?

Tenable.sc Lab

Bookmark
Solution Overview
WWT's Tenable.sc demo environment gives you a comprehensive security picture of the ATC network. Built on leading Nessus technology, Tenable.sc discovers unknown assets and vulnerabilities and monitors unexpected network changes before they turn into breaches. Tenable.sc provides the visibility and insight to answer four critical questions at all times: 
  • Where are we exposed? 
  • Where should we prioritize based on risk? 
  • Are we reducing our exposure over time? 
  • How do we compare to our peers?

KEY FEATURES:

Comprehensive Coverage and Visibility
Actively and passively assess systems, networks and applications to discover all assets and gain continuous and holistic visibility into vulnerabilities that threaten your security posture.

Continuous Monitoring
Deep packet inspection continuously discovers and tracks users, applications, cloud infrastructure, trust relationships and vulnerabilities for comprehensive visibility into your network connected assets.

Streamlined Compliance
Keep your organization compliant with immediate visibility into your compliance posture. Easily demonstrate adherence to compliance initiatives with pre-defined checks against industry standards and regulatory mandates.

Custom Reports and Dashboards
Leverage over 350 pre-built, highly customizable dashboards and reports to better understand your cyber risk. Get the visibility and context you need to take decisive action to reduce exposure and risk.

Real-Time Alerts and Notifications
Customizable alerts, notifications and actions notify administrators about network irregularities and high-priority security events to speed up incident response and vulnerability remediation.

Vulnerability Prioritization
Identify and prioritize vulnerabilities with the highest impact to your organization. Use the Vulnerability Priority Rating (VPR) and the Solutions View page to easily prioritize patches and focus on what matters most.

Goals & Objectives

The purpose of the lab is to help you develop proficiency in managing and monitoring Tenable.sc for Endpoints Security solutions. The lab guide provides a flexible framework for evaluating the solution, its installation and behavior in a sample customer environment.

The lab environment will allow you to:
  • Access the ESA baseline sandbox environment.
  • Configure and view compliance scans. 
  • Build customize reports and view assets from the SecurityCenter web interface. 
  • Customizable alerts, notifications and actions.
  • Identify and prioritize vulnerabilities with the highest impact.

Hardware & Software

This lab consists of the following hardware and software: 

Software 
  • Tenable 
 
Server Devices 
  • 1x Windows Jumphost (Windows Server 2016).
  • 1x Generic Server (Windows Server 2012).
  • 1x Generic Server (Windows Server 2016).
  • 1x Generic Server (Red Hat Enterprise Linux 7).
  • 1x Generic Server (CentOS 7).
  • 1x Generic Server (Solaris 11).
 
Client Devices 
  • 1x Attack Client (Windows 10 Enterprise).
  • 1x Generic Client (Windows 7 Enterprise).
  • 1x Attack Host (Kali Linux 2018).

Technologies