On This Page
Configuring VMA
To take full advantage of Vulnerability Mitigation App's (VMA) vulnerability correlation and mitigation capabilities, you need to perform these configuration tasks from the Settings () menu.
After making any change in this menu, click Save.
Connect to an External VMS
The vulnerability management systems (VMSs) that scan your network assets at fixed intervals provide VMA with regular updates on the vulnerability status of your assets.
In the Vulnerability Scanners section:
-
Click a logo to select your VMS.
-
Enter the access credentials for the VMS.
VMS
Access Credentials
- Tenable.sc
- Rapid7 Nexpose
- Rapid7 InsightVM
- Nessus Professional
- Address (FQDN or IP)
- Port (select HTTPS port)
- User name
- Password
- Optional: Enable Certificate Verification
- QualysGuard
- Qualys VMDR
- Address (API)
- User name
- Password
- Optional: Enable proxy
- Tenable.io
- Address (FQDN or IP)
- Access key
- Secret key
- Optional: Enable proxy
Identify Assets from Internet/Untrusted Networks
VMA can identify whether access from the internet or untrusted networks is exploitable, and which assets are affected. This is optional. If selected, VMA will mark the vulnerable assets as Exposed.
In the Internet/Untrusted Address(es) section:
- Select Determine if exploitable access is allowed. Note that this check box is disabled by default until topology information is available for your environment. After there is topology data, you should select this check box.
- Enter the addresses for the internet (for example, 8.8.8.8) and the untrusted networks, separated by commas.From version 2.4, for multiple addresses, VMA checks each address individually for every asset in your system.
Select Critical Zones
Selecting the network zones allows you to prioritize the relevant areas in your network for vulnerability analysis, and increases the efficiency of VMA. Instead of correlating the entire network, VMA only analyzes the areas that you define. You are required to select at least one network zone.
In the Critical zones section:
-
Select a network domain.
-
Select at least one network zone, defined in SecureTrack, to correlate vulnerability information to access.
You can use the Search field to filter the network zones by name.
Connect to SecureChange
Users can open server decommission and group change tickets in SecureChange from VMA, and track the tickets progress as they are being handled from within VMA. This is optional. However, only SecureChange users can use the mitigation workflows.
In the SecureChange (optional) section:
- Enter the workflow information:
Modify Group: Enter the name of the group change workflow and the name of the global group object from which assets will need to be blocked or removed.
Server Access Decommission: The name of the SecureChange workflow that VMA will use to open server decommission requests for assets.
Rule Modification: The name of the SecureChange workflow that VMA will use to open modification requests for rules.
- Enter the SecureChange credentials:
Login username
Login password
The user name and password need to be for a SecureChange user with the permission: Create and handle tickets on behalf of another user (via API only). If this is a new user, log in to SecureChange with that user to validate it.
Set up Email Notifications
Define who will receive a summarizing vulnerability report by email and from where it will be sent.
In the Email notification section:
- Enter the following information for the outgoing emails:
- Outgoing SMTP server
- Port
- Sender email address
- Login user name
- Login password
- If you want the email notifications to be secured, select Enable TLS.
- In the Email Recipients field, enter the email addresses (separated by a semi-colon) to which VMA should send email notifications.
Define Log Levels
Log levels are used for debugging and determine which information is collected in the log files.
In the Log section, select the appropriate log level.
Log Level |
Description |
---|---|
|
Messages with error and critical levels are logged. |
|
Messages with error, critical, and warning levels are logged. |
|
Messages with error, critical, warning, and info levels are logged. |
|
All message levels. |
If you change the log level, the change takes effect immediately and the web server restarts.
To view the log, run the command kubectl logs -f -l app=vma
.