Administering
To be classified as an endpoint administrator, a user must belong to a security group that is associated with the administrative role that was designated during the installation process or after the installation while setting up connectors.
Important
Starting from version 3.0.01, services for all three deployment types, database, Elasticsearch, and application, are started automatically when you restart the nodes. In version 3.0, you need to start the services manually using the following command after each restart: python truesight-sm.py
start --deployment <deploymentType>
. See Managing product services for more information.
You can perform some of the following administration tasks on an ongoing basis:
Administration task | Related topics |
---|---|
Manage security groups. A security group is a group of users that inherit a set of restrictions and permissions.
| Managing security groups for TrueSight Server Automation |
View and manage connections to endpoint managers. | Viewing and modifying information about the TrueSight Server Automation connection Viewing and modifying information about the TrueSight Network Automation connection |
View user information. User permissions are based on the security groups to which a user belongs. All user information is view-only. | Viewing user information |
Configure Data Refresh. The Data Refresh capability watches the connectors and regularly updates any of their data that is used in TrueSight Vulnerability Management. | Configuring a Data Refresh profile |
Provide service level agreement information. Both endpoint administrators and non-administrative users can specify the service level agreements (SLAs) applicable to your organization. | Providing service level agreement information |
Manage services using the Stack Manager tool Use the Stack Manager tool to install, uninstall and manage nodes, such as application server, database, and Elasticsearch in a deployment | Managing product services |
Configure advanced settings Configure the underlying infrastructure of TrueSight Vulnerability Management to improve its performance or to make other types of low-level modifications | Configuring advanced settings |
Managing tags. Tags let you enrich data associated with assets. A tag is a key/value pair. For example, an asset tag could be called Owner and its values could be defined as various asset owners. You can import tag data in a comma separated value (CSV) format. | Managing tags for assets |
Viewing license usage. Download a report showing your current license usage. | Viewing license usage |
Obtaining version information
Clicking About at top right provides the following information in the Build Details window:
- Current build version of TrueSight Vulnerability Management
- Type and build version of the endpoint manager with which you are logged on to the TrueSight Vulnerability Management UI
Comments
Log in or register to comment.