Outpost24 Connector

Learn all about integrating Outpost24 into the Vulcan Platform

Updated over a week ago

About

Outpost24 is pioneering cyber risk management with vulnerability management, application security testing, threat intelligence, and access management – in a single solution. When integrated into the Vulcan Platform, you'll be able to review hosts vulnerabilities on your assets while leveraging the power of Vulcan Cyber discoverability and automation.

Supported Products

Only Outpost24 Outscan is supported.
Outpost24 Outscan is an automated vulnerability scanner that enables organizations to diagnose, monitor, and triage external vulnerabilities on internet-exposed devices as well as verify PCI Compliance for transactional businesses.


Prerequisites and User Permissions

In the Outpost24 platform, make sure the user has the following:


Configure the Outpost24 Connector

  1. Log in to your Vulcan Cyber dashboard and go to Connectors.

  2. Click on Add a Connector.

  3. Click on the Outpost24 icon.

  4. Enter the following information into the connector setup page.

  5. Click the Test Connectivity button to verify that Vulcan Cyber can connect to your Outpost24 instance, then click Create (or Save Changes).

  6. Allow some time for the sync to complete. You can review the sync status under Log.

  7. To confirm the sync is complete, navigate to the Connectors tab to check the sync status. Once the Outpost24 icon shows Connected, the connection is complete.


From Outpost24 to the Vulcan Platform - Fields Mapping

Connector Fields Mapping

Outpost24 field

Vulcan field

Example

hostname

Asset Name

Hosts

Asset Type

Asset details

Asset details

IP
Hostname

IP

Class

OS

cve

productName

data

productName

businessCriticality

assetBusinessCriticality

riskLevel

Vulnerability details

name

Vulnerability title

cvssV3Score → cvssScore

Vulnerability score

description

Vulnerability description

The remote SSH server allows communication with weak encryption ciphers. This may allow attackers to eavesdrop or disrupt communications.\n\nNote: a cipher is considered to be weak if it uses a small key length or has known published attacks against it.

Vulnerable

Vulnerability status

Solution title

Fix title

solution

Fix description

API

Tracking method

Vulnerability Score Mapping

Outpost24 Score

Vulcan score

Critical

10

High

7

Medium

5

Low

3

Initial, Recommendation

0

Vulnerability Status Mapping

Connector Score

Vulcan Statue

Notes

Vulnerable

Vulnerable

Vulcan retrieves "Vulnerable/Open" only vulnerabilities from the Outpost24 platform.

Note: If a vulnerability is marked as "fixed" or has a status other than "Vulnerable" in Outpost24, it doesn't appear in the Vulcan Platform. The Vulcan Platform only retrieves Vulnerable/Open vulnerabilities from the Outpost24 connector.


Locate Outpost24 vulnerabilities in the Vulcan Platform

As Outpost24 discovers vulnerabilities, the Vulcan Platform connector imports those vulnerabilities for reporting and action. With many assets and vulnerabilities, discovering specific vulnerabilities via source is made easy with filters.

  1. Open the Vulcan Platform dashboard and navigate to the Vulnerabilities. Click on the Search or filter vulnerabilities search box, scroll to the Vulnerability Source option, and click to filter by the vulnerability source or Connector.

  2. Locate Outpost24 on the vulnerability source list and click to filter results.

  3. Click on any vulnerability to view further information.


Locate Outpost24 assets in the Vulcan Platform

To locate all synced website application assets from Outpost24, Go to the Assets tab in Vulcan Cyber.

  1. Open the Vulcan Cyber dashboard and navigate to Assets > Hosts tab.

  2. Click on the Search or filter websites input box and select Connector from the drop-down selection.

  3. Locate the Outpost24 option to view all synced assets.


Automate Outpost24 vulnerability actions in the Vulcan Platform

Large environments quickly become unmanageable if constant manual attention and action are necessary to remediate vulnerabilities. Take advantage of the automation capabilities of Vulcan Cyber and the Outpost24 connector.

Click here to learn how to create automation in the Vulcan Cyber Platform.

Did this answer your question?