Tenable Vulnerability Management Onboarding Portal
Tenable Vulnerability Management
Basics and Getting Started
Leverage these key resources and events to hit the ground running and stay informed of the latest product updates and releases.
Major Onboarding Steps
To get started with Tenable Vulnerability Management, follow the steps below.
- 1 Make a Plan
- 2 Install Scanners
- 3 Run Basic Scans
- 4 Create a User Account
- 5 Configure Tags
- 6 View Findings
- 7 Create a Dashboard
- 8 Create Filters
- 9 Export a Report
- 10 Discover Cloud Assets
Prepare your deployment plan
Resources:
Install and link scanners and sensors to Tenable Vulnerability Management
Resources:
Evaluate the effectiveness of your deployment plan and analysis workflow
Resources:
Add users to your account (Requires Administrator user role)
Resources:
Organize, group, and control access to assets (Requires Administrator user role)
Resources:
View and analyze vulnerability and asset findings
Resources:
Gain immediate insight and quickly analyze vulnerabilities in your network. Explore your data with interactive widgets and customizable tables
Resources:
Drill into data to narrow scope or investigate your progress across tags
Resources:
Share scan and vulnerability information with stakeholders
Resources:
- Docs: Create a report
- Docs: Email report results
Discover cloud assets in near-real time (requires Tenable One or Tenable Cloud Security license)
Resources:
- Docs: Connectors
- Docs: Agentless Assessment
- Quick Sheet: Cloud Connectors
For additional onboarding steps and more information review the Tenable Vulnerability Management Getting Started Guide.
Major Onboarding Steps
To get started with Tenable Vulnerability Management, follow the steps below.
Prepare your deployment plan
Resources:
Install and link scanners and sensors to Tenable Vulnerability Management
Resources:
Evaluate the effectiveness of your deployment plan and analysis workflow
Resources:
Add users to your account (Requires Administrator user role)
Resources:
Organize, group, and control access to assets (Requires Administrator user role)
Resources:
View and analyze vulnerability and asset findings
Resources:
View and analyze vulnerability and asset findings
Resources:
Drill into data to narrow scope or investigate your progress across tags
Resources:
Share scan and vulnerability information with stakeholders
Resources:
- Docs: Create a report
- Video: Email report results
Discover cloud assets in near-real time (requires Tenable One or Tenable.cs license)
Resources:
- Docs: Connectors
- Docs: Agentless assessment
- Quick Sheet: Cloud Connectors
Best Practices
Use these best practices to get the most from your investment and set the foundation for becoming a power user:
- Extend scan coverage and increase visibility into hard to scan assets by installing Nessus Agents locally on hosts.
- Utilize the Tenable vulnerability priority rating (VPR) to prioritize the remediation of the highest risk vulnerabilities first.
- If you own Tenable Vulnerability Management or Tenable One Standard, you can view a portion of your internet-facing assets that could pose risk. To get started, view your domain inventory.
- Run credentialed scans for the most accurate picture of your environment. Read benefits and limitations to learn which sensors are best for your environment.
- Ensure previously discovered vulnerabilities have been remediated by running a remediation scan. Then, use the vulnerability state filter to track remediation metrics.
- Set up accept/recast rules to modify vulnerability severity or accept the risk altogether based on your organization's unique environment.
- Consider product integrations to increase efficiencies and gain context across your exposure data. For more information view Tenable Ecosystem Partners.