Cisco Vulnerability Management
Overview
Cisco Vulnerability Management (formerly Kenna.VM) is a risk-based vulnerability management tool for Windows, Linux, and macOS.
Available Integrations
Product(s) | Supported Asset Type(s) | Integration Type |
---|---|---|
Cisco Vulnerability Management | Devices, Vulnerabilities | Source |
Please review the configuration instructions in the section below before setting up permissions for apps.
Configuration
- Choose an Access Schema: A schema is a configuration template that defines a specific way to connect, authenticate, and interact with an external product. The following are the available schemas
- API Key: Will authenticate using a generated API Key
- Configure the Access Schema
API Key
Field | Description | Example |
---|---|---|
URL * | The base URL to pull assets from | https://api.kennasecurity.com |
Skip TLS Certificate Validation * | Skip certificates validation when using a certificate that is self-signed or unable to be validated through a proper certificate authority. | N/A |
API Key * | The API Key generated within Cisco Vulnerability Management | e/Dk5xkPJB3H9rStVs7qwmb$PC1bsDF4oKqOaYkNeCeNHMxRL2BhxR6u5ZrLA0LT9oYvRVmOfjwzJ9zT8RO4yE1C7oHkT |
- Add an Integration: Select the integration(s) you'd like to add.
- Configure General Information: OPTIONAL: You can use the following fields to provide additional information about your configuration.
Field | Description | Example |
---|---|---|
Name (optional) | Uniquely identifiable attribute of the configuration to delineate other similar configurations with the existing organization. | 'DMZ network' |
Contact Person (optional) | A placeholder to input a name or email address of a contact associated with the integration. | 'Jane Doe' |
Link to Console (optional) | A placeholder to input a link to the console of the product Sevco is integrating with for quick reference and access when configuring or editing the integration. | 'www.product.com/devices' |
Email me about frequent errors | Select this toggle to receive an email whenever an Integration has a ≥30% error rate in a 24-hour period. | n/a |
- Activate Config: To enable this configuration select "Activate".
External Documentation
Creating credentials
You'll be asked to provide source credentials that Sevco will use to connect to Cisco Vulnerability Management. The following link will step you through creating a read-only user and assigning it an API key:
API Key Generation and Permissions
Required permissions
- Read only
API Documentation
Contact Us
If you're having problems configuring an integration, or if you've found something wrong in this document, please email us at [email protected] or suggest edits directly by selecting the Suggest Edits
link located in the upper right hand corner of the documentation.
Updated 5 months ago