Tenable Identity Exposure 2025 Release Notes
These release notes are listed in reverse chronological order.
Tenable Identity Exposure 3.88 (2025-02-20)

-
Indicator of Exposure (AD) — Exchange Dangerous Misconfigurations to list misconfigurations that impact Exchange resources or its underlying Active Directory schema objects.

-
Tenable Identity Exposure now includes Amplitude to enhance product analytics.
-
Tenable One customers using TCS will now see TCS data in ID360, including MEID, AWS, GCP, Okta, PingIdentity, and OneLogin IDP details, when IDP accounts have an email address.

Tenable Identity Exposure version 3.88 contains the following bug fixes:
Bug Fixes |
---|
The Indicator of Attack (IoA) listener now efficiently releases memory, correcting an issue introduced in version 3.86. This only affects customers who installed IoAs in versions 3.86 or 3.87. These customers must reinstall IoAs in version 3.88. |
In the Exposure Center, impacted assets with a "Resolved" status no longer lead to a blank page without data. |
Some weakness-related texts displayed in the Exposure Instances are now better structured, improving clarity and readability. |
The weakness-related text in Exposure Instances now displays bullet points without unnecessary line breaks, improving readability and consistency. |
Redirections from Identity 360 to Tenable One no longer result in blank pages. |
Tooltips on Identities Overview grid values no longer appear as duplicates for properties with custom tooltips. |
The Identity Details pages can now generate the AI asset summary again. |
Selected rows for export in Identity 360 and Exposure Overview now remain selected after the export is completed. |
Uninstalling the Secure Relay no longer removes the shared Tools folder with Ceti (Directory Listener). When both are installed on the same machine, the Tools folder now remains intact, preserving the nssm binary. |
When you add columns in the Exposure Overview, you can now select these for data export. |
In the Exposure Instance details page, the Asset Class column is now truncated when necessary, with a tooltip displaying the full value. |
The Exposure Center remediation scripts now have a prefix with the localized weakness name. |
More text elements in the Exposure Center user interface now support localization. |
The hyperlinks displayed in the Exposure Instances pages targeting the Microsoft documentation now reference the localized version of the documentation. |
The CSV exports of "Impacted Assets" in Exposure Instances now display localized column header names. |
Tenable Identity Exposure improved websockets security. |
Hyperlink text descriptions in Exposure Instances now wrap to the next line when they exceed the available space. |
The "Domain Controller Activity" health check now detects inactive Domain Controllers within a 15-minute window based on Indicator of Attack event log activity. While it still waits for this duration before reporting failures, it now reports successful cases and reactivated Domain Controllers much faster. Additionally, a bug fix ensures the health check uses up-to-date data. |
Tenable Identity Exposure enhanced application resilience with proper handling of RabbitMQ channel errors during message publishing. |
The deviances tab displays correctly when clicking on events in the Trail Flow. |
Identity 360 CSV exports now handle data containing double quotes correctly. |
Tenable Identity Exposure 3.87 (2025-02-06)

-
Exposure Center — Removal of references to Vulnerability Priority Rating (VPR) from the Exposure Overview because Tenable Identity Exposure does not populate these scores for identity-related Indicators of Exposure.

Tenable Identity Exposure version 3.87 contains the following bug fixes:
Bug Fixes |
---|
In Identity 360, the weakness source "TENABLE_IDENTITY_EXPOSURE" is no longer duplicated. |
The Golden Ticket Indicator of Attack now raises an alert when the attacker uses a forged TGT ticket in basic mode. |
Tenable Identity Exposure addressed the CVE-2022-24434 security vulnerability that affects certain software components, potentially allowing attackers to exploit weaknesses such as privilege escalation, remote code execution, or denial of service. |
Tenable Identity Exposure resolved an issue where triggering a group policy update could cause the Tenable Event Logs listener to stall while awaiting interactive user input. |
Tenable Identity Exposure (2025-02-05)

-
Exposure Center —Exposure Center is a Tenable Identity Exposure feature that enhances your organization's identity security posture. It identifies weaknesses and misconfigurations across your identity risk surface, covering both the underlying identity systems, such as Entra ID, and the identities within those systems.
This feature's user experience revolves around three interconnected concepts: Exposure Overview, Exposure Instances, and Findings. Tenable Research supports these concepts with a new security engine and specifically developed Indicators of Exposure (IoEs) to drive their functionality.
For more information, refer to Exposure Center in the Tenable Identity Exposure User Guide.
-
New Entra ID Indicators of Exposure
Name Description Ability of Standard Accounts to Register Applications By default, any Entra user can register applications within the tenant. While this feature is convenient and not an immediate security vulnerability, it does carry certain risks. Therefore, following best practices, Tenable recommends disabling this capability. Application Allowing Multi-Tenant Authentication Entra applications, which allow multi-tenant authentication, may give unauthorized access to malicious users if this configuration was not enabled with full awareness and without implementing adequate authorization checks within the application code. Conditional Access Policy Disables Continuous Access Evaluation Continuous Access Evaluation is an Entra ID security feature that enables swift reactions to security policy changes or user status updates. For this reason, do not disable it. Dangerous Application Permissions Affecting the Tenant Microsoft exposes APIs in Entra ID to allow 3rd-party applications to perform actions on Microsoft services on their own (called "application permissions"). Certain permissions can pose a serious threat to the entire Microsoft Entra tenant. Dangerous Delegated Permissions Affecting the Tenant Microsoft exposes APIs in Entra ID to allow 3rd-party applications to perform actions on Microsoft services on their own (called "application permissions"). Certain permissions can pose a serious threat to the entire Microsoft Entra tenant. Disabled Account Assigned to a Privileged Role Having a sane account management process requires monitoring assignments to privileged roles. Dormant Device Dormant devices pose security risks such as outdated configurations and unpatched vulnerabilities. Without regular monitoring and updates, these stale devices become potential targets for exploitation, compromising tenant integrity and data confidentiality. Dormant Non-Privileged User Dormant non-privileged users pose security risks as attackers can exploit them for unauthorized access. Without regular monitoring and deactivation, these stale users create potential entry points for malicious activities by expanding the attack surface. Dormant Privileged User Dormant privileged users pose security risks as attackers can exploit them for unauthorized access. Without regular monitoring and deactivation, these stale users create potential entry points for malicious activities by expanding the attack surface. Dynamic Group with Exploitable Rule Attackers can exploit dynamic groups in Microsoft Entra ID by manipulating self-modifiable attributes, allowing them to add themselves as group members. This manipulation enables privilege escalation and unauthorized access to sensitive resources tied to the groups. Empty Entra Group Empty groups can lead to confusion, compromise security, and result in unused resources. It is generally advisable to establish a clear purpose for groups and ensure they contain relevant members. Entra Security Defaults Not Enabled Entra ID Security Defaults offer pre-configured, Microsoft-recommended settings to enhance tenant protection. Federated Domain List Malicious federated domain configuration is a common threat, used by attackers as an authentication backdoor to the Entra ID tenant. Verifying existing and newly added federated domains is crucial to ensure their configurations are trustworthy and legitimate. This Indicator of Exposure provides a comprehensive list of federated domains and their relevant attributes to help you to make informed decisions about their security status. Federation Signing Certificates Mismatch Microsoft Entra ID allows delegation of authentication to another provider through federation. However, attackers with elevated privileges can exploit this feature by adding a malicious token-signing certificate, leading to persistence and privilege escalation. First-Party Service Principal with Credentials First-party service principals have powerful permissions but are often overlooked due to their high volume, lack of visibility, and Microsoft ownership. Attackers can exploit this by adding credentials to these principals, allowing them to stealthily leverage their privileges for privilege escalation and persistence. Guest Account with Privileged Role Guest accounts are external identities that can pose a security risk when they have privileged roles assigned to them. This grants substantial privileges within the tenant to individuals outside your organization. Guest Accounts with Equal Access to Normal Accounts It is not advisable to configure Entra ID to consider guests as regular users, as it may enable malicious guests to conduct comprehensive reconnaissance on the tenant's resources. High Number of Administrators A high number of administrators increases the attack surface and poses security risks due to their elevated privileges. This also indicates a failure to uphold the principle of least privilege. Known Federated Domain Backdoor Microsoft Entra ID allows delegation of authentication to another provider through federation. However, attackers with elevated privileges can exploit this feature by adding their malicious federated domain, leading to persistence and privilege escalation. Legacy Authentication Not Blocked Legacy authentication methods do not support Multi-Factor Authentication (MFA), enabling attackers to continue performing brute-force, credential stuffing, and password-spraying attacks. Missing Multi-Factor Authentication for Non-Privileged Accounts MFA provides strong protection for accounts against weak or breached passwords. Security best practices and standards recommend that you enable MFA, even for non-privileged accounts. Accounts without an MFA method registered cannot benefit from it. Missing Multi-Factor Authentication for Privileged Accounts MFA provides strong protection for accounts against weak or breached passwords. Security best practices and standards recommend that you enable MFA, even for non-privileged accounts. Accounts without an MFA method registered cannot benefit from it. Multi-Factor Authentication Not Required for a Privileged Role MFA provides strong protection for accounts against weak or breached passwords. Security best practices and standards recommend that you enable MFA, particularly for privileged accounts with assigned privileged roles. Multi-Factor Authentication Not Required for Risky Sign-Ins MFA provides strong protection for accounts against weak or breached passwords. Security best practices and standards recommend that you require MFA for risky sign-ins, for example when the authentication request may not come from the legitimate identity owner. Never Used Device Avoid pre-created, never-used device accounts, as they indicate poor security hygiene and may pose potential security risks. Never Used Non-Privileged User Never used non-privileged user accounts are vulnerable to compromise as they often evade detection from defensive measures. Additionally, their default passwords make them prime targets for attackers. Never Used Privileged User Never used privileged user accounts are vulnerable to compromise as they often evade detection from defensive measures. Additionally, their default passwords make them prime targets for attackers. Password Protection Not Enabled for On-Premises Environments Microsoft Entra Password Protection is a security feature that prevents users from setting easily guessable passwords to enhance overall password security in an organization. Privileged Account Naming Convention A naming convention for privileged users in Entra ID is crucial for security, standardization, audit compliance, as well as facilitates administration. Privileged Entra Account Synchronized with Active Directory (Hybrid) Hybrid accounts, i.e. synchronized from Active Directory, with privileged roles in Entra ID pose a security risk because they allow attackers who compromise AD to pivot to Entra ID. Privileged accounts in Entra ID must be cloud-only accounts. Privileged Entra Account With Access to Microsoft 365 Services Maintain separate Entra accounts for administrative tasks: a standard account for daily use and a dedicated privileged account for administrative activities. This approach minimizes the attack surface of the privileged account, enhancing security. Public Microsoft 365 Group Microsoft 365 groups stored in Entra ID are either public or private. Public groups pose a security risk because any user within the tenant can join them and gain access to their data (Teams chats/files, emails, etc.) Show Additional Context in Microsoft Authenticator Notifications For improved visibility, enable Microsoft Authenticator notifications to display additional context, such as the application name and geolocation. This helps users identify and deny potentially malicious MFA or passwordless authentication requests, effectively mitigating the risk of MFA fatigue attacks. Single Member Entra Group Creating a group with only one member is not advisable, as it introduces unnecessary redundancy and complexity. This practice adds extra layers of management, which can undermine the efficiency that groups are designed to provide in terms of streamlined access control and administration. Suspicious Directory Synchronization Accounts Role Assignment "Directory Synchronization Accounts" is a privileged Entra role hidden within the Azure and Entra ID portals, usually designated for Microsoft Entra Connect (formerly Azure AD Connect) service accounts. However, malevolent actors may exploit this role for covert attacks. Temporary Access Pass Feature Enabled The Temporary Access Pass (TAP) feature is a temporary authentication method that uses a time-limited or limited-use passcode. While it is a legitimate feature, it is safer to disable it to reduce the attack surface if your organization does not require it. Unrestricted Guest Accounts By default, Entra ID limits guest users' access to reduce their visibility within the tenant. You can further enhance security and privacy by tightening these restrictions. Unrestricted User Consent for Applications Entra ID allows users to autonomously consent to external applications' access to organization's data, which attackers may exploit in "illicit consent grant" attacks. Prevent this by restricting access to verified publishers or requiring administrator approval. Unusual Federation Signing Certificate Validity Period An unusually high validity period for a federation signing certificate is suspicious, as it could indicate that an attacker obtained elevated privileges in Entra ID and created a backdoor through the federation trust mechanism. Unverified Domain Confirm ownership of all custom domains in Entra ID. Keep unverified domains only temporarily - either verify or remove them to maintain a clean domain list and facilitate efficient reviews.
Tenable Identity Exposure 3.86 (2025-01-23)

-
Indicator of Exposure — A new IoE, Hybrid Entra ID Information, provides insights into Microsoft Entra ID data replicated to on-premises Active Directory, enabling organizations to identify potential security risks and address policy misalignments.

-
Indicators of Exposure
-
Managed Service Accounts Dangerous Misconfigurations — Improvement in this IoE to include support for groups, enabling streamlined control of access to a gMSA.
-
Ensure SDProp Consistency — Improved recommendations.
-
Shadow Credentials — Improved recommendations for remediation of Return of Coppersmith’s Attack (ROCA).
-
Two new options to enhance control over object ownership and permissions by group membership:
-
Permitted Object Owner (by Group Membership): Allows security principals to be designated as object owners through their group membership.
-
Permitted Trustees List (by Group Membership): Enables the assignment of special permissions to security principals based on their group membership.
-
-
Indicator of Attack — The Golden Ticket IoA has improved attack vector text.
-
Trust Attributes and Types in Directory Services
-
The trustType attribute now supports the TTAAD (TRUST_TYPE_AAD) value.
-
The trustAttributes attribute now supports the TDAV (TRUST_ATTRIBUTE_DISABLE_AUTH_TARGET_VALIDATION) value.
-
-
Export function — Users can choose the separator (comma or semicolon) when performing a CSV export, enabling flexibility to suit various use cases. The browser remembers the last used separator for future exports.

Tenable Identity Exposure version 3.86 contains the following bug fixes:
Bug Fixes |
---|
The web interface can now handle special characters reported in health checks. |
The Dangerous Kerberos Delegation IoE now includes all incriminating attributes relative to orphaned SPN. |
Tier0 nodes in the asset view are now consistently available. |
Tenable Identity Exposure now prevents unauthenticated calls with internal services from being saved in activity logs, ensuring clearer and more accurate log records. |
The health check for the Data Collector/Relay versions is now considered healthy (green) if the Relay and data collector versions match in both the major and minor updates, or if they only differ by one in the minor version. This gives some flexibility for automatic updates or when the software update is slightly ahead of the platform during rollouts. |
Tenable Identity Exposure no longer prevents crawling from succeeding if the sensitive data collection isn't properly configured. |
Tenable Identity Exposure improved the Windows event log parsing speed, preventing the product from accumulating lag. You must redeploy Indicators of Attack to benefit from this change. |
Tenable Identity Exposure (2025-01-10)

-
Identity 360 —A new identity-centric feature in Tenable Identity Exposure provides a rich and exhaustive inventory of every identity across the organization's identity risk surface.
This feature unifies identities across Active Directory and Entra ID and enables them to be ranked by their risk, so you can rank identities across your organization from most risky to least risky.
In addition, Identity 360 enables users to gain a deep understanding of each identity through various contextual lenses such as accounts, weaknesses, and devices associated with a given identity to gain a full perspective of that identity.
For more information, refer to Identity 360 in the Tenable Identity Exposure User Guide.
Tenable Identity Exposure 3.85 (2025-01-08)

-
Health Check — A new domain health check enhances confidence in your Indicator of Attack deployment by identifying and addressing known errors on a per-domain basis.
For more information, refer to Health Checks in the Tenable Identity Exposure User Guide.

Tenable Identity Exposure version 3.85 contains the following bug fixes:
Bug Fixes |
---|
Tenable Identity Exposure now retrieves the previous pwdLastSet attribute to calculate the interval between two password resets in attacks alerted by the Suspicious DC Password Change IoA. |
Tenable Identity Exposure fixed the 'Lockout Threshold' and 'Lockout Duration' options in the IoE Application of Weak Password Policies on Users, allowing you to allowlist deviances when their values are equal to 0. |
The IoA OS Credentials Dumping now correctly resolves the source IP, source hostname, and target IP when the attack is triggered by NT AUTHORITY\SYSTEM. |
Tenable Identity Exposure addressed a Credential Disclosure vulnerability to prevent administrators from extracting stored SMTP account credentials. |