Outpost24 is pioneering cyber risk management with vulnerability management, application security testing, threat intelligence, and access management – in a single solution. When integrated into the Vulcan Platform, you'll be able to review hosts vulnerabilities on your assets while leveraging the power of Vulcan Cyber discoverability and automation.
Prerequisites and User Permissions
In the Outpost24 platform, make sure the user has the following:
Configure the Outpost24 Connector
Log in to your Vulcan Cyber dashboard and go to Connectors.
Click on Add a Connector.
Click on the Outpost24 icon.
Enter the following information into the connector setup page.
Click the Test Connectivity button to verify that Vulcan Cyber can connect to your Outpost24 instance, then click Create (or Save Changes).
Allow some time for the sync to complete. You can review the sync status under Log.
To confirm the sync is complete, navigate to the Connectors tab to check the sync status. Once the Outpost24 icon shows Connected, the connection is complete.
From Outpost24 to the Vulcan Platform - Fields Mapping
Connector Fields Mapping
cvssV3Score → cvssScore
The remote SSH server allows communication with weak encryption ciphers. This may allow attackers to eavesdrop or disrupt communications.\n\nNote: a cipher is considered to be weak if it uses a small key length or has known published attacks against it.
Vulnerability Score Mapping
Vulnerability Status Mapping
Vulcan retrieves "Vulnerable/Open" only vulnerabilities from the Outpost24 platform.
Note: If a vulnerability is marked as "fixed" or has another status besides "Vulnerable" in Outpost24, it doesn't appear in the Vulcan Platform. Meaning, the Vulcan Platform only retrieves Vulnerable/Open vulnerabilities from the Outpost24 connector into the Vulcan Platform.
Locate Outpost24 vulnerabilities in the Vulcan Platform
As Outpost24 discovers vulnerabilities, the Vulcan Platform connector imports those vulnerabilities for reporting and action. With many assets and vulnerabilities, discovering specific vulnerabilities via source is made easy with filters.
Open the Vulcan Platform dashboard and navigate to the Vulnerabilities. Click on the Search or filter vulnerabilities search box, scroll to the Vulnerability Source option, and click to filter by the vulnerability source or Connector.
Locate Outpost24 on the vulnerability source list and click to filter results.
Click on any vulnerability to view further information.
Locate Outpost24 assets in the Vulcan Platform
To locate all synced website application assets from Outpost24, Go to the Assets tab in Vulcan Cyber.
Open the Vulcan Cyber dashboard and navigate to Assets > Hosts tab.
Click on the Search or filter websites input box and select Connector from the drop-down selection.
Locate the Outpost24 option to view all synced assets.
Automate Outpost24 vulnerability actions in the Vulcan Platform
Large environments quickly become unmanageable if constant manual attention and action are necessary to remediate vulnerabilities. Take advantage of the automation capabilities of Vulcan Cyber and the Outpost24 connector.
Click here to learn how to create automation in the Vulcan Cyber Platform.