Use cases

The following topics provide examples of how to use TrueSight Vulnerability Management to manage vulnerabilities. 

Topic Description
Mapping vulnerability scan results to a server environment

Explains how to map server assets and vulnerabilities detected in a vulnerability scan to the servers and remediation content you are managing with TrueSight Server Automation.

Mapping vulnerability scan results to a network environment

Explains how to map network assets and vulnerabilities detected in a vulnerability scan to the network devices and rules you are managing with TrueSight Network Automation.

Using TrueSight Server Automation to remediate server issues detected in a vulnerability scan

Explains how to use TrueSight Server Automation to perform remediation operations for server vulnerabilities detected in a vulnerability scan. This topic continues the process of integrating server scan results into TrueSight Vulnerability Management, begun in a previous walkthrough.

Using TrueSight Network Automation to remediate network issues detected in a vulnerability scan

Explains how to use TrueSight Network Automation to perform remediation operations for network device vulnerabilities detected in a vulnerability scan. This topic continues the process of integrating network scan results into TrueSight Vulnerability Management, begun in a previous walkthrough .

Using SCCM to remediate server issues detected in a vulnerability scan Explains how to use SCCM to perform remediation operations for server vulnerabilities detected in a vulnerability scan. This topic continues the process of integrating server scan results into TrueSight Vulnerability Management, begun in a previous walkthrough.
Using BMC Discovery to detect blind spots and filter for applications
Explains how to integrate TrueSight Vulnerability Management with BMC Discovery to enable blind spot detection and filtering of vulnerabilities based on applications.
Using tags to filter remediation targets

Explains how to import tags into TrueSight Vulnerability Management to enrich asset data and then use those tags to limit the assets that a Remediation operation can target.

Was this page helpful? Yes No Submitting... Thank you

Comments