This document provides an overview and instructions for using Tenable.sc:
- It outlines the system requirements, installation, upgrade, and configuration steps for Tenable.sc including hardware requirements, licensing, ports, and more.
- It describes how to perform user access, authentication, and authorization configuration including roles, organizations, groups, and linked accounts.
- It provides instructions for configuring scans, repositories, credentials, policies, and other resources and explains how to analyze vulnerabilities, events, and other data through dashboards, reports, and filters.