Cisco AMP for Endpoints API

GET /v1/vulnerabilities/{:sha256}/computers

Description

Provides a list of computers on which the vulnerability has been observed with given SHA-256.

The list can be filtered to show only the vulnerable computers observed for a specific time range. For example, the query string: start_time=2019-05-15&end_time=2019-05-20, will return any vulnerable computers observed during the period from 2019-05-15 to 2019-05-20.

The start_time and end_time parameters accept date and time expressed according to ISO 8601.

Query Parameters

Name Type Example Values Description
start_time Date 2019-05-22, 2019-05-22T07:05:49+00:00
end_time Date 2019-05-26, 2019-05-26T07:05:49+00:00
offset Integer 0
limit Integer 5
group_guid[] GUID 68665863-74d5-4bc1-ac7f-5477b2b6406e

Show Response Fields

Name Type Description
version String
metadata.links.self String
metadata.results.total Integer
metadata.results.current_item_count Integer
metadata.results.index Integer
metadata.results.items_per_page Integer
data Array
data[].connector_guid GUID
data[].hostname String
data[].active Boolean
data[].links.computer String
data[].links.trajectory String
data[].links.group String
data[].group_guid GUID
Write
Preview

Examples

Fetch computers on which a specific vulnerability has been observed with given SHA-256
Fetch computers on which a specific vulnerability has been observed with given SHA-256 and filter...
Fetch computers on which a specific vulnerability has been observed with given SHA-256 and filter...
Fetch computers on which a specific vulnerability has been observed with given SHA-256 and filter...

Fetch computers on which a specific vulnerability has been observed with given SHA-256

Request

Requires Authorization
GET /v1/vulnerabilities/4312CDB2EAD8FD8D2DD6D8D716F3B6E9717B3D7167A2A0495E4391312102170F/computers?offset=0&limit=5
Headers
accept: application/json
content-type: application/json
accept-encoding: identity
authorization: Basic FILTERED

cURL Edit, then copy and paste on your terminal

curl -X GET \
-H 'accept: application/json' \
-H 'content-type: application/json' \
-H 'accept-encoding: identity' \
--compressed -H 'Accept-Encoding: gzip, deflate' \
-u YOUR_API_CLIENT_ID \
'https://api.apjc.amp.cisco.com/v1/vulnerabilities/4312CDB2EAD8FD8D2DD6D8D716F3B6E9717B3D7167A2A0495E4391312102170F/computers?offset=0&limit=5'

Response

Shortened for readability

content-type: application/json; charset=utf-8
transfer-encoding: chunked
status: 200 OK
x-ratelimit-limit: 3000
x-ratelimit-reset: 1952
referrer-policy: strict-origin-when-cross-origin
x-ratelimit-remaining: 2773
x-permitted-cross-domain-policies: none
x-download-options: noopen
etag: W/"ef6bee37aecabf0b6f761a7783fa2637"
x-frame-options: SAMEORIGIN
x-ratelimit-resetdate: 2021-05-05T23:55:49Z
strict-transport-security: max-age=31536000
{
  "version": "v1.2.0",
  "metadata": {
    "links": {
      "self": "https://api.apjc.amp.cisco.com/v1/vulnerabilities/4312CDB2EAD8FD8D2DD6D8D716F3B6E9717B3D7167A2A0495E4391312102170F/computers?offset=0&limit=5"
    },
    "results": {
      "total": 1,
      "current_item_count": 1,
      "index": 0,
      "items_per_page": 5
    }
  },
  "data": [
    {
      "connector_guid": "b0f547f1-6808-42f2-9045-968d5ce3a173",
      "hostname": "Demo_AMP_Exploit_Prevention",
      "windows_processor_id": "579e6db0a81342f",
      "active": true,
      "links": {
        "computer": "https://api.apjc.amp.cisco.com/v1/computers/b0f547f1-6808-42f2-9045-968d5ce3a173",
        "trajectory": "https://api.apjc.amp.cisco.com/v1/computers/b0f547f1-6808-42f2-9045-968d5ce3a173/trajectory",
        "group": "https://api.apjc.amp.cisco.com/v1/groups/b077d6bc-bbdf-42f7-8838-a06053fbd98a"
      },
      "group_guid": "b077d6bc-bbdf-42f7-8838-a06053fbd98a"
    }
  ]
}

Fetch computers on which a specific vulnerability has been observed with given SHA-256 and filter by time range

Request

Requires Authorization
GET /v1/vulnerabilities/4312CDB2EAD8FD8D2DD6D8D716F3B6E9717B3D7167A2A0495E4391312102170F/computers?start_time=2021-04-28T22%3A20%3A00%2B00%3A00&end_time=2021-05-05T23%3A20%3A00%2B00%3A00&offset=0&limit=5
Headers
accept: application/json
content-type: application/json
accept-encoding: identity
authorization: Basic FILTERED

cURL Edit, then copy and paste on your terminal

curl -X GET \
-H 'accept: application/json' \
-H 'content-type: application/json' \
-H 'accept-encoding: identity' \
--compressed -H 'Accept-Encoding: gzip, deflate' \
-u YOUR_API_CLIENT_ID \
'https://api.apjc.amp.cisco.com/v1/vulnerabilities/4312CDB2EAD8FD8D2DD6D8D716F3B6E9717B3D7167A2A0495E4391312102170F/computers?start_time=2021-04-28T22%3A20%3A00%2B00%3A00&end_time=2021-05-05T23%3A20%3A00%2B00%3A00&offset=0&limit=5'

Response

Shortened for readability

content-type: application/json; charset=utf-8
transfer-encoding: chunked
status: 200 OK
x-ratelimit-limit: 3000
x-ratelimit-reset: 1951
referrer-policy: strict-origin-when-cross-origin
x-ratelimit-remaining: 2772
x-permitted-cross-domain-policies: none
x-download-options: noopen
etag: W/"e5bd4af285f0d2daaee079d9679d2556"
x-frame-options: SAMEORIGIN
x-ratelimit-resetdate: 2021-05-05T23:55:49Z
strict-transport-security: max-age=31536000
{
  "version": "v1.2.0",
  "metadata": {
    "links": {
      "self": "https://api.apjc.amp.cisco.com/v1/vulnerabilities/4312CDB2EAD8FD8D2DD6D8D716F3B6E9717B3D7167A2A0495E4391312102170F/computers?start_time=2021-04-28T22%3A20%3A00%2B00%3A00&end_time=2021-05-05T23%3A20%3A00%2B00%3A00&offset=0&limit=5"
    },
    "results": {
      "total": 1,
      "current_item_count": 1,
      "index": 0,
      "items_per_page": 5
    }
  },
  "data": [
    {
      "connector_guid": "b0f547f1-6808-42f2-9045-968d5ce3a173",
      "hostname": "Demo_AMP_Exploit_Prevention",
      "windows_processor_id": "579e6db0a81342f",
      "active": true,
      "links": {
        "computer": "https://api.apjc.amp.cisco.com/v1/computers/b0f547f1-6808-42f2-9045-968d5ce3a173",
        "trajectory": "https://api.apjc.amp.cisco.com/v1/computers/b0f547f1-6808-42f2-9045-968d5ce3a173/trajectory",
        "group": "https://api.apjc.amp.cisco.com/v1/groups/b077d6bc-bbdf-42f7-8838-a06053fbd98a"
      },
      "group_guid": "b077d6bc-bbdf-42f7-8838-a06053fbd98a"
    }
  ]
}

Fetch computers on which a specific vulnerability has been observed with given SHA-256 and filter by date range

Request

Requires Authorization
GET /v1/vulnerabilities/4312CDB2EAD8FD8D2DD6D8D716F3B6E9717B3D7167A2A0495E4391312102170F/computers?start_time=2021-04-28&end_time=2021-05-05&offset=0&limit=5
Headers
accept: application/json
content-type: application/json
accept-encoding: identity
authorization: Basic FILTERED

cURL Edit, then copy and paste on your terminal

curl -X GET \
-H 'accept: application/json' \
-H 'content-type: application/json' \
-H 'accept-encoding: identity' \
--compressed -H 'Accept-Encoding: gzip, deflate' \
-u YOUR_API_CLIENT_ID \
'https://api.apjc.amp.cisco.com/v1/vulnerabilities/4312CDB2EAD8FD8D2DD6D8D716F3B6E9717B3D7167A2A0495E4391312102170F/computers?start_time=2021-04-28&end_time=2021-05-05&offset=0&limit=5'

Response

Shortened for readability

content-type: application/json; charset=utf-8
transfer-encoding: chunked
status: 200 OK
x-ratelimit-limit: 3000
x-ratelimit-reset: 1950
referrer-policy: strict-origin-when-cross-origin
x-ratelimit-remaining: 2771
x-permitted-cross-domain-policies: none
x-download-options: noopen
etag: W/"7bb030db24ebb555ff814ed7d93375e2"
x-frame-options: SAMEORIGIN
x-ratelimit-resetdate: 2021-05-05T23:55:49Z
strict-transport-security: max-age=31536000
{
  "version": "v1.2.0",
  "metadata": {
    "links": {
      "self": "https://api.apjc.amp.cisco.com/v1/vulnerabilities/4312CDB2EAD8FD8D2DD6D8D716F3B6E9717B3D7167A2A0495E4391312102170F/computers?start_time=2021-04-28&end_time=2021-05-05&offset=0&limit=5"
    },
    "results": {
      "total": 1,
      "current_item_count": 1,
      "index": 0,
      "items_per_page": 5
    }
  },
  "data": [
    {
      "connector_guid": "b0f547f1-6808-42f2-9045-968d5ce3a173",
      "hostname": "Demo_AMP_Exploit_Prevention",
      "windows_processor_id": "579e6db0a81342f",
      "active": true,
      "links": {
        "computer": "https://api.apjc.amp.cisco.com/v1/computers/b0f547f1-6808-42f2-9045-968d5ce3a173",
        "trajectory": "https://api.apjc.amp.cisco.com/v1/computers/b0f547f1-6808-42f2-9045-968d5ce3a173/trajectory",
        "group": "https://api.apjc.amp.cisco.com/v1/groups/b077d6bc-bbdf-42f7-8838-a06053fbd98a"
      },
      "group_guid": "b077d6bc-bbdf-42f7-8838-a06053fbd98a"
    }
  ]
}

Fetch computers on which a specific vulnerability has been observed with given SHA-256 and filter by group_guid

Request

Requires Authorization
GET /v1/vulnerabilities/4312CDB2EAD8FD8D2DD6D8D716F3B6E9717B3D7167A2A0495E4391312102170F/computers?group_guid%5B%5D=b3ec6a58-20df-4504-b427-be2b8f922de5&offset=0&limit=5
Headers
accept: application/json
content-type: application/json
accept-encoding: identity
authorization: Basic FILTERED

cURL Edit, then copy and paste on your terminal

curl -X GET \
-H 'accept: application/json' \
-H 'content-type: application/json' \
-H 'accept-encoding: identity' \
--compressed -H 'Accept-Encoding: gzip, deflate' \
-u YOUR_API_CLIENT_ID \
'https://api.apjc.amp.cisco.com/v1/vulnerabilities/4312CDB2EAD8FD8D2DD6D8D716F3B6E9717B3D7167A2A0495E4391312102170F/computers?group_guid%5B%5D=b3ec6a58-20df-4504-b427-be2b8f922de5&offset=0&limit=5'

Response

Shortened for readability

content-type: application/json; charset=utf-8
transfer-encoding: chunked
status: 200 OK
x-ratelimit-limit: 3000
x-ratelimit-reset: 1950
referrer-policy: strict-origin-when-cross-origin
x-ratelimit-remaining: 2770
x-permitted-cross-domain-policies: none
x-download-options: noopen
etag: W/"3e2a7c7f89d479693abf4d68c184d44b"
x-frame-options: SAMEORIGIN
x-ratelimit-resetdate: 2021-05-05T23:55:49Z
strict-transport-security: max-age=31536000
{
  "version": "v1.2.0",
  "metadata": {
    "links": {
      "self": "https://api.apjc.amp.cisco.com/v1/vulnerabilities/4312CDB2EAD8FD8D2DD6D8D716F3B6E9717B3D7167A2A0495E4391312102170F/computers?group_guid%5B%5D=b3ec6a58-20df-4504-b427-be2b8f922de5&offset=0&limit=5"
    },
    "results": {
      "total": 1,
      "current_item_count": 1,
      "index": 0,
      "items_per_page": 5
    }
  },
  "data": [
    {
      "connector_guid": "b0f547f1-6808-42f2-9045-968d5ce3a173",
      "hostname": "Demo_AMP_Exploit_Prevention",
      "windows_processor_id": "579e6db0a81342f",
      "active": true,
      "links": {
        "computer": "https://api.apjc.amp.cisco.com/v1/computers/b0f547f1-6808-42f2-9045-968d5ce3a173",
        "trajectory": "https://api.apjc.amp.cisco.com/v1/computers/b0f547f1-6808-42f2-9045-968d5ce3a173/trajectory",
        "group": "https://api.apjc.amp.cisco.com/v1/groups/b077d6bc-bbdf-42f7-8838-a06053fbd98a"
      },
      "group_guid": "b077d6bc-bbdf-42f7-8838-a06053fbd98a"
    }
  ]
}