Resource Types
This topic lists the types of resources available to Apex Central APIs.
The APIs give you access to information on the following resources:
Resource |
Associated API Groups |
Description |
---|---|---|
ProductServers |
Servers |
Target servers that are registered with Apex Central |
ProductAgents |
|
Target Security Agents that are managed by Apex Central |
UserDefinedSO |
UDSO |
Files, SHA-1 hash values, IP addresses, domains, and URLs that were added to the User-Defined Suspicious Objects list |
STIXResource |
STIX |
Files in the Structured Threat Information eXpression (STIX) format that were uploaded to the Apex Central server These files contain SHA-1 hash values, IP addresses, domains, and URLs that you can add to the User-Defined Suspicious Objects list or Exceptions list. |
OpenIOCResource |
OpenIOC |
Files in the Open Indicators of Compromise (OpenIOC) format that were uploaded to the Apex Central server These files contain suspicious SHA-1 hash values, IP addresses, domains, and URLs that you can add to the User-Defined Suspicious Objects list. |
YARAResource |
YARA |
YARA files that were uploaded to the Apex Central server YARA files contain rules that describe malware in textual or binary patterns. You can customize these rules to identify security threats that are specific to your environment. |
OsceIes |
|
Information on investigation tasks, including assessment results and root cause analysis reports |