Exposure Center Overview

Tenable Identity Exposure provides comprehensive visibility into weaknesses and misconfigurations across various identity providers, including Active Directory (AD) and Entra ID.

By continuously scanning and identifying critical weaknesses in privileged accounts, password policies, delegation configurations, and more, Tenable Identity Exposure enables organizations to address security gaps proactively.

This overview allows you to prioritize issues based on severity, impacted assets, and recent detection, ensuring a focused and efficient approach to identity security management.

Prerequisites

  • To use the Exposure Center, you must activate the feature in Tenable Identity Exposure settings.

  • See Identity 360, Exposure Center, and Microsoft Entra ID Support Activation for instructions.

Exposure Center page

To access the Exposure Center page:

  • In Tenable Identity Exposure's left navigation pane, click the Exposure Center icon .

    The Exposure Center page appears.

Header Information

These metrics in the header provide at-a-glance visibility into the current state of identity exposures.

  • Number of Weaknesses- Total identified weaknesses.

  • New Weaknesses in Last 7 Days- Count of new weaknesses detected within the past week.

  • Number of Findings – Total number of findings linked to exposures.

  • New Findings in Last 7 Days – Count of findings identified within the past week.

Quick Filtering Panel

The Filters panel (left sidebar) allows you to narrow down exposures based on different attributes:

  • Impacted Assets

    • With Impacted Assets

    • Without Impacted Assets

  • Provider Name – Filter exposures by provider.

  • Severity – Critical, High, Medium, Low.

  • Tenants – Scope exposures by tenant.

  • Families – Organize exposures by category, such as:

    • Authentication and Credentials

    • Policy and Configuration

    • Access Control and Permissions

    • Services and Applications

Exposures Table (Main View)

The central table lists detected exposures with the following columns:

  • Weakness Name – Lists specific weaknesses or misconfigurations detected. Example: "Not protected against delegation", "Too many privileged accounts", etc.

  • Provider – The provider where the weakness was detected.

  • Description – Provides a brief explanation of the issue. Example: "Privileged accounts have to be protected...", "Too many administrators are present...".

  • Severity – Displays the criticality of each weakness (Critical, High, Medium, Low).

  • Remediation Effort – Estimated effort required to fix the weakness (visual indicators).

  • Impacted Assets – Shows the number of assets affected by each weakness.

  • Sources – The systems or platforms that detected the data. This data could come from multiple products.

  • Last Seen: Displays the last time each weakness was detected or reported. Example: "September 10, 2024", "September 29, 2024".

  • See Details – Link to detailed information about the weakness.

Tip: The "See Details" arrow takes you to Exposure Instance details for Identity Exposure weaknesses, and to Tenable Inventory for the others. For more specific information on a given weakness, refer to Exposure Instance Details & see Weaknesses in Tenable Inventory.

Note: The Exposure Center feature currently displays weakness-related data based on the default Tenable profile and does not automatically reflect the status of deviances on AD objects you whitelisted in other profiles.

Therefore:

  • If you have whitelisted an AD object for a specific Indicator of Exposure (e.g., "Native admin group member"), Exposure Center will still flag it as a security weakness if the default profile identified it as deviant.

  • This can create the impression that the issue has not been addressed, even though the object has already been whitelisted under a different profile.

  • If a remediation action (such as removing group membership) is taken based on the Exposure Center display, the object will disappear from the view— but this may not have been necessary if the object was already whitelisted elsewhere.

Search, Filter, Export, and Column Display Options

See Also