- Tenable Identity Exposure 2025 Release Notes
-
- Tenable Identity Exposure 3.90 (2025-03-19)
- Tenable Identity Exposure 3.89 (2025-03-10)
- Tenable Identity Exposure 3.88 (2025-02-20)
- Tenable Identity Exposure 3.87 (2025-02-06)
- Tenable Identity Exposure (2025-02-05)
- Tenable Identity Exposure 3.86 (2025-01-23)
- Tenable Identity Exposure (2025-01-10)
- Tenable Identity Exposure 3.85 (2025-01-08)
Tenable Identity Exposure 2025 Release Notes
These release notes are listed in reverse chronological order.
Tenable Identity Exposure 3.90 (2025-03-19)

-
Unsupported or Outdated Exchange Servers — This new Indicator of Exposure (IoE) detects outdated Exchange servers that Microsoft no longer supports as well as those missing the latest Cumulative Updates. To maintain a secure and fully supported Exchange environment, promptly address obsolete or unpatched servers. Failure to do so increases the risk of exploitation, exposing your organization to data breaches and ransomware attacks.

-
The ADCS Dangerous Misconfigurations IoE now reports the ESC9 vulnerability, flagging certificate templates with the unsecured CT_FLAG_NO_SECURITY_EXTENSION as deviant.
-
The Exposure Overview and Exposure Instances pages now display the names of the Identity Data Providers tenants (AD domain, Entra ID tenant, etc.) where it detected security findings.

Tenable Identity Exposure version 3.90 contains the following bug fixes:
Bug Fixes |
---|
Deleted/Disabled Computer/Users no longer generate deviances if you did not explicitly set the "Keep Deleted" or "Keep Disabled" options to true in your security profiles. |
The Exposure Overview filter on the "Sources" property no longer suggests irrelevant values. |
After deleting an object identified as deviant in the Logon Restrictions for Privileged Users IoE, the associated deviance closes correctly. |
Tenable Identity Exposure improved input search isolation between the Domains and Honey Account pages. |
Tenable Identity Exposure now collects Active Directory and Entra ID contacts. It no longer identifies groups with only contacts as members to be empty. Additionally, AD and Entra ID contact data appears under Tenable Inventory as resources. |
Tenable Identity Exposure addressed the missing data timeframe setting in the report configuration. |
Tenable Identity Exposure added more contextual information related to LDAP login issues. |
Tenable Identity Exposure 3.89 (2025-03-10)

-
Identity 360
-
Improved loading times for various Identity 360 pages, especially when viewing an asset's Access & Entitlement tabs.
-
Tenable Identity Exposure now gathers Active Directory Entitlements faster, making data available earlier after product setup in the Identity 360 page under the Entitlement tab for the asset's details. Tenable Identity Exposure focuses only on entitlements that impact the security context of our customers.
-
-
Indicators of Exposure (IoE)
-
Mapped Certificates on Accounts — This IoE previously reported privileged users with only two types of mappings: X509IssuerSubject and X509SubjectOnly. It has now expanded its original scope to include additional mappings — X509RFC822, X509IssuerSerialNumber, X509SKI, and X509SHA1PublicKey.
-
Mapped Certificates on Accounts — Tenable Identity Exposure improved this IoE to report weak explicit certificate mappings, addressing the AD CS ESC14 Abuse Technique.
-
Single Member AD / Entra Group — The IoE now shows the group member in the "Why it matters" description.
-
First-Party Service Principal With Credentials — The IoE now shows the details for the identified credentials in the "Why it matters" description.
-
Single Member AD / Entra Group and Empty Group — These IoEs now only count direct members for more accurate and meaningful results.
-
Security Profile Customization — Improved description for the options "Permitted object owner (by group membership)" for applicable IoEs.
-
-
Health checks
-
Permissions to Collect the AD Domain Data — Now hides the "Granted Permissions to Collect Privileged Data" details when Privileged Analysis is deactivated in the user interface. Make sure your Relay is up to date for this feature to work.
-
Domain Reachability — Now gives a more precise reason why the domain is unreachable.
-

Tenable Identity Exposure version 3.89 contains the following bug fixes:
Bug Fixes |
---|
By default, Tenable Identity Exposure now sorts the weakness names on the Exposure Instances page by ascending order. |
The Exposure Overview no longer displays non identity-related weaknesses. |
Tenable Identity Exposure improved the readability of pagination details on the Identities & Exposure Overviews. |
Tenable Identity Exposure improved the detection and reconciliation of Active Directory Groups for Tenable One users. |
In the Identities Overview, it is now possible to see full names when expanding the values of the "Identity Tenant Names" property. |
Tenable Identity Exposure now correctly handles event number 4624 in the latest version of Windows. |
When an attacker machine leaves a domain, the Indicator of Attack DCSync can now raise alerts in basic mode. |
Tenable Identity Exposure now correctly handles ignoring and unignoring all deviant objects selected through an expression. |
Tenable Identity Exposure now ensures the proper removal of the Envoy service during the uninstallation of the Secure Relay, even when it's installed with Directory Listener. |
Tenable Identity Exposure now properly applies selected reason filtering when selecting deviant objects (when applicable). |
Tenable now digitally signs the script to configure Indicators of Attack, preventing external security tools from flagging it as a potential risk due to a missing signature. |
Tenable Identity Exposure 3.88 (2025-02-20)

-
Indicator of Exposure (AD) — Exchange Dangerous Misconfigurations to list misconfigurations that impact Exchange resources or its underlying Active Directory schema objects.

Tenable Identity Exposure version 3.88 contains the following bug fixes:
Bug Fixes |
---|
The Indicator of Attack (IoA) listener now efficiently releases memory, correcting an issue introduced in version 3.86. This only affects customers who installed IoAs in versions 3.86 or 3.87. These customers must reinstall IoAs in version 3.88. |
In the Exposure Center, impacted assets with a "Resolved" status no longer lead to a blank page without data. |
Some weakness-related texts displayed in the Exposure Instances are now better structured, improving clarity and readability. |
The weakness-related text in Exposure Instances now displays bullet points without unnecessary line breaks, improving readability and consistency. |
Redirections from Identity 360 to Tenable One no longer result in blank pages. |
Tooltips on Identities Overview grid values no longer appear as duplicates for properties with custom tooltips. |
The Identity Details pages can now generate the AI asset summary again. |
Selected rows for export in Identity 360 and Exposure Overview now remain selected after the export is completed. |
Uninstalling the Secure Relay no longer removes the shared Tools folder with Ceti (Directory Listener). When both are installed on the same machine, the Tools folder now remains intact, preserving the nssm binary. |
When you add columns in the Exposure Overview, you can now select these for data export. |
In the Exposure Instance details page, the Asset Class column is now truncated when necessary, with a tooltip displaying the full value. |
The Exposure Center remediation scripts now have a prefix with the localized weakness name. |
More text elements in the Exposure Center user interface now support localization. |
The hyperlinks displayed in the Exposure Instances pages targeting the Microsoft documentation now reference the localized version of the documentation. |
The CSV exports of "Impacted Assets" in Exposure Instances now display localized column header names. |
Tenable Identity Exposure improved websockets security. |
Hyperlink text descriptions in Exposure Instances now wrap to the next line when they exceed the available space. |
The "Domain Controller Activity" health check now detects inactive Domain Controllers within a 15-minute window based on Indicator of Attack event log activity. While it still waits for this duration before reporting failures, it now reports successful cases and reactivated Domain Controllers much faster. Additionally, a bug fix ensures the health check uses up-to-date data. |
Tenable Identity Exposure enhanced application resilience with proper handling of RabbitMQ channel errors during message publishing. |
The deviances tab displays correctly when clicking on events in the Trail Flow. |
Identity 360 CSV exports now handle data containing double quotes correctly. |
Tenable Identity Exposure 3.87 (2025-02-06)

-
Exposure Center — Removal of references to Vulnerability Priority Rating (VPR) from the Exposure Overview because Tenable Identity Exposure does not populate these scores for identity-related Indicators of Exposure.

Tenable Identity Exposure version 3.87 contains the following bug fixes:
Bug Fixes |
---|
In Identity 360, the weakness source "TENABLE_IDENTITY_EXPOSURE" is no longer duplicated. |
The Golden Ticket Indicator of Attack now raises an alert when the attacker uses a forged TGT ticket in basic mode. |
Tenable Identity Exposure addressed the CVE-2022-24434 security vulnerability that affects certain software components, potentially allowing attackers to exploit weaknesses such as privilege escalation, remote code execution, or denial of service. |
Tenable Identity Exposure resolved an issue where triggering a group policy update could cause the Tenable Event Logs listener to stall while awaiting interactive user input. |
Tenable Identity Exposure (2025-02-05)

-
Exposure Center —Exposure Center is a Tenable Identity Exposure feature that enhances your organization's identity security posture. It identifies weaknesses and misconfigurations across your identity risk surface, covering both the underlying identity systems, such as Entra ID, and the identities within those systems.
This feature's user experience revolves around three interconnected concepts: Exposure Overview, Exposure Instances, and Findings. Tenable Research supports these concepts with a new security engine and specifically developed Indicators of Exposure (IoEs) to drive their functionality.
For more information, refer to Exposure Center in the Tenable Identity Exposure User Guide.
-
New Entra ID Indicators of Exposure
Name Description Ability of Standard Accounts to Register Applications By default, any Entra user can register applications within the tenant. While this feature is convenient and not an immediate security vulnerability, it does carry certain risks. Therefore, following best practices, Tenable recommends disabling this capability. Application Allowing Multi-Tenant Authentication Entra applications, which allow multi-tenant authentication, may give unauthorized access to malicious users if this configuration was not enabled with full awareness and without implementing adequate authorization checks within the application code. Conditional Access Policy Disables Continuous Access Evaluation Continuous Access Evaluation is an Entra ID security feature that enables swift reactions to security policy changes or user status updates. For this reason, do not disable it. Dangerous Application Permissions Affecting the Tenant Microsoft exposes APIs in Entra ID to allow 3rd-party applications to perform actions on Microsoft services on their own (called "application permissions"). Certain permissions can pose a serious threat to the entire Microsoft Entra tenant. Dangerous Delegated Permissions Affecting the Tenant Microsoft exposes APIs in Entra ID to allow 3rd-party applications to perform actions on Microsoft services on their own (called "application permissions"). Certain permissions can pose a serious threat to the entire Microsoft Entra tenant. Disabled Account Assigned to a Privileged Role Having a sane account management process requires monitoring assignments to privileged roles. Dormant Device Dormant devices pose security risks such as outdated configurations and unpatched vulnerabilities. Without regular monitoring and updates, these stale devices become potential targets for exploitation, compromising tenant integrity and data confidentiality. Dormant Non-Privileged User Dormant non-privileged users pose security risks as attackers can exploit them for unauthorized access. Without regular monitoring and deactivation, these stale users create potential entry points for malicious activities by expanding the attack surface. Dormant Privileged User Dormant privileged users pose security risks as attackers can exploit them for unauthorized access. Without regular monitoring and deactivation, these stale users create potential entry points for malicious activities by expanding the attack surface. Dynamic Group with Exploitable Rule Attackers can exploit dynamic groups in Microsoft Entra ID by manipulating self-modifiable attributes, allowing them to add themselves as group members. This manipulation enables privilege escalation and unauthorized access to sensitive resources tied to the groups. Empty Entra Group Empty groups can lead to confusion, compromise security, and result in unused resources. It is generally advisable to establish a clear purpose for groups and ensure they contain relevant members. Entra Security Defaults Not Enabled Entra ID Security Defaults offer pre-configured, Microsoft-recommended settings to enhance tenant protection. Federated Domain List Malicious federated domain configuration is a common threat, used by attackers as an authentication backdoor to the Entra ID tenant. Verifying existing and newly added federated domains is crucial to ensure their configurations are trustworthy and legitimate. This Indicator of Exposure provides a comprehensive list of federated domains and their relevant attributes to help you to make informed decisions about their security status. Federation Signing Certificates Mismatch Microsoft Entra ID allows delegation of authentication to another provider through federation. However, attackers with elevated privileges can exploit this feature by adding a malicious token-signing certificate, leading to persistence and privilege escalation. First-Party Service Principal with Credentials First-party service principals have powerful permissions but are often overlooked due to their high volume, lack of visibility, and Microsoft ownership. Attackers can exploit this by adding credentials to these principals, allowing them to stealthily leverage their privileges for privilege escalation and persistence. Guest Account with Privileged Role Guest accounts are external identities that can pose a security risk when they have privileged roles assigned to them. This grants substantial privileges within the tenant to individuals outside your organization. Guest Accounts with Equal Access to Normal Accounts It is not advisable to configure Entra ID to consider guests as regular users, as it may enable malicious guests to conduct comprehensive reconnaissance on the tenant's resources. High Number of Administrators A high number of administrators increases the attack surface and poses security risks due to their elevated privileges. This also indicates a failure to uphold the principle of least privilege. Known Federated Domain Backdoor Microsoft Entra ID allows delegation of authentication to another provider through federation. However, attackers with elevated privileges can exploit this feature by adding their malicious federated domain, leading to persistence and privilege escalation. Legacy Authentication Not Blocked Legacy authentication methods do not support Multi-Factor Authentication (MFA), enabling attackers to continue performing brute-force, credential stuffing, and password-spraying attacks. Missing Multi-Factor Authentication for Non-Privileged Accounts MFA provides strong protection for accounts against weak or breached passwords. Security best practices and standards recommend that you enable MFA, even for non-privileged accounts. Accounts without an MFA method registered cannot benefit from it. Missing Multi-Factor Authentication for Privileged Accounts MFA provides strong protection for accounts against weak or breached passwords. Security best practices and standards recommend that you enable MFA, even for non-privileged accounts. Accounts without an MFA method registered cannot benefit from it. Multi-Factor Authentication Not Required for a Privileged Role MFA provides strong protection for accounts against weak or breached passwords. Security best practices and standards recommend that you enable MFA, particularly for privileged accounts with assigned privileged roles. Multi-Factor Authentication Not Required for Risky Sign-Ins MFA provides strong protection for accounts against weak or breached passwords. Security best practices and standards recommend that you require MFA for risky sign-ins, for example when the authentication request may not come from the legitimate identity owner. Never Used Device Avoid pre-created, never-used device accounts, as they indicate poor security hygiene and may pose potential security risks. Never Used Non-Privileged User Never used non-privileged user accounts are vulnerable to compromise as they often evade detection from defensive measures. Additionally, their default passwords make them prime targets for attackers. Never Used Privileged User Never used privileged user accounts are vulnerable to compromise as they often evade detection from defensive measures. Additionally, their default passwords make them prime targets for attackers. Password Protection Not Enabled for On-Premises Environments Microsoft Entra Password Protection is a security feature that prevents users from setting easily guessable passwords to enhance overall password security in an organization. Privileged Account Naming Convention A naming convention for privileged users in Entra ID is crucial for security, standardization, audit compliance, as well as facilitates administration. Privileged Entra Account Synchronized with Active Directory (Hybrid) Hybrid accounts, i.e. synchronized from Active Directory, with privileged roles in Entra ID pose a security risk because they allow attackers who compromise AD to pivot to Entra ID. Privileged accounts in Entra ID must be cloud-only accounts. Privileged Entra Account With Access to Microsoft 365 Services Maintain separate Entra accounts for administrative tasks: a standard account for daily use and a dedicated privileged account for administrative activities. This approach minimizes the attack surface of the privileged account, enhancing security. Public Microsoft 365 Group Microsoft 365 groups stored in Entra ID are either public or private. Public groups pose a security risk because any user within the tenant can join them and gain access to their data (Teams chats/files, emails, etc.) Show Additional Context in Microsoft Authenticator Notifications For improved visibility, enable Microsoft Authenticator notifications to display additional context, such as the application name and geolocation. This helps users identify and deny potentially malicious MFA or passwordless authentication requests, effectively mitigating the risk of MFA fatigue attacks. Single Member Entra Group Creating a group with only one member is not advisable, as it introduces unnecessary redundancy and complexity. This practice adds extra layers of management, which can undermine the efficiency that groups are designed to provide in terms of streamlined access control and administration. Suspicious Directory Synchronization Accounts Role Assignment "Directory Synchronization Accounts" is a privileged Entra role hidden within the Azure and Entra ID portals, usually designated for Microsoft Entra Connect (formerly Azure AD Connect) service accounts. However, malevolent actors may exploit this role for covert attacks. Temporary Access Pass Feature Enabled The Temporary Access Pass (TAP) feature is a temporary authentication method that uses a time-limited or limited-use passcode. While it is a legitimate feature, it is safer to disable it to reduce the attack surface if your organization does not require it. Unrestricted Guest Accounts By default, Entra ID limits guest users' access to reduce their visibility within the tenant. You can further enhance security and privacy by tightening these restrictions. Unrestricted User Consent for Applications Entra ID allows users to autonomously consent to external applications' access to organization's data, which attackers may exploit in "illicit consent grant" attacks. Prevent this by restricting access to verified publishers or requiring administrator approval. Unusual Federation Signing Certificate Validity Period An unusually high validity period for a federation signing certificate is suspicious, as it could indicate that an attacker obtained elevated privileges in Entra ID and created a backdoor through the federation trust mechanism. Unverified Domain Confirm ownership of all custom domains in Entra ID. Keep unverified domains only temporarily - either verify or remove them to maintain a clean domain list and facilitate efficient reviews.
Tenable Identity Exposure 3.86 (2025-01-23)

-
Indicator of Exposure — A new IoE, Hybrid Entra ID Information, provides insights into Microsoft Entra ID data replicated to on-premises Active Directory, enabling organizations to identify potential security risks and address policy misalignments.

-
Indicators of Exposure
-
Managed Service Accounts Dangerous Misconfigurations — Improvement in this IoE to include support for groups, enabling streamlined control of access to a gMSA.
-
Ensure SDProp Consistency — Improved recommendations.
-
Shadow Credentials — Improved recommendations for remediation of Return of Coppersmith’s Attack (ROCA).
-
Two new options to enhance control over object ownership and permissions by group membership:
-
Permitted Object Owner (by Group Membership): Allows security principals to be designated as object owners through their group membership.
-
Permitted Trustees List (by Group Membership): Enables the assignment of special permissions to security principals based on their group membership.
-
-
Indicator of Attack — The Golden Ticket IoA has improved attack vector text.
-
Trust Attributes and Types in Directory Services
-
The trustType attribute now supports the TTAAD (TRUST_TYPE_AAD) value.
-
The trustAttributes attribute now supports the TDAV (TRUST_ATTRIBUTE_DISABLE_AUTH_TARGET_VALIDATION) value.
-
-
Export function — Users can choose the separator (comma or semicolon) when performing a CSV export, enabling flexibility to suit various use cases. The browser remembers the last used separator for future exports.

Tenable Identity Exposure version 3.86 contains the following bug fixes:
Bug Fixes |
---|
The web interface can now handle special characters reported in health checks. |
The Dangerous Kerberos Delegation IoE now includes all incriminating attributes relative to orphaned SPN. |
Tier0 nodes in the asset view are now consistently available. |
Tenable Identity Exposure now prevents unauthenticated calls with internal services from being saved in activity logs, ensuring clearer and more accurate log records. |
The health check for the Data Collector/Relay versions is now considered healthy (green) if the Relay and data collector versions match in both the major and minor updates, or if they only differ by one in the minor version. This gives some flexibility for automatic updates or when the software update is slightly ahead of the platform during rollouts. |
Tenable Identity Exposure no longer prevents crawling from succeeding if the sensitive data collection isn't properly configured. |
Tenable Identity Exposure improved the Windows event log parsing speed, preventing the product from accumulating lag. You must redeploy Indicators of Attack to benefit from this change. |
Tenable Identity Exposure (2025-01-10)

-
Identity 360 —A new identity-centric feature in Tenable Identity Exposure provides a rich and exhaustive inventory of every identity across the organization's identity risk surface.
This feature unifies identities across Active Directory and Entra ID and enables them to be ranked by their risk, so you can rank identities across your organization from most risky to least risky.
In addition, Identity 360 enables users to gain a deep understanding of each identity through various contextual lenses such as accounts, weaknesses, and devices associated with a given identity to gain a full perspective of that identity.
For more information, refer to Identity 360 in the Tenable Identity Exposure User Guide.
Tenable Identity Exposure 3.85 (2025-01-08)

-
Health Check — A new domain health check enhances confidence in your Indicator of Attack deployment by identifying and addressing known errors on a per-domain basis.
For more information, refer to Health Checks in the Tenable Identity Exposure User Guide.

Tenable Identity Exposure version 3.85 contains the following bug fixes:
Bug Fixes |
---|
Tenable Identity Exposure now retrieves the previous pwdLastSet attribute to calculate the interval between two password resets in attacks alerted by the Suspicious DC Password Change IoA. |
Tenable Identity Exposure fixed the 'Lockout Threshold' and 'Lockout Duration' options in the IoE Application of Weak Password Policies on Users, allowing you to allowlist deviances when their values are equal to 0. |
The IoA OS Credentials Dumping now correctly resolves the source IP, source hostname, and target IP when the attack is triggered by NT AUTHORITY\SYSTEM. |
Tenable Identity Exposure addressed a Credential Disclosure vulnerability to prevent administrators from extracting stored SMTP account credentials. |