Rapid7 Insight VM
Version: 1.0.0
InsightVM is a data-rich resource that can amplify the other solutions in your tech stack, from SIEMs and firewalls to ticketing systems.
Connect Rapid7 Insight VM with Logichub
- Navigate to Automations > Integrations.
 - Search for Rapid7 Insight VM.
 - Click Details, then the + icon. Enter the required information in the following fields.
- Label: Connection name.
 - Reference Values: Define variables here to templatize integration connections and actions. For example, you can use https://www.{{hostname}}.com where, hostname is a variable defined in this input. For more information on how to add data, see 'Add Data' Input Type for Integrations.
 - Verify SSL: Select option to verify connecting server's SSL certificate (Default is Verify SSL Certificate).
 - Base URL: Base URL (Example 'https://us.api.knowbe4.com' or 'https://eu.api.knowbe4.com' without quotes).
 - Username: Username
 - Password: Password for provided user.
 - Token: Token to leverage two-factor authentication. Note: This must be enabled on the console and be configured for the account accessing the API.
 
 - After you've entered all the details, click Connect.
 
Actions for Rapid7 Insight VM
List Assets
Returns all assets for which you have access
Input Field
Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.
| Input Name | Description | Required | 
|---|---|---|
| Limit | Jinja-templated text containing the limit of records to fetch (Default is 100). | Optional | 
| Explode Results | Explode each result in a separate row. (Default is No) | Optional | 
Output
JSON containing the following items:
{
"result": {
  "links": [
    {
      "href": "https://hostname:3780/api/3/...",
      "rel": "self"
    }
  ],
  "page": {
    "number": 6,
    "size": 10,
    "totalPages": 13,
    "totalResources": 123
  },
  "resources": [
    {
      "addresses": [
        {
          "ip": "123.245.34.235",
          "mac": "12:34:56:78:90:AB"
        }
      ],
      "assessedForPolicies": false,
      "assessedForVulnerabilities": true,
      "configurations": [
        {
          "name": "<name>",
          "value": "<value>"
        }
      ],
      "databases": [
        {
          "description": "Microsoft SQL Server",
          "id": 13,
          "name": "MSSQL"
        }
      ],
      "files": [
        {
          "attributes": [
            {
              "name": "<name>",
              "value": "<value>"
            }
          ],
          "name": "ADMIN$",
          "size": -1,
          "type": "directory"
        }
      ],
      "history": [
        {
          "date": "2018-04-09T06:23:49Z",
          "description": "",
          "scanId": 12,
          "type": "SCAN",
          "user": "",
          "version": 8,
          "vulnerabilityExceptionId": ""
        }
      ],
      "hostName": "corporate-workstation-1102DC.acme.com",
      "hostNames": [
        {
          "name": "corporate-workstation-1102DC.acme.com",
          "source": "DNS"
        }
      ],
      "id": 282,
      "ids": [
        {
          "id": "c56b2c59-4e9b-4b89-85e2-13f8146eb071",
          "source": "WQL"
        }
      ],
      "ip": "182.34.74.202",
      "links": [
        {
          "href": "https://hostname:3780/api/3/...",
          "rel": "self"
        }
      ],
      "mac": "AB:12:CD:34:EF:56",
      "os": "Microsoft Windows Server 2008 Enterprise Edition SP1",
      "osCertainty": "0.75",
      "osFingerprint": {
        "architecture": "x86",
        "configurations": [
          {
            "name": "<name>",
            "value": "<value>"
          }
        ],
        "cpe": {
          "edition": "enterprise",
          "language": "",
          "other": "",
          "part": "o",
          "product": "windows_server_2008",
          "swEdition": "",
          "targetHW": "",
          "targetSW": "",
          "update": "sp1",
          "v2.2": "cpe:/o:microsoft:windows_server_2008:-:sp1:enterprise",
          "v2.3": "cpe:2.3:o:microsoft:windows_server_2008:-:sp1:enterprise:*:*:*:*:*",
          "vendor": "microsoft",
          "version": "-"
        },
        "description": "Microsoft Windows Server 2008 Enterprise Edition SP1",
        "family": "Windows",
        "id": 35,
        "product": "Windows Server 2008 Enterprise Edition",
        "systemName": "Microsoft Windows",
        "type": "Workstation",
        "vendor": "Microsoft",
        "version": "SP1"
      },
      "rawRiskScore": 31214.3,
      "riskScore": 37457.16,
      "services": [
        {
          "configurations": [
            {
              "name": "<name>",
              "value": "<value>"
            }
          ],
          "databases": [
            {
              "description": "Microsoft SQL Server",
              "id": 13,
              "name": "MSSQL"
            }
          ],
          "family": "",
          "links": [
            {
              "href": "https://hostname:3780/api/3/...",
              "rel": "self"
            }
          ],
          "name": "CIFS Name Service",
          "port": 139,
          "product": "Samba",
          "protocol": "tcp",
          "userGroups": [
            {
              "id": 972,
              "name": "Administrators"
            }
          ],
          "users": [
            {
              "fullName": "Smith, John",
              "id": 8952,
              "name": "john_smith"
            }
          ],
          "vendor": "",
          "version": "3.5.11",
          "webApplications": [
            {
              "id": 30712,
              "pages": [
                {
                  "linkType": "html-ref",
                  "path": "/docs/config/index.html",
                  "response": 200
                }
              ],
              "root": "/",
              "virtualHost": "102.89.22.253"
            }
          ]
        }
      ],
      "software": [
        {
          "configurations": [
            {
              "name": "<name>",
              "value": "<value>"
            }
          ],
          "cpe": {
            "edition": "enterprise",
            "language": "",
            "other": "",
            "part": "o",
            "product": "windows_server_2008",
            "swEdition": "",
            "targetHW": "",
            "targetSW": "",
            "update": "sp1",
            "v2.2": "cpe:/o:microsoft:windows_server_2008:-:sp1:enterprise",
            "v2.3": "cpe:2.3:o:microsoft:windows_server_2008:-:sp1:enterprise:*:*:*:*:*",
            "vendor": "microsoft",
            "version": "-"
          },
          "description": "Microsoft Outlook 2013 15.0.4867.1000",
          "family": "Office 2013",
          "id": 0,
          "product": "Outlook 2013",
          "type": "Productivity",
          "vendor": "Microsoft",
          "version": "15.0.4867.1000"
        }
      ],
      "type": "",
      "userGroups": [
        {
          "id": 972,
          "name": "Administrators"
        }
      ],
      "users": [
        {
          "fullName": "Smith, John",
          "id": 8952,
          "name": "john_smith"
        }
      ],
      "vulnerabilities": {
        "critical": 16,
        "exploits": 4,
        "malwareKits": 0,
        "moderate": 3,
        "severe": 76,
        "total": 95
      }
    }
  ]
},
"error": null,
"has_error":false,
}
Search Assets
Returns all assets for which you have access that match the given search criteria.
Input Field
Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.
| Input Name | Description | Required | 
|---|---|---|
| Search Query | Jinja-templated JSON containing the search query. Example: {"filters": [{"field": "","lower": "","operator": "","upper": "","value": "","values": [{}]}],"match": "all"} | Required | 
| Limit | Jinja-templated text containing the limit of records to fetch (Default is 100). | Optional | 
| Explode Results | Explode each result in a separate row. (Default is No) | Optional | 
Output
JSON containing the following items:
{
"result": {
  "links": [
    {
      "href": "https://hostname:3780/api/3/...",
      "rel": "self"
    }
  ],
  "page": {
    "number": 6,
    "size": 10,
    "totalPages": 13,
    "totalResources": 123
  },
  "resources": [
    {
      "addresses": [
        {
          "ip": "123.245.34.235",
          "mac": "12:34:56:78:90:AB"
        }
      ],
      "assessedForPolicies": false,
      "assessedForVulnerabilities": true,
      "configurations": [
        {
          "name": "<name>",
          "value": "<value>"
        }
      ],
      "databases": [
        {
          "description": "Microsoft SQL Server",
          "id": 13,
          "name": "MSSQL"
        }
      ],
      "files": [
        {
          "attributes": [
            {
              "name": "<name>",
              "value": "<value>"
            }
          ],
          "name": "ADMIN$",
          "size": -1,
          "type": "directory"
        }
      ],
      "history": [
        {
          "date": "2018-04-09T06:23:49Z",
          "description": "",
          "scanId": 12,
          "type": "SCAN",
          "user": "",
          "version": 8,
          "vulnerabilityExceptionId": ""
        }
      ],
      "hostName": "corporate-workstation-1102DC.acme.com",
      "hostNames": [
        {
          "name": "corporate-workstation-1102DC.acme.com",
          "source": "DNS"
        }
      ],
      "id": 282,
      "ids": [
        {
          "id": "c56b2c59-4e9b-4b89-85e2-13f8146eb071",
          "source": "WQL"
        }
      ],
      "ip": "182.34.74.202",
      "links": [
        {
          "href": "https://hostname:3780/api/3/...",
          "rel": "self"
        }
      ],
      "mac": "AB:12:CD:34:EF:56",
      "os": "Microsoft Windows Server 2008 Enterprise Edition SP1",
      "osCertainty": "0.75",
      "osFingerprint": {
        "architecture": "x86",
        "configurations": [
          {
            "name": "<name>",
            "value": "<value>"
          }
        ],
        "cpe": {
          "edition": "enterprise",
          "language": "",
          "other": "",
          "part": "o",
          "product": "windows_server_2008",
          "swEdition": "",
          "targetHW": "",
          "targetSW": "",
          "update": "sp1",
          "v2.2": "cpe:/o:microsoft:windows_server_2008:-:sp1:enterprise",
          "v2.3": "cpe:2.3:o:microsoft:windows_server_2008:-:sp1:enterprise:*:*:*:*:*",
          "vendor": "microsoft",
          "version": "-"
        },
        "description": "Microsoft Windows Server 2008 Enterprise Edition SP1",
        "family": "Windows",
        "id": 35,
        "product": "Windows Server 2008 Enterprise Edition",
        "systemName": "Microsoft Windows",
        "type": "Workstation",
        "vendor": "Microsoft",
        "version": "SP1"
      },
      "rawRiskScore": 31214.3,
      "riskScore": 37457.16,
      "services": [
        {
          "configurations": [
            {
              "name": "<name>",
              "value": "<value>"
            }
          ],
          "databases": [
            {
              "description": "Microsoft SQL Server",
              "id": 13,
              "name": "MSSQL"
            }
          ],
          "family": "",
          "links": [
            {
              "href": "https://hostname:3780/api/3/...",
              "rel": "self"
            }
          ],
          "name": "CIFS Name Service",
          "port": 139,
          "product": "Samba",
          "protocol": "tcp",
          "userGroups": [
            {
              "id": 972,
              "name": "Administrators"
            }
          ],
          "users": [
            {
              "fullName": "Smith, John",
              "id": 8952,
              "name": "john_smith"
            }
          ],
          "vendor": "",
          "version": "3.5.11",
          "webApplications": [
            {
              "id": 30712,
              "pages": [
                {
                  "linkType": "html-ref",
                  "path": "/docs/config/index.html",
                  "response": 200
                }
              ],
              "root": "/",
              "virtualHost": "102.89.22.253"
            }
          ]
        }
      ],
      "software": [
        {
          "configurations": [
            {
              "name": "<name>",
              "value": "<value>"
            }
          ],
          "cpe": {
            "edition": "enterprise",
            "language": "",
            "other": "",
            "part": "o",
            "product": "windows_server_2008",
            "swEdition": "",
            "targetHW": "",
            "targetSW": "",
            "update": "sp1",
            "v2.2": "cpe:/o:microsoft:windows_server_2008:-:sp1:enterprise",
            "v2.3": "cpe:2.3:o:microsoft:windows_server_2008:-:sp1:enterprise:*:*:*:*:*",
            "vendor": "microsoft",
            "version": "-"
          },
          "description": "Microsoft Outlook 2013 15.0.4867.1000",
          "family": "Office 2013",
          "id": 0,
          "product": "Outlook 2013",
          "type": "Productivity",
          "vendor": "Microsoft",
          "version": "15.0.4867.1000"
        }
      ],
      "type": "",
      "userGroups": [
        {
          "id": 972,
          "name": "Administrators"
        }
      ],
      "users": [
        {
          "fullName": "Smith, John",
          "id": 8952,
          "name": "john_smith"
        }
      ],
      "vulnerabilities": {
        "critical": 16,
        "exploits": 4,
        "malwareKits": 0,
        "moderate": 3,
        "severe": 76,
        "total": 95
      }
    }
  ]
},
"error": null,
"has_error":false,
}
List Asset Groups
Returns all asset groups.
Input Field
Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.
| Input Name | Description | Required | 
|---|---|---|
| Name | Jinja-templated text containing the search pattern for the name of the asset group. Searches are case-insensitive. | Optional | 
| Type | Jinja-templated text containing the type of asset group. | Optional | 
| Limit | Jinja-templated text containing the limit of records to fetch (Default is 100). | Optional | 
| Explode Results | Explode each result in a separate row. (Default is No) | Optional | 
Output
JSON containing the following items:
{
"result": {
  "assets": 768,
  "description": "Assets with unacceptable high risk required immediate remediation.",
  "id": 61,
  "links": [
    {
      "href": "https://hostname:3780/api/3/...",
      "rel": "self"
    }
  ],
  "name": "High Risk Assets",
  "riskScore": 4457823.78,
  "searchCriteria": {
    "filters": [
      {
        "field": "",
        "lower": "",
        "operator": "",
        "upper": "",
        "value": "",
        "values": [
          {}
        ]
      }
    ],
    "match": "all"
  },
  "type": "dynamic",
  "vulnerabilities": {
    "critical": 16,
    "moderate": 3,
    "severe": 76,
    "total": 95
  }
},
"error": null,
"has_error":false,
}
List Tags
Returns all tags.
Input Field
Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.
| Input Name | Description | Required | 
|---|---|---|
| Name | Jinja-templated text containing the search pattern for the name of the tags. Searches are case-insensitive. | Optional | 
| Type | Jinja-templated text containing the type of tag. | Optional | 
| Limit | Jinja-templated text containing the limit of records to fetch (Default is 100). | Optional | 
| Explode Results | Explode each result in a separate row. (Default is No) | Optional | 
Output
JSON containing the following items:
{
"result": {
  "color": "default",
  "created": "2017-10-07T23:50:01.205Z",
  "id": 6,
  "links": [
    {
      "href": "https://hostname:3780/api/3/...",
      "rel": "self"
    }
  ],
  "name": "My Custom Tag",
  "riskModifier": 2,
  "searchCriteria": {
    "filters": [
      {
        "field": "",
        "lower": "",
        "operator": "",
        "upper": "",
        "value": "",
        "values": [
          {}
        ]
      }
    ],
    "match": "all"
  },
  "source": "custom",
  "type": "custom"
},
"error": null,
"has_error":false,
}
List Vulnerabilities
Returns all vulnerabilities that can be assessed during a scan.
Input Field
Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.
| Input Name | Description | Required | 
|---|---|---|
| Limit | Jinja-templated text containing the limit of records to fetch (Default is 100). | Optional | 
| Explode Results | Explode each result in a separate row. (Default is No) | Optional | 
Output
JSON containing the following items:
{
"result": {
  "added": "2017-10-10",
  "categories": [
    "string"
  ],
  "cves": [
    "string"
  ],
  "cvss": {
    "links": [
      {
        "href": "https://hostname:3780/api/3/...",
        "rel": "self"
      }
    ],
    "v2": {
      "accessComplexity": "M",
      "accessVector": "L",
      "authentication": "N",
      "availabilityImpact": "P",
      "confidentialityImpact": "P",
      "exploitScore": 3.3926,
      "impactScore": 6.443,
      "integrityImpact": "P",
      "score": 4.4,
      "vector": "AV:L/AC:M/Au:N/C:P/I:P/A:P"
    },
    "v3": {
      "attackComplexity": "H",
      "attackVector": "N",
      "availabilityImpact": "H",
      "confidentialityImpact": "H",
      "exploitScore": 1.6201,
      "impactScore": 5.8731,
      "integrityImpact": "H",
      "privilegeRequired": "N",
      "scope": "U",
      "score": 7.5,
      "userInteraction": "R",
      "vector": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"
    }
  },
  "denialOfService": false,
  "description": {
    "html": "A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. ...",
    "text": "<p>A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Microsoft Edge. ...</p>"
  },
  "exploits": "",
  "id": "msft-cve-2017-11804",
  "links": [
    {
      "href": "https://hostname:3780/api/3/...",
      "rel": "self"
    }
  ],
  "malwareKits": "",
  "modified": "2017-10-10",
  "pci": {
    "adjustedCVSSScore": 4,
    "adjustedSeverityScore": 3,
    "fail": true,
    "specialNotes": "",
    "status": "Fail"
  },
  "published": "2017-10-10",
  "riskScore": 123.69,
  "severity": "Severe",
  "severityScore": 4,
  "title": "Microsoft CVE-2017-11804: Scripting Engine Memory Corruption Vulnerability"
},
"error": null,
"has_error":false,
}
List Vulnerabilities Exception
Returns all exceptions defined on vulnerabilities.
Input Field
Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.
| Input Name | Description | Required | 
|---|---|---|
| Limit | Jinja-templated text containing the limit of records to fetch (Default is 100). | Optional | 
| Explode Results | Explode each result in a separate row. (Default is No) | Optional | 
Output
JSON containing the following items:
{
"result": {
  "expires": "",
  "id": "",
  "links": [
    {
      "href": "https://hostname:3780/api/3/...",
      "rel": "self"
    }
  ],
  "review": {
    "comment": "",
    "date": "",
    "links": [
      {
        "href": "https://hostname:3780/api/3/...",
        "rel": "self"
      }
    ],
    "name": "",
    "user": ""
  },
  "scope": {
    "id": "",
    "key": "",
    "links": [
      {
        "href": "https://hostname:3780/api/3/...",
        "rel": "self"
      }
    ],
    "port": "",
    "type": "",
    "vulnerability": ""
  },
  "state": "",
  "submit": {
    "comment": "",
    "date": "",
    "links": [
      {
        "href": "https://hostname:3780/api/3/...",
        "rel": "self"
      }
    ],
    "name": "",
    "reason": "",
    "user": ""
  }
},
"error": null,
"has_error":false,
}
List Sites
Retrieves a paged resource of accessible sites.
Input Field
Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.
| Input Name | Description | Required | 
|---|---|---|
| Limit | Jinja-templated text containing the limit of records to fetch (Default is 100). | Optional | 
| Explode Results | Explode each result in a separate row. (Default is No) | Optional | 
Output
JSON containing the following items:
{
"result": {
  "assets": 768,
  "connectionType": "",
  "description": "",
  "id": "",
  "importance": "",
  "lastScanTime": "",
  "links": [
    {
      "href": "https://hostname:3780/api/3/...",
      "rel": "self"
    }
  ],
  "name": "",
  "riskScore": 4457823.78,
  "scanEngine": "",
  "scanTemplate": "",
  "type": "",
  "vulnerabilities": {
    "critical": 16,
    "moderate": 3,
    "severe": 76,
    "total": 95
  }
},
"error": null,
"has_error":false,
}
List Sites Assets
Retrieves a paged resource of assets linked with the specified site.
Input Field
Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.
| Input Name | Description | Required | 
|---|---|---|
| Site Id | Jinja-templated text containing the site Id | Required | 
| Limit | Jinja-templated text containing the limit of records to fetch (Default is 100). | Optional | 
| Explode Results | Explode each result in a separate row. (Default is No) | Optional | 
Output
JSON containing the following items:
{
"result": {
  "addresses": [
    {
      "ip": "123.245.34.235",
      "mac": "12:34:56:78:90:AB"
    }
  ],
  "assessedForPolicies": false,
  "assessedForVulnerabilities": true,
  "configurations": [
    {
      "name": "<name>",
      "value": "<value>"
    }
  ],
  "databases": [
    {
      "description": "Microsoft SQL Server",
      "id": 13,
      "name": "MSSQL"
    }
  ],
  "files": [
    {
      "attributes": [
        {
          "name": "<name>",
          "value": "<value>"
        }
      ],
      "name": "ADMIN$",
      "size": -1,
      "type": "directory"
    }
  ],
  "history": [
    {
      "date": "2018-04-09T06:23:49Z",
      "description": "",
      "scanId": 12,
      "type": "SCAN",
      "user": "",
      "version": 8,
      "vulnerabilityExceptionId": ""
    }
  ],
  "hostName": "corporate-workstation-1102DC.acme.com",
  "hostNames": [
    {
      "name": "corporate-workstation-1102DC.acme.com",
      "source": "DNS"
    }
  ],
  "id": 282,
  "ids": [
    {
      "id": "c56b2c59-4e9b-4b89-85e2-13f8146eb071",
      "source": "WQL"
    }
  ],
  "ip": "182.34.74.202",
  "links": [
    {
      "href": "https://hostname:3780/api/3/...",
      "rel": "self"
    }
  ],
  "mac": "AB:12:CD:34:EF:56",
  "os": "Microsoft Windows Server 2008 Enterprise Edition SP1",
  "osCertainty": "0.75",
  "osFingerprint": {
    "architecture": "x86",
    "configurations": [
      {
        "name": "<name>",
        "value": "<value>"
      }
    ],
    "cpe": {
      "edition": "enterprise",
      "language": "",
      "other": "",
      "part": "o",
      "product": "windows_server_2008",
      "swEdition": "",
      "targetHW": "",
      "targetSW": "",
      "update": "sp1",
      "v2.2": "cpe:/o:microsoft:windows_server_2008:-:sp1:enterprise",
      "v2.3": "cpe:2.3:o:microsoft:windows_server_2008:-:sp1:enterprise:*:*:*:*:*",
      "vendor": "microsoft",
      "version": "-"
    },
    "description": "Microsoft Windows Server 2008 Enterprise Edition SP1",
    "family": "Windows",
    "id": 35,
    "product": "Windows Server 2008 Enterprise Edition",
    "systemName": "Microsoft Windows",
    "type": "Workstation",
    "vendor": "Microsoft",
    "version": "SP1"
  },
  "rawRiskScore": 31214.3,
  "riskScore": 37457.16,
  "services": [
    {
      "configurations": [
        {
          "name": "<name>",
          "value": "<value>"
        }
      ],
      "databases": [
        {
          "description": "Microsoft SQL Server",
          "id": 13,
          "name": "MSSQL"
        }
      ],
      "family": "",
      "links": [
        {
          "href": "https://hostname:3780/api/3/...",
          "rel": "self"
        }
      ],
      "name": "CIFS Name Service",
      "port": 139,
      "product": "Samba",
      "protocol": "tcp",
      "userGroups": [
        {
          "id": 972,
          "name": "Administrators"
        }
      ],
      "users": [
        {
          "fullName": "Smith, John",
          "id": 8952,
          "name": "john_smith"
        }
      ],
      "vendor": "",
      "version": "3.5.11",
      "webApplications": [
        {
          "id": 30712,
          "pages": [
            {
              "linkType": "html-ref",
              "path": "/docs/config/index.html",
              "response": 200
            }
          ],
          "root": "/",
          "virtualHost": "102.89.22.253"
        }
      ]
    }
  ],
  "software": [
    {
      "configurations": [
        {
          "name": "<name>",
          "value": "<value>"
        }
      ],
      "cpe": {
        "edition": "enterprise",
        "language": "",
        "other": "",
        "part": "o",
        "product": "windows_server_2008",
        "swEdition": "",
        "targetHW": "",
        "targetSW": "",
        "update": "sp1",
        "v2.2": "cpe:/o:microsoft:windows_server_2008:-:sp1:enterprise",
        "v2.3": "cpe:2.3:o:microsoft:windows_server_2008:-:sp1:enterprise:*:*:*:*:*",
        "vendor": "microsoft",
        "version": "-"
      },
      "description": "Microsoft Outlook 2013 15.0.4867.1000",
      "family": "Office 2013",
      "id": 0,
      "product": "Outlook 2013",
      "type": "Productivity",
      "vendor": "Microsoft",
      "version": "15.0.4867.1000"
    }
  ],
  "type": "",
  "userGroups": [
    {
      "id": 972,
      "name": "Administrators"
    }
  ],
  "users": [
    {
      "fullName": "Smith, John",
      "id": 8952,
      "name": "john_smith"
    }
  ],
  "vulnerabilities": {
    "critical": 16,
    "exploits": 4,
    "malwareKits": 0,
    "moderate": 3,
    "severe": 76,
    "total": 95
  }
},
"error": null,
"has_error":false,
}
List Sites Alerts
Retrieve all alerts defined in the site.
Input Field
Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.
| Input Name | Description | Required | 
|---|---|---|
| Site Id | Jinja-templated text containing the site Id | Required | 
| Limit | Jinja-templated text containing the limit of records to fetch (Default is 100). | Optional | 
| Explode Results | Explode each result in a separate row. (Default is No) | Optional | 
Output
JSON containing the following items:
{
"result": {
  "enabled": false,
  "enabledScanEvents": {
    "failed": false,
    "paused": false,
    "resumed": false,
    "started": false,
    "stopped": false
  },
  "enabledVulnerabilityEvents": {
    "confirmedVulnerabilities": false,
    "potentialVulnerabilities": false,
    "unconfirmedVulnerabilities": false,
    "vulnerabilitySeverity": ""
  },
  "id": "",
  "links": [
    {
      "href": "https://hostname:3780/api/3/...",
      "rel": "self"
    }
  ],
  "maximumAlerts": "",
  "name": "",
  "notification": ""
},
"error": null,
"has_error":false,
}
Get Remediation
Returns the highest-superceding rollup solutions for a vulnerability on an asset. The solution(s) selected will be the most recent and cost-effective means by which the vulnerability can be remediated.
Input Field
Choose a connection that you have previously created and then fill in the necessary information in the following input fields to complete the connection.
| Input Name | Description | Required | 
|---|---|---|
| Asset Id | Jinja-templated text containing the asset Id. | Required | 
| Vulnerability Id | Jinja-templated text containing the vulnerability Id. | Required | 
| Explode Results | Explode each result in a separate row. (Default is No) | Optional | 
Output
JSON containing the following items:
{
"result": {
  "additionalInformation": {
    "html": "",
    "text": ""
  },
  "appliesTo": "libexpat1 on Ubuntu Linux",
  "confidence": "",
  "estimate": "PT10M",
  "id": "ubuntu-upgrade-libexpat1",
  "links": [
    {
      "href": "https://hostname:3780/api/3/...",
      "rel": "self"
    }
  ],
  "matches": [
    {
      "check": "",
      "confidence": "",
      "fingerprint": {
        "description": "Ubuntu libexpat1 2.1.0-4ubuntu1.2",
        "family": "",
        "product": "libexpat1",
        "vendor": "Ubuntu",
        "version": "2.1.0-4ubuntu1.2"
      },
      "links": [
        {
          "href": "https://hostname:3780/api/3/...",
          "rel": "self"
        }
      ],
      "solution": "ubuntu-upgrade-libexpat1",
      "type": "software"
    }
  ],
  "steps": {
    "html": "<p>Use `apt-get upgrade` to upgrade libexpat1 to the latest version.</p>",
    "text": "Use `apt-get upgrade` to upgrade libexpat1 to the latest version."
  },
  "summary": {
    "html": "Upgrade libexpat1",
    "text": "Upgrade libexpat1"
  },
  "type": "configuration"
},
"error": null,
"has_error":false,
}
Release Notes
v1.0.0- Initial release with 10 new actions:List Assets,Search Assets,List Asset Groups,List Tags,List Vulnerabilities,List Vulnerabilities Exception,List Sites,List Sites Assets,List Sites Alerts,Get Remediation.
Updated 11 months ago