Skip to main content

List vulnerability protection signatures

Retrieve all vulnerability protection profile signature.

Query Parameters
  • limit number

    The maximum number of result objects to return per page.

  • offset number

    The offset of the result entry.

  • name string

    The name of the entry.

  • folder string required

    Possible values: Value must match regular expression ^[0-9a-zA-Z._-\s]{1,}$, [Shared, Mobile Users, Remote Networks, Service Connections, Mobile Users Container, Mobile Users Explicit Proxy]

    The folder on which you want to perform this operation.

Responses

List of vulnerability-protection signatures


Schema
  • data object[]
  • Array [
  • affected_host object
  • oneOf

  • client boolean
  • bugtraq string[]
  • comment string

    Possible values: <= 256 characters

  • cve string[]
  • default_action object
  • oneOf

  • allow object
  • direction string

    Possible values: [client2server, server2client, both]

  • id string

    uuid of the resource

  • reference string[]
  • severity string

    Possible values: [critical, low, high, medium, informational]

  • signature object
  • oneOf

  • combination object
  • and_condition object[]
  • Array [
  • name string
  • or_condition object[]
  • Array [
  • name string
  • threat_id string
  • ]
  • ]
  • order_free boolean

    Default value: false

  • time_attribute object
  • interval integer

    Possible values: >= 1 and <= 3600

  • threshold integer

    Possible values: >= 1 and <= 255

  • track_by string

    Possible values: [source-and-destination, source, destination]

  • threat_id integer required

    Possible values: >= 41000 and <= 6900000

    threat id range <41000-45000> and <6800001-6900000>

  • threatname string required

    Possible values: <= 1024 characters

  • vendor string[]
  • ]
  • limit number

    Default value: 200

  • offset number

    Default value: 0

  • total number
  • Loading...