Tenable Identity Exposure 3.13 (2022-01-12)
New Features (Early Access)
Tenable Identity Exposure version 3.13 includes the following new features:
-
New graphical representations to explore Active Directory relationships:
-
Blast Radius: Evaluates lateral movements in the AD from a potentially compromised asset.
-
Attack Path: Anticipates privilege escalation techniques to reach an asset from a specific entry point.
-
Asset Exposure: Measures an asset's vulnerability using asset exposure visualization and tackles all escalation paths.
-
-
New ability to adjust the workload quota which limits the number of Indicators of Attack running simultaneously.
-
New API endpoint to allow you to extract Active Directory objects from the database.
-
New Indicators of Attack:
-
Massive Computers Reconnaissance: Detects reconnaissance attacks that generate a massive number of authentication requests to Active Directory targets.
For more information, see Massive Computers Reconnaissance in the Indicator of Attacks Reference Guide.
-
Enumeration of Local Administrators: Detects Active Directory data enumeration attacks.
For more information, see Enumeration of Local Administrators in the Indicator of Attacks Reference Guide.
-
Bug Fixes
Tenable Identity Exposure version 3.13 contains the following bug fixes:
Bug Fix | Defect ID |
---|---|
Tenable Identity Exposure now supports Windows LTS versions. | N/A |
Deleted sites no longer appear in deviances. | N/A |
Tenable Identity Exposure updates group members when they change OUs. | N/A |
When the Active Directory is slow, the regular crawling no longer starts if a crawling is already in progress. | N/A |
Migration from 3.1 to 3.11 does not generate false positives deviances on GPOs. | N/A |