The CreatorCon Call for Content is officially open! Get started here.

SecOps forum
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Forum Posts

Resolved! Unable to request exception on remediation task

Hi All, When I click on the "Request exception" after updating the mandatory fields and when I try to submit for request approval I am getting the below error. The date is populated by the calendar automatically. Even though the format is correct it ...

Venkatesh4_0-1711363783912.png
Venkatesh4 by Tera Expert
  • 872 Views
  • 1 replies
  • 1 helpfuls

Security incident response

Created one new custom role and created new Read ACL and added role Gave role to a user impersonated user not able to view sir record.  

AbdulKhader_0-1710493364287.png AbdulKhader_0-1710493607037.png
Community Alums by Community Alums  
  • 863 Views
  • 6 replies
  • 1 helpfuls

Tenable.sc with ServiceNow Plugin output

plugin outputWe have successfully integrated Tenable.sc with ServiceNow (Utha) for Vulnerability Response and are looking for supplemental information that we see in Tenable, but it is not included through the integration/API or haven't been able to ...

thumbnail_image003.jpg
ezapata by Tera Contributor
  • 934 Views
  • 2 replies
  • 1 helpfuls

Vulnerability Response with Domain Separation

Hello all,I'm working with a client that has domain separation in their instance. They're going to start using the Vulnerability Response application, and their CIs are already domain separated so I believe it makes sense to have the vulnerable items...

Linking runbooks with security incidents

Hi, I am trying to link a runbook with incidents and incident response tasks by adding a filter condition.(Incident description contains phishing) (Screenshot attached)But this does not reflect when a new phishing incident is created or in any existi...

Visibility of Unmatched CIs in ITSM

How would you restrict the visibility or usage of Unmatched CI from Vulnerability Response in ITSM and ITOM processes? We don't want end users to create incidents, problems or changes in ITSM for CIs without the proper documentation in the CMDB. The ...

Cost of Column Level Encyption Enterprise (CLEE) ?

Hi, I wanna install a application, the name is Column Level Encryption Enterprise (CLEE) but it requires payment. I know that the cost depends on how many field I want to encrypt and how many user would be applied,...But I need a average number to qu...

Changing the Json script

Can anyone help me out hereI need to work on a requirementThere is field called "source data" in discovered items table,where we need to replace the line 'Assessed for Vulnerabilities:false' as 'Assessed Vulnerabilities:true' value in the Json value ...

Mahesh137 by Tera Contributor
  • 372 Views
  • 2 replies
  • 0 helpfuls

Resolved! Issue on grouping vulnerabillities by risk rating

Hi Everyone, We are using the risk rating to group vulnerabilities. We have defined that in our group rules.When the remediation task gets created it is set to 4-low and the short description of the remediation task is set to 4-low later the remediat...

Venkatesh4_0-1709548083224.png Venkatesh4_1-1709548368905.png
Venkatesh4 by Tera Expert
  • 793 Views
  • 3 replies
  • 0 helpfuls