HP Xw460c HP Insight Control Environment User Guide - Page 82

Deploy, Vulnerability and Patch Management, Patch-Fix Based on a Scan., Vulnerability, Advisory

Page 82 highlights

Some vulnerability issues found cannot be automatically fixed or patched. Scan results often provide a suggested fix that you must deploy manually. If after a performing a vulnerability scan, the scan determines that a security vulnerability or configuration error exists, complete the steps in the following sections to deploy patches, configuration fixes, or both to update the system. Vulnerabilities that require manual fixes or vulnerabilities for which the patch has not been acquired are listed but not available for selection. To deploy patches, configuration fixes, or both to systems based on a specific vulnerability scan: 1. Select Deploy→Vulnerability and Patch Management→Patch-Fix Based on a Scan. 2. To display the vulnerabilities for all systems included in the scan, select the completed vulnerability scan, and then click Next. All vulnerabilities listed might not be applicable for every system. Clicking the entry in the Vulnerability ID or Advisory column displays additional information about the vulnerability. The Requires Reboot column indicates if the patch requires the system to reboot after deployment. 3. Select the vulnerabilities to patch or fix, and click Next. 4. Select the systems you want to apply patches or fixes, and click Next. 82 Deploying and securing servers

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181

Some vulnerability issues found cannot be automatically fixed or patched. Scan results often provide a
suggested fix that you must deploy manually.
If after a performing a vulnerability scan, the scan determines that a security vulnerability or configuration
error exists, complete the steps in the following sections to deploy patches, configuration fixes, or both to
update the system. Vulnerabilities that require manual fixes or vulnerabilities for which the patch has not
been acquired are listed but not available for selection.
To deploy patches, configuration fixes, or both to systems based on a specific vulnerability scan:
1.
Select
Deploy
Vulnerability and Patch Management
Patch-Fix Based on a Scan.
2.
To display the vulnerabilities for all systems included in the scan, select the completed vulnerability scan,
and then click
Next
.
All vulnerabilities listed might not be applicable for every system. Clicking the entry in the
Vulnerability
ID
or
Advisory
column displays additional information about the vulnerability. The
Requires Reboot
column indicates if the patch requires the system to reboot after deployment.
3.
Select the vulnerabilities to patch or fix, and click
Next
.
4.
Select the systems you want to apply patches or fixes, and click
Next
.
82
Deploying and securing servers