<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: API output - threat in Automation/API Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/api-output-threat/m-p/18661#M484</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;action 'get' with xpath '/config/predefined/threats/vulnerability'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this has some related information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;A href="https://live.paloaltonetworks.com/message/25512"&gt;Re: Listing all of vulnerability or phone-home signature&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the JSON Template stuff is very powerful but complicated&lt;/P&gt;&lt;P&gt;at first glance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;a simple variation to just output JSON is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;$ panxapi.py -t pa-200 -grj /config/predefined/threats/vulnerability|head -20&lt;/P&gt;&lt;P&gt;get: success &lt;PRE&gt;&lt;/PRE&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }, &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "default-action": "alert", &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "name": "35931", &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "p": "yes", &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "severity": "high", &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "threatname": "HP Data Protector OmniInet Opcode Buffer Overflow Vulnerability"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }, &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; {&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Sat, 26 Oct 2013 23:36:46 GMT</pubDate>
    <dc:creator>ksteves1</dc:creator>
    <dc:date>2013-10-26T23:36:46Z</dc:date>
    <item>
      <title>API output - threat</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/api-output-threat/m-p/18660#M483</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;BR /&gt;Is there an area I can run an API call against that will give me output of the threat signatures?&amp;nbsp; Looking for stuff like ID, severity, name etc.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 24 Oct 2013 17:38:12 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/api-output-threat/m-p/18660#M483</guid>
      <dc:creator>smccall</dc:creator>
      <dc:date>2013-10-24T17:38:12Z</dc:date>
    </item>
    <item>
      <title>Re: API output - threat</title>
      <link>https://live.paloaltonetworks.com/t5/automation-api-discussions/api-output-threat/m-p/18661#M484</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;action 'get' with xpath '/config/predefined/threats/vulnerability'&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;this has some related information:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp; &lt;A href="https://live.paloaltonetworks.com/message/25512"&gt;Re: Listing all of vulnerability or phone-home signature&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;the JSON Template stuff is very powerful but complicated&lt;/P&gt;&lt;P&gt;at first glance.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;a simple variation to just output JSON is:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;$ panxapi.py -t pa-200 -grj /config/predefined/threats/vulnerability|head -20&lt;/P&gt;&lt;P&gt;get: success &lt;PRE&gt;&lt;/PRE&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }, &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "default-action": "alert", &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "name": "35931", &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "p": "yes", &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "severity": "high", &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; "threatname": "HP Data Protector OmniInet Opcode Buffer Overflow Vulnerability"&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; }, &lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; {&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 26 Oct 2013 23:36:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/automation-api-discussions/api-output-threat/m-p/18661#M484</guid>
      <dc:creator>ksteves1</dc:creator>
      <dc:date>2013-10-26T23:36:46Z</dc:date>
    </item>
  </channel>
</rss>

