Start Using Tenable Identity Exposure

After you deploy Tenable Identity Exposure, this section walks you through the key steps to begin using Tenable Identity Exposure effectively.

Each section contains links to more detailed descriptions and instructions for the related task.

Tip: For additional information on Tenable Identity Exposure, review the following customer education materials: