Unsupported content This version of the product has reached end of support. The documentation is available for your convenience. However, you must be logged in to access it. You will not be able to leave comments.

Use cases


The following topics provide examples of how to use TrueSight Vulnerability Management to manage vulnerabilities. 

Topic

Description

Explains how to map server assets and vulnerabilities detected in a vulnerability scan to the servers and remediation content you are managing with TrueSight Server Automation.

Explains how to map network assets and vulnerabilities detected in a vulnerability scan to the network devices and rules you are managing with TrueSight Network Automation.

Explains how to use TrueSight Server Automation to perform remediation operations for server vulnerabilities detected in a vulnerability scan. This topic continues the process of integrating server scan results into TrueSight Vulnerability Management, begun in a previous walkthrough.

Explains how to use TrueSight Network Automation to perform remediation operations for network device vulnerabilities detected in a vulnerability scan. This topic continues the process of integrating network scan results into TrueSight Vulnerability Management, begun in a previous walkthrough .

Explains how to use SCCM to perform remediation operations for server vulnerabilities detected in a vulnerability scan. This topic continues the process of integrating server scan results into 

TrueSight Vulnerability Management

, begun in a previous walkthrough.

Explains how to integrate TrueSight Vulnerability Management with BMC Discovery to enable blind spot detection and filtering of vulnerabilities based on applications.

Explains how to import tags into TrueSight Vulnerability Management to enrich asset data and then use those tags to limit the assets that a Remediation operation can target.

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*