Skip to content

Commit e603f29

Browse files
committed
Update data connector docs: Remove 90-day limits and update asset properties
- Remove all references to 'last 90 days' from Retrieved Data sections - Update Wiz connector with detailed asset properties including cloud info, VM properties, privileges, internet exposure, etc. - Update Palo Alto connector with resource type, network interfaces, DNS name, and internet facing info - Update CrowdStrike connector with device info, cloud platform data, host details, and firmware info - Update SentinelOne connector with endpoint details, account info, machine properties, and security state - Remove time-based data retrieval limitations across all connectors
1 parent 2b614d1 commit e603f29

8 files changed

+5
-19
lines changed

exposure-management/Qualys-data-connector.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -48,8 +48,6 @@ To establish a connection with Qualys in Exposure Management, follow these steps
4848

4949
Qualys connector retrieves data on compute devices, including machines and virtual machines, and vulnerability findings from Qualys on those assets. It also retrieves some networking data to identify those devices.
5050

51-
Only devices that were modified in the last 90 days are retrieved, based on assessing the "modified" field in the Qualys asset.
52-
5351
| **Category** | **Properties** |
5452
|-------------------------|--------------------------------------------------------------------------------|
5553
| **Assets/devices** | - Gateway address<br>- FQDN<br>- IP address<br>- MAC address<br>- OS information<br>- Qualys criticality data |

exposure-management/Rapid7-data-connector.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,8 +31,6 @@ To establish a connection with Rapid7 in Exposure Management, follow these steps
3131

3232
Exposure Management retrieves data on compute devices from Rapid7, including machines and virtual machines. It also retrieves vulnerabilities reported by Rapid7 on those devices.
3333

34-
Only devices that were actively scanned in the last 90 days are retrieved, based on assessing the "last_scan_end" field in the Rapid7 asset.
35-
3634
| Category | Properties |
3735
|------------------------|----------------------------------------------------------------------------|
3836
| **Assets/devices, and data per each identifier** | - Rapid7 ID<br>- Hostname<br>- IP address<br>- mac Address<br>- OS information<br>- Rapid7 risk score<br>- Tags<br>- Rapid7 criticality data<br>- Cloud platform |

exposure-management/ServiceNow-data-connector.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -40,8 +40,6 @@ To establish a connection with ServiceNow in Exposure Management, follow these s
4040

4141
Exposure Management currently retrieves data on devices, their business application association, and business criticality. Additional data is also retrieved that helps identify the device, such as network adapter information and OS data.
4242

43-
Only devices that were active in the last 90 days are retrieved, based on assessing the "sys_updated_on" field in the ServiceNow CI.
44-
4543
The following fields are ingested via the connector:
4644

4745
| **Category** | **Properties** |

exposure-management/Tenable-data-connector.md

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -44,8 +44,6 @@ To establish a connection with Tenable in Exposure Management, follow these step
4444

4545
Exposure Management retrieves data on compute devices from Tenable, including machines and virtual machines. It also retrieves some networking data to identify those devices.
4646

47-
Only devices that were modified in the last 90 days are retrieved, based on assessing the "updated_at" field in the Tenable asset.
48-
4947
Exposure Management also retrieves vulnerability findings from Tenable on those assets.
5048

5149
The vulnerability data retrieved for Tenable is applicable to CVEs only, and not other types of vulnerabilities or misconfigurations. Tenable shows total vulnerability counts that include other non-CVE misconfigurations as well, so these counts aren't applicable to the numbers of vulnerabilities ingested to Exposure Management.

exposure-management/crowdstrike-data-connector.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -60,11 +60,9 @@ To establish a connection with CrowdStrike Falcon in Exposure Management, follow
6060

6161
CrowdStrike connector retrieves data on compute devices, including endpoints and servers monitored by CrowdStrike Falcon, along with vulnerability findings from CrowdStrike on those assets. It also retrieves network and configuration information to identify those devices.
6262

63-
Only devices that were active in the last 90 days are retrieved, based on the last activity timestamp in CrowdStrike Falcon.
64-
6563
| **Category** | **Properties** |
6664
|-------------------------|--------------------------------------------------------------------------------|
67-
| **Assets/devices** | - Device information<br>- Operating system details<br>- Network interfaces<br>- Agent status<br>- CrowdStrike criticality data |
65+
| **Assets/devices** | - Device information<br>- Cloud platform information<br>- Host name<br>- Operating system details<br>- Network interfaces<br>- IP address<br>- Mac address<br>- CrowdStrike criticality data<br>- Firmware version and vendor<br>- Internet facing |
6866
| **Vulnerability findings** | CrowdStrike retrieves CVE findings on the assets that it ingests. |
6967

7068
## Troubleshooting the CrowdStrike data connector

exposure-management/palo-alto-data-connector.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -45,7 +45,7 @@ The Palo Alto Prisma connector retrieves data on your IT assets and risks, provi
4545

4646
| **Category** | **Properties** |
4747
|-------------------------|--------------------------------------------------------------------------------|
48-
| **Assets/devices** | - Cloud provider information<br>- Resource type<br>- IP address<br>- Operating system<br>- Configuration details<br>- Palo Alto criticality data |
48+
| **Assets/devices** | - Cloud provider information<br>- Resource type<br>- Network interfaces<br>- IP address<br>- Public DNS name<br>- Operating system details<br>- Internet facing<br>- Palo Alto criticality data |
4949
| **Vulnerability findings** | Palo Alto Prisma retrieves CVE findings on the assets that it ingests. |
5050

5151
## Troubleshooting the Palo Alto Prisma data connector

exposure-management/sentinel-one-data-connector.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -51,13 +51,11 @@ To establish a connection with SentinelOne in Exposure Management, follow these
5151

5252
## Retrieved data
5353

54-
SentinelOne connector retrieves data on compute devices, including endpoints, servers, and other managed assets, along with security findings and threat detection data from SentinelOne on those assets. It also retrieves network information to identify those devices.
55-
56-
Only devices that were active in the last 90 days are retrieved, based on the last activity timestamp in SentinelOne.
54+
SentinelOne connector retrieves data on compute devices, including endpoints, servers, and other managed assets. It also retrieves network information to identify those devices.
5755

5856
| **Category** | **Properties** |
5957
|-------------------------|--------------------------------------------------------------------------------|
60-
| **Assets/devices** | - Endpoint information<br>- Operating system details<br>- Network interfaces<br>- Agent status<br>- Device classification<br>- SentinelOne criticality data |
58+
| **Assets/devices** | - Endpoint information<br>- Operating system details<br>- Account ID<br>- UUID<br>- Domain<br>- Cpu ID<br>- Machine type<br>- Machine SID<br>- Network interfaces<br>- External IP address<br>- Last logged in user details<br>- Active threats<br>- Detection state<br>- Serial number<br>- Site name<br>- Firewall enabled<br>- Active directory information |
6159
| **Security findings** | SentinelOne retrieves CVE findings on the assets that it ingests. |
6260

6361
## Troubleshooting the SentinelOne data connector

exposure-management/wiz-data-connector.md

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -55,11 +55,9 @@ To establish a connection with Wiz in Exposure Management, follow these steps:
5555

5656
Wiz connector retrieves data on compute devices. This includes virtual machines and cloud resources, along with vulnerability findings and configuration data from Wiz on those assets. It also retrieves network and configuration information to identify those devices.
5757

58-
Only devices that were active in the last 90 days are retrieved, based on the last activity timestamp in Wiz.
59-
6058
| **Category** | **Properties** |
6159
|-------------------------|--------------------------------------------------------------------------------|
62-
| **Assets/devices** | - Cloud provider information<br>- Network Interfaces<br>- VirtualMachine Properties<br>- IP address<br>- Operating system<br>- Configuration details<br>- Wiz criticality data |
60+
| **Assets/devices** | - Cloud provider information<br>- Network Interfaces<br>- IP addresses<br>- Virtual Machine Properties (Device name, Cloud provider ID)<br>- Operating system details<br>- Has high or Admin Privileges<br>- Open to Internet or Internet facing<br>- Contains sensitive data<br>- Instance type<br>- Is Container Host<br>- Is Ephemeral<br>- isManaged<br>- Tags<br>- Wiz projects<br>- First seen<br>- Last seen<br>- Wiz Criticality |
6361
| **Vulnerability findings** | Wiz retrieves CVE findings on the assets that it ingests. |
6462

6563
## Troubleshooting the Wiz data connector

0 commit comments

Comments
 (0)