osel/qualys/xml/scan_results.xml
Nate Johnston ca0e1ca769 Initial import of osel code
This is an initial import of the osel codebase.  The osel tool is a tool that
initiates external security scans (initially through Qualys) upon reciept of
AMQP events that indicate certain sensitive events have occurred, like a
security group rule change.

The commit history had to be thrown away because it contained some non-public
data, so I would like to call out the following contributors:

This uses go 1.10 and vgo for dependency management.

Co-Authored-By: Charles Bitter <Charles_Bitter@cable.comcast.com>
Co-Authored-By: Olivier Gagnon <Olivier_Gagnon@cable.comcast.com>
Co-Authored-By: Joseph Sleiman <Joseph_Sleiman@comcast.com>

Change-Id: Ib6abe2024fd91978b783ceee4cff8bb4678d7b15
2018-03-24 15:30:57 +00:00

81 lines
2.6 KiB
XML

<?xml version="1.0" encoding="UTF-8" ?>
<!DOCTYPE COMPLIANCE_SCAN_RESULT_OUTPUT SYSTEM
"https://qualysapi.qualys.com/api/2.0/fo/scan/compliance/compliance_s
can_result_output.dtd">
<COMPLIANCE_SCAN_RESULT_OUTPUT>
<RESPONSE>
<DATETIME>2012-09-17T10:23:53Z</DATETIME>
<COMPLIANCE_SCAN>
<HEADER>
<NAME>
<![CDATA[Compliance Scan Results]]>
</NAME>
<GENERATION_DATETIME>
2012-09-17T10:23:53Z
</GENERATION_DATETIME>
<COMPANY_INFO>
<NAME><![CDATA[Qualys]]></NAME>
<ADDRESS><![CDATA[1600 Bridge Parkway]]></ADDRESS>
<CITY><![CDATA[Redwood Shores]]></CITY>
<STATE><![CDATA[California]]></STATE>
<COUNTRY><![CDATA[United States]]></COUNTRY>
<ZIP_CODE><![CDATA[94065]]></ZIP_CODE>
</COMPANY_INFO>
<USER_INFO>
<NAME><![CDATA[NAME]]></NAME>
<USERNAME>USERNAME</USERNAME>
<ROLE>Manager</ROLE>
</USER_INFO>
<KEY value="USERNAME">USERNAME</KEY>
<KEY value="COMPANY"><![CDATA[Qualys]]></KEY>
<KEY value="DATE">2012-09-15T11:49:08Z</KEY>
<KEY value="TITLE"><![CDATA[My PC Scan]]></KEY>
<KEY value="TARGET">10.10.10.29</KEY>
<KEY value="EXCLUDED_TARGET"><![CDATA[N/A]]></KEY>
<KEY value="DURATION">00:01:00</KEY>
<KEY value="SCAN_HOST">
10.10.21.122 (Scanner 6.6.28-1, Vulnerability Signatures 2.2.215-2)
</KEY>
<KEY value="NBHOST_ALIVE">1</KEY>
<KEY value="NBHOST_TOTAL">1</KEY>
<KEY value="REPORT_TYPE">Scheduled</KEY>
<KEY value="OPTIONS">
File Integrity Monitoring: Enabled,
Scanned Ports: Standard Scan, Hosts to Scan in Parallel - External
Scanners: 15, Hosts to Scan in Parallel - Scanner Appliances: 30,
Total Processes to Run in Parallel: 10, HTTP Processes to Run in
Parallel: 10,
Packet (Burst) Delay: Medium, Intensity: Normal, Overall Performance:
Normal, ICMP Host Discovery, Ignore RST packets: Off, Ignore firewallgenerated
SYN-ACK packets: Off, Do not send ACK or SYN-ACK packets
during host discovery: Off
</KEY>
<KEY value="STATUS">FINISHED</KEY>
<OPTION_PROFILE>
<OPTION_PROFILE_TITLE option_profile_default="0">
<![CDATA[11412]]>
</OPTION_PROFILE_TITLE>
</OPTION_PROFILE>
</HEADER>
<APPENDIX>
<TARGET_HOSTS>
<HOSTS_SCANNED>10.10.10.29</HOSTS_SCANNED>
</TARGET_HOSTS>
<TARGET_DISTRIBUTION>
<SCANNER>
<NAME><![CDATA[iscan_sx]]></NAME>
<HOSTS>10.10.10.29</HOSTS>
</SCANNER>
</TARGET_DISTRIBUTION>
<AUTHENTICATION>
<AUTH>
<TYPE>Windows</TYPE>
<SUCCESS>
<IP>10.10.10.29</IP>
</SUCCESS>
</AUTH>
</AUTHENTICATION>
</APPENDIX>
</COMPLIANCE_SCAN>
</RESPONSE>
</COMPLIANCE_SCAN_RESULT_OUTPUT>