Configure the vulnerable item key
Configure the granularity of the vulnerable item (VIT) key in the Vulnerability Response application to define what makes a vulnerable item (VIT) in your organization.
Before you begin
Persona and granular roles are available to help you manage what users and groups can see and do in the Vulnerability Response application. For an initial assignment of the persona roles in Setup Assistant, see Assign the Vulnerability Response persona roles using Setup Assistant. For more information about managing granular roles, see Manage persona and granular roles for Vulnerability Response.
Key terms:
- Configuration item (CI)
- An existing asset listed on your CMDB.
- Vulnerability
- A record of a known vulnerability imported from the National Institute of Standards and Technology (NIST), National Vulnerability Database (NVD), Common Vulnerabilities and Exposures (CWE), or third-party integrations with Vulnerability Response.
- Vulnerable item
- A vulnerable item is created when an imported vulnerability matches a configuration item in your CMDB.
- Detection
- A single, distinct occurrence of a vulnerability as reported by the scanners of your third-party integrations. Detections are imported and displayed on both the detection and the vulnerable item records in your instance. Also referred to as a Vulnerable Item Detection.
By default, a vulnerable item is a unique combination of a configuration item (CI), a vulnerability, and an integration instance. To create vulnerable items with more granularity, add unique ports or recommendations (for Microsoft TVM vulnerabilities only) from vulnerable item detections. This helps you manage remediation of vulnerabilities at the level you feel is most effective for your organization.
- When Include port is enabled, vulnerable items are created by unique ports from vulnerable item detections.
- When Include recommendation is enabled, a separate vulnerable item is created for each recommendation associated with a vulnerability.
Starting from Vulnerability Response V17.1, you can identify and remediate Rapid7 vulnerabilities by adding proof as the VI key. For more information, see Adding proof to Rapid7 vulnerable item keys.
Choose an option from the following table to enable the Include port option.
| If... | Description |
|---|---|
One or more of the following conditions is true:
|
Enable Include Port. After Include port is enabled, imported detections create vulnerable items that include VIs distinguished by unique port starting with the next import. |
Both conditions are true:
|
Enable Include port. Your existing detections and their associated vulnerable items are preserved. After Include port is enabled, new detections create new vulnerable items that include VIs distinguished by unique port starting with the next import. |
Both conditions are true:
|
|
If the Include port option is enabled, more than one vulnerable item may be created for a configuration item. For example, if a vulnerability exists for two ports on a configuration item, ports 80 and 443, two unique VIs are created, one for each port starting with the next import.
Procedure
What to do next
Verify vulnerable items by port are displayed on the vulnerable item detection and vulnerable item records. For more information, see View Vulnerability Response vulnerable item detection data.