Inventory

The Inventory page in Tenable Exposure Management aggregates all assets and their associated entities to unify and operationalize the data. It focuses on your organization's ability to maintain an accurate inventory or all of your cyber-enabled technologies, while providing data analytics and a comprehensive inventory across various sources. While asset management highlights processes and people that can be affected, Tenable Exposure Management takes this one step further by digging into the technologies that can be hacked and allowing you to gain insight into these exposures.

Simply put, the Inventory page is the central repository of all cyber assets across an organization's attack surface by providing:

  • A comprehensive list of all digital assets

  • A complete view of risks using enriched context

  • Built-in control, monitoring, and alerting

  • Unified asset analysis to drive prioritization

Tenable Exposure Management aids prioritization by highlighting the following asset data:

  • Centralized location

  • Asset class breakdown

  • Filters

  • Related weaknesses

To access the Inventory page:

Required User Role: Basic, Scan Operator, Standard, Scan Manager, Administrator, or Custom Role

  1. In the left navigation menu, click Inventory.

    The Inventory page appears with the Assets tab displayed by default.

Note: The last_updated value within the Inventory section of Tenable Exposure Management refers to the date and time at which Tenable's internal data lake updates the asset. As a result, this value may not match first_observed_at or last_observed_at values, which come directly from vendor system updates to the asset.

On the Inventory page, you can view and interact with the data on the following tabs:

  • Assets : A centralized list of all digital assets across your attack surface.

  • Findings Granular, per-asset detections of security issues.

  • Software: A catalog of applications and operating systems installed on your assets.

  • Weaknesses: Aggregated views of vulnerabilities and misconfigurations grouped by name.