Skip to main content

Lansweeper

Lansweeper is an IT Asset Management platform that discovers and manages IT assets across the enterprise. You can bring asset, vulnerability, installed package, and user data from Lansweeper into Brinqa to gain a unified view of your attack surface, thus strengthening your cybersecurity posture.

This document details the information you must provide for the connector to authenticate with Lansweeper and how to obtain that information from Lansweeper. See create a data integration for step-by-step instructions on setting up the integration.

Required connection settings

When setting up a data integration, select Lansweeper from the Connector dropdown. If you cannot find the connector in the dropdown, make sure that you have installed it first. You must provide the following information to authenticate Lansweeper with Brinqa:

  • Lansweeper API Base URL: The base URL for the Lansweeper API. Defaults to https://api.lansweeper.com.
  • API Token: A Personal Access Token (PAT) generated from your Lansweeper account for API authentication.

Generate Lansweeper API keys

To generate a Personal Access Token (PAT) for the Lansweeper API:

  1. Log in to your Lansweeper account.
  2. Navigate to Developer Tools in the main navigation or settings.
  3. Select Personal Access Tokens.
  4. Generate a new token and save it securely, as it will be used as the API Token in the integration settings.

Additional settings

The Lansweeper connector contains additional options for specific configuration:

  • Page size: The maximum number of records to get per API request. The default setting is 500. It is not recommended to go over 500.
  • Parallel requests: The maximum number of parallel API requests. The default setting is the minimum of 4 or available processors.
  • Maximum retries: The maximum number of times that the integration attempts to connect to the Lansweeper API before giving up and reporting a failure. The default setting is 3.

Types of data to retrieve

The Lansweeper connector can retrieve the following types of data from the Lansweeper API:

Table 1: Data retrieved from Lansweeper

Connector ObjectRequiredMaps to Data Model
HostYesHost
Installed PackageYesInstalled Package
PackageYesPackage
UserYesPerson
VulnerabilityYesVulnerability
Vulnerability DefinitionYesVulnerability Definition
info

For detailed steps on how to view the data retrieved from Lansweeper in the Brinqa Platform, see How to view your data.

Attribute mappings

Expand the sections below to view the mappings between the source and the Brinqa data model attributes.

Host

Table 2: Host attribute mappings

Source Field NameSDM Attribute
AssetBasicInfoResource.cloudCategoryCLOUD_CATEGORY
AssetBasicInfoResource.cloudProviderCLOUD_PROVIDER
AssetBasicInfoResource.cloudRegionCLOUD_REGION
AssetBasicInfoResource.descriptionDESCRIPTION
AssetBasicInfoResource.domainDOMAIN
AssetBasicInfoResource.firstSeenFIRST_SEEN
AssetBasicInfoResource.fqdnFQDN
AssetBasicInfoResource.ipAddress + NetworkResource.ipAddressV4/ipAddressV6IP_ADDRESSES
AssetBasicInfoResource.lastSeenLAST_SEEN
AssetBasicInfoResource.mac + NetworkResource.macAddressMAC_ADDRESSES
AssetBasicInfoResource.nameHOSTNAMES
AssetBasicInfoResource.nameNAME
AssetBasicInfoResource.typeTYPE
AssetBasicInfoResource.upTimeUP_TIME
AssetBasicInfoResource.userDomainUSER_DOMAIN
AssetBasicInfoResource.userNameUSER_NAME
AssetCustomResource.barCodeBAR_CODE
AssetCustomResource.branchOfficeBRANCH_OFFICE
AssetCustomResource.buildingBUILDING
AssetCustomResource.commentCOMMENT
AssetCustomResource.contactCONTACT
AssetCustomResource.departmentDEPARTMENT
AssetCustomResource.dnsNameDNS_NAME
AssetCustomResource.firmwareVersionFIRMWARE_VERSION
AssetCustomResource.hardwareVersionHARDWARE_VERSION
AssetCustomResource.lastPatchedLAST_PATCHED
AssetCustomResource.locationLOCATION
AssetCustomResource.manufacturerMANUFACTURER
AssetCustomResource.modelMODEL
AssetCustomResource.modelNumberMODEL_NUMBER
AssetCustomResource.orderNumberORDER_NUMBER
AssetCustomResource.purchaseDatePURCHASE_DATE
AssetCustomResource.serialNumber (fallback: OperatingSystemResource.serialNumber)SERIAL_NUMBER
AssetCustomResource.skuSKU
AssetCustomResource.softwareVersionSOFTWARE_VERSION
AssetCustomResource.stateNameASSET_STATE
AssetCustomResource.warrantyDateWARRANTY_DATE
ExportAssetResource.keyUID
ExportAssetResource.urlURL
IpLocationResource.ipLocationIP_LOCATION
OperatingSystemResource.buildNumberOS_BUILD
OperatingSystemResource.captionOPERATING_SYSTEM
OperatingSystemResource.installDateOS_INSTALL_DATE
OperatingSystemResource.osTypeOS_TYPE
OperatingSystemResource.statusOS_STATUS
OperatingSystemResource.supportEndDateOS_SUPPORT_END_DATE
OperatingSystemResource.versionOS_VERSION
ProcessorResource.name (first)CPU_NAME
WarrantyResource.shipDate (first)WARRANTY_SHIP_DATE
classified from IP_ADDRESSES via AssetUtils.isPublicIP()PRIVATE_IP_ADDRESSES
classified from IP_ADDRESSES via AssetUtils.isPublicIP()PUBLIC_IP_ADDRESSES
constantSTATUS
derived from AssetBasicInfoResource.typeCATEGORIES
site contextSITE_ID
sum of HardDiskResource.sizeTOTAL_DISK_GB
sum of LogicalDiskResource.freeSpaceDISK_FREE_SPACE_GB
sum of MemoryModuleResource.sizeTOTAL_MEMORY_GB
sum of ProcessorResource.numberOfCoresCPU_CORES
sync timestampLAST_CAPTURED
Installed Package

Table 3: Installed Package attribute mappings

Source Field NameSDM Attribute
SoftwareResource.architecturesARCHITECTURES
SoftwareResource.categorySOFTWARE_CATEGORY
SoftwareResource.installDateINSTALL_DATE
SoftwareResource.installTypeINSTALL_TYPE
SoftwareResource.operatingSystemsOPERATING_SYSTEMS
SoftwareResource.publisherPUBLISHER
SoftwareResource.softwareNAME
SoftwareResource.typeSOFTWARE_TYPE
constantCATEGORIES
constantSTATUS
resolved via assetsWithSoftware N+1 queryTARGETS
software + "-" + versionTYPE
software + "-" + versionUID
sync timestampLAST_CAPTURED
Package

Table 4: Package attribute mappings

Source Field NameSDM Attribute
SoftwareResource.architecturesARCHITECTURES
SoftwareResource.assetsINSTALL_COUNT
SoftwareResource.categorySOFTWARE_CATEGORY
SoftwareResource.installDateINSTALL_DATE
SoftwareResource.installTypeINSTALL_TYPE
SoftwareResource.languagesLANGUAGES
SoftwareResource.operatingSystemsOPERATING_SYSTEMS
SoftwareResource.publisherPUBLISHER
SoftwareResource.relatedSoftwareNamesRELATED_SOFTWARE
SoftwareResource.softwareNAME
SoftwareResource.typeSOFTWARE_TYPE
SoftwareResource.unspscUNSPSC
SoftwareResource.versions[0]CURRENT_VERSION
constantCATEGORIES
software + "-" + versionUID
sync timestampLAST_CAPTURED
User

Table 5: User attribute mappings

Source Field NameSDM Attribute
ActiveDirectoryResource.department (fallback: UserResource.department)DEPARTMENT
ActiveDirectoryResource.email (fallback: UserResource.email)EMAIL
ActiveDirectoryResource.firstName (fallback: UserResource.firstName)FIRST_NAME
ActiveDirectoryResource.lastLogon (fallback: UserResource.lastLogon)LAST_LOGIN
ActiveDirectoryResource.lastName (fallback: UserResource.lastName)LAST_NAME
ActiveDirectoryResource.title (fallback: UserResource.title)JOB_TITLE
ActiveDirectoryResource.userName (fallback: UserResource.userName)USERNAME
UserResource.companyCOMPANY
UserResource.countryCodeCOUNTRY_CODE
UserResource.descriptionDESCRIPTION
UserResource.displayName (fallback: name)NAME
UserResource.employeeIdEMPLOYEE_ID
UserResource.employeeNumberEMPLOYEE_NUMBER
UserResource.employeeTypeEMPLOYEE_TYPE
UserResource.keyUID
UserResource.officeLOCATION
UserResource.ouOU
UserResource.passwordExpirationDatePASSWORD_EXPIRATION_DATE
UserResource.passwordLastSetPASSWORD_LAST_SET
UserResource.passwordNeverExpiresPASSWORD_NEVER_EXPIRES
UserResource.upnUPN
UserResource.userDomainUSER_DOMAIN
derived from enabledSTATUS
site contextSITE_ID
sync timestampLAST_CAPTURED
Vulnerability

Table 6: Vulnerability attribute mappings

Source Field NameSDM Attribute
VulnerabilityResource.assetKeysTARGETS
VulnerabilityResource.cveCVE_IDS
VulnerabilityResource.cveNAME
VulnerabilityResource.cveTYPE
VulnerabilityResource.cveUID
VulnerabilityResource.isActivePROVIDER_STATUS
VulnerabilityResource.publishedOnFIRST_FOUND
VulnerabilityResource.riskScoreRISK_SCORE
VulnerabilityResource.severitySOURCE_SEVERITY
VulnerabilityResource.sourceSOURCE
VulnerabilityResource.updatedOnLAST_FOUND
derived from normalized severitySEVERITY_SCORE
normalized from VulnerabilityResource.severitySEVERITY
normalized from provider statusSOURCE_STATUS
sync timestampLAST_CAPTURED
Vulnerability Definition

Table 7: Vulnerability Definition attribute mappings

Source Field NameSDM Attribute
CisaResource.dueDateCISA_DUE_DATE
CisaResource.exploitedCISA_EXPLOITED
CisaResource.knownRansomwareCampaignUseCISA_RANSOMWARE
EpssResource.percentileEPSS_PERCENTILE
EpssResource.scoreEPSS_SCORE
MsrcResource.exploitabilityMSRC_EXPLOITABILITY
NvdResource.exploitabilityNVD_EXPLOITABILITY
NvdResource.impactNVD_IMPACT
VulnerabilityCauseResource.vendor + affectedProductDESCRIPTION
VulnerabilityCauseResource.vendor + affectedProduct + categoryTAGS
VulnerabilityExploitabilityResource.exploitableEXPLOITABLE
VulnerabilityExploitabilityResource.exploitedInTheWildEXPLOITED_IN_THE_WILD
VulnerabilityExploitabilityResource.exploitTypesEXPLOIT_TYPES
VulnerabilityReferenceResource.urlREFERENCES
VulnerabilityResource.attackComplexityATTACK_COMPLEXITY
VulnerabilityResource.attackVectorATTACK_VECTOR
VulnerabilityResource.availabilityImpactAVAILABILITY_IMPACT
VulnerabilityResource.baseScoreBASE_SCORE
VulnerabilityResource.confidentialityCONFIDENTIALITY_IMPACT
VulnerabilityResource.cveCVE_IDS
VulnerabilityResource.cveCVE_RECORDS
VulnerabilityResource.cveNAME
VulnerabilityResource.cveUID
VulnerabilityResource.integrityINTEGRITY_IMPACT
VulnerabilityResource.patchablePATCHABLE
VulnerabilityResource.privilegeRequiredPRIVILEGE_REQUIRED
VulnerabilityResource.publishedOnPUBLISHED_DATE
VulnerabilityResource.scopeSCOPE
VulnerabilityResource.severitySOURCE_SEVERITY
VulnerabilityResource.sourceCATEGORIES
VulnerabilityResource.userInteractionUSER_INTERACTION
VulnerabilityResource.weaknessEnumerationCWE_IDS
VulncheckResource.maxExploitMaturityVULNCHECK_MATURITY
VulncheckResource.publicExploitFoundVULNCHECK_PUBLIC_EXPLOIT
VulncheckResource.reportedExploitedByBotnetsVULNCHECK_BOTNETS
VulncheckResource.reportedExploitedByRansomwareVULNCHECK_RANSOMWARE
VulncheckResource.reportedExploitedByThreatActorsVULNCHECK_THREAT_ACTORS
derived from normalized severitySEVERITY_SCORE
normalized from VulnerabilityResource.severitySEVERITY
sync timestampLAST_CAPTURED

Operation options

The Lansweeper connector supports the following operation options:

Table 8: Operation options

Connector ObjectOptionAll Possible ValuesDescriptionExample
HostassetTypeN/AFilter by asset type (e.g. "Windows", "Linux")Key: assetType Value: Windows.
domainN/AFilter by domainKey: domain Value: example.com.
ipAddressN/AFilter by IP address patternKey: ipAddress Value: 192.168.%.
VulnerabilityactiveOnlytrue, falseOnly return active vulnerabilitiesKey: activeOnly Value: true.
severityN/AFilter by severity levelKey: severity Value: High.
sourceN/AFilter by data source (e.g. "NVD")Key: source Value: NVD.

APIs

The Lansweeper connector uses the Lansweeper GraphQL API. Specifically, it uses the following endpoints:

Table 9: Lansweeper API Endpoints

Connector ObjectAPI Endpoint
Host,
Installed Package,
Package,
User,
Vulnerability,
Vulnerability Definition
POST https://api.lansweeper.com/api/v2/graphql

Changelog

The Lansweeper connector has undergone the following changes:

note

This connector is part of a bundled release with other connectors from the same vendor. If a version shows "No change", it means that the connector version was updated for consistency as part of the bundle, but no functional changes were made to this specific connector. You can update to or skip this version without affecting your existing configuration.

Table 10: Lansweeper Changelog

VersionDescriptionDate Published
1.0.0Initial Integration+ release.2026-04-13