Tenable Vulnerability Management Key Enhancements
Welcome to the improved Tenable Vulnerability Management platform! Tenable has updated the Tenable Vulnerability Management platform to provide you with a more intuitive and consistent user interface across all Tenable Vulnerability Management products.
This document refers to these improvements collectively as Tenable Vulnerability Management Key Enhancements and refers to the features and functionality that predate these updates as Tenable Vulnerability Management.
The system requirements for all products are unchanged.
Tenable Vulnerability Management Key Enhancements
The table below describes the new and updated enhancements to Tenable Vulnerability Management along with their corresponding topics.
Feature | Key Enhancement Topics | Highlights | Related Videos |
---|---|---|---|
Improved tagging functionality for asset management |
|
||
Centralized access control for roles, users, groups, and permissions |
|
||
Custom user roles | You can now create user roles for users on your account and include only the privileges you want. These custom roles allow you to tailor user interaction with your assets in a way that meets your specific organizational needs. | ||
Universal filters in Tenable Vulnerability Management |
|
Note: Feature description begins at 3:40. |
|
User-friendly Explore section |
|
||
Exports integration throughout Tenable Vulnerability Management |
|
||
Agent management | Modify Remote Agent Settings |
|
Terminology Changes
The table below lists terms commonly used in Tenable Vulnerability Management Key Enhancements documentation and their equivalent terms in Tenable Vulnerability Management documentation.
Tenable Vulnerability Management Key Enhancements | Tenable Vulnerability Management Equivalents |
---|---|
Privilege — An action that a user can perform based on their assigned user role.3 | Permission — An action that a user can perform based on their assigned user role.4 |
Permission — Predefined actions listed in a permission configuration that determine what actions the users assigned to the configuration can perform with the objects listed in the configuration. | no equivalent |
Permission Configuration — An administrator-created set of rules that determine which users can access certain resources on your Tenable Vulnerability Management instance and what actions those users can perform with those resources. |
no equivalent |
Object — A set of assets defined by a tag and identified collectively by that tag. You can create and use objects to specify which assets users on your Tenable Vulnerability Management instance can access. |
no equivalent |