Configuring content for the Vulnerability Management module


This section provides instructions to configure adapters and modules required for the Vulnerability Management use case. 

Configuring and enabling adapters

From the adapters available on the Grid Manager, configure and enable the following adapters: 

Configuring and activating modules

From the modules available on the Grid Manager, activate these modules: 

  • BMC-SA-Vulnerability_Scan_Configuration
  • BMC-SA-Vulnerability_Scan_Import
  • AutoPilot-AD_Utilities
  • AutoPilot-OA-File_Utilities
  • AutoPilot-OA-Common_Utilities

The active modules appear in the Activated on Grid list. 

Configuring BMC-SA-Vulnerability_Scan_Configuration module

You only configure the BMC-SA-Vulnerability_Scan_Configuration module. It stores the connection details and other configuration settings required for the use case. 

To configure the module, do this: 

  1. On the Grid Manager, click Manage > Modules, and click the BMC-SA-Vulnerability_Scan_Configuration module.
  2. Expand the configuration tree until you can navigate to the configuration item that you want to modify.
  3. Click the configuration item that you want to modify, edit the value, and click OK to save changes.
    The following table provides information about the configuration items and the default values:

    Module configuration group

    Module configuration items

    Required

    Default value

    General > BMC_TrueSight_Automation_Console > WebServiceConnectionDetails

    URL: Specifies the URL to access the BMC Helix Automation Console or TrueSight Automation Console application.

    Yes

    https://<hostname>:<port>

    UserName: Specifies the username with privileges to access and import scan files in Automation Console.

    Yes

    USERNAME

    Password: Specifies the password in a base64 format (for 20.02), or a plain text (for 20.08) format.

    Yes

    -

    Tenant: Specifies the tenant name for the Automation Console application.

    No

    defaulttenant

    Site: Specifies the site name name for the Automation Console application.

    No

    TSSA

    AuthenticationMethod: Specifies the authentication method used by the specified user to log on to Automation Console.

    No

    SRP

    Role: Specifies the name of the group to which the user belongs.

    No

    BLAdmins

    General > BMC_TrueSight_Automation_Console >Version

    Specifies the TrueSight Automation Console or BMC Helix Automation Console version. Valid values: v20.02, v20.08

    No

    v20.08

    General > BMC_Vulnerability_Scanners > Tenable > WebServiceConnectionDetails

    URL: Specifies the URL to log on to the Tenable application.

    Yes

    https://<TenableHostname>

    UserName: Specifies the username required to access the Tenable application.

    Yes

    USERNAME

    Password: Specifies the password that matches the username.

    Yes


    General > BMC_TrueSight_Orchestration > Adapters

    RESTAdapter: Specifies the name of the adapter as configured on the Grid Manager.

    Yes

    RESTAdapter


    CommandLineAdapter: Specifies the name of the adapter as configured on the Grid Manager

    Yes

    CommandLineAdapter

    General > BMC_TrueSight_Orchestration > Defaults

    DefaultVendor: Specifies the name of the vulnerability assessment tool.

    Yes

    Tenable



    DownloadDirectory: Specifies the default location for the scan files downloaded from the Tenable server.

    Yes

    C:\Users\Administrator\AppData\Local\Temp\TSAC\ScanFiles

    StartTimeInDays: Specifies the number of days for which you want to retrieve scan files from Tenable.

    For example, if you specify 10, scan files for the last 10 days from the current date are downloaded and imported into Automation Console.

    Yes

    1

  4. After successfully configuring the module, click the Modules tab and from the Modules in Repository list, select the module and click Activate
    Module with the updated changes is successfully activated on the grid. 

Where to go from here

Now that you have successfully configured the adapters and modules, you can now understand how the workflows in the module process to execute the use case. See Workflows-in-the-Vulnerability-Management-module

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*