Access Control

Tenable Vulnerability Management enables you to create and manage configurations that determine which users on your organization's account can perform specific actions with the organization's resources and data.

  • Permissions—Permissions enable you to manage access to your own data, such as tags, assets, and their findings.
  • Roles—Roles enable you to manage privileges for major functions in Tenable Vulnerability Management and control which Tenable Vulnerability Management modules and functions users can access.
  • Target Groups (Deprecated)—Enables you to construct a list of scan targets by FQDN, CIDR notation, or IP address range. You can specify which users in your organization can use the target group in scan configurations or filtering dashboards.
  • Access Groups (Deprecated)—Access Groups enable you to control which users or groups can view specific assets and related vulnerabilities in aggregated scan result views, and run scans against specific targets and view individual scan results for the targets.