REST API Overview

Additional Policy Fields

Retrieve special field for firewall NAT Pools that are used by Fortinet.

This API is currently only supported for Palo Alto Networks firewalls and Fortinet devices managed by FortiManager.

For complete details see Additional Policy Fields.

Application IDs

Retrieve information about Application Identities in Next-Generation firewalls. (For Palo Alto Networks devices only.)

For complete details see Application IDs.

Change Authorization

Identify changes that were not authorized by a SecureChange ticket.

For complete details see Change Authorization.

Device Interfaces and Zones

Retrieve information about network interfaces, routing tables, and security zones on devices.

For complete details see Device Interfaces and Zones.

Domains

Manage SecureTrack domains. This is only relevant if multi-domain mode is enabled.

For complete details see Domains.

IPsec VPN

Retrieve information about VPN settings for supported device types. (For Check Point and Cisco devices only.)

For complete details see IPsec VPN.

Internet Objects

Manage the Internet object on devices that define this object.

For complete details see Internet Objects.

Review LDAP settings and search LDAP directory entries.

For complete details see LDAP.

Monitored Devices

Manage the devices that are monitored in SecureTrack.

Adding devices is supported for offline devices only.

For complete details see Monitored Devices.

NAT Policies

Retrieve NAT objects and rules for supported devices. Supported devices are Check Point, Cisco, Juniper, Fortinet, Stonesoft.

For complete details see NAT Policies.

Network Objects

Retrieve network object data from devices.

For complete details see Network Objects.

Network Topology

Retrieve network topology data from devices.

For complete details see Network Topology.

Network Zone Manager - Patterns

Manage a set of text patterns, and then associate specific text patterns with SecureTrack network zones. SecureTrack automatically associates all security groups where the name matches the text patterns with the specified zones.

For complete details see Network Zone Manager - Patterns.

Network Zone Manager - Subnets

Manage the subnets associated with SecureTrack network zones.

For complete details see Network Zone Manager - Subnets.

Network Zone Manager - Zones

Manage SecureTrack zones. The zones are used to define security zone matrices for Unified Security Policies.

For complete details see Network Zone Manager - Zones.

Policies and Sub-Policies

Retrieve information about bindings, including security policies, ACLs, zone-based policies, and security groups.

For complete details see Policies and Sub-Policies.

Policy Analysis

Identify rules that correspond to traffic flows.

For complete details see Policy Analysis.

Policy Optimization

Retrieve information about risky and sub-optimal policy configurations that can be cleaned up.

For complete details see Policy Optimization.

Revisions

Retrieve the historical policy revisions from a specific device.

For complete details see Revisions.

Rule Documentation

Manage the rule metadata associated with a policy revision.

For complete details see Rule Documentation.

Rule Usage

Retrieve information about last hit per rule, based on rule usage tracking that is monitored by SecureTrack.

Retrieve information about last hit per user and application inside For Palo Alto Networks rules.

For complete details see Rule Usage.

Security Rules

Retrieve security rules from both hardware devices and cloud platforms.

For complete details see Security Rules.

Services and Ports

Retrieve the service definition (IP protocols and ports) from both hardware devices and cloud policies.

For complete details see Services and Ports.

Time Objects

Retrieve the time object definition from supported devices.

For complete details see Time Objects.

Traffic Policy Matcher

Retrieve information about the details of an Amazon AWS policy that are relevant for specified traffic.

For complete details see Traffic Policy Matcher.

Unified Security Policy - Access Request Violations

Retrieve the USP violations for an access request, in either synchronous or asynchronous mode.

For complete details see Unified Security Policy - Access Request Violations.

Unified Security Policy - Alerts

Manage your USP alerts.

For complete details see Unified Security Policy - Alerts.

Unified Security Policy - Cloud Tag Policy

Retrieve information about policy definitions for Amazon AWS cloud tags.

For complete details see Unified Security Policy - Cloud Tag Policy.

Unified Security Policy - Exceptions

Retrieve definitions of security zone exceptions.

For complete details see Unified Security Policy - Exceptions.

Unified Security Policy - Security Zone Matrix

Retrieve definitions of security zone matrices.

For complete details see Unified Security Policy - Security Zone Matrix.

Unified Security Policy - Violations

Retrieve information about firewall policies that violate security zone matrices.

For complete details see Unified Security Policy - Violations.