TrueSight Vulnerability Management 3.0

All versions

TrueSight Vulnerability Management can identify, analyze, and correct vulnerabilities across an enterprise computing or network environment. IT operators and security personnel can pair TrueSight Vulnerability Management with endpoint managers such as TrueSight Server Automation, TrueSight Network Automation, and Microsoft Service Center Configuration Manager (SCCM).

Release notes and notices
updated 01 Jun

This section provides information about what is new or changed in this space, including urgent issues, documentation updates, service packs, and patches.


To stay informed of changes to this list, click the  icon on the top of this page.





March 28, 20193.0.01.001 updatesSecurity fixes and other fixes
January 31, 20193.0.01 enhancements

Enhancements available in this release:

  • Creating exceptions on vulnerabilities and assets
  • Mapping vulnerabilities for all imported security groups (Applicable for TrueSight Server Automation and TrueSight Network Automation)
  • Associating tags with a combination of vulnerability and asset
  • Filtering scan files by IP address range

June 13, 2018

3.0 enhancements

Enhancements available in this release:

  • Product delivered using Docker containers
  • Integration with Microsoft System Center Configuration Manager (SCCM) engine to remediate  server issues detected in a vulnerability scan
  • Data enrichment through asset tagging
  • Enhanced auto-mapping of vulnerabilities


Ready-made PDFs are available on the PDFs page. You can also create a custom PDF.

 Click here to see the steps.

The BMC Documentation portal gives you the ability to generate PDF and Microsoft Word documents of single pages, and to create PDF exports of multiple pages in a space.  

Creating PDF and Word exports

You can create a PDF of a page or a set of pages. (Non-English page exports are not supported.) You can also create a Word document of the current page.

To export to PDF or Word

  1. From the Tools menu in the upper-right, select a format:
    • Export to Word to export the current page to Word format
    • Export to PDF to export the current page or a set of pages to PDF
  2. If exporting to PDF, select what you want to export:
    • Only this page to export the current page
    • This page and its children to export a set of pages
    For example, selecting This page and its children from the home page exports the entire space to PDF.


Related topics

Getting started





Concepts, architecture, deployment, planning, and system requirements.



Information about installing the product



Interface descriptions, using the product.



Security, system administration, maintenance.



Issues resolution, error messages, logs, and contacting Support.
PDFs and videos


This topic describes and links to PDFs and videos that support this product release. If the ready-made PDFs of this space do not satisfy your requirements, you can export a custom PDF.


You can create a custom PDF for a specific topic, a topic and its children, or a group of topics with a specific label. For information about how you can export a custom PDF from this space, see Exporting to PDF and other formats.


The following list shows topics that contain videos that supplement text-based documentation:

FAQs and additional information


Frequently asked questions


 Do users need special permissions to access content?

Access to content is based on roles in TrueSight Server Automation and SCCM. For TrueSight Server Automation, each security group in TrueSight Vulnerability Management maps to a role in TrueSight Server Automationand grants the permissions assigned to that role. For SCCM, each security group maps to a security role in SCCM. Security groups in TrueSight Vulnerability Management should be set up to reflect roles in TrueSight Server Automation or SCCM rather than the other way around. 

 Can I import and remediate application vulnerabilities using TrueSight Vulnerability Management?

Yes, you can. However, you need to manually map the application vulnerabilities to the remediation content and then remediate them. Auto-mapping is not supported for these vulnerabilities.

 If I can only see my operations, how can a user on the second shift see the output of my work?

If the other user belongs to the same security group as you, that user can see the output of your work.


Additional information for related products

Use the following online technical documentation links for products related to TrueSight Vulnerability Management:

Was this page helpful? Yes No Submitting... Thank you