The installation process requires you to complete your planning activities before starting the preparatory and installation tasks. The installation flow diagram and the process tables enable you to install the product smoothly.


TrueSight Vulnerability Management is delivered to customers bundled as a set of Docker Containers. The Docker Containers and the software installed on them should not be taken out of TrueSight Vulnerability Management or used separately from TrueSight Vulnerability Management. Installing additional third-party software or updating existing software packages in the Docker Containers is not permitted, unless explicitly authorized by BMC Software.

TrueSight Vulnerability Management installation process – At a glance

Installation process

Step 1: Complete the planning activities

Use this information to plan a new deployment of TrueSight Vulnerability Management.


Planning activities include pre-deployment considerations, recommendations, and deployment options for your environment.

Step 2: Prepare for the TrueSight Vulnerability Management installation

Complete the pre-installation tasks to ensure a successful installation.


Download the installation files and complete the pre-installation tasks

Step 3: Install TrueSight Vulnerability Management

A TrueSight Vulnerability Management deployment consists of three nodes: database, Elasticsearch, and application. TrueSight Vulnerability Management currently supports PostgreSQL as a database. You can install the database either by using the executables provided on the BMC Electronic Product Distribution (EPD) site, or you can use an existing PostgreSQL instance in your environment for the application.


Install the database, Elasticsearch, and application in the following order using a single script contained in the Stack Manager tool, which is shipped with the product:

  1. Database
  2. Elasticsearch
  3. Application

Install in one of the following modes:

  • Installing in the interactive mode: In this mode, you can use one of the following deployment methods:
    • You create input files and then use them for installation. You can generate the input files on any of the computers where you want to install database, Elasticsearch, or application and then copy it to the required computers as and when needed, or you can generate it on the required computers.
    • Directly provide inputs on the command line during installation of the database, Elasticsearch, and application.
  • Installing silently: In this mode, you create an options file containing all the required inputs and then use this file for installing the product on multiple computers in your network.

What next?

  • If you want to use your own certificate instead of using the default SSL certificate that TrueSight Vulnerability Management provides, see Adding a trusted certificate .
  • BMC releases periodic product updates through service packs and patches. Check the Release notes and notices section for the latest product updates and apply the ones relevant to your environment.
Was this page helpful? Yes No Submitting... Thank you