Retrieves a paged list of solutions in a given Action Set.

Retrieves a paged list of solutions in a given Action Set.

SecuritybearerAuth
Request
path Parameters
orgID
required
integer

The organization ID of the target organization.

actionSetID
required
integer

The ID of the target Action Set.

query Parameters
page
integer
Default: 0

First page of data to display. Default: 0

limit
integer

Maximum number of results to display.

remediation_type:in[]
string

Filter by remediation type. Acceptable values: patch-now | patch-with-worklet

Enum: "patch-now" "patch-with-worklet"
solution_details_severity:in[]
string

Filter by severity. Acceptable values: critical | high | medium | low | none

Enum: "critical" "high" "medium" "low" "none"
vulnerability_id:in[]
Array of strings

Filter by vulnerability.

Responses
200

Successful Operation

400

Invalid Request

401

Access token is missing or invalid

403

You do not have permission to perform this action.

404

Entity not found

429

Too many requests

503

Service Unavailable

get/orgs/{orgID}/remediations/action-sets/{actionSetID}/solutions
Request samples
$apiKey = 'your_automox_api_key'
$headers = @{ "Authorization" = "Bearer $apiKey" }
$url = "https://console.automox.com/api/orgs/{orgID}/remediations/action-sets/{actionSetID}/solutions?page=0&solution_type=automox-patch"

$response = (Invoke-WebRequest -Method Get -Uri $url -Headers $headers).Content
Response samples
application/json
{
  • "metadata": {
    • "total_pages": 1,
    • "current_page": 0,
    • "limit": 500,
    • "total_count": 7
    },
  • "data": [
    • {
      • "id": 17194,
      • "solution_type": "automox-patch",
      • "remediation_type": "patch-now",
      • "solution_details": {
        • "requires_reboot": true,
        • "package_version_id": 116919,
        • "package_version": "1.10.218",
        • "package_name": "legacy-error-adaptor 1.10.218",
        • "software_version": "1.10.218",
        • "software_name": "legacy-error-adaptor"
        },
      • "devices": [
        • {
          • "id": 1,
          • "name": "ThistleNewSavannah",
          • "custom_name": "Thistle New Savannah",
          • "status": "pending",
          • "deleted": false,
          • "ip_addrs_private": [
            • "192.215.169.176",
            • "125.200.74.239"
            ]
          },
        • {
          • "id": 2,
          • "name": "BeigeBaumbachbury",
          • "custom_name": "Beige Baumbachbury",
          • "status": "pending",
          • "deleted": false,
          • "ip_addrs_private": [
            • "10.218.203.26",
            • "255.128.27.174"
            ]
          }
        ],
      • "vulnerabilities": [
        • {
          • "id": "CVE-2014-1961",
          • "title": "",
          • "summary": "Unspecified vulnerability in the Portal WebDynPro in SAP NetWeaver allows remote attackers to obtain sensitive path information via unknown attack vectors.",
          • "severity": "low"
          },
        • {
          • "id": "CVE-2023-28152",
          • "title": "",
          • "summary": "An issue was discovered in Independentsoft JWord before 1.1.110. The API is prone to XML external entity (XXE) injection via a remote DTD in a DOCX file.",
          • "severity": "high"
          }
        ]
      }
    ]
}