TrueSight Automation Console


Integrating TrueSight Network Automation with TrueSight Automation Console allows you to analyze and remediate network vulnerabilities. Using TrueSight Automation Console, you can:

  • Import scan files that survey a computing environment, including its network infrastructure
  • Map network devices detected in scans to the devices managed in TrueSight Network Automation
  • Map vulnerabilities in the network infrastructure to the rules for which corrective actions and grammars have been defined in TrueSight Network Automation
  • Remediate network vulnerabilities by modifying network rules
  • View results of remediation actions for network infrastructure

When you import a vulnerability scan file in TrueSight Automation Console, the assets in the file are either automatically mapped to the devices (endpoints) in TrueSight Network Automation (endpoint manager) or you can map them later. The vulnerabilities also are mapped to the rules (remediation content) automatically or manually. For vulnerabilities that are mapped to both an endpoint and rules, you can create an operation to remediate them. For integrating with TrueSight Network Automation, an administrator must have configured the TrueSight Network Automation connector. 

For more information about the integration, see TrueSight Automation Console documentation. For compatible version of TrueSight Automation Console with TrueSight Network Automation, see Compatibility-matrix.


 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*

TrueSight Network Automation 23.2