This checklist lists the steps required for a basic implementation of the Vulnerability Response application on your ServiceNow AI Platform® instance. When you have completed these tasks, the base system is ready for operation and verification.

Before you begin

Roles required: admin for downloading and activating applications and assigning roles, sn_vul.vulnerability_admin for configuring Vulnerability Response.

Procedure

  1. Consider creating and printing a PDF of this checklist so that you can check off tasks as you complete them.
  2. To generate a PDF, click the Save As PDF icon (Save as PDF icon) at the top of the topic and click Selected topic.
  3. Continue with the configuration of the applications starting in the Vulnerability Response Settings section.

    Reviewing these settings helps you understand how Vulnerability Response works as you continue to set up your environment. For the scanner integration used in this example, you are required to edit the settings.

    The concepts you use in this configuration example for the Qualys product apply to other scanner applications.

    Your Qualys credentials are required to configure the application. Verify you have any account names, passwords, and other service information required by Qualys products so that you have access to them.

    Roles required: sn_vul.vulnerability_admin or, alternatively, admin.

What to do next

Congratulations! You successfully installed the Vulnerability Response application and configured it and a scanner application using the Setup Assistant. The base system is now ready for operation.

To download, install, and configure other applications for Vulnerability Response, follow the same steps and concepts you completed for the preceding checklist. Refer to specific topics provided for each application for more information.

For more information about supported applications available that are available to you from the ServiceNow Store for Vulnerability Response, see Installation of Vulnerability Response and supported applications.

For more information about how to use Vulnerability Response, see Exploring the Vulnerability Response application.