- 20 Nov 2023
- 1 Minute to read
- Print
- DarkLight
- PDF
Uptycs
- Updated on 20 Nov 2023
- 1 Minute to read
- Print
- DarkLight
- PDF
Uptycs is an osquery-powered security analytics platform pairs a universal agent with analytics for fleet visibility, intrusion detection, incident investigation, vulnerability management & compliance for Linux, macOS, Windows, containers, and cloud workloads.
Types of Assets Fetched
This adapter fetches the following types of assets:
- Devices
Parameters
Host Name or IP Address (required) - The hostname or IP address of the Uptycs server.
Customer ID (required) - The customer ID obtained from Uptycs portal.
API Key and API Secret (required) - An API Key associated with a user account that has the Required Permissions to fetch assets.
Verify SSL - Select whether to verify the SSL certificate of the server against the CA database inside of Axonius. For more details, see SSL Trust & CA Settings.
HTTPS Proxy (optional) - Connect the adapter to a proxy instead of directly connecting it to the domain.
HTTPS Proxy User Name (optional) - The user name to use when connecting to the value supplied in Host Name or IP Address via the value supplied in HTTPS Proxy.
HTTPS Proxy Password (optional) - The password to use when connecting to the server using the HTTPS Proxy.
To learn more about common adapter connection parameters and buttons, see Adding a New Adapter Connection.
Advanced Settings
Advanced settings can either apply for all connections for this adapter, or you can set different advanced settings and/or different scheduling for a specific connection, refer to Advanced Configuration for Adapters.
- Page size (default: 200) - Enter a value for the page size for API pagination.
To learn more about Adapter Configuration tab advanced settings, see Adapter Advanced Settings.
Required Permissions
The value supplied in API Key and API Secret must be associated with credentials that have read access to devices.
API Key and API Secret can be obtained from the company's Uptycs administrator. A user with administrator privileges can generate a key and secret for other users.