Thank you for your feedback.
Form temporarily unavailable. Please try again or contact docfeedback@servicenow.com to submit your comments.
Versions
  • London
  • Kingston
  • Jakarta
  • Istanbul
  • Helsinki
  • Geneva
  • Store
Close

Rules for identifying and creating CIs

Rules for identifying and creating CIs

CI identifier rules are used to look up a CI in the CMDB with matching information from a third-party integration. These rules define what fields contain matching data, and the order of precedence in which they are evaluated. Matches with the lowest Order value are evaluated first.

The value of CI identifier rules lies in providing results that are linked to configuration items that exist within the CMDB. CMBD records often have augmented information about related services, owner, contents, support groups, and other vital information.

CI identifier rules are used by Vulnerability integrations, to define how imported data locates the closest matching existing CI, where possible.

The CI identifier rules also define the order in which CI classes and fields on the CI table are compared to the imported data.

For example, a set of CI identifier rules could be defined to search all CIs for any matching Qualys Host IDs, as follows.
  • If not match is found, then it searches Computer CIs to check the fully qualified domain name.
  • If no match is found, then it searches the IP address on the CI.
  • Finally, if no match is found, it searches within all Hardware CIs for a match.

The business rule, Set Value For CI ID Field, as well as some integration transform maps for vulnerability import, use the CI identifier rules to determine how to fill in the configuration item field in a vulnerable item. This rule is triggered when the IP address and other information are provided, but the CI field is empty.

Several CI columns are supported in the default identifier rule shipped with the base system.
  • name
  • fqdn
  • mac_address
  • dns
  • ip_address
When the Qualys Cloud Platform integration is installed, the following rules are available:
  • sn_vul_qualys_host_id
  • sn_vul_qualys_id