To learn more, visit the Tenable documentation.
Parameters
| Parameter | Description |
|---|---|
| Scan ID | The unique identifier for the scan you want to retrieve. It can be obtained by using the List Scans action. |
Example Output
{ "value": { "comphosts": [ { "asset_id": 5, "critical": 86, "high": 0, "host_id": 5, "host_index": 0, "hostname": "192.0.2.57", "info": 0, "low": 145, "medium": 62, "numchecksconsidered": 100, "progress": "100-100/200-200", "scanprogresscurrent": 100, "scanprogresstotal": 100, "score": 867650, "severity": 293, "severitycount": { "item": [ { "count": 0, "severitylevel": 0 }, { "count": 145, "severitylevel": 1 }, { "count": 62, "severitylevel": 2 }, { "count": 0, "severitylevel": 3 }, { "count": 86, "severitylevel": 4 } ] }, "totalchecksconsidered": 100 }, { "asset_id": 3, "critical": 45, "high": 0, "host_id": 3, "host_index": 1, "hostname": "192.0.2.57", "info": 0, "low": 52, "medium": 1, "numchecksconsidered": 100, "progress": "100-100/200-200", "scanprogresscurrent": 100, "scanprogresstotal": 100, "score": 450620, "severity": 98, "severitycount": { "item": [ { "count": 0, "severitylevel": 0 }, { "count": 52, "severitylevel": 1 }, { "count": 1, "severitylevel": 2 }, { "count": 0, "severitylevel": 3 }, { "count": 45, "severitylevel": 4 } ] }, "totalchecksconsidered": 100 }, { "asset_id": 9, "critical": 64, "high": 0, "host_id": 9, "host_index": 2, "hostname": "192.0.2.57", "info": 0, "low": 61, "medium": 23, "numchecksconsidered": 100, "progress": "100-100/200-200", "scanprogresscurrent": 100, "scanprogresstotal": 100, "score": 642910, "severity": 148, "severitycount": { "item": [ { "count": 0, "severitylevel": 0 }, { "count": 61, "severitylevel": 1 }, { "count": 23, "severitylevel": 2 }, { "count": 0, "severitylevel": 3 }, { "count": 64, "severitylevel": 4 } ] }, "totalchecksconsidered": 100 } ], "compliance": [ { "count": 5, "host_id": 0, "hostname": null, "plugin_family": "Unix Compliance Checks", "plugin_id": "143e17d31e1a30830fcc2c3539d803d0", "plugin_name": "BSI-100-2: S 4.13: /etc/group consistency - Careful allocation of identifiers", "severity": 1, "severity_index": 0 }, { "count": 5, "host_id": 0, "hostname": null, "plugin_family": "Unix Compliance Checks", "plugin_id": "21361aed1df4e64051bc939431ca3096", "plugin_name": "BSI-100-2: S 4.105: No world writeable files - Preventing unauthorised acquisition of administrator rights", "severity": 3, "severity_index": 1 }, { "count": 5, "host_id": 0, "hostname": null, "plugin_family": "Unix Compliance Checks", "plugin_id": "5784176f032f448cb73b6cd4d4cff8be", "plugin_name": "BSI-100-2: S 4.105: Rlogind must be deactivated", "severity": 3, "severity_index": 2 } ], "filters": [ { "control": { "readable_regex": "c15c917b-e722-4cbf-a666-9ea11c3a6def", "regex": "[0-9a-f]{8}-([0-9a-f]{4}-){3}[0-9a-f]{12}(,[0-9a-f]{8}-([0-9a-f]{4}-){3}[0-9a-f]{12})*", "type": "entry" }, "group_name": "vulnerability", "name": "host.id", "operators": [ "eq", "neq", "match", "nmatch" ], "readable_name": "Asset ID" }, { "control": { "maxlength": 18, "readable_regex": "NUMBER", "regex": "^[0-9]+(,[0-9]+)*", "type": "entry" }, "group_name": "vulnerability", "name": "plugin.attributes.bid", "operators": [ "eq", "neq", "match", "nmatch" ], "readable_name": "Bugtraq ID" }, { "control": { "list": [ "true", "false" ], "type": "dropdown" }, "group_name": "vulnerability", "name": "plugin.attributes.exploit_framework_canvas", "operators": [ "eq", "neq" ], "readable_name": "CANVAS Exploit Framework" } ], "history": [ { "alt_targets_used": false, "creation_date": 1430933086, "history_id": 10328682, "is_archived": false, "last_modification_date": 1430934526, "owner_id": 2, "scheduler": 0, "status": "imported", "type": null, "uuid": "fd7d0d8e-c0e1-4439-97a5-d5c3a5c2d369ab8f7ecb158c480e" } ], "hosts": [ { "asset_id": 5, "critical": 0, "high": 3, "host_id": 5, "host_index": 0, "hostname": "192.0.2.57", "info": 156, "low": 1, "medium": 6, "numchecksconsidered": 100, "progress": "100-100/200-200", "scanprogresscurrent": 100, "scanprogresstotal": 100, "score": 3766, "severity": 166, "severitycount": { "item": [ { "count": 156, "severitylevel": 0 }, { "count": 1, "severitylevel": 1 }, { "count": 6, "severitylevel": 2 }, { "count": 3, "severitylevel": 3 }, { "count": 0, "severitylevel": 4 } ] }, "totalchecksconsidered": 100 }, { "asset_id": 3, "critical": 32, "high": 58, "host_id": 3, "host_index": 1, "hostname": "192.0.2.57", "info": 52, "low": 11, "medium": 100, "numchecksconsidered": 100, "progress": "100-100/200-200", "scanprogresscurrent": 100, "scanprogresstotal": 100, "score": 388162, "severity": 253, "severitycount": { "item": [ { "count": 52, "severitylevel": 0 }, { "count": 11, "severitylevel": 1 }, { "count": 100, "severitylevel": 2 }, { "count": 58, "severitylevel": 3 }, { "count": 32, "severitylevel": 4 } ] }, "totalchecksconsidered": 100 }, { "asset_id": 9, "critical": 16, "high": 45, "host_id": 9, "host_index": 2, "hostname": "192.0.2.57", "info": 115, "low": 5, "medium": 21, "numchecksconsidered": 100, "progress": "100-100/200-200", "scanprogresscurrent": 100, "scanprogresstotal": 100, "score": 207265, "severity": 202, "severitycount": { "item": [ { "count": 115, "severitylevel": 0 }, { "count": 5, "severitylevel": 1 }, { "count": 21, "severitylevel": 2 }, { "count": 45, "severitylevel": 3 }, { "count": 16, "severitylevel": 4 } ] }, "totalchecksconsidered": 100 } ], "info": { "acls": [ { "display_name": null, "id": null, "name": null, "owner": null, "permissions": 0, "type": "default" }, { "display_name": "user2@example.com", "id": 2, "name": "user2@example.com", "owner": 1, "permissions": 128, "type": "user" } ], "alt_targets_used": null, "control": false, "edit_allowed": false, "folder_id": 9, "hasaudittrail": true, "haskb": true, "hostcount": 10, "is_archived": false, "name": "KitchenSinkScan", "no_target": false, "object_id": 11, "owner": "user2@example.com", "pci-can-upload": null, "policy": null, "scan_end": 1430934526, "scan_start": 1430933086, "scan_type": null, "scanner_end": null, "scanner_name": null, "scanner_start": null, "schedule_uuid": "b0eeabbe-a612-429a-a60e-0f68eafb8c36f60557ee0e264228", "shared": false, "status": "imported", "tag_targets": [ "1cf4f3a3-9878-44ce-9fa7-3a969c602e28", "9808942a-2053-43a7-8580-7caebdfb959f" ], "targets": null, "timestamp": 1430934526, "user_permissions": 128, "uuid": "fd7d0d8e-c0e1-4439-97a5-d5c3a5c2d369ab8f7ecb158c480e" }, "notes": [ { "message": "One or more AirWatch API settings are not set", "title": "MDM501 AirWatch API settings misconfiguration" }, { "message": "Unable to connect to the ActiveSync server.", "title": "MDM501 ActiveSync connection error" }, { "message": "ADSI server (example.com) could not connect to server.", "title": "adsi_enum_directory_trusts.nbin: ADSI error" } ], "remediations": { "num_cves": 2536, "num_hosts": 10, "num_impacted_hosts": 8, "num_remediated_cves": 2283, "remediations": [ { "hosts": 1, "remediation": "FreeBSD : gpgme -- heap-based buffer overflow in gpgsm status handler (f166dd0b-6845-4830-a9fe-d9af0467fc30): Update the affected package.", "value": "96a449d372af3d23ca9a4f9f9a2ea73e", "vulns": 1 }, { "hosts": 1, "remediation": "FreeBSD : mozilla -- multiple vulnerabilities (8e3ca454-2405-4dc0-abed-2bc43690fbf8): Update the affected packages.", "value": "319a8ba9e264c876028b2a5abf5a1b0e", "vulns": 296 }, { "hosts": 1, "remediation": "RHEL 6 / 7 : postgresql (RHSA-2015:0750): Update the affected packages.", "value": "c22105fdc2756d11c39d1380e58c8fbc", "vulns": 0 } ] }, "vulnerabilities": [ { "count": 68, "plugin_family": "Port scanners", "plugin_id": 34220, "plugin_name": "Netstat Portscanner (WMI)", "severity": 0, "vuln_index": 1 }, { "count": 65, "plugin_family": "Windows", "plugin_id": 34252, "plugin_name": "Microsoft Windows Remote Listeners Enumeration (WMI)", "severity": 0, "vuln_index": 2 }, { "count": 41, "plugin_family": "Port scanners", "plugin_id": 14272, "plugin_name": "netstat portscanner (SSH)", "severity": 0, "vuln_index": 3 } ] }}