Skip to content
  • There are no suggestions because the search field is empty.

How do I integrate with TOPdesk?

This article describes how to set up the integration between Holm Security and TOPdesk. Once integrated, vulnerabilities can be automatically converted to tickets in TOPdesk, and ticket status is automatically synchronized between the two systems.

Note: The TOPdesk integration works only with cloud-based TOPdesk.

Before you begin

Before setting up the integration, ensure that your TOPdesk operator account has the required permissions. Review the permissions needed for the integration in the related article below.

You will also need your TOPdesk application password. If you have not generated one yet, follow the steps in the related article below.

Set up the integration

Follow these steps to integrate Holm Security with TOPdesk:

  1. Log in to Security Center.
  2. Click the Menu Icon in the top-right corner.
  3. Click Integrations > TOPdesk.
  4. Check the checkbox to enable TOPdesk.
  5. Enter your TOPdesk credentials:
    • Operator username
    • Application password (generated from your TOPdesk account)
    • URL (your TOPdesk instance URL)
    • Ticket naming (name format for tickets created in TOPdesk)
  6. Click Establish a connection.
  7. Once the connection is established, two dropdown menus will appear. Use these to configure:
    • Ticket status mapping
    • Operator group assignment
  8. Click OK.
  9. Done!

The integration is now active.

Automatic ticket status synchronization

Once the integration is active, ticket status automatically synchronizes between Holm Security and TOPdesk. When the scanner confirms that a vulnerability no longer exists, the corresponding ticket is automatically closed in both systems with a status of "fixed."

Example workflow

Here is how the integration works in a typical vulnerability remediation scenario:

  1. The scanner detects a vulnerability and reports it in Vulnerability Manager.
  2. A security engineer reviews the vulnerability and creates a ticket from Security Center.
  3. The ticket is created in both the Remediation module and in TOPdesk, with all necessary details included.
  4. The responsible team member remediates the vulnerability.
  5. A scan is rerun to verify the fix. (Scans can run automatically if a schedule is configured.)
  6. The scanner confirms that the vulnerability has been resolved.
  7. The ticket is automatically closed in both the Remediation module and TOPdesk.

Tip: You can also create tickets automatically using remediation policies. This eliminates the need for manual ticket creation and ensures consistent tracking of all vulnerabilities.