Installing the Vulnerability Management module


This topic provides the instructions to install content (adapter and modules) required for the Vulnerability Management module. 

Before you begin

Before installing content, do these: 

  • Download the TrueSight Orchestration Content files.
    See Downloading-the-installation-files
  • Install a compatible TrueSight Orchestration Platform.
  • Ensure that BMC Helix Automation Console (SaaS) or TrueSight Automation Console (on-premises) environment version 20.02 or 20.08.  

Installing content

To install the Vulnerability Management module, do these steps: 

  1. Navigate to the folder where you have downloaded the installation files and start the installation program.
    • Windows: setup.cmd
    • Linux or Solaris: setup.sh
  2. On the Welcome to TrueSight Orchestration panel, review the information and click Next.
  3. On the license agreement panel, select I agree to the terms of the license agreement; then click Next.
  4. On the Directory Selection panel, accept the default location, or click Browse to select a different location; then click Next.
  5. On the Repository Communications Settings panel, enter the repository settings, and click Next:

    • Web Server Protocol: Select https
    • Host Name or IP Address: Enter the fully qualified domain name of the repository.
    • Web Server Port Number
    • RepositoryUser: Enter the user name of the account created in BMC Remedy Single Sign-On that you use to log on to the repository.

      Warning

      Do not enter the default Remedy Single Sign-on account amadmin in the RepositoryUser field.

    • Repository Password: Enter the password that matches the specified user account.
  6. On the Installation type panel, select BSM  Solutions and click Next.

    Note

    BMC recommends that you choose this path only if you have the required licenses to install the solution. You can install the solution by using the Custom feature set too.

  7. On the Solution feature selection panel, select the Vulnerability Management solution and the click Next
  8. On the Adapters pane, the adapters to be installed as part of the solution are pre-selected. Click Next.
  9. On the Modules pane, the modules to be installed as part of the solution are pre-selected. Click Next.
  10. On the Installation preview panel, review the features to be installed, and then click Install.
  11. When the installation finishes, click Done.

TrueSight Orchestration artifacts

When you install the runbook, the following modules and adapters are installed.

Adapters:

  • ro-adapter-rest
  • AutoPilot-AD_Utilities
  • AutoPilot-OA-File_Utilities
  • AutoPilot-OA-Common_Utilities
  • ro-adapter-command-line

Modules:

  • BMC-SA-Vulnerability_Scan_Configuration
  • BMC-SA-Vulnerability_Scan_Import

Schedule in the module

A Start Tenable scan schedule is automatically created when you install the Vulnerability Management module (included in the BMC-SA-Vulnerability_Scan_Import module). By default, the end-to-end process runs according to the default date, time, time zone, and frequency. You can make changes to the schedule based on your requirements. 

VM module_schedule_annotated.png

For more information about working with schedules, see Managing-processes-and-schedules in the TrueSight Orchestration Platform documentation.  

Where to go from here

After successfully installing the module, you can now configure the adapters and modules to enable the use case. For details, see Configuring-content-for-the-Vulnerability-Management-module

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*