What are the ways to distribute remediation to users, in Control Compliance Suite Vulnerability Manager - CCS VM?
Last Updated December 01, 2014
You want to know what are the different ways by which you could use the CCs-VM to distribute the remediation of vulnerabilties to the users.
CCS-VM Ver 10.0
There are two ways to distribute the remediation to the users.
1. Open tickets.
2. Use reports, and distribute the vulnerability report, to the users who are responsible for remediation, of a particular asset.
Option1: Open Tickets:
Using Tickets You can use the Symantec CCS Vulnerability Manager ticketing system to manage the remediation work flow and delegate remediation tasks. Each ticket is associated with an asset and contains information about one or more vulnerabilities discovered during the scanning process.
Opening a ticket
When you want to create a ticket for a vulnerability, click the Open a ticket button, which appears at the bottom of the Vulnerability Listings pane on the detail page for each asset. The console displays the General page of the Ticket Configuration wizard. On the Ticket Configuration–General page, type name for the new ticket. These names are not unique. They appear in ticket notifications, reports, and the list of tickets on the Tickets page.
The status of the ticket appears in the Ticket State field. You cannot modify this field in the wizard. The state changes as the ticket issue is addressed. Assign a priority to the ticket, ranging from Critical to Low, depending on factors such as the vulnerability level. The priority of a ticket is often associated with external ticketing systems.
NOTE: If you need to assign the ticket to a user who does not appear on the dropdown list, you must first add that user to the associated asset group. Assign the ticket to a Symantec CCS Vulnerability Manager user who will be responsible for overseeing the remediation work flow. To do so, select a user name from the dropdown list labeled Assigned To. Only accounts that have access to the affected asset appear in the list.
Option 2: Use reports, and distribute the vulnerability report, to the users who are responsible for remediation, of a particular asset:
Configuring Symantec CCS Vulnerability Manager to distribute reports
You can configure Symantec CCS Vulnerability Manager to distribute reports via e-mail as a URL link or an attachment. Using a link is recommended when recipients have network access, and you are concerned with securing the report data and minimizing the size of the e-mail.
NOTE: Recipients of the report as an HTML link must be either global administrators or Symantec CCS Vulnerability Manager users who have access to the assets included in the report. When recipients click the URL link, their browsers will display a Symantec CCS Vulnerability Manager logon challenge.
Attachments work better when one or more recipient does not have access to your network or global administrator privileges in Symantec CCS Vulnerability Manager, and you are not concerned about report security.
Go to the Report Configuration—Distribution page. Click the check box labeled Send E-mail.
Click a radio button for attaching the report as a URL, an uncompressed file (File), or a zipped file.
NOTE: Selecting the uncompressed file option is not recommended for reports that consist of multiple files, such as HTML pages with graphs. If such a report is attached without being zipped, Symantec CCS Vulnerability Manager will send only the HTML page and not the graph files.
If you wish to e-mail reports to Symantec CCS Vulnerability Manager users with access to the assets included into the report, click the appropriate check box. This is a convenient way to distribute reports automatically to users who are responsible for remediation of vulnerabilities.
Type all other recipient e-mail addresses.
Type the e-mail address of the sender.
You may require an SMTP relay server for one of several reasons. For example, a firewall may prevent Symantec CCS Vulnerability Manager from accessing your network's mail server. If you are using an SMTP relay server, type its address in the appropriate field.
If you leave SMTP relay server field blank, Symantec CCS Vulnerability Manager searches for a suitable mail server for sending reports. Also Symantec CCS Vulnerability Manager regards the mail sender address as the "originator" of e-mailed reports.
If you have completed all other configuration steps in the wizard, click the Next tab on the Report Configuration—Distribution page to view a summary page. There, you can review the attributes for your new report and then change or save those attributes, or cancel the new report.
Imported Document ID: TECH164295
Subscribing will provide email updates when this Article is updated. Login is required to Subscribe