Setting up, installing, and configuring the Configuration Compliance application
- UpdatedJul 31, 2025
- 2 minutes to read
- Zurich
- Configuration Compliance
Before you run the application in your ServiceNow AI Platform® instance, you must first download and install the Configuration Compliance application from the ServiceNow® Store. This application is available as a separate subscription.
Complete the following setup checklist steps listed in the following table prior to installation. These setup tasks are required for a smooth installation and configuration.
For more information about released versions of the Configuration Compliance application, as well as third-party and ServiceNow applications that are compatible with it, see the Vulnerability Response Compatibility Matrix and Release Schema Changes [KB0856498] article in the HI Knowledge Base.
For more information about getting entitlements for store apps, see Security Operations and the ServiceNow Store.
| Setup tasks | Description |
|---|---|
| Verify that you have the required ServiceNow roles for your instance. | The following roles are required for installation, configuration, and
verification of expected results:
|
| Supported integrations | Before you can use Configuration Compliance to remediate configuration items, you must install a third-party scanner integration and perform at least one network scan. Verify that the Vulnerability Response application is installed and activated prior to configuring supported third-party integrations. See Install Vulnerability Response. To verify that integration applications are installed and activated, navigate to in your instance. The list displays the subscriptions your organization has purchased. For more information about third-party integrations and a list of supported products, see Configuration Compliance integrations. |
- If the Qualys Vulnerability Integration is already installed on your system, and your API credentials are different than the ones you want to use for Configuration Compliance, go into Setup Assistant (in Vulnerability Response) and assign them to each Qualys PC integration.
- Navigate to and edit the Qualys API Credentials field under the Qualys REST Details tab.
For more detailed information on the Qualys Vulnerability Integration, see Understanding the Qualys Vulnerability Integration.
You are now ready to install the Configuration Compliance application. See Install Configuration Compliance.