ManageEngine Endpoint Central

Overview

The ManageEngine Endpoint Central connector enables your AI Colleagues to integrate with your organization's ManageEngine Endpoint Central platform, facilitating automated endpoint management, patch management, inventory control, and threat and vulnerability assessment workflows.

ManageEngine Endpoint Central (formerly Desktop Central) is a comprehensive unified endpoint management and security solution that allows organizations to manage desktops, laptops, servers, mobiles, and tablets from a central location. The ManageEngine Endpoint Central connector allows Leena AI to automate IT operations, manage patches, track inventory, and handle security vulnerabilities seamlessly.

API Details

Leena AI integrates with ManageEngine Endpoint Central via REST APIs.

Documentation link: https://www.manageengine.com/products/desktop-central/api/cloud_index.html

Setup

The ManageEngine Endpoint Central connector uses OAuth 2.0 authentication with the authorization code grant type via Zoho's identity platform.


Prerequisites

Before setting up the ManageEngine Endpoint Central connector, ensure you have:

  • Administrator access to your ManageEngine Endpoint Central Cloud instance
  • Access to Zoho API Console (https://api-console.zoho.com)
  • Ability to create OAuth applications in Zoho Developer Console
  • Access to your Leena AI workspace with connector management permissions
  • ManageEngine Endpoint Central Cloud subscription

Get credentials

Here is how to create an OAuth client in Zoho API Console:

  1. Log in to Zoho API Console (https://api-console.zoho.com) with your Zoho credentials.
  2. Click "Add Client" to create a new client:
    1. Choose "Server-based Applications" as the client type
    2. Click "Create"
  3. Configure Client Details:
    1. Client Name: Enter a descriptive name for your application (e.g., "Leena AI Integration")
    2. Homepage URL: Enter your organization's homepage URL
    3. Authorized Redirect URIs: This will be filled later from Leena AI
  4. Save and Note Credentials:
    1. Navigate to the "Client Secret" tab
    2. Copy the Client ID and Client Secret and save them securely
    3. These credentials are essential for the OAuth flow

Add connection

Here is how to add a connection on Leena AI:

  1. Log in to your Leena AI workspace
  2. Navigate to Settings > Integrations
  3. Search for "ManageEngine Endpoint Central" and select it from the list to add its new connector
  4. Start configuring the connector:
    1. Base URL: The ManageEngine Endpoint Central Cloud URL (Default: https://endpointcentral.manageengine.in)
    2. API Version: The API version to use (Default: 1.4)
    3. Auth Type: Select "Admin OAuth 2.0"
    4. Client ID: OAuth application client ID from Zoho API Console
    5. Client Secret: OAuth application client secret from Zoho API Console
    6. Scope: List of permissions required to perform actions through Leena AI (Pre-filled with DesktopCentralCloud.Common.READ,DesktopCentralCloud.Inventory.READ,DesktopCentralCloud.Inventory.UPDATE,DesktopCentralCloud.PatchMgmt.READ,DesktopCentralCloud.PatchMgmt.UPDATE,DesktopCentralCloud.VulnerabilityMgmt.READ)
    7. Redirect URI: The callback URL for OAuth flow (Auto-generated by Leena AI)
  5. Complete OAuth Flow and Save Configurations:
    1. Click Connect in Leena AI for ManageEngine Endpoint Central connector setup
    2. You'll be redirected to Zoho authorization page
    3. Sign in to your Zoho account if prompted
    4. Click "Accept" to grant permissions for endpoint management access
    5. You'll be redirected back to Leena AI with a successful connection
    6. The connector will be saved
  6. Copy Callback URL and Update Zoho OAuth Client:
    1. Once the connector is saved in Leena AI, you can reopen the connector to view the Callback URL
    2. Copy the Callback URL from Leena AI
    3. Go back to Zoho API Console > Your Client > Settings
    4. Add the Callback URL to Authorized Redirect URIs
    5. Save the changes

Actions

The following actions are supported for the ManageEngine Endpoint Central connector:

Inventory: Get Summary

Retrieves a high-level inventory summary from ManageEngine Endpoint Central. The Agent can leverage the skill (workflow), which has been designed to get an overview of all IT assets in the organization.


Input Parameters

This action does not require any input parameters.

Response

The action returns an inventory summary containing:

  • Total number of managed computers
  • Operating system distribution
  • Hardware statistics
  • Software overview
  • Overall inventory health status

Inventory: Perform Scan

Initiates an inventory scan on specific computers in ManageEngine Endpoint Central. The Agent can leverage the skill (workflow), which has been designed to trigger inventory scans on specific devices.


Input Parameters

Here are the input parameters required to set up this action:

Mandatory

NameDescription
Resource IDsThe resource IDs of computers to scan, separated by comma

Here is a sample JSON input:

{
  "resourceids": "301,302,303"
}

Response

Upon successful execution, the action returns:

  • Scan initiation status
  • List of computers where scan was triggered
  • Timestamp of scan initiation

Inventory: Perform Scan (All)

Initiates an inventory scan on all managed computers in ManageEngine Endpoint Central. The Agent can leverage the skill (workflow), which has been designed to trigger organization-wide inventory scans.


Input Parameters

This action does not require any input parameters.

Response

The action returns:

  • Scan initiation confirmation
  • Total number of computers targeted
  • Scan job ID for tracking

Inventory: Get Software List

Retrieves a list of all software installed across managed endpoints. The Agent can leverage the skill (workflow), which has been designed to audit software across the organization. Here are some common use cases:

  • Software Audit: Get a complete list of installed software
  • License Compliance: Identify licensed vs unlicensed software
  • Security Review: Find prohibited or unauthorized software
  • Vendor Analysis: Filter software by manufacturer

Input Parameters

Here are the input parameters required to set up this action:

Optional

NameDescription
Domain FilterFilter software by domain
License Type FilterFilter by license type: Commercial (1), Non-Commercial (2), Unidentified (0)
Access Type FilterFilter by access type: Allowed (1), Prohibited (2), Not Assigned (0)
Compliance Status FilterFilter by compliance status: Under Licensed (0), Over Licensed (1), In Compliance (2), Expired (3), Not Available (-1)
PagePage number for pagination
Page LimitNumber of results per page
Search TypeType of search to perform
Search ColumnColumn to search in
Search ValueValue to search for

Here is a sample JSON input:

{
  "domainfilter": "WORKGROUP",
  "licensetypefilter": 1,
  "accesstypefilter": 1,
  "page": 1,
  "pagelimit": 50
}

Response

The action returns a list of software containing:

  • Software name and version
  • Publisher/Manufacturer
  • License type
  • Compliance status
  • Number of installations
  • Access type status

Inventory: Get Hardware List

Retrieves a list of all hardware assets across managed endpoints. The Agent can leverage the skill (workflow), which has been designed to audit hardware assets. Here are some common use cases:

  • Asset Tracking: Get a complete inventory of hardware
  • Hardware Audit: Review hardware by type or manufacturer
  • Branch Office Review: Filter assets by location
  • Procurement Planning: Identify hardware needs

Input Parameters

Here are the input parameters required to set up this action:

Optional

NameDescription
Domain FilterFilter hardware by domain
Branch Office FilterFilter hardware by branch office location
Hardware Type FilterFilter by hardware type (e.g., Desktop, Laptop)
Manufacturer FilterFilter by hardware manufacturer
PagePage number for pagination
Page LimitNumber of results per page
Search TypeType of search to perform
Search ColumnColumn to search in
Search ValueValue to search for

Here is a sample JSON input:

{
  "domainfilter": "WORKGROUP",
  "branchofficefilter": "Headquarters",
  "hardwaretypefilter": "Laptop",
  "page": 1,
  "pagelimit": 50
}

Response

The action returns a list of hardware assets containing:

  • Hardware type and model
  • Manufacturer
  • Serial number
  • Specifications (RAM, Storage, Processor)
  • Associated computer details
  • Branch office location

Inventory: Get Detail Summary for a Computer

Retrieves detailed inventory information for a specific computer. The Agent can leverage the skill (workflow), which has been designed to get comprehensive details about a single endpoint.


Input Parameters

Here are the input parameters required to set up this action:

Mandatory

NameDescription
Resource IDThe unique resource ID of the computer

Here is a sample JSON input:

{
  "resid": "301"
}

Response

The action returns detailed computer information including:

  • System information (OS, hostname, domain)
  • Hardware specifications
  • Network configuration
  • Installed software summary
  • Security status
  • Last scan timestamp

Inventory: Get Computer Software

Retrieves the list of software installed on a specific computer. The Agent can leverage the skill (workflow), which has been designed to audit software on individual endpoints.


Input Parameters

Here are the input parameters required to set up this action:

Mandatory

NameDescription
Resource IDThe unique resource ID of the computer

Response

The action returns:

  • List of installed software
  • Software versions
  • Installation dates
  • License information

Inventory: Get Licensed Software

Retrieves a list of licensed software in the organization. The Agent can leverage the skill (workflow), which has been designed to review software license compliance. Here are some common use cases:

  • License Audit: Review all licensed software
  • Compliance Check: Identify over/under-licensed software
  • Cost Analysis: Track software licensing costs
  • Renewal Planning: Identify expiring licenses

Input Parameters

Here are the input parameters required to set up this action:

Optional

NameDescription
Compliance Status FilterFilter by compliance status: Under Licensed (0), Over Licensed (1), In Compliance (2), Expired (3), Not Available (-1)

Here is a sample JSON input:

{
  "compliancestatusfilter": 0
}

Response

The action returns licensed software information including:

  • Software name and version
  • License count (purchased vs used)
  • Compliance status
  • License expiry information
  • Cost details

Inventory: Get Associated Licenses

Retrieves licenses associated with a specific software. The Agent can leverage the skill (workflow), which has been designed to get license details for individual software products.


Input Parameters

Here are the input parameters required to set up this action:

Mandatory

NameDescription
Software IDThe unique identifier of the software

Here is a sample JSON input:

{
  "swid": "12345"
}

Response

The action returns:

  • License details
  • License count
  • Assignment information
  • Compliance status

Inventory: Get Scan Computers

Retrieves the list of computers that have been scanned. The Agent can leverage the skill (workflow), which has been designed to review scan status across endpoints.


Input Parameters

This action supports optional filtering parameters.

Response

The action returns:

  • List of scanned computers
  • Last scan timestamps
  • Scan status

Patch Management: Patch Summary

Retrieves a summary of the patch status across all managed endpoints. The Agent can leverage the skill (workflow), which has been designed to get an overview of the organization's patch posture.


Input Parameters

This action does not require any input parameters.

Response

The action returns patch summary information including:

  • Total patches available
  • Patches installed vs missing
  • Critical patch status
  • Patch compliance percentage
  • Recent patch activity

Patch Management: All Patches

Retrieves a comprehensive list of all patches with filtering options. The Agent can leverage the skill (workflow), which has been designed to view and filter patches across the organization. Here are some common use cases:

  • Patch Audit: Get all available patches
  • Missing Patches: Find patches that need deployment
  • Critical Updates: Filter for high-severity patches
  • Platform-specific: Filter patches by OS platform

Input Parameters

Here are the input parameters required to set up this action:

Optional

NameDescription
Domain FilterFilter patches by domain
Branch Office FilterFilter patches by branch office
Custom Group FilterFilter patches by custom group
Platform FilterFilter by platform: Windows, Mac
Patch IDFilter by specific patch ID
Bulletin IDFilter by bulletin ID
Patch Status FilterFilter by patch status: Installed (201), Missing (202)
Approval Status FilterFilter by approval status: Approved (211), Not Approved (212)
Severity FilterFilter by severity: Unrated (0), Low (1), Moderate (2), Important (3), Critical (4)
Page NumberPage number for pagination
Page LimitNumber of results per page
Search TypeType of search to perform
Search ColumnColumn to search in
Search ValueValue to search for

Here is a sample JSON input:

{
  "platformfilter": "Windows",
  "patchstatusfilter": 202,
  "severityfilter": 4,
  "approvalstatusfilter": 212,
  "page": 1,
  "pageLimit": 50
}

Response

The action returns a list of patches containing:

  • Patch ID and name
  • Bulletin ID
  • Severity level
  • Platform
  • Approval status
  • Installation status
  • Release date
  • Affected systems count

Patch Management: All Patch Details

Retrieves detailed information about all patches. The Agent can leverage the skill (workflow), which has been designed to get comprehensive patch details.


Input Parameters

This action supports optional filtering parameters similar to "All Patches" action.

Response

The action returns detailed patch information including:

  • Complete patch metadata
  • Affected applications
  • Remediation details
  • Download information

Patch Management: Patch Scan

Initiates a patch scan on specific computers. The Agent can leverage the skill (workflow), which has been designed to check for missing patches on targeted devices.


Input Parameters

Here are the input parameters required to set up this action:

Mandatory

NameDescription
Resource IDsThe resource IDs of computers to scan, separated by comma

Here is a sample JSON input:

{
  "resourceids": "301,302,303"
}

Response

Upon successful execution, the action returns:

  • Scan initiation status
  • List of computers where patch scan was triggered
  • Job ID for tracking

Patch Management: Patch Scan (All)

Initiates a patch scan on all managed computers. The Agent can leverage the skill (workflow), which has been designed to perform organization-wide patch assessments.


Input Parameters

This action does not require any input parameters.

Response

The action returns:

  • Scan initiation confirmation
  • Total number of computers targeted
  • Scan job ID for tracking

Patch Management: Approve Patch

Approves one or more patches for deployment. The Agent can leverage the skill (workflow), which has been designed to approve patches for installation across endpoints. Here are some common use cases:

  • Security Response: Quickly approve critical security patches
  • Maintenance Window: Approve patches for scheduled deployment
  • Compliance: Approve patches to meet security requirements

Input Parameters

Here are the input parameters required to set up this action:

Mandatory

NameDescription
Patch IDsThe IDs of patches to approve (multiple selection)

Here is a sample JSON input:

{
  "patchids": [101001, 101002, 101003]
}

Response

Upon successful approval, the action returns:

  • Approval confirmation
  • List of approved patches
  • Approval timestamp

Patch Management: Decline Patch

Declines one or more patches to prevent deployment. The Agent can leverage the skill (workflow), which has been designed to decline patches that should not be installed. Here are some common use cases:

  • Compatibility Issues: Decline patches known to cause problems
  • Testing Required: Decline patches pending further testing
  • Application Conflicts: Decline patches that conflict with business applications

Input Parameters

Here are the input parameters required to set up this action:

Mandatory

NameDescription
Patch IDsThe IDs of patches to decline (multiple selection)

Here is a sample JSON input:

{
  "patchids": [101001, 101002]
}

Response

Upon successful decline, the action returns:

  • Decline confirmation
  • List of declined patches
  • Decline timestamp

Patch Management: Unapprove Patch

Reverts the approval status of previously approved patches. The Agent can leverage the skill (workflow), which has been designed to unapprove patches that were approved in error or need reconsideration.


Input Parameters

Here are the input parameters required to set up this action:

Mandatory

NameDescription
Patch IDsThe IDs of patches to unapprove (multiple selection)

Here is a sample JSON input:

{
  "patchids": [101001, 101002]
}

Response

Upon successful unapproval, the action returns:

  • Unapproval confirmation
  • List of unapproved patches
  • Status change timestamp

Threat Details: All System Misconfigurations

Retrieves a list of system misconfigurations that pose security risks. The Agent can leverage the skill (workflow), which has been designed to identify and prioritize security weaknesses. Here are some common use cases:

  • Security Audit: Identify configuration vulnerabilities
  • Compliance Review: Find misconfigurations affecting compliance
  • Risk Assessment: Prioritize fixes based on severity
  • Remediation Planning: Plan fixes based on available solutions

Input Parameters

Here are the input parameters required to set up this action:

Optional

NameDescription
Misconfiguration NameFilter by misconfiguration name
DescriptionFilter by description text
Post Deployment IssuesFilter by post-deployment issues
Misconfiguration IDFilter by specific misconfiguration ID
SeverityFilter by severity level
OS PlatformFilter by operating system platform
Fix AvailabilityFilter by fix availability status
SolutionFilter by solution type
Reboot RequiredFilter by reboot requirement
Undo SupportedFilter misconfigurations where undo is supported
CategoryFilter by category
Potential ImpactFilter by potential impact
Page NumberPage number for pagination
Page LimitNumber of results per page

Here is a sample JSON input:

{
  "severity": "Critical",
  "os_platform": "Windows",
  "page": 1,
  "pageLimit": 50
}

Response

The action returns misconfiguration details including:

  • Misconfiguration name and ID
  • Description
  • Severity level
  • Affected OS platforms
  • Fix availability
  • Solution details
  • Reboot requirements
  • Affected systems count

Threat Details: Vulnerability and Affected System Details

Retrieves detailed vulnerability information and affected systems. The Agent can leverage the skill (workflow), which has been designed to analyze vulnerabilities across the organization. Here are some common use cases:

  • Vulnerability Assessment: Identify critical vulnerabilities
  • Impact Analysis: Determine affected systems
  • Patch Planning: Link vulnerabilities to available patches
  • Compliance Reporting: Generate vulnerability reports

Input Parameters

Here are the input parameters required to set up this action:

Optional

NameDescription
Resource IDFilter by specific resource ID
Vulnerability NameFilter by vulnerability name
Updated TimeFilter by last update time
SeverityFilter by severity level
Vulnerability IDFilter by specific vulnerability ID
Vulnerability StatusFilter by vulnerability status
Page NumberPage number for pagination
Page LimitNumber of results per page

Here is a sample JSON input:

{
  "severity": "Critical",
  "vulnerability_status": "Open",
  "page": 1,
  "pageLimit": 50
}

Response

The action returns vulnerability details including:

  • Vulnerability name and ID
  • CVE information
  • Severity level
  • Affected systems list
  • Remediation status
  • Available patches
  • Discovery timestamp

Threat Details: All Applicable Threats and Patches

Retrieves a comprehensive list of applicable threats and their associated patches. The Agent can leverage the skill (workflow), which has been designed to correlate threats with remediation options.


Input Parameters

Here are the input parameters required to set up this action:

Optional

NameDescription
Resource IDFilter by specific resource ID
Page NumberPage number for pagination
Page LimitNumber of results per page

Here is a sample JSON input:

{
  "resource_id": "301",
  "page": 1,
  "pageLimit": 50
}

Response

The action returns threat and patch information including:

  • Threat details
  • Associated patches
  • Remediation priority
  • Affected systems
  • Patch deployment status