- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎03-30-2022 07:56 AM
We have a large number of non-persistent VDI's. This is causing our Discovered Items matching percentage to suffer, what is the Service-Now best approach in handling non-persistent VDI's?
Additional notes on how VDI's work:
In VDI, a hypervisor segments servers into virtual machines that in turn host virtual desktops, which users access remotely from their devices.
Users can access these virtual desktops from any device or location, and all processing is done on the host server.
Users connect to their desktop instances through a connection broker, which is a software-based gateway that acts as an intermediary between the user and the server.
Solved! Go to Solution.
- Labels:
-
Vulnerability Response

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎03-30-2022 09:21 AM
Hi,
Right now, I think you need to solve this issue by improving your internal process.
Is there a reason that you are scanning VDIs? I think I would only launch VDIs in a certain subnet(s) then I would exclude all scanning from those subnets. Except for a handful of IPs that would only represent all VDIs. (Repeat as necessary)
So, if you think about it, each VDI is a clone from a single image.
What is really needed is that the VDI image build/validation/maintenance process would scan a single host, that is well defined, and is owned by the VDI image build team. If you find a vulnerability, the image needs to be fixed.
The latest VR release now has "Container vulnerabilities". A specialized container vulnerability scanner really reports the issue on the container image, because that is what needs to be fixed. VDI can be thought of in the same manner.
I think this is a source data issue, don't scan each VDI..... which at its base/root is a duplicate issue.
Ideas In order of goodness 🙂
- Limit VDI's to their own dedicated subnet(s)
- Don't scan all VDIs (just a sample one or one per image)
- Filter out VDI on your Scanner
- ----- OOB VR relm -----
- Set Auto-Close rules aggressively in SV VR for VDI's
- Set Auto-delete rules aggressively to delete the VI
- ---- Customization relm -----
- Clean up the host from the CMDB
- Clean up Discovered Items

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎03-30-2022 09:21 AM
Hi,
Right now, I think you need to solve this issue by improving your internal process.
Is there a reason that you are scanning VDIs? I think I would only launch VDIs in a certain subnet(s) then I would exclude all scanning from those subnets. Except for a handful of IPs that would only represent all VDIs. (Repeat as necessary)
So, if you think about it, each VDI is a clone from a single image.
What is really needed is that the VDI image build/validation/maintenance process would scan a single host, that is well defined, and is owned by the VDI image build team. If you find a vulnerability, the image needs to be fixed.
The latest VR release now has "Container vulnerabilities". A specialized container vulnerability scanner really reports the issue on the container image, because that is what needs to be fixed. VDI can be thought of in the same manner.
I think this is a source data issue, don't scan each VDI..... which at its base/root is a duplicate issue.
Ideas In order of goodness 🙂
- Limit VDI's to their own dedicated subnet(s)
- Don't scan all VDIs (just a sample one or one per image)
- Filter out VDI on your Scanner
- ----- OOB VR relm -----
- Set Auto-Close rules aggressively in SV VR for VDI's
- Set Auto-delete rules aggressively to delete the VI
- ---- Customization relm -----
- Clean up the host from the CMDB
- Clean up Discovered Items
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎03-31-2022 09:45 AM
This was very helpful
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎04-05-2022 03:18 PM
Thanks much,
Joe

- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
‎04-06-2022 02:59 AM
Here is what I thinking:
1. Identify DI that don't have a VI
https://gist.github.com/cmcdevitt/84306ab24ebfcc94bf2c19a6e3e4b8c4
2. Flag those DI (i.e. a 'No associated VI' T/F field)
3. A Business Rule that runs and Retires their Associated CI (based on step 2)
-- Use Status AND Life Cycle State/Status fields
4. Using Auto-Delete Rules (Auto Flushes) delete these DI and CI objects in the future.
-- Based on Step 3 + time
-- Go slow and understand when data is no longer relevant to your organization
--- Remember: Retention Policy (if any) and wisdom of your peers (i.e. when do most people agree the data becomes stale)