Business rules installed with Vulnerability Response Vulnerability Response adds the following business rules. Business rule Table Description Process Vulnerability Attachments Vulnerability Data Source Import Queue Entry[sn_vul_ds_import_q_entry] Processes the attachment queue. Populate job script from integration Vulnerability Integration[sn_vul_integration] Updates the script that runs when the chosen processors change. Handle ignore flag Vulnerable Item [sn_vul_vulnerable_item] Updates the active flag on the record when "ignore" is changed. Prevent non-security roles updating Common Weakness Enumeration[sn_vul_cwe] Prevents users without secure record access from updating the record. Prevent non-security roles reading Common Weakness Enumeration[sn_vul_cwe] Prevents users without secure record access from reading the record. Update Match information Vulnerable Software [sn_vul_software] Updates the auto-match fields when the discovery model is set manually. Update vulnerable items Software Installation [cmdb_sam_sw_install] If a vulnerable item exists for an install, the vulnerable item will be updated with new discovered information. Check ignore expiration Vulnerable Item [sn_vul_vulnerable_item] Checks if the time limit to ignore a vulnerable item has expired. Determine vulnerable items Vulnerable Software [sn_vul_software] Examine the software installation table and inserts a vulnerable item for each configuration item found to have an instance of the vulnerable software. Insert vulnerable item Software Installation [cmdb_sam_sw_install] If the software installation has a discovery model that matches a software model with a known vulnerability, a vulnerable item is inserted for the configuration item. Update short description Vulnerable Item [sn_vul_vulnerable_item] Generates a short description from the vulnerability selected. Determine CI from Network Details Vulnerable Item [sn_vul_vulnerable_item] Attempts to set the configuration item on the record given network details such as IP address.