Welcome to the Tenable Identity Explorer Key Features Guide

Welcome to Tenable Identity Exposure, formerly known as Tenable AD. This document is designed to enhance your experience by offering a comprehensive overview of the product's features and functionality, whether it's deployed on-premises or through SAAS. This resource aims to assist you whether you're a newcomer seeking guidance or an experienced user looking to deepen your understanding.

Throughout this document, you'll find various sections exploring a range of topics, including optimizing product usage and managing Indicators of Attack and Indicators of Exposure. It's important to note that while this document provides valuable insights, it's not intended to be a rigid rulebook for Tenable Identity Exposure usage. Instead, it offers recommendations for achieving a seamless and effective utilization of the platform.

About this Guide

This guide is based on the Tenable Identity Exposure User and Administration Guide which we recommend that you consult for comprehensive details.

The examples shown in this guide to highlight Tenable Identity Exposure's capabilities do not represent an exhaustive list and may not directly translate to every unique environment. For optimal security measures, we recommend visiting our official documentation or professional services for further details and guidance.

Key Stakeholders

The individual stakeholders in Tenable Identity Exposure differ based on your organization's size, structure, security policies, and the intended use cases. Establishing precise roles and responsibilities for each stakeholder enables the efficient adoption and utilization of the product.

When working with Tenable Identity Exposure, it's essential to grasp the diverse stakeholders involved. These individuals and groups assume varying roles in identifying, mitigating, and reporting identity-based security risks. Here's a comprehensive breakdown:

  • Security Team: Oversees and administers the Tenable solution, leveraging data analysis to identify and respond to vulnerabilities and risks promptly.

  • IT Operations Team: Facilitates the infrastructure and integration support for the Tenable solution, ensuring seamless connectivity with other security tools and user directories.

  • Application Development Teams: Charged with securing applications and promptly addressing any exposed identities flagged by Tenable.

  • Identity and Access Management (IAM) Team: Manages user accounts, permissions, and access controls, collaborating closely with IT security counterparts to address issues pinpointed by Tenable Identity Exposure.

  • Business Unit Leaders: Hold ultimate responsibility for the security posture of their teams and applications. They review reports, prioritize risk mitigation strategies, and allocate resources to enhance Active Directory security measures.