Activate the ISC Virtual Agent interface
-
- UpdatedJan 30, 2025
- 2 minutes to read
- Yokohama
- Platform Security
If you have the admin role, you can activate the ISC Virtual Agent Conversations plugin (com.glide.isc_virtualagent). Activating this plugin installs the Virtual Agent and Natural Language Understanding (NLU content packs, providing Virtual Agent access from the Instance Security Center.
Before you begin
Instance Security Center (ISC) has reached the end of sales as of September 2024, and is no longer supported or available for new activation.
ServiceNow Security Center (SSC) is the recommended solution going forward. For more information, see Instance Security Center to ServiceNow Security Center migration.Role required: admin.
About this task
The ISC Virtual Agent interface enables you to perform the following tasks:
- Ask security-related questions, then get quick summary answers and reference links to learn more.
- Get answers related to the Instance Security Center, Platform Security, ServiceNow security policies, trust, governance, risk, and other processes.
- Search for security-related resources, such as Knowledge Base topics in the Now Support Security Portal.
Plugin | Description |
---|---|
ISC Virtual Agent
Conversations [com.glide.isc_virtualagent] |
Activates the ISC Virtual Agent Conversations content pack for the Instance Security Center. |
ISC NLU Model for Virtual Agent
Conversations [com.glide.isc_nlu] |
Activates the Natural Language Understanding (NLU) content pack for the Instance Security Center. |
Procedure
Related Content
- Instance Security Center to ServiceNow Security Center migration
Learn the key differences when migrating from Instance Security Center (ISC) to ServiceNow Security Center (SSC).
- Monitor security events
Analyze the event metrics in your instance so that you can identify and prevent potential security events.
- Check the daily compliance score and configure security property settings
Review the Daily Compliance Score metric and security configuration properties to see if your instance complies with the suggested security requirements. You can affect the daily compliance score by updating non-compliant security properties in the Hardening Compliance Configurations page.
- Scan for incorrect security definitions
Run the Auditor to scan your instance and find incorrect security definitions. It provides findings you can correct to help improve the security posture of your instance.
- Monitor instance metrics
Monitor user, export, authentication, email, and antivirus metrics for your instance. For example, you can monitor your email security by checking metrics for spam, external emails, and inbound emails from untrusted and trusted domains for your instance. Analyze these metrics to look for anomalous security behaviors that are related to activities that take place in your instance.