TOC & Recently Viewed

Recently Viewed Topics

Example: Access Groups

In these examples, we walk through how an organization uses access groups to compartmentalize assets or targets into groups that reflect their organizational structure.

Before you begin:

  • Read the Access Groups topic to understand how access groups work.

Copyright © 2019 Tenable, Inc. All rights reserved. Tenable,, Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc.., Lumin, Assure, and the Cyber Exposure Company are trademarks of Tenable, Inc. All other products or services are trademarks of their respective owners.