TOC & Recently Viewed

Recently Viewed Topics

Asset Management Workflow

Note: This workflow assumes that you have already completed the steps for getting started with vulnerability management. For more information, see the Getting Started Workflow.

  1. Create and launch a scan.


    Create a connector to import asset records from third-party applications.

  2. Filter the dashboard data by a time interval.
  3. Add business context to your assets by applying tags.

Copyright © 2019 Tenable, Inc. All rights reserved. Tenable,, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc.., Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.