Understanding the Microsoft Threat and Vulnerability Management Vulnerability integration
-
- UpdatedFeb 6, 2024
- 7 minutes to read
- Washington DC
- Vulnerability Response
The Vulnerability Response integration with Microsoft Threat and Vulnerability Management (MS TVM) application uses data imported from MS TVM to help you prioritize and remediate vulnerabilities for your assets. The application is available with a separate subscription from the ServiceNow Store.
You can use the MS TVM Vulnerability integration to import third-party scanner data about your assets and vulnerabilities. You can then view reports about vulnerabilities and vulnerable items on the Vulnerability Response dashboards.

Available versions
Release version | Release notes |
---|---|
Vulnerability Response Integration with MS TVM v2.2 |
For more information about released versions of the Vulnerability Response application, compatibility, and schema changes, see the Vulnerability Response Compatibility Matrix and Release Schema Changes [KB0856498] article in the HI Knowledge Base. |
Domain separation and MS TVM
Import vulnerability integration data to a specified domain by assigning a user in that domain to run the integrations. To create domain-separated imports for the MS TVM Vulnerability Integration, see Create domain-separated imports for an integration.
Terms and key features of the integrations
- Vulnerable items and vulnerabilities
- A vulnerable item is created in your Now Platform instance when:
- An imported vulnerability from a third-party scanner is matched to an existing asset (configuration item) in your CMDB). The MS TVM product refers to these matches as vulnerabilities.
- An imported vulnerability from a third-party scanner is not matched to an existing asset in your CMDB. In this case, an unmatched configuration item (CI) is also created with a vulnerable item.
Use the Identification and Reconciliation Engine (IRE) to create CIs in two new classes when an existing CI can't be matched with a host. Otherwise, unmatched CIs are created in the Unmatched CI classes. For more information, see Creating CIs for Vulnerability Response using the Identification and Reconciliation engine.
- Third-party vulnerability entries
- Third-party vulnerability entries are imported from third-party scanners such as MS TVM and are listed in the Third-Party Vulnerability Entries table in your Now Platform instance. Also, National Vulnerability Database entries (CVEs) are imported from MS TVM. The exploit information that is associated with both these types of entries comes from MS TVM. This
exploit information can be used for risk calculation.Note: A third-party vulnerability is retrieved only for vulnerabilities that do not have a CVE assigned to them. MS TVM can add a temporary name for the vulnerability, for example,
TVM-XXXX-XXXX
. This name is updated after a CVE ID is assigned. - Configuration item (CI)
- CIs are the existing assets that are listed in your CMDB.
- Discovered item
- Discovered items are the assets that are ingested from the MS TVM machine import that match existing CIs in your CMDB.
If a match is not found, a CI is created in the Unmatched CI class of the CMDB. Enable the CMDB CI Class Models plugin, the Identification and Reconciliation Engine (IRE) creates CIs by using new classes. For more information, see Creating CIs for Vulnerability Response using the Identification and Reconciliation engine. If the original, unmatched CI is reclassified, the discovered item records are updated to reflect that state. Discovered items give you visibility into how assets are identified and mapped to CIs in the CMDB.
- CI lookup rules
- When data is imported from MS TVM, Vulnerability Response automatically uses machine (asset) data to search for matches in the CMDB. CI lookup rules are used to identify CIs and to add them to VI records when VIs are created.
- Instance
- An instance refers to multiple accounts of MS TVM. Each account can be an instance in the MS TVM application.
- Integration
- An integration is a scheduled job that retrieves information from a third-party source, such as the integration of the MS TVM machines.
- Deployment
- When an integration supports multi-source, a single integration existence is referred to as a deployment of your integration. A deployment refers to the integrations and products across your environment. For example, you might have multiple deployments of MS TVM in your environment.
The MS TVM integration also includes the following key features:
- You can identify the assets across your environment and update the CIs on your existing discovered items, vulnerable items, and detection records to give you more details about your vulnerabilities.
- You can schedule when you want the jobs to run for all the MS TVM integrations. You can also execute scheduled jobs on-demand.
- You can group vulnerable items.
- You can configure CI lookup rules to define how the asset data from third-party sources is used to identify CIs in your CMDB.
Required Now Platform roles
The integration tasks require the following roles in your Now Platform instance.
Persona and granular roles are available to help you manage what users and groups can see and do in the Vulnerability Response application. For an initial assignment of the persona roles in Setup Assistant, see Assign the Vulnerability Response persona roles using Setup Assistant. For more information about managing granular roles, see Manage persona and granular roles for Vulnerability Response.
- admin
- The system admin uses Setup Assistant to install the MS TVM application. If not assigned, the admin assigns the vulnerability admin (sn_vul.vulnerability_admin) and other roles in Setup Assistant.
- sn_vul.vulnerability_admin
- Once assigned, the vulnerability admin completes the configuration of the MS TVM integrations in Setup Assistant. This role has complete access to the Vulnerability Response application and its records. The vulnerability admin configures all Vulnerability Response applications and rules for installed third-party integrations.
- sn_vul_msft_tvm.configure_integration
This role contains the
sn_vul_msft_tvm.read_integration
granular role. Users with this role can configure the Vulnerability Response Integration with the Microsoft Threat and Vulnerability Management application.- sn_vul_msft_tvm.read_integration
Users with this role can only view the Vulnerability Response Integration with the Microsoft Threat and Vulnerability Management application records.
- Vulnerability Response group
- By default, the Vulnerability Response group is available in Setup Assistant. Users assigned to the Vulnerability Response group inherit the sn_vul.read_all and sn_vul.remediation_owner roles automatically.
MS TVM integrations
Multi-source is supported for all the MS TVM integrations. You can add and deploy multiple instances of the following integrations across your environment from Setup Assistant in Vulnerability Response. You also install and configure the Vulnerability Response Integration with the MS TVM application from Setup Assistant.
To view the MS TVM integrations, navigate to Vulnerability Response provides integrations with MS TVM end points to import the data according to the scheduled time intervals. The following integrations are included in the base system.
.Vulnerable items are grouped into remediation tasks according to the group rules that you set and are assigned for remediation based on your assignment rules. For more information, see Vulnerability Response remediation tasks and remediation task rules overview and Vulnerability Response assignment rules overview.
CI lookup rules
- MAC_ADDRESS
- FQDN
- IP
Discovered items
Machine tags
Machine tags, also known as host tags, are used for organizing and tracking the assets in your organization. You assign tags to your machines.
- Tag storage is not case sensitive. If a Paris tag is created, then a PARIS tag cannot be stored in the Machine tag table. Paris and PARIS are considered to be the same machine tag by the system. Whichever tag is imported first is the tag that is stored and recognized.
- Using machine tags as a group key in a remediation task rule may have unexpected results. Group keys are columns in the remediation tasks table, whereas machine tags are intended for use only in the condition builder.
- Machine tags are controlled by the global system property sn_vul.import_host_tags. This property is set to true by default. Disabling tags disables them across all Now Platform® instances.
What to do next
After you download the Vulnerability Response integration with Microsoft Threat and Vulnerability Management from the ServiceNow® Store, installation and configuration are supported by Setup Assistant in Vulnerability Response. For more information, see Install and configure the Vulnerability Response Integration with the MS TVM application using Setup Assistant.