Use cases
The following topics provide examples of how to use TrueSight Vulnerability Management to manage vulnerabilities.
Topic | Description |
---|---|
Mapping vulnerability scan results to a server environment | Explains how to map server assets and vulnerabilities detected in a vulnerability scan to the servers and remediation content you are managing with TrueSight Server Automation. |
Mapping vulnerability scan results to a network environment | Explains how to map network assets and vulnerabilities detected in a vulnerability scan to the network devices and rules you are managing with TrueSight Network Automation. |
Using TrueSight Server Automation to remediate server issues detected in a vulnerability scan | Explains how to use TrueSight Server Automation to perform remediation operations for server vulnerabilities detected in a vulnerability scan. This topic continues the process of integrating server scan results into TrueSight Vulnerability Management, begun in a previous walkthrough. |
Using TrueSight Network Automation to remediate network issues detected in a vulnerability scan | Explains how to use TrueSight Network Automation to perform remediation operations for network device vulnerabilities detected in a vulnerability scan. This topic continues the process of integrating network scan results into TrueSight Vulnerability Management, begun in a previous walkthrough . |
Using SCCM to remediate server issues detected in a vulnerability scan | Explains how to use SCCM to perform remediation operations for server vulnerabilities detected in a vulnerability scan. This topic continues the process of integrating server scan results into TrueSight Vulnerability Management, begun in a previous walkthrough. |
Using BMC Discovery to detect blind spots and filter for applications | Explains how to integrate TrueSight Vulnerability Management with BMC Discovery to enable blind spot detection and filtering of vulnerabilities based on applications. |
Using tags to filter remediation targets | Explains how to import tags into TrueSight Vulnerability Management to enrich asset data and then use those tags to limit the assets that a Remediation operation can target. |
Comments
Log in or register to comment.