Vulnerabilities
Vulnerabilities are defined as entries based on the possible risk of allowing traffic on a port/protocol combination, and a vulnerability instance is the existence of a vulnerability.
This Public Experimental API lists, creates, updates, and deletes vulnerabilities.
Note
The Illumio Core Vulnerability Maps license is required to import Qualys report data into the Illumio PCE. For information about obtaining the Illumio Core Vulnerability Maps license, contact Illumio Support. When you obtain your license, you also receive information about how to install it.
Delete the Vulnerability License
To delete the vulnerability license, use the following CURL command from your CLI environment:
export API_KEY=api_key_username:api_key_secret
curl -i -H "Content-Type: application/json" https://pce_fqdn:8443/api/v2/orgs/org_id/licenses/9df01357-93cf-4f33-b720-e47bba783c55 -X DELETE -u $API_KEY
Replace the variables, which are entered in blue bold.
Vulnerability API Methods
Functionality | HTTP | URI |
---|---|---|
Get vulnerabilities |
|
|
Get an individual vulnerability. |
|
|
Create an individual vulnerability. |
|
|
Modify an individual vulnerability. |
|
|
Delete an individual vulnerability. |
|
|
Vulnerability Reports
This Public Experimental API creates, updates, and deletes vulnerability reports.
Note
An Illumio Core Vulnerability Maps license is required to import Qualys report data into the Illumio PCE. For information about obtaining the Illumio Core Vulnerability Maps license, contact Illumio Support. When you obtain your license, you also receive information about how to install it.
Vulnerability Reports API Methods
HTTP | Functionality | URI |
---|---|---|
| Get a collection of vulnerability reports |
|
| Get an individual vulnerability report |
|
| Create an individual vulnerability report |
|
| Update an individual vulnerability report |
|
| Delete an individual vulnerability report |
|
Get a Collection of Vulnerability Reports
This method gets a collection of all vulnerability reports in your organization.
By default, the maximum number returned by a GET collection of vulnerability reports is 500. For more than 500 vulnerability reports, use Asynchronous GET Collections.
Delete a Vulnerability Report
To delete an individual vulnerability report, specify the last element of its HREF, which can be obtained from the response from GET /vulnerabilities
.
Delete a Vulnerability
To delete an individual vulnerability, specify its HREF, which can be obtained from the response from GET /vulnerabilities
.