Actually, it's nothing much. What I try to say is you don't have to create assets on SIEM manually. If you can connect SIEM with VA source then it allowed SIEM to retrive information from VA source. As a result, assets on SIEM will be automatically created for you with basic information such as their OS version and port opened for example. Then you can group those assets into lists and later use lists in correlation rule.
I just look at your question again and notice that you refer to vulnerability assessment data. So this may be not related. You should know about VA source already, I guess. Please ignore my messages.
Message was edited by: parinya.ekparinya on 11/28/12 7:50:35 AM CST
This is a very old post but i found responses useful.
I am working in a McAfee environment with Vulnerability Manager sending events/information to SIEM (ESM).
I am seeing lots of events i want to investigate further but the source IP is Vulnerability Manager/Scanner. I need to know the source of the issue, so i can troubleshoot/investigate. Does anyone know how i would find this???
Don't forget, when your helpful posts earn a kudos or get accepted as a solution you can unlock perks and badges. Those aren't the only badges, either. How many can you collect? Click here to learn more.
Community Help Hub
New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.