Open API Specification (OAS)
API Collection
OAuth
Authentication
Patch Management
Patch Configuration
Patch Details
Automatic Patch Deployment
Decline Patch
SoM
Common
Report
Query Report
The Patch Manager Plus API provides a comprehensive interface to facilitate seamless integration with third-party tools. By leveraging these APIs, you can automate endpoint management tasks within your IT ecosystem that often require collaboration across multiple tools.
The APIs allow you to fetch and modify data across various Patch Manager Plus modules, including SOM, Patch Management and more.
All APIs follow standard HTTP methods and error codes and support commonly used data formats such as JSON.
You can find the list of supported modules that offer APIs in the left sidebar. If you require additional APIs, please contact us with your requirements.
© 2025, Zoho Corporation Pvt. Ltd. All Rights Reserved.
| Method Name | Method Type | URL | OAuth Scope | Operation |
|---|---|---|---|---|
| Install all missing patches in specific systems | POST | /api/1.4/patch/installpatch | PatchManagerPlusCloud.PatchMgmt | UPDATE |
| Install specific patches in specific systems | POST | /api/1.4/patch/installpatch | PatchManagerPlusCloud.PatchMgmt | UPDATE |
| Install specific patches in all systems | POST | /api/1.4/patch/installpatch | PatchManagerPlusCloud.PatchMgmt | UPDATE |
| Uninstall specific patches in all systems | POST | /api/1.4/patch/uninstallpatch | PatchManagerPlusCloud.PatchMgmt | UPDATE |
No APIs found for this search.
| Method Name | Method Type | URL | OAuth Scope | Operation |
|---|---|---|---|---|
| List Patch Status Across Computers | GET | /api/1.4/patch/allpatchdetails | PatchManagerPlusCloud.PatchMgmt | READ |
| Initiate Patch Scan on Selected | POST | /api/1.4/patch/computers/scan | PatchManagerPlusCloud.PatchMgmt | UPDATE |
| Fetch System Health Policy | GET | /api/1.4/patch/healthpolicy | PatchManagerPlusCloud.PatchMgmt | READ |
| List All Patches | GET | /api/1.4/patch/allpatches | PatchManagerPlusCloud.PatchMgmt | READ |
| Initiate Patch Scan for All Computers | POST | /api/1.4/patch/computers/scanall | PatchManagerPlusCloud.PatchMgmt | UPDATE |
| List Patch Deployment Policies | GET | /api/1.4/patch/deploymentpolicies | PatchManagerPlusCloud.PatchMgmt | READ |
| Retrieve the details of all downloaded patches | GET | /api/1.4/patch/downloadedpatches | PatchManagerPlusCloud.PatchMgmt | READ |
| Patch Summary | GET | /api/1.4/patch/summary | PatchManagerPlusCloud.PatchMgmt | READ |
| Initiate Approve Patch Action | POST | /api/1.4/patch/approvepatch | PatchManagerPlusCloud.PatchMgmt | UPDATE |
| Initiate Unapprove Patch Action | POST | /api/1.4/patch/unapprovepatch | PatchManagerPlusCloud.PatchMgmt | UPDATE |
| List All Systems with Patch Status | GET | /api/1.4/patch/allsystems | PatchManagerPlusCloud.PatchMgmt | READ |
| Retrieve Systems and Patch Details | GET | /dcapi/threats/systemreport/patches | PatchManagerPlusCloud.PatchMgmt | READ |
| Retrieves all patches | GET | /dcapi/threats/patches | PatchManagerPlusCloud.PatchMgmt | READ |
| Patch Database Update Status | GET | /api/1.4/patch/dbupdatestatus | PatchManagerPlusCloud.PatchMgmt | READ |
| Retrieve Patch Report for a System | GET | /api/1.4/patch/systemreport | PatchManagerPlusCloud.PatchMgmt | READ |
| Retrieve Patch Deployment Configurations | GET | /api/1.4/patch/viewconfig | PatchManagerPlusCloud.PatchMgmt | READ |
| Get Patch Scan System List | GET | /api/1.4/patch/scandetails | PatchManagerPlusCloud.PatchMgmt | READ |
| Patch Approval Settings | GET | /api/1.4/patch/approvalsettings | PatchManagerPlusCloud.PatchMgmt | READ |
| Retrieve Supported Patches | GET | /api/1.4/patch/supportedpatches | PatchManagerPlusCloud.PatchMgmt | READ |
No APIs found for this search.
| Method Name | Method Type | URL | OAuth Scope | Operation |
|---|---|---|---|---|
| Modifying a APD task. | POST | /api/1.4/patch/modifyAPDTask | PatchManagerPlusCloud.PatchMgmt | UPDATE |
| Deleting a APD task. | POST | /api/1.4/patch/deleteAPDTask | PatchManagerPlusCloud.PatchMgmt | UPDATE |
| Creating a APD task. | POST | /api/1.4/patch/createAPDTask | PatchManagerPlusCloud.PatchMgmt | UPDATE |
| Suspending a APD task. | POST | /api/1.4/patch/suspendAPDTask | PatchManagerPlusCloud.PatchMgmt | UPDATE |
| Resuming a APD task. | POST | /api/1.4/patch/resumeAPDTask | PatchManagerPlusCloud.PatchMgmt | UPDATE |
No APIs found for this search.
| Method Name | Method Type | URL | OAuth Scope | Operation |
|---|---|---|---|---|
| DEPRECATING SOON Initiate Decline Patch Action | POST | /api/1.4/patch/declinepatch | PatchManagerPlusCloud.PatchMgmt | UPDATE |
| Decline Patches | PUT | /dcapi/patch/settings/declinePatch/declinePatches | PatchManagerPlusCloud.PatchMgmt | UPDATE |
No APIs found for this search.
| Method Name | Method Type | URL | OAuth Scope | Operation |
|---|---|---|---|---|
| Get Computers | GET | /api/1.4/som/computers | PatchManagerPlusCloud.Common | READ |
| Get Remote Office List | GET | /api/1.4/som/remoteoffice | PatchManagerPlusCloud.SOM | READ |
| Uninstall Patch Manager Plus Agent | POST | /api/1.4/som/computers/uninstallagent | PatchManagerPlusCloud.SOM | UPDATE |
| Get Summary for SoM Computers | GET | /api/1.4/som/summary | PatchManagerPlusCloud.Common | READ |
| Install Patch Manager Plus Agent | POST | /api/1.4/som/computers/installagent | PatchManagerPlusCloud.SOM | UPDATE |
| Remove Managed Computer | POST | /api/1.4/som/computers/removecomputer | PatchManagerPlusCloud.SOM | UPDATE |
No APIs found for this search.
| Method Name | Method Type | URL | OAuth Scope | Operation |
|---|---|---|---|---|
| Server Properties | GET | /api/1.4/desktop/serverproperties | PatchManagerPlusCloud.Common | READ |
No APIs found for this search.
| Method Name | Method Type | URL | OAuth Scope | Operation |
|---|---|---|---|---|
| Retrieve All Query Reports | GET | /dcapi/reports/queryReports | PatchManagerPlusCloud.QueryReport | READ |
| Retrieve Query Report Data by ID | GET | /dcapi/reports/queryReports/{dc_longvalue_pathparam}/data | PatchManagerPlusCloud.QueryReport | READ |
No APIs found for this search.
© 2025, Zoho Corporation Pvt. Ltd. All Rights Reserved.
| Operation Type | Description |
|---|---|
| ALL | Full access to the resource |
| READ | Allow access to read data from the resource |
| CREATE | Allow access to create data in the resource |
| UPDATE | Allow access to update an existing data in the resource |
| WRITE | Allow access to edit data in the resource (Alias for CREATE, UPDATE, and DELETE) |
| DELETE | Allow access to delete data in the resource |
| CUSTOM | Custom Operation Type |
© 2025, Zoho Corporation Pvt. Ltd. All Rights Reserved.
The PatchManagerPlusCloud API uses the OAuth 2.0 protocol for authentication. OAuth 2.0 is an industry-standard protocol specification that enables third-party applications (clients) to gain delegated access to protected resources in Zoho via an API.
Key Terminologies in OAuth 2.0

The following are some terms you need to know before you start using the PatchManagerPlusCloud APIs.
Any end-user of your account, who can grant access to the protected resources.
An application that sends requests to the resource server to access the protected resources on behalf of the end-user.
The consumer key generated from the connected application.
The consumer secret generated from the connected application.
Authorization server provides the necessary credentials (such as Access and Refresh tokens) to the client.
The authorization server creates a temporary token and sends it to the client via the browser. The client will send this code to the authorization server to obtain access and refresh tokens.
A token that is sent to the resource server to access the protected resources of the user. The Access token provides secure and temporary access to the protected resources and is used by the applications to make requests to the connected app. Each access token will be valid only for an hour and can be used only for the set of operations that are described in the scope.
A token that can be used to obtain new access tokens. This token has an unlimited lifetime until it is revoked by the end-user.
Important
User Access Token must be kept confidential since it provides access to protected resources. Do NOT expose your Access Token anywhere in public forums, public repositories or on your website's client-side code like HTML or JavaScript. Exposing it to the public may lead to data theft, loss or corruption.
© 2025, Zoho Corporation Pvt. Ltd. All Rights Reserved.
Scopes limit the level of access given to a client for protected resources. It enables a user to provide delegated access to a client.PatchManagerPlusCloud APIs use selected scopes, which control the type of resource that the client application can access. Tokens are usually created with various scopes to ensure improved security. For example, you can generate a scope to create or view a lead, or to view metadata and so on. Scopes contain three parameters — service name, scope name, and operation type. The format to define a scope is scope=service_name.scope_name.operation_type
For example, PatchManagerPlusCloud.SOM.READ
Here, PatchManagerPlusCloud is the service API name, SOM is the scope name, and READ is the operation type.
Separate scopes are used to provide access to data in a particular module without access to other modules.
https://accounts.zoho.com/oauth/v2/auth?scope=PatchManagerPlusCloud.SOM.UPDATE,PatchManagerPlusCloud.SOM.READ&client_id={client_id}&response_type=code&access_type={"offline"or"online"}&redirect_uri={redirect_uri}
The above scope gives the user access to only the SOM module from the client PatchManagerPlusCloud account.
Additionally, you can set specific permissions, like read, create, update or delete, for each module. For examples:
Access tokens can also be generated with multiple scopes. In such cases, the scopes should be separated by commas. The format to provide multiple scope is service_name.scope_name.OPERATION_TYPE,service_name.scope_name.OPERATION_TYPE. For example,PatchManagerPlusCloud.SOM.READ,PatchManagerPlusCloud.PatchMgmt.READ.
© 2025, Zoho Corporation Pvt. Ltd. All Rights Reserved.
Before you get started with authorization and make any calls using the PatchManagerPlusCloud APIs, you need to register your application with PatchManagerPlusCloud.
To register,
Go to Zoho Developer Console and click on GET STARTED.
Choose a client type and click CREATE NOW:
Client-based Applications
Applications that run exclusively on a browser and are independent of web servers.
Server-based Applications
Applications that are intended for use by multiple Zoho accounts. This app could be solving a special use case for all Zoho accounts and should have both a dedicated backend server and web UI to handle the authorization process and the app's logic. The app redirects users to Zoho for the authorization process using a web browser. Users grant permission for the app to access their Zoho data on their behalf. The app will consume data for its intended purposes on behalf of the user who authorized the app.
Mobile-based Applications
Applications that are built to run on smart phones and tablets.
Non-browser Mobile Applications
Applications that run on devices without browsers such as smart TVs and printers.
Self Client
Applications that does not have a redirect URL or a web UI, operating solely in the backend without requiring user interaction. A self-client is commonly employed when both the application and Zoho services are managed by the same person, aiming to establish secure communication between them.
For more details, refer to OAuth Overview.
Enter mandatory entries for corresponding client type and click on CREATE.
The following are the mandatory entries for different client types.
| Client Type | Client Name | Homepage URL | Redirect URIs | JS Domains |
|---|---|---|---|---|
| Java Script | Y | Y | Y | Y |
| Web-based | Y | Y | Y | NA |
| Mobile | Y | Y | Y | NA |
| Self Client | N | N | N | NA |
| Device | Y | Y | N | NA |
Server-based applications

Client-based applications

Self client

You will receive the client credentials such as Client ID and Client Secret in the Client Secret tab.
| Error | Resolution |
|---|---|
| Enter a valid client name | The client name has a special character. The client name must not contain any special characters except "_" and "&". |
| Enter a valid JavaScript Domain URI | The JavaScript domain is incorrect. Specify valid JavaScript domains, separated by commas, and they must start with 'http' or 'https'. |
| Enter a valid redirect URI | The redirect URI is incorrect. Specify a valid redirect URI in the format "https://www.your-domain.com/callback". |
| Enter a valid homepage URL | The homepage URL is invalid. Specify a valid homepage URL in the format "https://www.yourdomain.com". |
© 2025, Zoho Corporation Pvt. Ltd. All Rights Reserved.
To use the PatchManagerPlusCloud APIs, the users must authenticate the application to make API calls on their behalf with an access token.
The access token, in return, must be obtained from a authorization code. The PatchManagerPlusCloud APIs use the authorization code grant type to provide access to protected resources.
There are two ways in which you can generate the authorization code based on the client type.
Self-client - Authorization code flow
Use this method to generate the organization-specific authorization code if your application does not have a domain and a redirect URL. You can also use this option when your application is a standalone server-side application performing a back-end job.
Go to Zoho Developer Console and log in with your PatchManagerPlusCloud username and password.
Choose Self Client from the list of client types, and click Create Now.
Click OK in the pop up to enable a self client for your account.
Now, your client ID and client secret are displayed under the Client Secret tab.

Click the Generate Code tab and enter the required scope separated by commas. Refer to our list of Scopes, for more details. The system throws an 'Enter a valid scope' error when you enter one or more incorrect scopes.
Select the Time Duration for which the authorization code is valid. Please note that after this time, the authorization code expires.
Enter a description
Click Create to generate < code>
Note
Web-based applications are chosen when your application is used by multiple users and requires user intervention during authorization. For this client type, you must use redirection-based code generation. In this authorization flow,
The user clicks the Login with Zoho button on any third-party web-based application.
The application redirects the user to the Zoho Login page, and the user enters the Zoho credentials.

The web application redirects the user to the Zoho OAuth server with the required scope in the Accounts URL:
https://accounts.zoho.com/oauth/v2/auth?scope=PatchManagerPlusCloud.PatchMgmt.READ,PatchManagerPlusCloud.PatchMgmt.UPDATE&client_id={client_id}&response_type=code&access_type={"offline"or"online"}&redirect_uri={redirect_uri}
The page displays the organization and the data (scope) that the application wants to access. Also, the request URL has the following parameters:
When the user clicks Accept: The application gets authorized. The authorization code is sent as a parameter in the redirect_uri.
Note
Possible Errors
| Error | Resolution |
|---|---|
| ERROR_invalid_response_type | The value of the "response_type" key is not "code". Update the value as "code". (or) You have not passed the mandatory keys in the request. Pass all the mandatory keys in the request to generate the authorization code. |
| ERROR_invalid_client | The client ID is wrong or empty. Pass the right client ID. You can check your client ID from the developer console. |
| ERROR_invalid_redirect_uri | he redirect URI value passed, and the one registered in the developer console mismatches. Pass the right redirect URI. |
| ERROR_invalid_scope | The scope is invalid. Pass valid scopes. You can refer to the list of scopes here. |
© 2025, Zoho Corporation Pvt. Ltd. All Rights Reserved.
OAuth2.0 requests are usually authenticated with an access token, which is passed as bearer token. To use this access token, you need to construct a normal HTTP request and include it in an Authorization header along with the value of Bearer.
Make a POST request with the following URL. Replace {accounts_URL} with your domain-specific Zoho accounts URL when you make the request.
{accounts_URL}/oauth/v2/token
Note: For security reasons, pass the below parameters in the body of your request as form-data.
| Parameter | Description |
|---|---|
| grant_type | Enter the value as "authorization_code". |
| client_id | Specify client-id obtained from the connected app. |
| client_secret | Specify client-secret obtained from the connected app. |
| redirect_uri | Specify the Callback URL that you registered during the app registration. |
| code | Enter the authorization code you received after you made the authorization code request. |
If the request is successful, you would receive the following:
{
"access_token": "{access_token}",
"refresh_token": "{refresh_token}",
"api_domain": "https://www.zohoapis.com",
"token_type": "Bearer",
"expires_in": 3600
}| Parameter | Description |
|---|---|
| access_token | Access token to access DesktopCentralCloudAPIs. |
| refresh_token | Refresh token to obtain new access tokens. |
| expires_in | Time in seconds after which the access token expires. |
| token_type | Type of token obtained. "Bearer" indicates this is an access token. |
This completes the authentication. Once your app receives the access token, send the token in your HTTP authorization header to DesktopCentralCloud API with the value Zoho-oauthtoken {access_token} for each endpoint (for each request).
Note
| Error | Resolution |
|---|---|
| invalid_client | You have passed an invalid Client ID or secret. Specify the correct client ID and secret. (or) There is a domain mismatch. You have registered the client and generated the authorization code in a certain domain (US), but generating the tokens from a different domain (EU). Ensure that you generate the authorization code, access, and refresh tokens from the same domain using the same domain URL or Enable Multi-DC for your client to generate tokens from any domain. (or) You have passed the wrong client secret when multi-DC is enabled. Each DC holds a unique client secret. Ensure to pass the right client secret for that DC. |
| invalid_code | The authorization code has expired. The authorization code is valid only for two minute in the redirection-based flow. Generate the access and refresh tokens before the authorization code expires. (or) You have already used the authorization code. You can use the authorization code only once. (or) The refresh token to generate a new access token is wrong or revoked. Specify the correct refresh token value while refreshing an access token |
| invalid_redirect_uri | The redirect URI in the request mismatches the one registered in the developer console. Specify the correct redirect URI in the request. |
© 2025, Zoho Corporation Pvt. Ltd. All Rights Reserved.
To manage your OAuth tokens after they have been generated, follow the processes below to refresh an expired access token and revoke a refresh token when necessary.
Access tokens expire after an hour of generation. To generate a new access token, use the refresh token you generated earlier.
Make a POST request with the following URL:
{Accounts_URL}/oauth/v2/token?refresh_token={refresh_token}&client_id={client_id}&client_secret={client_secret}&grant_type=refresh_token
You must use your domain-specific Zoho accounts URL to refresh your access token.
If the request is successful, you will receive the following output:
{
"access_token": "{new_access_token}",
"expires_in": 3600,
"api_domain": "https://www.zohoapis.com",
"token_type": "Bearer"
}If you want to revoke your refresh token,
Make a POST request with the following URL:
{Accounts_URL}/oauth/v2/token/revoke?token={refresh_token}
You must use your domain-specific Zoho accounts URL to revoke your refresh token.
© 2025, Zoho Corporation Pvt. Ltd. All Rights Reserved.
Incremental Authorization is an OAuth strategy that allows a client to request specific authorization scopes as and when needed. This means that the client does not have to request every possible scope that might be needed upfront, which might result in a bad user experience. Incremental Authorization is considered a best practice in Oauth Authorization Request as:
For detailed information on implementing incremental authorization in your application, refer to the Zoho Accounts Incremental Authorization page.
© 2025, Zoho Corporation Pvt. Ltd. All Rights Reserved.
{
"error_description":"You have made too many requests continuously. Please try again after some time.",
"error":"Access Denied"
}© 2025, Zoho Corporation Pvt. Ltd. All Rights Reserved.
Endpoint Central cloud is hosted at multiple data centers, and therefore available on different domains. There are 7 different domains for Endpoint central cloud APIs, so you can use the one that is applicable to you.
Data centre | Domain | EndpointCentral_Server_URI | ZohoAccounts_Server_URI | DeveloperConsole |
|---|---|---|---|---|
United States. | .com | |||
Europe | .eu | |||
India | .in | |||
Australia | .com.au | |||
China | .cn | |||
Japan | .jp | |||
Canada | .ca | |||
United Kingdom | .uk |
The APIs on this page are intended for organizations hosted on the .com domain. If your organization is on a different domain, replace ".com" with the appropriate domain for the API endpoints before using them.
Note: You can find out which domain you're accessing by checking the URL while accessing Patch Manager Plus.
© 2025, Zoho Corporation Pvt. Ltd. All Rights Reserved.
An OpenAPI Specification (OAS) is a standardized way to describe RESTful APIs. It defines API structure, authentication methods, endpoints, request and response formats, in JSON or YAML.
The Open API Specification is designed to provide:
© 2025, Zoho Corporation Pvt. Ltd. All Rights Reserved.
The REST API Postman collection is a set of all the API requests. Using these boilerplate requests, you can test and explore the APIs in various environments for multiple organizations.
Going through the entire API documentation to set up environments, variables, authorization, and so on every time you need to test an API can be tedious. Using the API Postman collection can make the process of exploring APIs swift and effortless. It also significantly reduces the risk of errors.
© 2025, Zoho Corporation Pvt. Ltd. All Rights Reserved.
Note: Select one target set format from the options provided below in the request payload:
"ResourceIDs":[601,602],
"resourceNames":["abc","xyz"],
"customGroups":["CG1","CG2"],
"ipAddresses":["127.0.0.1","126.0.0.1"],
"remoteOffices":["Local","remote"]
https://{serverurl}/api/1.4/patch/installpatch
PatchManagerPlusCloud.PatchMgmt.UPDATE
Authorization: d92d4xxxxxxxxxxxxx15f52
Enter the list of missing patches detected in your network,E.g. PatchIDs:[103980,103981,103980]
Specify the required list of Custom Group names for deployment ex:customGroups:[cg-1,cg-2]
Specify the time, in milliseconds, for force deploying the patches to unpatched systems in your network,E.g. deadlineTime: 1691393760 (Time in milliseconds),Note : Max of 1 year is supported
This will initiate deployment of the defined Install Patches Configuration to the specified targets in accordance with the provided criteria,E.g. actionToPerform:Deploy/ Deploy Immediately/ Draft,Deploy : The deployment will initiate upon the agent's contact with the server,Deploy Immediately : Deployed instantly without waiting for agent contact,Draft : Save the configuration as a draft.
This configuration will not be applied after the specified time. Use the format yyyy-MM-dd HH:MM.
Provide a description for the Install Patch configuration,E.g. ConfigDescription:API test
Depending on the selected Deployment Policy, you can choose to enable Force Reboot either within or outside the deployment window. Accepted Values : 0/1/2,E.g. forceRebootOption:0/1/2,0 - Not configured,1 - Within the deployment/reboot window,2 - Outside the deployment/reboot window.
Specify the required list of resource names for deployment ex:resourceNames:[win-1422,wind-144d]
Enabling this option will redeploy the configuration on failed targets.E.g. "retrySettings":{"enableRetrySettings": true,"noOfRetries": 2,"logonStartupMinRetry": 1,"refreshMinRetry": 1} enableRetrySettings,true : To enable retry settings,false: To disable retry settings,noOfRetries:Total number of retries count , Accepted values 1-10,logonStartupMinRetry Retry during system startup,refreshMinRetry Retry during refresh cycle,Note : Enabled by default. To disable, set 'enableRetrySettings' to false. Retry count: logonStartupMinRetry + refreshMinRetry.
Specify retry count range from 0-9 during user logon
Specify retry values range from 1-10
Specify the retry count range (0—9) for computers that complete the 90-minute refresh cycle.
true-To enable retry, false-To disable retry.
Provide the preferred deployment option here. Accepted values : 0/1/2,E.g. deploymentType: 0/1/2,0 - Deploy only (default)This option enables you to deploy the selected patches to the targeted endpoints according to the relevant deployment policies,1 - Publish in Self Service Portal only (DeploymentPolicyTemplateID will be ignored),This option enables administrators to publish the selected patches to the Self Service Portal. End users and server owners can then initiate the installation process at their convenience,2 - This option incorporates both deployment and publication actions.Note: If deploymentType is set to 0 or 1, then the DeploymentPolicyTemplateID field is mandatory.
(Optional): true = deploy only approved patches, false = deploy all
Provide a name for the Install Patch configuration,E.g. ConfigName:API install patch test1
Enter the list of resources with missing patches in your network,E.g. ResourceIDs:[601,602]
Specify the required list of Ip addresses for deployment ex:remoteOffices:[Local Office,Remote-1]
Specify the required list of Custom Group names for deployment ex:ipAddresses:[127.0.0.1,126.0.0.1]
Specify the date and time for patch installation to begin. Patches will be installed based on the selected options after the scheduled time. Use the format: yyyy-MM-dd HH:MM.
Retrieve the Deployment Policy ID by executing the following API, /api/1.4/patch/deploymentpolicies and and provide the value of the template_id param value.
Success
Note: Select one target set format from the options provided below in the request payload:
"ResourceIDs":[601,602],
"resourceNames":["abc","xyz"],
"customGroups":["CG1","CG2"],
"ipAddresses":["127.0.0.1","126.0.0.1"],
"remoteOffices":["Local","remote"]
https://{serverurl}/api/1.4/patch/installpatch
PatchManagerPlusCloud.PatchMgmt.UPDATE
Authorization: d92d4xxxxxxxxxxxxx15f52
Enter the list of missing patches detected in your network,E.g. PatchIDs:[103980,103981,103980]
Specify the required list of Custom Group names for deployment ex:customGroups:[cg-1,cg-2]
Specify the time, in milliseconds, for force deploying the patches to unpatched systems in your network,E.g. deadlineTime: 1691393760 (Time in milliseconds),Note : Max of 1 year is supported
This will initiate deployment of the defined Install Patches Configuration to the specified targets in accordance with the provided criteria,E.g. actionToPerform:Deploy/ Deploy Immediately/ Draft,Deploy : The deployment will initiate upon the agent's contact with the server,Deploy Immediately : Deployed instantly without waiting for agent contact,Draft : Save the configuration as a draft.
This configuration will not be applied after the specified time. Use the format yyyy-MM-dd HH:MM.
Provide a description for the Install Patch configuration,E.g. ConfigDescription:API test
Depending on the selected Deployment Policy, you can choose to enable Force Reboot either within or outside the deployment window. Accepted Values : 0/1/2,E.g. forceRebootOption:0/1/2,0 - Not configured,1 - Within the deployment/reboot window,2 - Outside the deployment/reboot window.
Specify the required list of resource names for deployment ex:resourceNames:[win-1422,wind-144d]
Enabling this option will redeploy the configuration on failed targets.E.g. "retrySettings":{"enableRetrySettings": true,"noOfRetries": 2,"logonStartupMinRetry": 1,"refreshMinRetry": 1} enableRetrySettings,true : To enable retry settings,false: To disable retry settings,noOfRetries:Total number of retries count , Accepted values 1-10,logonStartupMinRetry Retry during system startup,refreshMinRetry Retry during refresh cycle,Note : Enabled by default. To disable, set 'enableRetrySettings' to false. Retry count: logonStartupMinRetry + refreshMinRetry.
Specify retry count range from 0-9 during user logon
Specify retry values range from 1-10
Specify the retry count range (0—9) for computers that complete the 90-minute refresh cycle.
true-To enable retry, false-To disable retry.
Provide the preferred deployment option here. Accepted values : 0/1/2,E.g. deploymentType: 0/1/2,0 - Deploy only (default)This option enables you to deploy the selected patches to the targeted endpoints according to the relevant deployment policies,1 - Publish in Self Service Portal only (DeploymentPolicyTemplateID will be ignored),This option enables administrators to publish the selected patches to the Self Service Portal. End users and server owners can then initiate the installation process at their convenience,2 - This option incorporates both deployment and publication actions.Note: If deploymentType is set to 0 or 1, then the DeploymentPolicyTemplateID field is mandatory.
(Optional): true = deploy only approved patches, false = deploy all
Provide a name for the Install Patch configuration,E.g. ConfigName:API install patch test1
Enter the list of resources with missing patches in your network,E.g. ResourceIDs:[601,602]
Specify the required list of Ip addresses for deployment ex:remoteOffices:[Local Office,Remote-1]
Specify the required list of Custom Group names for deployment ex:ipAddresses:[127.0.0.1,126.0.0.1]
Specify the date and time for patch installation to begin. Patches will be installed based on the selected options after the scheduled time. Use the format: yyyy-MM-dd HH:MM.
Retrieve the Deployment Policy ID by executing the following API, /api/1.4/patch/deploymentpolicies and and provide the value of the template_id param value.
Success
Initiates the decline patch action for the specified patches across all computers managed by the Endpoint Central server.
This API endpoint is deprecating soon
This API endpoint will be permanently removed on October 2026, please migrate to the new endpoint.
View new endpoint > https://{serverurl}/api/1.4/patch/declinepatch
PatchManagerPlusCloud.PatchMgmt.UPDATE
Authorization: d92d4xxxxxxxxxxxxx15f52
Success
Note: Select one target set format from the options provided below in the request payload:
"ResourceIDs":[601,602],
"resourceNames":["abc","xyz"],
"customGroups":["CG1","CG2"],
"ipAddresses":["127.0.0.1","126.0.0.1"],
"remoteOffices":["Local","remote"]
https://{serverurl}/api/1.4/patch/installpatch
PatchManagerPlusCloud.PatchMgmt.UPDATE
Authorization: d92d4xxxxxxxxxxxxx15f52
Enter the list of missing patches detected in your network,E.g. PatchIDs:[103980,103981,103980]
Specify the required list of Custom Group names for deployment ex:customGroups:[cg-1,cg-2]
Specify the time, in milliseconds, for force deploying the patches to unpatched systems in your network,E.g. deadlineTime: 1691393760 (Time in milliseconds),Note : Max of 1 year is supported
This will initiate deployment of the defined Install Patches Configuration to the specified targets in accordance with the provided criteria,E.g. actionToPerform:Deploy/ Deploy Immediately/ Draft,Deploy : The deployment will initiate upon the agent's contact with the server,Deploy Immediately : Deployed instantly without waiting for agent contact,Draft : Save the configuration as a draft.
This configuration will not be applied after the specified time. Use the format yyyy-MM-dd HH:MM.
Provide a description for the Install Patch configuration,E.g. ConfigDescription:API test
Depending on the selected Deployment Policy, you can choose to enable Force Reboot either within or outside the deployment window. Accepted Values : 0/1/2,E.g. forceRebootOption:0/1/2,0 - Not configured,1 - Within the deployment/reboot window,2 - Outside the deployment/reboot window.
Specify the required list of resource names for deployment ex:resourceNames:[win-1422,wind-144d]
Enabling this option will redeploy the configuration on failed targets.E.g. "retrySettings":{"enableRetrySettings": true,"noOfRetries": 2,"logonStartupMinRetry": 1,"refreshMinRetry": 1} enableRetrySettings,true : To enable retry settings,false: To disable retry settings,noOfRetries:Total number of retries count , Accepted values 1-10,logonStartupMinRetry Retry during system startup,refreshMinRetry Retry during refresh cycle,Note : Enabled by default. To disable, set 'enableRetrySettings' to false. Retry count: logonStartupMinRetry + refreshMinRetry.
Specify retry count range from 0-9 during user logon
Specify retry values range from 1-10
Specify the retry count range (0—9) for computers that complete the 90-minute refresh cycle.
true-To enable retry, false-To disable retry.
Provide the preferred deployment option here. Accepted values : 0/1/2,E.g. deploymentType: 0/1/2,0 - Deploy only (default)This option enables you to deploy the selected patches to the targeted endpoints according to the relevant deployment policies,1 - Publish in Self Service Portal only (DeploymentPolicyTemplateID will be ignored),This option enables administrators to publish the selected patches to the Self Service Portal. End users and server owners can then initiate the installation process at their convenience,2 - This option incorporates both deployment and publication actions.Note: If deploymentType is set to 0 or 1, then the DeploymentPolicyTemplateID field is mandatory.
(Optional): true = deploy only approved patches, false = deploy all
Provide a name for the Install Patch configuration,E.g. ConfigName:API install patch test1
Enter the list of resources with missing patches in your network,E.g. ResourceIDs:[601,602]
Specify the required list of Ip addresses for deployment ex:remoteOffices:[Local Office,Remote-1]
Specify the required list of Custom Group names for deployment ex:ipAddresses:[127.0.0.1,126.0.0.1]
Specify the date and time for patch installation to begin. Patches will be installed based on the selected options after the scheduled time. Use the format: yyyy-MM-dd HH:MM.
Retrieve the Deployment Policy ID by executing the following API, /api/1.4/patch/deploymentpolicies and and provide the value of the template_id param value.
Success
This API provides detailed information about the installation status of a given patch (patchid) on all applicable computers within the Patch Manager Plus environment
https://{serverurl}/api/1.4/patch/allpatchdetails
PatchManagerPlusCloud.PatchMgmt.READ
Authorization: d92d4xxxxxxxxxxxxx15f52
Get branch office list from api/1.4/desktop/serverproperties
Filter for patches with particular bulletin id
Filter for patch with a particular id
201: Installed — patch is already installed, 202: Missing — patch is not installed
Get Custom Group list from api/1.4/desktop/serverproperties
0: Unrated — no severity assigned, 1: Low — minimal impact, 2: Moderate — average impact, 3: Important — significant impact, 4: Critical — high impact or security risk
Get domain list from api/1.4/desktop/serverproperties
Windows/Mac/Linux
Severity level: 0 - Unrated, 1 - Low, 2 - Moderate, 3 - Important
Patch status: 201 - Installed, 202 - Missing, 206 - Failed to Install
Success
Provides all the the computers and their related Patch Manager Plus agent details
https://{serverurl}/api/1.4/som/computers
PatchManagerPlusCloud.Common.READ
Authorization: d92d4xxxxxxxxxxxxx15f52
Branch Office to which computers are mapped in Patch Manager Plus
Specifies the number of items per page. Default is 25. Maximum is 100.
Filter computer based on FQDN Name
Filter computer based on it's name
Domain to which computers are mapped in Patch Manager Plus
0 - Unknown
1 - Windows OS
2- Mac OS
3- Linux OS
Filter computer with particular resource id
21: Yet to install (Agent has not been installed)
22: Installed (Agent is currently installed)
23: Uninstalled (Agent has been removed)
31: Uninstallation Failure (An error occured during agent uninstallation)
29: Installation failure (An error occurred during installation)
1 - Live: System is working
2 - Down: System is not working
3 - Unknown: System status is not known.
Search for computers with names containing the specified substring
Filter computers based on it's service tag
Specifies the page number to retrieve. Default is 1.
equal_3_day - Agents contacted server in last 3 days
4_day_to_7_day - Agents contacted server between 4 and 7 days ago
8_day_to_15_day - Agents contacted server between 8 and 15 days ago
16_day_to_30_day - Agents contacted server between 16 and 30 days ago
greater_30_day - Agent has not contacted the server in the last 30 days
Name of the module
Response message containing computer details
Total number of computers
Number of computers per page
Current page number
Remarks related to MDM enrollment
List of remarks
Time in milliseconds when the agent was installed
Time in milliseconds when the push install of agent was initiated
Name of the processor architecture type
Name of the operating system platform
String representation of the unique identifier for the computer
Service pack information of the operating system
1 - Unknown
2 - x86-based PC
3 - x64-based PC
4 - ARM32-based PC
5 - ARM64-based PC
0 - Unknown
1 - x86-based PC
2 - x64-based PC
3 - ARM32-based PC
4 - ARM64-based PC
0 - Unknown
1 - Windows
2 - MAC
3 - Linux
Used to store the previous installation status of the agent on the computer
Names of users currently logged on to the computer where the agent is installed
DHCP server IP address of the computer
Flavor of the OS type
Status label indicating the current status of the agent installation
URL for the knowledge base article related to the error
Full name of the computer
Email ID of the owner of the computer
Operation type for computer error codes
Time in milliseconds when the agent was last upgraded
21 - Yet to install
22 - Installed
23 - Uninstalled
24 - Yet to uninstall
29 - Installation failure
Error code indicating the status of the agent installation
Indicates the agent upgradation status
Type of MDM enrollment
Time in milliseconds when the computer status was last updated
61 - Managed by DC
62 - Not Managed by DC
68 - Inactive State
65 - Managed by SDP
Name of the branch office associated with the computer
-1 - Not Applicable
21 - Yet to install
22 - Installed
23 - Uninstalled
29 - Installation failure
Time in milliseconds when the agent last contacted the server
Description of the computer
NetBIOS name of the domain to which the computer belongs
Fully Qualified Domain Name of the computer
Numeric representation of the agent version
MAC address of the computer
Owner of the computer
Time in milliseconds when the MDM agent last contacted the server
Friendly name of the computer
Gateway IP address of the computer
Subnet mask of the computer
Version of the operating system installed on the computer
Time in milliseconds when the computer last synchronized with the server
Time in milliseconds when the MDM agent is installed on the computer
IP address of the computer
Time in milliseconds when the agent was uninstalled
Version of the agent installed on the computer
Subnet IP address of the computer
Time in milliseconds when the computer was last booted up
Unique identifier for the computer
Name of the operating system installed on the computer
Location of the computer in active directory
Indicates the changes in device friendly name format
1 - Live
2 - Down
3 - Unknown
Name of the customer associated with the computer
Status of the MDM enrollment
Name of the computer
Unique identifier for the customer associated with the computer
Remarks or comments related to the computer
Version of the Api
Status of the request
Request processed successfully
Performs a patch scan on selected computers or all computers managed by the Patch Manager Plus server
https://{serverurl}/api/1.4/patch/computers/scan
PatchManagerPlusCloud.PatchMgmt.UPDATE
Authorization: d92d4xxxxxxxxxxxxx15f52
This parameter holds the resource IDs of the computer(s) to be patch-scanned
Success
Retrieves the currently configured system health policy in Patch Manager Plus
https://{serverurl}/api/1.4/patch/healthpolicy
PatchManagerPlusCloud.PatchMgmt.READ
Authorization: d92d4xxxxxxxxxxxxx15f52
Success
This API provides a complete list of patches applicable to systems, including their status, severity, and other details
https://{serverurl}/api/1.4/patch/allpatches
PatchManagerPlusCloud.PatchMgmt.READ
Authorization: d92d4xxxxxxxxxxxxx15f52
Get branch office list from api/1.4/desktop/serverproperties
Filter for patch with a particular id
Filter for patches with particular bulletin id
201: Installed — patch is already installed, 202: Missing — patch is not installed
211: Approved — patch has been approved for deployment, 0: Not Approved — patch approval is pending, 212: Declined — patch has been declined
Get Custom Group list from api/1.4/desktop/serverproperties
0: Unrated — no severity assigned, 1: Low — minimal impact, 2: Moderate — average impact, 3: Important — significant impact, 4: Critical — high impact or security risk
Get domain list from api/1.4/desktop/serverproperties
Windows/Mac/Linux
0 - Unrated, 1 - Low, 2 - Moderate, 3 - Important
221 - Downloaded, -- - Yet to download
0 - Not Supported, 1 - Supported
0 - Not Required, 1 - Reboot Required
Success
Initiates a patch scan across all computers managed by the Patch Manager Plus server
https://{serverurl}/api/1.4/patch/computers/scanall
PatchManagerPlusCloud.PatchMgmt.UPDATE
Authorization: d92d4xxxxxxxxxxxxx15f52
Success
The Server Properties API provides information about the configuration of the Patch Manager Plus server. It returns the list of branch offices, domains, and custom groups available in the server environment. This information can be used to identify organizational structures, group policies, and domain settings.
https://{serverurl}/api/1.4/desktop/serverproperties
PatchManagerPlusCloud.Common.READ
Authorization: d92d4xxxxxxxxxxxxx15f52
Wrapper object containing the actual response data.
Contains server discovery details.
Lists the branch offices managed by the server.
Lists the domains managed by the server.
Lists the custom groups configured in the server.
Identifies the type of message
Version of the response message format.
Response status success/failure.
Success
Modifying a APD task.
https://{serverurl}/api/1.4/patch/modifyAPDTask
PatchManagerPlusCloud.PatchMgmt.UPDATE
Authorization: d92d4xxxxxxxxxxxxx15f52
Defines how OS applications should be patched (All, Specific, or All Except). Example: Patch All Applications Except
Whether to attach failure reports in notification emails. Example: true
File format of failure report attachment. Example: xls
Short description of the task purpose. Example: task for windows
Includes updates from external vendors or third-party applications (applicable for Windows, Mac, Linux). Example: true
Target OS platform for deployment (Windows, Mac, or Linux). Example: Windows
Includes rollup updates that bundle multiple patches into one package (Windows only). Example: true
Interval in days for sending failure notifications. Example: 1
Enable or disable success report notifications. Example: false
Whether to attach success reports in notification emails. Example: true
List of OS applications to include or exclude during patching. Example: Windows Defender x64
Recipient email address for receiving notifications and reports. Example: xx@yy.com
Includes cumulative sets of fixes and enhancements, typically service packs (Windows only). Example: true
File format of success report attachment. Example: pdf
Task expiry date and time after which deployment becomes invalid (MM/DD/YYYY, HH:MM). Example: 08/29/2018, 00:00
Includes optional updates such as non-critical enhancements. At least one applicable update type must be selected for the chosen platform. Example: true
Delay deployment by specified time after patch release (in hours/days). Example: 5
Includes definition updates like antivirus or Windows Defender signatures (Windows only). Example: true
Target type for deployment (DOMAIN, REMOTE_OFFICE, CUSTOM_GROUP). Example: REMOTE_OFFICE
Includes non-security updates that fix functional or performance issues (applicable for Windows and Mac only). Example: true
Includes security updates that fix vulnerabilities (applicable for Windows, Mac, Linux). Example: true
Interval in days for sending success report notifications. Example: 3
Includes feature packs that add new capabilities (Windows only). Example: true
List of targets (e.g., remote office, custom group, or domain) for deployment. Example: Local Office
Defines how third-party applications should be patched (All, Specific, or All Except). Example: Patch Specific Applications
Delay deployment by specified time after patch approval (in hours/days). Example: 5
Name of the deployment template to use (mandatory field). Example: Force reboot excluding servers
Deadline configuration details for patch deployment
Specify after how many days the unpatched system should be force deployed
2->Force Reboot outside the deployment/reboot window, 1-Force reboot within the deployment/reboot window, 0->Disable force reboot
true-To enable deadline settings, false-To disable deadline settings.
List of third-party applications to include or exclude during patching. Example: Notepad++
Enable or disable failure notifications for deployment. Example: false
Name of the patch task (mandatory field). Example: windows create task
Success
Provides a list of remote offices along with configuration details such as proxy details, distribution server details, etc.
https://{serverurl}/api/1.4/som/remoteoffice
PatchManagerPlusCloud.SOM.READ
Authorization: d92d4xxxxxxxxxxxxx15f52
Specifies the page number to retrieve. Default is 1.
Specifies the number of items per page. Default is 25. Maximum is 100.
Name of the module
Response message containing remote office details
Total number of remote offices
Number of remote offices per page
Current page number
Time when the remote office was last updated
Indicates whether the remote office is configured to use HTTPS for communication
21 - Yet to install
22 - Installed
23 - Uninstalled
29 - Installation Failure
Name of the remote office
1 - Best
0 - Fast
Name of the replication policy associated with the remote office
Unique identifier for the remote office
Unique identifier for the remote office associated with the proxy details
String representation for the unique identifier of the remote office
Unique identifier for the policy associated with the remote office
Unique identifier for the remote office associated with the agent communication settings
DNS name of the distribution server for the remote office
Description of the remote office
Version of the distribution server associated with the remote office
Unique identifier for the branch office associated with the policy
Port number of the proxy server associated with the remote office
Last contact time of the remote office with the server
Indicates whether a proxy server is configured for the remote office
24 - True color
16 - High
8 - Medium
4 - Low
HTTPS port of the distribution server for the remote office
Username for the proxy server associated with the remote office
Unique identifier for the remote office mapping associated with the Active Directory group
Indicates whether the remote office is associated with the distribution server
Number of computers managed by the remote office
Unique identifier for the replication policy associated with the remote office
URL for the knowledge base article related to the error code
Sync status of the replication details from the server
URL for the knowledge base article related to the error
IP address of the distribution server for the remote office
Unique identifier for the customer associated with the remote office
Name of the proxy server associated with the remote office
Unique identifier for the remote office
Unique identifier for the remote office associated with distribution server details
Error code indicating the status of the remote office
Name of the customer associated with the remote office
Unique identifier for the customer associated with the remote office
Name of the distributution server associated with the remote office
Remarks or comments related to the remote office
Version of the Api
Status of the request
Request processed successfully
Uninstall specific patches in all systems
Note: Select one target set format from the options provided below in the request payload:
"ResourceIDs":[601,602],
"resourceNames":["abc","xyz"],
"customGroups":["CG1","CG2"],
"ipAddresses":["127.0.0.1","126.0.0.1"],
"remoteOffices":["Local","remote"]
https://{serverurl}/api/1.4/patch/uninstallpatch
PatchManagerPlusCloud.PatchMgmt.UPDATE
Authorization: d92d4xxxxxxxxxxxxx15f52
Enter the list of missing patches detected in your network,E.g. PatchIDs:[103980,103981,103980]
Provide a name for the Install Patch configuration,E.g. ConfigName:API install patch test1
This will initiate deployment of the defined Install Patches Configuration to the specified targets in accordance with the provided criteria,E.g. actionToPerform:Deploy/ Deploy Immediately/ Draft,Deploy : The deployment will initiate upon the agent's contact with the server,Deploy Immediately : Deployed instantly without waiting for agent contact,Draft : Save the configuration as a draft.
Provide a description for the Install Patch configuration,E.g. ConfigDescription:API test
Retrieve the Deployment Policy ID by executing the following API, /api/1.4/patch/deploymentpolicies and and provide the value of the template_id param value. This paramater is mandatory
Success
Retrieves a list of all patch deployment policies configured in Patch Manager Plus
https://{serverurl}/api/1.4/patch/deploymentpolicies
PatchManagerPlusCloud.PatchMgmt.READ
Authorization: d92d4xxxxxxxxxxxxx15f52
Success
Retrieve the details of all downloaded patches
https://{serverurl}/api/1.4/patch/downloadedpatches
PatchManagerPlusCloud.PatchMgmt.READ
Authorization: d92d4xxxxxxxxxxxxx15f52
Success
This API provides various summaries related to the patch module, such as health status, scan summary, and other key metrics
https://{serverurl}/api/1.4/patch/summary
PatchManagerPlusCloud.PatchMgmt.READ
Authorization: d92d4xxxxxxxxxxxxx15f52
Current page number for pagination.
Number of records per page.
Success
Initiates the patch approval process for the specified patches across all computers managed by the Patch Manager Plus server
https://{serverurl}/api/1.4/patch/approvepatch
PatchManagerPlusCloud.PatchMgmt.UPDATE
Authorization: d92d4xxxxxxxxxxxxx15f52
Success
Initiates the uninstallation process for the Patch Manager Plus agent on managed computer in Patch Manager Plus
https://{serverurl}/api/1.4/som/computers/uninstallagent
PatchManagerPlusCloud.SOM.UPDATE
Authorization: d92d4xxxxxxxxxxxxx15f52
Computer Resource IDs in Patch Manager Plus
Name of the module
Response message containing computer's operation status
Indicates the status of the task initiated
Version of the Api
Status of the request
Request processed successfully
Initiates the patch unapproval process for the specified patches across all computers managed by the Patch Manager Plus server
https://{serverurl}/api/1.4/patch/unapprovepatch
PatchManagerPlusCloud.PatchMgmt.UPDATE
Authorization: d92d4xxxxxxxxxxxxx15f52
Success
Returns SoM computers summary
https://{serverurl}/api/1.4/som/summary
PatchManagerPlusCloud.Common.READ
Authorization: d92d4xxxxxxxxxxxxx15f52
Name of the module
Response message containing summary details
No of agents contacted server in last 3 days
No of agents contacted server between 8 and 15 days ago
No of agents contacted server between 16 and 30 days ago
Agent has not contacted the server in the last 30 days
No of agents contacted server between 4 and 7 days ago
No of computers where agent uninstallation failed
No of computers where agent was installed successfully
No of Computers in Patch Manager Plus
No of computers where agent intallation failed
No of computers where the agent yet to be installed
No of computers where the agent was unistalled successfully
No of computers in down state
No of computers in live state
No of computers with unknown state
Version of the Api
Status of the request
Request processed successfully
Deleting a APD task.
https://{serverurl}/api/1.4/patch/deleteAPDTask
PatchManagerPlusCloud.PatchMgmt.UPDATE
Authorization: d92d4xxxxxxxxxxxxx15f52
Provide name of the apd task
Success
Retrieves all systems managed by Patch Manager Plus along with their patch health and scan status
https://{serverurl}/api/1.4/patch/allsystems
PatchManagerPlusCloud.PatchMgmt.READ
Authorization: d92d4xxxxxxxxxxxxx15f52
Get branch office list from api/1.4/desktop/serverproperties
0: Unknown — patch status is not available, 1: Healthy — system is up-to-date, 2: Vulnerable — system has missing patches, 3: Highly Vulnerable — system has critical or high-risk missing patches
Get Custom Group list from api/1.4/desktop/serverproperties
Filter for system with a resource id
Get domain list from api/1.4/desktop/serverproperties
Windows/Mac/Linux
226-Failed, 227-In Progress, 228-Success, 229-Not Scanned
0-Unknown, 1-Healthy, 2-Vulnerable, 3-Highly Vulnerable
1-Live, 2-Down
Success
Fetches a list of systems along with their corresponding patch details, with support for extensive filtering
https://{serverurl}/dcapi/threats/systemreport/patches
PatchManagerPlusCloud.PatchMgmt.READ
Authorization: d92d4xxxxxxxxxxxxx15f52
Filters systems based on the severity provided.
Filters systems that contain the provided patch name.
Filters systems based on the type of patch provided. (Applicable inputs: Security Updates, Non-Security Updates, Third-Party Updates, Definition Update, Service Packs, Feature Packs, Rollups, Tools, Driver, Optional Updates, Preview Rollups and BIOS)
Filters systems based on the provided patch id
Filters systems that contain the provided patch description.
Filters systems based on the provided vendor name.
Filters systems based on the installation error code provided.
Filters systems based on the FQDN name provided.
Filters systems based on the patch release date provided.
Displays the provided number of patch details per page.
Filters systems based on the reboot option provided. (required, not required, autoreboot, may require)
Filters systems based on the platform provided.
Filters systems based on the CVE ID provided.
Filters systems based on the resource ID provided.
Displays the content of the provided page number.
Filters systems based on the provided patch installation time.
Filters systems based on the patch status provided. (Applicable inputs: Missing, Failed, Installed).
Filters systems based on the provided patch approval status. (Applicable inputs: Approved, Unapproved)
Success
Retrieves a comprehensive list of all patches applicable to systems, with extensive filter support for targeted querying
https://{serverurl}/dcapi/threats/patches
PatchManagerPlusCloud.PatchMgmt.READ
Authorization: d92d4xxxxxxxxxxxxx15f52
Filters patches based on the severity provided.
Filters patches that contain the provided patch name.
Filters patches based on the approved time.
Filters patches based on the type of patch provided. (Applicable inputs: Security Updates, Non-Security Updates, Third-Party Updates, Definition Update, Service Packs, Feature Packs, Rollups, Tools, Driver, Optional Updates, Preview Rollups and BIOS)
Filters patches that contain the provided patch description.
Filters patches based on the provided KB number.
Filters patches based on the vendor name provided.
Filters patches based on the provided patch release date.
Filters patches based on the provided patch support date.
Filters patches based on the provided size.
Displays the provided number of patch details per page
Filters patches based on the patch ID provided.
Filters patches based on the patch uninstallation support (as specified by the vendor).
Filters patches based on the post-deployment reboot option configured. (Applicable inputs: required, not required, autoreboot, may require)
Filters patches based on the post-deployment reboot option configured. (Applicable inputs: required, not required, autoreboot, may require)
Filters the applicable patches based on the platform provided.
Filters patches based on the download status provided.
Filters patches based on the CVE ID provided.
Displays the content of the provided page number.
Filters patches based on the provided patch status.
Success
Retrieves the current status of the ongoing or last patch database update
https://{serverurl}/api/1.4/patch/dbupdatestatus
PatchManagerPlusCloud.PatchMgmt.READ
Authorization: d92d4xxxxxxxxxxxxx15f52
Success
This API returns a hierarchical list of query reports with details such as Report ID, Label, Owner, View Name, Description, and Last Modified timestamp. It helps users identify available reports and their metadata.
https://{serverurl}/dcapi/reports/queryReports
PatchManagerPlusCloud.QueryReport.READ
Authorization: d92d4xxxxxxxxxxxxx15f52
application/allQueryReports.v1+json
Parent report/category under which the report is grouped (null for root)
List of reports
Parent identifier linking the child to its parent group
Display name of the child report
Message indicating the import result, showing how many records out of the total were successfully imported
Unique identifier of the child report
Message indicating the import result, showing how many records out of the total were successfully imported
Message indicating the import result, showing how many records out of the total were successfully imported
Metadata of the child report
Name of the user who created/owns the report
Associated internal database view name for the report
Whether this child can have further sub-reports
Whether the child report can be individually selected
Short summary describing the purpose/content of the report
Timestamp of the last modification made to the report
Boolean flag specifying if the current object is the root node
Unique identifier of the report
Display name of the report
Boolean flag specifying if the current object is a leaf node
Metadata of the report
Numeric identifier representing the type of report
Indicates whether the report group can have child reports (true/false)
Indicates whether the report can be individually selected (true/false)
Success
Retrieves the list of patches and their status for a specific computer managed by Patch Manager Plus
https://{serverurl}/api/1.4/patch/systemreport
PatchManagerPlusCloud.PatchMgmt.READ
Authorization: d92d4xxxxxxxxxxxxx15f52
201: Installed — patch is already installed, 202: Missing — patch is not installed
211: Approved — patch has been approved for deployment, 0: Not Approved — patch approval is pending, 212: Declined — patch has been declined
Filters systems with a particular resource id provided
0: Unrated — no severity assigned, 1: Low — minimal impact, 2: Moderate — average impact, 3: Important — significant impact, 4: Critical — high impact or security risk
Windows/Mac/Linux
0-Unrated, 1-Low, 2-Moderate, 3-Important
201-Installed, 202-Missing, 206-Failed To Install
221-Downloaded, -- -Yet to download
0-Not Required, 1-Reboot Required
211-Approved, 212-Declined 0 - Not Approved
Success
Retrieves all patch deployment configurations along with their execution status
https://{serverurl}/api/1.4/patch/viewconfig
PatchManagerPlusCloud.PatchMgmt.READ
Authorization: d92d4xxxxxxxxxxxxx15f52
Get branch office list from api/1.4/desktop/serverproperties
InProgress Draft,Executed,Suspended,Deployed,RetryInProgress,Expired
Get domain list from api/1.4/desktop/serverproperties
Success
Initiates the agent installation process for an unmanaged computer in Patch Manager Plus
https://{serverurl}/api/1.4/som/computers/installagent
PatchManagerPlusCloud.SOM.UPDATE
Authorization: d92d4xxxxxxxxxxxxx15f52
Computer Resource IDs in Patch Manager Plus
Name of the module
Response message containing computer's operation status
Indicates the status of the task initiated
Version of the Api
Status of the request
Request processed successfully
Creating a APD task.
https://{serverurl}/api/1.4/patch/createAPDTask
PatchManagerPlusCloud.PatchMgmt.UPDATE
Authorization: d92d4xxxxxxxxxxxxx15f52
Defines how OS applications should be patched (All, Specific, or All Except). Example: Patch All Applications Except
Whether to attach failure reports in notification emails. Example: true
File format of failure report attachment. Example: xls
Short description of the task purpose. Example: task for windows
Includes updates from external vendors or third-party applications (applicable for Windows, Mac, Linux). Example: true
Target OS platform for deployment (Windows, Mac, or Linux). Example: Windows
Includes rollup updates that bundle multiple patches into one package (Windows only). Example: true
Interval in days for sending failure notifications. Example: 1
Enable or disable success report notifications. Example: false
Whether to attach success reports in notification emails. Example: true
List of OS applications to include or exclude during patching. Example: Windows Defender x64
Recipient email address for receiving notifications and reports. Example: xx@yy.com
Includes cumulative sets of fixes and enhancements, typically service packs (Windows only). Example: true
File format of success report attachment. Example: pdf
Task expiry date and time after which deployment becomes invalid (MM/DD/YYYY, HH:MM). Example: 08/29/2018, 00:00
Includes optional updates such as non-critical enhancements. At least one applicable update type must be selected for the chosen platform. Example: true
Delay deployment by specified time after patch release (in hours/days). Example: 5
Includes definition updates like antivirus or Windows Defender signatures (Windows only). Example: true
Target type for deployment (DOMAIN, REMOTE_OFFICE, CUSTOM_GROUP). Example: REMOTE_OFFICE
Includes non-security updates that fix functional or performance issues (applicable for Windows and Mac only). Example: true
Includes security updates that fix vulnerabilities (applicable for Windows, Mac, Linux). Example: true
Interval in days for sending success report notifications. Example: 3
Includes feature packs that add new capabilities (Windows only). Example: true
List of targets (e.g., remote office, custom group, or domain) for deployment. Example: Local Office
Defines how third-party applications should be patched (All, Specific, or All Except). Example: Patch Specific Applications
Delay deployment by specified time after patch approval (in hours/days). Example: 5
Name of the deployment template to use (mandatory field). Example: Force reboot excluding servers
Deadline configuration details for patch deployment
Specify after how many days the unpatched system should be force deployed
2->Force Reboot outside the deployment/reboot window, 1-Force reboot within the deployment/reboot window, 0->Disable force reboot
true-To enable deadline settings, false-To disable deadline settings.
List of third-party applications to include or exclude during patching. Example: Notepad++
Enable or disable failure notifications for deployment. Example: false
Name of the patch task (mandatory field). Example: windows create task
Success
Retrieves the list of all systems along with their patch scan status
https://{serverurl}/api/1.4/patch/scandetails
PatchManagerPlusCloud.PatchMgmt.READ
Authorization: d92d4xxxxxxxxxxxxx15f52
Get branch office list from api/1.4/desktop/serverproperties
0: Unknown — patch status is not available, 1: Healthy — system is up-to-date, 2: Vulnerable — system has missing patches, 3: Highly Vulnerable — system has critical or high-risk missing patches
Get Custom Group list from api/1.4/desktop/serverproperties
21: Not Installed (agent is not installed), 22: Installed (agent is installed)
Filter for system with a resource id
Get domain list from api/1.4/desktop/serverproperties
1: Agent Live (agent is running), 2: Agent Down (agent is not responding)
Windows/Mac/Linux
226-Failed, 227-In Progress, 228-Success, 229-Not Scanned
0-Unknown, 1-Healthy, 2-Vulnerable, 3-Highly Vulnerable
1-Windows, 2-Mac
21-Agent Not Installed, 22-Agent Installed
1-Live, 2-Down
Success
Fetches detailed data and column metadata for a specific query report
https://{serverurl}/dcapi/reports/queryReports/{dc_longvalue_pathparam}/data
PatchManagerPlusCloud.QueryReport.READ
Authorization: d92d4xxxxxxxxxxxxx15f52
application/queryResult.v1+json
Get report id from /dcapi/reports/queryReports
Starting index position to fetch response
Limits the number of rows per api response
List of resource group records returned in the report
Timestamp (in epoch format) of when the record was added to the database
Name of the resource group
Numeric identifier representing the type of resource
Domain/NetBIOS name associated with the resource group
Name of the query report executed
Metadata about the columns included in the report, including data type and column name
Numeric code representing the column’s SQL data type
Name of the column returned in the report
Success
Retrieves current patch approval settings (automatic or manual)
https://{serverurl}/api/1.4/patch/approvalsettings
PatchManagerPlusCloud.PatchMgmt.READ
Authorization: d92d4xxxxxxxxxxxxx15f52
Success
Removes the specified computers from Patch Manager Plus. The computers will no longer be managed by Patch Manager Plus
https://{serverurl}/api/1.4/som/computers/removecomputer
PatchManagerPlusCloud.SOM.UPDATE
Authorization: d92d4xxxxxxxxxxxxx15f52
Computer Resource IDs in Patch Manager Plus
Name of the module
Response message containing computer's operation status
Indicates the status of the task initiated
Version of the Api
Status of the request
Request processed successfully
Retrieves the list of all patches supported and manageable by Patch Manager Plus
https://{serverurl}/api/1.4/patch/supportedpatches
PatchManagerPlusCloud.PatchMgmt.READ
Authorization: d92d4xxxxxxxxxxxxx15f52
Filter for patch with a particular id
Filter for patches with particular bulletin id
211: Approved — patch has been approved for deployment, 0: Not Approved — patch approval is pending, 212: Declined — patch has been declined
Current page number for pagination.
Number of records per page.
0: Unrated — no severity assigned, 1: Low — minimal impact, 2: Moderate — average impact, 3: Important — significant impact, 4: Critical — high impact or security risk
Windows/Mac/Linux
0-Unrated, 1-Low, 2-Moderate, 3-Important
0-Not Required, 1-Reboot Required
211-Approved, 212-Declined
Success
Suspending a APD task.
https://{serverurl}/api/1.4/patch/suspendAPDTask
PatchManagerPlusCloud.PatchMgmt.UPDATE
Authorization: d92d4xxxxxxxxxxxxx15f52
Provide name of the apd task
Success
Resuming a APD task.
https://{serverurl}/api/1.4/patch/resumeAPDTask
PatchManagerPlusCloud.PatchMgmt.UPDATE
Authorization: d92d4xxxxxxxxxxxxx15f52
Provide name of the apd task
Success
Declines one or more patches for the specified custom group(s) and customers, with each patch requiring a reasonId and remarks. The API does not support the Linux platform; therefore, Linux patches were automatically excluded.
https://{serverurl}/dcapi/patch/settings/declinePatch/declinePatches
PatchManagerPlusCloud.PatchMgmt.UPDATE
Authorization: d92d4xxxxxxxxxxxxx15f52
List of patch objects to decline. Each object contains patch ID, reason ID and remarks.
Reason ID for declining. Must be one of: 1=Vendor-reported patch issue, 2=Accepted Risk - Not Applicable to Environment, 3=Accepted Risk - Known Application Conflict, 4=Accepted Risk - Managed by Alternative Method, 5=Other (Specify Below).
Patch ID to decline (numeric value).
Platform identifier for the patch. Optional.
Free-text justification for declining this patch. When reasonId is 5, provide a meaningful description.
List of custom group resource IDs to decline patches for. Cannot be empty.
Localized success message
Operation result: 'success' when patches are declined successfully
Detailed message describing the specific validation failure
Validation error code: INSUFFICIENT_DATA=missing required fields, INVALID_DATA=invalid format or business rule violation (e.g., All Computers mixed with other groups, non-numeric id/reasonId)
Authentication failure reason
Unauthorized error code: credentials missing, expired, or invalid
Message indicating the user is not authorized to decline patches for the selected groups
Authorization error code: UAC_UNAUTHORIZED when user lacks access to selected custom groups
Error message describing the internal failure
Internal error code: unexpected server error during decline operation
© 2025, Zoho Corporation Pvt. Ltd. All Rights Reserved.
post /api/1.4/patch/installpatch
curl --request POST \
--url https://{serverurl}/api/1.4/patch/installpatch \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' \
--header 'content-type: application/json' \
--data '{"retrySettings":{"logonStartupMinRetry":1,"noOfRetries":2,"refreshMinRetry":1,"enableRetrySettings":true},"deploymentType":2,"deadlineTime":1691393760,"isOnlyApproved":"true","ConfigName":"API install patch test1","ResourceIDs":[601],"actionToPerform":"Deploy","ConfigDescription":"API test","forceRebootOption":2,"DeploymentPolicyTemplateID":1}' {
"retrySettings": {
"logonStartupMinRetry": 1,
"noOfRetries": 2,
"refreshMinRetry": 1,
"enableRetrySettings": true
},
"deploymentType": 2,
"deadlineTime": 1691393760,
"isOnlyApproved": "true",
"ConfigName": "API install patch test1",
"ResourceIDs": [
601
],
"actionToPerform": "Deploy",
"ConfigDescription": "API test",
"forceRebootOption": 2,
"DeploymentPolicyTemplateID": 1
}
{
"message_type": "installpatch",
"message_response": {
"installpatch": {}
},
"message_version": "1.4",
"status": "success"
}
post /api/1.4/patch/installpatch
curl --request POST \
--url https://{serverurl}/api/1.4/patch/installpatch \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' \
--header 'content-type: application/json' \
--data '{"PatchIDs":[103980],"retrySettings":{"logonStartupMinRetry":1,"noOfRetries":2,"refreshMinRetry":1,"enableRetrySettings":true},"deploymentType":2,"deadlineTime":1691393760,"ConfigName":"API install patch test1","ResourceIDs":[601],"actionToPerform":"Deploy","ConfigDescription":"API test","forceRebootOption":2,"DeploymentPolicyTemplateID":1}' {
"PatchIDs": [
103980
],
"retrySettings": {
"logonStartupMinRetry": 1,
"noOfRetries": 2,
"refreshMinRetry": 1,
"enableRetrySettings": true
},
"deploymentType": 2,
"deadlineTime": 1691393760,
"ConfigName": "API install patch test1",
"ResourceIDs": [
601
],
"actionToPerform": "Deploy",
"ConfigDescription": "API test",
"forceRebootOption": 2,
"DeploymentPolicyTemplateID": 1
}
{
"message_type": "installpatch",
"message_response": {
"installpatch": {}
},
"message_version": "1.4",
"status": "success"
}
post /api/1.4/patch/declinepatch
curl --request POST \
--url 'https://{serverurl}/api/1.4/patch/declinepatch?customerid=SOME_STRING_VALUE' \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' \
--header 'content-type: application/json' \
--data '{"patchids":[112,113]}' {
"patchids": [
112,
113
]
}
{
"message_type": "declinepatch",
"message_response": {
"declinepatch": {
"status": "Initiated Successfully"
}
},
"message_version": "1.4",
"status": "success"
}
post /api/1.4/patch/installpatch
curl --request POST \
--url https://{serverurl}/api/1.4/patch/installpatch \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' \
--header 'content-type: application/json' \
--data '{"PatchIDs":[103980],"retrySettings":{"logonStartupMinRetry":1,"noOfRetries":2,"refreshMinRetry":1,"enableRetrySettings":true},"deploymentType":2,"deadlineTime":1691393760,"ConfigName":"API install patch test1","actionToPerform":"Deploy","ConfigDescription":"API test","forceRebootOption":2,"DeploymentPolicyTemplateID":1}' {
"PatchIDs": [
103980
],
"retrySettings": {
"logonStartupMinRetry": 1,
"noOfRetries": 2,
"refreshMinRetry": 1,
"enableRetrySettings": true
},
"deploymentType": 2,
"deadlineTime": 1691393760,
"ConfigName": "API install patch test1",
"actionToPerform": "Deploy",
"ConfigDescription": "API test",
"forceRebootOption": 2,
"DeploymentPolicyTemplateID": 1
}
{
"message_type": "installpatch",
"message_response": {
"installpatch": {}
},
"message_version": "1.4",
"status": "success"
}
get /api/1.4/patch/allpatchdetails
curl --request GET \
--url 'https://{serverurl}/api/1.4/patch/allpatchdetails?branchofficefilter=SOME_STRING_VALUE&bulletinid=SOME_STRING_VALUE&patchid=SOME_STRING_VALUE&patchstatusfilter=SOME_INTEGER_VALUE&customgroupfilter=SOME_STRING_VALUE&severityfilter=SOME_INTEGER_VALUE&domainfilter=SOME_STRING_VALUE&platformfilter=SOME_STRING_VALUE' \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' {
"response_code": 200,
"message_type": "allpatchdetails",
"message_response": {
"total": 5,
"allpatchdetails": [
{
"branch_office_name": "Local Office",
"patch_updated_time": 1552563514708,
"resource.name": "patch-abc-12-1",
"installstatusdefn.label": "--",
"sqnumber": "4057116",
"os_language": 1,
"install_error_code": "--",
"bulletin_id": "MS18-JAN9",
"update_name": "Security Updates",
"deploy_remarks": "--",
"patch_released_time": 1515715200000,
"patch_size": 0,
"patch_uninstall_status": 0,
"resource.domain_netbios_name": "DCPATCH",
"service_pack": "Windows Server 2012 R2 Gold (x64)",
"approvestatusdefn.image_name": "/images/approved_icon.gif",
"affectedpatchstatusdefn.image_name": "/images/success.gif",
"patch_type": 0,
"resource.resource_id": 50924,
"first_name": "DC-SYSTEM-USER",
"pmseverity.name": "Important",
"patch_status": 211,
"severity": 3,
"patch_id": 23956,
"patch_name": "SQLPreReqHandler_KB4057116_x64.exe",
"collection.collection_name": "--",
"patch_description": "Security update for SQL Server 2012 Service Pack 4 x64 (KB4057116)",
"approvestatusdefn.label": "dc.common.APPROVED",
"oslanguage.i18n": "dc.patch.patchinfo.English",
"deployment_status": "--",
"vendor_name": "Microsoft",
"superceded_by": "NA",
"severity_name": "dc.common.IMPORTANT",
"resourcemacip.resource_id": 50924,
"ip_address": "172.24.143.191",
"deployer.first_name": "--",
"installstatusdefn.image_name": "--",
"patch_supported_time": 1518615106000,
"affectedpatchstatusdefn.label": "dc.common.INSTALLED",
"agent_version": "10.0.267.W",
"user_id": 2,
"resource_id": 50924,
"os_name": "Windows Server 2012 R2 Standard Edition (x64)",
"deploy_remarks_args": "--",
"installed_time": "--"
}
],
"limit": 25,
"page": 1
},
"message_version": "1.0",
"status": "success"
}
curl --request GET \
--url 'https://{serverurl}/api/1.4/som/computers?branchofficefilter=SOME_STRING_VALUE&pagelimit=SOME_STRING_VALUE&fqdnfilter=SOME_STRING_VALUE&computernamefilter=SOME_STRING_VALUE&domainfilter=SOME_STRING_VALUE&platformfilter=SOME_STRING_VALUE&residfilter=SOME_STRING_VALUE&installstatusfilter=SOME_STRING_VALUE&liveStatusfilter=SOME_INTEGER_VALUE&searchcomputerfilter=SOME_STRING_VALUE&servicetagfilter=SOME_STRING_VALUE&page=SOME_STRING_VALUE&agentcontactfilter=SOME_STRING_VALUE' \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' {
"message_type": "computers",
"message_response": {
"total": 3,
"limit": 25,
"page": 1,
"computers": [
{
"modernappdetails.remarks": "--",
"remarks_args": "--",
"agent_installed_on": 1756446785862,
"agent_executed_on": 1756446785862,
"processorarchtype.processor_arch_name": "x64-based PC",
"os_platform_name": "Windows",
"resource_id_string": "311",
"service_pack": "Windows 11 Version 24H2 (x64)",
"computer.processor_arch_type_id": 3,
"computer.processor_architecture": 2,
"os_platform": 1,
"managedcomputer.previous_installation_status": -1,
"agent_logged_on_users": "Alex",
"resourcemacip.dhcp_server_ip_address": "10.92.2.20",
"osflavor_id": 0,
"search_tag": "--",
"status_label": "dc.db.som.status.installed_successfully",
"error_kb_url": "--",
"full_name": "Alex",
"owner_email_id": "--",
"managedcomputertoerrcode.operation_type": 0,
"agent_upgraded_on": -1,
"installation_status": 22,
"error_code": 0,
"managedcomputer.agent_status": 0,
"modernappdetails.enrollment_type": "--",
"computer_status_update_time": 1756447132008,
"managed_status": 61,
"branch_office_name": "Local Office",
"managedcomputer.re_installation_status": -1,
"agent_last_contact_time": 1756463358000,
"description": "--",
"domain_netbios_name": "ZOHOCORP",
"fqdn_name": "ALEX.ZOHOCORP.COM",
"managedcomputer.agent_version_num": 114252201,
"mac_address": "a0:ce:c8:b9:ae:15",
"owner": "--",
"modernappdetails.last_contact_time": 0,
"managedcomputer.friendly_name": "a0:ce:c8:b9:ae:15 ZOHOCORP 10.92.11.44",
"resourcemacip.gateway_ip_address": "10.92.8.1",
"resourcemacip.subnet_mask": "255.255.252.0",
"os_version": "10.0.26100",
"last_sync_time": 1756463913344,
"modernappdetails.installed_at": 0,
"ip_address": "10.92.11.44",
"agent_uninstalled_on": -1,
"agent_version": "11.4.2522.01.W",
"resourcemacip.subnet_ip_address": "10.92.8.0",
"agent_last_bootup_time": 1756275716000,
"resource_id": 311,
"os_name": "Windows 11 Professional Edition (x64)",
"location": "--",
"managedcomputer.friendly_name_type": 0,
"computer_live_status": 1,
"customer_name": "DC_CUSTOMER",
"modernappdetails.status": "--",
"resource_name": "Alex",
"customer_id": 1,
"remarks": "dc.db.agent.install.success"
}
]
},
"message_version": "1.4",
"status": "success"
}
post /api/1.4/patch/computers/scan
curl --request POST \
--url https://{serverurl}/api/1.4/patch/computers/scan \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' \
--header 'content-type: application/json' \
--data '{"resourceids":[112,113]}' {
"resourceids": [
112,
113
]
}
{
"message_type": "computers",
"message_response": {
"computers": {
"status": "Scan initiated successfully"
}
},
"message_version": "1.4",
"status": "success"
}
get /api/1.4/patch/healthpolicy
curl --request GET \
--url https://{serverurl}/api/1.4/patch/healthpolicy \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' {
"response_code": 200,
"message_type": "healthpolicy",
"message_response": {
"healthpolicy": {
"vulnerable": {
"important": 49,
"critical": 0,
"low": 99,
"moderate": 74
},
"highly_vulnerable": {
"important": 50,
"critical": 1,
"low": 100,
"moderate": 75
},
"advanced_settings": {
"exclude_tp_apps": false,
"consider_only_approved": false
}
}
},
"message_version": "1.0",
"status": "success"
}
curl --request GET \
--url 'https://{serverurl}/api/1.4/patch/allpatches?branchofficefilter=SOME_STRING_VALUE&patchid=SOME_STRING_VALUE&bulletinid=SOME_STRING_VALUE&patchstatusfilter=SOME_INTEGER_VALUE&approvalstatusfilter=SOME_INTEGER_VALUE&customgroupfilter=SOME_STRING_VALUE&severityfilter=SOME_INTEGER_VALUE&domainfilter=SOME_STRING_VALUE&platformfilter=SOME_STRING_VALUE' \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' {
"response_code": 200,
"message_type": "allpatches",
"message_response": {
"total": 4094,
"allpatches": [
{
"ro_failure_count": "--",
"updated_time": 1552980907650,
"installed": 2,
"sqnumber": "3.41.2",
"ro_yettodownload_count": "--",
"bulletin_id": "TU-058",
"patch_noreboot": 1,
"update_name": "Third Party Updates",
"patch_released_time": 1552971857000,
"patch_size": 7917152,
"image_name": "/images/approved_icon.gif",
"status_id": 211,
"patch_uninstall_status": 1,
"platform_name": "Windows",
"missing": 1,
"download_status": 221,
"first_name": "DC-SYSTEM-USER",
"severity": 1,
"patch_id": 309232,
"patch_name": "FileZilla_3.41.2_win32-setup.exe",
"patch_description": "FileZilla Client (3.41.2)",
"vendor_name": "Tim Kosse",
"superceded_by": "NA",
"severity_name": "dc.common.LOW",
"label": "dc.common.APPROVED",
"failed": 0,
"patch_supported_time": 1552971857000,
"ro_success_count": "--"
}
],
"limit": 25,
"page": 1
},
"message_version": "1.0",
"status": "success"
}
post /api/1.4/patch/computers/scanall
curl --request POST \
--url https://{serverurl}/api/1.4/patch/computers/scanall \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' {
"message_type": "computers",
"message_response": {
"computers": {
"status": "Scan initiated successfully"
}
},
"message_version": "1.4",
"status": "success"
}
get /api/1.4/desktop/serverproperties
curl --request GET \
--url https://{serverurl}/api/1.4/desktop/serverproperties \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' {
"message_response": {
"serverproperties": {
"branch_offices": [
"Direct Comm",
"Intern Ds Remote",
"Local Office"
],
"domains": [
"ZOHOCORP",
"DESKTOPCENTRAL",
"WORKGROUP",
"macosgroup"
],
"custom_groups": [
"All Computers Group",
"All Users Group",
"Default_iOS_Corporate",
"Default_iOS_Personal",
"Default_Android_Corporate",
"Default_Android_Personal",
"Default_Windows_Corporate",
"Default_Windows_Personal",
"Inactive_Users_ZOHOCORP",
"Inactive_Computers_ZOHOCORP",
"test",
"sathish"
]
}
},
"message_type": "discover",
"message_version": "1.0",
"status": "success"
}
post /api/1.4/patch/modifyAPDTask
curl --request POST \
--url https://{serverurl}/api/1.4/patch/modifyAPDTask \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' \
--header 'content-type: application/json' \
--data '{"settings":{"target_list":"Local Office","templateName":"Deploy any time at the earliest","target_type":"REMOTE_OFFICE"},"taskname":"windows create task"}' {
"settings": {
"target_list": "Local Office",
"templateName": "Deploy any time at the earliest",
"target_type": "REMOTE_OFFICE"
},
"taskname": "windows create task"
}
{
"message_type": "modifyAPDTask",
"message_response": {
"modifyapdtask": {
"status": "task1 task modified successfully"
}
},
"message_version": "1.4",
"status": "success"
}
curl --request GET \
--url 'https://{serverurl}/api/1.4/som/remoteoffice?page=SOME_STRING_VALUE&pagelimit=SOME_STRING_VALUE' \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' {
"message_type": "remoteoffice",
"message_response": {
"total": 3,
"limit": 25,
"page": 1,
"remoteoffice": [
{
"updated_time": 1756445282837,
"ds_status": 29,
"is_https": true,
"branch_office_name": "DS RemoteOffice",
"agent_arc_loc": "",
"compression_type": 1,
"replicationpolicydetails.policy_name": "Policy_1",
"branch_office_id": 301,
"proxy_details_branch_office_id": 301,
"resource_id_string": "309",
"policytobranchofficerel.policy_id": 1,
"agent_comm_branch_office_id": 301,
"ds_dns_name": "ds.mycomp.com",
"branch_office_desc": "--",
"ds_version": "11.4.2522.01",
"policytobranchofficerel.branch_office_id": 301,
"proxy_port_number": 80,
"last_contact_time": -1,
"is_proxy": true,
"colorquality_type": 16,
"ds_https_port": "8384",
"proxy_username": "Alex",
"adgroupremoteofficemapping.branch_office_id": 301,
"has_masteragent": true,
"managed_computers": 1,
"replicationpolicydetails.policy_id": 1,
"error_code_kb_url": "--",
"ds_sync_status": 1,
"error_kb_url": "$(dcUrl)/agent_installation_logon_failure.html?",
"ds_ipaddress": "10.92.8.98",
"branch_office_customer_id": 1,
"proxy_server_name": "Proxy - Server",
"resource_id": 309,
"disserverdetails.branch_office_id": 301,
"error_code": 60006,
"customer_name": "DC_CUSTOMER",
"customer_id": 1,
"resource_name": "Alex",
"remarks": "[i18n]dc.som.agentinstall.remarks.unknown_credential[/i18n]"
}
]
},
"message_version": "1.4",
"status": "success"
}
post /api/1.4/patch/uninstallpatch
curl --request POST \
--url https://{serverurl}/api/1.4/patch/uninstallpatch \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' \
--header 'content-type: application/json' \
--data '{"PatchIDs":[27170],"ConfigName":"API install patch test1","actionToPerform":"Deploy","ConfigDescription":"API test","DeploymentPolicyTemplateID":"1"}' {
"PatchIDs": [
27170
],
"ConfigName": "API install patch test1",
"actionToPerform": "Deploy",
"ConfigDescription": "API test",
"DeploymentPolicyTemplateID": "1"
}
{
"message_type": "uninstallpatch",
"message_response": {
"uninstallpatch": {}
},
"message_version": "1.4",
"status": "success"
}
get /api/1.4/patch/deploymentpolicies
curl --request GET \
--url https://{serverurl}/api/1.4/patch/deploymentpolicies \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' {
"response_code": 200,
"message_type": "deploymentpolicies",
"message_response": {
"total": 44,
"deploymentpolicies": [
{
"creation_time": 1552544237529,
"usertodefaultdeploytemplaterel.dc_user_id": "--",
"usertodeploytemplaterel.template_id": 8103,
"usertodeploytemplaterel.modified_by": 1,
"template_name": "My Policy 939",
"is_template_alive": true,
"usertodefaultdeploytemplaterel.template_id": "--",
"modified_time": 1552544237529,
"set_as_default": false,
"user_id": 1,
"template_id": 8103,
"modifieduser.user_id": 1,
"customer_id": 1,
"modifieduser.first_name": "admin",
"first_name": "admin",
"dc_user_id": 1
}
],
"limit": 25,
"page": 1
},
"message_version": "1.0",
"status": "success"
}
get /api/1.4/patch/downloadedpatches
curl --request GET \
--url https://{serverurl}/api/1.4/patch/downloadedpatches \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' {
"message_type": "downloadedpatches",
"message_response": {
"total": 2,
"limit": 25,
"page": 1,
"downloadedpatches": [
{
"patch_download_status_label": "dc.common.SUCCESS",
"download_time": 1757340476320,
"patch.patchid": 1419469,
"patch_lang": 0,
"patch_language": 0,
"patch_updated": 1757055628000,
"download_remarks_args": "--",
"os_language": 0,
"bulletin_id": "BI-001",
"platform": 1,
"patch_download_status_image": "images/download_success.png",
"patch_released_time": 1755541800000,
"patch_size": 28887288,
"download_status": 221,
"platform_name": "Windows",
"patch_type": 12,
"patch_status": "--",
"how_to_url": "--",
"patch_id": 1419469,
"patch_name": "sp162871.exe",
"patch_description": "HP Firmware update - 8D8A System (01.02.04)",
"oslanguage.i18n": "Multilingual",
"superceded_by": "NA",
"patch_supported_time": 1757054914810,
"patchdetails.patchid": 1419469,
"error_kb_url": "--",
"patch_location_id": 3632425,
"download_remarks": "desktopcentral.server.patchmgmt.patch_download_success",
"pmpatchlocation.patchid": 1419469
},
{
"patch_download_status_label": "dc.common.SUCCESS",
"download_time": 1757340472509,
"patch.patchid": 1419470,
"patch_lang": 0,
"patch_language": 0,
"patch_updated": 1757055628000,
"download_remarks_args": "--",
"os_language": 0,
"bulletin_id": "BI-001",
"platform": 1,
"patch_download_status_image": "images/download_success.png",
"patch_released_time": 1755455400000,
"patch_size": 33507056,
"download_status": 221,
"platform_name": "Windows",
"patch_type": 12,
"patch_status": "--",
"how_to_url": "--",
"patch_id": 1419470,
"patch_name": "sp162858.exe",
"patch_description": "HP Firmware update - 8D94 System (01.02.04)",
"oslanguage.i18n": "Multilingual",
"superceded_by": "NA",
"patch_supported_time": 1757054915059,
"patchdetails.patchid": 1419470,
"error_kb_url": "--",
"patch_location_id": 3632426,
"download_remarks": "desktopcentral.server.patchmgmt.patch_download_success",
"pmpatchlocation.patchid": 1419470
}
]
},
"message_version": "1.4",
"status": "success"
}
curl --request GET \
--url 'https://{serverurl}/api/1.4/patch/summary?page=SOME_INTEGER_VALUE&pagelimit=SOME_STRING_VALUE' \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' {
"response_code": 200,
"message_type": "summary",
"message_response": {
"summary": {
"patch_summary": {
"installed_patches": 2307,
"applicable_patches": 3921,
"new_patches": 369,
"patch_summary_report_generation_time": 0,
"missing_patches": 1614
},
"missing_patch_severity_summary": {
"moderate_count": 68,
"unrated_count": 589,
"total_count": 1614,
"critical_count": 293,
"important_count": 568,
"low_count": 96
},
"apd_summary": {
"last_task_scheduled_time": null,
"next_task_scheduled_time": null,
"number_of_apd_tasks": 33,
"last_executed_task": null,
"next_task": null
},
"system_summary": {
"total_systems": 97,
"moderately_vulnerable_systems": 0,
"healthy_systems": 35,
"system_summary_report_generation_time": 0,
"highly_vulnerable_systems": 61,
"health_unknown_systems": 1
},
"patch_scan_summary": {
"scan_summary_report_generation_time": 0,
"unscanned_system_count": 2,
"scanned_systems": 95,
"scan_success_count": 37,
"scan_failure_count": 58
},
"vulnerability_db_summary": {
"last_db_update_status": "Success",
"next_db_update_scheduled_time": 1553058600000,
"is_auto_db_update_disabled": false,
"db_update_in_progress": "false",
"last_db_update_time": 0
}
}
},
"message_version": "1.0",
"status": "success"
}
post /api/1.4/patch/approvepatch
curl --request POST \
--url https://{serverurl}/api/1.4/patch/approvepatch \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' \
--header 'content-type: application/json' \
--data '{"patchids":[112,113]}' {
"patchids": [
112,
113
]
}
{
"message_type": "approvepatch",
"message_response": {
"approvepatch": {
"status": "Initiated Successfully"
}
},
"message_version": "1.4",
"status": "success"
}
post /api/1.4/som/computers/uninstallagent
curl --request POST \
--url https://{serverurl}/api/1.4/som/computers/uninstallagent \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' \
--header 'content-type: application/json' \
--data '{"resourceids":[301]}' {
"resourceids": [
301
]
}
{
"message_type": "computers",
"message_response": {
"computers": {
"Status": "UnInstallation initiated successfully"
}
},
"message_version": "1.4",
"status": "success"
}
post /api/1.4/patch/unapprovepatch
curl --request POST \
--url https://{serverurl}/api/1.4/patch/unapprovepatch \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' \
--header 'content-type: application/json' \
--data '{"patchids":[112,113]}' {
"patchids": [
112,
113
]
}
{
"message_type": "unapprovepatch",
"message_response": {
"unapprovepatch": {
"status": "Initiated Successfully"
}
},
"message_version": "1.4",
"status": "success"
}
curl --request GET \
--url https://{serverurl}/api/1.4/som/summary \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' {
"message_type": "summary",
"message_response": {
"summary": {
"last_contact_time_summary": {
"equal_3_day": 2,
"8_day_to_15_day": 0,
"16_day_to_30_day": 0,
"greater_30_day": 0,
"4_day_to_7_day": 1
},
"installation_status_summary": {
"uninstallation_failed": 1,
"installed": 1,
"total": 3,
"installation_failed": 0,
"yet_to_install": 1,
"uninstalled": 0
},
"live_status_summary": {
"down": 0,
"live": 3,
"unknown": 0
}
}
},
"message_version": "1.4",
"status": "success"
}
post /api/1.4/patch/deleteAPDTask
curl --request POST \
--url 'https://{serverurl}/api/1.4/patch/deleteAPDTask?taskname=SOME_STRING_VALUE' \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' {
"message_type": "deleteAPDTask",
"message_response": {
"deleteapdtask": {
"status": "Task has been deleted successfully"
}
},
"message_version": "1.4",
"status": "success"
}
curl --request GET \
--url 'https://{serverurl}/api/1.4/patch/allsystems?branchofficefilter=SOME_STRING_VALUE&healthfilter=SOME_INTEGER_VALUE&customgroupfilter=SOME_STRING_VALUE&resid=SOME_STRING_VALUE&domainfilter=SOME_STRING_VALUE&platformfilter=SOME_STRING_VALUE' \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' {
"response_code": 200,
"message_type": "allsystems",
"message_response": {
"allsystems": [
{
"resource_health_status": 3,
"os_language": 1,
"branchmemberresourcerel.resource_id": 301,
"branch_office_id": 1,
"last_patched_time": 1553069752000,
"os_platform_name": "Windows",
"pmreshealthstatus.resource_id": 301,
"installed_tp_patches": 9,
"installed_ms_patches": 12,
"important_patch_count": 2,
"service_pack": "Windows 10 Version 1809 (x64)",
"resourcetorebootdetails.resource_id": "--",
"pmresourcepatchcount.resource_id": 301,
"resourcetorebootdetails.reboot_req_status": "--",
"os_language_abbr": "en",
"resourcedeploymentstatus.resource_id": 301,
"scan_remarks": "dc.patch.util.Scanning_completedsuccessfully",
"os_platform": 1,
"agent_logged_on_users": "XXXX-1234",
"total_ms_patches": 14,
"osflavor_id": 0,
"search_tag": "--",
"status_label": "dc.db.config.status.failed",
"owner_email_id": "--",
"missing_ms_patches": 2,
"last_action_initiated_on": "--",
"missing_tp_patches": 3,
"low_patch_count": 0,
"patchmgmtosinfo.resource_id": 301,
"last_successful_scan": 1553073465582,
"computer_status_update_time": 1553063563662,
"branch_office_name": "Local Office",
"agent_last_contact_time": 1553069591000,
"total_tp_patches": 12,
"description": "--",
"critical_patch_count": 2,
"domain_netbios_name": "ZOHOCORP",
"mac_address": "1a:aa:1a:1a:11:1a",
"resource.resource_id": 301,
"shutdown_status_update_time": "--",
"moderate_patch_count": 1,
"owner": "--",
"scan_status": 228,
"timezone_offset": "330",
"oslanguage.languageid": 1,
"last_sync_time": 1553074057839,
"deployment_status": 206,
"oslanguage.i18n": "dc.patch.patchinfo.English",
"ip_address": "XXX.XXX.XXX.XXX",
"shutdown_status": "--",
"agent_last_bootup_time": 1552885231000,
"resource_id": 301,
"os_name": "Windows 10 Professional Edition (x64)",
"location": "--",
"computer_live_status": 1,
"resource_name": "XXXX-YYYY",
"last_scan_time": 1553073465582,
"remarks": "--",
"last_operation": "--",
"status_image": "/images/failureicon.gif"
}
],
"total": 2,
"limit": 25,
"page": 1
},
"message_version": "1.0",
"status": "success"
}
get /dcapi/threats/systemreport/patches
curl --request GET \
--url 'https://{serverurl}/dcapi/threats/systemreport/patches?severity=SOME_STRING_VALUE&patchname=SOME_STRING_VALUE&update_type=SOME_STRING_VALUE&patch_id=SOME_STRING_VALUE&patch_description=SOME_STRING_VALUE&vendor_name=SOME_STRING_VALUE&install_error_code=SOME_STRING_VALUE&fqdn_name=SOME_STRING_VALUE&patch_released_time=SOME_STRING_VALUE&pageLimit=SOME_STRING_VALUE&reboot_required=SOME_STRING_VALUE&platform_name=SOME_STRING_VALUE&cveids=SOME_STRING_VALUE&resource_id=SOME_STRING_VALUE&page=SOME_STRING_VALUE&installed_time=SOME_STRING_VALUE&patch_status=SOME_STRING_VALUE&patch_approval_status=SOME_STRING_VALUE' \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' {
"metadata": {
"pageLimit": 30,
"totalRecords": "1",
"totalPages": 1,
"links": {
"next": null,
"prev": null
},
"page": 1
},
"response_code": 200,
"message_type": "systemreport",
"message_response": {
"systemreport": [
{
"patches": [
{
"severity": "Important",
"patchname": "vcredist_x86_sp1.exe",
"update_type": "Security Updates",
"patch_id": "12621",
"patch_description": "Microsoft Visual C++ 2010 Service Pack 1 Redistributable Package MFC Security Update",
"vendor_name": "Microsoft",
"install_error_code": "--",
"fqdn_name": "WINV1RI92CIEGA.CSEZ.ZOHOCORPIN.COM",
"patch_released_time": "1307989800000",
"bulletinid": "MS11-025",
"reboot_required": "may require",
"platform_name": "Windows",
"installed_time": "--",
"deployment_remarks": "--",
"patch_status": "Installed",
"patch_approval_status": "approved"
},
{
"severity": "Important",
"patchname": "vcredist_x64_sp1.exe",
"update_type": "Security Updates",
"patch_id": "12622",
"patch_description": "Microsoft Visual C++ 2010 Service Pack 1 Redistributable Package MFC Security Update",
"vendor_name": "Microsoft",
"install_error_code": "--",
"fqdn_name": "XXXXXX.ZZZZ.YYYY.COM",
"patch_released_time": "1307989800000",
"bulletinid": "MS11-025",
"reboot_required": "may require",
"platform_name": "Windows",
"installed_time": "--",
"deployment_remarks": "--",
"patch_status": "Installed",
"patch_approval_status": "approved"
}
],
"resource_id": "304"
}
]
},
"status": "success"
}
curl --request GET \
--url 'https://{serverurl}/dcapi/threats/patches?severity=SOME_STRING_VALUE&patchname=SOME_STRING_VALUE&updated_time=SOME_STRING_VALUE&update_type=SOME_STRING_VALUE&patch_description=SOME_STRING_VALUE&kb_number=SOME_STRING_VALUE&vendor_name=SOME_STRING_VALUE&patch_released_time=SOME_STRING_VALUE&patch_supported_time=SOME_STRING_VALUE&patch_size=SOME_STRING_VALUE&pageLimit=SOME_STRING_VALUE&patchid=SOME_STRING_VALUE&patch_uninstall=SOME_STRING_VALUE&approveduser_first_name=SOME_STRING_VALUE&reboot_required=SOME_STRING_VALUE&platform_name=SOME_STRING_VALUE&download_status=SOME_STRING_VALUE&cveids=SOME_STRING_VALUE&page=SOME_STRING_VALUE&patch_status=SOME_STRING_VALUE' \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' {
"metadata": {
"pageLimit": 30,
"totalRecords": "2",
"totalPages": 1,
"links": {
"next": null,
"prev": null
},
"page": 1
},
"response_code": 200,
"message_type": "patches",
"message_response": {
"patches": [
{
"severity": "Important",
"patchname": "vcredist_x86_sp1.exe",
"updated_time": "1704363395117",
"update_type": "Security Updates",
"patch_description": "Microsoft Visual C++ 2010 Service Pack 1 Redistributable Package MFC Security Update",
"kb_number": "2565063",
"vendor_name": "Microsoft",
"installed_system_count": 1,
"supercededby": "NA",
"patch_released_time": "1307989800000",
"patch_supported_time": "1307989800000",
"patch_size": "8993744",
"patchid": "12621",
"patch_uninstall": "not supported",
"bulletinid": "MS11-025",
"approveduser_first_name": "DC-SYSTEM-USER",
"reboot_required": "may require",
"platform_name": "Windows",
"download_status": "--",
"missing_system_count": 0,
"failed_system_count": 0,
"patch_status": "approved"
},
{
"severity": "Important",
"patchname": "vcredist_x64_sp1.exe",
"updated_time": "1704363395117",
"update_type": "Security Updates",
"patch_description": "Microsoft Visual C++ 2010 Service Pack 1 Redistributable Package MFC Security Update",
"kb_number": "2565063",
"vendor_name": "Microsoft",
"installed_system_count": 1,
"supercededby": "NA",
"patch_released_time": "1307989800000",
"patch_supported_time": "1307989800000",
"patch_size": "10274136",
"patchid": "12622",
"patch_uninstall": "not supported",
"bulletinid": "MS11-025",
"approveduser_first_name": "DC-SYSTEM-USER",
"reboot_required": "may require",
"platform_name": "Windows",
"download_status": "--",
"missing_system_count": 0,
"failed_system_count": 0,
"patch_status": "approved"
}
]
},
"status": "success"
}
get /api/1.4/patch/dbupdatestatus
curl --request GET \
--url https://{serverurl}/api/1.4/patch/dbupdatestatus \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' {
"message_type": "dbupdatestatus",
"message_response": {
"dbupdatestatus": {
"last_db_update_status": "Success",
"next_db_update_scheduled_time": 1757397540000,
"is_auto_db_update_disabled": false,
"last_db_update_time": 1757311200000
}
},
"message_version": "1.4",
"status": "success"
}
get /dcapi/reports/queryReports
curl --request GET \
--url https://{serverurl}/dcapi/reports/queryReports \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' \
--header 'accept: application/allQueryReports.v1+json' {
"parent": null,
"children": [
{
"parent": "queryReports",
"children": null,
"root": false,
"id": "9504000000142241",
"label": "sample",
"leaf": true,
"properties": {
"owner": "mani",
"viewName": "SAMPLE",
"expandable": false,
"selectable": true,
"description": "Test Description",
"lastModified": "Sep 3, 2024 01:05 PM"
}
}
],
"root": true,
"id": "queryReports",
"label": "Query Reports",
"leaf": false,
"properties": {
"reportType": "3",
"expandable": true,
"selectable": true
}
}
get /api/1.4/patch/systemreport
curl --request GET \
--url 'https://{serverurl}/api/1.4/patch/systemreport?patchstatusfilter=SOME_INTEGER_VALUE&approvalstatusfilter=SOME_INTEGER_VALUE&resid=SOME_STRING_VALUE&severityfilter=SOME_INTEGER_VALUE&platformfilter=SOME_STRING_VALUE' \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' {
"response_code": 200,
"message_type": "systemreport",
"message_response": {
"total": 64,
"systemreport": [
{
"update_id": 0,
"installstatusdefn.label": "dc.common.INSTALLED",
"installpatchstatus.patch_id": 9110,
"install_error_code": -1,
"bulletin_id": "MS10-063",
"patch_noreboot": 0,
"update_name": "Security Updates",
"platform": 1,
"configstatusdefn.image_name": "/images/approved_icon.gif",
"deploy_remarks": "dc.db.agent.config.patchscan.success",
"patch_released_time": 1284402600000,
"customerpatchstatus.patch_id": 9110,
"patch_uninstall_status": 1,
"download_status": 221,
"platform_name": "Windows",
"affectedpatchstatusdefn.image_name": "/images/success.gif",
"patch_type": 0,
"pmseverity.name": "Critical",
"patch_status": 211,
"affected_patch_status": 201,
"severity": 4,
"patchstorestatusdefn.label": "dc.common.SUCCESS",
"configstatusdefn.label": "dc.common.APPROVED",
"patch_id": 9110,
"patch_name": "office2007-kb2288621-fullfile-x86-glb.exe",
"collection.collection_name": "MyTask682",
"patch_description": "Security Update for the 2007 Microsoft Office System (KB2288621)",
"vendor_name": "Microsoft",
"deployment_status": 209,
"superceded_by": "NA",
"severity_name": "dc.common.CRITICAL",
"installpatchstatus.resource_id": 301,
"deployer.first_name": "admin",
"patchstorestatusdefn.image_name": "/images/download_success.png",
"installstatusdefn.image_name": "/images/success.png",
"patch_supported_time": 1284402600000,
"affectedpatchstatusdefn.label": "dc.common.INSTALLED",
"resource_id": 301,
"customer_id": 1,
"deploy_remarks_args": "--",
"installed_time": 1544818523000
}
],
"limit": 25,
"page": 1
},
"message_version": "1.0",
"status": "success"
}
curl --request GET \
--url 'https://{serverurl}/api/1.4/patch/viewconfig?branchofficefilter=SOME_STRING_VALUE&configstatusfilter=SOME_STRING_VALUE&domainfilter=SOME_STRING_VALUE' \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' {
"response_code": 200,
"message_type": "viewconfig",
"message_response": {
"viewconfig": [
{
"statusimage": "images/status_executedfailed.gif",
"configurationparams.config_id": 151,
"collection.customer_id": 1,
"configdata.config_data_id": 38717,
"configstatusdefn.status_id": 15,
"configdata.config_type": 1,
"statuslabel": "dc.db.config.status.draft_download_failed",
"collectionstatussummary.yet_to_apply_count": 1,
"collection_id": 23708,
"os_platform_name": "Windows",
"collection.is_single_config": true,
"first_name": "admin",
"collection.platform_id": 1,
"os_platform_id": 1,
"collection.collection_name": "Peazip x64 - narun-win10",
"collectionstatussummary.retry_inprogress_count": 0,
"collection.show_in_view": true,
"cfgdatatocollection.config_data_id": 38717,
"collectionstatussummary.total_target_count": 1,
"collectionstatus.status": 15,
"collectionstatussummary.not_applicable_count": 0,
"deletedby": "--",
"collection.modified_time": 1552902864870,
"collection.is_deleted": false,
"collection.collection_id": 23708,
"cfgdatatocollection.collection_id": 23708,
"user_id": 1,
"configuration.config_id": 151,
"collectionstatussummary.failed_count": 0,
"collectionstatussummary.status_count_desc": "Total Targets ( 1 ), Yet to Apply ( 1 )",
"configurationparams.label": "dc.conf.conf_param.Install_Patches",
"configurationparams.small_image_name": "images/install_windows_patch_big.png",
"modifieduser.user_id": 1,
"collectionstatussummary.success_count": 0,
"modifieduser.first_name": "admin",
"collectionstatus.collection_id": 23708,
"deleted_time": "--",
"dc_user_id": "--"
}
],
"total": 284,
"limit": 25,
"page": 1
},
"message_version": "1.0",
"status": "success"
}
post /api/1.4/som/computers/installagent
curl --request POST \
--url https://{serverurl}/api/1.4/som/computers/installagent \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' \
--header 'content-type: application/json' \
--data '{"resourceids":[301]}' {
"resourceids": [
301
]
}
{
"message_type": "computers",
"message_response": {
"computers": {
"Status": "Installation initiated successfully"
}
},
"message_version": "1.4",
"status": "success"
}
post /api/1.4/patch/createAPDTask
curl --request POST \
--url https://{serverurl}/api/1.4/patch/createAPDTask \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' \
--header 'content-type: application/json' \
--data '{"settings":{"include_os_app_type":"Patch All Applications Except","NeedFailureAttachment":"true","attachmentFormatForFailure":"xls","description":"task for windows","thirdparty_update":"true","platform":"Windows","rollups":"true","failure_notify_duration":"1","report_notify_enable":"false","NeedReportAttachment":"true","os_applications":"Windows Defender x64","email":"xx@yy.com","servicepack_update":"true","attachmentFormatForReport":"pdf","EXPIRY_TIME":"08/29/2018, 00:00","optional_updates":"true","definition_update":"true","delay_deployment_by_approved_time/delay_deployment_by_released_time":"5","target_type":"REMOTE_OFFICE","non_security_update":"true","security_update":"true","report_notify_duration":"3","featurepack_update":"true","target_list":"Local Office","include_tp_app_type":"Patch Specific Applications","templateName":"Force reboot excluding servers","tp_applications":"Notepad++","failure_notify_enable":"false","taskName":"windows create task"}}' {
"settings": {
"include_os_app_type": "Patch All Applications Except",
"NeedFailureAttachment": "true",
"attachmentFormatForFailure": "xls",
"description": "task for windows",
"thirdparty_update": "true",
"platform": "Windows",
"rollups": "true",
"failure_notify_duration": "1",
"report_notify_enable": "false",
"NeedReportAttachment": "true",
"os_applications": "Windows Defender x64",
"email": "xx@yy.com",
"servicepack_update": "true",
"attachmentFormatForReport": "pdf",
"EXPIRY_TIME": "08/29/2018, 00:00",
"optional_updates": "true",
"definition_update": "true",
"delay_deployment_by_approved_time/delay_deployment_by_released_time": "5",
"target_type": "REMOTE_OFFICE",
"non_security_update": "true",
"security_update": "true",
"report_notify_duration": "3",
"featurepack_update": "true",
"target_list": "Local Office",
"include_tp_app_type": "Patch Specific Applications",
"templateName": "Force reboot excluding servers",
"tp_applications": "Notepad++",
"failure_notify_enable": "false",
"taskName": "windows create task"
}
}
{
"message_type": "createAPDTask",
"message_response": {
"createapdtask": {
"status": "windows create task task created successfully"
}
},
"message_version": "1.4",
"status": "success"
}
get /api/1.4/patch/scandetails
curl --request GET \
--url 'https://{serverurl}/api/1.4/patch/scandetails?branchofficefilter=SOME_STRING_VALUE&healthfilter=SOME_INTEGER_VALUE&customgroupfilter=SOME_STRING_VALUE&agentinstallationstatusfilter=SOME_INTEGER_VALUE&resid=SOME_STRING_VALUE&domainfilter=SOME_STRING_VALUE&livestatusfilter=SOME_INTEGER_VALUE&platformfilter=SOME_STRING_VALUE' \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' {
"response_code": 200,
"message_type": "scandetails",
"message_response": {
"total": 94,
"limit": 25,
"page": 1,
"scandetails": [
{
"branch_office_name": "Local Office",
"resource.name": "XXXX-YY-ZZ-1",
"resource_health_status": 3,
"description": "--",
"branch_office_id": 1,
"os_language": 1,
"agent_installed_on": 1548677081796,
"os_platform_name": "Windows",
"pmreshealthstatus.resource_id": 47707,
"patchstatusdefn.label": "dc.common.SCANNING_COMPLETED",
"branchofficedetails.branch_office_id": 1,
"agent_installed_dir": "C:\\Program Files (x86)\\DesktopCentral_Agent\\",
"mac_address": "00:0c:29:7e:51:a7,46:15:cf:8f:af:8f,00:15:5d:79:ec:dd,",
"resource.domain_netbios_name": "WORKGROUP",
"service_pack": "Windows 10 Version 1803 (x64)",
"os_language_abbr": "en",
"resource.resource_id": 47707,
"scan_remarks_args": "--",
"os_platform_id": 1,
"owner": "--",
"configstatusdefn.label": "dc.db.som.status.installed_successfully",
"scan_status": 228,
"scan_remarks": "dc.patch.util.Scanning_completedsuccessfully",
"agentcontact.logged_on_users": "Administrator",
"os_platform": 1,
"oslanguage.languageid": 1,
"last_sync_time": 1552904282877,
"oslanguage.i18n": "dc.patch.patchinfo.English",
"ip_address": "XXX.XX.YYY.YYY,XXX.YY.XX.YY,XXX.YY.YY.X,",
"osflavor_id": 0,
"search_tag": "--",
"agent_version": "10.0.267.W",
"owner_email_id": "--",
"patchstatusdefn.image_name": "/images/success.png",
"installation_status": 22,
"resource_id": 47707,
"os_name": "Windows 10 Professional Edition (x64)",
"agentcontact.last_contact_time": 1552956951000,
"location": "--",
"computer_live_status": 1,
"agentcontact.last_bootup_time": 1552629463000,
"last_scan_time": 1552904526258,
"patchmgmtosinfo.resource_id": 47707,
"errorcodetokburl.kb_url": "--",
"last_successful_scan": 1552904526258,
"computer_status_update_time": 1552903541615
}
]
},
"message_version": "1.0",
"status": "success"
}
curl --request GET \
--url 'https://{serverurl}/dcapi/reports/queryReports/{dc_longvalue_pathparam}/data?startIndex=SOME_INTEGER_VALUE&limit=SOME_STRING_VALUE' \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' \
--header 'accept: application/queryResult.v1+json' {
"data": [
{
"db_added_time": "1724670283179",
"name": "All Computers Group",
"resource_type": "101",
"domain_netbios_name": "CRITERIA_GROUP"
}
],
"reportName": "Query Reports",
"columnDetails": [
{
"columnDataType": 12,
"columnName": "name"
}
]
}
get /api/1.4/patch/approvalsettings
curl --request GET \
--url https://{serverurl}/api/1.4/patch/approvalsettings \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' {
"response_code": 200,
"message_type": "approvalsettings",
"message_response": {
"approvalsettings": {
"patch_approval": "automatic"
}
},
"message_version": "1.0",
"status": "success"
}
post /api/1.4/som/computers/removecomputer
curl --request POST \
--url https://{serverurl}/api/1.4/som/computers/removecomputer \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' \
--header 'content-type: application/json' \
--data '{"resourceids":[301]}' {
"resourceids": [
301
]
}
{
"message_type": "computers",
"message_response": {
"computers": {
"Status": "Computer Removal initiated successfully"
}
},
"message_version": "1.4",
"status": "success"
}
get /api/1.4/patch/supportedpatches
curl --request GET \
--url 'https://{serverurl}/api/1.4/patch/supportedpatches?patchid=SOME_STRING_VALUE&bulletinid=SOME_STRING_VALUE&approvalstatusfilter=SOME_INTEGER_VALUE&page=SOME_INTEGER_VALUE&pagelimit=SOME_STRING_VALUE&severityfilter=SOME_INTEGER_VALUE&platformfilter=SOME_STRING_VALUE' \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' {
"response_code": 200,
"message_type": "supportedpatches",
"message_response": {
"total": 21776,
"limit": 25,
"page": 1,
"supportedpatches": [
{
"update_id": 2,
"patch_lang": 1,
"patch_updated_time": 1552980907650,
"sqnumber": "6.22.0.0",
"patch_updated": 1552978698000,
"bulletin_id": "TU-075",
"patch_noreboot": 1,
"update_name": "Third Party Updates",
"platform": 1,
"configstatusdefn.image_name": "/images/approved_icon.gif",
"patch_released_time": 1552974574000,
"patch_size": 6537016,
"customerpatchstatus.patch_id": 309239,
"patch_uninstall_status": 0,
"platform_name": "Windows",
"download_status": 221,
"patch_type": 2,
"first_name": "DC-SYSTEM-USER",
"pmseverity.name": "Low",
"patch_status": 211,
"severity": 1,
"patchstorestatusdefn.label": "dc.common.SUCCESS",
"configstatusdefn.label": "dc.common.APPROVED",
"patch_id": 309239,
"patch_name": "BANDIZIP-SETUP.EXE",
"patch_description": "Bandizip (6.22.0.0)",
"newpatchinfo.patchid": 309239,
"patch_remarks": "",
"vendor_name": "Bandisoft",
"superceded_by": "NA",
"severity_name": "dc.common.LOW",
"patchstorestatusdefn.image_name": "/images/download_success.png",
"patch_supported_time": 1552974574000,
"patchdetails.patchid": 309239,
"customer_id": 1
}
]
},
"message_version": "1.0",
"status": "success"
}
post /api/1.4/patch/suspendAPDTask
curl --request POST \
--url 'https://{serverurl}/api/1.4/patch/suspendAPDTask?taskname=SOME_STRING_VALUE' \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' {
"message_type": "suspendAPDTask",
"message_response": {
"suspendapdtask": {
"status": "task has been suspended successfully"
}
},
"message_version": "1.4",
"status": "success"
}
post /api/1.4/patch/resumeAPDTask
curl --request POST \
--url 'https://{serverurl}/api/1.4/patch/resumeAPDTask?taskname=SOME_STRING_VALUE' \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' {
"message_type": "resumeAPDTask",
"message_response": {
"resumeapdtask": {
"status": "task has been resumed successfully"
}
},
"message_version": "1.4",
"status": "success"
}
put /dcapi/patch/settings/declinePatch/declinePatches
curl --request PUT \
--url https://{serverurl}/dcapi/patch/settings/declinePatch/declinePatches \
--header 'Accept: application/declinePatches.v1+json' \
--header 'Authorization: d92d4xxxxxxxxxxxxx15f52' \
--header 'Content-Type: application/declinePatches.v1+json' \
--data '{"patches":[{"reasonId":"1","id":"110001","remarks":"Vendor reported crash on reboot"}],"customGroupID":["301"]}'Decline a single patch for one custom group
{
"patches": [
{
"reasonId": "1",
"id": "110001",
"remarks": "Vendor reported crash on reboot"
}
],
"customGroupID": [
"301"
]
}
Decline multiple patches with different reasons for multiple custom groups
{
"patches": [
{
"reasonId": "1",
"id": "110001",
"remarks": "Vendor-reported patch issue causing BSOD"
},
{
"reasonId": "3",
"id": "110002",
"remarks": "Conflicts with in-house CRM application v4.2"
},
{
"reasonId": "5",
"id": "110003",
"remarks": "Awaiting approval from change advisory board"
}
],
"customGroupID": [
"501",
"502"
]
}
Patches declined successfully
{
"message": "Patches declined successfully",
"status": "success"
}
Patches list is empty or null
{
"errorMessage": "Patches list is empty",
"errorCode": "INSUFFICIENT_DATA"
}
All Computers group selected with other custom groups
{
"errorMessage": "All Computer Groups cannot be selected with other Custom Groups",
"errorCode": "INVALID_DATA"
}
A patch object is missing the required reasonId
{
"errorMessage": "reasonId is mandatory for patch id: 110001",
"errorCode": "INSUFFICIENT_DATA"
}
Authentication credentials missing or invalid
{
"errorMessage": "Authentication credentials are missing or invalid",
"errorCode": "UNAUTHORIZED"
}
User lacks access to the selected custom groups
{
"errorMessage": "The user is not authorized to perform this operation!",
"errorCode": "UAC_UNAUTHORIZED"
}
Unexpected server error during decline
{
"errorMessage": "An internal error occurred while processing the request",
"errorCode": "INTERNAL_ERROR"
}
© 2025, Zoho Corporation Pvt. Ltd. All Rights Reserved.