These actions enable you to incorporate LANDesk Management
Suite's security management functionality with Process Manager.
LANDesk security management actions are described below.
For all LDMS actions, Core credential set is a required
value, and should be the first attribute you fill in. If you select
a field to set up the integration with an LDMS core, make sure the
field is mapped to a Listener value that matches the Display name
you provided for the LDMS core in the Process Manager database
Add vulnerabilities to a group
This action enables you to add vulnerabilities to a security
group. When the action occurs in the course of a process, the
designated vulnerabilities are added to the specified security
group. The updated group with the added vulnerabilities can then be
used from the LANDesk Management Suite core server.
Group name: The name of the custom security
group. In order to avoid duplicate group names, it's recommended
that you use a variable as the group name or part of the group name
(see "Inserting a custom
Results: The field in which to place the new
custom security group name (see "Inserting
Delete custom security group
This action enables you to delete a custom security group. When
the action occurs in the course of a process, the designated custom
security group is deleted from LANDesk Management Suite.
Custom filter SQL: A filter that returns
vulnerabilities based on the provided SQL statement. This portion
of the statement is the "where" clause, and can be left blank if no
filtering is needed. (See"Inserting SQL
A filter that returns vulnerabilities based on the given severity
level. For blocked applications (whether used alone or when
included with another type), do not specify a Severity filter, as
doing so will prevent either type's vulnerabilities from being
Vulnerability filter: A filter that returns
vulnerabilities based on whether they are custom or downloaded
vulnerabilities. If custom, "Filter SQL" will be used.
Vulnerability status: A filter that returns
vulnerabilities based on the given vulnerability status.
A filter that returns vulnerabilities based on the given
Results: The field in which to place the list
of vulnerabilities that are returned as a result of the applied
filters (see "Inserting
fields"). If no filter is applied, all
vulnerabilities are returned. The list is comma-delimited.
This action enables you to scan for vulnerabilities on a managed
LANDesk device and repair them. When the action occurs in the
course of a process, a scheduled task is created in LANDesk
Management Suite and run immediately in order to scan or repair the