The project key for the project you plan on storing tickets.A list of all the group IDs that require external scanners (comma separated).OptionProfile for your discovery scans in your Qualys instance and it's integer ID.SearchList and OptionProfile for your vulnerability scans in your Qualys instance and their integer IDs.Nexpose site ID (integer) that you will be using for vulnerability rescans.Templates for your vulnerability/discovery scans existing in your Nexpose instance and their IDs.An enumeration of the asset groups you plan on rescanning (comma separated).Have ~/.aws/credentials and ~/.aws/config setup (or some other form of AWS authentication).Aegis tracks all scans that cover a ticket during its remediation, which is great to have when auditors come! Aegis can handle exception and false positive tracking, and can notice when a device is taken offline. Watch your tickets close-out automatically and let users track open vulnerabilities in real time. If it fails, the ticket is reopened, and the proof can be added as a comment to the user. Aegis can automatically create dynamic scan templates and target one or many IPs with one or many scan engines to ensure the patch or configuration change was successfully implemented. Users can trigger rescans of a vulnerability by marking a ticket as fixed, or letting Aegis passively rescan tickets as they become due. No longer is the tedium of emailing spreadsheets and trusting that users are remediating vulnerabilities necessary as Aegis generates tickets that are tracked and confirmed remediated by the automation. NOTE: We're still building the Readme files for Aegis.Īegis is a security automation tool that is designed to coordinate between your vulnerability management solution and your vulnerability remediator while providing reliable and up to date information.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |