Skip to main content
ASM Integrations Configuration

Vulnerability Synchronization Configuration


Overview

The Integrations page enables organizations to link their ASM findings to a specific assessment in VM.
Once linked, all detected exposures are sent as tickets, allowing unified monitoring and lifecycle tracking — from detection to closure.

Key Capabilities

Assessment Selection

Choose an active VM assessment where all ASM exposures should be sent.
This could be a quarterly assessment, continuous scan, or any custom project.

One-Click Sync

Use the Sync Vulns button to immediately push all exposures into VM.
Each exposure is converted into a ticket with its reason, severity, and asset context.

Auto Status Tracking

ASM automatically tracks exposure resolution back from VM.
When an exposure ticket is marked as resolved in VM, the ASM status updates in real-time.

Centralized Visibility

View your entire attack surface and remediation status across both products from one place.

Workflow Example

  1. Select your desired assessment (e.g., Q1 - Attack Surface Management).
  2. Click Sync Vulns to export all ASM exposures to VM.
  3. Each exposure becomes a ticket with full context (asset, reason, severity, etc.).
  4. Once developers fix the issue and close the ticket in VM, ASM reflects the change automatically.

Example Use Case

  • ASM detects several IPs with open SSH ports (22) and expired SSL certificates.
  • You sync them to VM under Continuous Vulnerability Scanning.
  • The VM team triages, assigns owners, and tracks SLAs.
  • When tickets are closed, ASM marks those exposures as Resolved automatically.

Benefits

✅ Unified visibility between ASM discovery and VM remediation
✅ Automated exposure tracking and closure validation
✅ Reduced manual overhead in managing attack surface risks
✅ Cross-module consistency for reporting and compliance

Next Steps

Set Exposure Policies

Define your detection logic using YAML-based exposure rules.

View Exposures in VM

Track synced exposures directly in the Vulnerability Dashboard.