Get Started with Tenable Identity Exposure
Use the following getting started sequence to begin working with your Tenable Identity Exposure solution.
To prepare for and complete Tenable Identity Exposure installation:
-
Review the Tenable Identity Exposure Installation Guide.
-
Install Tenable Identity Exposure as described in the Tenable Identity Exposure Installation Guide.
-
Connect and sign in to Tenable Identity Exposure.
Configure and Navigate the Interface
Next, we recommend interacting with the following to configure and navigate the Tenable Identity Exposure interface:
- Set profile preferences: Configure your default language, change your password, and set other preferences for your profile
-
Learn best practices for navigating the user interface.
-
Create and add users to your Tenable Identity Exposure instance.
-
Create dashboards and add widgets to them to view and monitor efficiently the security in your Active Directory infrastructure.
Once you have configured and tuned Tenable Identity Exposure to your business needs, you can begin working with your data:
-
Manage and receive relevant information about the security state of the monitored infrastructure using the Tenable Identity Exposure portal.
Tenable Identity Exposure features several unique ways to visualize your data:

The topology graph displays forests, domains, and the trust relationships that exist between them.

The trail flow displays the real-time monitoring and analysis of events affecting your Active Directory infrastructure.

Tenable Identity Exposure's Indicators of Attack help your organization detect and take immediate action to prevent attempts to compromise your Active Directory infrastructures.

Tenable Identity Exposure's Indicators of Exposure help you detect attack vectors, security gaps, and misconfiguration in your Active Directory infrastructures before attackers do.