Important

   

Starting version 8.9.03, BMC Network Automation is renamed to TrueSight Network Automation. This space contains information about BMC Network Automation 8.9.02 and previous versions. For TrueSight Network Automation 8.9.03 and later releases, see the TrueSight Network Automation documentation.

Managing security vulnerability importers

A security vulnerability importer defines a mechanism for converting security advisories, bulletins, or reports from various device vendors into security vulnerabilities to be stored in the security vulnerability database of BMC Network Automation. After you define an importer, you can import source files (security advisories, bulletins, or reports) from a vendor into BMC Network Automation by using that importer. After you import the source files, you can use them to create a compliance rule that detects vulnerable device operating systems.

The following topics describe the conversion mechanism and how to view, add, and edit security vulnerability importers:

Related topic

Managing security vulnerabilities

Was this page helpful? Yes No Submitting... Thank you

Comments