Unsupported content This version of the product has reached end of support. The documentation is available for your convenience. However, you must be logged in to access it. You will not be able to leave comments.

Using the portal for common tasks


The following topics provide examples of how to use BladeLogic Portal to perform common tasks. 

Topic

Description

Explains how to define most types of operation in BladeLogic Portal.

Explains how to provision a VM on a VMware vCenter server by running a Provisioning operation in BladeLogic Portal.

Explains how to define a Patch Analysis operation that examines the patch configuration of Linux servers, identifies outdated patches, corrects those discrepancies, and runs the Patch Analysis operation again to ensure patch configurations are correct.

Explains how to run a Compliance operation on a server to determine whether it adheres to payment card industry (PCI) standards. The example shows how to correct and set exceptions for compliance failures.

Explains how to run a Compliance operation to determine how well servers adhere to the Security Content Automation Protocol (SCAP). 

Explains how to use the portal's Inventory feature to view log files and other types of text files.

Explains how to map the assets and vulnerabilities detected with a vulnerability scan tool (such as Qualys or Nessus) to the servers you are managing with BladeLogic and the remediation content that has been set up there. This mapping process is a prerequisite before you can use the portal to correct any vulnerabilities revealed in the scan.

When you complete this walkthrough, continue the remediation process, as described in Walkthrough-Remediating-problems-detected-in-a-vulnerability-scan.

Explains how to correct vulnerabilities detected in a vulnerability scan performed with a tool such as Qualys or Nessus. The process consists of displaying vulnerabilities in a dashboard, refining the number of vulnerabilities displayed there, and launching a wizard that configures operations to correct vulnerabilities.

Before you can perform this walkthrough, you must import a vulnerability scan report and map its information to servers and remediation content in your BladeLogic system. That process is described in Walkthrough-Mapping-vulnerability-scan-results-to-your-environment.

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*