Install OT Security ICP Virtual Appliance

To deploy Tenable Core + OT Security as a VMware virtual machine, you must download the Tenable Core + OT Security .ova file and deploy it on a hypervisor.

Note: If deploying the .iso file instead of the pre-configured .ova:
  • Follow the system requirements for Tenable Core + OT Security.

  • When prompted to choose a setup method, select Install Tenable Core. See Clean Install Tenable Core + Tenable OT Security.

  • Follow and monitor the installation process using the installation user interface via the virtual machine console. The installation process is fully automated and so do not interact with the system until the installation is fully complete.


Before you begin:

  • Confirm your environment supports your intended use of the instance, as described in System Requirements.

  • Confirm your internet and port access supports your intended use of the instance, as described in Access Requirements.

To deploy Tenable Core + OT Security as a VMware virtual machine:

  1. Download the Tenable Core + OT Security .ova file from the Tenable Downloads page.

  2. Open your VMware virtual machine in the hypervisor.
  3. Import the Tenable Core + OT Security VMware .ova file from your computer to your virtual machine. For information about how to import a .ova file to your virtual machine, see the VMware documentation.
  4. In the setup prompt, configure the virtual machine to meet your organization's storage needs and requirements, and those described in OT Security System Requirements.
  5. Launch your Tenable Core + OT Security instance.

    The virtual machine boot process appears in a terminal window. The boot process may take several minutes to complete.

    Note:The system might perform a few last installation procedures even after the login prompt appears.Tenable recommends that you wait a few minutes before starting the Tenable Core setup wizard.

    Note: If you want to increase your disk space to accommodate your organization's data storage needs, see Disk Management.

What to do next

Connect OT Security to the Network