12.0 of Qualys Vulnerability Integration for Security
Operations |
Certified for Orlando in the ServiceNow Store. Initiate
rescans in the Qualys product from your Now Platform® instance. Note the following information about
upgrades to v13.0 of Vulnerability Response and v12.0 of the Qualys Vulnerability Integration:
- A new integration, the Qualys Option Profile List Integration,
retrieves scan profiles from the Qualys product. With Option
Profiles, you can choose required scan settings when you initiate rescans in Qualys from your Now Platforminstance.
- Before you can initiate the enhanced rescans, you must complete the
configuration steps listed in Advanced Qualys
configurations and modifications.
- The auto scan for resolved vulnerable items is disabled by default. Enable the
scan from your integration instance with the scan_on_resolved system
property.
- New Host Import maps are added for Unclassed Hardware.
- Discovery source VR-Qualys is created and passed to IRE to create CIs.
|
12.0 of Rapid7 Vulnerability Integration for Security
Operations |
Certified for Orlando in the ServiceNow Store. New: The
Rapid7 Site integration API integration ingests Sites data from Rapid7 Insight
VM.
- Increased the password field length in the Rapid7 Configuration table to
accommodate a KMF change.
- Updated permissions for one of the client scripts to ensure proper
access.
|
10.5 of Shodan Exploit Integration for Security Operations |
Certified for Orlando in the ServiceNow Store. Fixed:
The KMF error by adding security modules. |
12.0 of Performance Analytics for Vulnerability Response |
Certified for Orlando in the ServiceNow Store. |
Version 10.3 of the following applications:
- Vulnerability Solution Management
- Red Hat Solution Integration
- Microsoft Security Response Center Solution Integration
|
Certified for Orlando in the ServiceNow Store. |
11.0 of Vulnerability Response Mobile |
Certified for Orlando in the ServiceNow Store. |
2.0 Vulnerability Response Integration with Veracode |
Certified for Orlando in the ServiceNow Store. Fields as
SDLC Status, Vulnerability Summary, Vulnerability Explanation, and Recommendation,
imported and mapped to display on Application Vulnerable Item
form. |
1.0 Vulnerability Assignment Recommendations |
Certified for Orlando in the ServiceNow Store.
Initial release. |
2.1 Vulnerability Response Integration with Tenable |
Certified for Orlando in the ServiceNow Store.
To update
your CIs with the network partition identifier, version 13.0 of Vulnerability
Response includes the CMDB CI Class Models (v1.21.0) that include the Network
Partition Identifier in the IRE identification rules. The system properties are:
sn_vul_tenable.lookup_network_partition_io
sn_vul_tenable.lookup_network_partition_sc. Pre-requisites are:
- Version 13.0 of Vulnerability Response with CMDB CI Class Models –
v1.0.21
- Orlando Patch 10 (or)
- Paris Patch 6 (or)
- Quebec Patch 1.
When you initiate a Tenable.sc rescan request
via a MID Server, an error message is displayed if the API request takes longer
than 30 seconds. See the Tenable.sc Rescan Error - No response after 30
seconds in ECC Queue [KB0862613] article in the HI Knowledge Base to
reset the default timeout limit.
If you
have been importing data with the Tenable-built integration, and you want to start
using the ServiceNow® Vulnerability Response Integration with
Tenable, see the Required data cleanup for migrating from the
Tenable Vulnerability Response integration to the ServiceNow Vulnerability
Response Integration with Tenable KB0863702 article for clearing existing
vulnerability data in your instance. |
1.0 Vulnerability Response Integration with NVD |
Certified for Orlando in the ServiceNow Store.
Initial release. Two integrations import CVE and CPE data from the NIST
National Vulnerability Database:
- NIST National Vulnerability Database Integration - API (CVE only)
- NIST National Vulnerability Database Integration - API (CVE and CPE)
|