CI Lookup Rules for identifying configuration items from Configuration Compliance third-party vulnerability integrations
- UpdatedJul 31, 2025
- 3 minutes to read
- Zurich
- Configuration Compliance
When data is imported from a third-party integration, Configuration Compliance automatically uses host data to search for matches in the Configuration Management Database (CMDB). It does this using CI Lookup Rules. These rules are used to identify configuration items (CIs) and add them to the test result record to aid in remediation.
As assets are imported, a lookup is performed first on the Discovered Items list using third-party IDs to find matches to configuration item (CIs) from prior imports. When a host ID match is found, it is used as the Configuration item field in the test result record.
You can see how imported assets are mapped to CIs using the Discovered Items list. If a match is not found, or the cmdb_ci field is empty, the rules use the other host information to attempt to correctly identify the CI. If a match is still not found, a placeholder CI is created and is designated as an Unmatched CI. See Unmatched CIs for more information on how those CIs are handled.
A new discovered item is created and mapped to this CI.
dscy_switchport,
cmdb_ci_network_adapter, cmdb_ci_nic, or cmdb_ci_ip_address, the parent CI is returned.A system property to exclude CI classes is available. This property is not available with upgrade. See Ignore CI classes for upgrade information and instructions on setting the property.
To make it easier to find matching issues, when a match is found, the CI lookup rule used to find it is added to the Discovered Item record in the CI matching rule field. Lookup rules are evaluated by lowest Order value first.
- QUALYS HOST ID
- FQDN
- NetBIOS
- DNS
- IP
- S3 Bucket
- Name
- Resource Id
- S3 Bucket
- Name
- Resource Id
Importing test results data can be taxing on an instance and performance issues with resources can occur if rules are not carefully constructed. The logic used to iterate through and perform matching within the CMDB can result in lengthy processing times. To avoid any potential degradation of resources or performance complications, test any custom-written CI Lookup Rules or modifications to pre-defined CI Lookup Rules. See Steps to help prevent duplicate or orphaned records after running Vulnerability Response CI lookup rules for more information on preventing duplicate orphan records, deleting data, and cleaning up data.
Reapplying updated CI lookup rules
- Were matched by the updated rules
- Are not matched by any rule