- 22 Jan 2025
- 1 Minute to read
- Print
- DarkLight
- PDF
Dragos Platform
- Updated on 22 Jan 2025
- 1 Minute to read
- Print
- DarkLight
- PDF
The Dragos Platform identifies ICS network assets, malicious activity, and provides guidance to investigate incidents.
Related Enforcement Actions:
Types of Assets Fetched
This adapter fetches the following types of assets:
- Devices
- Vulnerabilities
- SaaS Applications
Parameters
Host Name or IP Address (required) - The Host Name or IP Address of the Dragos Platform server.
API ID and API Secret (required) - An API for a user account that has the permissions to fetch assets. Refer to Dragos SiteStore API guide for Details of how to create these credentials.
API Version (optional, default: v3) - Select the API version, either v3 or v4.
Verify SSL - Select whether to verify the SSL certificate of the server against the CA database inside of Axonius. For more details, see SSL Trust & CA Settings.
HTTPS Proxy (optional) - Connect the adapter to a proxy instead of directly connecting it to the domain.
HTTPS Proxy User Name (optional) - The user name to use when connecting to the value supplied in Host Name or IP Address via the value supplied in HTTPS Proxy.
HTTPS Proxy Password (optional) - The password to use when connecting to the server using the HTTPS Proxy.
To learn more about common adapter connection parameters and buttons, see Adding a New Adapter Connection.
Advanced Settings
Advanced settings can either apply to all connections for this adapter, or to a specific connection. Refer to Advanced Configuration for Adapters.
- Parallel Requests Count (required, default: 5) - Specify the maximum number of parallel requests all connections for this adapter will create when connecting to the value supplied in Dragos Host Name or IP Address.
- Fetch internal devices only - Select to only fetch devices where the internal flag is set to 'True'. Devices with a public IP address will not be fetched.
- Fetch Vulnerabilities - When checked, the adapter will also fetch vulnerabilities. This requires "VulnerabilityDetectionRead" privilege from the API users
For details about general advanced settings under the Adapter Configuration tab, see Adapter Advanced Settings.