Skip to content

Commit 21f6c03

Browse files
authored
Update cisco-vulnerability-management-source.md (#5212)
1 parent 4a50cff commit 21f6c03

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/cisco-vulnerability-management-source.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ sidebar_label: Cisco Vulnerability Management
55
tags:
66
- cloud-to-cloud
77
- cisco-vulnerability-management
8-
description: The Cisco Vulnerability Management Source provides a secure endpoint to receive assets data from Asset API and vulnerabilities data from Vulnerability API.
8+
description: The Cisco Vulnerability Management Source provides a secure endpoint to receive assets data from the Asset API and vulnerability data from the Vulnerability API.
99
---
1010
import CodeBlock from '@theme/CodeBlock';
1111
import ExampleJSON from '/files/c2c/cisco-vulnerability-management/example.json';
@@ -16,14 +16,14 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
1616

1717
<img src={useBaseUrl('img/send-data/cisco-amp.png')} alt="icon" width="90"/>
1818

19-
Cisco Vulnerability Management, formerly known as Kenna Security, provides you with the necessary contextual insights and threat intelligence to proactively intercept and respond effectively to potential exploits. The Cisco Vulnerability Management integration collects assets and vulnerability data from the [Cisco API](https://apidocs.kennasecurity.com/reference/welcome).
19+
Cisco Vulnerability Management, formerly known as Kenna Security, provides you with the necessary contextual insights and threat intelligence to proactively intercept and respond effectively to potential exploits. The Cisco Vulnerability Management integration collects **Active** assets and **Open** vulnerabilities from the [Cisco API](https://apidocs.kennasecurity.com/reference/welcome).
2020

2121
## Data collected
2222

2323
| Polling Interval | Data |
2424
| :--- | :--- |
25-
| 24 hours | [Asset](https://apidocs.kennasecurity.com/reference/search-assets) |
26-
| 24 hours | [Vulnerability](https://apidocs.kennasecurity.com/reference/search-vulnerabilities) |
25+
| 24 hours | [Active Assets](https://apidocs.kennasecurity.com/reference/search-assets) |
26+
| 24 hours | [Open Vulnerabilities](https://apidocs.kennasecurity.com/reference/search-vulnerabilities) |
2727

2828
## Setup
2929

0 commit comments

Comments
 (0)