Use this API to get a QID remediation plan. You can fetch the patch insights data based on the "assetid" and "qid" combinations you enter. With this data, you can get details about the patches that can be used to remediate the QIDs you entered.
Parameter |
Mandatory/Optional |
Data Type |
Description |
---|---|---|---|
assetid |
Mandatory |
intiger |
Enter the target asset ID. |
qid |
Mandatory |
intiger |
Enter the qid that needs to be remediated for the assetid that you entered. |
API request
curl -X 'POST' \ '<qualys_base_url>/pm/v1/remediation/insights' \ -
H 'accept: application/json' \ -H 'Authorization: Bearer <<jwt token>>' \
-H 'Content-Type: application/json' \ -d '[ { "assetId": 28695733, "qid":
241298 } ]'
Response (Example for the Linux "assetid’ and ’qid’ combination that you entered)
[
{
"qid": 241298,
"qidTitle": "Red Hat Update for kernel security (RHSA-2023:1470)",
"assetId": 28695733,
"assetUUID": "07e884c6-890c-4ce7-b1c7-dbdd0c360569",
"assetName": "localhost.localdomain",
"assetPlatform": "Linux",
"assetOperatingSystem": "Red Hat Enterprise Linux 9.0",
"assetLicenseStatus": "Full",
"statusMessage": "The provided Asset is fully licensed. All patch information is available.",
"patches": [
{
"qualysPatchId": "4908bae0-1dd8-3757-8c53-e54048b11ce2",
"patchTitle": "RHSA-2023:1470: kernel security, bug fix, and enhancement update",
"category": "Security",
"vendorSeverity": "Important",
"bulletin": null,
"kb": null,
"advisory": "RHSA-2023:1470",
"notification": null,
"associatedQIDs": [
"241298"
],
"cve": [
"CVE-2022-4744",
"CVE-2022-4269",
"CVE-2023-0266"
],
"downloadUrls": null,
"packages": [
"kernel-zfcpdump-modules-extra-5.14.0-162.22.2.el9_1.noarch.rpm",
"kernel-tools-libs-devel-5.14.0-162.22.2.el9_1.noarch.rpm",
"kernel-modules-5.14.0-162.22.2.el9_1.noarch.rpm",
"python3-perf-5.14.0-162.22.2.el9_1.x86_64.rpm",
...
"kernel-modules-extra-5.14.0-162.22.2.el9_1.noarch.rpm",
"kernel-debug-modules-extra-5.14.0-162.22.2.el9_1.noarch.rpm"
]
}
]
}
]