How to import data from CSV

Cisco Vulnerability Management allows users to import Assets from a CSV file. Also, users can save a specific import configuration for future imports, auto-tag imports with custom tags, and get notified of any file errors before the upload process finishes.

Note: The CSV uploader is best for uploading assets or metadata on assets.  If you're looking to import vulnerabilities, try the Data Importer connector.

1. Hover over the Settings icon (Settings-icon.png) and click Upload a CSV.

dropdown2.png

 

2. Click Choose File or drag-and-drop your CSV file.

step1.png

 

3. Click Start Upload.
4. In the Map Attributes page, select the First row of CSV contains headers option if you want to ignore header data . If your CSV does not have header data, deselect this option.
5. Select an option in the Select Import Configuration drop-down menu, which allows you to select or delete past saved configurations.

Screen_Shot_2017-08-29_at_12.59.41_PM.png

5. When Cisco Vulnerability Management imports your CSV file, you must map all columns that you want to import. Below each column is a drop-down button list named Select Attribute. Only columns that have been mapped to a specific attribute will be imported.

step2-columheaders.png

 

6. Enter a value in the Import Title field and click Save Configuration.

step2-saveconfig.png

 

7. Click Next Step.
8. In the Auto-tags Assets page, all CSV imported data is given a unique tag ID for each import session. This allows you to track imported data easily. If you would like to use a Custom ID, enter it in the text field. To specify multiple tags, separate them with a comma.

autotag-assets.png

 

9. On the Finish Import page, review your data  Every field Cisco Vulnerability Management will import displays. Cisco Vulnerability Management validates every column and will notify you of any errors.

step4.png

 

10. Click Finish Import.
Contact Support if you have any import questions or concerns.

 

 

 

Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request

Comments

0 comments

Article is closed for comments.