Unsupported content This version of the product has reached end of support. The documentation is available for your convenience. However, you must be logged in to access it. You will not be able to leave comments.

TrueSight Vulnerability Management 3.1



TrueSight Vulnerability Management can identify, analyze, and correct vulnerabilities across an enterprise computing or network environment. IT operators and security personnel can pair TrueSight Vulnerability Management with endpoint managers such as TrueSight Server Automation, TrueSight Network Automation, and Microsoft Service Center Configuration Manager (SCCM).


Release notes and notices Updated 28 Dec 2021

This section provides information about what is new or changed in this space, including urgent issues, documentation updates, service packs, and patches.

Tip

To stay informed of changes to this list, click the watch.jpg icon on the top of this page.

 

Date

Title

Summary

June 20, 2019

Enhancements available in this release:

  • Support for Change Automation for all endpoint managers
  • Support for configuring Data Refresh interval
  • Support for PKI authentication
  • Integration with Nessus scanner
  • Support for Elasticsearch authentication

Tip

Ready-made PDFs are available on the PDFs page. You can also create a custom PDF.

Click here to see the steps.

The BMC Documentation portal gives you the ability to generate PDF exports of multiple pages in a space.  

Creating PDF exports

You can create a PDF of a page or a set of pages. (Non-English page exports are not supported.) You can also create a Word document of the current page.

To export to PDF

  1. Click the Export icon in the upper-right. 1744830844926-963.png
  2. From the Export menu, select PDF.
  3. Follow the prompts for page selection and other options.
  4. Click Export.

 

Related topics

Getting startedPlanningInstalling

Planning

Concepts, architecture, deployment, planning, and system requirements.

Installing

Information about installing the product

Using

Interface descriptions, using the product.

Administering

Security, system administration, maintenance.

Troubleshooting

Issues resolution, error messages, logs, and contacting Support.
PDFs and videos

This topic describes and links to PDFs and videos that support this product release. If the ready-made PDFs of this space do not satisfy your requirements, you can export a custom PDF.


Tip

You can create a custom PDF for a specific topic, a topic and its children, or a group of topics with a specific label. For information about how you can export a custom PDF from this space, see Exporting-to-PDF-and-other-formats.


Videos

The following list shows topics that contain videos that supplement text-based documentation:


You must log in or register to view this page


FAQs and additional information

Frequently asked questions

 

Do users need special permissions to access content?

Access to content is based on roles in TrueSight Server Automation and SCCM. For TrueSight Server Automation, each security group in TrueSight Vulnerability Management maps to a role in TrueSight Server Automationand grants the permissions assigned to that role. For SCCM, each security group maps to a security role in SCCM. Security groups in TrueSight Vulnerability Management should be set up to reflect roles in TrueSight Server Automation or SCCM rather than the other way around. 

Can I import and remediate application vulnerabilities using TrueSight Vulnerability Management?

Yes, you can. However, you need to manually map the application vulnerabilities to the remediation content and then remediate them. Auto-mapping is not supported for these vulnerabilities.

If I can only see my operations, how can a user on the second shift see the output of my work?

If the other user belongs to the same security group as you, that user can see the output of your work.

 

Additional information for related products

Use the following online technical documentation links for products related to TrueSight Vulnerability Management:

 

 

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*