Time
35 minutes
Difficulty
Beginner
CEU/CPE
3

Video Description

INTRODUCING Tenable.ioCloud-Based Vulnerability Management Platform Gain actionable insight into your security risks and where to focus with Tenable.io – the first vulnerability management platform built for today's elastic IT assets, including cloud, containers and web applications. Use the free Tenable.io download to follow along with the course. Download

Video Transcription

00:02
tenable. Io makes it easy to discover your organization's assets to possible methods are to use the passive vulnerability scanner or use cloud or internal scanners. This demonstration shows the internal scanner method.
00:20
First log into tenable IO.
00:24
Next, navigate to your scans and create a new scan.
00:30
The best scan template for this purpose is the Host Discovery Scan.
00:36
Provide a meaningful name and description.
00:41
Choose the appropriate scanner for the regional office,
00:48
then select the intended target.
00:55
The next step is to select a schedule for this scan.
01:00
You should schedule host Discovery scans carefully to keep your target group current.
01:08
The scan schedule should reflect the frequency of expected changes in your environment.
01:15
For example, you are likely to scan a brand new office more frequently than you would scan an older, more established office.
01:26
Set the proper permissions for other team members like you would for any other scan,
01:38
save and launch your scan.
01:42
Remember that the purpose of this scan is to keep asset lists up to date. With this in mind, let's view the asset list
01:55
first. Sort the data. To see most recently discovered information,
02:02
click on an entry to view the assets details
02:07
notice when the asset was first seen and last seen. In this case, there have been updates to the asset. These updates are a result of the scan we just launched.
02:20
Let's take a look at another entry
02:24
in the details for this asset. There is an added discovery point because the asset was also discovered by the passive Vulnerability scanner. Keeping your asset lists up to date is critical to understanding your environment.
02:40
An accurate asset list also provides a detailed picture of your company's vulnerability exposure.

Up Next