Axonius 6.1 Ongoing Adapter and Enforcement Action Updates
  • 11 Dec 2024
  • 78 Minutes to read
  • Dark
    Light
  • PDF

Axonius 6.1 Ongoing Adapter and Enforcement Action Updates

  • Dark
    Light
  • PDF

Article summary

The following includes new Adapters and Enforcement Actions and ongoing updates to Adapters and Enforcement Actions as they are added to Axonius 6.1.

From Version 6.1.39 adapter and Enforcement Center updates can be found in the version release notes for each specific version.

New Adapters

The following new adapters were added:

  • 1Password Account Management
    • 1Password Account Management provides information about audit activities, including actions performed by team members in a 1Password account, such as changes made to the account, vaults, groups, users, and more. (Fetches: Activities) (6.1.21.0)
  • 1touch.io
    • 1touch.io is a data discovery platform for identifying sensitive data flows and ensuring compliance. (Fetches: Devices) (6.1.27.0)
  • 3Play Media
    • 3Play Media offers video accessibility services through transcription, captioning, and audio description. (Fetches: Users) (6.1.1.0)
  • Abnormal Security
    • Abnormal Security is an email security provider that helps companies protect against targeted email attacks. (Fetches: Users) (6.1.8.0)
  • A Cloud Guru
    • A Cloud Guru is an online learning platform that specializes in teaching cloud computing and related technologies. (Fetches: Users) (6.1.0.0)
  • Acronis
    • Acronis is a backup solution providing data protection and recovery for servers and endpoints. (Fetches: Devices) (6.1.12.0)
  • Action1
    • Action1 is a cloud-based platform that automates patch management and vulnerability remediation. (Fetches: Devices) (6.1.5.1)
  • Active Directory Certificate Service (AD CS)
    • Active Directory Certificate Services (AD CS) is a Windows Server feature that allows you to build and manage PKI certificates used in software security systems. (Fetches: Certificates) (6.1.26.0)
  • Active Directory Federation Service (AD FS)
    • Active Directory Federation Service (AD FS) is a software component developed by Microsoft that provides users with single sign-on and identity access. (Fetches: Groups, User Extensions) (6.1.21.2)
  • ActZero
    • ActZero is a managed detection and response (MDR) tool that provides proactive, rapid, and automated services against cyber threats. (Fetches: Devices, Users, Vulnerabilities, SaaS Applications) (6.1.30.0)
  • AGNI
    • AGNI is an Arista Networks solution that simplifies secure onboarding, posture analysis, and network access control. It is designed to work seamlessly with Zero Trust architectures through integrated segmentation, encryption, and advanced monitoring capabilities. (Fetches: Devices, Users) (6.1.31.0)
  • Airship
    • Airship is a platform offering end-to-end solutions for mobile app engagement and customer lifecycle management. (Fetches: Devices) (6.1.3.2)
  • Akamai CDN Cloud
    • Akamai CDN Cloud is a content delivery network that accelerates web and video content delivery globally. (Fetches: Users) (6.1.12.0)
  • Alemba Service Manager
    • Alemba is an ITIL-aligned IT Service Management (ITSM) platform focusing on request fulfillment. (Fetches: Devices) (6.1.31.0)
  • Amplitude
    • Amplitude is a digital analytics platform that tracks and analyzes user behavior across various platforms. (Fetches: Users) (6.1.1.0)
  • Anecdotes
    • Anecdotes is a compliance management platform. (Fetches: Devices) (6.1.0.2)
  • Apple App Store Connect
    • Apple App Store Connect is a platform for developers to manage, release, and report on their iOS apps. (Fetches: Devices) (6.1.0.3)
  • Apple GSX
    • Apple GSX is an IT management tool that provides access to Apple’s device management and support services for authorized partners. (Fetches: Devices) (6.1.32.1)
  • AppViewX CERT+
    • AppViewX's CERT+ provides end–to–end lifecycle management for x.509 digital certificates across complex networks. (Fetches: Certificates) (6.1.29.0)
  • Aqua Security (SaaS)
    • Aqua Security provides container and cloud native cybersecurity for teams using Docker, Kubernetes, serverless, and other cloud native technologies. (Fetches: Devices, Users) (6.1.20.1)
  • Arnica.io
    • Arnica.io is a cloud-based security platform that scans APIs to identify vulnerabilities. (Fetches: Devices) (6.1.14.0)
  • Atlassian Access
    • Atlassian Access is an identity and access management solution for controlling user access to applications and resources. (Fetches: Users) (6.1.11.2)
  • Atlassian Confluence
    • Atlassian Confluence provides information on Confluence entities, like pages and blog posts, spaces, users, groups, and more. (Fetches: Users) (6.1.1.0)
  • AttackForge
    • AttackForge is a collaborative platform for managing penetration testing projects, centralizing vulnerability data and reporting. (Fetches: Devices, Vulnerabilities, SaaS applications) (6.1.30.0)
  • Automatos
    • Automatos is a platform that delivers solutions to surmount challenges in IT asset management. (Fetches: Devices) (6.1.17.0)
  • Azure DevOps (On-Prem)
    • Azure DevOps (On-Prem) is a Microsoft product that provides version control, reporting, requirements management, project management, automated builds, testing and release management capabilities. (Fetches: Users, Groups) (6.1.10.4)
  • Beeline
    • Beeline is a cloud-based system for managing and procuring employees and services. (Fetches: Users) (6.1.18.0)
  • BeyondTrust PRA Cloud
    • BeyondTrust PRA Cloud is a privileged remote access solution that provides secure remote access to critical systems without requiring a VPN, enhancing secure management of privileged accounts. (Fetches: Devices, Users) (6.1.40.0)
  • Black Duck
    • Black Duck is a software composition analysis tool for managing open source risks. (Fetches: Application Resources) (6.1.26.0)
  • Blameless
    • Blameless is a reliability engineering platform that provides incident management and post-incident analysis for operational resilience. (Fetches: Alerts/Incidents) (6.1.34.0)
  • Brinqa
    • Brinqa is a cyber risk management platform that helps businesses identify and remediate vulnerabilities. (Fetches: Users) (6.1.3.0)
  • Cadency
    • Cadency is a financial management platform that automates and controls the record-to-report process. (Fetches: Users) (6.1.30.0)
  • Censys ASM
    • Censys ASM is a tool designed to provide attack surface management by identifying and monitoring threats and exposures. (Fetches: Devices, Activities, Certificates, Application Resources) (6.1.23.1)
  • CaptivateIQ
    • CaptivateIQ is a commission management platform that automates sales compensation and incentive calculations. (Fetches: Users) (6.1.30.0)
  • Cervello
    • Cervello is a railway cybersecurity platform that monitors, protects, and manages rail operations. (Fetches: Devices) (6.1.19.0)
  • Cheap SSL Shop
    • Cheap SSL Shop is a provider of SSL/TLS certificates for websites and servers. (Fetches: Certificates) (6.1.30.0)
  • Checkmarx One
    • Checkmarx One is an application security platform that provides static and dynamic application security testing. (Fetches: Vulnerabilities, SaaS Applications, Application Services) (6.1.28.0)
  • Cilium
    • Cilium is an open source and eBPF-based networking, security, and observability tool that helps secure network connectivity between application services. (Fetches: Containers) (6.1.32.1)
  • Cisco Adaptive Security Appliance (ASA)
    • Cisco Adaptive Security Appliance (ASA) Software is the core operating system for the Cisco ASA Family, delivering firewall capabilities for ASA devices in an array of form factors. (Fetches: Devices, Users) (6.1.19.0)
  • Cisco Common Service Platform Collector (CSPC)
    • The Cisco Common Service Platform Collector (CSPC) is an SNMP-based tool that discovers and collects information from the Cisco devices installed on companies' networks. (Fetches: Devices) (6.1.6.0)
  • Citrix Application Delivery Management (ADM)
    • Citrix Application Delivery Management (ADM) is a platform enabling automation, orchestration, management, and analytics across hybrid multi-cloud environments. (Fetches: Devices) (6.1.7.0)
  • Claroty Cloud
    • Claroty Cloud is a cyber-physical security (CPS) platform for IoT security. (Fetches: Devices) (6.0.18.8)
  • Contabo
    • Contabo is a hosting provider that offers a range of solutions, including virtual private servers, dedicated servers, and colocation services. (Fetches: Devices, Users) (6.1.32.1)
  • Cornerstone
    • Cornerstone is an AI-powered talent management software that helps businesses to recruit, train, and manage their employees. (Fetches: Users) (6.1.27.0)
  • CSV - Networks
    • CSV - Networks imports information about networks from a CSV file. You can use this adapter to fetch a bulk list of network segments. (6.1.31.0)
  • CSV - URLs
    • CSV - URLs imports information about URLs from a CSV file. (6.1.31.0)
  • CyberArk Privilege Cloud
    • CyberArk Privilege Cloud is a privileged access management (PAM) solution for securing, managing, and monitoring privileged accounts. (Fetches: Users) (6.1.12.0)
  • CyberGRX (Global Risk Exchange)
    • CyberGRX (Global Risk Exchange) is a collaborative risk exchange platform for managing third-party cyber risk assessments. (Fetches: Devices) (6.1.10.0)
  • Cynerio
    • Cynerio is a healthcare IoT security platform that identifies, monitors, and secures connected medical devices. (Fetches: Devices, Vulnerabilities) (6.1.18.0)
  • Data Theorem
    • Data Theorem is an application security platform focusing on API Security, Web Security, Mobile Security, and Cloud Security. (Fetches: Devices) (6.1.32.1)
  • Dazz
    • Dazz provides automated remediation processes for applications, code, clouds, and infrastructure. (Fetches: Devices, Vulnerabilities, SaaS Applications) (6.1.26.0)
  • Dell Unisphere for PowerMax
    • Dell Unisphere for PowerMax is a management tool for administering and monitoring PowerMax storage arrays. (Fetches: Devices) (6.1.15.0)
  • DeviceTotal
    • DeviceTotal is an agentless attack surface management solution. (Fetches: Devices) (6.1.8.0)
  • Dialpad
    • Dialpad is a cloud-based communication and collaboration platform for voice, video, and messaging. (Fetches: Users) (6.1.10.7)
  • Digi
    • Digi provides IoT solutions including hardware, software, and services for connecting and managing IoT devices and networks. (Fetches: Devices) (6.1.14.0)
  • Digi Realty Portal
    • Digital Realty is a data center management platform that provides colocation, interconnection, and customized data solutions. (Fetches: Users) (6.1.32.1)
  • DNSFilter
    • DNSFilter is a cloud-based web content filtering solution that protects users from accessing malicious or inappropriate websites. (Fetches: Devices) (6.1.17.0)
  • Docker Engine
    • Docker Engine is an open-source containerization technology that helps development teams build and manage applications. (Fetches: Devices) (6.1.5.0)
  • Eagle Eye Networks (V3)
    • Eagle Eye Networks provides cloud-based video surveillance products for physical security and business operations applications. (Fetches: Devices) (6.1.38.2)
  • EasyRedir
    • EasyRedir is a URL redirection management platform that creates, analyzes, and manages redirects while automatically provisioning and renewing SSL certificates. (Fetches: Devices) (6.1.29.0)
  • EcoStruxure IT Advisor
    • EcoStruxure IT Advisor is asset and planning software that facilitates OpEx management. (Fetches: Devices) (6.1.10.0)
  • Efecte
    • Efecte is an IT service management (ITSM) and collaboration platform with a focus on SaaS security and configuration management. (Fetches: Devices) (6.1.4.0)
  • Entrust Certificate Hub
    • Entrust Certificate Hub is a centralized platform for managing digital certificates across various environments, automating certificate lifecycle management, and providing visibility into security compliance. (Fetches: Certificates) (6.1.33.0)
  • Envoy
    • Envoy is a unified workplace platform that manages various aspects of physical workspaces. (Fetches: Users) (6.1.34.0)
  • Everbridge
    • Everbridge is an emergency notification and critical event management platform for communicating during incidents or crises. (Fetches: Users) (6.1.17.0)
  • Exabeam Cloud
    • Exabeam Cloud is a cloud-based Security Information and Event Management (SIEM) solution. (Fetches: Devices) (6.1.12.0)
  • F5 Distributed Cloud
    • F5 Distributed Cloud is a cloud-based security and application management platform. (Fetches: Devices) (6.1.30.0)
  • FileWave
    • FileWave offers unified device management for all devices, platforms, and environments. (Fetches: Devices) (6.1.17.0)
  • FireMon Asset Manager
    • FireMon Asset Manager is a network visibility solution for cyber situational awareness and compliance monitoring. (Fetches: Devices) (6.1.6.0)
  • FloQast
    • FloQast is a SaaS accounting application, incorporating AI to automate close management and accounting workflows. (Fetches: Users) (6.1.30.0)
  • FortiCloud
    • FortiCloud is a cloud-based platform offering compliance, security and management services for Fortinet solutions. (Fetches: Devices) (6.1.8.0)
  • Fortify On Demand
    • Fortify On Demand delivers application security as a service, providing security testing and vulnerability management. (Fetches: Devices, Users) (6.1.17.0)
  • Foxpass
    • Foxpass is an Identity and Access Management (IAM) solution that centralizes and automates access control for servers and applications. (Fetches: Users) (6.1.27.0)
  • Freshdesk
    • Freshdesk is a cloud-based customer support platform that was founded with the mission of enabling companies of all sizes to provide great customer service. (Fetches: Users) (6.1.30.0)
  • Gainsight PX
    • Gainsight PX is a product experience platform that helps businesses understand and improve user engagement with their software products. (Fetches: Users) (6.1.20.1)
  • Generic SCIM
    • Generic SCIM, or the System for Cross-domain Identity Management, is a protocol for automating the exchange of user identity information between identity domains and IT systems. (Fetches: Users, Groups) (6.1.28.0)
  • Google Tag Manager
    • Google Tag Manager is a tag management system for web pages that allows marketers and developers to manage and deploy marketing tags and other code snippets on their websites. (Fetches: Users) (6.1.16.0)
  • Grouper
    • Grouper is an access management tool that provides attribute/role-based access control and group memberships. (Fetches: Users) (6.1.31.0)
  • Harness
    • Harness is a self-service CI/CD platform that allows engineers and DevOps to build, test, deploy, and verify software. (Fetches: Users) (6.1.30.0)
  • hCaptcha
    • hCaptcha is a privacy-focused service that protects online applications from spam, bots, and other automated threats. (Fetches: Users) (6.1.33.0)
  • Honeywell Cyber Watch
    • Honeywell Cyber Watch is a cybersecurity software that identifies and manages OT cyber threats, providing insights into vulnerabilities, configuration issues, and compliance gaps. (Fetches: Devices) (6.1.30.0)
  • Honeywell Experion
    • Honeywell Experion is an industrial automation platform that provides control, monitoring, and data analytics for optimizing manufacturing, process control, and industrial operations. (Fetches: Devices) (6.1.37.0)
  • HPE GreenLake for Compute Ops Management
    • HPE GreenLake for Compute Ops Management is a cloud-based management platform for automating and optimizing compute operations. (Fetches: Devices) (6.1.20.1)
  • Huawei iMaster MAE
    • Huawei iMaster MAE is a platform that provides automated operations and maintenance, monitoring, and optimization for 5G and mobile broadband networks. (Fetches: Devices) (6.1.32.1)
  • Hyperview DCIM
    • Hyperview DCIM is a data center infrastructure management solution that provides real-time monitoring, asset management, and capacity planning for data centers. (Fetches: Devices) (6.1.38.2)
  • IAVM Enrichment
    • IAVM is a DoD process for identifying and managing security vulnerabilities in critical systems, ensuring timely protection through alerts, bulletins, and advisories. (6.1.38.2)
  • IBM Storage Protect
    • IBM Storage Protect is an enterprise-level data protection tool that solutions for data backup and recovery. (Fetches: Devices) (6.1.31.0)
  • IBM Turbonomic
    • IBM Turbonomic is a performance and cost optimization platform for public, private, and hybrid cloud. (Fetches: Users) (6.1.11.0)
  • Intel 471
    • Intel 471 provides cyber threat intelligence to assess, identify, and manage potential risks. (Fetches: Devices, Vulnerabilities, SaaS Data) (6.1.25.0)
  • Intigriti
    • Intigriti is a platform for security testing that assesses risk to prioritize remediation. (Fetches: Devices, Vulnerabilities) (6.1.22.2)
  • IONIX (formerly Cyberpion)
    • IONIX (formerly Cyberpion) is a SaaS-based external attack surface management solution. (Fetches: Devices) (6.1.20.1)
  • IPDB (BT Diamond IP IPControl)
    • BT Diamond IP IPControl (IPDB) is IP address management (IPAM) software designed to manage and allocate IP addresses in enterprise networks. (Fetches: Devices) (6.1.14.0)
  • JDisc Discovery
    • JDisc Discovery is a network inventory and documentation tool that helps identify and manage IT assets and networks. (Fetches: Devices) (6.1.26.0)
  • JetBrains
    • JetBrains is an integrated development environment (IDE) for software development that provides a suite of tools and features to help developers write, test, and deploy code. (Fetches: Licenses) (6.1.19.0)
  • JetBrains Users
    • JetBrains is an integrated development environment (IDE) for software development that provides a suite of tools and features to help developers write, test, and deploy code. (Fetches: Users) (6.1.37.0)
  • JFrog Xray
    • JFrog Xray is a software composition analysis (SCA) tool that scans software artifacts for security vulnerabilities, open source license compliance, and software quality. (Fetches: Devices) (6.1.10.0)
  • Jira Service Management (Service Desk) Fetch Tickets
    • Jira Service Management (Service Desk) is a project management tool that helps software development teams plan, track, and release software. (Fetches: Tickets) (6.1.16.0)
  • Lattice
    • Lattice is a people management platform that allows human resources teams to engage employees and measure performance. (Fetches: Users) (6.1.13.0)
  • LeanIX
    • LeanIX is a cloud-based software platform that helps companies manage and optimize their IT infrastructure and applications. (Fetches: Devices) (6.1.6.4)
  • Lexsynergy
    • Lexsynergy is a domain management platform that helps organizations manage and protect their domain assets. (Fetches: Devices) (6.1.28.0)
  • Liquidware Stratusphere UX
    • Liquidware Stratusphere UX is a user experience monitoring and diagnostics platform that analyzes the performance of virtual and physical environments. (Fetches: Devices) (6.1.32.1)
  • LMNTRIX
    • LMNTRIX offers a security-as-a-service platform that provides threat detection and response capabilities. (Fetches: Devices) (6.1.26.0)
  • LogicGate
    • LogicGate provides a governance, risk, and compliance (GRC) platform. (Fetches: Users) (6.1.17.0)
  • Lumu
    • Lumu is a cybersecurity platform that provides real time network monitoring and threat detection. (Fetches: Users, Alerts/Incidents) (6.1.31.0)
  • ManageEngine Key Manager Plus
    • ManageEngine Key Manager Plus is a platform for managing the entire lifecycle of SSH keys and SSL certificates, including consolidation, control, monitoring, and auditing. (Fetches: Certificates) (6.1.31.0)
  • Mandiant Threat Intelligence
    • Mandiant is a cybersecurity platform offering threat intelligence, incident response, and security consulting services to detect and mitigate advanced cyber threats. (Fetches: Users) (6.1.30.0)
  • Manifestly
    • Manifestly is a checklist, workflow, and SOP platform for managing recurring team tasks. (Fetches: Users) (6.1.30.0)
  • Meta Business
    • Meta Business is a customer relationship management (CRM) and advertising platform for management of customer data, marketing campaigns, and advertising efforts across Meta's social media platforms. (Fetches: Users) (6.1.18.0)
  • MetaCompliance
    • MetaCompliance delivers security awareness training to meet compliance requirements and mitigate risks. (Fetches: Users) (6.1.33.0)
  • Microsoft Power BI
    • Microsoft Power BI is a business analytics tool for visualizing and sharing data insights across an organization. (Fetches: Users, Groups, Compute Services) (6.1.17.7)
  • Microsoft Hyper-V (PSRemote)
    • Microsoft Hyper-V is a native hypervisor. It can create virtual machines on x86-64 systems running Windows. This adapter uses PSRemoting over WinRM, with JEA capabilities. (Fetches: Devices) (6.1.38.2)
  • Microsoft Teams
    • Microsoft Teams is a workspace for real-time collaboration and communication, meetings, file and app sharing. (Fetches: Devices) (6.1.11.0)
  • Mimecast - V2
    • Mimecast provides a mail management system designed to protect email, ensure access and simplify the tasks of managing email. (Fetches: Users) (6.1.1.0)
  • Morphisec Unified Threat Prevention Platform
    • Morphisec Unified Threat Prevention Platform provides centralized control, monitoring, and configuration of Morphisec’s endpoint security solutions. (Fetches: Devices) (6.1.40.0)
  • Mosyle Manager
    • Mosyle Manager is a MDM solution designed to manage, configure, and secure Apple devices in educational and enterprise environments. (Fetches: Devices, Users) (6.1.38.2)
  • N-able N-central RMM
    • N-able N-central RMM is a remote monitoring and management platform that provides IT professionals with tools to monitor, manage, and secure network devices, endpoints, and servers. (Fetches: Devices) (6.1.32.1)
  • Nautobot
    • Nautobot is a network documentation and automation platform for managing network resources. (Fetches: Devices) (6.1.8.2)
  • NetApp Centralized Employee Directory
    • NetApp Centralized Employee Directory (CED) enables retrieval of job and contact information on NetApp employees and contractors. (Fetches: Users) (6.1.28.0)
  • Netreo
    • Netreo is an IT infrastructure monitoring platform. (Fetches: Devices) (6.1.5.1)
  • Netshot
    • Netshot is a network automation and configuration management tool that provides network device backup, compliance checks, and configuration changes. (Fetches: Devices) (6.1.33.0)
  • NeuShield Data Sentinel
    • NeuShield Data Sentinel is a data protection tool that offers ransomware defense and data recovery capabilities. (Fetches: Devices, Accounts/Tenants) (6.1.38.2)
  • Nexthink Query Language (NQL)
    • Nexthink Query Language (NQL) is a programming language developed by Nexthink for querying data from its platform. (Fetches: Devices, Users) (6.1.3.2)
  • Nozomi Vantage
    • Nozomi Vantage is a SaaS platform for global network monitoring and protection. (Fetches: Devices) (6.1.21.0)
  • Onapsis
    • Onapsis cybersecurity solutions automate the monitoring and protection of SAP and Oracle applications. (Fetches: Devices) (6.1.11.0)
  • Oracle Identity and Access Management (IAM)
    • Oracle Identity and Access Management (IAM) is a software suite that enables enterprises to manage and automate user identities. (Fetches: Users) (6.1.10.0)
  • Paycom
    • Paycom is a programmatic interface for managing user roles and permissions. (Fetches: Users) (6.1.17.0)
  • PDQ Connect
    • PDQ Connect is a remote desktop and server management tool that allows IT administrators to remotely access and manage Windows computers and servers. (Fetches: Devices) (6.1.17.0)
  • Pharos Beacon
    • Pharos Beacon is a cloud print management tool that provides centralized control of organizational print operations. (Fetches: Devices) (6.1.38.2)
  • PingID Enterprise
    • PingID Enterprise is a cloud-based multi-factor authentication (MFA) platform that supports enterprise solutions for software applications. (Fetches: Devices, Users) (6.1.30.0)
  • PingOne Advanced Identity Cloud
    • PingOne Advanced Identity Cloud is a high-performance identity store that provides the necessary encryption to protect enterprise data at rest and encryption. (Fetches: Users) (6.1.30.0)
  • PowerDNS
    • PowerDNS is an open-source DNS server program, offering both authoritative and recursive DNS services. (Fetches: Devices) (6.1.1.3)
  • Prometheus JSON
    • Prometheus JSON is an integration or exporter that allows Prometheus to scrape and collect metrics from JSON-formatted data sources for monitoring and alerting purposes. (Fetches: Devices) (6.1.32.0)
  • Proxyclick
    • Proxyclick App is a visitor management system that helps companies digitize the check-in process for employees, contractors, and visitors. (Fetches: Users) (6.1.0.3)
  • Qualys S3 Integrated
    • Qualys S3 Integrated fetches data from AWS S3 Buckets that are configured to receive data from Qualys scans. (Fetches: Devices) (6.1.32.0)
  • Qualys VMDR OT
    • Qualys VMDR OT is a cloud-based platform for asset inventory and vulnerability management of critical industrial infrastructure. (Fetches: Devices) (6.1.5.0)
  • Qualys WAS
    • Qualys WAS is a web application scanning tool for identifying vulnerabilities in web applications. (Fetches: Vulnerabilities, SaaS Applications, Application Services) (6.1.22.0)
  • Rapid7 Insight AppSec
    • Rapid7 Insight AppSec performs black-box security testing to identify vulnerabilities, triage vulnerabilities, prioritize actions, and remediate application risk. (Fetches: Devices) (6.1.18.0)
  • Red Hat Advanced Cluster Management for Kubernetes
    • Red Hat Advanced Cluster Management for Kubernetes provides visibility and control over clusters and applications from a single console. (Fetches: Devices) (6.1.32.0)
  • RemotePC
    • RemotePC is a tool for remote access and control of computers and devices. (Fetches: Devices, Users) (6.1.5.2)
  • Resolver
    • Resolver is a risk management and incident response platform that provides risk assessment, incident tracking, and reporting tools for businesses. (Fetches: Users, Roles, Groups) (6.1.32.1)
  • Responsive
    • Responsive is a strategic response management and RFP software platform. (Fetches: Users) (6.1.30.0)
  • Restorepoint
    • Restorepoint is a platform that automates network configuration backup, recovery, change auditing, and compliance analysis for multiple vendors. (Fetches: Devices) (6.1.31.0)
  • Revivn
    • Revivn is a SaaS platform that facilitates the repurposing of unused and outdated IT hardware for underserved communities. (Fetches: Devices) (6.1.30.0)
  • Safenames
    • Safenames is a domain management and brand protection service that supports companies in managing their domain portfolios, safeguarding trademarks, and ensuring online compliance. (Fetches: Devices) (6.1.30.0)
  • SafeNet Trusted Access
    • SafeNet Trusted Access is a cloud-based access management solution that provides secure access to applications and data. (Fetches: Users) (6.1.30.0)
  • Safe Security
    • Safe Security is a platform that provides real-time cyber risk quantification and management. (Fetches: Devices, Users) (6.1.24.0)
  • ScreenCloud Studio
    • ScreenCloud Studio is a digital signage platform that allows businesses to create, manage, and display content across variety of screen types and locations. (Fetches: Users) (6.1.32.1)
  • Seceon aiXDR
    • Seceon aiXDR is an extended detection and response platform that provides comprehensive threat detection, automated response, and continuous monitoring across endpoints, networks, and cloud environments. (Fetches: Devices) (6.1.32.1)
  • Securonix SNYPR
    • Securonix SNYPR is a platform for security analytics, using machine learning to detect and respond to threats. (Fetches: Devices, Users) (6.1.25.0)
  • Silverfort
    • Silverfort is a unified identity protection platform that integrates with IAM solutions to provide secure access to company resources. (Fetches: Users) (6.1.25.4)
  • SolarWinds Pingdom
    • SolarWinds Pingdom is a website and server monitoring tool that helps organizations track the uptime, performance, and availability of their web-based applications and services. (Fetches: Users) (6.1.16.0)
  • SPEKTRA
    • NTT SPEKTRA (Sentient Platform for Network Transformation) is a managed network services platform. (Fetches: Devices) (6.1.0.2)
  • Spirent Velocity
    • Spirent Velocity is a software deployment and release management tool used for automating application deployments. (Fetches: Devices) (6.1.17.6)
  • SteelCloud
    • SteelCloud is an automated compliance and configuration management tool designed to quickly implement and maintain security policies, such as STIGs and CIS benchmarks, for enterprise and government systems. (Fetches: Devices) (6.1.37.0)
  • Sysdig - Secure
    • Sysdig is a monitoring, troubleshooting, cost-optimization, and alerting suite for containers, cloud, and Kubernetes environments. (Fetches: Devices) (6.1.27.0)
  • Tangoe Managed Mobility Services (MMS)
    • Tangoe Managed Mobility Services (MMS) provides end-to-end mobile lifecycle management. (Fetches: Devices, Users) (6.1.6.0)
  • Teleport
    • Teleport is an open-source tool that provides access to servers and cloud applications using SSH, Kubernetes and HTTPS. (Feches: Users) (6.1.31.0)
  • Trace3 LAMP
    • Trace3 Technology Lifecycle Management Platform (LAMP) is an IT Asset Management (ITAM) platform. (Fetches: Devices) (6.1.4.2)
  • Twilio
    • Twilio is a customer engagement platform that offers programmable communication solutions. (Fetches: Accounts/Tenants) (6.1.30.0)
  • Ubiquiti Networks UniFi Cloud Controller
    • The UniFi Cloud Controller is a wireless network management software solution for managing multiple wireless networks using a web browser via the Cloud. (Fetches: Devices) (6.1.38.2)
  • UnifiedFX PhoneView
    • UnifiedFX PhoneView is a Cisco Preferred Solutions Partner which offers Cisco Phone Management Software. (Fetches: Devices) (6.0.18.8)
  • VAST Data
    • VAST Data is a data storage platform that provides scalable, high-performance storage solutions optimized for large-scale data workloads and enterprise applications. (Fetches: Devices, Users, Compute Services, Network Services) (6.1.32.1)
  • Venminder
    • Venminder is a third-party risk management tool that helps manage and monitor the entire vendor lifecycle, including on/off-boarding, contract tracking, and risk assessment. (Fetches: SaaS Applications) (6.1.33.0)
  • Veritas NetBackup
    • Veritas NetBackup is an enterprise backup solution offering data management, automation, artificial intelligence, and elastic architecture. (Fetches: Devices) (6.1.2.2)
  • Verkada
    • Verkada is a cloud-based security platform offering video surveillance, access control, and environmental sensors. (Fetches: Devices, Users) (6.1.19.0)
  • VulnCheck
    • VulnCheck is a cybersecurity platform that identifies and assesses vulnerabilities within IT infrastructure for threat management. (6.1.39.0)
  • Windows Server Update Services (WSUS) SQL
    • Windows Server Update Services (WSUS) - SQL, previously Software Update Services (SUS), enables administrators to manage the distribution of updates and hotfixes released for Microsoft products. (Devices) (6.1.1.0)
  • Workday Adaptive Planning
    • Workday Adaptive Planning is a cloud-based planning and budgeting platform that helps organizations manage financial, workforce, and operational planning, providing data-driven insights for decision-making. (Users) (6.1.33.0)
  • Wrike
    • Wrike is software designed to help teams plan, organize, manage, and track tasks and projects. (Users) (6.1.18.0)
  • Yokogawa CIM
    • Yokogawa CIM (Consolidated Instrumentation Management) is an industrial automation tool that provides centralized monitoring, management, and optimization of instrumentation and control systems. (Devices) (6.1.39.0)
  • Zscaler Client Connector
    • Zscaler Client Connector enables secure access to business applications from any device. (Fetches: Devices) (6.0.18.8)

Updated Adapters

The following adapters were enhanced:

  • Abnormal Security
    • Email Domain was added to connection parameters. (6.1.14.0)
    • Added the option to enrich the employee with information from the threats_export/csv endpoint. (6.1.35.0)
    • Added the option to enrich the employee with with threat info from the threats endpoint. (6.1.35.0)
  • Absolute - Added the option to fetch only the latest installed app version of devices. (6.1.13.0)
  • Admin by Request - This adapter now fetches tickets as assets. (6.1.34.0)
  • Adobe - Added support for fetching licenses along with other SaaS data. (6.1.5.0)
  • Adobe Acrobat Sign
    • Added the option to fetch full data per user. (6.1.5.0)
    • Added the capability to enter a comma-separated list of users to filter with specified user statuses. (6.1.5.0)
  • Adobe Workfront - Added the option to use API Key authentication. (6.1.35.0)
  • Airlock Digital
    • Added the option to fetch information about group policies. (6.1.3.0)
    • Port was added to connection parameters. (6.1.27.0)
    • Akamai EEA - Added options to ignore specific app names and to only fetch apps that are associated with directories. (6.1.38.2)
  • This adapter now fetches firewall rules as assets. (6.1.35.0)
  • This adapter now fetches domains and URLs as assets. (6.1.35.0)
  • Aruba ClearPass
    • Added the option to set endpoint devices as network infrastructure devices. (6.1.1.5)
    • Added the option to fetch only devices with attributes. (6.1.34.0)
  • Aruba Mobility Master - Added the option to fetch LLDP neighbors as devices. (6.1.31.0)
  • AssetPanda
    • Added the option to parse the invoice number. (6.1.8.0)
    • Added the option to parse the PO number. (6.1.8.0)
    • Added the option to parse the employee status field. (6.1.8.0)
    • Added the option to fetch employee group assets as users. (6.1.28.0)
    • This adapter now supports API version 3.1. (6.1.29.0)
  • Atlassian (Formerly Atlassian Jira Software) - Added the capability to enter the number of users per a single request. (6.1.27.5)
  • Atlassian Access
    • SCIM Directory ID and ORG ID were added to connection parameters. (6.1.31.4)
    • Added the option to fetch users of the sub-type SCIM user from Endpoint: scim/directory/{SCIM Directory ID}/Users. (6.1.31.4)
    • Added the option to fetch users of the sub-type ORG user from Endpoint: admin/v1/orgs/{ORG ID}/users. (6.1.31.4)
  • Auth0 - Added the option to fetch user roles. (6.1.30.0)
  • Automox - Added the capability to set the number of entities returned per page request. (6.1.31.0)
  • AWS
    • Added the option to split subnets of a VPC network into individual assets. (6.1.3.0)
    • Added the option to fetch CloudFormation Stacks as assets. (6.1.4.0)
    • Added the option to fetch AWS step functions as assets. (6.1.4.0)
    • Added the option to fetch AWS Service Catalogs as assets. (6.1.4.0)
    • Added the option to fetch CloudWatch Alarms as assets. (6.1.4.0)
    • Added the option to fetch the Kinesis Data analytics as devices. (6.1.5.0)
    • Added the option to fetch Lightsail instances as devices. (6.1.23.0)
    • Added the option to fetch Direct Connect data assets associated with Network Services. (6.1.6.0)
    • Amazon Route 53 DNS records can now be fetched as Network Service assets (6.1.11.0)
    • SSM Parameters Store are now fetched as Configuration assets. (6.1.19.3)
    • Added the option to fetch Elastic Beanstalk environments as assets. (6.1.26.0)
    • Added the option to fetch Identity Store users and groups. (6.1.33.0)
    • Added the option to choose which type of Security Hub findings to fetch. (6.1.34.0)
    • Added the option to fetch Outposts as Compute Services assets. (6.1.35.0)
  • Axonius Network Discovery
    • Added the capability to configure how to fetch certificates, either in normal fetch, background fetch or not all. (6.1.10.0)
    • Added the capability to configure custom ports to scan. (6.1.17.0)
  • Axonius Users
    • Added the capability to enter a number of days to retrieve all activity logs for that user in that time range. (6.0.0.1)
    • Added the option to fetch service accounts. (6.1.33.1)
    • Added the option to get the user's query history actions for a configured time range. (6.1.39.0)
  • Azure DevOps
    • Added the option to fetch the Git Repositories from the projects in Azure DevOps. (6.1.8.0)
    • Added the option to fetch Git Commits from a specified day count. (6.1.25.0)
    • Added the option to fetch users' projects. (6.1.25.0)
  • BambooHR
    • Added the capability to enter the name of the LOA employee table to fetch from. (6.1.0.0)
    • It is now possible to fetch data from more than one table. (6.1.10.0)
  • BigFix Compliance Analytics (formerly SCA)
    • Added the capability to enter a comma-separated list of checklist IDs to fetch from. (6.1.8.0)
    • Added the capability to only fetch devices and enrichments that were last seen X days ago. (6.1.27.0)
    • Added the capability to set the number of entities returned per page request. (6.1.27.0)
    • Added the option to fetch vulnerabilities. (6.1.27.0)
    • Added the option to use async fetch for endpoints. (6.1.30.0)
    • Added the capability to specify the chunk size for the async requests. (6.1.30.0)
    • Added the capability to enter fields that you want to be removed from the JSON after parsing. (6.1.30.0)
  • Bitbucket - Added the option to use OAuth2 client credentials to authenticate Bitbucket API V2. (6.1.28.0)
  • BitSight Security Ratings
    • Added the option to fetch company assets. (6.1.8.0)
    • Added the option to fetch infrastructure changes. (6.1.36.0)
  • BloodHound - Added support for SaaS instances of BloodHound. (6.1.5.0)
  • BlueCat Enterprise DNS
    • Added proxy values (HTTPS Proxy, HTTPS Proxy User Name, and HTTPS Proxy Password) to the adapter connections. (6.1.25.2)
    • This adapter now supports BlueCat API v2. (6.1.37.0)
  • BMC Atrium ADDM - Added the option to fetch devices with info from the RuntimeEnvironment table. (6.1.35.0)
  • Censys
    • Added the capability to upload a CSV file with a list of subnets to be used for fetching data from Censys. (6.1.24.0)
    • Added the option to select the version number of the Censys API. (6.1.24.0)
  • Certero - This adapter now fetches certificates. (6.1.31.0)
  • Checkmarx SAST - This adapter now fetches users. (6.1.28.0)
  • Cherwell IT Service Management - Added the capability to use custom schema entries to add JSON text to show in basic view. (6.1.31.2)
  • CipherTrust Manager
    • Added the option to fetch devices of the subtype device2 from the Clients endpoint. (6.1.33.0)
    • Added the option to fetch compute services from the Cluster Summary endpoint. (6.1.33.0)
    • Added the option to fetch licenses from the Licensing Features endpoint. (6.1.33.0)
  • Cisco DNA Center
    • Added the option to fetch additional devices from the default “Client Detail” report. (6.1.4.0)
    • Users can now configure the “Client Detail” report by name. (6.1.5.2)
    • Added the option to fetch Cisco DNA advisories. (6.1.26.0)
    • This adapter now fetches vulnerabilities and SaaS applications. (6.1.26.0)
  • Cisco Firepower Management Center - Added the option to fetch firewall rules as assets. (6.1.23.1)
  • Cisco Identity Services Engine (ISE) - Added the option to add authentication status data for each fetched endpoint. (6.1.15.0)
  • Cisco Intersight
    • Added the option to fetch chassis devices as assets. (6.1.12.0)
    • Added the option to fetch SAN switches as assets. (6.1.12.0)
    • Added the option to override the available name in the SAN Switch API response using the MDS prefix along with the Network Policy Name. (6.1.20.1)
    • Axonius now supports Cisco Intersight Adapter API V3. (6.1.30.0)
  • Cisco Meraki
    • Added the option to fetch firewall rules. (6.1.19.0)
    • Added the option to fetch additional data for Cisco Meraki MDM devices. (6.1.23.3)
  • Citrix ADC
    • This adapter now fetches load balancers as assets. (6.1.37.0)
    • Added the capability to select which items to fetch - Load Balancer Virtual Server fields, Version fields, or License fields. (6.1.37.0)
  • Claroty CTD - Added the option to fetch vulnerabilities. (6.1.32.1)
  • Cloudflare DNS
    • Added the option to fetch certificates. (6.1.13.0)
    • SSL certificates are now fetched as certificate assets. (6.1.37.3)
    • It is now possible to use the Asset Graph to check how many devices use the same certificate. (6.1.37.3)
  • Cloudflare Zero Trust
    • Added the option to add subdomain data for each device. (6.1.5.0)
    • Added the option to add policy data for each user. (6.1.5.0)
    • Added the option to fetch data on deleted and revoked devices. (6.1.31.0)
  • Code42 Incyder - Added the option to ignore devices fetched from Code42 with the values “Deactivated” or “Blocked” in the status field. (6.1.4.0)
  • Cribl - Port was added to connection parameters. (6.1.27.0)
  • CrowdStrike Falcon
    • Added the option to enable the parsing of vulnerability descriptions (disabled by default). (6.0.19.3)
    • Added the capability to avoid duplicate devices. (6.1.16.0)
    • Added the capability to set the amount of requests per second. (6.1.21.0)
    • This adapter now fetches application settings. This is optional and can be disabled. (6.1.24.0)
    • Added the capability to specify a list of group names to be excluded. (6.1.28.0)
    • Added the option to fetch configuration assessments for the device. (6.1.30.0)
  • CrowdStrike Falcon Discover
    • Added the capability to only fetch applications used in the selected amount of days. (6.1.1.2)
    • Added the option to configure a pattern to apply to an interface alias in order to identify a historical IP address and record it separately from current IP addresses. (6.1.2.0)
    • Added the capability to filter devices by their discoverer count field. (6.1.6.0)
    • Added enhanced device search settings. (6.1.17.0)
    • Added the capability to only fetch software with existing values for the Update Time and Last Used On attributes. (6.1.30.0)
  • CrowdStrike Falcon Identity Protection (Preempt)
    • Added the option to rename risk factors. (6.1.9.0)
    • Added the option to exclude devices with the risk factor type of 'UNMANAGED_HOST'. (6.1.11.0)
  • CrowdStrike Kubernetes Protection
    • This adapter now fetches compute services and containers. (6.1.18.0)
    • Added the option to define the time frame for fetching containers (last X days). (6.1.31.0)
  • CSCDomainManager - This adapter can now fetch certificates as assets. This is enabled by an advanced configuration. (6.1.31.0)
  • CSV
    • Added the option to allow the system to support assets with empty fields. If an asset was created with a field that contained a value, when the CSV file subsequently contains an empty field with the same name, the device or user asset will display that field without a value in it. (6.1.15.2)
    • Added an option to explicitly parse double quotes as escaping, to prevent errors that might occur by incorrect dynamic parsing of double quotes. (6.1.24.0)
    • Added an option to set content key in JSON when fetching the CSV file via URL. (6.1.8.5)
    • Added support for Base64 encoding type. (6.1.8.5)
    • Added an option to import a databases file containing a list of databases as assets. (6.1.28.0)
  • CSV - Applications - Added the capability to fetch application settings data. (6.1.33.0)
  • CyberArk Alero
    • Tenant ID and Service Account JSON were added to connection parameters. (6.1.4.0)
    • API Key was removed from connection parameters. (6.1.4.0)
  • CyberArk Endpoint Privilege Manager - Added the option to fetch policies and enrich the computers (devices) with matching policies under the field "Policies". (6.1.31.0)
  • CyberArk Idaptive - Added the option to fetch user roles and user groups. (6.1.20.1)
  • CyberArk Privileged Account Security
    • Added the option to fetch the activities for each account. (6.1.0.0)
    • Added the option to fetch additional data about each account. (6.1.0.0)
    • Added support for OAuth2 authentication. (6.1.4.0)
    • Added the option to parse the domain value as an associated device. (6.1.10.0)
    • Added the option to fetch Safes as secrets. (6.1.32.0)
    • Added the option to fetch Groups as assets. (6.1.32.0)
  • Cybereason Deep Detect & Respond - Added the option to fetch only devices with specified location tag(s). (6.1.33.0)
  • CyCognito Platform
    • Added the option to fetch domains. (6.1.12.0)
    • Added the option to fetch vulnerabilities. (6.1.16.0)
    • Added the option to fetch certificates. (6.1.32.1)
    • Added the option to fetch web apps. (6.1.32.1)
    • Added the option to fetch IP ranges. (6.1.32.1)
    • Added the option to filter out inactive and/or semi-related assets. (6.1.40.0)
  • Darktrace - Added the capability to select the types of devices to fetch. (6.1.5.0)
  • Databricks - This adapter now fetches users. (6.1.14.0)
  • Datto RMM (Autotask Endpoint Management) - Added the option to employ a JSON object that maps custom fields from the raw data to the normalized data. (6.1.31.0)
  • Dell OpenManage Enterprise
    • Added the option to fetch warranties of each device. (6.1.11.0)
    • This adapter now fetches users. (6.1.20.1)
    • Added the option to fetch the compliance statuses of each device and the components of the device. (6.1.21.0)
  • Dell TechDirect - Service Tag CSV Column Header was added to connection parameters. (6.1.28.0)
  • DigiCert CertCentral
    • This adapter now fetches certificates as assets. (6.1.19.0)
    • Added the capability to create either certificate assets, device assets, or both assets. (6.1.19.0)
    • Added the option to fetch order certificate notes. (6.1.19.0)
    • Added the option to fetch order certificate additional information. (6.1.33.0)
  • DOJ CSAM - Added the capability to enter a meaningful name (string) for the System Report that is to contain CSAM report data pulled from the DOJ CSAM adapter. This additional report data enriches the system assets. (6.1.28.1)
  • Druva Cloud Platform - Added the option to fetch the Microsoft 365 apps status configured to backup as an Application asset type. (6.1.16.0)
  • Duo Beyond
    • Added the option to not fetch phones as devices. (6.1.10.0)
    • Added the option to fetch users with the Telephony Logs by phone number. (6.1.14.0)
    • Added the capability to specify the amount of days back to look for credit usage logs. (6.1.17.0)
  • Dynatrace - Added the option to categorize devices under different asset types. (6.1.12.0)
  • Eagle Eye Networks - Added the option to enrich the device with extra device information. (6.1.4.0)
  • EfficientIP SOLIDserver DDI - Added the option to fetch DHCP scopes, ranges, leases, and statics as devices. (6.1.24.0)
  • Entrust - This adapter now fetches certificates. (6.1.10.0)
  • Eracent
    • Added the option to use the field "LanName" instead of "DnsName" for the Hostname field. (6.1.24.0)
    • Added the option to fetch catalog info for the device. (6.1.35.0)
    • Added the option to fetch the device usage type. (6.1.35.0)
  • Everbridge
    • This adapter now fetches roles.
    • Added the option to fetch SM SecurityRole objects from role details.
  • EyeInspect - The adapter now fetches Vulnerabilities and SaaS applications as assets. (6.1.31.0)
  • F5 BIG-IP iControl - This adapter now fetches compute services. (6.1.24.2)
  • FireMon Asset Manager - Added the option to use API Key authentication for this adapter. (6.1.30.0)
  • FireMon Security Manager - Added the option to try to parse SyslogMatch Names as IP addresses or serial numbers. (6.1.9.0)
  • FleetDM
    • Added the option to use a different custom API path. (6.1.23.1)
    • Added the option to select whether to fetch software information. (6.1.34.0)
  • Flexera IT Asset Management
    • This adapter now fetches containers. (6.1.31.0)
    • Added the option to fetch containers from the FNMS database. (6.1.31.0)
  • FlexNet Manager Suite Cloud - Added the option to fetch Software Technopedia fields. (6.1.22.0)
  • Forcepoint ONE
    • This adapter now fetches users, software, activities, and SaaS applications. (6.1.30.0)
    • Added the capability to specify how many days back the system began fetching logs. (6.1.32.1)
  • Foreman
    • Added the option to fetch the APT security updates count. (6.1.15.0)
    • Added the option to fetch encryption keys. (6.1.31.0)
  • ForeScout CounterACT
    • Added the option to map ForeScout script results to device fields. (6.1.18.0)
    • Added the option to enter a list of field names to be used for determining the device's “Last Seen” value. (6.1.30.5)
  • FortiClient EMS
    • Added support for cloud version of FortiClient EMS. (6.1.9.0)
    • This adapter now supports API versions higher than 6.4. (6.1.28.0)
  • Fortinet FortiGate
    • Added the option to fetch VPN SSL sessions as Devices. (6.1.0.0)
    • FortiOS API Key was added to connection parameters. (6.1.33.0)
  • Forward Networks
    • Added the option to use the networks API to fetch devices. (6.1.13.0)
    • Added the option to fetch vulnerabilities. (6.1.16.0)
  • Foxpass - This adapter now fetches devices. (6.1.35.0)
  • Freshservice
    • Added the option to fetch device relationships from Freshservice. (6.1.7.0)
    • Added the capability to use custom schema entries to add JSON text to show in basic view. (6.1.37.1)
    • Added the capability to show fields from advanced view in basic view. (6.1.37.1)
  • GitHub
    • Added the option to fetch commit history for each repository, if available. (6.1.28.0)
    • For GitHub Enterprise users, added the option to enter a Custom Login URL as a connection parameter. (6.1.28.0)
  • GoDaddy
    • Added support for the GoDaddy v2 API. (6.1.2.0)
    • Added support for certificates as assets. (6.1.10.0)
  • Google Cloud Platform (GCP)
    • Added the option to fetch all Google Cloud Compute Disk Images, Snapshots and Templates. (6.1.2.0)
    • Added the option to split subnets of a VPC network into individual assets. (6.1.5.0)
    • Added the option to fetch only compute devices that are turned on. (6.1.11.0)
    • Added the option to fetch Serverless Functions from the 'Cloud Functions' service. (6.1.21.0)
    • Added the option to fetch APIs from Apigee. (6.1.30.0)
  • Google Workspace
    • Added an advanced setting to populate the asset name with the value of the Annotation ID (when the value exists) instead of using the value in the Name field. (6.1.2.2)
    • Added proxy values (Proxy address, Proxy port, Proxy username, and Proxy password) to the adapter connections. (6.1.6.4)
    • Added the option to use the host name as the asset name, when the host name exists. (6.1.9.1)
    • The 'Fetch User Audit Logs' advanced setting was changed to 'Number of days for Audit Log data.' Users can enter the number of days before the last successful fetch to retrieve audit logs for. (6.1.16.2)
    • Added the option to fetch group permissions as group dynamic fields. (6.1.23.0)
    • Added the option to fetch user browser policies from groups. (6.1.34.0)
    • Added the option to fetch groups' browser policies and parse the data to the users and groups.
  • Guardicore
    • Added the option to fetch full agent information for a device. (6.1.7.0)
    • Added the option to fetch incidents from up to 100 days back. (6.1.31.0)
    • Added the option to fetch incidents up to 100 days ahead. (6.1.31.0)
  • Halcyon - This adapter now fetches users. (6.1.19.0)
  • HaloITSM
    • Added the option to fetch devices. (6.1.35.0)
    • Added the option to fetch users. (6.1.35.0)
  • Have I Been Pwned - Added the capability to retrieve all breached accounts associated with a domain. (6.1.9.0)
  • Huawei eSight - Added the option to populate hostname with serial number when the hostname and asset name are missing.(6.1.35.0)
  • IBM Guardium - Added the option to fetch data sources. (6.1.24.0)
  • IBM QRadar - Added the option to fetch all log sources at once without pagination. (6.1.37.0)
  • ImmuniWeb - Tab Types field was added to connection parameters. (6.1.39.0)
  • Imperva Data Activity Monitoring (DAM)
    • Added the option to fetch DAS assessment results. (6.1.22.0)
    • Added the option to use the database name for the asset name. (6.1.22.0)
  • Infoblox DDI
    • Added the option to fetch DNS CNAME records. (6.1.5.0)
    • Added the option to fetch DHCP address ranges. (6.1.7.0)
    • Added the option to fetch Infoblox networks as assets. (6.1.11.0)
    • Added the option to fetch shared A records from Infoblox. (6.1.12.0)
  • Intigriti
    • Authorization Code was replaced with Refresh Token in connection parameters. (6.1.28.0)
    • Redirect URLs and Scopes were removed from connection parameters. (6.1.29.0)
    • Rate Limit Settings were added to connection parameters. (6.1.34.0)
  • Ivanti Endpoint Security
    • Added the capability to select an API version. (6.1.16.1)
    • Username and Password for API v2 were added to connection parameters. (6.1.22.0)
  • Ivanti Neurons - RapidAPI Key was added to connection parameters. (6.1.31.0)
  • Jamf Pro - This adapter now fetches users. (6.1.24.0)
  • JetBrains - Added the option to use API Key authentication for this adapter. (6.1.27.0)
  • JFrog Artifactory
    • Added the option to use a user name and password for authentication. (6.1.15.0)
    • Added the option to not fetch users. (6.1.15.0)
  • Jira Service Management
    • Added the option to use the "Updated" field as "Last Seen". (6.1.21.2)
    • Added the capability to enter a custom IQL query so that all objects will be treated as users. (6.1.31.3)
  • Jira Service Management (Service Desk) Fetch Tickets - Added the capability to use custom schema entries to add JSON text to show in basic view. (6.1.22.1)
  • JSON
    • JSONL format is now supported. (6.1.16.0)
    • Added the option to fetch assets that are not on the top level from the JSON file. (6.1.36.0)
  • Juniper Junos Space - Added the option to fetch users. (6.1.12.0)
  • Kandji - Added the option to fetch devices not yet enrolled. (6.1.7.0)
  • Kenna Security Platform
    • Added the option to skip fix data when fetching vulnerabilities. (6.1.36.0)
    • Added the option to select which severity level to fetch from 1 to 10. (6.1.36.0)
  • Keyfactor
    • This adapter now fetches users. (6.1.24.0)
    • Added permissions that are required in order to use the endpoint 'GET SSH Users'. (6.1.24.0)
    • Added the option to fetch certificates from collections the customer has in Keyfactor. (6.1.24.0)
  • KnowBe4 - Added the option to remove fields without value from the latest fetch. (6.1.19.0)
  • Kolide K2 - Added the capability to enrich Kolide devices using a custom report that will be fetched from api/v0/reporting/queries/{query_id}. (6.1.14.0)
  • Lacework
    • This adapter now fetches vulnerabilities. (6.1.33.0)
    • Added options to fetch devices from different endpoints (Machines, Machine Details, K8s Pods, Agents Info) and enrich each endpoint with vulnerabilities data. (6.1.33.0)
  • Lakeside SysTrack - Added the option to fetch the local member inventory for each system. (6.1.4.0)
  • Landscape
    • Added the option to fetch devices with packages installed on Linux laptops covered by Landscape. (6.1.20.1)
    • Added the option to parse the title to Last Used Users and the hostname to Asset Name. (6.1.20.1)
    • Added support for API v2. (6.1.25.0)
    • Added the option to fetch devices with snaps installed on Linux laptops covered by Landscape (API v2 only). (6.1.25.0)
  • Lansweeper Cloud - Added the option to fetch vulnerabilities. (6.1.23.0)
  • LeanIX - This adapter now fetches application services as assets. (6.1.38.2)
  • Linux SSH Scan now supports Solaris. (6.1.6.0)
  • LogicMonitor - Added the capability to enter fields from autoProperties field in the device's JSON to dynamically parse them into queryable fields (both common and specific). (6.1.18.0)
  • LogRhythm - Added the capability to enter a record status with which to ignore devices. (6.1.23.0)
  • Lookout Mobile Endpoint Security
    • Added the option to use the version 2 of the API, which uses only the API key (without a username or password). (6.1.7.0)
    • Added the option to fetch vulnerabilities from /mra/api/v2/os-vulns/android and /mra/api/v2/os-vulns/ios and add them to devices with the same OS version. (6.1.23.0)
  • ManageEngine Endpoint (Desktop) Central and Patch Manager Plus
    • Added the option to fetch vulnerability data (6.1.11.2)
    • Added the option to fetch data from /inventory/scancomputers endpoint. (6.1.21.0)
    • Added the capability to set the number of assets to manage per page. (6.1.26.0)
    • Added the capability to select endpoints to apply the sleep seconds configuration. (6.1.37.0)
  • ManageEngine Mobile Device Management - Added support for OAuth authentication for cloud users. (6.1.37.0)
  • ManageEngine OpUtils
    • Added the option to fetch assets asynchronously. (6.1.8.2)
    • Added the option to ignore devices without IP to DNS values. (6.1.8.2)
  • ManageEngine ServiceDesk Plus - This adapter now fetches networks. (6.1.36.4)
  • Mandiant
    • Added the option to fetch entities last seen by the number of days specified. (6.1.5.0)
    • Added the option to use last_seen_after:configured_scan_count query to fetch only active entities. (6.1.5.0)
    • Added the option to add more details to the information fetched per each entity. (6.1.5.0)
  • MarkMonitor - Added the option to remove user fetch functionality. (6.1.8.0)
  • McAfee ePolicy Orchestrator (ePO)
    • Added the capability to enter values to the list of query IDs to enrich each device. (6.1.6.0)
    • Added the option to fetch COAMS data. (6.1.7.0)
    • Added the option to change software names using regular expressions. (6.1.17.0)
  • Medigate - Added the option to fetch vulnerabilities. (6.1.26.0)
  • Microsoft Active Directory (AD)
    • Added the option to fetch data from Active Directory Sites. (6.1.8.0)
    • Added the capability to enter a custom host map. (6.1.12.0)
    • Added the option to to calculate user password expiration date using the Active Directory LDAP value of the "msDS-UserPasswordExpiryTimeComputed" attribute. (6.1.32.0)
    • Added the option to fetch information about the domains that are trusted by the user/device domain. The data is displayed in the Domains & URLs assets page. (6.1.32.0)
    • Added the option to enter custom AD fields and map them into Axonius fields in the Groups asset page. (6.1.37.0)
  • Microsoft Azure
    • Tenants added to list of Azure services to fetch as assets. (6.1.11.0)
    • This adapter now supports the asset type ‘Certificate’. (6.1.13.0)
    • Certificates From Key Vaults added to list of Azure services to fetch as assets. (6.1.13.0)
    • Secrets From Key Vaults added to list of Azure services to fetch as assets. (6.1.13.0)
    • NetApp Accounts and NetApp Volumes added to list of Azure services to fetch as assets. (6.1.20.1)
    • Added the capability to get the billing data per service. (6.1.20.1)
    • Management Groups added to list of Azure services to fetch as assets. (6.1.28.0)
    • Added the option to fetch security recommendations from Azure Advisor. (6.1.31.0)
    • Added the option to enrich Advisor Recommendations in virtual machines with assessment information. (6.1.38.0)
    • Under Azure services to fetch as assets, the App Services option was changed to Function Apps. (6.1.39.0)
  • Microsoft Cloud App Security
    • Added the option to ignore Microsoft Cloud App Security users that do not have a domain field. (6.1.4.0)
    • Added the option to ignore external users. (6.1.10.0)
    • Added the option to select which fetching method to use to fetch user entities: normal, background, or none. (6.1.28.5)
  • Microsoft Defender for Endpoint (Microsoft Defender ATP)
    • Added the option to only fetch devices with hostname values. (6.1.5.0)
    • Added the option to fetch vulnerability changes from Microsoft Defender for Endpoint. (6.1.21.0)
    • Added the option to fetch only users that match the description of interactive in the MDE documentation. (6.1.23.0)
    • Added the capability to enter one or more regex strings that can be used to identify users apart from other accounts. (6.1.23.0)
    • Added the option to consider only the latest hostname field data received by Microsoft Defender for Endpoint to avoid duplicating hostnames. (6.1.28.1)
    • Added the option to fetch missing KBs either from the Vulnerabilities API or data fetched in the Background. (6.1.38.2)
    • Added the option to fetch only applicable and non-compliant recommendations. (6.1.39.0)
  • Microsoft Endpoint Configuration Manager (MECM)
    • Added the option to parse historical compliance status information to the Current Compliance Status field. (6.0.18.8)
    • Added the option to parse the latest compliance status information to the Current Compliance field. (6.0.18.8)
    • Added support for SSL. (6.1.8.0)
    • Added the option to fetch software reported as uninstalled by SCCM. (6.1.9.1)
    • Added the option to fetch "Unknown" software update compliance statuses. (6.1.19.0)
    • The previous settings for fetching software update compliance statuses were merged into a single, new advanced setting that allows you to select up to 4 statuses to fetch. (6.1.26.0)
    • Added the option to select the number of days that should populate the Last Used User field in the Devices table. (6.1.34.0)
  • Microsoft Entra ID (Azure AD) and Microsoft Intune
    • The name of the 'Microsoft Azure AD and Microsoft Intune' adapter was changed to Microsoft Entra ID (Azure AD) and Microsoft Intune in line with changes by Microsoft. (6.1.1.0)
    • Added the option to fetch autopilot device identities from Intune. (6.1.4.0)
    • Added the option to disable fetch of groups and to list groups not to fetch. (6.1.7.0)
    • Added the option to fetch administrative units as groups. (6.1.1.0) (available till 6.1.19.3)
    • The option to fetch group app roles is now available to Cyber-Security Asset Management, not just SaaS Management. (6.1.11.0)
    • Added the option to enrich mobile devices from Intune with application data. (6.1.1.0)
    • Added the option to fetch role eligibility schedule instances of groups. (6.1.13.0)
    • Added the option to fetch mailbox settings for each user and populate the field 'Has Mailbox' in Entra ID users. (6.1.17.0)
    • Administrative Units are now fetched as Organizational Units by default. (6.1.19.3)
    • Added the option to fetch legal hold information as accounts. (6.1.21.0)
    • Added the option to fetch conditional access policies. (6.1.23.0)
    • Added the option to fetch device configuration policy settings for Bitlocker and save them as configurations in Axonius. (6.1.26.0)
    • Added the option to fetch additional group attributes. (6.1.33.0)
    • Added app roles to the fetch when the 'Fetch user extensions (service principal)' advanced setting is enabled. (6.1.38.2)
    • Added the option to 'Fetch mailbox usage information from Office 365 in the last X days'. (6.1.39.0)
    • Added the option to 'Enrich Intune devices with enrollment profile information'. (6.1.40.0)
    • The 'Fetch user Extensions' advanced setting now also fetches group app roles. (6.1.38.2)
  • Microsoft Power BI - Changed the authentication method for the adapter to be exclusively OAuth authentication. (6.1.24.0)
  • Microsoft SCOM - Added support for SSL. (6.1.9.0)
  • Mist - This adapter now fetches users (note that only admin users are fetched). (6.1.14.0)
  • Monday - Added the option to select the kind of board the kind of board that the adapter fetches. (6.1.34.0)
  • MongoDB - Added support for TLS (Transport Layer Security). (6.1.19.0)
  • NetBrain - NetBrain Domain Name and NetBrain Tenant Name were added to the connection parameters. (6.1.4.0)
  • Netdisco
    • Added the option to insert multiple subnets to be used in IP the Inventory Report. (6.1.31.0)
    • Added the option to enrich device MACs addresses from device nodes. (6.1.31.0)
  • Netskope
    • Added permissions for endpoints that are required in order to use API V2. (6.1.3.0)
    • Added the option to fetch user UCI scores. (6.1.37.3)
    • This adapter now supports fetching devices from API V2. (6.1.39.3)
  • Nmap Security Scanner - Added the option to parse the ID and Host Name identifiers if the hostname contains an IP. (6.1.30.0)
  • Nozomi Guardian and CMC - Added the option to use an OpenAPI key for authentication. (6.1.15.0)
  • NTT Application Security - The name of the 'WhiteHat' adapter was changed to NTT Application Security.
  • Nucleus Security - Added the capability to enter a list of project IDs to specify which projects you want to fetch from. (6.1.15.0)
  • Okta
    • Added the option to specify a list of data fields to exclude from the fetch. (6.1.10.0)
    • Added the option to fetch security logs based on security.request.blocked and security.threat.detected events. (6.1.7.0)
    • Added the option to fetch user information to populate in the relevant device-specific fields. (6.1.7.0)
    • Added the option to fetch general Okta admin settings. (6.1.21.0)
    • Added the option to exclude inactive apps from the fetch. (6.1.33.0)
  • OneLogin
    • Added the 'SSO Provider' option. (6.1.6.0)
    • Added the option to enable rate limit override settings. (6.1.16.0)
    • Added the option to not fetch SaaS Management-related entities. (6.1.16.0)
  • Oracle Cloud - Added the capability to enter a comma-separated list of tag keys to be saved as fields. (6.1.8.0)
  • Oracle Enterprise Manager - Added the capability to enter a comma-separated list of devices with specified type names to be fetched. (6.1.4.2)
  • Oracle Fusion HCM Cloud - Added the capability to enter a list of sensitive fields to be included. (6.1.24.0)
  • Orca Cloud Visibility Platform
    • Added the option to parse all Orca tags as fields. (6.1.6.0)
    • Added the option to fetch Orca types as specific asset types. (6.1.16.0)
    • Added additional Orca types to fetch as specific asset types. (6.1.21.0)
    • Added the option to fetch inventories in the background. (6.1.33.0)
  • Palo Alto Networks Cortex XDR
    • Added the option to fetch the device serial number. (6.1.14.0)
    • Added the option to fetch the manual protection pause field. (6.1.32.1)
  • Palo Alto Networks Cortex Xpanse
    • Added the option to categorize devices into different asset categories using their asset type. (6.1.11.0)
    • Added the option to fetch vulnerabilities. (6.1.16.0)
    • Added the option to fetch users. (6.1.30.0)
  • Palo Alto Networks IoT Security (Zingbox) - Added the option to fetch vulnerabilities. (6.1.10.0)
  • Palo Alto Networks Panorama
    • Added the option to connect NAT firewall rules (public to private IPs only) with Network assets. (6.1.6.0)
    • Added the option to connect Access firewall rules (from untrust sources) with Network assets. (6.1.6.0)
    • Added the option to fetch the one-day-old VPN login logs to parse users of type LOGIN LOG. (6.1.17.0)
  • Palo Alto Networks Prisma Access
    • Added the option to fetch Global Protect connected users. (6.1.16.0)
  • Palo Alto Networks Prisma Cloud
    • Added the capability to select how many days of alerts to fetch into devices. (6.1.7.0)
    • Added the option to add the heuristicSearch: true parameter to the request. (6.1.8.0)
    • Added the capability to enter a comma-separated list of account names to fetch from. (6.1.12.0)
    • Added the option to not include resource JSON. (6.1.12.0)
    • Added the option to fetch from cloud types only. (6.1.16.0)
    • Added the capability to enter Prisma Cloud types to fetch data as the specified asset type, instead of as devices. (6.1.21.0)
  • Palo Alto Networks Prisma Cloud Workload Protection - Username and Password were changed to Prisma Cloud Access Key ID and Prisma Cloud Secret Key in the connection parameters. (6.1.33.0)
  • Panorays - Added permissions for the suppliers endpoint. (6.1.27.0)
  • PaperCut - API Health Token added to connection parameters. (6.1.3.1)
  • PeopleHR - Added the option to fetch users that left. (6.1.18.0)
  • phpIPAM - This adapter now fetches networks. (6.1.22.0)
  • PingIDM (formerly ForgeRock) - The name of the 'ForgeRock' adapter was changed to PingIDM (formerly ForgeRock). (6.1.25.0)
  • PingOne - The name of the 'PingID' adapter was changed to PingOne. (6.1.28.0)
  • Promisec Endpoint Manager
    • Added the capability to select the number of days back that the adapter fetches records from Promisec. (6.1.16.0)
    • Added the capability to select which enrichments to perform. (6.1.19.0)
  • Proofpoint Endpoint DLP - Added the option to use the latest version of the API. (6.1.2.0)
  • Proofpoint Security Awareness Training - Added the option to fetch user tags. (6.1.5.3)
  • PRTG Network Monitor - Added support for API Token. (6.1.14.0)
  • Qualys Cloud Platform
    • Added the option to fetch Web Applications. (6.1.5.0)
    • Added the capability to enter Qualys tags to skip device ingestion. (6.1.11.0)
    • Added the capability to edit the tickets, detections, and knowledge base advanced settings. (6.1.18.0)
    • Added the option to fetch tickets as separate assets instead of adding them to devices. (6.1.32.0)
    • Added the option to map Qualys vulnerabilities to Axonius vulnerabilities (Minimal -> Info, Medium -> Low, Serious -> Medium, Critical -> High, Urgent -> Critical). (6.1.29.0)
    • Added the option to fetch and parse both CVE and QID-based vulnerable software. (6.1.35.0)
    • Added the option to filter assets only on the adapter's side. (6.1.36.0)
  • Rapid7 InsightCloudSec - Added the option to fetch Insight findings. (6.1.11.1)
  • Rapid7 InsightIDR
    • Added the option to use the FQDN as a Host Name for devices. (6.1.1.2)
    • Added the option to ignore devices with no hostname in the fetch. (6.1.34.0)
  • Rapid7 InsightVM
    • Added the option to classify adapter property based on open ports. (6.1.33.0)
    • Added the option to select which vulnerability severity to fetch. (6.1.37.0)
  • Rapid7 Nexpose and InsightVM - Added the capability to specify the wait time between retries when receiving errors. (6.1.19.0)
  • Rapid7 Nexpose Warehouse
    • Added the option to utilize complex queries to fetch data from the database. (6.1.6.0)
    • Added the capability to fetch only devices and corresponding information if they were seen by Rapid7 Nexpose Warehouse in the number of days set. This allows the system to pull a recent history of the devices rather than the entire system history every fetch. (6.1.6.0)
    • Added the option to parse only vulnerabilities from a successful fetch. (6.1.35.0)
  • Red Hat Automation Controller (Ansible Tower)
    • Added the option to enable using the device name for the asset ID. (6.1.10.0)
    • Added support for API Token. (6.1.12.0)
  • Red Hat Insights
    • Added the option to use API authentication for this adapter. (6.1.4.0)
    • This adapter now fetches vulnerabilities. (6.1.30.0)
  • RedSeal - Added the option to fetch metrics data. (6.1.14.0)
  • RiskRecon
    • Added the option to fetch devices from hosts. (6.1.31.0)
    • Added the option to enrich hosts with findings. (6.1.31.0)
    • Added the option to enrich hosts with action plan findings. (6.1.31.0)
  • SailPoint IdentityIQ - Added the capability to specify the size of the chunk size per async request batch. (6.1.20.1)
  • SailPoint IdentityNow
    • Added the capability to enter a list of private attributes to include with the users. (6.1.13.0)
    • Added the option to fetch only users that satisfy the core filters. (6.1.19.0)
    • This adapter now fetches rules. (6.1.23.0)
    • Added the option to fetch entitlements of accounts and access profiles. (6.1.26.0)
    • Added the option to enrich users with Sailpoint permissions. (6.1.34.0)
  • Salesforce
    • Added the option to fetch new audit logs: URI and Lightning URI events. (6.1.3.2)
    • Added the option to use the http://login.salesforce.com URL for login in instead of sub-domain.salesforce.com. (6.1.14.0)
  • SAP Concur 4.x - Refresh Token is now used in the adapter connection instead of Company ID and Company Auth Token. (6.0.10.2)
  • Schneider Electric EcoStruxure IT Advisor - The name of the 'EcoStruxure IT Advisor' adapter was changed to Schneider Electric EcoStruxure IT Advisor. (6.1.28.0)
  • Schneider Electric EcoStruxure IT Expert & Data Center Expert - The name of the 'Schneider Electric EcoStruxure IT' adapter was changed to Schneider Electric EcoStruxure IT Expert & Data Center Expert. (6.1.38.2)
  • ScienceLogic
    • Added the option to ingest all ScienceLogic custom fields. (6.1.14.0)
    • Added the capability to enter a list of additional fields to parse from the raw data. (6.1.23.0)
  • Sectigo - This adapter now fetches certificates. (6.1.22.0)
  • Secureworks Taegis XDR (Red Cloak TDR)
    • Added the capability to enter a list of tags to filter. (6.1.7.0)
    • Added the capability to filter assets by choosing the asset state value. (6.1.33.0)
  • SecurityScorecard - Added the capability to parse data as URL assets, device assets, or both. (6.1.28.0)
  • Securonix SNYPR - Added the option to use API Key authentication. (6.1.38.2)
  • SentinelOne
    • Added the option to remove old tags that are no longer being fetched from SentinelOne. (6.1.6.0)
    • Added the option to fetch only the version with the most recent installed date for each software.(6.1.8.0)
    • Added the option to fetch only the latest installed app. (6.1.9.0)
    • Added the option to ignore vulnerabilities of software detected as an ubuntu package. (6.1.10.0)
    • Added the option to ignore public IPs from the externalIp field. (6.1.27.0)
    • Singularity Data Lake (SDL) API Key was added to connection parameters. (6.1.29.0)
    • Added the option to enable fetch from the Skylight query. (6.1.29.0)
    • Added the option to fetch uninstalled devices from V1. (6.1.33.0)
  • ServiceNow
    • Added the option to fetch active extensions. (6.1.3.2)
    • Added the ability to fetch the Application Settings SaaS Data from Script Action, Email Filter, and Antivirus settings. (6.1.5.3)
    • Added the option to extract the correct software name and version when the field fetched by ServiceNow does not contain this correctly. (6.1.8.0)
    • Added the option to fetch active model lifecycle information from the cmdb_hardware_model_lifecycle table and parse it as a list object named “Model Lifecycle”. (6.1.12.0)
    • Added the option to fetch Application Services as assets. (6.1.19.0)
    • Added the option to append device model to OS strings, when specified strings are in the Model field in ServiceNow. (6.1.20.1)
    • Added the capability to enter a list of tables to fetch Business Application from. (6.1.24.4)
    • Added the option to fetch field values and populate them into the Enforcement Action field mapping lists. (6.1.5.3)
    • Added the option to retrieve data by accessing resources with an API connection. (6.1.28.4)
    • The adapter now also fetches data from the kb_knowledge_base table, for accounts with SaaS Management capabilities. (6.1.34.1)
    • The "Use 'cmdb_ci' table instead of 'alm_asset' table for install status" advanced configuration now also fetches the values for the 'Install status' and 'Location' fields. (6.1.32.1)
  • SharePoint
    • Added the option to fetch sites as Application Resource assets instead of devices. (6.1.5.0)
    • Added the option to fetch site permissions.(6.1.10.7)
    • Added the capability to enter names of lists to fetch sites from. (6.1.17.0)
    • Added the option to define a list of additional ticket tables to fetch tickets from. (6.1.23.0)
  • Skybox Firewall Assurance - This adapter now fetches firewall rules as assets. (6.1.25.0)
  • Slack - Added the option to fetch user groups. (6.1.27.0)
  • Snyk
    • Added the option to enrich the organization name in devices. (6.1.20.1)
  • SolarWinds Network Performance Monitor
    • Added the option to select the IPAM devices to fetch according to their status. (6.1.3.2)
    • Added the option to fetch stack members. (6.1.13.0)
    • Added the option to fetch dependencies information. (6.1.15.0)
    • Added the option to fetch subnet info from IPAM by the node IP. (6.1.17.0)
    • Added the capability to specify a comma-separated list of additional SolarWinds custom fields to fetch. (6.1.28.0)
    • Added the option to use a bearer token or API key for authentication. (6.1.36.4)
    • The 'Fetch IPAM subnet by node IP' advanced setting now parses the subnet info as networks. (6.1.37.0)
  • Sophos Endpoint Protection - Added support for the Sophos Central APIs and the Sophos Endpoint API. This included updating the connection screen to use Client ID and Client Secret and adding Required Permissions. (6.1.9.3)
  • Splunk - This adapter now supports the asset type ‘Tickets’. (6.1.25.0)
  • SQL Server
    • Added an option to allow the system to support assets with empty fields. If an asset was created with a field that contained a value, when the SQL file subsequently contains an empty field with the same name, the device or user asset will display that field without a value in it. (6.1.17.0)
    • Added an option to use the Asset Name as the Hostname value when no Hostname value is provided. (6.1.35.0)
  • Stairwell
    • Added the option to parse the hostname and serial number if there are spaces surrounding the hyphen in the asset name for macOS devices. (6.1.11.0)
    • Environment ID was added to connection parameters. (6.1.32.3)
  • SUSE Manager - Added Advanced Settings allowing to enrich the fetched devices with additional data on system groups, extra packages, or currency stores. (6.1.29.0)
  • SymphonyAI Summit - Added support for fetching tickets. (6.1.14.5)
  • Sysdig - Added the option to select the type of client (Monitor or Secure). (6.1.15.4)
  • Sysdig - Monitor - The name of the 'Sysdig' adapter was changed to Sysdig - Monitor. (6.1.27.0)
  • Tanium Asset
    • Added the option to round the Total RAM (GB) field to the closest power of 2. (6.1.20.1)
    • Added the option to deduplicate devices. (6.1.22.0)
  • Tanium Client Status - Added the option to deduplicate devices. (6.1.23.0)
  • Tanium Comply
    • Added the option to fetch installed software. (6.1.11.0)
    • Added the option to fetch driver details. (6.1.35.0)
  • Tanium Discover - Added the option to deduplicate devices. (6.1.16.0)
  • Tenable.asm - Added the capability to enter a list of tags to filter. (6.1.3.0)
  • Tenable Identity Exposure (formerly Tenable.ad) - API Secret no longer required for configuration. (6.1.1.0)
  • Tenable.io
    • Added the option to use the most recent CVSS version as the CVSS Score. (6.1.12.0)
    • Added the capability to enter a value to restrict compliance findings to those that were updated or indexed into Tenable Vulnerability Management after X days. (6.1.22.0)
    • Added the option to skip devices with IP in the hostname. (6.1.24.0)
    • Added the option to include open ports in the asset export. (6.1.27.0)
    • Added the capability to enter a colon-separated list of tags values to be filtered out and not ingested. (6.1.29.0)
    • Added the capability to enter the agent groups to be filtered out and not ingested. (6.1.29.0)
    • Added the capability to enter a value to restrict compliance findings to those that were last seen in X days. (6.1.29.0)
    • Added the option to fetch extensions from Firefox and Chrome on Windows and macOS (Plugin IDs 96533, 133180, 96534). (6.1.29.0)
    • The adapter now fetches groups as assets. (6.1.35.0)
    • Added the option to fetch plugin 16193. (6.1.36.0)
    • Added the option to fetch only ports that were open at the time of the current fetch (6.1.36.0)
  • Tenable.sc
    • Added the option to fetch devices from mobile repositories. (6.0.19.4)
    • Added the option to use CVE dates for the device last seen calculation. (6.1.9.0)
    • Added the capability to enter a number of days to only fetch vulnerabilities from that number of days back. (6.1.15.0)
    • Added the capability to specify the maximum number of devices that the adapter will keep in memory at the same time. (6.1.17.0)
    • Added the option to fetch plugin 16193. (6.1.36.0)
    • Added the option to fetch and parse Device Type and Confidence Level from plugin 54615. (6.1.37.0)
    • Added the option to fetch vulnerabilities with accepted risk. (6.1.38.2)
  • Trend Micro Deep Security - Added the capability to enter the agent version control profile ID. (6.1.31.0)
  • Trend Micro Vision One - This adapter now works with version 3 of the API. (6.1.26.0)
  • Tripwire Enterprise
    • Added the capability to select the node types to fetch from. (6.1.38.2)
    • This adapter now fetches DBI devices as Databases. (6.1.38.2)
  • TruffleHog - Added the option to fetch only verified secrets. (6.1.28.0)
  • Twistlock - This adapter now fetches containers as assets. This must be activated in Advanced Settings in order to work. (6.1.26.0)
  • UpGuard CyberRisk - Added the option to not fetch users. (6.1.15.0)
  • Vectra AI - Deployment, Client ID, and Client Secret were added to connection parameters. (6.1.38.2)
  • Velociraptor - Added the option to use FQDN as the hostname. (6.1.12.0)
  • Venafi
    • Added the option to fetch agents. (6.1.22.0)
    • Added the option to not parse the manufacturer serial. (6.1.25.0)
    • Added the option to fetch Certificates as assets. (6.1.32.1)
  • Veracode - Added the option to use the first hostname found in the findings as the hostname for the device. (6.1.11.2)
  • VMware NSX - Added the option to enrich devices with firewall rules. (6.1.18.0)
  • VMware NSX Advanced Load Balancer
    • The name of the 'Avi Networks' adapter was changed to VMware NSX Advanced Load Balancer. (6.1.16.0)
    • Added the option to parse devices as load balancers. (6.1.22.0)
  • VMware vCloud Director
    • Added the Tenant Name parameter for API Key authentication (Relevant for API version v36.0 only). (6.1.20.1)
    • Added an option to authenticate via the Client ID and Device Mode parameters. (6.1.29.0)
    • The adapter now works with API versions 36.0 and above. Previously it worked with API v36.0. (6.1.37.1)
  • VMware Workspace ONE (AirWatch)
    • Added the option to fetch Smart Groups. (6.1.2.3)
    • Added the option to fetch Baselines. (6.1.29.0)
  • Vulcan - Added the option to fetch vulnerabilities. (6.1.1.4)
  • Vulcan Cyber - The name of the 'Vulcan' adapter was changed to Vulcan Cyber. (6.1.31.0)
  • WhatsUp Gold
    • Added the option to fetch additional device attributes from the endpoint WhatsUp Gold Device_FindAttributes API. (6.1.7.0)
    • Added the option to fetch device credentials from the endpoint WhatsUp Gold Device_Credentials API. (6.1.7.0)
    • Added the capability to enter a number of months to fetch data on the state of the device as well as the uptime of the device's power supply from the endpoint WhatsUp Gold DeviceReport_DeviceStateChangeReport API. (6.1.7.0)
  • Web Server Information - Added the capability to perform an SSL scan using Qualys. To use this capability, you need to enter a Qualys SSL Labs API v4 registered email. (6.1.29.0)
  • WhiteHat - Added the capability to set the number of assets to fetch in the API response from the WhiteHat API. (6.1.4.0)
  • Wiz
    • Added the capability to filter vulnerabilities by detection method. (6.1.9.3)
    • Added the option to fetch installed software. (6.1.11.0)
    • Added the option to fetch network exposures from Wiz. (6.1.19.0)
  • Wiz Reports - Additional fields are now supported for the Hosted Technology report. (6.1.12.1)
  • Workday
    • Added the option to create users only from the custom report data. (6.1.1.0)
    • Added the option to include custom organization data. (6.1.3.3)
    • Added the option to fetch application settings. (6.1.3.3)
    • Tenant Login URL, Read Only Admin Username/Password, and 2FA Secret Key added to connection parameters. (6.1.3.3)
    • Added the option to fetch only application settings. (6.1.6.0)
    • Added the option to fetch user assets. (6.1.17.0)
    • Added the option to include cost center data under organization data. (6.1.24.0)
  • Zabbix - Added the option to set hostnames from the relevant item in the inventory section that has a hostname. (6.1.9.0)
  • Zendesk
    • Added the option to fetch Users, All Tickets, or both Users and Tickets. (6.1.14.5)
    • Added the option to use the user email as the ticket assignee name. (6.1.22.1)
    • Added the capability to enter the maximum rate of requests per hour by Axonius to the Zscaler server. (6.1.11.0)
  • ZeroFox - Added the option to use API Key authentication for this adapter. (6.1.9.0)
  • Zerto ZVM
    • Added the option to fetch only protected VMs. (6.1.9.0)
    • Added the capability to select the deployment method used for the connection, either Windows or Linux. (6.1.36.0)
  • Zoom - Added the option to fetch application settings and licenses for accounts with Axonius SaaS Management. (6.1.11.0)
  • Zscaler Client Connector
    • Added a default value for Host name or IP address. (6.1.1.5)
    • Added the capability to enter the maximum rate of requests per hour by Axonius to the Zscaler server. (6.1.14.0)
  • Zscaler Web Security
    • Added the option to include devices that have the Linux operating system on the device fetch. (6.1.3.2)
    • Added the option to not fetch SaaS application users. (6.1.4.0)
    • Added the option to not fetch SaaS applications not assigned to any user. (6.1.25.4)
    • Added the option to fetch all applications even if they are not in the Axonius SaaS Applications Repository. (6.1.25.4)
    • Added the capability to filter out applications by name and category. (6.1.25.4)
  • Zscaler ZDX - Added the capability to enter the maximum rate of requests per hour by Axonius to the Zscaler server. (6.1.11.0)
  • Zscaler ZDX - Added the capability to enter the maximum rate of requests per hour by Axonius to the Zscaler server. (6.1.11.0)
  • Zscaler Web Security - Adde the option to filter fetched devices by their registration status. (6.1.30.0)



For more details:

New Enforcement Actions

The following Enforcement Actions were added:

Updated Enforcement Actions

The following Enforcement Actions were updated:



Was this article helpful?