by connecting various sensors to tenable I owe. You can discover assets across your organization.
These discovery methods includes scanning with necessary and Ness's agents as well as passive listening with the passive vulnerability scanner.
Identifying hosts with messis is a simple as creating and launching a scan using the built in host Discovery Scan template.
This streamline scan is an effective way to reach across your organization
and quickly gather a list of currently active assets.
This list of assets is based on hosts, which respond to a variety of discovery methods.
You can also configure this Discovery scan to gather additional information, such as operating system or open ports.
However, this Maur end up scan does take longer.
You should run this basic discovery scan against all internal I P ranges using your on premises scanners.
You should also run a Discovery scan against your company owned public I p. Address space using the cloud scanners built into tenable IO.
This ensures you can identify a new or unknown assets, whether they are internal or external.
It is best to run a Discovery scan on a regular schedule to help identify new assets.
You could also identify assets using Ness's agents
incorporating the agents in your organization Standard system image is an easy way to deploy them.
This ensures all newly deployed assets, including desktops, laptops, critical servers, virtual machines and cloud based systems can be accounted for and scanned.
For example, you can configure your environment so that an agent group Untenable IO called newly deployed assets would automatically include any newly deployed agents.
This agent group would allow you to conduct an initial scan of these assets and then move them to a different agent group for future scanning.
Passive listening is another very effective method of identifying assets.
Usually, once initial configuration of PBS is complete, no additional configuration is necessary.
PVS will automatically identify assets on the network in addition to identifying vulnerabilities.