Differences
This shows you the differences between two versions of the page.
| Both sides previous revision Previous revision Next revision | Previous revision | ||
| amzn [2020/02/13 12:53] – [sorcery, product configuration automation solution] mmuze | amzn [2020/02/13 13:01] (current) – [Programmatic UI manipulation] mmuze | ||
|---|---|---|---|
| Line 8: | Line 8: | ||
| * automates assigning agents to sensors | * automates assigning agents to sensors | ||
| * automates tagging agents to help with identifying and managing them | * automates tagging agents to help with identifying and managing them | ||
| - | * purges | + | * automates purging |
| * **source code:** [[https:// | * **source code:** [[https:// | ||
| Line 25: | Line 25: | ||
| * This solution provides a way to programmatically manipulate a web UI to supplement the lack of an API for acquiring vulnerability data. | * This solution provides a way to programmatically manipulate a web UI to supplement the lack of an API for acquiring vulnerability data. | ||
| * This solution was used to ingest vulnerability findings into an ITSM (e.g. ServiceNow) that was used for a partners workflow with their end customers. | * This solution was used to ingest vulnerability findings into an ITSM (e.g. ServiceNow) that was used for a partners workflow with their end customers. | ||
| + | * The solution would authenticate with the UI and then fetch the latest scan results from a specified scan job and save the data as a CSV file that could be readily ingested into an ITSM. | ||
| * **source code:** {{ : | * **source code:** {{ : | ||
| * {{ : | * {{ : | ||
| * [[https:// | * [[https:// | ||