Create an Access Group

Tenable is retiring access groups. Moving forward, Tenable recommends that you use permissions to manage user and group access to resources on your Tenable Vulnerability Management instance and that you convert your existing access groups into permission configurations. For more information, see Transition to Permission Configurations.

Required User Role: Administrator

You can create an access group to group assets based on rules, using information such as an AWS Account ID, FQDN, IP address, and other identifying attributes. You can then assign permissions for users or user groups to view or scan the assets in the access group.

To create an access group:

  1. In the upper-left corner, click the Menu button.

    The left navigation plane appears.

  2. In the left navigation plane, click Settings.

    The Settings page appears.

  3. Click the Access Groups tile.

    The Access Groups page appears. This page contains a table that lists the access groups to which you have access.

  4. In the upper-right corner of the page, click the Create Access Group button.

    The Create Access Group page appears.

  5. In the General section, in the Name box, type a name for the access group.

    Note: The name must be unique within your organization.

  6. In the Type section, select the appropriate access group type based on the type of targets you want to scan.

    If you create an access group of one type, then change the type during configuration, Tenable Vulnerability Management prompts you to confirm the action. If you confirm, Tenable Vulnerability Management clears any previously added rule filters.

  7. In the Users & Groups section, configure user permissions for the access group.
  8. Click Save.

    Tenable Vulnerability Management creates the access group. The Access Groups page appears.

    Note: When you create or edit an access group, Tenable Vulnerability Management may take some time to assign assets to the access group, depending on the system load, the number of matching assets, and the number of vulnerabilities.

    You can view the status of this assignment process in the Status column of the access groups table on the Access Groups page.