Use cases
The following topics provide examples of how to use TrueSight Vulnerability Management to manage vulnerabilities.
Topic | Description |
---|---|
Explains how to map server assets and vulnerabilities detected in a vulnerability scan to the servers and remediation content you are managing with TrueSight Server Automation. | |
Explains how to map network assets and vulnerabilities detected in a vulnerability scan to the network devices and rules you are managing with TrueSight Network Automation. | |
Explains how to use TrueSight Server Automation to perform remediation operations for server vulnerabilities detected in a vulnerability scan. This topic continues the process of integrating server scan results into TrueSight Vulnerability Management, begun in a previous walkthrough. | |
Explains how to use TrueSight Network Automation to perform remediation operations for network device vulnerabilities detected in a vulnerability scan. This topic continues the process of integrating network scan results into TrueSight Vulnerability Management, begun in a previous walkthrough . | |
Explains how to use SCCM to perform remediation operations for server vulnerabilities detected in a vulnerability scan. This topic continues the process of integrating server scan results into TrueSight Vulnerability Management , begun in a previous walkthrough. | |
Explains how to integrate TrueSight Vulnerability Management with BMC Discovery to enable blind spot detection and filtering of vulnerabilities based on applications. | |
Explains how to import tags into TrueSight Vulnerability Management to enrich asset data and then use those tags to limit the assets that a Remediation operation can target. |