FAQs and additional information
Frequently asked questions
Access to content is based on roles in TrueSight Server Automation and SCCM. For TrueSight Server Automation, each security group in TrueSight Vulnerability Management maps to a role in TrueSight Server Automationand grants the permissions assigned to that role. For SCCM, each security group maps to a security role in SCCM. Security groups in TrueSight Vulnerability Management should be set up to reflect roles in TrueSight Server Automation or SCCM rather than the other way around.
Yes, you can. However, you need to manually map the application vulnerabilities to the remediation content and then remediate them. Auto-mapping is not supported for these vulnerabilities.
If the other user belongs to the same security group as you, that user can see the output of your work.
Additional information for related products
Use the following online technical documentation links for products related to TrueSight Vulnerability Management: