- Product overview
This module provides comprehensive guidance on the installation, maintenance, and operation of the IVR v.4 service. It includes a detailed summary of the entire end-to-end workflow for using IVR v.4.
- System requirements
Learn more about the prerequisites and system requirements for the BigFix IVR v.4 Retriever service.
- IVR4 Fixlets and Tasks
Learn more about available Fixlets and tasks for BigFix Insights for Vulnerability Remediation v.4.
- IVR v.4 setup process
This section provides information on setting up the IVR v.4.
- IVR on-prem Start Process
This section explains how to start the IVR Retriever Services.
- Setting up WebUI IVR v.4 app
This section provides information on setting up the IVR application, remediation from the main vulnerability list page, remediation from the Vulnerability page, and exporting the vulnerability list.
- IVR on-prem Reset
If you need to restart the configuration setup from scratch, use the reset option.
- WebUI IVR: Device Centric view
The Device-Centric View in IVR 4.2 provides a unified device-level dashboard for tracking vulnerabilities, remediation actions, and deployment history.
- WebUI IVR: Universal Vulnerability Ingestion (UVI) – File Import
The Universal Vulnerability Ingestion (UVI) – File Import feature enables users to import vulnerability reports into the IVR application using Tenable or generic CSV files. The process includes file upload, column mapping, data verification, and integration into the IVR system for analysis and reporting. Users can also manage imported data by deleting or updating reports as needed.
- Configuration settings for IVR on-prem
Below are configurations for the IVR v.4 on-prem application. If you want to change any of them, stop the application, modify the configuration settings and then start the application.
- IVR v.4 logs
This section provides information about the IVR v.4 logs.
- Release notes
The release notes outline the features, updates and patches that are included in each version of BigFix Insights for Vulnerability Remediation v.4, including the latest application updates.
- Known limitations
Refer to the below list of limitations in IVR v.4:
- References
This module outlines the integration process for installing IVR v4 with Tenable Vulnerability Management as a data source. It provides step-by-step instructions to ensure a successful setup.