Cisco Cisco Firepower Management Center 2000 Guia Do Programador

Página de 102
 
2-30
FireSIGHT System Host Input API Guide
 
Chapter 2      Using the Host Input API 
  Host Input API Functions
Vulnerabilities Functions
You can use the vulnerabilities functions to update the status of vulnerabilities on a host. 
For more information, see the following sections:
  •
  •
Table 2-25
SetCriticality Fields 
Field
Description
Required
Allowed Values
$source_type_id
Indicates the type of the 
host input source. 
Yes
“Application” or “Scanner”
Note you should set the 
$source_type_id
 variable to 
contain a value before invoking the 
SetCriticality
 
function, and then reference 
$source_type_id
 in your 
function call. For more information, see 
$source_id
Indicates the source ID 
for the source adding the 
host input. 
Yes
“source_id”
Note you should set the 
$source_id
 variable to contain 
the source ID before invoking the 
SetCriticality
 
function, and then reference 
$source_id
 in your 
function call. For more information, see 
.
$addr_string
Indicates the string 
containing the IP 
address or addresses for 
the affected hosts.
Yes (unless 
attribute lists 
are provided)
A comma-separated list of IP addresses, CIDR blocks, 
and ranges of IP addresses, with each address, block, or 
range enclosed in double quotes.
$attrib_list
Indicates the host 
attribute or attributes 
specifying the hosts 
affected by the host 
input.
Yes (unless IP 
addresses are 
provided)
A list of attribute value hash pairs of the format:
{attribute => “Department”,
value => “Development”},
Note that 
$attrib_list
 must be an array or reference 
an array.
$criticality
Indicates the criticality 
level for the host.
Yes
The identification number or string for the criticality 
level:
  •
“0”
 or 
“None”
  •
“1”
 or 
“Low”
  •
“2”
 or 
“Medium”
  •
“3”
 or 
“High”