Get Started with Tenable Identity Exposure

Use the following getting started sequence to begin working with your Tenable Identity Exposure solution.

  1. Prepare and Install

  2. Configure and Navigate the Interface

  3. Detect and Monitor

  4. Visualize

Prepare and Install

To prepare for and complete Tenable Identity Exposure installation:

Configure and Navigate the Interface

Next, we recommend interacting with the following to configure and navigate the Tenable Identity Exposure interface:

Detect and Monitor

Once you have configured and tuned Tenable Identity Exposure to your business needs, you can begin working with your data:

  • Manage and receive relevant information about the security state of the monitored infrastructure using the Tenable Identity Exposure portal.

Visualize

Tenable Identity Exposure features several unique ways to visualize your data: