- 23 Nov 2022
- 1 Minute to read
-
Print
-
DarkLight
-
PDF
Unisys Stealth
- Updated on 23 Nov 2022
- 1 Minute to read
-
Print
-
DarkLight
-
PDF
Unisys Stealth transforms existing networks—both on-premises and in the cloud—into a Zero Trust Network through identity-based microsegmentation.
Types of Assets Fetched
This adapter fetches the following types of assets:
- Devices
Parameters
-
Host Name or IP Address (required) - The hostname or IP address of the Unisys Stealth server.
-
Port (required, default: 8448) - The port used for the connection.
-
User Name and Password (required) - The credentials for a user account that has the permissions to fetch assets.
-
Verify SSL - Select whether to verify the SSL certificate of the server against the CA database inside of Axonius. For more details, see SSL Trust & CA Settings.
-
HTTPS Proxy (optional) - Connect the adapter to a proxy instead of directly connecting it to the domain.
-
HTTPS Proxy User Name (optional) - The user name to use when connecting to the value supplied in Host Name or IP Address via the value supplied in HTTPS Proxy.
-
HTTPS Proxy Password (optional) - The password to use when connecting to the server using the HTTPS Proxy.
-
To learn more about common adapter connection parameters and buttons, see Adding a New Adapter Connection.
APIs
Axonius uses the Unisys Stealth Ecosystem API v4.0.134.0
The API should be local with a default port of 8448. For example: https://localhost:8448
Version Matrix
This adapter was only tested with the versions marked as supported, but may work with other versions. Contact Axonius Support if you have a version that is not listed, which is not functioning as expected.
Version | Supported | Notes |
---|---|---|
v1 | Yes | -- |
Supported From Version
Supported from Axonius version 4.7