To be classified as an endpoint administrator, a user must belong to a security group that is associated with the administrative role that was designated during the installation process or after the installation while setting up connectors.
Starting from version 3.0.01, services for all three deployment types, database, Elasticsearch, and application, are started automatically when you restart the nodes. In version 3.0, you need to start the services manually using the following command after each restart:
start --deployment <deploymentType>. See Managing product services for more information.
You can perform some of the following administration tasks on an ongoing basis:
|Administration task||Related topics|
Manage security groups. A security group is a group of users that inherit a set of restrictions and permissions.
View and manage connections to endpoint managers.
View user information.
User permissions are based on the security groups to which a user belongs. All user information is view-only.
|Viewing user information|
Configure Data Refresh.
The Data Refresh capability watches the connectors and regularly updates any of their data that is used in TrueSight Vulnerability Management.
|Configuring Data Refresh|
Provide service level agreement information.
Both endpoint administrators and non-administrative users can specify the service level agreements (SLAs) applicable to your organization.
|Providing service level agreement information|
Back up and restore Elasticsearch server data
Elasticsearch servers store all data used in TrueSight Vulnerability Management. Backing up data in Elasticsearch servers should be part of the regular maintenance of a TrueSight Vulnerability Management deployment.
|Backing up and restoring Elasticsearch server data|
Manage services using the Stack Manager tool
Use the Stack Manager tool to install, uninstall and manage nodes, such as application server, database, and Elasticsearch in a deployment
|Managing product services|
Configure advanced settings
Configure the underlying infrastructure of TrueSight Vulnerability Management to improve its performance or to make other types of low-level modifications
|Configuring advanced settings|
Tags let you enrich data associated with assets. A tag is a key/value pair. For example, an asset tag could be called Owner and its values could be defined as various asset owners.
You can import tag data in a comma separated value (CSV) format.
|Managing tags for assets|
Viewing license usage.
Download a report showing your current license usage.
|Viewing license usage|
Obtaining version information
Clicking About at top right provides the following information in the Build Details window:
- Current build version of TrueSight Vulnerability Management
- Type and build version of the endpoint manager with which you are logged on to the TrueSight Vulnerability Management UI