Managing security vulnerability importers


A security vulnerability importer defines a mechanism for converting security advisories, bulletins, or reports from various device vendors into security vulnerabilities to be stored in the security vulnerability database of Network Automation. After you define an importer, you can use it to import source files (security advisories, bulletins, or reports) from National Vulnerability Database (NVD) into Network Automation. You can use the imported files to create a compliance rule that detects vulnerable device operating systems.

The following topics describe the conversion mechanism and how to add, edit, and view security vulnerability importers:

Related topic

Managing-security-vulnerabilities

 

 

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*