TOC & Recently Viewed

Recently Viewed Topics

Industrial Security Workflow

  1. Ensure that your setup meets the minimum system requirements:
  2. Obtain the proper license or Activation Code for Industrial Security for your configuration.
  3. Follow the installation steps depending on your operating system:
  4. Perform the initial configuration steps for Industrial Security in the web interface.

    After configuration, Industrial Security is prepared to add scanners.

    Note: If you are registering Industrial Security offline, there are additional configuration steps to follow.

  5. Create users in Industrial Security and set administrative privileges as necessary.
  6. You can view asset data on the Monitoring page and historical data in snapshots and reports on the Results page.

Copyright 2017 Tenable, Inc. All rights reserved. Tenable Network Security, Nessus, SecurityCenter, SecurityCenter Continuous View and Log Correlation Engine are registered trademarks of Tenable, Inc.  Tenable, Tenable.io, Assure, and The Cyber Exposure Company are trademarks of Tenable, Inc.  All other products or services are trademarks of their respective owners.