In order to use the vulnerability sync feature, you will need to generate a report using your third-party vulnerability scanner. The following vendor reports are currently supported:
- Crowdstrike Falcon Spotlight - Vulnerability Report
- Rapid7 - Vulnerability Report Export
- Tenable.io - CSV Vulnerability Export
- Qualys - Scan Report
Requirements for the CSV import:
The very first line in each CSV must contain the required data, depending on your CSV provider.
hostname, cve id. Follow the format requirements as noted in the console (Add New Task dialog window).
Hostnames are not case-sensitive.
Hostnames should not be wrapped in any quotes, parenthesis, brackets, or single tics.
The CVE field should not contain any special characters other than dashes, for example CVE-2021-1234, or commas for a list of CVEs.
Severity is an optional field
Severities must use one of the following keywords, unless otherwise indicated: Critical, High, Medium, Low
The CSV report must be less than 1 GB.
The CSV row maximum is 20,000 rows.
Example CSV file:
Crowdstrike Falcon Spotlight - Vulnerability Report
Follow these instructions to download a vulnerability report from the Crowdstrike Falcon Spotlight platform.
From the Crowdstrike dashboard, ensure that the report identifies hostnames and CVE IDs.
Be sure to include relevant filters as there is a file size limit for the ingest of 1 GB.
Additionally, be aware that more CVE IDs will mean more tasks to be created by Automox.
Example of CrowdStrike’s Spotlight Vulnerability Dashboard. Note: It is possible to filter on relevant vulnerabilities for the export.
Select the file format CSV and export the report.
Rapid7 - Vulnerability Report Export
Follow these instructions to manually create and export a vulnerability report from Rapid7 InsightVM/Nexpose.
Note: If you are using the Rapid7 InsightConnect , you do not need to manually export a vulnerability report from Rapid7 InsightVM/Nexpose. The vulnerability sync workflow bypasses the manual need to export and upload the report to Automox.
When the synced imported report is ready, you can continue with the vulnerability process from the point of observing the mapping process until it is complete and take actions as required. Follow the description in our Vulnerability Sync documentation: Using Automox Vulnerability Sync → Syncing the Imported Report.
See also Automox Plugin for Rapid7 InsightConnect.
Requirements: You must use the on-premise console to generate the report
Creating a Rapid7 vulnerability report
In order to easily export vulnerability findings from Rapid7 InsightVM/Nexpose in a format that is quickly imported into Automox, we recommend creating a Custom SQL Report. This can be done within the InsightVM console by following these steps:
Navigate to Reports.
On the Create a Report page, select Export.
Select SQL Query Export from the list of templates.
Add the query for the custom report and validate.
Save and run the report.
As new scans are performed, your Vulnerability Management team can regenerate reports and scope them to the groups, sites, and categories they are hoping to target. If the SQL query is modified for your environment needs, ensure the hostname and cve id fields are headers within the report export.
Query for custom SQL report
In the InsightVM/Nexpose Console, create a custom SQL Report using the following query:
That query will yield a result something like the following:
Make sure that it is saved in CSV format and use that file to upload into the console. Feel free to apply other filters to the SQL report. See also the following example queries for Rapid7 vulnerability reports:
Query for vulnerabilities with severity of Critical
This query is used to create a report for CVEs with a severity level of "critical".
Query for vulnerabilities by specific CVEs
This query is used to create a report for a specific CVE.
If you need additional assistance or want to modify the query, use the Rapid7 documentation located here:
Tenable.io - CSV Vulnerability Export
When exporting vulnerability data, you must include the following fields in the report:
After exporting the data, you do not need to modify the report in order to upload it to Automox as long as you select TenableIO for the CSV Provider:
Qualys - Scan Report
By exporting a Qualys New Scan Report, it is possible to upload vulnerability details from Qualys scans to remediate devices.
To generate a scan report, navigate to Reports → Templates → New Scan Template
When Creating the Report Template, select Vulnerability Details to ensure that CVE information is included in the report. The Qualys report includes IP addresses and a list of CVE IDs for correlating with Automox. No modifications to the report are necessary in order to upload to Automox as long as you select Qualys for the CSV Provider: