Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Vulnerability Management Onboarding Portal

Tenable Vulnerability Management
Basics and Getting Started

Leverage these key resources and events to hit the ground running and stay informed of the latest product updates and releases.

Major Onboarding Steps

To get started with Tenable Vulnerability Management, follow the steps below.

Install and link scanners and sensors to Tenable Vulnerability Management

Resources:

Evaluate the effectiveness of your deployment plan and analysis workflow

Resources:

Add users to your account (Requires Administrator user role)

Resources:

Organize, group, and control access to assets (Requires Administrator user role)

Resources:

View and analyze vulnerability and asset findings

Resources:

Gain immediate insight and quickly analyze vulnerabilities in your network. Explore your data with interactive widgets and customizable tables

Resources:

Drill into data to narrow scope or investigate your progress across tags

Resources:

Share scan and vulnerability information with stakeholders

Resources:

Discover cloud assets in near-real time (requires Tenable One or Tenable Cloud Security license)

Resources:


For additional onboarding steps and more information review the Tenable Vulnerability Management Getting Started Guide.

Major Onboarding Steps

To get started with Tenable Vulnerability Management, follow the steps below.

2 Install Scanners

Install and link scanners and sensors to Tenable Vulnerability Management

Resources:

3 Run Basic Scans

Evaluate the effectiveness of your deployment plan and analysis workflow

Resources:

4 Create a User Account

Add users to your account (Requires Administrator user role)

Resources:

5 Configure Tags

Organize, group, and control access to assets (Requires Administrator user role)

Resources:

6 View Findings

View and analyze vulnerability and asset findings

Resources:

7 Create a Dashboard
8 Create Filters

Drill into data to narrow scope or investigate your progress across tags

Resources:

9 Export a Report

Share scan and vulnerability information with stakeholders

Resources:

10 Discover Cloud Assets

Discover cloud assets in near-real time (requires Tenable One or Tenable.cs license)

Resources:

Best Practices

Use these best practices to get the most from your investment and set the foundation for becoming a power user:

  • Extend scan coverage and increase visibility into hard to scan assets by installing Nessus Agents locally on hosts.
  • Utilize the Tenable vulnerability priority rating (VPR) to prioritize the remediation of the highest risk vulnerabilities first.
  • If you own Tenable Vulnerability Management or Tenable One Standard, you can view a portion of your internet-facing assets that could pose risk. To get started, view your domain inventory.
  • Run credentialed scans for the most accurate picture of your environment. Read benefits and limitations to learn which sensors are best for your environment.
  • Ensure previously discovered vulnerabilities have been remediated by running a remediation scan. Then, use the vulnerability state filter to track remediation metrics.
  • Set up accept/recast rules to modify vulnerability severity or accept the risk altogether based on your organization's unique environment.
  • Consider product integrations to increase efficiencies and gain context across your exposure data. For more information view Tenable Ecosystem Partners.