Important This documentation space contains information about the SaaS version of Automation Console. If you are using the on-premises version of Automation Console, see TrueSight Automation Console 24.3

User interface fundamentals


To access BMC Helix Automation Console by using BMC Helix Portal

Before you begin

Configure TrueSight Server Automation to use BMC Helix Single Sign-On (HSSO). For more information, see Configuring BMC Helix Single Sign-on for BMC Helix Automation Console.

  1. From a supported browser, enter the customer tenant URL to access the console.
  2. Enter valid BMC Helix Single Sign-On credentials. 
  3. Click Login to access the BMC Helix Portal.
  4. Click on the BMC Helix Automation Console tile.
  5. In the Select EndPoint dialog box, select the required endpoint to access BMC Helix Automation Console.
    BHAC endpoints_253.png
    The following endpoints are available to access Automation Console.

    Helix endpoint

    TSNA endpoint

    TSSA endpoint

    The Helix endpoint is not associated with any endpoint manager. It is a SaaS based solution for vulnerability management.

    The TSNA endpoint is associated with the TrueSight Network Automation endpoint manager.

    The TSSA endpoint is associated with the TrueSight Server Automation endpoint manager.

Overview of the Automation Console user interface

The BMC Helix Automation Console offers role-based access to the application. The BMC Helix Automation Console user interface displays the following pages according to the selected endpoint:

TSNA endpoint

Dashboard
TSNA_Vuln dashb_253.png

The Vulnerability Dashboard provides a holistic view of the vulnerabilities identified on devices by the scanner connectors. The widgets on the dashboard show the following metrics:

  • The number of mapped versus unmapped vulnerabilities
  • The vulnerability risk distribution by service level agreements
  • Remediation stages
  • The overall risk distribution
  • A 13-week trend graph for the number of open versus resolved vulnerabilities
  • Top 10 vulnerabilities
  • Top 10 risk owners

Assets

The Managed Assets page displays all available devices.

TSNA_managed assets_253.png

The Scanned Assets page displays the network devices listed in the imported scan files.

TSNA_scanned assets_253.png

Risks

TSNA_risks page_253.png

The vulnerabilities from the scan file appear on the Risks > Vulnerabilities page, which contains information such as the vulnerability name, CVE IDs, severity, status, remediation, and impacted assets against each vulnerability. If you expand a vulnerability, additional details for each asset are displayed. 

Operations

TSNA_operations page_253.png

The Operations page shows a list of operations, which perform remediation actions for resolving vulnerabilities on the specified assets. 

Manage

TSNA_manage page_253.png

To manage risks, you start with importing a scan file in BMC Helix Automation Console. The Manage > Import page shows the list of scan files imported in the application. BMC Helix Automation Console support scanning tools such as Nessus, Qualys, and Rapid7. 

Configuration

Administrators use the Configuration menu to perform configuration activities such as adding and updating connectors, defining Service Level Agreements (SLAs), and adding security groups to determine access to the Automation Console. 

TSNA_config_connect_253.png

TSNA_config_sla_253.png

TSNA_config_sec groups_253.png

TSSA endpoint

Dashboard

  • Patch Dashboard: This dashboard provides graphical information about missing patches on assets in your environment.
    TSSA_Patch dashboard_253.png
    The widgets on the dashboard show the following metrics:
    • Patch compliance
    • Patch remediation trend
    • Missing patches by stage
    • Impacted assets by risk score and Service Level Agreements
    • Top 10 missing patches
    • Top 10 business services at risk
    • Top 10 risk owners
  • Vulnerability Dashboard: This dashboard provides information about the vulnerabilities identified on the assets by the scanner connectors.
    TSSA_Vuln dashboard_253.png
    The widgets on the dashboard show the following metrics:
    • Mapped and actionable vulnerabilities
    • Risk and SLA distribution by assets and vulnerabilities
    • Remediation trends
    • Top 10 identified vulnerabilities
    • Top 10 business services at risk
    • Top 10 risk owners
  • Compliance Dashboard: This dashboard provides graphical information about missing patches on assets in your environment.
    TSSA_Compliance dashboard_253.png
    This dashboard displays the following metrics:
    • Compliance posture (percentage of compliant, non-compliant, and indeterminate assets)
    • Non-compliant assets by SLA, stage, and risk score
    • Top 10 compliance scan policies
    • Top 10 business services or applications with the maximum number of non-compliant assets and evaluations. 

Assets

The Managed Assets page displays the list of assets with missing patches.

TSSA_managed assets_253.png

The Scanned Assets page lists the assets that are generated in the vulnerability scans performed by scanner connectors.

TSSA_scanned assets_253.png

The Discovered Assets page lists the assets discovered by integrating with BMC Discovery.

TSSA_discov assets_253.png

Risks

TSSA_Risks_missing patch_253.png

TSSA_Risks_vulns_253.png

TSSA_Risks_compliance_253.png

The Risks page displays the following metrics:

  • The number of missing patches and the impacted assets for each missing patch
  • The number of vulnerabilities found by the scanner connectors
  • The number of compliance violations on the scanned assets

Operations

The Operations page displays a list of operations, which perform actions to install missing patches or remediate vulnerabilities on assets.

TSSA_Operations_253.png

You can also create operation templates with predefined options that you can use to create similar type of operations.

Manage

The Manage Patch Policies page displays a list of patch policies, which scan the assets in your environment to identify missing patches.

TSSA_Manage_Patch_253.png

The Import page displays a list of imported scan files.

TSSA_Manage_Import_253.png

On the Manage page, you can create exceptions for vulnerabilities. You can also create compliance policy scans to scan assets for non-compliant rules. 

TSSA_Manage_Compliance_253.png

Configuration

Administrators use the Configuration menu to perform the following configuration activities:

  • Adding and updating connectors
    TSSA_Config_Connectors_253.png
  • Adding catalogs
    TSSA_Config_Catalog_253.png
  • Defining Service Level Agreements (SLAs)
    TSSA_Config_SLA_253.png
  • Adding security groups to determine access to the Automation Console. 
    TSSA_Config_SecGrp_253.png

Important

If you access the Automation Console in the Helix endpoint, the user interface displays the following pages:

  • The Dashboard page contains only the Vulnerability Dashboard where you can view the vulnerabilities on the assets identified by the scanner connectors.
  • The Assets page shows a list of assets that are imported from a vulnerability scan, and assets discovered by integrating with BMC Discovery. 
  • The Risks page shows the vulnerabilities identified by the scanner connectors. You can only close vulnerabilities and update notes from this page.
  • The Manage page shows a list of scan files imported in the product. It enables you to create exceptions for vulnerabilities.
  • Administrators use the Configuration menu to perform configuration activities such as defining Service Level Agreements (SLAs) and adding security groups to determine access to the Automation Console. 
  • The Operations page is displayed, however you are unable to create operations.

Common Automation Console UI elements

Use this section to know more about the common user interface elements. 

BHAC profile_253.png

  • Click the help icon Help icon.png to launch the context-sensitive help topic.
  • Click User profile menu > About.gifAbout to view the product name and version. 
  • Click User profile menu > Activity logs.gifActivity Logs to view details of user activities in the Automation Console.
  • Click Sign out to log out of the Automation Console. 

To change the security group

The security group you belong to appears in the top-right corner of the Automation Console UI. If you are assigned multiple roles in TrueSight Server Automation, you can change the security group to view the Automation Console according to your role. 

  1. On the top-right corner, click User profile menu and then click Change Security Group.
  2. Select a group, and click Select
    You can view data according to the selected security group. 

To add a new security group, see Working with security groups.

To switch the Endpoint

According to your role, you can switch the endpoint to access the Automation Console. 

  1. On the top-right corner, click User profile menu and then click Switch Endpoint.
  2. Select an endpoint, and click Select
    Switch endpoints_253.png
    You now view data according to the selected endpoint.
     

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*