Cisco Vulnerability Management

Overview

Cisco Vulnerability Management (formerly Kenna.VM) is a risk-based vulnerability management tool for Windows, Linux, and macOS.

Available Integrations

Product(s)Supported Asset Type(s)Integration Type
Cisco Vulnerability ManagementDevices, VulnerabilitiesSource

⚠️

Please review the configuration instructions in the section below before setting up permissions for apps.

Configuration

  1. Choose an Access Schema: A schema is a configuration template that defines a specific way to connect, authenticate, and interact with an external product. The following are the available schemas
    • API Key: Will authenticate using a generated API Key
  2. Configure the Access Schema

API Key

FieldDescriptionExample
URL*The base URL to pull assets fromhttps://api.kennasecurity.com
Skip TLS Certificate Validation*Skip certificates validation when using a certificate that is self-signed or unable to be validated through a proper certificate authority.N/A
API Key*The API Key generated within Cisco Vulnerability Managemente/Dk5xkPJB3H9rStVs7qwmb$PC1bsDF4oKqOaYkNeCeNHMxRL2BhxR6u5ZrLA0LT9oYvRVmOfjwzJ9zT8RO4yE1C7oHkT

  1. Add an Integration: Select the integration(s) you'd like to add.
  1. Configure General Information: OPTIONAL: You can use the following fields to provide additional information about your configuration.
FieldDescriptionExample
Name (optional)Uniquely identifiable attribute of the configuration to delineate other similar configurations with the existing organization.'DMZ network'
Contact Person (optional)A placeholder to input a name or email address of a contact associated with the integration.'Jane Doe'
Link to Console (optional)A placeholder to input a link to the console of the product Sevco is integrating with for quick reference and access when configuring or editing the integration.'www.product.com/devices'
Email me about frequent errorsSelect this toggle to receive an email whenever an Integration has a ≥30% error rate in a 24-hour period.n/a
  1. Activate Config: To enable this configuration select "Activate".

External Documentation

Creating credentials

You'll be asked to provide source credentials that Sevco will use to connect to Cisco Vulnerability Management. The following link will step you through creating a read-only user and assigning it an API key:

API Key Generation and Permissions

Required permissions

  • Read only

API Documentation

API Documentation - Overview

Contact Us

If you're having problems configuring an integration, or if you've found something wrong in this document, please email us at [email protected] or suggest edits directly by selecting the Suggest Edits link located in the upper right hand corner of the documentation.