SAP® Crystal Reports

FVM Connect™ allows the integration of the Fortra VM™ platform with SAP® Crystal Reports Business Intelligence (BI) reporting software. This allows you to create a Fortra VM data report, with your data, using templates authored within your own SAP Crystal reports software. FVM Connect is achieved by way of integration scripts.

To integrate with SAP Crystal Reports, perform the following steps (see below for detailed instructions):

  1. Generate a Fortra VM API Key.
  2. Install script and configuration file.
  3. Set up configuration variables.
  4. Access Fortra VM data definitions.
  5. Utilize Fortra VM data.

Requirements:

Generate a Fortra VM API Key

  1. Log in to Fortra VM.

  2. In the site heater, select your name and choose My profile.

  3. On the API Tokens tab, select Create new token.

  4. In the Add New Token dialog, type the token name and select OK.

  5. Below your token name, selecting Click to show key displays your API Key.

  6. IMPORTANT: An API Key is equivalent to a user’s password. Do not use a key with more than one product integration. If you believe a key is compromised, delete the token from Fortra VM immediately by selecting the trash can icon and resulting check-mark to confirm.

Install

The provided Python scripts are designed to pull Fortra VM data for your Fortra VM™, Pen Test™, and ATS™ scans. The data will include external as well as internal scan data for both unauthenticated scan results as well as authenticated scan results.

NOTE: The current release does not include data from Web Application Scanning™ (WAS).

To install, place the script and configuration file in the same directory on a machine hosting Crystal Reports or a machine in which data is network-accessible to the Crystal Reports’ server. Using python’s package installer (pip), install the required packages from the requirements.txt. file.

Set up

After both files are placed in the same directory on an appropriate machine or server and the required packages are installed, you are ready for set up.

Open “config.py” to edit the following variables:

  1. api_token (REQUIRED)
    1. This field is required for the script to function properly. Enter the Fortra VM account API Token.
  2. data_path (OPTIONAL)
    1. Data is stored in a directory named FrontlineVM_data. Enter a path in which this directory will be stored (e.g., “/root/data/”).
    2. Default: the same path in which “frontline.py” is stored.

Save and close the file.

Extracted Fortra VM Data

Below is a table describing the type of data being pulled from Fortra VM and the file name in which it is stored.

Data Type File Name Data Description
Host 00_Hosts.xml This is the Active View Host client data for all of the user’s host assets.
Vuln 01_Vulnerabilities.xml This is Active View vulnerability data for all of the user’s vulnerabilities.
  02_VulnDictionary.xml The vulnerability dictionary information for all vulnerabilities pertaining to the user.
Dashboard 03_Dashboard.xml Client Dashboard data.
Graph 04_GraphTopVulns.xml Top vulnerabilities for this account (the given API Key) stored by criticality.
  05_GraphHostsRatingCount.xml Host rating counts broken down at the present moment.
  06_GraphMonthlyHostRatingTrend.xml

Monthly Host rating trend.

  07_GraphMonthlyGPATrend.xml Monthly GPA Trend.
  08_GraphVulnSeverityCount.xml Vulnerability Severity Counts.
  09_GraphMonthlyNumVulnTrend.xml Monthly trend for number of vulnerabilities.

Usage

Using Fortra VM’s API this script will pull data from your Fortra VM account, convert and export XML files into the FrontlineVM_data directory.

Pulling Fortra VM Data

  • To pull all available data described above, execute the script using: “python.frontline.py”

Pulling Selective FVM Data

  • Pulling only specific types of data is possible using the optional “--data” argument. There are only four valid arguments when using this option: host, vuln, dashboard, and graph.
  • For example, to pull only host data, execute the script using: “python frontline.py --data host”

Multiple arguments are accepted. For example:

  • “python frontline.py --data host graph” will pull only host and graph data from Fortra VM.
  • Run “python frontline.py --help” to view the list of available arguments.

FVM Connect Tutorial Guides

Creating a Vulnerability Summary Report

Adding Additional Information to Your Report

Sample Crystal Reports

  1. Critical Vulnerabilities Report
  2. This is an executive report which lists all critical vulnerabilities, their titles, descriptions, solutions, as well as which IP hosts are impacted for both externally facing hosts as well as internally facing hosts. These include critical level vulnerabilities, as well as all issues found by the ATS system.

  3. Executive Dashboard Report
  4. This report provides a dashboard view, similar to what is shown on your Fortra VM dashboard. The data includes all elements currently seen on the Fortra VM dashboard including the Security GPA trend information for both internal and external scan data; Rated Vulnerability Distribution; At Risk Assets, and Vulnerabilities You Should Fix.

  5. Vulnerability Trending Reports
  6. This report provides monthly vulnerability trending graphs for both external scans as well as internal scans.