Work with Tenable Identity Exposure

Use the following getting started sequence to prepare, install, configure, and manage your Tenable Identity Exposure deployment.

  1. Prepare

  2. Install or Upgrade

  3. Configure

  4. Manage

Prepare

Before you install Tenable Identity Exposure , review the architectures and the following technical prerequisites to ensure that your platform runs optimally:

Install or Upgrade

You download the installation programs from the Tenable Identity Exposure portal. Tenable Identity Exposure offers several types of TLS installations depending on your infrastructure.

Configure

For all configuration tasks including the deployment of Indicators of Attack, see the Tenable Identity Exposure Administrator Guide.

Manage

You use the Tenable Identity Exposure portal to review, manage, and receive relevant information about the security state of the monitored infrastructure.