Create a Vulnerability Response CI lookup rule
-
- UpdatedAug 1, 2024
- 3 minutes to read
- Xanadu
- Vulnerability Response
The CI Lookup Rules module contains rules that are used to find the matching record for host information received during third-party vulnerability integration imports. The host information is matched with the discovered items, unmatched configuration item classes, and the Configuration Management Database (CMDB).
Before you begin
Persona and granular roles are available to help you manage what users and groups can see and do in the Vulnerability Response application. For an initial assignment of the persona roles in Setup Assistant, see Assign the Vulnerability Response persona roles using Setup Assistant. For more information about managing granular roles, see Manage persona and granular roles for Vulnerability Response.
Role required: sn_vul.vulnerability_adminAbout this task
Procedure
Related Content
- Vulnerability Response vulnerable item form fields
Vulnerable items are automatically created during third-party vulnerability integration imports.