Managing security vulnerability importers
A security vulnerability importer defines a mechanism for converting security advisories, bulletins, or reports from various device vendors into security vulnerabilities to be stored in the security vulnerability database of TrueSight Network Automation. After you define an importer, you can import source files (security advisories, bulletins, or reports) from a vendor into TrueSight Network Automation by using that importer. After you import the source files, you can use them to create a compliance rule that detects vulnerable device operating systems.
The following topics describe the conversion mechanism and how to view, add, and edit security vulnerability importers:
Related topic
Managing-security-vulnerabilities
Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*