Get scan details

GET {{baseUrl}}/scans/:scan_id?history_id=67454373&history_uuid=de19fad8-3fc4-eb16-cd67-d443d05a04aa

Returns scan results for a specific scan. If you submit a request without query parameters, Tenable.io returns results from the latest run of the specified scan. If you submit a request using the query parameters to specify a historical run of the scan, Tenable.io returns the scan results for the specified run.

Note: Keep in mind potential rate limits and concurrency limits when using this endpoint. To check the status of a scan, use the GET /scans/{scan_id}/latest-status endpoint. Tenable recommends the GET /scans/{scan_id}/latest-status endpoint especially if you are programmatically checking the status of large numbers of scans.

Note: This endpoint returns limited data if scan results are older than 35 days. Scans that are older than 35 days are effectively archived. The info.is_archived attribute in the response message for this endpoint serves as the indication of archival status. For complete data from archived scan results, use the POST /scans/{scan_id}/export endpoint instead.

Requires SCAN OPERATOR [24] user permissions and CAN VIEW [16] scan permissions. See Permissions.

Request Params

KeyDatatypeRequiredDescription
history_idnumberThe unique identifier of the historical data that you want Tenable.io to return. This identifier corresponds to the history.id attribute of the response message from the GET /scans/{scan_id}/history endpoint. You can use either this parameter or the history_uuid query parameter to specify a scan run.
history_uuidstringThe UUID of the historical data that you want Tenable.io to return. This identifier corresponds to the history.scan_uuid attribute of the response message from the GET /scans/{scan_id}/history endpoint. You can use either this parameter or the history_id query parameter to specify a scan run.

RESPONSES

status: OK

{"info":{"owner":"user2@example.com","name":"KitchenSinkScan","no_target":false,"folder_id":9,"control":false,"user_permissions":128,"schedule_uuid":"0fafc7a8-c5f6-fe9d-68b9-4d60ab0d9d2cf60557ee0e264228","edit_allowed":false,"scanner_name":null,"policy":null,"shared":false,"object_id":11,"tag_targets":["6fb39d03-fc3d-470d-96f1-6dbb7bef1f51","715f11cc-c503-4a73-9dc2-cbfb1089616d"],"acls":[{"permissions":0,"owner":null,"display_name":null,"name":null,"id":null,"type":"default"},{"permissions":128,"owner":1,"display_name":"user2@example.com","name":"user2@example.com","id":2,"type":"user"}],"hostcount":10,"uuid":"2776e999-1f5b-45b9-2e15-65a7be35b2e3ab8f7ecb158c480e","status":"imported","scan_type":null,"targets":null,"alt_targets_used":null,"pci-can-upload":null,"scan_start":1430933086,"timestamp":1430934526,"is_archived":false,"scan_end":1430934526,"haskb":true,"hasaudittrail":true,"scanner_start":null,"scanner_end":null},"history":[{"history_id":10328682,"owner_id":2,"creation_date":1430933086,"last_modification_date":1430934526,"uuid":"2776e999-1f5b-45b9-2e15-65a7be35b2e3ab8f7ecb158c480e","type":null,"status":"imported","scheduler":0,"alt_targets_used":false,"is_archived":false}],"hosts":[{"asset_id":5,"host_id":5,"hostname":"172.204.81.57","progress":"100-100/200-200","scanprogresscurrent":100,"scanprogresstotal":100,"numchecksconsidered":100,"totalchecksconsidered":100,"severitycount":{"item":[{"count":156,"severitylevel":0},{"count":1,"severitylevel":1},{"count":6,"severitylevel":2},{"count":3,"severitylevel":3},{"count":0,"severitylevel":4}]},"severity":166,"score":3766,"info":156,"low":1,"medium":6,"high":3,"critical":0,"host_index":0},{"asset_id":3,"host_id":3,"hostname":"172.204.81.57","progress":"100-100/200-200","scanprogresscurrent":100,"scanprogresstotal":100,"numchecksconsidered":100,"totalchecksconsidered":100,"severitycount":{"item":[{"count":52,"severitylevel":0},{"count":11,"severitylevel":1},{"count":100,"severitylevel":2},{"count":58,"severitylevel":3},{"count":32,"severitylevel":4}]},"severity":253,"score":388162,"info":52,"low":11,"medium":100,"high":58,"critical":32,"host_index":1},{"asset_id":9,"host_id":9,"hostname":"172.204.81.57","progress":"100-100/200-200","scanprogresscurrent":100,"scanprogresstotal":100,"numchecksconsidered":100,"totalchecksconsidered":100,"severitycount":{"item":[{"count":115,"severitylevel":0},{"count":5,"severitylevel":1},{"count":21,"severitylevel":2},{"count":45,"severitylevel":3},{"count":16,"severitylevel":4}]},"severity":202,"score":207265,"info":115,"low":5,"medium":21,"high":45,"critical":16,"host_index":2}],"vulnerabilities":[{"count":68,"plugin_id":34220,"plugin_name":"Netstat Portscanner (WMI)","severity":0,"plugin_family":"Port scanners","vuln_index":1},{"count":65,"plugin_id":34252,"plugin_name":"Microsoft Windows Remote Listeners Enumeration (WMI)","severity":0,"plugin_family":"Windows","vuln_index":2},{"count":41,"plugin_id":14272,"plugin_name":"netstat portscanner (SSH)","severity":0,"plugin_family":"Port scanners","vuln_index":3}],"comphosts":[{"asset_id":5,"host_id":5,"hostname":"172.204.81.57","progress":"100-100/200-200","scanprogresscurrent":100,"scanprogresstotal":100,"numchecksconsidered":100,"totalchecksconsidered":100,"severitycount":{"item":[{"count":0,"severitylevel":0},{"count":145,"severitylevel":1},{"count":62,"severitylevel":2},{"count":0,"severitylevel":3},{"count":86,"severitylevel":4}]},"score":867650,"info":0,"low":145,"medium":62,"high":0,"critical":86,"host_index":0,"severity":293},{"asset_id":3,"host_id":3,"hostname":"172.204.81.57","progress":"100-100/200-200","scanprogresscurrent":100,"scanprogresstotal":100,"numchecksconsidered":100,"totalchecksconsidered":100,"severitycount":{"item":[{"count":0,"severitylevel":0},{"count":52,"severitylevel":1},{"count":1,"severitylevel":2},{"count":0,"severitylevel":3},{"count":45,"severitylevel":4}]},"score":450620,"info":0,"low":52,"medium":1,"high":0,"critical":45,"host_index":1,"severity":98},{"asset_id":9,"host_id":9,"hostname":"172.204.81.57","progress":"100-100/200-200","scanprogresscurrent":100,"scanprogresstotal":100,"numchecksconsidered":100,"totalchecksconsidered":100,"severitycount":{"item":[{"count":0,"severitylevel":0},{"count":61,"severitylevel":1},{"count":23,"severitylevel":2},{"count":0,"severitylevel":3},{"count":64,"severitylevel":4}]},"score":642910,"info":0,"low":61,"medium":23,"high":0,"critical":64,"host_index":2,"severity":148}],"compliance":[{"count":5,"host_id":0,"hostname":null,"plugin_family":"Unix Compliance Checks","plugin_id":"143e17d31e1a30830fcc2c3539d803d0","plugin_name":"BSI-100-2: S 4.13: /etc/group consistency - Careful allocation of identifiers","severity":1,"severity_index":0},{"count":5,"host_id":0,"hostname":null,"plugin_family":"Unix Compliance Checks","plugin_id":"21361aed1df4e64051bc939431ca3096","plugin_name":"BSI-100-2: S 4.105: No world writeable files - Preventing unauthorised acquisition of administrator rights","severity":3,"severity_index":1},{"count":5,"host_id":0,"hostname":null,"plugin_family":"Unix Compliance Checks","plugin_id":"5784176f032f448cb73b6cd4d4cff8be","plugin_name":"BSI-100-2: S 4.105: Rlogind must be deactivated","severity":3,"severity_index":2}],"filters":[{"name":"host.id","readable_name":"Asset ID","control":{"type":"entry","regex":"[0-9a-f]{8}-([0-9a-f]{4}-){3}[0-9a-f]{12}(,[0-9a-f]{8}-([0-9a-f]{4}-){3}[0-9a-f]{12})*","readable_regex":"01234567-abcd-ef01-2345-6789abcdef01"},"operators":["eq","neq","match","nmatch"],"group_name":"vulnerability"},{"name":"plugin.attributes.bid","readable_name":"Bugtraq ID","control":{"type":"entry","regex":"^[0-9]+(,[0-9]+)*","readable_regex":"NUMBER","maxlength":18},"operators":["eq","neq","match","nmatch"],"group_name":"vulnerability"},{"name":"plugin.attributes.exploit_framework_canvas","readable_name":"CANVAS Exploit Framework","control":{"type":"dropdown","list":["true","false"]},"operators":["eq","neq"],"group_name":"vulnerability"}],"notes":[{"message":"One or more AirWatch API settings are not set","title":"MDM501 AirWatch API settings misconfiguration"},{"message":"Unable to connect to the ActiveSync server.","title":"MDM501 ActiveSync connection error"},{"message":"ADSI server (matrix.tenablesecurity.com) could not connect to server.","title":"adsi_enum_directory_trusts.nbin: ADSI error"}],"remediations":{"num_cves":2536,"num_hosts":10,"num_remediated_cves":2283,"num_impacted_hosts":8,"remediations":[{"vulns":1,"value":"96a449d372af3d23ca9a4f9f9a2ea73e","hosts":1,"remediation":"FreeBSD : gpgme -- heap-based buffer overflow in gpgsm status handler (90ca3ba5-19e6-11e4-8616-001b3856973b): Update the affected package."},{"vulns":296,"value":"319a8ba9e264c876028b2a5abf5a1b0e","hosts":1,"remediation":"FreeBSD : mozilla -- multiple vulnerabilities (d0c97697-df2c-4b8b-bff2-cec24dc35af8): Update the affected packages."},{"vulns":0,"value":"c22105fdc2756d11c39d1380e58c8fbc","hosts":1,"remediation":"RHEL 6 / 7 : postgresql (RHSA-2015:0750): Update the affected packages."}]}}