Defining the Vulnerability Management Workflow to Use - PAS ICS Integrity - 7.3 - Administration & Configuration - Intergraph

ICS Integrity Administration Guide

Language
English
Product
PAS ICS Integrity
Subproduct
ICS
Search by Category
Administration & Configuration
PAS Version
7.3

Once you create the workflow with any checklists required to support your vulnerability management processes, you need to specify the name of the workflow to use for vulnerability management.

To specify which workflow to use for vulnerability management cases:

  1. Open Configuration Manager on the Integrity server. To open Configuration Manager, run the following file:

    InstallPath\DataCollector\ConfigurationManager.exe

  2. In the right pane, check Asset Model.

  3. In the Asset field, select PAS Workflows.

  4. In the Object Type field, select Setting.

  5. In the Objects list on the Object List tab, select CyberIntegrityWorkflows. The Properties field is populated with the properties for this object.

  6. In the PropertyValue column for the WorkflowDefVulnerabilityInvestigate property, type the name of the workflow definition you created for Integrity to use when creating a vulnerability management case.

  7. Click Save.