Skip to page contentSkip to chat
ServiceNow support
    • Community
      Ask questions, give advice, and connect with fellow ServiceNow professionals.
      Developer
      Build, test, and deploy applications
      Documentation
      Find detailed information about ServiceNow products, apps, features, and releases.
      Impact
      Accelerate ROI and amplify your expertise.
      Learning
      Build skills with instructor-led and online training.
      Partner
      Grow your business with promotions, news, and marketing tools
      ServiceNow
      Learn about ServiceNow products & solutions.
      Store
      Download certified apps and integrations that complement ServiceNow.
      Support
      Manage your instances, access self-help, and get technical support.
Encrypted fields may create duplicate vulnerability items during Qualys Import - Support and Troubleshooting
  • >
  • Knowledge Base
  • >
  • Support and Troubleshooting (Knowledge Base)
  • >
  • Encrypted fields may create duplicate vulnerability items during Qualys Import
KB0863632

Encrypted fields may create duplicate vulnerability items during Qualys Import


461 Views Last updated : Jan 3, 2025 public Copy Permalink
KB Summary by Now Assist

Summary

During importing vulnerability data from Qualys, if data encryption is being enabled on vulnerability related tables then system will probably create duplicate vulnerability items in sn_vul_vulnerable_item.LIST table.

Release

Apply to all releases.

Instructions

Currently ServiceNow does not support data encryption on vulnerability related data fields, such as Encryption Context, etc. This is because the user being used to run the Qualys scheduled jobs does not have an active user session so it has no access to the encryption keys. This will result in creation of duplicate vulnerability item records because system can not access those encrypted fields.

More details can be referred from below docs link.

https://docs.servicenow.com/csh?topicname=c_EncryptionSupport.html&version=latest

"Because contexts are tied to roles and roles are tied to users, you do not have access to keys from non-user sessions. Anything running as a system user or a scheduled job that doesn’t have a user session won’t be able to access the key to encrypt or decrypt data."

Following below steps to check whether any vulnerability related fields are being used for encryption on the instance.

1. Navigate to menu System Security > Field Encryption > Encrypted Field Configurations

2. Search by table name starts from "sn_vul_"

Below is a screenshot showing fields being used for encryption. In this case users need to disable the respective encryption context, remove the sn_vul fields from the encryption configurations and clean tables prior to the next Qualys data import.

Note: Below tables that would need to be cleaned prior to the next import test.

sn_vul_detection
sn_vul_m2m_vul_group_item
sn_vul_vulnerable_item
sn_vul_vulnerability
sn_vul_third_party_entry
sn_vul_entry
sn_vul_nvd_entry


Please refer to KB0820838 for more details regarding how to truncate the related tables.


The world works with ServiceNow.

Sign in for more! There's more content available only to authenticated users Sign in for more!
Did this KB article help you?
Did this KB article help you?

How would you rate your Now Support digital experience?

*

Very unsatisfied

Unsatisfied

Neutral

Satisfied

Very satisfied

Very unsatisfied

Unsatisfied

Neutral

Satisfied

Very satisfied

What can we improve? Please select all that apply.

What are we doing well? Please select all that apply.

Tell us more

*

Do you expect a response from this feedback?

  • Terms and conditions
  • Privacy statement
  • GDPR
  • Cookie policy
  • © 2025 ServiceNow. All rights reserved.