AvantGuard - SentinelOne icon

AvantGuard - SentinelOne

AvantGuard - SentinelOne

Actions682

Overview

This node operation retrieves risk data related to applications from the AvantGuard SentinelOne API. It allows users to query application management risks with extensive filtering options such as CVE detection dates, severities, mitigation status, vendors, and more. This is useful for security analysts and IT administrators who want to monitor vulnerabilities and risks associated with applications in their environment, enabling them to prioritize remediation efforts and track risk trends over time.

Properties

Name Meaning
Additional Query Parameters A collection of optional filters and parameters to refine the risk data query. These include filters for CVE detection dates, severities, mitigation status, application names, vendors, risk scores, and pagination controls like limit, skip, and cursor. Each parameter corresponds to a query parameter sent to the API to customize the results.

Output

JSON

  • data - Array of application risk objects returned by the API, each containing detailed information about detected vulnerabilities, CVEs, mitigation status, severity, and related metadata.
  • meta - Metadata about the response such as total count, pagination cursors, and other summary information.

Dependencies

  • Requires AvantGuard SentinelOne API credentials (API key and base URL) to authenticate requests.

Troubleshooting

  • If the node returns authentication errors, verify that the API credentials are correctly configured and have sufficient permissions.
  • If no data is returned, check the filter parameters to ensure they match existing data and that the date formats are correct (ISO 8601 timestamps).
  • Pagination parameters like 'cursor' and 'skip' must be used correctly to iterate through large result sets; misuse may result in missing data.
  • Setting 'countOnly' to true will return only the count, so no detailed data will be available in the output.
  • Ensure that numeric parameters like 'limit' and 'daysFromCveDetection' are within valid ranges to avoid API errors.

Discussion