Documentation

{{docApp.title}}

{{docApp.description}}

How can we help?

{{docApp.searchError}}
{{product.name}}

Searching in {{docApp.searchFilterBySpecificBookTitle}}

{{docApp.searchResultFilteredItems.length}} results for: {{docApp.currentResultsSearchText}} in {{docApp.searchFilterBySpecificBookTitle}}
Search results have been limited. There are a total of {{docApp.searchResponse.totalResultsAvailable}} matches.

You have an odd number of " characters in your search terms - each one needs closing with a matching " character!

{{docApp.libraryHomeViewProduct.title || docApp.libraryHomeViewProduct.id}}

{{docApp.libraryHomeViewProduct.description}}

  1. {{book.title}}

{{group.title || group.id}}

{{group.description}}

  1. {{book.title}}

{{group.title}}

Add Asset Vunerability Validation

Operation Information

Creates a vulnerability validation for a vulnerability on an asset. The validation signifies that the vulnerability has been confirmed exploitable by an external tool, such as Metasploit.

See the InsightVM operation documentation for more information.

Extra Credentials

This operation requires an extra credential to be provided, stored in KeySafe, to the following specification:

  • Credential Reference: credential1
  • Credential Keysafe Key Type: Username + Password

Notes

  • When set to true, the IgnoreBadCerts input parameter will allow the operation to function even if the SSL certificate on your InsightVM deployment is self-certified or expired.

Input Parameters

Name Type Description Required Sensitive
IgnoreBadCerts boolean When set to true, the IgnoreBadCerts input parameter will allow the operation to function even if the SSL certificate on your InsightVM deployment is self-certified or expired Yes No
AssetID decimal The ID of the Asset Yes No
VulnerabilityID string The Vunerability ID Yes No
Date string The date and time the vulnerability was validated, in the ISO8601 datetime format Yes No
Key string The identifier or name of the exploit that was used to validate the vulnerability Yes No
Name string The name of the source used to validate the vulnerability, could be metasploit/other Yes No

Output Parameters

Name Type Description Required Sensitive
outcome string Outcome of the operation. Can be OK or FAIL Yes No
errors string Any errors returned by the operation No No
id decimal The ID of the created record No No
In This Document