Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Web App Scanning
Onboarding Portal

Tenable Web App Scanning
Basics and Getting Started

Leverage these key resources so you can hit the ground running.

Major Onboarding Steps

To get started, we recommend you start with the following onboarding steps.

Create a web application scan

Resources:

Tune your web application scans

Resources:

Analyze and manage your scan results

Resources:

Add credentials to scans to simplify authentication

Resources:

Take a deep dive into tuning for larger applications

Resources:

Major Onboarding Steps

To get started with Tenable Vulnerability Management, follow the steps below.

1 Make a Plan

Create a web application scan

Resources:

2 Install Scanners

Tune your web application scans

Resources:

3 Run Basic Scans

Evaluate the effectiveness of your deployment plan and analysis workflow

Analyze and manage your scan results

Resources:

4 Create a User Account

Add credentials to scans to simplify authentication

Resources:

5 Configure Tags

Take a deep dive into tuning for larger applications

Resources:

Best Practices

Use these best practices to get the most from your investment and set the foundation for becoming a power user:

  • Extend scan coverage and increase visibility into hard to scan assets by installing Nessus Agents locally on hosts.
  • Utilize the Tenable vulnerability priority rating (VPR) to prioritize the remediation of the highest risk vulnerabilities first.
  • If you own Tenable Vulnerability Management or Tenable One Standard, you can view a portion of your internet-facing assets that could pose risk. To get started, view your domain inventory.
  • Run credentialed scans for the most accurate picture of your environment. Read benefits and limitations to learn which sensors are best for your environment.
  • Ensure previously discovered vulnerabilities have been remediated by running a remediation scan. Then, use the vulnerability state filter to track remediation metrics.
  • Set up accept/recast rules to modify vulnerability severity or accept the risk altogether based on your organization's unique environment.
  • Consider product integrations to increase efficiencies and gain context across your exposure data. For more information view Tenable Ecosystem Partners.