To configure and use a vulnerability management workflow in Cyber DOC4000, you need to complete the following configuration requirements:
-
Have a license for the Cyber Integrity, PAS Workflows, PAS Vulnerability Management, and PAS Recon asset models.
-
Load and configure the Cyber Integrity, PAS Workflows, and PAS Recon asset models. For more information, see Steps for Configuring Cyber DOC4000.
-
Load the PAS Vulnerability Management asset model and configure vulnerability management. For more information, see Loading (Importing) Asset Models and Steps for Implementing Vulnerability Management.
To use workflows, you also need to create and define a Location common field. For more information, see Defining the Location Common Field for Workflows.
Once you have completed the previously listed configuration requirements, you need to create the workflow definition to use for vulnerability management cases, and then specify the name of that workflow definition, so DOC4000 can use it when the user selects a vulnerability and clicks the Investigate button. For more information, see the following topics: