Unsupported content This version of the product has reached end of support. The documentation is available for your convenience. However, you must be logged in to access it. You will not be able to leave comments.

Demonstrating the Threat Director process


The following topics provide examples of how to use Threat Director to manage server and network vulnerabilities. 

Topic

Description

Explains how to set up a connection to a scanning utility such as Tenable SecurityCenter so you can automatically import scan results on a regular basis.

Explains how to map server assets and vulnerabilities detected in a vulnerability scan to the servers and remediation content you are managing with BMC BladeLogic Server Automation.

Explains how to generate remediation operations for server vulnerabilities detected in a vulnerability scan. This topic continues the process of integrating server scan results into Threat Director, begun in the previous procedure.

Explains how to map networking assets and vulnerabilities detected in a vulnerability scan to the network devices you are managing with BMC Network Automation (BNA) and the corrective actions set up in BNA.

Explains how to generate a remediation operation that corrects networking issues detected in a vulnerability scan. This topic continues the process of integrating network scan results into Threat Director, begun in the previous procedure.

Explains how to integrate Threat Director with BMC Discovery to enable blind spot detection and filtering of vulnerabilities based on applications.

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*