Attack Scenarios (< v. 3.36)

Caution: This configuration update feature for Indicator of Attack no longer applies to Tenable Identity Exposure versions > 3.36.
Required User Role: Organizational user with permissions to modify the Indicators of Attack configuration.

You define an attack scenario by selecting the types of attack for Tenable Identity Exposure to monitor on specific domains.

Workload Quota

Caution: The workload quota feature only no longer applies to Tenable Identity Exposure versions > 3.36.
Required User Role: Organizational user with permissions to edit the workload quota.

Each Indicator of Attack in Tenable Identity Exposure has an associated workload quota that takes into account the resources required to analyze data from an attack.

Tenable Identity Exposure calculates the workload quota to limit the number of Indicators of Attack (IoAs) running simultaneously which has an impact on bandwidth and CPU usage for event generation on domain controllers.

After you modify the workload quota limit, do the following:

  • Increase: Monitor statistics following the increase to ensure a comfortable margin.

  • Decrease: Deactivate some IoAs to stay under this quota, which reduces security coverage against attacks.