User interface fundamentals


To access BMC Helix Automation Console by using the BMC Helix Portal

Before you begin

Configure TrueSight Server Automation to use BMC Helix Single Sign-On (HSSO). For more information, see Configuring-BMC-Helix-Single-Sign-on-for-BMC-Helix-Automation-Console.

  1. From a supported browser, enter the customer tenant URL to access the console.
  2. Enter valid BMC Helix Single Sign-On credentials. 
  3. Click Login to access the BMC Helix Portal.
  4. Click on the BMC Helix Automation Console tile.
  5. In the Select EndPoint dialog box, select the required endpoint to access Automation Console.
    Select endpoint.gif
    The following endpoints are available to access Automation Console.

    Helix endpoint

    TSSA endpoint

    The Helix endpoint is not associated with any endpoint manager. It is a SaaS based solution for vulnerability management.

    The TSSA endpoint is associated with the TrueSight Server Automation endpoint manager.

Overview of the Automation Console user interface

The Automation Console offers role-based access to the application. If you access the Automation Console in the TSSA endpoint, the user interface displays the following pages:

The Dashboard page contains a Patch Dashboard, which provides graphical information about missing patches on assets in your environment. Widgets on the dashboard show specific metrics around patch compliance, patch remediation trend, missing patches by stage, impacted assets by risk score and Service Level Agreements, top 10 missing patches, top 10 business services at risk, and top 10 risk owners. The Vulnerability Dashboard provides information about identified vulnerabilities on the assets imported from a scan file. Widgets on the dashboard show mapped and actionable vulnerabilities, risk and SLA distribution by assets and vulnerabilities, remediation trends, and top 10 identified vulnerabilities, top 10 business services at risk, and top 10 risk owners. The Compliance Dashboard shows information about the compliance posture (percentage of compliant, non-compliant, and indeterminate assets), non-compliant assets by SLA, stage, and risk score, top 10 compliance scan policies, and top 10 business services or applications with a maximum number of non-compliant assets and evaluations. 

The Assets page shows a list of assets with the missing patches. It also shows assets that are imported from a vulnerability scan, and assets discovered by integrating with BMC Discovery. 

The Risks page shows the list of missing patches and impacted assets for each missing patch. It shows the vulnerabilities imported from a scan. The Risks page also displays data about compliance violations on the assets. 

The Operations page shows a list of operations, which perform remediation actions to install missing patches or vulnerabilities on assets. On the Operations page, you can also create operation templates with predefined options. You can use these templates to create similar type of operations.

The Manage page shows a list of patch policies, which scan the assets in your environment to identify missing patches. It shows the list of scan files imported in the product. It enables you to create exceptions for vulnerabilities. You can also create compliance policy scans to scan assets for non-compliant rules. 

Administrators use the Configuration menu to perform configuration activities such as adding catalogs, defining Service Level Agreements (SLAs), and adding security groups to determine access to the Automation Console. 

Important

If you access the Automation Console in the Helix endpoint, the user interface displays the following pages:

  • The Dashboard page contains only the Vulnerability Dashboard where you can view the identified vulnerabilities on the assets imported from a scan file.
  • The Assets page shows a list of assets that are imported from a vulnerability scan, and assets discovered by integrating with BMC Discovery. 
  • The Risks page shows the vulnerabilities imported from a scan. You can only close vulnerabilities and update notes from this page.
  • The Manage page shows a list of scan files imported in the product. It enables you to create exceptions for vulnerabilities.
  • Administrators use the Configuration menu to perform configuration activities such as defining Service Level Agreements (SLAs) and adding security groups to determine access to the Automation Console. 
  • The Operations page is displayed, however you are unable to create operations.

Common Automation Console UI elements

Use this section to know more about the common user interface elements. 

HAC UI common.gif

  • Click the help icon Help icon.png to launch the context-sensitive help topic.
  • Click User profile menu > About.gifAbout to view the product name and version. 
  • Click User profile menu > Activity logs.gifActivity Logs to view details of user activities in the Automation Console.
  • Click Sign out to log out of the Automation Console. 

To change the security group

The security group that you belong to appears in the top-right corner of the Automation Console UI. If you are assigned multiple roles in TrueSight Server Automation, you can change the security group to view the Automation Console according to your role. 

  1. On the top-right corner, click User profile menu and then click Change Security Group.
  2. Select a group, and click Select
    You now view data according to the selected security group. 

To add a new security group, see Working-with-security-groups.

To switch the Endpoint

According to your role, you can switch the endpoint to access the Automation Console. 

  1. On the top-right corner, click User profile menu and then click Switch Endpoint.
  2. Select an endpoint, and click Select
    Switch endpoint.gif
    You now view data according to the selected endpoint. 

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*