Demonstrating the SecOps Response process

The following topics provide examples of how to use SecOps Response to manage vulnerabilities. 

Topic Description
Walkthrough: Onboarding a connector for BSA Explains how to download, run, and configure the program that establishes a connection between SecOps Response, which runs in the cloud, and another application that runs on your premises. This example shows how to establish a connection to BMC BladeLogic Server Automation (BSA).
Walkthrough: Mapping vulnerability scan results to a server environment Explains how to map server assets and vulnerabilities detected in a vulnerability scan to the servers and remediation content you are managing with BMC BladeLogic Server Automation.
Walkthrough: Mapping vulnerability scan results to a network environment Explains how to map network assets and vulnerabilities detected in a vulnerability scan to the network devices and rules you are managing with BMC Network Automation.
Walkthrough: Using BSA to remediate server issues detected in a vulnerability scan Explains how to use BSA to perform remediation operations for server vulnerabilities detected in a vulnerability scan. This topic continues the process of integrating server scan results into SecOps Response, begun in a previous walkthrough.
Walkthrough: Using BNA to remediate network issues detected in a vulnerability scan

Explailns how to use BNA to perform remediation operations for network device vulnerabilities detected in a vulnerability scan. This topic continues the process of integrating network scan results into SecOps Response, begun in a previous walkthrough .

Walkthrough: Using SCCM to remediate server issues detected in a vulnerability scan Explains how to use SCCM to perform remediation operations for server vulnerabilities detected in a vulnerability scan. This topic continues the process of integrating server scan results into SecOps Response, begun in a previous walkthrough.
Walkthrough: Using BMC Discovery to detect blind spots and filter for applications
Explains how to integrate SecOps Response with BMC Discovery to enable blind spot detection and filtering of vulnerabilities based on applications.
Walkthrough: Using tags to filter remediation targets

Explains how to import tags into SecOps Response to enrich asset data and then use those tags to limit the assets that a Remediation operation can target.

Was this page helpful? Yes No Submitting... Thank you

Comments