You mean, use BladeLogic Server Automation as a tool to check POODLE exploit?
AFAIK, exploiting this vulnerability is not easily accomplished. Man-in-the-middle attacks require large amounts of time and resources. While likelihood is low, Red Hat recommends implementing only TLS to avoid flaws in SSL.
We've come up with a couple of compliance templates to do that.
Thanks for the response Sean and Isaac, how would I get my paws on those Compliance Templates?