Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Vulnerability Management onboarding portal

Tenable Vulnerability Management
basics and getting started

Leverage these key resources and events to hit the ground running and stay informed of the latest product updates and releases.

Major onboarding steps

To get started with Tenable Vulnerability Management, follow the steps below.

Install and link scanners and sensors to Tenable Vulnerability Management

Resources:

Evaluate the effectiveness of your deployment plan and analysis workflow

Resources:

Add users to your account (Requires Administrator user role)

Resources:

Organize, group, and control access to assets (Requires Administrator user role)

Resources:

View and analyze vulnerability and asset findings

Resources:

Gain immediate insight and quickly analyze vulnerabilities in your network. Explore your data with interactive widgets and customizable tables

Resources:

Drill into data to narrow scope or investigate your progress across tags

Resources:

Share scan and vulnerability information with stakeholders

Resources:

Discover cloud assets in near-real time (requires Tenable One or Tenable Cloud Security license)

Resources:

Major Onboarding Steps

To get started with Tenable Vulnerability Management, follow the steps below.

2 Install scanners

Install and link scanners and sensors to Tenable Vulnerability Management

Resources:

3 Run Basic Scans

Evaluate the effectiveness of your deployment plan and analysis workflow

Resources:

4 Create a user account

Add users to your account (Requires Administrator user role)

Resources:

5 Configure tags

Organize, group, and control access to assets (Requires Administrator user role)

Resources:

6 View findings

View and analyze vulnerability and asset findings

Resources:

7 Create a dashboard
8 Create filters

Drill into data to narrow scope or investigate your progress across tags

Resources:

9 Export a report

Share scan and vulnerability information with stakeholders

Resources:

10 Discover cloud assets

Discover cloud assets in near-real time (requires Tenable One or Tenable.cs license)

Resources:

Best practices

Use these Best practices to get the most from your investment and set the foundation for becoming a power user:

  • Utilize the Tenable vulnerability priority rating (VPR) to prioritize the remediation of the highest risk vulnerabilities first.
  • The scan or policy’s Credentials page allows you to configure the Tenable Nessus scanner to use authentication credentials during scanning. Configuring credentials allows Tenable Nessus to perform a wider variety of checks that result in more accurate scan results.
  • You can compare two scan results to see differences between them. This comparison is not a true differential of the two results; it shows the new vulnerabilities that Tenable Nessus detected between the older baseline scan and the newer scan. Comparing scan results helps you see how a given system or network has changed over time. This information is useful for compliance analysis by showing how vulnerabilities are being remediated, if systems are patched as Tenable Nessus finds new vulnerabilities, or how two scans may not be targeting the same hosts.
  • Use the Live Results feature to view scan results for new plugins based on a scan's most recently collected data, without running a new scan. Live Results allow you to see potential new threats and determine if you need to launch a scan manually to confirm the findings.