Investigating vulnerabilities
To investigate vulnerabilities for an impacted service
- On the BMC Helix AIOps console, click Risks and then click Vulnerabilities.
- From the Top Impacted Services table, click a service to open the Service Details page and view the following details:
- Risk Score
- Number of critical vulnerabilities
- Impacted assets
- In the vulnerabilities section, view the following information:
- Vulnerability name
- CVE ID
- Severity
- CVSS Score: The CVSS V3 score is assigned by the NIST NVD.
- Impacted assets
- Continue with To investigate a vulnerability.
To investigate a vulnerability
- On the BMC Helix AIOps console, click Risks and then click Vulnerabilities.
- From the Top Vulnerabilities table, click a vulnerability to open the Vulnerability Details page and view the following details:
- If BMC HelixGPT is enabled:
- A human-readable AI-generated summary of the vulnerability.
- Best action recommendations, a list of suggested steps that can be used to remediate the vulnerability. Additionally, a BMC HelixGPT-driven wizard offers a remediation automation code to accomplish individual steps on different platforms such as Ansible or TrueSight Server Automation.
- Severity
- CVE-ID
- CVSS Score: The CVSS V3 score is assigned by the NIST NVD.
- Impacted services
- Impacted assets
- If BMC HelixGPT is enabled:
- In the impacted assets section, view the following information
- Asset name
- Operating system
- Remediation owner
- SLA
- Continue with To view best action recommendations.
To view best action recommendations for remediation
Best action recommendations are available if BMC HelixGPT is enabled. To enable BMC HelixGPT, contact BMC Support.
- On the Vulnerability details page, review the AI-generated summary (short problem statement, brief summary, and detailed problem context) of the selected vulnerability.
- The Select OS field is populated with the operating systems linked to the affected assets. If multiple operating systems are listed in the field, select the appropriate operating system and version, and click Generate remediation.
The recommended steps to remediate the vulnerability are displayed. - (If available) Click Code wizard.
- BMC HelixGPT generates a code that can be used to run the recommended steps.
For some manual steps, the Code wizard option is not available. - Select your preferred remediation target, such as Ansible or Powershell, and the code is displayed based on your selection.
- BMC HelixGPT generates a code that can be used to run the recommended steps.
- Click Copy to Clipboard and use the code in your existing script to run the recommended remediation steps.
- Close the code wizard.
Click Create change request to open a Change Request form in BMC Helix IT Service Management. Enter the relevant details and submit the change request for approval. For more information, see Creating a change request.
Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*