Skip to main content

List vulnerability protection profiles

GET 

/vulnerability-protection-profiles

Retrieve a list of vulnerability protection profiles.

Request

Query Parameters

    name string

    The name of the configuration resource

    folder string

    The folder in which the resource is defined

    snippet string

    The snippet in which the resource is defined

    device string

    The device in which the resource is defined

    offset number

    Default value: 0

    The offset into the list of results returned

    limit number

    Default value: 200

    The maximum number of results per page

Responses

OK

Schema
    data object[]
  • Array [
  • id string

    UUID of the resource

    name stringrequired

    Possible values: Value must match regular expression ^[a-zA-Z0-9._-]+$

    rules object[]
  • Array [
  • name string
    action object
    oneOf
    default object
    packet_capture

    Possible values: [disable, single-packet, extended-capture]

    severity string[]
    category

    Possible values: [any, brute-force, code-execution, code-obfuscation, command-execution, dos, exploit-kit, info-leak, insecure-credentials, overflow, phishing, protocol-anomaly, scan, sql-injection]

    cve string[]
    host string
    vendor_id string[]
    threat_name string
  • ]
  • threat_exception object[]
  • Array [
  • name string
    action object
    oneOf
    default object
    packet_capture

    Possible values: [disable, single-packet, extended-capture]

    exempt_ip object[]
  • Array [
  • name stringrequired
  • ]
  • time_attribute object
    interval integer

    Possible values: >= 1 and <= 3600

    threshold integer

    Possible values: >= 1 and <= 65535

    track_by

    Possible values: [source, destination, source-and-destination]

    notes string
  • ]
  • description string
  • ]
  • limit number

    Default value: 200

    offset number

    Default value: 0

    total number
Loading...