Configuring a Vulnerability Management Workflow - PAS ICS Integrity - 7.3 - Administration & Configuration - Intergraph

ICS Integrity Administration Guide

Language
English
Product
PAS ICS Integrity
Subproduct
ICS
Search by Category
Administration & Configuration
PAS Version
7.3

To configure and use a vulnerability management workflow in ICS Integrity, you need to complete the following configuration requirements:

To use workflows, you also need to create and define a Location common field. For more information, see Defining the Location Common Field for Workflows.

Once you have completed the previously listed configuration requirements, you need to create the workflow definition to use for vulnerability management cases, and then specify the name of that workflow definition, so Integrity can use it when the user selects a vulnerability and clicks the Investigate button. For more information, see the following topics: