Create a CI lookup rule
- UpdatedJul 31, 2025
- 2 minutes to read
- Zurich
- Application Vulnerability Response
The CI Lookup Rules module contains rules that define what fields have matching data in the Configuration Management Database (CMDB). These rules are used to identify applications and application releases and add them to the application vulnerable item (AVI) record to aid in remediation.
Before you begin
About this task
Note: Rules, once removed, cannot be recovered. Rather than
removing existing rules, deactivate them when creating new ones.
Procedure
Related Content
- Application Vulnerable Item fields
Application vulnerable items (AVITs) are automatically created during third-part vulnerability integration imports.