SecOps forum
cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 

Forum Posts

Resolved! Assignment of Security Incidents to Non Sec Ops staff

Hi, A member of the security team has asked me if there is a way to assign a security incident to an individual, so that only they can see it. From my research, I can see that I would need to set up new groups so they are available for the Sec Ops te...

Collette1 by Giga Contributor
  • 1985 Views
  • 4 replies
  • 1 helpfuls

Resolved! Third Party Vulnerability Entry (QID)

I have integrated Qualys with ServiceNow and it started created items and groups with Qualys Ids (QIDs). The issue with these QIDs is that Threat and Solution fields are coming as blank. There must be some information about this third party vulnerabi...

find_real_file.png
Khanna Ji by Tera Guru
  • 4265 Views
  • 23 replies
  • 1 helpfuls

Resolved! ServiceNow Qualys Integration - Asset Tags

Does ServiceNow Qualys Integration brings asset tags into ServiceNow? I don't think so, we need Qualys CMDB Sync for bringing the asset tags into ServiceNow. Please help me if my understanding is correct.

Khanna Ji by Tera Guru
  • 2439 Views
  • 3 replies
  • 1 helpfuls

Splunk Integration Architecture Diagram

Is there a standard architecture document for Splunk to ServiceNow integration. We know that there is a MID Server Required along with the plugin but is there anything else needed?  Customer is asking for an architecture diagram but I have not been a...

jzayicek by Kilo Contributor
  • 2107 Views
  • 3 replies
  • 0 helpfuls

Business Impact and Priority on Vulnerable Items

Can anybody help me to understand how Business Impact and Priority values are set on Vulnerable items? I do not find any calculator or matrix for this? I can see matrix only for risk calculator of Vulnerable items.

find_real_file.png
Khanna Ji by Tera Guru
  • 2630 Views
  • 4 replies
  • 1 helpfuls

Resolved! Host Detection CIs created by Qualys

Host Detecton CIs created by qualys for vulnerability response module integration are available for selection to the other ITSM modules also or only for vulnerability application?

Khanna Ji by Tera Guru
  • 1419 Views
  • 5 replies
  • 2 helpfuls

Resolved! CVE and CWE

Can anybody explain me the difference between CVE (Common Vulnerability and exposures) & CWE (Common Weakness Enumeration) ? Also please one example of each which will help me to understand them easily.

Khanna Ji by Tera Guru
  • 4378 Views
  • 5 replies
  • 3 helpfuls

Vulnerability Response Notifications

Hi Team, Can you please explain me the below vulnerability response notifications? I am finding it hard to understand them. Appreciate your efforts and time.

find_real_file.png
Khanna Ji by Tera Guru
  • 2251 Views
  • 7 replies
  • 1 helpfuls

force rebuild user role table

I am about to embark on the task of cleaning up user granted roles directly in some cases and role changes in groups. I will be consolidating down duplicated roles given and removing roles directly given to users. I have seen the behavior of a user n...

twooton by Giga Contributor
  • 1352 Views
  • 4 replies
  • 0 helpfuls

Resolved! SIRT Auto Assignment

Whenever I submit a security incident, it is picking SIRT group as an Assignment Group. Is there a way to change the this group assignment and select something else? Where can I find the setting for it?

James234 by Kilo Contributor
  • 1675 Views
  • 5 replies
  • 0 helpfuls

Resolved! What is the Security Module in SNOW?

Hi, What is the Security Module in SNOW? Why we require the same? Could you please explain in detail. Regards,      

Neha52 by Tera Contributor
  • 2560 Views
  • 3 replies
  • 1 helpfuls

ACL in Update Sets

Hi All, I'd like to raise a small question: If modifying the ACLs require security_admin role; while moving update sets having ACL changes from one instance to another instance, one should have a security_admin role. Please suggest. Thanks, Vishal

Vishal2 by Mega Contributor
  • 3084 Views
  • 6 replies
  • 1 helpfuls

Resolved! Where do we set up the User reported Phishing email address?

The docs say that we need to define an email address such as acme+phishing@service-now.com as the forwarding address for the possible phishing emails. https://docs.servicenow.com/bundle/london-security-management/page/product/security-incident-respon...

Steve Quayle by ServiceNow Employee
  • 2548 Views
  • 5 replies
  • 1 helpfuls