Actions222
- Application Baseline Actions
- Attack Surface Actions
- Backup Software Actions
- EDR Actions
- Tags Actions
- PII Actions
- External Scan Actions
- Settings Actions
- Compliance Assessment Actions
- Reports Actions
- Compliance Actions
- Jobs Actions
- Active Directory Actions
- Retrieve Ad Roles
- Retrieve Ad User Licenses
- Retrieve Azure Licenses
- Retrieve Azure Ad Logs
- Retrieve Azure Secure Score
- Retrieve Ad Password Policies
- Retrieve Ad Groups View
- Retrieve Ad Ous View
- Retrieve Ad Gpos View
- Retrieve Ad Computers View
- Retrieve Ad Users View
- Retrieve Ad Domain Details
- Retrieve Ad Gpos Details
- Retrieve Get Ous Details
- Retrieve Get Groups Details
- Retrieve Ad Group Users
- Retrieve Ad Group Computers
- Retrieve Get User Details
- Retrieve Get Computer Details
- Retrieve Ad Roles Details
- Retrieve Ad Roles Member
- Retrieve Ad Basic Info
- Audit Log Actions
- Ad Audit Actions
- Asset Data Actions
- Retrieve Bios Info
- Retrieve Bio Info
- Retrieve Browser Extensions
- Retrieve Browser Extension
- Retrieve Ciphers View
- Retrieve Cipher View
- Retrieve Windows Protection Status
- Retrieve Window Protection Status
- Retrieve Asset Compliance Report Card
- Retrieve Asset Firewall Policy
- Retrieve Asset Installed Drivers
- Retrieve Asset Installed Driver
- Retrieve Asset Interface
- Retrieve Asset Msdt
- Retrieve Asset Ports
- Retrieve Asset Port
- Retrieve Asset Security Report Data
- Retrieve Asset Security Report Datum
- Retrieve Asset Shares
- Retrieve Asset Share
- Retrieve Asset Storages
- Retrieve Asset Storage
- Retrieve Asset Unqouted Services
- Retrieve Asset Unqouted Service
- Retrieve Asset User Shares
- Retrieve Asset User Share
- Retrieve Asset Video Info
- Retrieve Asset Windows Reboot Required
- Retrieve Asset Window Reboot Required
- Vulnerabilities Actions
- Firewall Actions
- Integration Actions
- Retrieve Integration Credentials
- Retrieve Integration Credential
- Create Integration Credential
- Update Integration Credential
- Delete Integration Credential
- Retrieve Integration Rules
- Retrieve Integration Rule
- Create Integration Rule
- Update Integration Rule
- Delete Integration Rule
- Retrieve Company Mappings
- Retrieve Company Mapping
- Create Company Mapping
- Update Company Mapping
- Delete Company Mapping
- Event Set Actions
- Ticket Template Actions
- Scheduler Actions
- Credentials Actions
- Asset Actions
- Retrieve Records
- Retrieve Assets
- Retrieve Asset
- Create Asset
- Update Asset
- Delete Asset
- Retrieve Asset Stats
- Retrieve Asset Stat
- Retrieve Asset View
- Retrieve Cron Jobs
- Retrieve Kernel Modules
- Retrieve Suid Permissions
- Retrieve Ufw Firewall Rules
- Retrieve Selinux Settings
- Retrieve Asset Iptables Rules
- Retrieve Asset Users
- Retrieve Asset Processes Running
- Retrieve Asset Services
- Retrieve Asset Patches Info
- Retrieve Asset Firewall Rules
- Retrieve Asset Registry Misconfiguration
- Retrieve Asset Open Ports
- Retrieve Notification Tickets View
- Retrieve System Events View
- Discovery Settings Actions
- Retrieve Discovery Settings
- Retrieve Discovery Setting
- Create Discovery Setting
- Update Discovery Setting
- Delete Discovery Setting
- Retrieve Agent Discoverysettings Mapping
- Retrieve Agent Discoverysetting Mapping
- Create Agent Discoverysetting Mapping
- Update Agent Discoverysetting Mapping
- Delete Agent Discoverysetting Mapping
- Auth Actions
- Company Actions
- Agent Actions
Overview
This node operation, Update Suppress Vulnerability, is designed to update suppression settings for a specific vulnerability in a system that tracks vulnerabilities. It allows users to modify which internal users are associated with suppressing a particular vulnerability by sending updated data to the API.
Common scenarios where this node would be beneficial include:
- Automatically updating suppression details when a vulnerability is acknowledged or resolved internally.
- Integrating with ticketing or incident management systems to reflect changes in vulnerability status.
- Managing user access or responsibility related to vulnerability suppression in bulk or via automation workflows.
For example, a security team could use this node to update the list of internal users who have suppressed a vulnerability after an investigation, ensuring the system reflects current suppression status.
Properties
| Name | Meaning |
|---|---|
| X USER ID | User Id header value required for authentication or identification in the API request. |
| Data | JSON object containing suppression details; typically includes an array of internal users to associate with the vulnerability suppression. Example: { "internal_users": [] } |
| Id | Numeric identifier of the vulnerability to update suppression information for. |
Output
The node outputs JSON data representing the response from the API after attempting to update the suppression information for the specified vulnerability. This typically includes confirmation of the update or details about the updated suppression state.
No binary data output is indicated.
Dependencies
- Requires an API key credential for authenticating requests to the Connect Secure API.
- The node depends on the external Connect Secure API endpoint that manages vulnerability suppression.
- Proper configuration of the API credentials within n8n is necessary for successful execution.
Troubleshooting
- Missing or invalid X USER ID: The API requires a valid user ID header; ensure this property is set correctly.
- Invalid JSON in Data property: The
datafield must be valid JSON; malformed JSON will cause errors. - Incorrect vulnerability Id: Providing an invalid or non-existent vulnerability ID may result in not found errors.
- API authentication failures: Ensure the API key credential is configured and has sufficient permissions.
- Network or connectivity issues: Verify network access to the Connect Secure API endpoint.
Common error messages might include:
- Unauthorized or 401 errors indicating missing or invalid authentication.
- 400 Bad Request errors due to malformed JSON or missing required fields.
- 404 Not Found if the vulnerability ID does not exist.
Resolving these usually involves verifying input properties, checking API credentials, and confirming the target vulnerability exists.
Links and References
- Connect Secure API Documentation (Replace with actual URL)
- n8n documentation on HTTP Request Node for understanding API interactions.
- JSON formatting tools for validating the
Dataproperty content.