Set up Vulnerability Response Before Vulnerability Response can be used, you must activate the plugin and configure how you want the application to function. Other types of information be can be set up to manage vulnerabilities within the application. Email notifications Email templates Integrations SLAs Activate Vulnerability ResponseActivate the Vulnerability Response plugin and configure it based on the needs of your organization. This plugin is available as a separate subscription.NVD and CWE data importWith Vulnerability Response, you can compare vulnerability data to CIs and software identified in the Asset Management module. The vulnerability data can be imported from internal and external sources, such as the NVD. You can also use CWE records downloaded from the CWE database for reference when deciding whether to escalate a vulnerability.Vulnerability calculatorsVulnerability calculators are used to update record values when pre-defined conditions are met. The calculators are grouped based on the criteria used to determine how the records are updated. Vulnerability integration definitionsVulnerability integrations help enrich the vulnerability data on your instance by retrieving data from external systems and vendors. Vulnerability Response includes some integrations, including the Qualys Vulnerability Integration and Microsoft Security Bulletin Integration. You can add others as needed.Add users to the Vulnerability Response groupWhen the Request Review feature is used to ignore or close a vulnerable item without requiring a scan, the Vulnerability Response group is notified to approve or reject the request.Define Vulnerability Response email notificationsEmail notifications can be useful when NVD records are uploaded so that analysts are informed when new records have been imported. Creating an email notification involves specifying when to send it, who receives it, and what it contains.Define Vulnerability Response email templatesCreating an email notification involves specifying when to send it, who receives it, and what it contains.View a Vulnerability Response SLATo ensure that vulnerabilities are processed correctly, you can view a Service Level Agreement (SLA) for Vulnerability Response.