Tenable Identity Exposure onboarding portal
We’re excited for you to get started with your
Tenable Identity Exposure onboarding.
Leverage these key resources and events to hit the ground running and stay informed of the latest product updates and releases.
Major onboarding steps
To get started with Tenable Identity Exposure, follow the steps below.
- 1 Installing Tenable Identity Exposure
- 2 Connecting Tenable Identity Exposure to Active Directory (AD)
- 3 Deploying Indicators of Attack (IOA) for your Active Directory (AD)
- 4 Connecting Tenable Identity Exposure to Entra ID (AAD)
- 5 Customizing your AD IoE and IoA
- 6 Alerts
- 7 Dashboards
- 8 Reporting Center
Install Tenable Identity Exposure.
Resources:
Connect your Microsoft AD environment to Tenable Identity Exposure to enable IoE.
Resources:
Configure and deploy the IoA module for the monitored domains.
Resources:
- Docs: Deploy IoAs (SaaS)
- Docs: Deploy IoAs (On-prem)
Configure Microsoft Graph and Tenable Vulnerability Management to enable IoE for Entra ID.
Resources:
Customize security profiles to create your own view of risks affecting your AD.
Resources:
- Video: Customize IoE and IoA for AD
Learn about Syslog and email alerts in Tenable Identity Exposure.
Resources:
Learn to create and use Dashboards in Tenable Identity Exposure.
Resources:
Create reports that allow you to export important data to key stakeholders.
Resources:
- Video: Create and Export Reports
Major Onboarding Steps
To get started with Tenable Vulnerability Management, follow the steps below.
Install Tenable Identity Exposure.
Resources:
Connect your Microsoft AD environment to Tenable Identity Exposure to enable IoE.
Resources:
Configure and deploy the IoA module for the monitored domains.
Resources:
- Docs: Deploy IoAs (SaaS):
- Docs: Deploy IoAs (On-prem):
Configure Microsoft Graph and Tenable Vulnerability Management to enable IoE for Entra ID.
Resources:
Customize security profiles to create your own view of risks affecting your AD.
Resources:
- Video: Customize IoE and IoA for AD
Learn about Syslog and email alerts in Tenable Identity Exposure.
Resources:
Learn to create and use Dashboards in Tenable Identity Exposure.
Resources:
Create reports that allow you to export important data to key stakeholders.
Resources:
- Video: Create and Export Reports
Best practices
Use these best practices to get the most from your investment and set the foundation for becoming a power user:
- Make sure critical vulnerabilities have been remediated by following the recommendations specified in Indicators of Exposure (IoE) feedback.
- Configure security profiles to maintain different types of users who can review security analysis from different reporting angles.
- Anticipate the privilege escalation technique that an attacker will use to reach a business asset from a specific entry point using attack path.
- Set up IoE and IoA alerts in the alerts panel.
- Enable syslog notifications related to IoE.