Ip kaspersky rescue disk update server9/27/2023 } Copy Human Readable Output # Inventory Software Patches # DisplayName !ksc-software-patches-list Context Example # Software application patch display version. Returns limited attributes for all software application updates. Plug-in for Microsoft Exchange ActiveSync Microsoft SQL Server 2014 Transact-SQL ScriptDom } Copy Human Readable Output # Inventory Software Applications # DisplayName !ksc-software-applications-list Context Example # Subkey for application under registry key for list of add-remove progamms. There are no input arguments for this command. Returns limited attributes for all software applications. !ksc-group-delete group_id=10 flags=1 Human Readable Output #ĭelete group action was submitted ksc-software-applications-list # There is no context output for this command. Can be retrieved using the ksc-groups-list command.ġ = Delete group only if it is empty, 2 = delete group with subgroups, policies and tasks 3 = delete group with subgroups, hosts, policies and tasks. } Copy Human Readable Output # Group was added successfully # idĭeletes an administrative group. KasperskySecurit圜_WKS_RTP_AV_BASES_TIME.value If owner was changed via UpdateHostwith KLHST_WKS_CUSTOM_OWNER_ID. Operating system version release ID (for Windows 10). Service Pack version minor part (since KSC 10 SP1). Service Pack version major part (since KSC 10 SP1). Network agent build number in format A.B.C. KasperskySecurit圜_WKS_CPU_ARCHĬPU architecture from the operating system point of view (since KSC 10 SP1). The hostname that is mapped to this endpoint. The unique ID within the tool retrieving the endpoint. Can be retrieved using the ksc-hosts-list command. The unique hostname GUID to retrieve the details of. } Copy Human Readable Output # Hosts List # KLHST_WKS_HOSTNAME !ksc-hosts-list filter=KLHST_WKS_OS_NAME = "Microsoft Windows Server 2016" Context Example # ID of administration group where host is located. See the integration documentation for the search filter syntax. ksc-hosts-list #įilter which contains a condition over host attributes, e.g., KLHST_WKS_OS_NAME = "Microsoft Windows Server 2016". You can execute these commands from the Cortex XSOAR CLI, as part of an automation, or in a playbook.Īfter you successfully execute a command, a DBot message appears in the War Room with the command details. ParameterĬlick Test to validate the URLs, token, and connection. Navigate to Settings > Integrations > Servers & Services.Ĭlick Add instance to create and configure a new integration instance. Management of administration groups - ModifyĬonfigure Kaspersky Security Center on Cortex XSOAR # The user should be assigned to a role with the relevant devices in scope, and the following access rights: Note: The integration is in beta because it only covers a subset of the endpoints and API use cases. This integration was integrated and tested with version 12 of Kaspersky Security Center. The administration console for controlling all Kaspersky Lab security solutions and system administration tools. We appreciate your feedback on the quality and usability of the integration to help us identify issues, fix them, and continually improve. Updates to the integration during the beta phase might include non-backward compatible features. Since the integration is beta, it might contain bugs. This is a beta Integration, which lets you implement and test pre-release software.
0 Comments
Leave a Reply.AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |