About
Outpost24 is pioneering cyber risk management with vulnerability management, application security testing, threat intelligence, and access management – in a single solution. When integrated into the Vulcan Platform, you'll be able to review hosts vulnerabilities on your assets while leveraging the power of Vulcan Cyber discoverability and automation.
Supported Products
Only Outpost24 Outscan is supported.
Outpost24 Outscan is an automated vulnerability scanner that enables organizations to diagnose, monitor, and triage external vulnerabilities on internet-exposed devices as well as verify PCI Compliance for transactional businesses.
Prerequisites and User Permissions
In the Outpost24 platform, make sure the user has the following:
Access to all relevant Targets
Configure the Outpost24 Connector
Log in to your Vulcan Cyber dashboard and go to Connectors.
Click on Add a Connector.
Click on the Outpost24 icon.
Enter the following information into the connector setup page.
Server URL
Username and password. Make sure the username you are using has access to the relevant targets and the 2-factor authentication is disabled.
Click the Test Connectivity button to verify that Vulcan Cyber can connect to your Outpost24 instance, then click Create (or Save Changes).
Allow some time for the sync to complete. You can review the sync status under Log.
To confirm the sync is complete, navigate to the Connectors tab to check the sync status. Once the Outpost24 icon shows Connected, the connection is complete.
From Outpost24 to the Vulcan Platform - Fields Mapping
Connector Fields Mapping
Outpost24 field | Vulcan field | Example |
hostname | Asset Name |
|
Hosts | Asset Type |
|
Asset details | Asset details |
|
IP | IP |
|
Class | OS |
|
cve productName data productName businessCriticality assetBusinessCriticality riskLevel | Vulnerability details |
|
name | Vulnerability title |
|
cvssV3Score → cvssScore | Vulnerability score |
|
description | Vulnerability description | The remote SSH server allows communication with weak encryption ciphers. This may allow attackers to eavesdrop or disrupt communications.\n\nNote: a cipher is considered to be weak if it uses a small key length or has known published attacks against it. |
Vulnerable | Vulnerability status |
|
Solution title | Fix title |
|
solution | Fix description |
|
API | Tracking method |
|
Vulnerability Score Mapping
Outpost24 Score | Vulcan score |
Critical | 10 |
High | 7 |
Medium | 5 |
Low | 3 |
Initial, Recommendation | 0 |
Vulnerability Status Mapping
Connector Score | Vulcan Statue | Notes |
Vulnerable | Vulnerable | Vulcan retrieves "Vulnerable/Open" only vulnerabilities from the Outpost24 platform. |
Note: If a vulnerability is marked as "fixed" or has a status other than "Vulnerable" in Outpost24, it doesn't appear in the Vulcan Platform. The Vulcan Platform only retrieves Vulnerable/Open vulnerabilities from the Outpost24 connector.
Locate Outpost24 vulnerabilities in the Vulcan Platform
As Outpost24 discovers vulnerabilities, the Vulcan Platform connector imports those vulnerabilities for reporting and action. With many assets and vulnerabilities, discovering specific vulnerabilities via source is made easy with filters.
Open the Vulcan Platform dashboard and navigate to the Vulnerabilities. Click on the Search or filter vulnerabilities search box, scroll to the Vulnerability Source option, and click to filter by the vulnerability source or Connector.
Locate Outpost24 on the vulnerability source list and click to filter results.
Click on any vulnerability to view further information.
Locate Outpost24 assets in the Vulcan Platform
To locate all synced website application assets from Outpost24, Go to the Assets tab in Vulcan Cyber.
Open the Vulcan Cyber dashboard and navigate to Assets > Hosts tab.
Click on the Search or filter websites input box and select Connector from the drop-down selection.
Locate the Outpost24 option to view all synced assets.
Automate Outpost24 vulnerability actions in the Vulcan Platform
Large environments quickly become unmanageable if constant manual attention and action are necessary to remediate vulnerabilities. Take advantage of the automation capabilities of Vulcan Cyber and the Outpost24 connector.
Click here to learn how to create automation in the Vulcan Cyber Platform.