Managing Asset Discovery

If you have the IT Risk Management use case licensed, you can use the following workflows to manage asset discovery.

Here are the tasks to manage asset discovery:

  1. Assign discovered assets.

  2. Complete Device Assessments.

  3. Complete Application Assessments.

  4. Complete Business Impact Assessments.

The following diagram shows the major phases, key tasks, and the users responsible for each task.

IT Security Vulnerabilities Program Asset Discovery workflow

ITSVP Knowledge Base

Users: Archer Admin

As part of ongoing activities, ITSVP data feeds are scheduled to run on a weekly or daily basis by default. These data feeds update and add new vulnerabilities into the Vulnerability Library application. This vulnerability data can be used throughout the rest of the ITSVP use case to remediate known vulnerabilities on scanned devices.