Unsupported content

 

This version of the product has reached end of support. The documentation is available for your convenience. However, you must be logged in to access it. You will not be able to leave comments.

Create Connector

The Create Connector page lets you deploy system connectors and external connectors.

System connectors

System connectors establish links to endpoint managers, the systems that must be paired with TrueSight Vulnerability Management to perform remediation on servers and other types of assets. To use TrueSight Vulnerability Management, at least one system connector must be set up. The following system connectors are available:

  • Server Automation—Establishes a connection to a TrueSight Server Automation Application Server. When linked to TrueSight Server Automation, TrueSight Vulnerability Management can perform various types of remediation operations, such as Patch Analysis Jobs, Deploy Jobs, which deploy BLPackages constructed in TrueSight Server Automation, or NSH Script Jobs, which execute scripts stored in TrueSight Server Automation. Click here for more information on deploying a Server Automation connector. 
  • Network Automation—Establishes a connection to a TrueSight Network Automation application server. When linked to TrueSight Network Automation, TrueSight Vulnerability Management can perform remediation actions associated with network rules. Click here for more information on deploying a Network Automation connector. 
  • SCCM—Establishes a connection to a Microsoft System Center Configuration Manager (SCCM) server. When linked to SCCM, TrueSight Vulnerability Management can perform remediation operations in the form of Software Updates. Click here for more information on deploying an SCCM connector.

External connectors

External connectors establish links to other applications that provide additional functionality for TrueSight Vulnerability Management. The following external connectors are available:

  • BMC Discovery—Used for detecting blind spots (servers that exist in a computing environment but are not included in vulnerability scans). You can also use data from BMC Discovery to filter information by the type of software installed on a server. Click here for more information on deploying a BMC Discovery connector.
  • TrueSight Orchestration—Used in conjunction with TrueSight Server Automation to set up job approval. Click here for more information on deploying a TrueSight Orchestration connector.
Was this page helpful? Yes No Submitting... Thank you

Comments