Jump to main content
HCL Logo Product Documentation
Customer Support Community
Customer Support HCLSoftware U Community Forums Customer Idea Portal
BigFix Remediate
  1. Home icon
  2. Welcome
  3. BigFix Insights for Vulnerability Remediation (IVR)

    Welcome to the BigFix Insights for Vulnerability Remediation (IVR) documentation, where you can find information about how to install, maintain and use IVR service.

  4. BigFix Insights for Vulnerability Remediation (IVR) v.4

    This module provides comprehensive guidance on the installation, maintenance, and operation of the IVR v.4 service. It includes a detailed summary of the entire end-to-end workflow for using IVR v.4.

Product logo

  • BigFix Documentation Homepage
  • BigFix Platform
  • Patch Documentation
  • Insights Documentation

    The Insights feature of BigFix 11 provides you with advanced analytics and visualizations that you can use to identify risks in your environment and make appropriate business decisions.

  • CVE Search dashboard and Web Report

    BigFix CVE Search dashboard and Web Report are available as part of a new Vulnerability Reporting site.

  • CyberFOCUS Analytics dashboard

    From the BigFix CyberFOCUS Analytics dashboard, you can view various reports that display critical information related to vulnerabilities. The data are represented in the form of graphs and tables, so that the user can quickly become aware of the IT assets and the threats in the environment and take informed decisions to mitigate vulnerabilities.

  • ServiceNow Data Flow

    This module provides an overview and features of BigFix ServiceNow Data Flow.

  • BigFix Insights for Vulnerability Remediation (IVR)

    Welcome to the BigFix Insights for Vulnerability Remediation (IVR) documentation, where you can find information about how to install, maintain and use IVR service.

    • BigFix Insights for Vulnerability Remediation (IVR) v.4

      This module provides comprehensive guidance on the installation, maintenance, and operation of the IVR v.4 service. It includes a detailed summary of the entire end-to-end workflow for using IVR v.4.

      • Product overview

        This module provides comprehensive guidance on the installation, maintenance, and operation of the IVR v.4 service. It includes a detailed summary of the entire end-to-end workflow for using IVR v.4.

      • System requirements

        Learn more about the prerequisites and system requirements for the BigFix IVR v.4 Retriever service.

      • IVR4 Fixlets and Tasks

        Learn more about available Fixlets and tasks for BigFix Insights for Vulnerability Remediation v.4.

      • IVR v.4 setup process

        This section provides information on setting up the IVR v.4.

      • IVR on-prem Start Process

        This section explains how to start the IVR Retriever Services.

      • Setting up WebUI IVR v.4 app

        This section provides information on setting up the IVR application, remediation from the main vulnerability list page, remediation from the Vulnerability page, and exporting the vulnerability list.

      • IVR on-prem Reset

        If you need to restart the configuration setup from scratch, use the reset option.

      • WebUI IVR: Device Centric view

        The Device-Centric View in IVR 4.2 provides a unified device-level dashboard for tracking vulnerabilities, remediation actions, and deployment history.

      • WebUI IVR: Universal Vulnerability Ingestion (UVI) – File Import

        The Universal Vulnerability Ingestion (UVI) – File Import feature enables users to import vulnerability reports into the IVR application using Tenable or generic CSV files. The process includes file upload, column mapping, data verification, and integration into the IVR system for analysis and reporting. Users can also manage imported data by deleting or updating reports as needed.

      • Configuration settings for IVR on-prem

        Below are configurations for the IVR v.4 on-prem application. If you want to change any of them, stop the application, modify the configuration settings and then start the application.

      • IVR v.4 logs

        This section provides information about the IVR v.4 logs.

      • Release notes

        The release notes outline the features, updates and patches that are included in each version of BigFix Insights for Vulnerability Remediation v.4, including the latest application updates.

      • Known limitations

        Refer to the below list of limitations in IVR v.4:

      • References

        This module outlines the integration process for installing IVR v4 with Tenable Vulnerability Management as a data source. It provides step-by-step instructions to ensure a successful setup.

    • BigFix Insights for Vulnerability Remediation (IVR)

      Welcome to the BigFix Insights for Vulnerability Remediation (IVR) documentation, where you can find information about how to install, maintain and use IVR service.

  • Extended third-party Windows Applications

    Updates for Windows Applications Extended provides an automated, standardized process of managing software updates and packages in the BigFix environment. This provides updates for a wide range of third-party software packages.

  • Extended third-party Mac Applications

    Updates for Mac Applications Extended provides an automated, standardized process of managing software updates and packages in the BigFix environment. This provides updates for a wide range of third-party software packages.

  • Remediate Guides in PDF

    Following is a link to the BigFix Remediate user guide in PDF format:

 Feedback

BigFix Insights for Vulnerability Remediation (IVR) v.4

This module provides comprehensive guidance on the installation, maintenance, and operation of the IVR v.4 service. It includes a detailed summary of the entire end-to-end workflow for using IVR v.4.

Overview

System requirements

IVR v.4 Fixlets

IVR v.4 setup process

IVROnPrem reset

IVR v.4 Logs

Release Notes

  • Product overview
    This module provides comprehensive guidance on the installation, maintenance, and operation of the IVR v.4 service. It includes a detailed summary of the entire end-to-end workflow for using IVR v.4.
  • System requirements
    Learn more about the prerequisites and system requirements for the BigFix IVR v.4 Retriever service.
  • IVR4 Fixlets and Tasks
    Learn more about available Fixlets and tasks for BigFix Insights for Vulnerability Remediation v.4.
  • IVR v.4 setup process
    This section provides information on setting up the IVR v.4.
  • IVR on-prem Start Process
    This section explains how to start the IVR Retriever Services.
  • Setting up WebUI IVR v.4 app
    This section provides information on setting up the IVR application, remediation from the main vulnerability list page, remediation from the Vulnerability page, and exporting the vulnerability list.
  • IVR on-prem Reset
    If you need to restart the configuration setup from scratch, use the reset option.
  • WebUI IVR: Device Centric view
    The Device-Centric View in IVR 4.2 provides a unified device-level dashboard for tracking vulnerabilities, remediation actions, and deployment history.
  • WebUI IVR: Universal Vulnerability Ingestion (UVI) – File Import
    The Universal Vulnerability Ingestion (UVI) – File Import feature enables users to import vulnerability reports into the IVR application using Tenable or generic CSV files. The process includes file upload, column mapping, data verification, and integration into the IVR system for analysis and reporting. Users can also manage imported data by deleting or updating reports as needed.
  • Configuration settings for IVR on-prem
    Below are configurations for the IVR v.4 on-prem application. If you want to change any of them, stop the application, modify the configuration settings and then start the application.
  • IVR v.4 logs
    This section provides information about the IVR v.4 logs.
  • Release notes
    The release notes outline the features, updates and patches that are included in each version of BigFix Insights for Vulnerability Remediation v.4, including the latest application updates.
  • Known limitations
    Refer to the below list of limitations in IVR v.4:
  • References
    This module outlines the integration process for installing IVR v4 with Tenable Vulnerability Management as a data source. It provides step-by-step instructions to ensure a successful setup.
  • Share: Email
  • Twitter
  • Disclaimer
  • Privacy
  • Terms of use
  • Cookie Preferences