Filter out vulnerabilities from Qualys for non-running kernels and Superseded patches
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-25-2022 10:08 AM
Hello,
We are using Qualys Service Integration for VR (Qualys Integration for Security Operations: v12.1.1)
I am looking at modifying the API to exclude non-running kernels and superseded patches.
looking at this article, and Qualys API documentation i added 2 HTTP parameters, see below screen shot
arf_kernel_filter = 1
exclude_superceded_patches = 1
I now get the below error. FYI - without the above 2 parameters the integration just runs fine.Do I need to add any other parameter with this parameter in the API to support this ?
Error: Invalid response code 400 received from Qualys. Encountered process error running the integration.
I checked the HTTPs Request and it shows the parameters set by me.
can you please help ?
Thank you.
- Labels:
-
Vulnerability Response