Thank you for your feedback.
Form temporarily unavailable. Please try again or contact to submit your comments.

Log in to subscribe to topics and get notified when content changes.

Vulnerability Response configuration using the Setup Assistant

Setup Assistant walks you through setting up Vulnerability Response and a third-party integration for your environment. Setup Assistant provides almost everything you need to install and set up your environment to use Vulnerability Response.

Using Setup Assistant requires two different roles: admin and sn_vul.admin.

System administration tasks

The first section of Setup Assistant contains tasks performed by the ServiceNow admin. A list of users and integrations should be obtained from the Vulnerability Manager prior to beginning these tasks.

  • Assign the role of sn_vul.admin to users or groups.

    Assign the sn_vul.admin role for Vulnerability Response administration and configuration including vulnerability integrations, vulnerability group rules, calculators, and time-to-remediate rules.

    • Assign the sn_vul_vulnerability_write role for the creation and update of vulnerability groups and vulnerable items.
    Note: All other users automatically receive Write access only to vulnerability groups that are assigned to them.

    • Assign the sn_vul_vulnerability_read role to view vulnerability groups, vulnerable items, and other vulnerability information.


    Users with the itil role are automatically granted the sn_vul.remediation_owner role allowing them to see vulnerability groups and vulnerable items assigned to them, vulnerability entries, and, solutions in the Vulnerability Response application on their instance and in the ServiceNow Agent application. No additional assignment is needed.

  • Install third-party integrations such as Qualys Vulnerability Integration.
    Note: Not all applications are available within Setup Assistant. See Vulnerability Response setup for more information on applications that are supported by Vulnerability Response.

Vulnerability administration tasks

  • Configure third-party vulnerability integrations.
    • For your convenience, once installed, the Qualys Vulnerability Integration is active within Setup Assistant. The Qualys Vulnerability Integration requires your Qualys Cloud Platform credentials to configure it.

      See Preparing for the Qualys Vulnerability Integration for more information on considerations before you configure the Qualys Vulnerability Integration.

      If you have upgraded from an early version of Vulnerability Response, containing a Qualys Vulnerability Integration, that version, with its configuration settings preserved, is available instead.

      Qualys Asset Tags are stored in the Host Tags module under the Qualys Vulnerability Integration.

      If multi-source integration is supported by a third-party integration, such as the Qualys Vulnerability Integration, you can have multiple deployments of the same third-party integration.

      You can add another Qualys Vulnerability Integration integration to Vulnerability Response using Setup Assistant.

      The settings from your original third-party integration are used as a template for the settings of each new integration.
      Note: If you delete the original vulnerability integration, you have to select another integration to use as your template. See Reassign the template integration for more information. Consider disabling the integration instead of deleting it. Integrations created from disabled templates are disabled by default.

      Data from each third-party integration is uniquely identified and available in a single instance of Vulnerability Response.

  • Edit third-party vulnerability solutions.
    • Once the Vulnerability Solution Management application is installed, the Vulnerability Solution Management feature is active within Setup Assistant and the Microsoft Security Response Center Solution Integration (MSRC) is available.
      The Microsoft Security Response Center Solution Integration requires an API key and URL from the Microsoft Security Response Center to configure it.
      To obtain the key:
      Note: You must have a Microsoft ID from a,, or email account, a phone number registered with Microsoft, or a Skype login.
      • Go to
      • Login.
      • Click the Generate API Key button.
      • Copy the key and save as input to Setup Assistant.

        The URL in Setup Assistant for MSRC is

      The Microsoft Security Response Center Solution Integration admin role is inherited when you are assigned an administrative role in the Vulnerability Response application.

      The Microsoft Security Response Center Solution Integration is the only solution application available in the Vulnerability Solution Management feature. See Vulnerability Solution Management for more information.

  • Create:

    See Understanding the Vulnerability Response application for more information on using Vulnerability Response to remediate vulnerabilities.

See Additional Vulnerability Response setup tasks for more information on setup tasks not included in Setup Assistant.