Associating finding with a configuration item using lookup rules
- UpdatedJul 31, 2025
- 4 minutes to read
- Xanadu
- Unified Security Exposure Management (USEM)
Unified Security Exposure Management uses lookup rules to associate imported third-party exposure findings with configuration items (CIs) in the Configuration Management Database (CMDB). These rules match asset data to existing CIs, enabling accurate remediation.
Findings imported from external scanners such as Qualys, Tenable, and Rapid7 often lack direct CI references. Lookup rules bridge this gap by applying matching logic to map findings to CIs in the CMDB.
Characteristics of lookup rules
- Domain separation and source specificity: Lookup rules can be domain-separated and are specific to each source, enabling multiple deployments according to source.
- Shared across deployments: Rules are shared across all deployments of a scanner source integration. Any changes or deletions affect all deployments.
How lookup rules work
- Initial lookup: When assets or findings are imported, the system first checks the Discovered Items list using third-party IDs. If an asset ID matches, it populates the Configuration Item field in the finding record.
- Matching process: If no asset ID match exists, the rules use other asset details to identify the correct CI. You can view mappings in the Discovered Items list.
- Placeholder CI creation: If no match is found, a placeholder CI is created and marked as an Unmatched CI.
- Matching starts with a vendor ID lookup across source, source_instance, and vendor ID.
- The rules execute in ascending order and stop when a single CI match is found.
- If the matched CI is a low-level networking element (for example,
dscy_switchport,cmdb_ci_network_adapter,cmdb_ci_nic, orcmdb_ci_ip_address), the parent CI is returned.
- Rule execution: Rules run from lowest to highest priority until a single match is found. If multiple matches occur, only the first is used.
Special considerations
- Excluding CI classes: A system property enables excluding certain CI classes from matching. See Ignore CI classes for upgrade information and instructions on setting the property.
- Parent CI return: To avoid matching low-level networking elements, the parent CI is returned if the matched CI is a network adapter, Network Interface Cards (NICs), or IP address.
Lookup rules for specific integrations
Each integration plugin includes its own set of rules:
- Qualys: Qualys HOST ID, FQDN, NetBIOS, DNS, IP
- Rapid7: MacAddress, FQDN, HostName, IP
- Tenable.io: FQDN, NETBIOS, HOSTNAME, MacAddress, DNS
- Tenable.sc: MacAddress, FQDN, NETBIOSNote: Tenable.io lookup rules prioritize and populate the non-empty network interface values (FQDN, IPV4, and MacAddress) over the regular FQDN, IPV4, and MacAddress values for a discovered item. When these network interface values are empty, the regular FQDN, IPV4, and MacAddress values are populated for a discovered item.
- Test custom rules: Test custom or modified lookup rules to avoid performance issues.
- Deactivate instead of delete: Deactivate rules rather than deleting them to avoid data loss.
Reapplying updated lookup rules
After updating rules, use Reapply to rerun them on unmatched or previously matched discovered items. This updates CI information in findings and detections. You can also run lookup rules on specific selected discovered items. For more information, see Reapply lookup rules on selected discovered items.
Unmatched CIs and unclassed hardware
- Unmatched CIs: CIs without a match in the CMDB are listed under Discovered Items with Class set to Unmatched CI. Note: Each discovered item includes a Class field. If a CI is unmatched, this field is set to Unmatched CI.
- Unclassed hardware: Assets that can’t be categorized by lookup rules are referred to as unclassed hardware.
By effectively managing lookup rules, Unified Security Exposure Management can help with identifying accurate ownership and streamlining remediation.
Related Content
- Configuring lookup rules
By configuring lookup rules, you can map security exposure data to the correct configuration items (CIs) in the CMDB. This mapping is a critical function because associating exposure findings with the right assets is essential for proper risk assessment, assignment, and remediation workflows.