Facebook Google Plus Twitter LinkedIn YouTube RSS Menu Search Resource - BlogResource - WebinarResource - ReportResource - Eventicons_066 icons_067icons_068icons_069icons_070

Tenable Identity Exposure onboarding portal

We’re excited for you to get started with your
Tenable Identity Exposure onboarding.

Leverage these key resources and events to hit the ground running and stay informed of the latest product updates and releases.

Major onboarding steps

To get started with Tenable Identity Exposure, follow the steps below.

Connect your Microsoft AD environment to Tenable Identity Exposure to enable IoE.

Resources:

Configure and deploy the IoA module for the monitored domains.

Resources:

Configure Microsoft Graph and Tenable Vulnerability Management to enable IoE for Entra ID.

Resources:

Customize security profiles to create your own view of risks affecting your AD.

Resources:

Learn about Syslog and email alerts in Tenable Identity Exposure.

Resources:

Learn to create and use Dashboards in Tenable Identity Exposure.

Resources:

Create reports that allow you to export important data to key stakeholders.

Resources:

Major Onboarding Steps

To get started with Tenable Vulnerability Management, follow the steps below.

1 Installing Tenable Identity Exposure
2 Connecting Tenable Identity Exposure to Active Directory (AD)

Connect your Microsoft AD environment to Tenable Identity Exposure to enable IoE.

Resources:

3 Deploying Indicators of Attack (IOA) for your Active Directory (AD)

Configure and deploy the IoA module for the monitored domains.

Resources:

4 Connecting Tenable Identity Exposure to Entra ID (AAD)

Configure Microsoft Graph and Tenable Vulnerability Management to enable IoE for Entra ID.

Resources:

5 Customizing your AD IoE and IoA

Customize security profiles to create your own view of risks affecting your AD.

Resources:

6 Alerts

Learn about Syslog and email alerts in Tenable Identity Exposure.

Resources:

7 Dashboards

Learn to create and use Dashboards in Tenable Identity Exposure.

Resources:

8 Reporting Center

Create reports that allow you to export important data to key stakeholders.

Resources:

Best practices

Use these best practices to get the most from your investment and set the foundation for becoming a power user:

  • Make sure critical vulnerabilities have been remediated by following the recommendations specified in Indicators of Exposure (IoE) feedback.
  • Configure security profiles to maintain different types of users who can review security analysis from different reporting angles.
  • Anticipate the privilege escalation technique that an attacker will use to reach a business asset from a specific entry point using attack path.
  • Set up IoE and IoA alerts in the alerts panel.
  • Enable syslog notifications related to IoE.