ManageEngine Endpoint Central
Overview
The ManageEngine Endpoint Central connector enables your AI Colleagues to integrate with your organization's ManageEngine Endpoint Central platform, facilitating automated endpoint management, patch management, inventory control, and threat and vulnerability assessment workflows.
ManageEngine Endpoint Central (formerly Desktop Central) is a comprehensive unified endpoint management and security solution that allows organizations to manage desktops, laptops, servers, mobiles, and tablets from a central location. The ManageEngine Endpoint Central connector allows Leena AI to automate IT operations, manage patches, track inventory, and handle security vulnerabilities seamlessly.
API Details
Leena AI integrates with ManageEngine Endpoint Central via REST APIs.
Documentation link: https://www.manageengine.com/products/desktop-central/api/cloud_index.html
Setup
The ManageEngine Endpoint Central connector uses OAuth 2.0 authentication with the authorization code grant type via Zoho's identity platform.
Prerequisites
Before setting up the ManageEngine Endpoint Central connector, ensure you have:
- Administrator access to your ManageEngine Endpoint Central Cloud instance
- Access to Zoho API Console (https://api-console.zoho.com)
- Ability to create OAuth applications in Zoho Developer Console
- Access to your Leena AI workspace with connector management permissions
- ManageEngine Endpoint Central Cloud subscription
Get credentials
Here is how to create an OAuth client in Zoho API Console:
- Log in to Zoho API Console (https://api-console.zoho.com) with your Zoho credentials.
- Click "Add Client" to create a new client:
- Choose "Server-based Applications" as the client type
- Click "Create"
- Configure Client Details:
- Client Name: Enter a descriptive name for your application (e.g., "Leena AI Integration")
- Homepage URL: Enter your organization's homepage URL
- Authorized Redirect URIs: This will be filled later from Leena AI
- Save and Note Credentials:
- Navigate to the "Client Secret" tab
- Copy the Client ID and Client Secret and save them securely
- These credentials are essential for the OAuth flow
Add connection
Here is how to add a connection on Leena AI:
- Log in to your Leena AI workspace
- Navigate to Settings > Integrations
- Search for "ManageEngine Endpoint Central" and select it from the list to add its new connector
- Start configuring the connector:
- Base URL: The ManageEngine Endpoint Central Cloud URL (Default:
https://endpointcentral.manageengine.in) - API Version: The API version to use (Default:
1.4) - Auth Type: Select "Admin OAuth 2.0"
- Client ID: OAuth application client ID from Zoho API Console
- Client Secret: OAuth application client secret from Zoho API Console
- Scope: List of permissions required to perform actions through Leena AI (Pre-filled with
DesktopCentralCloud.Common.READ,DesktopCentralCloud.Inventory.READ,DesktopCentralCloud.Inventory.UPDATE,DesktopCentralCloud.PatchMgmt.READ,DesktopCentralCloud.PatchMgmt.UPDATE,DesktopCentralCloud.VulnerabilityMgmt.READ) - Redirect URI: The callback URL for OAuth flow (Auto-generated by Leena AI)
- Base URL: The ManageEngine Endpoint Central Cloud URL (Default:
- Complete OAuth Flow and Save Configurations:
- Click Connect in Leena AI for ManageEngine Endpoint Central connector setup
- You'll be redirected to Zoho authorization page
- Sign in to your Zoho account if prompted
- Click "Accept" to grant permissions for endpoint management access
- You'll be redirected back to Leena AI with a successful connection
- The connector will be saved
- Copy Callback URL and Update Zoho OAuth Client:
- Once the connector is saved in Leena AI, you can reopen the connector to view the Callback URL
- Copy the Callback URL from Leena AI
- Go back to Zoho API Console > Your Client > Settings
- Add the Callback URL to Authorized Redirect URIs
- Save the changes
Actions
The following actions are supported for the ManageEngine Endpoint Central connector:
Inventory: Get Summary
Retrieves a high-level inventory summary from ManageEngine Endpoint Central. The Agent can leverage the skill (workflow), which has been designed to get an overview of all IT assets in the organization.
Input Parameters
This action does not require any input parameters.
Response
The action returns an inventory summary containing:
- Total number of managed computers
- Operating system distribution
- Hardware statistics
- Software overview
- Overall inventory health status
Inventory: Perform Scan
Initiates an inventory scan on specific computers in ManageEngine Endpoint Central. The Agent can leverage the skill (workflow), which has been designed to trigger inventory scans on specific devices.
Input Parameters
Here are the input parameters required to set up this action:
Mandatory
| Name | Description |
|---|---|
| Resource IDs | The resource IDs of computers to scan, separated by comma |
Here is a sample JSON input:
{
"resourceids": "301,302,303"
}Response
Upon successful execution, the action returns:
- Scan initiation status
- List of computers where scan was triggered
- Timestamp of scan initiation
Inventory: Perform Scan (All)
Initiates an inventory scan on all managed computers in ManageEngine Endpoint Central. The Agent can leverage the skill (workflow), which has been designed to trigger organization-wide inventory scans.
Input Parameters
This action does not require any input parameters.
Response
The action returns:
- Scan initiation confirmation
- Total number of computers targeted
- Scan job ID for tracking
Inventory: Get Software List
Retrieves a list of all software installed across managed endpoints. The Agent can leverage the skill (workflow), which has been designed to audit software across the organization. Here are some common use cases:
- Software Audit: Get a complete list of installed software
- License Compliance: Identify licensed vs unlicensed software
- Security Review: Find prohibited or unauthorized software
- Vendor Analysis: Filter software by manufacturer
Input Parameters
Here are the input parameters required to set up this action:
Optional
| Name | Description |
|---|---|
| Domain Filter | Filter software by domain |
| License Type Filter | Filter by license type: Commercial (1), Non-Commercial (2), Unidentified (0) |
| Access Type Filter | Filter by access type: Allowed (1), Prohibited (2), Not Assigned (0) |
| Compliance Status Filter | Filter by compliance status: Under Licensed (0), Over Licensed (1), In Compliance (2), Expired (3), Not Available (-1) |
| Page | Page number for pagination |
| Page Limit | Number of results per page |
| Search Type | Type of search to perform |
| Search Column | Column to search in |
| Search Value | Value to search for |
Here is a sample JSON input:
{
"domainfilter": "WORKGROUP",
"licensetypefilter": 1,
"accesstypefilter": 1,
"page": 1,
"pagelimit": 50
}Response
The action returns a list of software containing:
- Software name and version
- Publisher/Manufacturer
- License type
- Compliance status
- Number of installations
- Access type status
Inventory: Get Hardware List
Retrieves a list of all hardware assets across managed endpoints. The Agent can leverage the skill (workflow), which has been designed to audit hardware assets. Here are some common use cases:
- Asset Tracking: Get a complete inventory of hardware
- Hardware Audit: Review hardware by type or manufacturer
- Branch Office Review: Filter assets by location
- Procurement Planning: Identify hardware needs
Input Parameters
Here are the input parameters required to set up this action:
Optional
| Name | Description |
|---|---|
| Domain Filter | Filter hardware by domain |
| Branch Office Filter | Filter hardware by branch office location |
| Hardware Type Filter | Filter by hardware type (e.g., Desktop, Laptop) |
| Manufacturer Filter | Filter by hardware manufacturer |
| Page | Page number for pagination |
| Page Limit | Number of results per page |
| Search Type | Type of search to perform |
| Search Column | Column to search in |
| Search Value | Value to search for |
Here is a sample JSON input:
{
"domainfilter": "WORKGROUP",
"branchofficefilter": "Headquarters",
"hardwaretypefilter": "Laptop",
"page": 1,
"pagelimit": 50
}Response
The action returns a list of hardware assets containing:
- Hardware type and model
- Manufacturer
- Serial number
- Specifications (RAM, Storage, Processor)
- Associated computer details
- Branch office location
Inventory: Get Detail Summary for a Computer
Retrieves detailed inventory information for a specific computer. The Agent can leverage the skill (workflow), which has been designed to get comprehensive details about a single endpoint.
Input Parameters
Here are the input parameters required to set up this action:
Mandatory
| Name | Description |
|---|---|
| Resource ID | The unique resource ID of the computer |
Here is a sample JSON input:
{
"resid": "301"
}Response
The action returns detailed computer information including:
- System information (OS, hostname, domain)
- Hardware specifications
- Network configuration
- Installed software summary
- Security status
- Last scan timestamp
Inventory: Get Computer Software
Retrieves the list of software installed on a specific computer. The Agent can leverage the skill (workflow), which has been designed to audit software on individual endpoints.
Input Parameters
Here are the input parameters required to set up this action:
Mandatory
| Name | Description |
|---|---|
| Resource ID | The unique resource ID of the computer |
Response
The action returns:
- List of installed software
- Software versions
- Installation dates
- License information
Inventory: Get Licensed Software
Retrieves a list of licensed software in the organization. The Agent can leverage the skill (workflow), which has been designed to review software license compliance. Here are some common use cases:
- License Audit: Review all licensed software
- Compliance Check: Identify over/under-licensed software
- Cost Analysis: Track software licensing costs
- Renewal Planning: Identify expiring licenses
Input Parameters
Here are the input parameters required to set up this action:
Optional
| Name | Description |
|---|---|
| Compliance Status Filter | Filter by compliance status: Under Licensed (0), Over Licensed (1), In Compliance (2), Expired (3), Not Available (-1) |
Here is a sample JSON input:
{
"compliancestatusfilter": 0
}Response
The action returns licensed software information including:
- Software name and version
- License count (purchased vs used)
- Compliance status
- License expiry information
- Cost details
Inventory: Get Associated Licenses
Retrieves licenses associated with a specific software. The Agent can leverage the skill (workflow), which has been designed to get license details for individual software products.
Input Parameters
Here are the input parameters required to set up this action:
Mandatory
| Name | Description |
|---|---|
| Software ID | The unique identifier of the software |
Here is a sample JSON input:
{
"swid": "12345"
}Response
The action returns:
- License details
- License count
- Assignment information
- Compliance status
Inventory: Get Scan Computers
Retrieves the list of computers that have been scanned. The Agent can leverage the skill (workflow), which has been designed to review scan status across endpoints.
Input Parameters
This action supports optional filtering parameters.
Response
The action returns:
- List of scanned computers
- Last scan timestamps
- Scan status
Patch Management: Patch Summary
Retrieves a summary of the patch status across all managed endpoints. The Agent can leverage the skill (workflow), which has been designed to get an overview of the organization's patch posture.
Input Parameters
This action does not require any input parameters.
Response
The action returns patch summary information including:
- Total patches available
- Patches installed vs missing
- Critical patch status
- Patch compliance percentage
- Recent patch activity
Patch Management: All Patches
Retrieves a comprehensive list of all patches with filtering options. The Agent can leverage the skill (workflow), which has been designed to view and filter patches across the organization. Here are some common use cases:
- Patch Audit: Get all available patches
- Missing Patches: Find patches that need deployment
- Critical Updates: Filter for high-severity patches
- Platform-specific: Filter patches by OS platform
Input Parameters
Here are the input parameters required to set up this action:
Optional
| Name | Description |
|---|---|
| Domain Filter | Filter patches by domain |
| Branch Office Filter | Filter patches by branch office |
| Custom Group Filter | Filter patches by custom group |
| Platform Filter | Filter by platform: Windows, Mac |
| Patch ID | Filter by specific patch ID |
| Bulletin ID | Filter by bulletin ID |
| Patch Status Filter | Filter by patch status: Installed (201), Missing (202) |
| Approval Status Filter | Filter by approval status: Approved (211), Not Approved (212) |
| Severity Filter | Filter by severity: Unrated (0), Low (1), Moderate (2), Important (3), Critical (4) |
| Page Number | Page number for pagination |
| Page Limit | Number of results per page |
| Search Type | Type of search to perform |
| Search Column | Column to search in |
| Search Value | Value to search for |
Here is a sample JSON input:
{
"platformfilter": "Windows",
"patchstatusfilter": 202,
"severityfilter": 4,
"approvalstatusfilter": 212,
"page": 1,
"pageLimit": 50
}Response
The action returns a list of patches containing:
- Patch ID and name
- Bulletin ID
- Severity level
- Platform
- Approval status
- Installation status
- Release date
- Affected systems count
Patch Management: All Patch Details
Retrieves detailed information about all patches. The Agent can leverage the skill (workflow), which has been designed to get comprehensive patch details.
Input Parameters
This action supports optional filtering parameters similar to "All Patches" action.
Response
The action returns detailed patch information including:
- Complete patch metadata
- Affected applications
- Remediation details
- Download information
Patch Management: Patch Scan
Initiates a patch scan on specific computers. The Agent can leverage the skill (workflow), which has been designed to check for missing patches on targeted devices.
Input Parameters
Here are the input parameters required to set up this action:
Mandatory
| Name | Description |
|---|---|
| Resource IDs | The resource IDs of computers to scan, separated by comma |
Here is a sample JSON input:
{
"resourceids": "301,302,303"
}Response
Upon successful execution, the action returns:
- Scan initiation status
- List of computers where patch scan was triggered
- Job ID for tracking
Patch Management: Patch Scan (All)
Initiates a patch scan on all managed computers. The Agent can leverage the skill (workflow), which has been designed to perform organization-wide patch assessments.
Input Parameters
This action does not require any input parameters.
Response
The action returns:
- Scan initiation confirmation
- Total number of computers targeted
- Scan job ID for tracking
Patch Management: Approve Patch
Approves one or more patches for deployment. The Agent can leverage the skill (workflow), which has been designed to approve patches for installation across endpoints. Here are some common use cases:
- Security Response: Quickly approve critical security patches
- Maintenance Window: Approve patches for scheduled deployment
- Compliance: Approve patches to meet security requirements
Input Parameters
Here are the input parameters required to set up this action:
Mandatory
| Name | Description |
|---|---|
| Patch IDs | The IDs of patches to approve (multiple selection) |
Here is a sample JSON input:
{
"patchids": [101001, 101002, 101003]
}Response
Upon successful approval, the action returns:
- Approval confirmation
- List of approved patches
- Approval timestamp
Patch Management: Decline Patch
Declines one or more patches to prevent deployment. The Agent can leverage the skill (workflow), which has been designed to decline patches that should not be installed. Here are some common use cases:
- Compatibility Issues: Decline patches known to cause problems
- Testing Required: Decline patches pending further testing
- Application Conflicts: Decline patches that conflict with business applications
Input Parameters
Here are the input parameters required to set up this action:
Mandatory
| Name | Description |
|---|---|
| Patch IDs | The IDs of patches to decline (multiple selection) |
Here is a sample JSON input:
{
"patchids": [101001, 101002]
}Response
Upon successful decline, the action returns:
- Decline confirmation
- List of declined patches
- Decline timestamp
Patch Management: Unapprove Patch
Reverts the approval status of previously approved patches. The Agent can leverage the skill (workflow), which has been designed to unapprove patches that were approved in error or need reconsideration.
Input Parameters
Here are the input parameters required to set up this action:
Mandatory
| Name | Description |
|---|---|
| Patch IDs | The IDs of patches to unapprove (multiple selection) |
Here is a sample JSON input:
{
"patchids": [101001, 101002]
}Response
Upon successful unapproval, the action returns:
- Unapproval confirmation
- List of unapproved patches
- Status change timestamp
Threat Details: All System Misconfigurations
Retrieves a list of system misconfigurations that pose security risks. The Agent can leverage the skill (workflow), which has been designed to identify and prioritize security weaknesses. Here are some common use cases:
- Security Audit: Identify configuration vulnerabilities
- Compliance Review: Find misconfigurations affecting compliance
- Risk Assessment: Prioritize fixes based on severity
- Remediation Planning: Plan fixes based on available solutions
Input Parameters
Here are the input parameters required to set up this action:
Optional
| Name | Description |
|---|---|
| Misconfiguration Name | Filter by misconfiguration name |
| Description | Filter by description text |
| Post Deployment Issues | Filter by post-deployment issues |
| Misconfiguration ID | Filter by specific misconfiguration ID |
| Severity | Filter by severity level |
| OS Platform | Filter by operating system platform |
| Fix Availability | Filter by fix availability status |
| Solution | Filter by solution type |
| Reboot Required | Filter by reboot requirement |
| Undo Supported | Filter misconfigurations where undo is supported |
| Category | Filter by category |
| Potential Impact | Filter by potential impact |
| Page Number | Page number for pagination |
| Page Limit | Number of results per page |
Here is a sample JSON input:
{
"severity": "Critical",
"os_platform": "Windows",
"page": 1,
"pageLimit": 50
}Response
The action returns misconfiguration details including:
- Misconfiguration name and ID
- Description
- Severity level
- Affected OS platforms
- Fix availability
- Solution details
- Reboot requirements
- Affected systems count
Threat Details: Vulnerability and Affected System Details
Retrieves detailed vulnerability information and affected systems. The Agent can leverage the skill (workflow), which has been designed to analyze vulnerabilities across the organization. Here are some common use cases:
- Vulnerability Assessment: Identify critical vulnerabilities
- Impact Analysis: Determine affected systems
- Patch Planning: Link vulnerabilities to available patches
- Compliance Reporting: Generate vulnerability reports
Input Parameters
Here are the input parameters required to set up this action:
Optional
| Name | Description |
|---|---|
| Resource ID | Filter by specific resource ID |
| Vulnerability Name | Filter by vulnerability name |
| Updated Time | Filter by last update time |
| Severity | Filter by severity level |
| Vulnerability ID | Filter by specific vulnerability ID |
| Vulnerability Status | Filter by vulnerability status |
| Page Number | Page number for pagination |
| Page Limit | Number of results per page |
Here is a sample JSON input:
{
"severity": "Critical",
"vulnerability_status": "Open",
"page": 1,
"pageLimit": 50
}Response
The action returns vulnerability details including:
- Vulnerability name and ID
- CVE information
- Severity level
- Affected systems list
- Remediation status
- Available patches
- Discovery timestamp
Threat Details: All Applicable Threats and Patches
Retrieves a comprehensive list of applicable threats and their associated patches. The Agent can leverage the skill (workflow), which has been designed to correlate threats with remediation options.
Input Parameters
Here are the input parameters required to set up this action:
Optional
| Name | Description |
|---|---|
| Resource ID | Filter by specific resource ID |
| Page Number | Page number for pagination |
| Page Limit | Number of results per page |
Here is a sample JSON input:
{
"resource_id": "301",
"page": 1,
"pageLimit": 50
}Response
The action returns threat and patch information including:
- Threat details
- Associated patches
- Remediation priority
- Affected systems
- Patch deployment status
Updated 1 day ago
