Skip to main content

Forescout eyeInspect

Forescout eyeInspect is an OT (operational technology) security tool. You can bring asset and security data from Forescout eyeInspect into Brinqa to gain a unified view of your attack surface, thus strengthening your cybersecurity posture.

This document details the information you must provide for the connector to authenticate with Forescout eyeInspect and how to obtain that information from Forescout eyeInspect. See create a data integration for step-by-step instructions on setting up the integration.

Required connection settings

When setting up a data integration, select Forescout eyeInspect from the Connector dropdown. If you cannot find the connector in the dropdown, make sure that you have installed it first. You must provide the following information to authenticate Forescout eyeInspect with Brinqa:

  • Server URL: The Forescout eyeInspect server URL. The default URL format is https://<server>.

  • Username and Password: The username and password associated with the Forescout eyeInspect account, which must have permissions to log in to the API server and return data.

    note

    The Forescout eyeInspect user account must have at least the Viewer role assigned to retrieve data from Forescout eyeInspect. This role provides read-only access to assets, alerts, and vulnerabilities. For additional information on configuring user roles and permissions, see the Forescout eyeInspect User Management documentation.

(Optional) Create a Forescout API-only user

In addition to using credentials tied to an existing user account with the Viewer role, you can also create a dedicated API-only user in Forescout eyeInspect. This account is specifically intended for API access and retrieving data. For additional information, see the Forescout eyeInspect documentation.

Additional settings

The Forescout eyeInspect connector contains additional options for specific configuration:

  • Page size: The maximum number of records to get per API request. The default setting is 100. It is not recommended to go over 100.

  • Parallel requests: The maximum number of parallel API requests. The default setting is 4.

  • Maximum retries: The maximum number of times that the integration attempts to connect to the Forescout eyeInspect API before giving up and reporting a failure. The default setting is 5.

  • Skip certificate verification: Select this option to allow for untrusted certificates.

Types of data to retrieve

The Forescout eyeInspect connector can retrieve the following types of data from the Forescout eyeInspect API:

Table 1: Data retrieved from Forescout eyeInspect

Connector ObjectRequiredMaps to Data Model
AlertYesAlert
Alert DefinitionYesAlert Definition
AssetYesHost
VulnerabilityYesVulnerability
Vulnerability DefinitionYesVulnerability Definition
info

The Forescout eyeInspect connector does not support operation options for the types of data it retrieves.

For detailed steps on how to view the data retrieved from Forescout eyeInspect in the Brinqa Platform, see How to view your data.

Attribute mappings

Expand the sections below to view the mappings between the source and the Brinqa data model attributes.

Alert

Table 2: Alert attribute mappings

Source Field NameMaps to Attribute
alert.alert_iduid
alert.alert_idtype
alert.case_namecaseName
alert.direction_certaindirectionCertain
alert.dst_ipdstIp
alert.dst_macdstMac
alert.dst_portdstPort
alert.engineengine
alert.event_type_nameseventTypes
alert.fea_alert_countfeaAlertCount
alert.fea_duration_secfeaDurationSec
alert.fea_startfeaStart
alert.fea_statefeaState
alert.hotstarthotStart
alert.l2_protol2Protocol
alert.l3_protol3Protocol
alert.l4_protol4Protocol
alert.l7_protol7Protocol
alert.labelslabels
alert.normalizednormalized
alert.notesnotes
alert.profile_module_nameprofileModule
alert.sensor_namesensor
alert.src_ipsrcIp
alert.src_macsrcMac
alert.src_portsrcPort
alert.statusproviderStatus
Generated (normalized from providerStatus)sourceStatus
Generated (normalized from providerStatus)status
Generated (category from status)statusCategory
alert.timestamptimestamp
alert.vlanvlan
Generated (sync capture timestamp)lastCaptured
Alert Definition

Table 3: Alert Definition attribute mappings

Source Field NameMaps to Attribute
alert.alert_iduid
alert.alert_idname
alert.descriptiondescription
alert.severitysourceSeverity
Generated (computed from severity)severityScore
Generated (normalized from alert.severity)severity
Generated (sync capture timestamp)lastCaptured
Asset

Table 4: Asset attribute mappings

Source Field NameMaps to Attribute
Generated (default: "active")status
asset.broadcast_ipisBroadcastIp
asset.client_protosclientProtocols
asset.criticalitycriticality
asset.descriptiondescription
asset.firmware_versionfirmwareVersion
asset.first_seenfirstSeen
asset.iduid
asset.ipipAddresses
asset.labelslabels
asset.last_seenlastSeen
asset.learnt_hostisLearntHost
asset.mac_addressesmacAddresses
asset.mac_vendorsmacVendors
asset.main_namename
asset.main_namehostnames
asset.main_rolerole
asset.main_vendor_modelmodel
asset.multicast_ipisMulticastIp
asset.open_ports[].portopenPorts
asset.operational_riskoperationalRisk
asset.os_versionos
asset.projectproject
asset.public_ipisPublicIp
asset.purdue_levelpurdueLevel
asset.security_risksecurityRisk
asset.serial_numberserialNumber
asset.server_protosserverProtocols
asset.vlanvlan
Generated (sync capture timestamp)lastCaptured
Vulnerability

Table 5: Vulnerability attribute mappings

Source Field NameMaps to Attribute
Generated (default: "active")providerStatus
Generated (normalized from providerStatus)sourceStatus
Generated (normalized from providerStatus)status
Generated (category from status)statusCategory
asset.idtargets
asset.id + "_" + cve.iduid
cve.idtype
cve.matching_confidencematchingConfidence
cve.suppressedsuppressed
Generated (sync capture timestamp)lastCaptured
Vulnerability Definition

Table 6: Vulnerability Definition attribute mappings

Source Field NameMaps to Attribute
cve.cvss_access_complexitycvssV2Ac
cve.cvss_access_vectorcvssV2Av
cve.cvss_attack_complexitycvssV3Ac
cve.cvss_attack_vectorcvssV3Av
cve.cvss_authenticationcvssV2Au
cve.cvss_availability_impactcvssV2Ai
cve.cvss_availability_impactcvssV3Ai
cve.cvss_confidentiality_impactcvssV2Ci
cve.cvss_confidentiality_impactcvssV3Ci
cve.cvss_exploit_code_maturitycvssV3E
cve.cvss_exploitabilitycvssV2E
cve.cvss_integrity_impactcvssV2Ii
cve.cvss_integrity_impactcvssV3Ii
cve.cvss_privileges_requiredcvssV3Pr
cve.cvss_remediation_levelcvssV2Rl
cve.cvss_remediation_levelcvssV3Rl
cve.cvss_reporting_confidencecvssV2Rc
cve.cvss_reporting_confidencecvssV3Rc
cve.cvss_scopecvssV3Scope
cve.cvss_scorecvssV2BaseScore
cve.cvss_scorecvssV3BaseScore
cve.cvss_temporal_scorecvssV2TemporalScore
cve.cvss_temporal_scorecvssV3TemporalScore
cve.cvss_user_interactioncvssV3Ui
cve.cvss_versioncvssVersion
cve.cve_idcveIds
cve.cve_idcveRecords
cve.icsa_idicsaId
cve.iduid
cve.last_modified_datesourceLastModified
cve.published_datepublishedDate
cve.references[].labelreferences
cve.solutionrecommendation
cve.summarydescription
cve.titlename
cve.vendorvendor
cve.vendor_specific_idvendorSpecificId
Generated (sync capture timestamp)lastCaptured

APIs

The Forescout eyeInspect connector uses the eyeInspect API v1. Specifically, it uses the following endpoints:

Table 7: Forescout eyeInspect API Endpoints

Connector ObjectAPI Endpoints
AlertGET /api/v1/alerts
Alert DefinitionGET /api/v1/alerts
AssetGET /api/v1/hosts
VulnerabilityGET /api/v1/hosts
Vulnerability DefinitionGET /api/v1/hosts, GET /api/v1/cve_info/<id>
note

Vulnerability Definitions are derived from each host's CVE records, with individual CVE details fetched from the /api/v1/cve_info/<id> endpoint.

Changelog

The Forescout eyeInspect connector has undergone the following changes:

Table 8: Forescout eyeInspect connector changelog

VersionDescriptionDate Published
3.0.2Changed the Criticality attribute data type from String to Integer on the Asset model. Added support for the Last Captured field across all models. Updated connector to align with model SDK changes. Migration required: purge and re-sync the Asset (Host) model.May 12th, 2026
3.0.1Added support for CVSS v3 vulnerability scoring with automatic detection of the CVSS version reported by eyeInspect. Removed unsupported CVSS v2 attributes that were not populated by the API. No migration required.May 12th, 2026
3.0.0Initial Integration+ release.May 7th, 2025