TOC & Recently Viewed

Recently Viewed Topics

Get Started with Tenable.io Vulnerability Management

Use the following getting started sequence to configure and mature your Tenable.io Vulnerability Management deployment.

  1. Prepare
  2. Install
  3. Configure Scans
  4. Refine
  5. Expand

Prepare

Before you begin, learn about Tenable.io and establish a deployment plan and analysis workflow to guide your configurations.

  1. Review principles of the TCP/IP internet protocol suite. Tenable.io documentation assumes you have knowledge of basic networking concepts and principles.
  2. Get your Tenable.io access information and starter account credentials from your Tenable representative.
  3. If necessary, access Tenable Support and training resources for Tenable.io, including:
  4. Design a deployment plan by identifying your organization's objectives and analyzing your network topology. Consider Tenable-recommended best practices for your environment.

    For more information about environment requirements, see the guidelines provided for your scanner (Nessus, Nessus Agent, or NNM) in the General Requirements Guide. For more information about supported browsers for Tenable.io, see System Requirements.

    If you are a Professional Services customer, contact your Tenable representatives for additional guidance.

  5. Design an internal scanning and external scanning plan. Identify the scans you intend to run and ensure that you have sufficient network coverage.

    If you are a Professional Services customer, contact your Tenable representatives for additional guidance.

  6. Design an analysis workflow. Identify key stakeholders in your management and operational groups, considering the data you intend to share with each stakeholder.

    If you are a Professional Services customer, contact your Tenable representatives for additional guidance.

Install

Install your scanners and link them to Tenable.io.

  1. Log in to the Tenable.io web interface:
    1. In a supported web browser, navigate to https://cloud.tenable.com/.

      The Tenable.io login page appears.

    2. Type the User name and Password provided by Tenable.
    3. Click Sign In.

      The Tenable.io interface appears.

      Tip:Tenable.io is introducing the new Tenable.io interface in a rolling fashion. For more information about the classic interface or new interface, see Navigate the Classic Tenable.io Interface or Navigate the New Tenable.io Interface.

  2. If your deployment plan includes Nessus scanners, set up your virtual environments or install Nessus on your hardware, as described in Install Nessus in the Nessus User Guide.

    Then, link your first Nessus scanner to Tenable.io, as described in Link a Scanner.

  3. If your deployment plan includes Nessus Agents, set up your virtual environments or install agents on your hardware, as described in Install Nessus Agents in the Nessus Agent Deployment and User Guide.

    Then, link your first agent to Tenable.io, as described in Link an Agent.

  4. If your deployment plan includes NNM, set up your virtual environments or install NNM on your hardware, as described in Install NNM in the Nessus Network Monitor User Guide.

    Then, configure NNM to communicate with Tenable.io, as described in Configure NNM in the Nessus Network Monitor User Guide.

  5. Create user accounts and user groups, as described in Create a User Account and Create a Group.
  6. Create access groups to manage asset view permissions, as described in Create an Access Group.
  7. Create system target groups to manage asset scan permissions, as described in Create a Target Group.
  8. Create exclusion lists, as described in Create an Exclusion.

Configure Scans

Configure and run basic scans to begin evaluating the effectiveness of your deployment plan and analysis workflow.

  1. If your deployment plan includes more than one Nessus scanner, install and link your other Nessus scanners.

    Then, configure your first active scan using the Basic Network Scan template:

    1. Create a scanner group, as described in Create a Scanner Group.
    2. Create a scan using the Basic Network Scan template, as described in Create a Scan.
  2. If your deployment plan includes more than one NNM, install and link your other NNM scanners.

  3. If your deployment plan includes more than one Nessus Agent, install and link your other agents.

    Then, configure your first agent scan using the Basic Agent Scan template:

    1. Create an agent group, as described in Create an Agent Group.
    2. Create an agent scan using the Basic Agent Scan template, as described in Create an Agent Scan.
  4. Launch your first Nessus scan and agent scan, as described in Launch a Scan.
  5. Set up asset discovery with connecters, Professional Services integrations, or integrated products. For more information, see Connectors, the Custom Integration Services page, or the Integration Guides section of the Tenable.io Documentation page.
  6. Confirm your Nessus scan and agent scan completed, accessing all targeted areas of your network. Review your discovered assets to assess your knowledge of your network.

  7. Configure managed credentials, scan-specific credentials, or policy-specific credentials for a Nessus scan, as described in Credentials.

    For more information about configuring and troubleshooting credentialed scans, see Nessus Credentialed Checks.

  8. Launch your credentialed Nessus scan and credentialed agent scan, as described in Launch a Scan.
  9. Confirm your credentialed scan completed, accessing all targeted areas of your network.

Tenable recommends frequently reviewing your scan results and scan coverage. You may need to modify your scan configurations to suit your organization's objectives and reach all areas of your network.

Refine

Configure other features, if necessary, and refine your existing configurations.

  1. If you want to allow other user accounts or user groups to access objects, share the objects with user accounts or user groups:

  2. View your scan results in the Vulnerabilities and Assets workbenches, as described in Vulnerabilities in the New Tenable.io Interface and Assets in the New Tenable.io Interface.
  3. Create saved searches for your Vulnerabilities and Assets workbenches, as described in Saved Search in the New Tenable.io Interface.
  4. Create a template-based or custom dashboard, as described in Create a Dashboard.
  5. Create recast rules and accept rules, as described in About Recast Rules.
  6. If you want to use Tenable.io to perform web application scanning, obtain a Tenable.io Web Application Scanning license.

    For more information about Tenable.io Web Application Scanning, see the Tenable.io Web Application Scanning User Guide.

  7. If you want to use Tenable.io to evaluate risk on your containers, obtain a Tenable.io Container Security license.

    For more information about Tenable.io Container Security, see the Tenable.io Container Security User Guide.

  8. Consider product integrations, including custom integrations provided by Professional Services.
  9. Engage with Professional Services for ongoing deployment support and refinement.

Expand

Review and mature your deployment plan and analysis workflow.

  • Conduct weekly meetings to review your organization's responses to identified vulnerabilities.
  • Conduct weekly management meetings to oversee your teams executing the analysis workflow.
  • Review your scan scheduling settings and consider revising.
  • Review your scan results and scan coverage. You may need to modify your scan configurations to suit your organization's objectives and reach all areas of your network.
  • Optimize and operationalize your custom dashboards to meet the needs of individual user account holders.
  • Consider API integrations, as described in the Tenable.io API Documentation.

Copyright 2017 - 2018 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc. Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.