SecOps forum
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Forum Posts

Resolved! Third Party Vulnerability Entry (QID)

I have integrated Qualys with ServiceNow and it started created items and groups with Qualys Ids (QIDs). The issue with these QIDs is that Threat and Solution fields are coming as blank. There must be some information about this third party vulnerabi...

find_real_file.png
Khanna Ji by Tera Guru
  • 3136 Views
  • 23 replies
  • 1 helpfuls

Resolved! ServiceNow Qualys Integration - Asset Tags

Does ServiceNow Qualys Integration brings asset tags into ServiceNow? I don't think so, we need Qualys CMDB Sync for bringing the asset tags into ServiceNow. Please help me if my understanding is correct.

Khanna Ji by Tera Guru
  • 2043 Views
  • 3 replies
  • 1 helpfuls

Splunk Integration Architecture Diagram

Is there a standard architecture document for Splunk to ServiceNow integration. We know that there is a MID Server Required along with the plugin but is there anything else needed?  Customer is asking for an architecture diagram but I have not been a...

jzayicek by Kilo Contributor
  • 1735 Views
  • 3 replies
  • 0 helpfuls

Business Impact and Priority on Vulnerable Items

Can anybody help me to understand how Business Impact and Priority values are set on Vulnerable items? I do not find any calculator or matrix for this? I can see matrix only for risk calculator of Vulnerable items.

find_real_file.png
Khanna Ji by Tera Guru
  • 2207 Views
  • 4 replies
  • 1 helpfuls

Resolved! Host Detection CIs created by Qualys

Host Detecton CIs created by qualys for vulnerability response module integration are available for selection to the other ITSM modules also or only for vulnerability application?

Khanna Ji by Tera Guru
  • 1044 Views
  • 5 replies
  • 2 helpfuls

Resolved! CVE and CWE

Can anybody explain me the difference between CVE (Common Vulnerability and exposures) & CWE (Common Weakness Enumeration) ? Also please one example of each which will help me to understand them easily.

Khanna Ji by Tera Guru
  • 3395 Views
  • 5 replies
  • 3 helpfuls

Vulnerability Response Notifications

Hi Team, Can you please explain me the below vulnerability response notifications? I am finding it hard to understand them. Appreciate your efforts and time.

find_real_file.png
Khanna Ji by Tera Guru
  • 1788 Views
  • 7 replies
  • 1 helpfuls

force rebuild user role table

I am about to embark on the task of cleaning up user granted roles directly in some cases and role changes in groups. I will be consolidating down duplicated roles given and removing roles directly given to users. I have seen the behavior of a user n...

twooton by Giga Contributor
  • 1063 Views
  • 4 replies
  • 0 helpfuls

Resolved! SIRT Auto Assignment

Whenever I submit a security incident, it is picking SIRT group as an Assignment Group. Is there a way to change the this group assignment and select something else? Where can I find the setting for it?

James234 by Kilo Contributor
  • 1265 Views
  • 5 replies
  • 0 helpfuls

Resolved! What is the Security Module in SNOW?

Hi, What is the Security Module in SNOW? Why we require the same? Could you please explain in detail. Regards,      

Neha52 by Tera Contributor
  • 2094 Views
  • 3 replies
  • 1 helpfuls

ACL in Update Sets

Hi All, I'd like to raise a small question: If modifying the ACLs require security_admin role; while moving update sets having ACL changes from one instance to another instance, one should have a security_admin role. Please suggest. Thanks, Vishal

Vishal2 by Mega Contributor
  • 2627 Views
  • 6 replies
  • 1 helpfuls

Resolved! Where do we set up the User reported Phishing email address?

The docs say that we need to define an email address such as acme+phishing@service-now.com as the forwarding address for the possible phishing emails. https://docs.servicenow.com/bundle/london-security-management/page/product/security-incident-respon...

Steve Quayle by ServiceNow Employee
  • 2102 Views
  • 5 replies
  • 1 helpfuls

Resolved! Get running processes

Referring doc https://docs.servicenow.com/bundle/london-security-management/page/product/security-incident-response-orchestration/task/obtain-WMI-retrieval-workflow.html It says when I add windows/Unix CI, and put incident in analysis state, system a...

Khanna Ji by Tera Guru
  • 2565 Views
  • 5 replies
  • 2 helpfuls