Get Started with Tenable Identity Exposure
Use the following getting started sequence to begin working with your Tenable Identity Exposure solution.
To prepare for and complete Tenable Identity Exposure installation:
-
Review the Tenable Identity Exposure Installation Guide.
-
Install Tenable Identity Exposure as described in the Tenable Identity Exposure Installation Guide.
-
Connect and sign in to Tenable Identity Exposure.
Configure and Navigate the Interface
Next, we recommend interacting with the following to configure and navigate the Tenable Identity Exposure interface:
- Set profile preferences: Configure your default language, change your password, and set other preferences for your profile
-
Learn best practices for navigating the user interface.
-
Create and add users to your Tenable Identity Exposure instance.
-
Create dashboards and add widgets to them to view and monitor efficiently the security in your active directory infrastructure.
Once you have configured and tuned Tenable Identity Exposure to your business needs, you can begin working with your data:
-
Manage and receive relevant information about the security state of the monitored infrastructure using the Tenable Identity Exposure portal.
Tenable Identity Exposure features several unique ways to visualize your data:

-
Filter forests and domains

-
View the trail flow in real-time
-
Filter real-time events

-
View Indicators of Attack
-
View incident details and attack details