Filter out vulnerabilities from Qualys for non-running kernels and Superseded patches

User179407
Mega Guru

Hello,

We are using Qualys Service Integration for VR (Qualys Integration for Security Operations: v12.1.1)

I am looking at modifying the API to exclude non-running kernels and superseded patches.

looking at this article, and Qualys API documentation  i added 2 HTTP parameters, see below screen shot

arf_kernel_filter = 1

exclude_superceded_patches = 1

I now get the below error. FYI - without the above 2 parameters the integration just runs fine.Do I need to add any other parameter with this parameter in the API to support this ?

Error: Invalid response code 400 received from Qualys. Encountered process error running the integration.

I checked the HTTPs Request and it shows the parameters set by me. 

can you please help ?

Thank you.

@./andy-b2poYQ== 

@Chris McDevitt 

@Stephen Laseau 

 

find_real_file.png

 

find_real_file.png