Asset Discovery Methods with Tenable.IO

Video Activity

INTRODUCING Tenable.ioCloud-Based Vulnerability Management Platform Gain actionable insight into your security risks and where to focus with Tenable.io – the first vulnerability management platform built for today's elastic IT assets, including cloud, containers and web applications. Use the free Tenable.io download to follow along with the course....

Start your free 3-day trial and become one of the 3 million Cybersecurity professionals advancing their career goals
Sign up with
OR

Already have an account? Sign In »

Time
35 minutes
Difficulty
Beginner
CEU/CPE
3
Video Description

INTRODUCING Tenable.ioCloud-Based Vulnerability Management Platform Gain actionable insight into your security risks and where to focus with Tenable.io – the first vulnerability management platform built for today's elastic IT assets, including cloud, containers and web applications. Use the free Tenable.io download to follow along with the course. Download

Video Transcription
00:04
by connecting various sensors to tenable I owe. You can discover assets across your organization.
00:12
These discovery methods includes scanning with necessary and Ness's agents as well as passive listening with the passive vulnerability scanner.
00:24
Identifying hosts with messis is a simple as creating and launching a scan using the built in host Discovery Scan template.
00:34
This streamline scan is an effective way to reach across your organization
00:38
and quickly gather a list of currently active assets.
00:43
This list of assets is based on hosts, which respond to a variety of discovery methods.
00:51
You can also configure this Discovery scan to gather additional information, such as operating system or open ports.
00:59
However, this Maur end up scan does take longer.
01:03
You should run this basic discovery scan against all internal I P ranges using your on premises scanners.
01:11
You should also run a Discovery scan against your company owned public I p. Address space using the cloud scanners built into tenable IO.
01:21
This ensures you can identify a new or unknown assets, whether they are internal or external.
01:30
It is best to run a Discovery scan on a regular schedule to help identify new assets.
01:40
You could also identify assets using Ness's agents
01:44
incorporating the agents in your organization Standard system image is an easy way to deploy them.
01:53
This ensures all newly deployed assets, including desktops, laptops, critical servers, virtual machines and cloud based systems can be accounted for and scanned.
02:06
For example, you can configure your environment so that an agent group Untenable IO called newly deployed assets would automatically include any newly deployed agents.
02:17
This agent group would allow you to conduct an initial scan of these assets and then move them to a different agent group for future scanning.
02:27
Passive listening is another very effective method of identifying assets.
02:38
Usually, once initial configuration of PBS is complete, no additional configuration is necessary.
02:46
PVS will automatically identify assets on the network in addition to identifying vulnerabilities.
Up Next