tenable Vulnerability Management onboarding portal
Tenable Vulnerability Management
basics and getting started
Leverage these key resources and events to hit the ground running and stay informed of the latest product updates and releases.
Major onboarding steps
To get started with Tenable Vulnerability Management, follow the steps below.
- 1 Make a plan
- 2 Install scanners
- 3 Run basic scans
- 4 Create a user account
- 5 Configure tags
- 6 View findings
- 7 Create a dashboard
- 8 Create filters
- 9 Export a report
- 10 Discover cloud assets
Prepare your deployment plan
Resources:
Install and link scanners and sensors to Tenable Vulnerability Management
Resources:
Evaluate the effectiveness of your deployment plan and analysis workflow
Resources:
Add users to your account (Requires Administrator user role)
Resources:
Organize, group, and control access to assets (Requires Administrator user role)
Resources:
View and analyze vulnerability and asset findings
Resources:
Gain immediate insight and quickly analyze vulnerabilities in your network. Explore your data with interactive widgets and customizable tables
Resources:
Drill into data to narrow scope or investigate your progress across tags
Resources:
Share scan and vulnerability information with stakeholders
Resources:
- Docs: Create a report
- Docs: Email report results
Discover cloud assets in near-real time (requires Tenable One or Tenable Cloud Security license)
Resources:
- Docs: Connectors
- Docs: Agentless Assessment
- Quick Sheet: Cloud Connectors
Major Onboarding Steps
To get started with Tenable Vulnerability Management, follow the steps below.
Prepare your deployment plan
Resources:
Install and link scanners and sensors to Tenable Vulnerability Management
Resources:
Evaluate the effectiveness of your deployment plan and analysis workflow
Resources:
Add users to your account (Requires Administrator user role)
Resources:
Organize, group, and control access to assets (Requires Administrator user role)
Resources:
View and analyze vulnerability and asset findings
Resources:
View and analyze vulnerability and asset findings
Resources:
Drill into data to narrow scope or investigate your progress across tags
Resources:
Share scan and vulnerability information with stakeholders
Resources:
- Docs: Create a report
- Video: Email report results
Discover cloud assets in near-real time (requires Tenable One or Tenable.cs license)
Resources:
- Docs: Connectors
- Docs: Agentless assessment
- Quick Sheet: Cloud Connectors
Best practices
Use these Best practices to get the most from your investment and set the foundation for becoming a power user:
- Utilize the Tenable vulnerability priority rating (VPR) to prioritize the remediation of the highest risk vulnerabilities first.
- The scan or policy’s Credentials page allows you to configure the Tenable Nessus scanner to use authentication credentials during scanning. Configuring credentials allows Tenable Nessus to perform a wider variety of checks that result in more accurate scan results.
- You can compare two scan results to see differences between them. This comparison is not a true differential of the two results; it shows the new vulnerabilities that Tenable Nessus detected between the older baseline scan and the newer scan. Comparing scan results helps you see how a given system or network has changed over time. This information is useful for compliance analysis by showing how vulnerabilities are being remediated, if systems are patched as Tenable Nessus finds new vulnerabilities, or how two scans may not be targeting the same hosts.
- Use the Live Results feature to view scan results for new plugins based on a scan's most recently collected data, without running a new scan. Live Results allow you to see potential new threats and determine if you need to launch a scan manually to confirm the findings.