Navigate Tenable Identity Exposure
After you log in to Tenable Identity Exposure, the home page opens, as shown in this example.
To expand or collapse the side navigation bar:
To expand: click the menu at the top left of the window.
To collapse: click the X at the top left of the window.
|#||What it is||What it does|
|1.||Dashboards||Dashboards allow you to manage and monitor efficiently and in a visual way security in an Active Directory infrastructure.|
|2.||Documentation (?)||Click this icon to open the User and Administrator Guides.|
|3.||Notifications (Bell)||A bell icon and badge counts notify you of attack alerts and/or exposure alerts waiting for your acknowledgment.|
|4.||User profile icon||Click this icon to access a submenu to security profiles, release notes, activity logs, preferences, or sign out.|
|5.||Security Profiles||Security Profiles allow different types of users to review security analysis from different reporting angles.|
|6.||What's New||Click to open the release notes for the most recent version of Tenable Identity Exposure.|
|7.||Activity Logs||Activity logs allow you to view the traces of all activities that occurred on the Tenable Identity Exposure platform|
|8.||User Preferences||This page allows you to configure your language, profile, and password.|
|9.||Sign out||Click to sign out of Tenable Identity Exposure.|
|10.||Trail Flow||The Trail Flow shows the real-time monitoring and analysis of events affecting your Active Directory.|
|11.||Indicators of Exposure||Tenable Identity Exposure uses Indicators of Exposure (IoEs) to measure the security maturity of your Active Directory and assign severity levels (Critical, High, Medium, or Low) to the flow of events that it monitors and analyzes.|
|12.||Indicators of Attack||Through Indicators of Attack, Tenable Identity Exposure can detect attacks in real time.|
|13.||Topology||The Topology page gives an interactive graph visualization of your Active Directory. It shows the forests, domains, and trust relationships that exist between them.|
The Attack Path pages give graphical representations of Active Directory relationships:
Required User Role: Organizational User with appropriate permissions.
This section allows you to configure the following:
For more information, see the Tenable Identity Exposure Administrator Guide.
|16.||Widgets||Widgets are customizable datasets on a dashboard. They can contain bar charts, line charts, and counters.|