On This Page
REST API Overview
Additional Policy Fields
Retrieve special field for firewall NAT Pools that are used by Fortinet.
This API is currently only supported for Palo Alto Networks firewalls and Fortinet devices managed by FortiManager.
For complete details see Additional Policy Fields.
Application IDs
Retrieve information about Application Identities in Next-Generation firewalls. (For Palo Alto Networks devices only.)
For complete details see Application IDs.
Change Authorization
Identify changes that were not authorized by a SecureChange ticket.
For complete details see Change Authorization.
Device Interfaces and Zones
Retrieve information about network interfaces, routing tables, and security zones on devices.
For complete details see Device Interfaces and Zones.
Domains
Manage SecureTrack domains. This is only relevant if multi-domain mode is enabled.
For complete details see Domains.
IPsec VPN
Retrieve information about VPN settings for supported device types. (For Check Point and Cisco devices only.)
For complete details see IPsec VPN.
Internet Objects
Manage the Internet object on devices that define this object.
For complete details see Internet Objects.
Review LDAP settings and search LDAP directory entries.
For complete details see LDAP.
Monitored Devices
Manage the devices that are monitored in SecureTrack.
Adding devices is supported for offline devices only.
For complete details see Monitored Devices.
NAT Policies
Retrieve NAT objects and rules for supported devices. Supported devices are Check Point, Cisco, Juniper, Fortinet, Stonesoft.
For complete details see NAT Policies.
Network Objects
Retrieve network object data from devices.
For complete details see Network Objects.
Network Topology
Retrieve network topology data from devices.
For complete details see Network Topology.
Network Zone Manager - Patterns
Manage a set of text patterns, and then associate specific text patterns with SecureTrack network zones. SecureTrack automatically associates all security groups where the name matches the text patterns with the specified zones.
For complete details see Network Zone Manager - Patterns.
Network Zone Manager - Subnets
Manage the subnets associated with SecureTrack network zones.
For complete details see Network Zone Manager - Subnets.
Network Zone Manager - Zones
Manage SecureTrack zones. The zones are used to define security zone matrices for Unified Security Policies.
For complete details see Network Zone Manager - Zones.
Policies and Sub-Policies
Retrieve information about bindings, including security policies, ACLs, zone-based policies, and security groups.
For complete details see Policies and Sub-Policies.
Policy Analysis
Identify rules that correspond to traffic flows.
For complete details see Policy Analysis.
Policy Optimization
Retrieve information about risky and sub-optimal policy configurations that can be cleaned up.
For complete details see Policy Optimization.
Revisions
Retrieve the historical policy revisions from a specific device.
For complete details see Revisions.
Rule Documentation
Manage the rule metadata associated with a policy revision.
For complete details see Rule Documentation.
Rule Usage
Retrieve information about last hit per rule, based on rule usage tracking that is monitored by SecureTrack.
Retrieve information about last hit per user and application inside For Palo Alto Networks rules.
For complete details see Rule Usage.
Security Rules
Retrieve security rules from both hardware devices and cloud platforms.
For complete details see Security Rules.
Services and Ports
Retrieve the service definition (IP protocols and ports) from both hardware devices and cloud policies.
For complete details see Services and Ports.
Time Objects
Retrieve the time object definition from supported devices.
For complete details see Time Objects.
Traffic Policy Matcher
Retrieve information about the details of an Amazon AWS policy that are relevant for specified traffic.
For complete details see Traffic Policy Matcher.
Unified Security Policy - Access Request Violations
Retrieve the USP violations for an access request, in either synchronous or asynchronous mode.
For complete details see Unified Security Policy - Access Request Violations.
Unified Security Policy - Alerts
Manage your USP alerts.
For complete details see Unified Security Policy - Alerts.
Unified Security Policy - Cloud Tag Policy
Retrieve information about policy definitions for Amazon AWS cloud tags.
For complete details see Unified Security Policy - Cloud Tag Policy.
Unified Security Policy - Exceptions
Retrieve definitions of security zone exceptions.
For complete details see Unified Security Policy - Exceptions.
Unified Security Policy - Security Zone Matrix
Retrieve definitions of security zone matrices.
For complete details see Unified Security Policy - Security Zone Matrix.
Unified Security Policy - Violations
Retrieve information about firewall policies that violate security zone matrices.
For complete details see Unified Security Policy - Violations.
Was this helpful?
Thank you!
We’d love your feedback
We really appreciate your feedback
Send this page to a colleague