Armis Intelligence Center
19 min
this connector is a data enrichment & threat intelligence product that provides the ability to enrich details on cve's, threats and devices information asset setup the connector can be authenticated as shown below api key authentication, which requires an url , and an api key as input parameters capabilities this connector provides the following capabilities search cve search device search threat notes for more information on armis security is found at https //docs ic armis com/ api documentation link https //docs ic armis com/reference/get cve search configurations armis intelligence center api key authentication authenticates using an api key configuration parameters parameter description type required url a url to the target host string required x api key api key string required verify ssl verify ssl certificate boolean optional http proxy a proxy to route requests through string optional actions search cve searches cve endpoint url /api/v1/cve/ search method get input argument name type required description parameters from number optional parameters for the search cve action parameters length number optional parameters for the search cve action parameters groupby array optional parameters for the search cve action parameters calculate array optional parameters for the search cve action parameters orderby array optional parameters for the search cve action parameters timestamp array optional parameters for the search cve action parameters timestamp\[lt] array optional parameters for the search cve action parameters timestamp\[le] array optional parameters for the search cve action parameters timestamp\[ge] array optional parameters for the search cve action parameters timestamp\[gt] array optional parameters for the search cve action parameters timestamp\[eq] array optional parameters for the search cve action parameters id array optional parameters for the search cve action parameters id\[like] array optional parameters for the search cve action parameters id\[nlike] array optional parameters for the search cve action parameters id\[eq] array optional parameters for the search cve action parameters id\[ne] array optional parameters for the search cve action parameters description array optional parameters for the search cve action parameters description\[like] array optional parameters for the search cve action parameters description\[nlike] array optional parameters for the search cve action parameters description\[eq] array optional parameters for the search cve action parameters description\[ne] array optional parameters for the search cve action parameters severity array optional parameters for the search cve action parameters severity\[lt] array optional parameters for the search cve action parameters severity\[le] array optional parameters for the search cve action parameters severity\[ge] array optional parameters for the search cve action input example {"parameters" {"from" 0,"length" 10,"groupby" \["timestamp","score"],"calculate" \["affecteddevices","bucket"],"orderby" \["timestamp","score"],"timestamp" \["2022 11 01","2021 10 01"],"timestamp\[lt]" \["2022 11 01","2021 10 01"],"timestamp\[le]" \["2022 11 01","2021 10 01"],"timestamp\[ge]" \["2022 11 01","2021 10 01"],"timestamp\[gt]" \["2022 11 01","2021 10 01"],"timestamp\[eq]" \["2022 11 01","2021 10 01"],"id" \["cve 2020 1599"],"id\[like]" \["cve 2020 1599"],"id\[nlike]" \["cve 2020 1599"],"id\[eq]" \["cve 2020 1599"],"id\[ne]" \["cve 2020 1599"],"description" \["windows spoofing vulnerability"],"description\[like]" \["windows spoofing vulnerability"],"description\[nlike]" \["windows spoofing vulnerability"],"description\[eq]" \["windows spoofing vulnerability"],"description\[ne]" \["windows spoofing vulnerability"],"severity" \["medium","high"],"severity\[lt]" \["medium","high"],"severity\[le]" \["medium","high"],"severity\[ge]" \["medium","high"],"severity\[gt]" \["medium","high"],"severity\[ne]" \["medium","high"],"severity\[eq]" \["medium","high"],"score" \[5 5,7 5],"score\[lt]" \[5 5,7 5],"score\[le]" \[5 5,7 5],"score\[ge]" \[5 5,7 5],"score\[gt]" \[5 5,7 5],"score\[ne]" \[5 5,7 5],"score\[eq]" \[5 5,7 5],"published" \["2022 11 01","2020 11 11"],"published\[lt]" \["2022 11 01","2020 11 11"],"published\[le]" \["2022 11 01","2020 11 11"],"published\[ge]" \["2022 11 01","2020 11 11"],"published\[gt]" \["2022 11 01","2020 11 11"],"published\[eq]" \["2022 11 01","2020 11 11"],"matchstatus" \["open","ignored"],"matchstatus\[ne]" \["open","ignored"],"matchstatus\[eq]" \["open","ignored"],"weaponized" \[true,false],"weaponized\[eq]" \[true,false],"hasransomware" \[true,false],"hasransomware\[eq]" \[true,false],"reportedbygooglezerodays" \[true,false],"reportedbygooglezerodays\[eq]" \[true,false],"cisaduedate" \["2022 11 01","2020 11 11"],"cisaduedate\[lt]" \["2022 11 01","2020 11 11"],"cisaduedate\[le]" \["2022 11 01","2020 11 11"],"cisaduedate\[ge]" \["2022 11 01","2020 11 11"],"cisaduedate\[gt]" \["2022 11 01","2020 11 11"],"cisaduedate\[eq]" \["2022 11 01","2020 11 11"],"numberofreferences" \[3,4],"numberofreferences\[lt]" \[3,4],"numberofreferences\[le]" \[3,4],"numberofreferences\[ge]" \[3,4],"numberofreferences\[gt]" \[3,4],"numberofreferences\[ne]" \[3,4],"numberofreferences\[eq]" \[3,4],"numberofthreatactors" \[3,4],"numberofthreatactors\[lt]" \[3,4],"numberofthreatactors\[le]" \[3,4],"numberofthreatactors\[ge]" \[3,4],"numberofthreatactors\[gt]" \[3,4],"numberofthreatactors\[ne]" \[3,4],"numberofthreatactors\[eq]" \[3,4],"device industry" \["accommodation and food services","arts, entertainment, and recreation"],"device industry\[ne]" \["accommodation and food services","arts, entertainment, and recreation"],"device industry\[eq]" \["accommodation and food services","arts, entertainment, and recreation"],"device group" \["it","ot"],"device group\[ne]" \["it","ot"],"device group\[eq]" \["it","ot"],"device category" \["computers","displays"],"device category\[ne]" \["computers","displays"],"device category\[eq]" \["computers","displays"],"device type" \["personal computers","alarms"],"device type\[ne]" \["personal computers","alarms"],"device type\[eq]" \["personal computers","alarms"],"device brand" \["apple"],"device brand\[like]" \["apple"],"device brand\[nlike]" \["apple"],"device brand\[eq]" \["apple"],"device brand\[ne]" \["apple"],"device model" \["macbook pro (15 inch, 2019)"],"device model\[like]" \["macbook pro (15 inch, 2019)"],"device model\[nlike]" \["macbook pro (15 inch, 2019)"],"device model\[eq]" \["macbook pro (15 inch, 2019)"],"device model\[ne]" \["macbook pro (15 inch, 2019)"],"device osname" \["macos"],"device osname\[like]" \["macos"],"device osname\[nlike]" \["macos"],"device osname\[eq]" \["macos"],"device osname\[ne]" \["macos"],"device osversion" \["11 6 4"],"device osversion\[like]" \["11 6 4"],"device osversion\[nlike]" \["11 6 4"],"device osversion\[eq]" \["11 6 4"],"device osversion\[ne]" \["11 6 4"],"device ostitle" \["macos 11"],"device ostitle\[like]" \["macos 11"],"device ostitle\[nlike]" \["macos 11"],"device ostitle\[eq]" \["macos 11"],"device ostitle\[ne]" \["macos 11"],"threat type" \["tor access","suspicious host"],"threat type\[ne]" \["tor access","suspicious host"],"threat type\[eq]" \["tor access","suspicious host"],"threat host" \["61 3 74 12"],"threat host\[like]" \["61 3 74 12"],"threat host\[nlike]" \["61 3 74 12"],"threat host\[eq]" \["61 3 74 12"],"threat host\[ne]" \["61 3 74 12"],"threat direction" \["inbound","outbound"],"threat direction\[ne]" \["inbound","outbound"],"threat direction\[eq]" \["inbound","outbound"]}} output parameter type description status code number http status code of the response reason string response reason phrase items object output field items items timestamp string output field items timestamp items id string unique identifier items description string output field items description items severity string output field items severity items score number score value items published string output field items published items matchstatus string status value items weaponized boolean output field items weaponized items hasransomware boolean output field items hasransomware items reportedbygooglezerodays boolean output field items reportedbygooglezerodays items cisaduedate string date value items numberofreferences number output field items numberofreferences items numberofthreatactors number output field items numberofthreatactors items device industry string output field items device industry items device group string output field items device group items device category string output field items device category items device type string type of the resource items device brand string output field items device brand items device model string output field items device model items device osname string name of the resource items device osversion string output field items device osversion items device ostitle string output field items device ostitle output example {"status code" 200,"reason" "ok","json body" {"items" {"timestamp" "2022 11 01","id" "cve 2020 1599","description" "cve","severity" "critical","score" 5 5,"published" "2022 11 01","matchstatus" "dismiss","weaponized"\ true,"hasransomware"\ true,"reportedbygooglezerodays"\ true,"cisaduedate" "2022 11 01","numberofreferences" 10,"numberofthreatactors" 10,"device industry" "forestry","device group" "iomt"},"count" 100,"total" 200,"next" 10,"prev" 10}} search device search device endpoint url /api/v1/device/ search method get input argument name type required description parameters from number optional parameters for the search device action parameters length number optional parameters for the search device action parameters groupby array optional parameters for the search device action parameters calculate array optional parameters for the search device action parameters orderby array optional parameters for the search device action parameters timestamp array optional parameters for the search device action parameters timestamp\[lt] array optional parameters for the search device action parameters timestamp\[le] array optional parameters for the search device action parameters timestamp\[ge] array optional parameters for the search device action parameters timestamp\[gt] array optional parameters for the search device action parameters timestamp\[eq] array optional parameters for the search device action parameters industry array optional parameters for the search device action parameters industry\[ne] array optional parameters for the search device action parameters industry\[eq] array optional parameters for the search device action parameters group array optional parameters for the search device action parameters group\[ne] array optional parameters for the search device action parameters group\[eq] array optional parameters for the search device action parameters category array optional parameters for the search device action parameters category\[ne] array optional parameters for the search device action parameters category\[eq] array optional parameters for the search device action parameters type array optional parameters for the search device action parameters type\[ne] array optional parameters for the search device action parameters type\[eq] array optional parameters for the search device action parameters brand array optional parameters for the search device action parameters brand\[like] array optional parameters for the search device action input example {"parameters" {"from" 0,"length" 10,"groupby" \["timestamp","industry"],"calculate" \["share","bucket"],"orderby" \["timestamp","industry"],"timestamp" \["2022 11 01","2020 10 10"],"timestamp\[lt]" \["2022 11 01","2020 10 10"],"timestamp\[le]" \["2022 11 01","2020 10 10"],"timestamp\[ge]" \["2022 11 01","2020 10 10"],"timestamp\[gt]" \["2022 11 01","2020 10 10"],"timestamp\[eq]" \["2022 11 01","2020 10 10"],"industry" \["accommodation and food services","arts, entertainment, and recreation"],"industry\[ne]" \["accommodation and food services","arts, entertainment, and recreation"],"industry\[eq]" \["accommodation and food services","arts, entertainment, and recreation"],"group" \["it","ot"],"group\[ne]" \["it","ot"],"group\[eq]" \["it","ot"],"category" \["computers","displays"],"category\[ne]" \["computers","displays"],"category\[eq]" \["computers","displays"],"type" \["personal computers","alarms"],"type\[ne]" \["personal computers","alarms"],"type\[eq]" \["personal computers","alarms"],"brand" \["apple"],"brand\[like]" \["apple"],"brand\[nlike]" \["apple"],"brand\[eq]" \["apple"],"brand\[ne]" \["apple"],"model" \["macbook pro (15 inch, 2019)"],"model\[like]" \["macbook pro (15 inch, 2019)"],"model\[nlike]" \["macbook pro (15 inch, 2019)"],"model\[eq]" \["macbook pro (15 inch, 2019)"],"model\[ne]" \["macbook pro (15 inch, 2019)"],"osname" \["macos"],"osname\[like]" \["macos"],"osname\[nlike]" \["macos"],"osname\[eq]" \["macos"],"osname\[ne]" \["macos"],"osversion" \["11 6 4"],"osversion\[like]" \["11 6 4"],"osversion\[nlike]" \["11 6 4"],"osversion\[eq]" \["11 6 4"],"osversion\[ne]" \["11 6 4"],"ostitle" \["macos 11"],"ostitle\[like]" \["macos 11"],"ostitle\[nlike]" \["macos 11"],"ostitle\[eq]" \["macos 11"],"ostitle\[ne]" \["macos 11"],"cve id" \["cve 2020 1599"],"cve id\[like]" \["cve 2020 1599"],"cve id\[nlike]" \["cve 2020 1599"],"cve id\[eq]" \["cve 2020 1599"],"cve id\[ne]" \["cve 2020 1599"],"cve description" \["windows spoofing vulnerability"],"cve description\[like]" \["windows spoofing vulnerability"],"cve description\[nlike]" \["windows spoofing vulnerability"],"cve description\[eq]" \["windows spoofing vulnerability"],"cve description\[ne]" \["windows spoofing vulnerability"],"cve severity" \["medium","high"],"cve severity\[lt]" \["medium","high"],"cve severity\[le]" \["medium","high"],"cve severity\[ge]" \["medium","high"],"cve severity\[gt]" \["medium","high"],"cve severity\[ne]" \["medium","high"],"cve severity\[eq]" \["medium","high"],"cve score" \[5 5,7 5],"cve score\[lt]" \[5 5,7 5],"cve score\[le]" \[5 5,7 5],"cve score\[ge]" \[5 5,7 5],"cve score\[gt]" \[5 5,7 5],"cve score\[ne]" \[5 5,7 5],"cve score\[eq]" \[5 5,7 5],"cve published" \["2020 11 11","2020 10 10"],"cve published\[lt]" \["2020 11 11","2020 10 10"],"cve published\[le]" \["2020 11 11","2020 10 10"],"cve published\[ge]" \["2020 11 11","2020 10 10"],"cve published\[gt]" \["2020 11 11","2020 10 10"],"cve published\[eq]" \["2020 11 11","2020 10 10"],"cve matchstatus" \["open","ignored"],"cve matchstatus\[ne]" \["open","ignored"],"cve matchstatus\[eq]" \["open","ignored"],"cve weaponized" \[true,false],"cve weaponized\[eq]" \[true,false],"cve hasransomware" \[true,false],"cve hasransomware\[eq]" \[true,false],"cve reportedbygooglezerodays" \[true,false],"cve reportedbygooglezerodays\[eq]" \[true,false],"cve cisaduedate" \["2020 11 11","2020 10 10"],"cve cisaduedate\[lt]" \["2020 11 11","2020 10 10"],"cve cisaduedate\[le]" \["2020 11 11","2020 10 10"],"cve cisaduedate\[ge]" \["2020 11 11","2020 10 10"],"cve cisaduedate\[gt]" \["2020 11 11","2020 10 10"],"cve cisaduedate\[eq]" \["2020 11 11","2020 10 10"],"cve numberofreferences" \[3,5],"cve numberofreferences\[lt]" \[3,5],"cve numberofreferences\[le]" \[3,5],"cve numberofreferences\[ge]" \[3,5],"cve numberofreferences\[gt]" \[3,5],"cve numberofreferences\[ne]" \[3,5],"cve numberofreferences\[eq]" \[3,5],"cve numberofthreatactors" \[3,5],"cve numberofthreatactors\[lt]" \[3,5],"cve numberofthreatactors\[le]" \[3,5],"cve numberofthreatactors\[ge]" \[3,5],"cve numberofthreatactors\[gt]" \[3,5],"cve numberofthreatactors\[ne]" \[3,5],"cve numberofthreatactors\[eq]" \[3,5],"threat type" \["tor access","suspicious host"],"threat type\[ne]" \["tor access","suspicious host"],"threat type\[eq]" \["tor access","suspicious host"],"threat host" \["61 3 74 12"],"threat host\[like]" \["61 3 74 12"],"threat host\[nlike]" \["61 3 74 12"],"threat host\[eq]" \["61 3 74 12"],"threat host\[ne]" \["61 3 74 12"],"threat direction" \["inbound","outbound"],"threat direction\[ne]" \["inbound","outbound"],"threat direction\[eq]" \["inbound","outbound"],"threat cve id" \["cve 2020 1599"],"threat cve id\[like]" \["cve 2020 1599"],"threat cve id\[nlike]" \["cve 2020 1599"],"threat cve id\[eq]" \["cve 2020 1599"],"threat cve id\[ne]" \["cve 2020 1599"],"threat cve description" \["windows spoofing vulnerability"],"threat cve description\[like]" \["windows spoofing vulnerability"],"threat cve description\[nlike]" \["windows spoofing vulnerability"],"threat cve description\[eq]" \["windows spoofing vulnerability"],"threat cve description\[ne]" \["windows spoofing vulnerability"],"threat cve severity" \["medium","high"],"threat cve severity\[lt]" \["medium","high"],"threat cve severity\[le]" \["medium","high"],"threat cve severity\[ge]" \["medium","high"],"threat cve severity\[gt]" \["medium","high"],"threat cve severity\[ne]" \["medium","high"],"threat cve severity\[eq]" \["medium","high"],"threat cve score" \[5 5,7 5],"threat cve score\[lt]" \[5 5,7 5],"threat cve score\[le]" \[5 5,7 5],"threat cve score\[ge]" \[5 5,7 5],"threat cve score\[gt]" \[5 5,7 5],"threat cve score\[ne]" \[5 5,7 5],"threat cve score\[eq]" \[5 5,7 5],"threat cve published" \["2020 11 11","2020 10 10"],"threat cve published\[lt]" \["2020 11 11","2020 10 10"],"threat cve published\[le]" \["2020 11 11","2020 10 10"],"threat cve published\[ge]" \["2020 11 11","2020 10 10"],"threat cve published\[gt]" \["2020 11 11","2020 10 10"],"threat cve published\[eq]" \["2020 11 11","2020 10 10"],"threat cve matchstatus" \["open","ignored"],"threat cve matchstatus\[ne]" \["open","ignored"],"threat cve matchstatus\[eq]" \["open","ignored"],"threat cve weaponized" \[true,false],"threat cve weaponized\[eq]" \[true,false],"threat cve hasransomware" \[true,false],"threat cve hasransomware\[eq]" \[true,false],"threat cve reportedbygooglezerodays" \[true,false],"threat cve reportedbygooglezerodays\[eq]" \[true,false],"threat cve cisaduedate" \["2020 11 11","2020 10 10"],"threat cve cisaduedate\[lt]" \["2020 11 11","2020 10 10"],"threat cve cisaduedate\[le]" \["2020 11 11","2020 10 10"],"threat cve cisaduedate\[ge]" \["2020 11 11","2020 10 10"],"threat cve cisaduedate\[gt]" \["2020 11 11","2020 10 10"],"threat cve cisaduedate\[eq]" \["2020 11 11","2020 10 10"],"threat cve numberofreferences" \[3,5],"threat cve numberofreferences\[lt]" \[3,5],"threat cve numberofreferences\[le]" \[3,5],"threat cve numberofreferences\[ge]" \[3,5],"threat cve numberofreferences\[gt]" \[3,5],"threat cve numberofreferences\[ne]" \[3,5],"threat cve numberofreferences\[eq]" \[3,5],"threat cve numberofthreatactors" \[3,5],"threat cve numberofthreatactors\[lt]" \[3,5],"threat cve numberofthreatactors\[le]" \[3,5],"threat cve numberofthreatactors\[ge]" \[3,5],"threat cve numberofthreatactors\[gt]" \[3,5],"threat cve numberofthreatactors\[ne]" \[3,5],"threat cve numberofthreatactors\[eq]" \[3,5]}} output parameter type description status code number http status code of the response reason string response reason phrase items object output field items items timestamp string output field items timestamp items industry string output field items industry items group string output field items group items category string output field items category items type string type of the resource items brand string output field items brand items model string output field items model items osname string name of the resource items osversion string output field items osversion items ostitle string output field items ostitle items share number output field items share items avgrisk number output field items avgrisk items bucket number output field items bucket count number count value output example {"status code" 200,"reason" "ok","json body" {"items" {"timestamp" "2022 11 01","industry" "accommodation and food services","group" "iot","category" "automotives","type" "atms","brand" "a k a manufacturer","model" "macbook pro (15 inch, 2019)","osname" "macos","osversion" "11 6 4","ostitle" "macos 11","share" 10,"avgrisk" 20,"bucket" 10},"count" 100}} search threat search threat endpoint url /api/v1/threat/ search method get input argument name type required description parameters from number optional parameters for the search threat action parameters length number optional parameters for the search threat action parameters groupby array optional parameters for the search threat action parameters calculate array optional parameters for the search threat action parameters orderby array optional parameters for the search threat action parameters timestamp array optional parameters for the search threat action parameters timestamp\[lt] array optional parameters for the search threat action parameters timestamp\[le] array optional parameters for the search threat action parameters timestamp\[ge] array optional parameters for the search threat action parameters timestamp\[gt] array optional parameters for the search threat action parameters timestamp\[eq] array optional parameters for the search threat action parameters type array optional parameters for the search threat action parameters type\[ne] array optional parameters for the search threat action parameters type\[eq] array optional parameters for the search threat action parameters host array optional parameters for the search threat action parameters host\[like] array optional parameters for the search threat action parameters host\[nlike] array optional parameters for the search threat action parameters host\[eq] array optional parameters for the search threat action parameters host\[ne] array optional parameters for the search threat action parameters direction array optional parameters for the search threat action parameters direction\[ne] array optional parameters for the search threat action parameters direction\[eq] array optional parameters for the search threat action parameters cve id array optional parameters for the search threat action parameters cve id\[like] array optional parameters for the search threat action parameters cve id\[nlike] array optional parameters for the search threat action input example {"parameters" {"from" 0,"length" 10,"groupby" \["timestamp","industry"],"calculate" \["share","bucket"],"orderby" \["timestamp","industry"],"timestamp" \["2022 11 01","2020 10 10"],"timestamp\[lt]" \["2022 11 01","2020 10 10"],"timestamp\[le]" \["2022 11 01","2020 10 10"],"timestamp\[ge]" \["2022 11 01","2020 10 10"],"timestamp\[gt]" \["2022 11 01","2020 10 10"],"timestamp\[eq]" \["2022 11 01","2020 10 10"],"type" \["personal computers","alarms"],"type\[ne]" \["personal computers","alarms"],"type\[eq]" \["personal computers","alarms"],"host" \["61 3 74 12"],"host\[like]" \["61 3 74 12"],"host\[nlike]" \["61 3 74 12"],"host\[eq]" \["61 3 74 12"],"host\[ne]" \["61 3 74 12"],"direction" \["inbound","outbound"],"direction\[ne]" \["inbound","outbound"],"direction\[eq]" \["inbound","outbound"],"cve id" \["cve 2020 1599"],"cve id\[like]" \["cve 2020 1599"],"cve id\[nlike]" \["cve 2020 1599"],"cve id\[eq]" \["cve 2020 1599"],"cve id\[ne]" \["cve 2020 1599"],"cve description" \["windows spoofing vulnerability"],"cve description\[like]" \["windows spoofing vulnerability"],"cve description\[nlike]" \["windows spoofing vulnerability"],"cve description\[eq]" \["windows spoofing vulnerability"],"cve description\[ne]" \["windows spoofing vulnerability"],"cve severity" \["medium","high"],"cve severity\[lt]" \["medium","high"],"cve severity\[le]" \["medium","high"],"cve severity\[ge]" \["medium","high"],"cve severity\[gt]" \["medium","high"],"cve severity\[ne]" \["medium","high"],"cve severity\[eq]" \["medium","high"],"cve score" \[5 5,7 5],"cve score\[lt]" \[5 5,7 5],"cve score\[le]" \[5 5,7 5],"cve score\[ge]" \[5 5,7 5],"cve score\[gt]" \[5 5,7 5],"cve score\[ne]" \[5 5,7 5],"cve score\[eq]" \[5 5,7 5],"cve published" \["2020 11 11","2020 10 10"],"cve published\[lt]" \["2020 11 11","2020 10 10"],"cve published\[le]" \["2020 11 11","2020 10 10"],"cve published\[ge]" \["2020 11 11","2020 10 10"],"cve published\[gt]" \["2020 11 11","2020 10 10"],"cve published\[eq]" \["2020 11 11","2020 10 10"],"cve matchstatus" \["open","ignored"],"cve matchstatus\[ne]" \["open","ignored"],"cve matchstatus\[eq]" \["open","ignored"],"cve weaponized" \[true,false],"cve weaponized\[eq]" \[true,false],"cve hasransomware" \[true,false],"cve hasransomware\[eq]" \[true,false],"cve reportedbygooglezerodays" \[true,false],"cve reportedbygooglezerodays\[eq]" \[true,false],"cve cisaduedate" \["2020 11 11","2020 10 10"],"cve cisaduedate\[lt]" \["2020 11 11","2020 10 10"],"cve cisaduedate\[le]" \["2020 11 11","2020 10 10"],"cve cisaduedate\[ge]" \["2020 11 11","2020 10 10"],"cve cisaduedate\[gt]" \["2020 11 11","2020 10 10"],"cve cisaduedate\[eq]" \["2020 11 11","2020 10 10"],"cve numberofreferences" \[3,5],"cve numberofreferences\[lt]" \[3,5],"cve numberofreferences\[le]" \[3,5],"cve numberofreferences\[ge]" \[3,5],"cve numberofreferences\[gt]" \[3,5],"cve numberofreferences\[ne]" \[3,5],"cve numberofreferences\[eq]" \[3,5],"cve numberofthreatactors" \[3,5],"cve numberofthreatactors\[lt]" \[3,5],"cve numberofthreatactors\[le]" \[3,5],"cve numberofthreatactors\[ge]" \[3,5],"cve numberofthreatactors\[gt]" \[3,5],"cve numberofthreatactors\[ne]" \[3,5],"cve numberofthreatactors\[eq]" \[3,5],"device industry" \["accommodation and food services","arts, entertainment, and recreation"],"device industry\[ne]" \["accommodation and food services","arts, entertainment, and recreation"],"device industry\[eq]" \["accommodation and food services","arts, entertainment, and recreation"],"device group" \["it","ot"],"device group\[ne]" \["it","ot"],"device group\[eq]" \["it","ot"],"device category" \["computers","displays"],"device category\[ne]" \["computers","displays"],"device category\[eq]" \["computers","displays"],"device type" \["personal computers","alarms"],"device type\[ne]" \["personal computers","alarms"],"device type\[eq]" \["personal computers","alarms"],"device brand" \["apple"],"device brand\[like]" \["apple"],"device brand\[nlike]" \["apple"],"device brand\[eq]" \["apple"],"device brand\[ne]" \["apple"],"device model" \["macbook pro (15 inch, 2019)"],"device model\[like]" \["macbook pro (15 inch, 2019)"],"device model\[nlike]" \["macbook pro (15 inch, 2019)"],"device model\[eq]" \["macbook pro (15 inch, 2019)"],"device model\[ne]" \["macbook pro (15 inch, 2019)"],"device osname" \["macos"],"device osname\[like]" \["macos"],"device osname\[nlike]" \["macos"],"device osname\[eq]" \["macos"],"device osname\[ne]" \["macos"],"device osversion" \["11 6 4"],"device osversion\[like]" \["11 6 4"],"device osversion\[nlike]" \["11 6 4"],"device osversion\[eq]" \["11 6 4"],"device osversion\[ne]" \["11 6 4"],"device ostitle" \["macos 11"],"device ostitle\[like]" \["macos 11"],"device ostitle\[nlike]" \["macos 11"],"device ostitle\[eq]" \["macos 11"],"device ostitle\[ne]" \["macos 11"]}} output parameter type description status code number http status code of the response reason string response reason phrase items object output field items items timestamp string output field items timestamp items type string type of the resource items host string output field items host items direction string output field items direction items cve id array unique identifier items cve description string output field items cve description items cve severity string output field items cve severity items cve score number score value items cve published string output field items cve published items cve matchstatus string status value items cve weaponized boolean output field items cve weaponized items cve hasransomware boolean output field items cve hasransomware items cve reportedbygooglezerodays boolean output field items cve reportedbygooglezerodays items cve cisaduedate string date value items cve numberofreferences number output field items cve numberofreferences items cve numberofthreatactors number output field items cve numberofthreatactors items device industry string output field items device industry items device group string output field items device group items device category string output field items device category items device type string type of the resource items device brand string output field items device brand items device model string output field items device model output example {"status code" 200,"reason" "ok","json body" {"items" {"timestamp" "2022 11 01","type" "malware communication","host" "https //docs ic armis com/","direction" "inbound","cve id" \[],"cve description" "cve","cve severity" "critical","cve score" 5 5,"cve published" "2022 11 01","cve matchstatus" "dismiss","cve weaponized"\ true,"cve hasransomware"\ true,"cve reportedbygooglezerodays"\ true,"cve cisaduedate" "2022 11 01","cve numberofreferences" 5},"count" 100,"total" 200,"next" 10,"prev" 10}} response headers header description example content type the media type of the resource application/json date the date and time at which the message was originated thu, 01 jan 2024 00 00 00 gmt