Description:
This is a document that lists the recommended order in which to have your Vulnerability Manager setup and ready for use.
Solution:
Once all the appliance set-up points have been considered, the following is the recommended order of operation for implementing the appliance to ensure the most efficiency in the process and taking greatest advantage of automation:
These steps, taken in the suggested order, will ensure the most optimal performance of the appliance during implementation. No configuration made during the implementation phase is permanent - any grouping or association made during the initial set-up can be changed at any point later in time - but changes are made more easily after all Services have finished reporting to the appliance and corresponding asset profiles created.
Given a planned and executed implementation of a 500 asset appliance with content and code two versions back, the average implementation will take a few days to complete.
Time frame can vary depending what version of CA Vulnerability Manager you have received. The best practice is to let the VM sit until the it has received its latest code update. You will be able to verify this by looking at the upper right hand corner of the application and see if the there is a code update pending.
<Please see attached file for image>
Proactively considering each point presented above, the CA Vulnerability Manager implementation will be a quick, successful process, with the added benefit of being able to begin addressing vulnerability management in the network as soon as the implementation is complete.