9.0 |
Ignore some configuration item (CI) classes by setting the ignoreCIClass
[sn_sec_cmn.ignoreCIClass] system property. While this property is
present after upgrade, it doesn't work automatically. For upgrade instructions on
how to enable this functionality, see KB0788209. |
9.0 |
The process described in KB0819117 to create change requests and
use change management with ITSM legacy Change Management plugins is now fully
supported. |
8.0 (London) |
The VR Setup Assistant module is overwritten with an incorrect URL. When
upgrading from Madrid v7.0 to v8.0 Vulnerability Response on the Paris platform, a
duplicate Setup Assistant module appears. See KB0749805 to remove the redundant module
and fix the incorrect URL issue. |
Prior to Madrid |
If you've installed a version of Vulnerability Response prior to Madrid, you
don't need to install the Vulnerability Response Dependencies (com.snc.vul_dep)
plugin prior to installing the Vulnerability Response update. If you upgraded
from a version of Vulnerability Response before Madrid, your original Overview
page becomes the Overview (Legacy) module in the application navigator. If you
created a customized home page overview, the overview is overwritten by the new
reports dashboard. To access your customized home page, Create a new
module for your customized home page
and add it to the Vulnerability Response application. |
Kingston and earlier |
During upgrade the Vulnerable Item table is reparented to improve performance.
If you have a large number of vulnerable items, the upgrade process may take
additional time. No special handling is needed, however, stop any Vulnerability
Response activities prior to the upgrade and record your vulnerable item
count.
- Once complete, verify that your pre- and post-upgrade vulnerable item
counts match. For more information on the impact of reparenting, see the
Upgrade impact of reparenting change in the
Kingston release [KB0680550] article in the ServiceNow® HI Knowledge Base. For information on the
upgrade impact to existing instances, see the Vulnerability Response: FAQ for Kingston
Upgrade [KB0680543] article in the HI Knowledge Base. This
information does not apply if you upgrade from Kingston to this release. For
Kingston release information, see the Kingston Vulnerability Response release
notes.
- If you're upgrading from Kingston, existing CI Identifier Rules are
disabled by default, but not removed. These rules appear in Security
Operations > CMDB > CI Lookup Rules. To reenable, open a
rule and enter values for the Source and Source field fields,
select the Active check box, and click Submit.
Unmatched configuration items (CIs) imported from Kingston or earlier versions
of Qualys and Rapid7 are transferred and listed in the Discovered Items module
during upgrade. However, these unmatched CIs cannot be reclassified using the
Reclassify button. Unmatched CIs must be reclassified manually. To manually
reclassify the CIs, see Manually reclassify
unmatched configuration items from Discovered Items.
|