Vulnerability management is the process of discovering and remediating or mitigating security weaknesses in the U-M computing environment. Tenable Vulnerability Management and the Tenable agent are critical to this process.
Tenable provides proactive detection of vulnerabilities on U-M systems, allowing proactive remediation. Benefits include:
- The ability to perform internal and external scans, which improves insight into where vulnerabilities exist.
- The Tenable agent runs locally on systems, allowing it to see threats that might otherwise be blocked from view by network or authentication barriers. It does so without requiring special exceptions in firewall rules or the use of stored credentials or remote authentication.
ITS Information Assurance provides units using Tenable with access to the Tenable console, which empowers units to:
- Create, edit, and run Tenable scans.
- Specify unique group parameters for system scanning (e.g., MyCampusUnit Windows Servers, MyCampusUnit Linux Servers, MyCampusUnit Workstations).
- View and analyze results from their scans.
- Obtain a high-level or granular view of scan results.
- Control who in their unit has access to Tenable scan results.
Tenable compliments CrowdStrike Falcon, which provides enhanced endpoint protection, and with the addition of the Falcon Complete service, gives U-M and our partners at CrowdStrike the ability to detect and quickly respond to threats to our IT systems and data.
Together, the two systems give U-M exceptional proactive, prevention, and response capabilities, and provide unit IT staff with access to information they can use to protect their unit and U-M.