Work with Tenable Identity Exposure
Use the following getting started sequence to prepare, install, configure, and manage your Tenable Identity Exposure deployment.
Before you install Tenable.ad, review the architectures and the following technical prerequisites to ensure that your platform runs optimally:
You download the installation programs from the Tenable Identity Exposure portal. Tenable Identity Exposure offers several types of TLS installations depending on your infrastructure.
For all configuration tasks including the deployment of Indicators of Attack, see the Tenable Identity Exposure Administrator Guide.
You use the Tenable Identity Exposure portal to review, manage, and receive relevant information about the security state of the monitored infrastructure.