TrueSight Vulnerability Management introduces some terminology and working practices that may be unfamiliar. Key items that you will see referenced in this documentation include:
A mapped vulnerability on a mapped asset. During the process of using TrueSight Vulnerability Management, you map vulnerabilities to remediation content and map assets to managed endpoints. When that mapping is complete, a list of actionable vulnerabilities appears on the Operator Dashboard. Actionable vulnerabilities are the vulnerabilities that you can correct by running Remediation operations.
An object that is scanned by a vulnerability management system. Often, assets are servers. When using the vulnerability management process, you can map assets detected in vulnerability scans to servers managed by TrueSight Server Automation or SCCM.
A connection to an endpoint manager or some other optional product that provides additional capabilities for TrueSight Vulnerability Management.This connector program establishes communication between TrueSight Vulnerability Management and the other product.
A set of objects that TrueSight Vulnerability Management can use to perform a task (for example, to deploy a patch or BLPackage in TrueSight Server Automation or a collection of software updates in SCCM).
An in-memory, information-retrieval system based on Apache Lucene technology. The Elasticsearch server allows for rapid text searches that apply to many areas of the TrueSight Vulnerability Management system, including vulnerability data and searches for managed servers.
A Deploy job set up in TrueSight Server Automation that can be used as the basis for scheduling Remediation operations.
The administrator responsible for day-to-day configuration of TrueSight Vulnerability Management. During the set up process, an administrative role for the endpoint manager is specified. If you belong to that role, you are granted endpoint administrator privileges.
The underlying product that runs in conjunction with TrueSight Vulnerability Management, such as TrueSight Server Automation or SCCM.
Objects managed by the endpoint manager. In TrueSight Server Automation and SCCM, endpoints are servers. In TrueSight Network Automation endpoints are network devices.
Equivalent to a job in TrueSight Server Automation or TrueSight Network Automation.
A collection of patches assembled in the Depot in TrueSight Server Automation. Patch catalogs are used to analyze and remediate missing or outdated patches.
A grouping mechanism for users based on groups defined within the endpoint manager. Users belonging to those groups inherit the same permissions in TrueSight Vulnerability Management. Security groups are based on:
- Roles defined in TrueSight Server Automation.
- Realms defined in TrueSight Network Automation
- Security roles defined in SCCM that are associated with Active Directory groups
Endpoints that you want to manage or affect during an operation. In TrueSight Server Automation or SCCM, targets are servers. In TrueSight Network Automation, endpoints are network devices.
A susceptibility or flaw that may allow unauthorized access to a system, such as a software or networking system. Some organizations such as Qualys, Nessus, and Rapid7 develop vulnerability management systems that allow you to scan computer systems to identify vulnerabilities.