Find components installed with your application

Several types of components are installed with Security Operations applications. Activating a Security Operations plugin adds or modifies several tables, user roles, properties, script includes, business rules, and other components.

Before you begin

Role required: admin
Note: If application administration is active, you need both the admin and application admin roles (for example, sn_vuln.admin).

Procedure

  1. Ensure your plugin is activated.
  2. In the filter navigator, type sys_metadata.list and press Enter.
    You are taken to the Application Files page.
  3. Click the gear icon to personalize the form to add the Package column.
  4. In the Search field, choose Display name and enter your plugin name.
    • Security Incident
    • Vulnerability
    • Threat Core
    • Configuration Compliance
  5. Right-click one of the items in the Package column and select Show Matching.
  6. In the Class column heading, click the hamburger icon and select Group by Class.
  7. Select the class of information you want to view. For example, click Class:Table to view all tables installed with the plugin.
    Example Vulnerability Response installed components