Important

   

This version of the product has reached end of support. The documentation is available for your convenience. However, you must be logged in to access it. You will not be able to leave comments.

Managing security vulnerability importers

A security vulnerability importer defines a mechanism for converting security advisories, bulletins, or reports from various device vendors into security vulnerabilities to be stored in the security vulnerability database of TrueSight Network Automation. After you define an importer, you can import source files (security advisories, bulletins, or reports) from a vendor into TrueSight Network Automation by using that importer. After you import the source files, you can use them to create a compliance rule that detects vulnerable device operating systems.

The following topics describe the conversion mechanism and how to view, add, and edit security vulnerability importers:

Related topic

Managing security vulnerabilities

Was this page helpful? Yes No Submitting... Thank you

Comments