IoT Security
Send Vulnerabilities to ServiceNow
Table of Contents
Expand All
|
Collapse All
IoT Security Docs
Send Vulnerabilities to ServiceNow
Manually send vulnerabilities from IoT Security through Cortex XSOAR to
ServiceNow to make work orders.
Where Can I Use This? | What Do I Need? |
---|---|
|
One of the following Cortex XSOAR setups:
|
From the IoT Security portal, send a device
vulnerability to ServiceNow. Before sending it, IoT Security converts
the vulnerability into a security incident, which ServiceNow receives
in its Zingbox alerts vulnerability incident table. From there,
a ServiceNow user can create a work order for a network security
analyst to investigate.
- Click RisksVulnerabilities, click a vulnerability name, and then select the check box of a vulnerable device or potentially vulnerable device that you want to investigate.Click MoreSend toServiceNow.The Send to ServiceNow panel appears.Add a comment.After you enter a comment, the Send button changes from gray to blue, indicating that you can proceed.Click Send.After you click Send, a link appears. When you click it, a new browser window opens to the XSOAR playbook for this action.To confirm that the vulnerability was sent, click the link to the XSOAR playbook for this action.For the link in IoT Security to open the corresponding playbook in Cortex XSOAR, you must already be logged in to your XSOAR instance before clicking it.The green boxes in the playbook indicate that a particular step was successfully performed. Following the path through the playbook gives you feedback about whether an action was carried out successfully or, if not, where the process changed course.The action “Sent to ServiceNow” appears in the Vulnerability Responses column. If you don’t see this column, click the Columns icon (Log in to ServiceNow and check the table you created for receiving security incidents from IoT Security.You can also send a vulnerability to ServiceNow from the Risks section of the Device Details page.