I watched the recording of the Positive Technologies webinar “How to use MaxPatrol VM API: theory and practice“. On the theoretical part, everything is clear: there is a documented API; it is the same for integrations and Web GUI.
On the practical side they showed:
How to use the MaxPatrol API in the Nightingale REST client (examples on GitHub).
Unofficial PTVM SDK. A small Python script with one class for working with the MaxPatrol API.
Positive CLI for MaxPatrol API. So, automation can be done simply with shell scripts!
A much more functional project than the SDK, also in Python. The screenshots show the vulnerabilities with criticality calculated using FSTEC methodology and trending vulnerabilities with an exploit.
How to use the MaxPatrol API in the low-code tool n8n (e.g. sending query results to Telegram).
Links to projects are on the addons page.
Show it to your colleagues who work with MaxPatrol VM.