This is an IBM Automation portal for Cloud Platform products. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Search existing ideas
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updateson them if they matter to you. If you can't find what you are looking for,
Post your ideas
Post an idea.
Get feedback from the IBM team and other customers to refine your idea.
Follow the idea through the IBM Ideas process.
Specific links you will want to bookmark for future use
On the WSA dashboard, 'Servers' tab, the filter is by cell name, CVE, and WAS version only, my customer prefers to have filtered by server name as well.On the 'Notification configuration', there is no filter to choose under what criteria to send n...
Ability to export events of WebSphere Automation to ELK
Customer requests audit trail at the server level and the events to be sent to ELK; events such as: 1. When a CVE is added to the database 2. When a particular server is scanned and first flagged with the CVE (e.g. due to a newly announced CVE or ...
Assign a different CVSS score to CVEs based on org assessment
Our organization may wish to change the default CVSS score for a given CVE, based on our own assessment. We gather and store this information in variety of ways, but we do have internal APIs which could be used to collect the CVSS score to be assi...
Show the Liberty features in the server details UI
Since Liberty features are used to determine security vulnerability, the server details UI should show the feature configuration. Any details that are used to determine the security posture of the server should be displayed on the server details p...
Include configuration assessment in WAS security posture
Considering including a configuration assessment as part of determining the security posture of servers. An example would be to look for older SSL configuration and flag those as insecure. In general, look for configuration that is outside of best...
Do not place IBM confidential, company confidential, or personal information into any field.