Product documentation Docs
    • English
    • Deutsch
    • 日本語
    • 한국어
    • Français
  • More Sites
    • Now Community
    • Developer Site
    • Knowledge Base
    • Product Information
    • ServiceNow.com
    • Training
    • Customer Success Center
    • ServiceNow Support Videos
  • Log in

Product documentation

  • Home
How search works:
  • Punctuation and capital letters are ignored
  • Special characters like underscores (_) are removed
  • Known synonyms are applied
  • The most relevant topics (based on weighting and matching to search terms) are listed first in search results
Topics are ranked in search results by how closely they match your search terms
  • A match on the entire phrase you typed
  • A match on part of the phrase you typed
  • A match on ALL of the terms in the phrase you typed
  • A match on ANY of the terms in the phrase you typed

Note: Matches in titles are always highly ranked.

  • Release version
    Table of Contents
    • Security Operations
Table of Contents
Choose your release version
    Home Paris Security Incident Management Security Operations Security Incident Response Managing security incidents and inbound requests Manage lookups and scans

    Manage lookups and scans

    • Save as PDF Selected topic Topic & subtopics All topics in contents
    • Unsubscribe Log in to subscribe to topics and get notified when content changes.
    • Share this page

    Manage lookups and scans

    You can perform lookups and vulnerability scans from security incidents and from the security incident catalog to identify potential threats and vulnerabilities.

    Submit an IoC Lookup request from a security incident

    An IoC lookup automatically runs whenever observables are added to a security incident. Also, if your security incident has attachments, they can be easily found with the press of a button.

    Before you begin

    For automatic IoC lookups, the Threat Intelligence plugin must be activated.

    Role required: sn_si.basic

    Note: By default, the Lookup Type for File is inactive.

    Procedure

    1. Create a new security incident or open an existing one if you intend to attach new files to it.
    2. Click the paperclip icon in the form header and attach one or more files.
    3. When you have completed your entries on the form, right-click the form header and click Save.
      After the record has been saved, a Lookup attachments button appears.
    4. Click Lookup attachments.
      Note: The work notes under Incident Details report the progress of the lookup process.
    5. You can click the lookup number at the end of the message to view the lookup record. You can click the Lookup reference link to view detailed results.
      Lookup request message

    Submit an IoC Lookup request from the Security Incident Catalog

    If the Security Incident Response plugin is activated, you can submit threat lookups for files, hash values, URLs, and IP addresses from the Security Incident Catalog. The requests are submitted and you can view the results in the My Requests module.

    Before you begin

    Role required: none

    About this task

    Lookups are automatically performed for the default lookup type for each lookup source listed in the lookup record. The results of the lookup request are available in the My Requests module.

    Procedure

    1. Navigate to Self-Service > Security Incident Catalog.
    2. Click IoC Lookup.
    3. Click Lookup files, hash values, URLs or IP addresses.
    4. Enter one or more of the following:
      Table 1. IoC Lookup request
      Item to lookup Description
      Files Click the paperclip icon, then locate and attach the files you want to lookup.
      Note: By default, the Lookup Type for File is inactive. Files are converted and submitted as a hash value.
      URLs In the URLs field, enter the URLs you want to lookup, separated by commas. For example: www.abc.com,www.xyz.net.
      IP addresses In the IP addresses field, enter the IP addresses you want to lookup, separated by commas.
      Hash values In the Hash values field, enter the hash values you want to lookup, separated by commas.
      Note: When the Lookup Type for File is inactive, this value is the default action for both File and Hash values.
    5. When you have made your selections, click Submit.
    6. To view the status and/or results of the lookups, navigate to Self-Service > My Requests.
    7. Click the SR number for the request.
      The work notes under Activity list the tasks performed during the lookup, including the creation of individual lookups for each file, hash value, URL, or IP address, and the lookup results.

    Submit a vulnerability scan request from a security incident

    If your security incident has one or more configuration items (servers, computers, and so on), they can be scanned for vulnerabilities from the Security Incident Response form.

    Before you begin

    The Vulnerability Response plugin must be activated.

    Role required: sn_si.write

    Procedure

    1. Create a security incident and include at least one resource. You can also open an existing incident that has configuration items.
    2. When you have completed your entries on the form, right-click the form header and click Save.
      After the record has been saved, a Scan for Vulnerabilities related link appears.
      Note: If the Scan for Vulnerabilities related list is not shown, you must navigate to Vulnerability > Scanners, set up at least one scanner, and set its default to true.
    3. Click Scan for Vulnerabilities.
      Note:

      A message appears at the top of the security incident form, along with a link to the scan record.

      Scan request with link
    4. You can click the scan request number to view the scan record.
      The incident details show the results of the scan in the Security Scan Request record.

    Submit a vulnerability scan request from the Security Incident Response catalog

    You can submit vulnerability scans for CIs and IP addresses from the Security Incident Response catalog. The requests are submitted and you can view the results in the My Requests module.

    Before you begin

    Role required: none

    Procedure

    1. Navigate to Self-Service > Security Incident Catalog.
    2. Click Vulnerability scan.
    3. Click Scan Configuration Item and IP addresses.
    4. Enter one or more of the following to be scanned.
      Table 2. Vulnerability Scanners
      Item to be scanned Description
      Configuration item In the Configuration Item to scan field, select the CI to be scanned.
      IP addresses In the IP addresses to scan field, enter the IP addresses, separated by commas.
    5. When you have made your selections, click Submit.
      If an observable is found, an indicator is created, according to STIXX standards.
    6. To view the status and/or results of the scans, navigate to Self-Service > My Requests.
    7. Click the SR number for the request.
      The work notes under Activities list the tasks performed during the scan, including the creation of individual scans for each CI or IP address, and the results of the scans.

    Tags:

    Feedback
    On this page

    Previous topic

    Next topic

    • Contact Us
    • Careers
    • Terms of Use
    • Privacy Statement
    • Sitemap
    • © ServiceNow. All rights reserved.

    Release version
    Choose your release version

      Manage lookups and scans

      • Save as PDF Selected topic Topic & subtopics All topics in contents
      • Unsubscribe Log in to subscribe to topics and get notified when content changes.
      • Share this page

      Manage lookups and scans

      You can perform lookups and vulnerability scans from security incidents and from the security incident catalog to identify potential threats and vulnerabilities.

      Submit an IoC Lookup request from a security incident

      An IoC lookup automatically runs whenever observables are added to a security incident. Also, if your security incident has attachments, they can be easily found with the press of a button.

      Before you begin

      For automatic IoC lookups, the Threat Intelligence plugin must be activated.

      Role required: sn_si.basic

      Note: By default, the Lookup Type for File is inactive.

      Procedure

      1. Create a new security incident or open an existing one if you intend to attach new files to it.
      2. Click the paperclip icon in the form header and attach one or more files.
      3. When you have completed your entries on the form, right-click the form header and click Save.
        After the record has been saved, a Lookup attachments button appears.
      4. Click Lookup attachments.
        Note: The work notes under Incident Details report the progress of the lookup process.
      5. You can click the lookup number at the end of the message to view the lookup record. You can click the Lookup reference link to view detailed results.
        Lookup request message

      Submit an IoC Lookup request from the Security Incident Catalog

      If the Security Incident Response plugin is activated, you can submit threat lookups for files, hash values, URLs, and IP addresses from the Security Incident Catalog. The requests are submitted and you can view the results in the My Requests module.

      Before you begin

      Role required: none

      About this task

      Lookups are automatically performed for the default lookup type for each lookup source listed in the lookup record. The results of the lookup request are available in the My Requests module.

      Procedure

      1. Navigate to Self-Service > Security Incident Catalog.
      2. Click IoC Lookup.
      3. Click Lookup files, hash values, URLs or IP addresses.
      4. Enter one or more of the following:
        Table 1. IoC Lookup request
        Item to lookup Description
        Files Click the paperclip icon, then locate and attach the files you want to lookup.
        Note: By default, the Lookup Type for File is inactive. Files are converted and submitted as a hash value.
        URLs In the URLs field, enter the URLs you want to lookup, separated by commas. For example: www.abc.com,www.xyz.net.
        IP addresses In the IP addresses field, enter the IP addresses you want to lookup, separated by commas.
        Hash values In the Hash values field, enter the hash values you want to lookup, separated by commas.
        Note: When the Lookup Type for File is inactive, this value is the default action for both File and Hash values.
      5. When you have made your selections, click Submit.
      6. To view the status and/or results of the lookups, navigate to Self-Service > My Requests.
      7. Click the SR number for the request.
        The work notes under Activity list the tasks performed during the lookup, including the creation of individual lookups for each file, hash value, URL, or IP address, and the lookup results.

      Submit a vulnerability scan request from a security incident

      If your security incident has one or more configuration items (servers, computers, and so on), they can be scanned for vulnerabilities from the Security Incident Response form.

      Before you begin

      The Vulnerability Response plugin must be activated.

      Role required: sn_si.write

      Procedure

      1. Create a security incident and include at least one resource. You can also open an existing incident that has configuration items.
      2. When you have completed your entries on the form, right-click the form header and click Save.
        After the record has been saved, a Scan for Vulnerabilities related link appears.
        Note: If the Scan for Vulnerabilities related list is not shown, you must navigate to Vulnerability > Scanners, set up at least one scanner, and set its default to true.
      3. Click Scan for Vulnerabilities.
        Note:

        A message appears at the top of the security incident form, along with a link to the scan record.

        Scan request with link
      4. You can click the scan request number to view the scan record.
        The incident details show the results of the scan in the Security Scan Request record.

      Submit a vulnerability scan request from the Security Incident Response catalog

      You can submit vulnerability scans for CIs and IP addresses from the Security Incident Response catalog. The requests are submitted and you can view the results in the My Requests module.

      Before you begin

      Role required: none

      Procedure

      1. Navigate to Self-Service > Security Incident Catalog.
      2. Click Vulnerability scan.
      3. Click Scan Configuration Item and IP addresses.
      4. Enter one or more of the following to be scanned.
        Table 2. Vulnerability Scanners
        Item to be scanned Description
        Configuration item In the Configuration Item to scan field, select the CI to be scanned.
        IP addresses In the IP addresses to scan field, enter the IP addresses, separated by commas.
      5. When you have made your selections, click Submit.
        If an observable is found, an indicator is created, according to STIXX standards.
      6. To view the status and/or results of the scans, navigate to Self-Service > My Requests.
      7. Click the SR number for the request.
        The work notes under Activities list the tasks performed during the scan, including the creation of individual scans for each CI or IP address, and the results of the scans.

      Tags:

      Feedback

          Share this page

          Got it! Feel free to add a comment
          To share your product suggestions, visit the Idea Portal.
          Please let us know how to improve this content

          Check any that apply

          To share your product suggestions, visit the Idea Portal.
          Confirm

          We were unable to find "Coaching" in Jakarta. Would you like to search instead?

          No Yes
          • Contact Us
          • Careers
          • Terms of Use
          • Privacy Statement
          • Sitemap
          • © ServiceNow. All rights reserved.

          Subscribe Subscribed Unsubscribe Last updated: Tags: January February March April May June July August September October November December No Results Found Versions Search preferences successfully updated My release version successfully updated My release version successfully deleted An error has occurred. Please try again later. You have been unsubscribed from all topics. You are now subscribed to and will receive notifications if any changes are made to this page. You have been unsubscribed from this content Thank you for your feedback. Form temporarily unavailable. Please try again or contact  docfeedback@servicenow.com  to submit your comments. The topic you requested does not exist in the release. You were redirected to a related topic instead. The available release versions for this topic are listed There is no specific version for this documentation. Explore products Click to go to the page. Release notes and upgrades Click to open the dropdown menu. Delete Remove No selected version Reset This field is required You are already subscribed to this topic Attach screenshot The file you uploaded exceeds the allowed file size of 20MB. Please try again with a smaller file. Please complete the reCAPTCHA step to attach a screenshot
          Log in to personalize your search results and subscribe to topics
          No, thanks Login