Product documentation Docs
    • English
    • Deutsch
    • 日本語
    • 한국어
    • Français
  • More Sites
    • Now Community
    • Developer Site
    • Knowledge Base
    • Product Information
    • ServiceNow.com
    • Training
    • Customer Success Center
    • ServiceNow Support Videos
  • Log in

Product documentation

  • Home
How search works:
  • Punctuation and capital letters are ignored
  • Special characters like underscores (_) are removed
  • Known synonyms are applied
  • The most relevant topics (based on weighting and matching to search terms) are listed first in search results
Topics are ranked in search results by how closely they match your search terms
  • A match on the entire phrase you typed
  • A match on part of the phrase you typed
  • A match on ALL of the terms in the phrase you typed
  • A match on ANY of the terms in the phrase you typed

Note: Matches in titles are always highly ranked.

  • Release version
    Table of Contents
    • Orlando release notes
Table of Contents
Choose your release version
    Home Orlando Release Notes Orlando release notes Learn about Orlando Release notes for upgrading from New York Features and changes by product Security Operations release notes Vulnerability Response integrations release notes Vulnerability Response integrations upgrade information

    Vulnerability Response integrations upgrade information

    • Save as PDF Selected topic Topic & subtopics All topics in contents
    • Unsubscribe Log in to subscribe to topics and get notified when content changes.
    • Share this page

    Vulnerability Response integrations upgrade information

    Third-party product upgrade information for the Orlando release for the ServiceNow® Vulnerability Response application for the Orlando release.

    Vulnerability Response and supported third-party applications are available in the ServiceNow Store. All updates to Vulnerability Response and third-party applications are only available in the ServiceNow Store.

    • Third-party integrations and ServiceNow® applications enrich the vulnerability data on your instance by retrieving data from external systems and vendors.
    • Use enriched vulnerability data to help you prioritize vulnerabilities for remediation based on asset criticality and vulnerability severity.
    • Create vulnerable items in Vulnerability Response and track remediation when a vulnerability imported from a third-party assessment product matches an existing asset in your Configuration Management Database (CMDB).

    Important information for upgrading third-party applications with Vulnerability Response to Orlando

    For new features for third-party integrations from the ServiceNow Store with Vulnerability Response for the Orlando release, see Vulnerability Response integrations release notes. Versions 9.0 (platform upgrade only), 10.0, 10.3, 11.0, 12.0, 12.1, 12.2, and 13.0 of Vulnerability Response are compatible with Orlando. For new features for the Vulnerability Response application in the Orlando release, see Vulnerability Response release notes.

    For more information about released versions of the Vulnerability Response application, compatibility with Orlando, and schema changes, see KB0856498 Vulnerability Response Compatibility Matrix and Release Schema Changes.

    Note: This process applies only to applications downloaded to production instances. If you're downloading applications to sub-production or development instances, it's not necessary to get entitlements. Proceed to Activate a ServiceNow Store application.
    Table 1. Upgrade information for Store applications to version 13.0 of Vulnerability Response
    Version and application Upgrade information
    12.0 of Qualys Vulnerability Integration for Security Operations Certified for Orlando in the ServiceNow Store.

    Initiate rescans in the Qualys product from your Now Platform® instance. Note the following information about upgrades to v13.0 of Vulnerability Response and v12.0 of the Qualys Vulnerability Integration:

    • A new integration, the Qualys Option Profile List Integration, retrieves scan profiles from the Qualys product. With Option Profiles, you can choose required scan settings when you initiate rescans in Qualys from your Now Platforminstance.
    • Before you can initiate the enhanced rescans, you must complete the configuration steps listed in Advanced Qualys configurations and modifications.
    • The auto scan for resolved vulnerable items is disabled by default. Enable the scan from your integration instance with the scan_on_resolved system property.
    • New Host Import maps are added for Unclassed Hardware.
    • Discovery source VR-Qualys is created and passed to IRE to create CIs.
    12.0 of Rapid7 Vulnerability Integration for Security Operations Certified for Orlando in the ServiceNow Store.

    New: The Rapid7 Site integration API integration ingests Sites data from Rapid7 Insight VM.

    • Increased the password field length in the Rapid7 Configuration table to accommodate a KMF change.
    • Updated permissions for one of the client scripts to ensure proper access.
    10.5 of Shodan Exploit Integration for Security Operations Certified for Orlando in the ServiceNow Store.

    Fixed: The KMF error by adding security modules.

    12.0 of Performance Analytics for Vulnerability Response Certified for Orlando in the ServiceNow Store.
    Version 10.3 of the following applications:
    • Vulnerability Solution Management
    • Red Hat Solution Integration
    • Microsoft Security Response Center Solution Integration
    Certified for Orlando in the ServiceNow Store.
    11.0 of Vulnerability Response Mobile Certified for Orlando in the ServiceNow Store.
    2.0 Vulnerability Response Integration with Veracode Certified for Orlando in the ServiceNow Store.

    Fields as SDLC Status, Vulnerability Summary, Vulnerability Explanation, and Recommendation, imported and mapped to display on Application Vulnerable Item form.

    1.0 Vulnerability Assignment Recommendations Certified for Orlando in the ServiceNow Store. Initial release.
    2.1 Vulnerability Response Integration with Tenable Certified for Orlando in the ServiceNow Store.

    To update your CIs with the network partition identifier, version 13.0 of Vulnerability Response includes the CMDB CI Class Models (v1.21.0) that include the Network Partition Identifier in the IRE identification rules. The system properties are: sn_vul_tenable.lookup_network_partition_io sn_vul_tenable.lookup_network_partition_sc. Pre-requisites are:

    • Version 13.0 of Vulnerability Response with CMDB CI Class Models – v1.0.21
    • Orlando Patch 10 (or)
    • Paris Patch 6 (or)
    • Quebec Patch 1.

    When you initiate a Tenable.sc rescan request via a MID Server, an error message is displayed if the API request takes longer than 30 seconds. See the Tenable.sc Rescan Error - No response after 30 seconds in ECC Queue [KB0862613] article in the HI Knowledge Base to reset the default timeout limit.

    If you have been importing data with the Tenable-built integration, and you want to start using the ServiceNow® Vulnerability Response Integration with Tenable, see the Required data cleanup for migrating from the Tenable Vulnerability Response integration to the ServiceNow Vulnerability Response Integration with Tenable KB0863702 article for clearing existing vulnerability data in your instance.

    1.0 Vulnerability Response Integration with NVD Certified for Orlando in the ServiceNow Store.

    Initial release.

    Two integrations import CVE and CPE data from the NIST National Vulnerability Database:

    • NIST National Vulnerability Database Integration - API (CVE only)
    • NIST National Vulnerability Database Integration - API (CVE and CPE)
    Table 2. Upgrade information for Store applications to version 12.2 of Vulnerability Response
    Version and application Upgrade information
    11.2 of Rapid7 Vulnerability Integration for Security Operations Certified for Orlando in the ServiceNow Store.

    Fixed defects.

    10.4 of Shodan Exploit Integration for Security Operations Certified for Orlando in the ServiceNow Store.

    Fixed defects.

    11.1 of Qualys Vulnerability Integration for Security Operations Certified for Orlando in the ServiceNow Store.
    • New Host Import maps are added for Unclassed Hardware.
    • Discovery source VR-Qualys is created and passed to IRE to create CIs.
    11.0 of Performance Analytics for Vulnerability Response Certified for Orlando in the ServiceNow Store.
    Version 10.3 of the following applications:
    • Vulnerability Solution Management
    • Red Hat Solution Integration
    • Microsoft Security Response Center Solution Integration
    Certified for Orlando in the ServiceNow Store.
    11.0 of Vulnerability Response Mobile Certified for Orlando in the ServiceNow Store.
    1.0 Vulnerability Response Integration with Veracode Certified for Orlando in the ServiceNow Store.
    1.0 Vulnerability Assignment Recommendations Certified for Orlando in the ServiceNow Store.
    2.0 Vulnerability Response Integration with Tenable Certified for Orlando in the ServiceNow Store.

    When you initiate a Tenable.sc scan request via a MID Server, an error message is displayed if the API request takes longer than 30 seconds. See KB0862613 to reset the default time out limit.

    Table 3. Upgrade information for Store applications to version 12.1 of Vulnerability Response
    Version and application Upgrade information
    11.1 of Qualys Vulnerability Integration for Security Operations Certified for Orlando in the ServiceNow Store.
    • New Host Import maps are added for Unclassed Hardware.
    • Discovery source VR-Qualys is created and passed to IRE to create CIs.
    11.1 of Rapid7 Vulnerability Integration for Security Operations Certified for Orlando in the ServiceNow Store.
    • Discovery source VR-Rapid7 is created and passed to IRE to create CIs.
    • New Host Import maps are added for Unclassed Hardware.
    • Two new CIs, Network Adaptor and IP Address, are created along with the Unclassed Hardware CI.
    11.0 of Performance Analytics for Vulnerability Response Certified for Orlando in the ServiceNow Store.
    Version 10.3 of the following applications:
    • Shodan Exploit Integration for Security Operations
    • Vulnerability Solution Management
    • Red Hat Solution Integration
    • Microsoft Security Response Center Solution Integration
    Certified for Orlando in the ServiceNow Store.
    11.0 of Vulnerability Response Mobile Certified for Orlando in the ServiceNow Store.
    1.0 Vulnerability Response Integration with Veracode Certified for Orlando in the ServiceNow Store.
    1.0 Vulnerability Assignment Recommendations Certified for Orlando in the ServiceNow Store.
    2.0 Vulnerability Response Integration with Tenable Certified for Orlando in the ServiceNow Store.

    When you initiate a Tenable.sc scan request via a MID Server, an error message is displayed if the API request takes longer than 30 seconds. See KB0862613 to reset the default time out limit.

    Table 4. Upgrade information for Store applications to version 12.0 of Vulnerability Response
    Version and application Upgrade information
    11.0 of the following applications:
    • Qualys Vulnerability Integration for Security Operations
    • Rapid7 Vulnerability Integration for Security Operations
    • Performance Analytics for Vulnerability Response
    • Vulnerability Response Mobile
    Certified for Orlando in the ServiceNow Store.
    10.3 of the following applications:
    • Shodan Exploit Integration for Security Operations
    • Vulnerability Solution Management
    • Red Hat Solution Integration
    • Microsoft Security Response Center Solution Integration
    Certified for Orlando in the ServiceNow Store.
    1.0 Vulnerability Response Integration with Veracode Certified for Orlando in the ServiceNow Store. Initial release.
    Table 5. Upgrade information for Store applications to version 11.0 of Vulnerability Response
    Version and application Upgrade information
    10.3 of the following applications:
    • Qualys Vulnerability Integration for Security Operations
    • Rapid7 Integration for Security Operations
    • Performance Analytics for Vulnerability Response
    • Shodan Exploit Integration for Security Operations
    • Vulnerability Solution Management
    • Red Hat Solution Integration
    • Microsoft Security Response Center Solution Integration
    Certified for Orlando in the ServiceNow Store.
    10.0 of Vulnerability Response Mobile Certified for Orlando in the ServiceNow Store.
    Table 6. Upgrade information for Store applications to versions 10.0 through 10.3 of Vulnerability Response
    Version and application Upgrade information
    10.3 of the following applications:
    • Qualys Vulnerability Integration for Security Operations
    • Rapid7 Integration for Security Operations
    • Performance Analytics for Vulnerability Response
    • Shodan Exploit Integration for Security Operations
    • Vulnerability Solution Management
    • Microsoft Security Response Center Solution Integration
    Certified for Orlando in the ServiceNow Store
    10.3 of Red Hat Solution Integration Certified for Orlando in the ServiceNow Store. Initial release.
    10.3 of Rapid7 Integration for Security Operations The Close by age option on the Rapid7 Configuration page is deprecated. For customers upgrading to v.10.3 of Vulnerability Response, this option is still visible.
    10.0 of the following applications:
    • Qualys Vulnerability Integration for Security Operations
    • Rapid7 Integration for Security Operations
    • Performance Analytics for Vulnerability Response
    • Shodan Exploit Integration for Security Operations
    • Microsoft Security Response Center Solution Integration
    • Vulnerability Response Mobile
    Certified for Orlando n the ServiceNow Store
    10.0 of the Qualys Vulnerability Integration for Security Operations

    The Qualysseverity [qualys_severity] and Last updated by source [last_updated_by_source] fields listed in the Vulnerable item table [sn_vulnerable_item] are deprecated and no longer populated. Since the Business Rule (BR) Map Qualys Values uses Last updated by source, it is also deprecated.

    Retry added for API failures such as timeouts.

    10.0 of the Rapid7 Integration for Security Operations Retry added for API failures such as timeouts
    Table 7. Upgrade information for Store applications to prior to and including versions 9.0 of Vulnerability Response
    Version and application Upgrade information
    9.0 Rapid7 Integration for Security Operations Before you upgrade, ensure each of the CI Lookup Rules is Order values-unique. If there are CI Lookup Rules with the same Order value, they may not upgrade correctly. After upgrade, the Rapid7 InsightVM lookup rules are assigned new Order values. Rapid7 Data Warehouse Order values remain the same. See KB0786526 for more information.
    9.0 Rapid7 Integration for Security Operations If the Create CVE entry check box in the configuration page was cleared in an earlier version, the system property, sn_vul_r7.create_cve_for_vulnerabilities is set to true upon upgrade. Vulnerability Response features such as exploits, solutions, rely on the import of Common Vulnerability and Exposure (CVEs) and do not work effectively without them.
    9.0 Rapid7 Integration for Security Operations If you have customized CI Lookup Rules for Rapid7 InsightVM in a previous version, you need to redo them in version 9.0. CI Lookup Rules for Rapid7 InsightVM are not carried forward during upgrade. See KB0786526 for information on updating the rules.
    Prior to London v6.2 or Kingston v5.1 Integration for Security Operations The Rapid7 Vulnerability Integration used an identifier from the Rapid7 Nexpose data warehouse that was not unique across multiple data warehouses. Starting with London v6.2 and Kingston v5.1, the nexpose_id, which is globally consistent, replaced it.
    If you have an existing Rapid7 Vulnerability Integration version earlier than London v6.2 or Kingston v5.1, and you upgrade to the latest Rapid7 Vulnerability Integration version, you may get an "Import relies on nexpose_id" error. In that case, update the SQL query sent to your Rapid7 Nexpose data warehouse with the nexpose_id. Without it, various features of Vulnerability Response and Rapid7 Vulnerability Integration won't work properly. See KB0751331 to add the nexpose_id to the SQL import query.
    Note: This condition exists for a Rapid7 Nexpose data warehouse upgrade or to migrate from the Rapid7 Nexpose data warehouse to Rapid7 InsightVM.
    9.0 Qualys Vulnerability Integration Upon upgrade from any existing Qualys Vulnerability Integration, the Host List integration automatically enables a Qualys instance if the existing Host List Detection integration is also enabled for that instance.

    Tags:

    Feedback
    On this page

    Previous topic

    Next topic

    • Contact Us
    • Careers
    • Terms of Use
    • Privacy Statement
    • Sitemap
    • © ServiceNow. All rights reserved.

    Release version
    Choose your release version

      Vulnerability Response integrations upgrade information

      • Save as PDF Selected topic Topic & subtopics All topics in contents
      • Unsubscribe Log in to subscribe to topics and get notified when content changes.
      • Share this page

      Vulnerability Response integrations upgrade information

      Third-party product upgrade information for the Orlando release for the ServiceNow® Vulnerability Response application for the Orlando release.

      Vulnerability Response and supported third-party applications are available in the ServiceNow Store. All updates to Vulnerability Response and third-party applications are only available in the ServiceNow Store.

      • Third-party integrations and ServiceNow® applications enrich the vulnerability data on your instance by retrieving data from external systems and vendors.
      • Use enriched vulnerability data to help you prioritize vulnerabilities for remediation based on asset criticality and vulnerability severity.
      • Create vulnerable items in Vulnerability Response and track remediation when a vulnerability imported from a third-party assessment product matches an existing asset in your Configuration Management Database (CMDB).

      Important information for upgrading third-party applications with Vulnerability Response to Orlando

      For new features for third-party integrations from the ServiceNow Store with Vulnerability Response for the Orlando release, see Vulnerability Response integrations release notes. Versions 9.0 (platform upgrade only), 10.0, 10.3, 11.0, 12.0, 12.1, 12.2, and 13.0 of Vulnerability Response are compatible with Orlando. For new features for the Vulnerability Response application in the Orlando release, see Vulnerability Response release notes.

      For more information about released versions of the Vulnerability Response application, compatibility with Orlando, and schema changes, see KB0856498 Vulnerability Response Compatibility Matrix and Release Schema Changes.

      Note: This process applies only to applications downloaded to production instances. If you're downloading applications to sub-production or development instances, it's not necessary to get entitlements. Proceed to Activate a ServiceNow Store application.
      Table 1. Upgrade information for Store applications to version 13.0 of Vulnerability Response
      Version and application Upgrade information
      12.0 of Qualys Vulnerability Integration for Security Operations Certified for Orlando in the ServiceNow Store.

      Initiate rescans in the Qualys product from your Now Platform® instance. Note the following information about upgrades to v13.0 of Vulnerability Response and v12.0 of the Qualys Vulnerability Integration:

      • A new integration, the Qualys Option Profile List Integration, retrieves scan profiles from the Qualys product. With Option Profiles, you can choose required scan settings when you initiate rescans in Qualys from your Now Platforminstance.
      • Before you can initiate the enhanced rescans, you must complete the configuration steps listed in Advanced Qualys configurations and modifications.
      • The auto scan for resolved vulnerable items is disabled by default. Enable the scan from your integration instance with the scan_on_resolved system property.
      • New Host Import maps are added for Unclassed Hardware.
      • Discovery source VR-Qualys is created and passed to IRE to create CIs.
      12.0 of Rapid7 Vulnerability Integration for Security Operations Certified for Orlando in the ServiceNow Store.

      New: The Rapid7 Site integration API integration ingests Sites data from Rapid7 Insight VM.

      • Increased the password field length in the Rapid7 Configuration table to accommodate a KMF change.
      • Updated permissions for one of the client scripts to ensure proper access.
      10.5 of Shodan Exploit Integration for Security Operations Certified for Orlando in the ServiceNow Store.

      Fixed: The KMF error by adding security modules.

      12.0 of Performance Analytics for Vulnerability Response Certified for Orlando in the ServiceNow Store.
      Version 10.3 of the following applications:
      • Vulnerability Solution Management
      • Red Hat Solution Integration
      • Microsoft Security Response Center Solution Integration
      Certified for Orlando in the ServiceNow Store.
      11.0 of Vulnerability Response Mobile Certified for Orlando in the ServiceNow Store.
      2.0 Vulnerability Response Integration with Veracode Certified for Orlando in the ServiceNow Store.

      Fields as SDLC Status, Vulnerability Summary, Vulnerability Explanation, and Recommendation, imported and mapped to display on Application Vulnerable Item form.

      1.0 Vulnerability Assignment Recommendations Certified for Orlando in the ServiceNow Store. Initial release.
      2.1 Vulnerability Response Integration with Tenable Certified for Orlando in the ServiceNow Store.

      To update your CIs with the network partition identifier, version 13.0 of Vulnerability Response includes the CMDB CI Class Models (v1.21.0) that include the Network Partition Identifier in the IRE identification rules. The system properties are: sn_vul_tenable.lookup_network_partition_io sn_vul_tenable.lookup_network_partition_sc. Pre-requisites are:

      • Version 13.0 of Vulnerability Response with CMDB CI Class Models – v1.0.21
      • Orlando Patch 10 (or)
      • Paris Patch 6 (or)
      • Quebec Patch 1.

      When you initiate a Tenable.sc rescan request via a MID Server, an error message is displayed if the API request takes longer than 30 seconds. See the Tenable.sc Rescan Error - No response after 30 seconds in ECC Queue [KB0862613] article in the HI Knowledge Base to reset the default timeout limit.

      If you have been importing data with the Tenable-built integration, and you want to start using the ServiceNow® Vulnerability Response Integration with Tenable, see the Required data cleanup for migrating from the Tenable Vulnerability Response integration to the ServiceNow Vulnerability Response Integration with Tenable KB0863702 article for clearing existing vulnerability data in your instance.

      1.0 Vulnerability Response Integration with NVD Certified for Orlando in the ServiceNow Store.

      Initial release.

      Two integrations import CVE and CPE data from the NIST National Vulnerability Database:

      • NIST National Vulnerability Database Integration - API (CVE only)
      • NIST National Vulnerability Database Integration - API (CVE and CPE)
      Table 2. Upgrade information for Store applications to version 12.2 of Vulnerability Response
      Version and application Upgrade information
      11.2 of Rapid7 Vulnerability Integration for Security Operations Certified for Orlando in the ServiceNow Store.

      Fixed defects.

      10.4 of Shodan Exploit Integration for Security Operations Certified for Orlando in the ServiceNow Store.

      Fixed defects.

      11.1 of Qualys Vulnerability Integration for Security Operations Certified for Orlando in the ServiceNow Store.
      • New Host Import maps are added for Unclassed Hardware.
      • Discovery source VR-Qualys is created and passed to IRE to create CIs.
      11.0 of Performance Analytics for Vulnerability Response Certified for Orlando in the ServiceNow Store.
      Version 10.3 of the following applications:
      • Vulnerability Solution Management
      • Red Hat Solution Integration
      • Microsoft Security Response Center Solution Integration
      Certified for Orlando in the ServiceNow Store.
      11.0 of Vulnerability Response Mobile Certified for Orlando in the ServiceNow Store.
      1.0 Vulnerability Response Integration with Veracode Certified for Orlando in the ServiceNow Store.
      1.0 Vulnerability Assignment Recommendations Certified for Orlando in the ServiceNow Store.
      2.0 Vulnerability Response Integration with Tenable Certified for Orlando in the ServiceNow Store.

      When you initiate a Tenable.sc scan request via a MID Server, an error message is displayed if the API request takes longer than 30 seconds. See KB0862613 to reset the default time out limit.

      Table 3. Upgrade information for Store applications to version 12.1 of Vulnerability Response
      Version and application Upgrade information
      11.1 of Qualys Vulnerability Integration for Security Operations Certified for Orlando in the ServiceNow Store.
      • New Host Import maps are added for Unclassed Hardware.
      • Discovery source VR-Qualys is created and passed to IRE to create CIs.
      11.1 of Rapid7 Vulnerability Integration for Security Operations Certified for Orlando in the ServiceNow Store.
      • Discovery source VR-Rapid7 is created and passed to IRE to create CIs.
      • New Host Import maps are added for Unclassed Hardware.
      • Two new CIs, Network Adaptor and IP Address, are created along with the Unclassed Hardware CI.
      11.0 of Performance Analytics for Vulnerability Response Certified for Orlando in the ServiceNow Store.
      Version 10.3 of the following applications:
      • Shodan Exploit Integration for Security Operations
      • Vulnerability Solution Management
      • Red Hat Solution Integration
      • Microsoft Security Response Center Solution Integration
      Certified for Orlando in the ServiceNow Store.
      11.0 of Vulnerability Response Mobile Certified for Orlando in the ServiceNow Store.
      1.0 Vulnerability Response Integration with Veracode Certified for Orlando in the ServiceNow Store.
      1.0 Vulnerability Assignment Recommendations Certified for Orlando in the ServiceNow Store.
      2.0 Vulnerability Response Integration with Tenable Certified for Orlando in the ServiceNow Store.

      When you initiate a Tenable.sc scan request via a MID Server, an error message is displayed if the API request takes longer than 30 seconds. See KB0862613 to reset the default time out limit.

      Table 4. Upgrade information for Store applications to version 12.0 of Vulnerability Response
      Version and application Upgrade information
      11.0 of the following applications:
      • Qualys Vulnerability Integration for Security Operations
      • Rapid7 Vulnerability Integration for Security Operations
      • Performance Analytics for Vulnerability Response
      • Vulnerability Response Mobile
      Certified for Orlando in the ServiceNow Store.
      10.3 of the following applications:
      • Shodan Exploit Integration for Security Operations
      • Vulnerability Solution Management
      • Red Hat Solution Integration
      • Microsoft Security Response Center Solution Integration
      Certified for Orlando in the ServiceNow Store.
      1.0 Vulnerability Response Integration with Veracode Certified for Orlando in the ServiceNow Store. Initial release.
      Table 5. Upgrade information for Store applications to version 11.0 of Vulnerability Response
      Version and application Upgrade information
      10.3 of the following applications:
      • Qualys Vulnerability Integration for Security Operations
      • Rapid7 Integration for Security Operations
      • Performance Analytics for Vulnerability Response
      • Shodan Exploit Integration for Security Operations
      • Vulnerability Solution Management
      • Red Hat Solution Integration
      • Microsoft Security Response Center Solution Integration
      Certified for Orlando in the ServiceNow Store.
      10.0 of Vulnerability Response Mobile Certified for Orlando in the ServiceNow Store.
      Table 6. Upgrade information for Store applications to versions 10.0 through 10.3 of Vulnerability Response
      Version and application Upgrade information
      10.3 of the following applications:
      • Qualys Vulnerability Integration for Security Operations
      • Rapid7 Integration for Security Operations
      • Performance Analytics for Vulnerability Response
      • Shodan Exploit Integration for Security Operations
      • Vulnerability Solution Management
      • Microsoft Security Response Center Solution Integration
      Certified for Orlando in the ServiceNow Store
      10.3 of Red Hat Solution Integration Certified for Orlando in the ServiceNow Store. Initial release.
      10.3 of Rapid7 Integration for Security Operations The Close by age option on the Rapid7 Configuration page is deprecated. For customers upgrading to v.10.3 of Vulnerability Response, this option is still visible.
      10.0 of the following applications:
      • Qualys Vulnerability Integration for Security Operations
      • Rapid7 Integration for Security Operations
      • Performance Analytics for Vulnerability Response
      • Shodan Exploit Integration for Security Operations
      • Microsoft Security Response Center Solution Integration
      • Vulnerability Response Mobile
      Certified for Orlando n the ServiceNow Store
      10.0 of the Qualys Vulnerability Integration for Security Operations

      The Qualysseverity [qualys_severity] and Last updated by source [last_updated_by_source] fields listed in the Vulnerable item table [sn_vulnerable_item] are deprecated and no longer populated. Since the Business Rule (BR) Map Qualys Values uses Last updated by source, it is also deprecated.

      Retry added for API failures such as timeouts.

      10.0 of the Rapid7 Integration for Security Operations Retry added for API failures such as timeouts
      Table 7. Upgrade information for Store applications to prior to and including versions 9.0 of Vulnerability Response
      Version and application Upgrade information
      9.0 Rapid7 Integration for Security Operations Before you upgrade, ensure each of the CI Lookup Rules is Order values-unique. If there are CI Lookup Rules with the same Order value, they may not upgrade correctly. After upgrade, the Rapid7 InsightVM lookup rules are assigned new Order values. Rapid7 Data Warehouse Order values remain the same. See KB0786526 for more information.
      9.0 Rapid7 Integration for Security Operations If the Create CVE entry check box in the configuration page was cleared in an earlier version, the system property, sn_vul_r7.create_cve_for_vulnerabilities is set to true upon upgrade. Vulnerability Response features such as exploits, solutions, rely on the import of Common Vulnerability and Exposure (CVEs) and do not work effectively without them.
      9.0 Rapid7 Integration for Security Operations If you have customized CI Lookup Rules for Rapid7 InsightVM in a previous version, you need to redo them in version 9.0. CI Lookup Rules for Rapid7 InsightVM are not carried forward during upgrade. See KB0786526 for information on updating the rules.
      Prior to London v6.2 or Kingston v5.1 Integration for Security Operations The Rapid7 Vulnerability Integration used an identifier from the Rapid7 Nexpose data warehouse that was not unique across multiple data warehouses. Starting with London v6.2 and Kingston v5.1, the nexpose_id, which is globally consistent, replaced it.
      If you have an existing Rapid7 Vulnerability Integration version earlier than London v6.2 or Kingston v5.1, and you upgrade to the latest Rapid7 Vulnerability Integration version, you may get an "Import relies on nexpose_id" error. In that case, update the SQL query sent to your Rapid7 Nexpose data warehouse with the nexpose_id. Without it, various features of Vulnerability Response and Rapid7 Vulnerability Integration won't work properly. See KB0751331 to add the nexpose_id to the SQL import query.
      Note: This condition exists for a Rapid7 Nexpose data warehouse upgrade or to migrate from the Rapid7 Nexpose data warehouse to Rapid7 InsightVM.
      9.0 Qualys Vulnerability Integration Upon upgrade from any existing Qualys Vulnerability Integration, the Host List integration automatically enables a Qualys instance if the existing Host List Detection integration is also enabled for that instance.

      Tags:

      Feedback

          Share this page

          Got it! Feel free to add a comment
          To share your product suggestions, visit the Idea Portal.
          Please let us know how to improve this content

          Check any that apply

          To share your product suggestions, visit the Idea Portal.
          Confirm

          We were unable to find "Coaching" in Jakarta. Would you like to search instead?

          No Yes
          • Contact Us
          • Careers
          • Terms of Use
          • Privacy Statement
          • Sitemap
          • © ServiceNow. All rights reserved.

          Subscribe Subscribed Unsubscribe Last updated: Tags: January February March April May June July August September October November December No Results Found Versions Search preferences successfully updated My release version successfully updated My release version successfully deleted An error has occurred. Please try again later. You have been unsubscribed from all topics. You are now subscribed to and will receive notifications if any changes are made to this page. You have been unsubscribed from this content Thank you for your feedback. Form temporarily unavailable. Please try again or contact  docfeedback@servicenow.com  to submit your comments. The topic you requested does not exist in the release. You were redirected to a related topic instead. The available release versions for this topic are listed There is no specific version for this documentation. Explore products Click to go to the page. Release notes and upgrades Click to open the dropdown menu. Delete Remove No selected version Reset This field is required You are already subscribed to this topic Attach screenshot The file you uploaded exceeds the allowed file size of 20MB. Please try again with a smaller file. Please complete the reCAPTCHA step to attach a screenshot
          Log in to personalize your search results and subscribe to topics
          No, thanks Login