Managing security vulnerability importers
A security vulnerability importer defines a mechanism for converting security advisories, bulletins, or reports from various device vendors into security vulnerabilities to be stored in the security vulnerability database of TrueSight Network Automation. After you define an importer, you can import source files (security advisories, bulletins, or reports) from a vendor into TrueSight Network Automation by using that importer. After you import the source files, you can use them to create a compliance rule that detects vulnerable device operating systems.
The following topics describe the conversion mechanism and how to view, add, and edit security vulnerability importers:
- About security vulnerability importers
- Adding or editing security vulnerability importers
- Viewing the security vulnerability importers listing
Comments
Log in or register to comment.