Using Vulnerability Manager
This topic introduces the tasks you must perform when you use the portal to import vulnerability scan reports from a vulnerability management system, such as Qualys, and then use those reports to correct the vulnerabilities. To facilitate this process, BladeLogic Portal provides a capability out of the box called Vulnerability Manager.
Threat Director, a licensed add-on to BladeLogic Portal, gives you the same capabilities as Vulnerability Manager along with additional analytic tools used to help align the actions of security and operations personnel who must maintain the integrity of computing environments.
This topic contains the following sections:
Prerequisites
- BladeLogic Portal 2.2 or later must be installed.
- Although some capabilities of BladeLogic Portal allow connections to multiple sites, Vulnerability Manager only supports a connection to a single BMC Server Automation site.
Vulnerability Manager process
This section breaks down the Vulnerability Manager process into a series of steps, as described in the following table.
Task | Related documentation |
---|---|
Import a vulnerability scan report file in XML format that was generated by a vulnerability management system. During import, assets (that is, servers) identified in the scan report are automatically mapped to servers managed in your BMC BladeLogic Server Automation system. | |
If some assets were not automatically mapped during import, use the Assets page to manually map assets to servers managed in your BMC BladeLogic Server Automation system. Note: This page also lets you enrolls mapped servers in Threat Director. | |
Map vulnerabilities identified in the scan report to remediation content stored in your BladeLogic system. | |
Use the SecOps Dashboard to view summary and detailed information about servers and vulnerabilities. Use filters to restrict the information displayed on the dashboard, and then launch the Remediation operation wizard. | |
Select the remediation actions to be performed and configure the operations that are going to run to correct vulnerabilities. |