Get a first look at what's coming. The Developer Passport Australia Release Preview kicks off March 12. Dive in! 

SecOps forum
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Forum Posts

Auto scaling group vulnerabiities from Wiz

How do you not bring in autoscaling groups from wiz into servicenow ? we did not see an option to tweak the configuation in the configure option. Anyone have any ideas?

kalby by Tera Contributor
  • 302 Views
  • 2 replies
  • 0 helpfuls

Closed Vulnerable item reopen when new detection found

@chrismcdevi  @tkrishna29  Vulnerable items in closed state are not re-open when the new detection is found against the same ci in Rapid7 integration. Even it matches the condition in "DetectionBase" script include to have the substate of "fixed" and...

cannot apply exclusion rules

Hello,I am having trouble executing exclusion rules.I followed the steps described in the official documentation to set up the rules.1. I defined the exclusion rule with the following criteria:Schwachstelle.Quellinstanz.Name=Tenable.sc and Schwachste...

Removing Demo data from the VR Module V26.2.2

Hi,I need help in removing demo data form the VR modules. I know the key tables and their related logic but there are 166 tables and its very tadious job.  Note : Servicenow platform should build an inteligence to prevent loading any demo data in the...

jatinvs by Tera Contributor
  • 435 Views
  • 3 replies
  • 0 helpfuls

Crowdstrike Endpoint integration

Is any other way to filter the endpoint alerts that come in so that security incidents are only created for certain alert types besides altering the scripts? Are there alert rules or something we can configure to get this to work without updating the...

Rahulkalra by Tera Contributor
  • 874 Views
  • 1 replies
  • 0 helpfuls

Remediation Grouping Strategy (Windows/RHEL)

Hello Community,We are currently designing remediation task rules for Windows and RHEL OS patching in VR and are evaluating different grouping approaches (for example, by CVE, by asset, or by solution).We also have Vulnerability Solution Management e...

Akhil_M by Giga Contributor
  • 407 Views
  • 3 replies
  • 1 helpfuls