Tenable Identity Exposure 3.13 (2022-01-12)

New Features (Early Access)

Tenable Identity Exposure version 3.13 includes the following new features:

  • New graphical representations to explore Active Directory relationships:

    • Blast Radius: Evaluates lateral movements in the AD from a potentially compromised asset.

    • Attack Path: Anticipates privilege escalation techniques to reach an asset from a specific entry point.

    • Asset Exposure: Measures an asset's vulnerability using asset exposure visualization and tackles all escalation paths.

  • New ability to adjust the workload quota which limits the number of Indicators of Attack running simultaneously.

  • New API endpoint to allow you to extract Active Directory objects from the database.

  • New Indicators of Attack:

    • Massive Computers Reconnaissance: Detects reconnaissance attacks that generate a massive number of authentication requests to Active Directory targets.

      For more information, see Massive Computers Reconnaissance in the Indicator of Attacks Reference Guide.

    • Enumeration of Local Administrators: Detects Active Directory data enumeration attacks.

      For more information, see Enumeration of Local Administrators in the Indicator of Attacks Reference Guide.

Bug Fixes

Tenable Identity Exposure version 3.13 contains the following bug fixes:

Bug Fix Defect ID
Tenable Identity Exposure now supports Windows LTS versions. N/A
Deleted sites no longer appear in deviances. N/A
Tenable Identity Exposure updates group members when they change OUs. N/A
When the Active Directory is slow, the regular crawling no longer starts if a crawling is already in progress. N/A
Migration from 3.1 to 3.11 does not generate false positives deviances on GPOs. N/A