Configure Vulnerability integrations Vulnerability integrations provide the ability for customers and vendors to enrich the vulnerability data on their instance by retrieving data from external systems and vendors. This ability can simplify the vulnerability remediation life cycle by keeping the instance synchronized with other vulnerability management systems. Vulnerability integration defintions Vulnerability integrations help enrich the vulnerability data on your instance by retrieving data from external systems and vendors. Vulnerability Response includes some integrations, including the Qualys Vulnerability Integration and Microsoft Security Bulletin Integration. You can add others as needed. For detailed instructions on creating integrations, see Define a new vulnerability integration. Define a new vulnerability integrationA vulnerability integration is a process that pulls report data from a third-party system, generally to retrieve vulnerability data, and process that reporting data using data sources or a custom processor.Vulnerability integration scriptOn the Vulnerability Integration form, the integration script is a reference to a script include that extends the VulnerabilityIntegrationBase script include. Report processor strategiesThe Report processor strategy field on the Vulnerability Integration form is used to select the method to process the data returned by the vulnerability integration script when the vulnerability integration process is executed. Integration factory script fieldsThe Vulnerability Integration form contains fields that provide the logic to actually instantiate the object defined by the script include reference fields, integration script, and report processor. Pushing data to a vulnerability integration using a REST APIYou can use a REST endpoint to push data to a vulnerability integration.Manually running a vulnerability integrationA vulnerability integration is configured to run on a scheduled basis. However, you can run them manually when needed.