Tenable Security Center onboarding portal
We’re excited for you to get started with your
Tenable Security Center onboarding.
Leverage these key resources and events to hit the ground running and stay informed of the latest product updates and releases.
Major onboarding steps
To get started with Tenable Security Center, follow the steps below.
- 1 Make a plan
- 2 Install Tenable Security Center
- 3 Install scanners
- 4 Launch a discovery scan
Prepare your deployment plan and review the architecture and any prerequisites.
Resources:
Install and license Tenable Security Center.
Resources:
Install and link scanners and sensors to Tenable Security Center.
Resources:
Launch a host discovery scan to understand your environment.
Resources:
- Docs: Discovery scan
- 影片:Launch a discovery scan
Major Onboarding Steps
To get started with Tenable Security Center, follow the steps below.
Prepare your deployment plan and review the architecture and any prerequisites.
Resources:
Install and license Tenable Security Center.
Resources:
Install and link scanners and sensors to Tenable Security Center.
Resources:
Launch a host discovery scan to understand your environment.
Resources:
- Docs: Discovery scan
- 影片:Launch a discovery scan
最佳做法
Use these best practices to get the most from your investment and set the foundation for becoming a power user:
- Extend scan coverage and increase visibility into hard to scan assets by installing Nessus Agents locally on hosts and relayed through a Nessus Manager to Tenable Security Center.
- Ensure Nessus Scanners are placed on the target side of any firewall, VPN, or geographical segregated connections to ensure the most accurate data and least disruption to network operations.
- Utilize the Tenable vulnerability priority rating (VPR) and the Tenable Asset Criticality Rating (ACR) to prioritize the remediation of the highest risk vulnerabilities on the most important hosts first.
- Run credentialed scans for the most accurate picture of your environment. Read benefits and limitations to learn which sensors are best for your environment.
- Ensure previously discovered vulnerabilities have been remediated by running a remediation scan. Then, use the vulnerability state filter to track remediation metrics.
- Set up accept/recast rules to modify vulnerability severity or accept the risk altogether based on your organization's unique environment.
- Consider product integrations to increase efficiencies and gain context across your exposure data. For more information view Tenable Ecosystem Partners.
Tenable One
申請示範
以 AI 技術為後盾的全球領先曝險管理平台。
感謝您
感謝您對 Tenable One 有興趣。
我們的人員將盡快與您聯絡。
Form ID: 7469
Form Name: one-eval
Form Class: c-form form-panel__global-form c-form--mkto js-mkto-no-css js-form-hanging-label c-form--hide-comments
Form Wrapper ID: one-eval-form-wrapper
Confirmation Class: one-eval-confirmform-modal
Simulate Success