VMDR Handout 2.2
VMDR Handout 2.2
VMDR Handout 2.2
1
WELCOME
2
LEARNING RESOURCES
These links are also found in the Lab Tutorial Supplement - Appendix C
Here are some additional learning resources which you may find helpful.
https://www.qualys.com/training/
https://qualys.com/learning
https://www.qualys.com/docs/qualys-cloud-
platform-whitepaper.pdf
https://www.qualys.com/documentation/
https://www.qualys.com/training/library/vmdr-onboarding/
Recommendation - take a look at each site, and bookmark them for future
use!
3
SUPPORT RESOURCES
How to This article tells you all the different ways you
https://success.qualys.com/support/s/
Collaborate can interact with Support. Call, chat, open a
article/000003610
with Support case, etc.
https://success.qualys.com/support/s/ This document tells you what you need to
Opening
article/000006839 provide support to drive faster resolution for
Cases
your cases.
These links are also found in the Lab Tutorial Supplement - Appendix C
Here are some support resources which you may find helpful.
https://status.qualys.com/
https://www.qualys.com/platform-identification/
https://success.qualys.com/customersupport/s/
https://success.qualys.com/support/s/article/000
003610
https://success.qualys.com/support/s/article/000
006839
Recommendation - take a look at each site, and bookmark them for future
use!
4
OBJECTIVES
By the end of this course, you will be able to use Qualys VMDR effectively,
including:
By the end of this course, you will be able to use Qualys VMDR effectively,
including:
5
INTRODUCTION TO VMDR
6
CYBERSECURITY PACKAGES FOR SME/SMBS
Simple, easy-to-deploy cybersecurity packages to manage, remediate and protect made for small businesses
7
Endpoint security functionality is tightly integrated with VMDR TruRisk.
7
QUALYS VMDR LIFECYCLE
• Reduced risk
Asset Management
You can’t secure what you can’t see. It’s essential to have a complete,
updated global inventory of all assets across your network: on prem,
endpoints, clouds, containers, mobile, OT and IoT — everywhere. This
continuous discovery process must detect all assets — approved and
unapproved — and collect granular details about each, such as installed
software, hardware details and running services.
Vulnerability Management
The traditional “scan-the-network” approach doesn’t scale well for modern
IT infrastructure. Therefore all assets — on premises, in public clouds, on
8
endpoints — must be checked for vulnerabilities and misconfigurations
continuously, using active, authenticated scans, passive network analysis
and, even better, lightweight agents that reside on the assets and detect
and report any changes in real time. This Vulnerability Management,
Detection and Response phase also includes assessment of digital
certificates and TLS configurations.
Vulnerability Remediation
Vulnerability Management, Detection and Response identifies the most
appropriate remediation for each threat, whether it’s deploying a patch,
adjusting a configuration, renewing a certificate or quarantining an asset.
If patching is the course of action, an effective VMDR solution will
automatically correlate vulnerabilities and patches, and select the most
recent patch available for fixing a particular vulnerability in a specific asset.
With VMDR, remediation is fast, precise and smooth — all critical elements
when a delay can give attackers a chance to breach your defenses.
8
QUALYS SENSOR PLATFORM
Qualys sensors collect data from your IT
environment and automatically beam it up to
the Qualys Cloud Platform, which continuously
analyzes and correlates the information to help
you quickly and precisely identify and eliminate
threats.
• Always on
• Remotely deployed
• Centrally managed
• Self-updating.
With its always-on sensors, the Qualys Cloud Platform gives organizations
continuous, real-time visibility of all their IT assets – on-premises, at
endpoints or in clouds
– for comprehensive prevention, detection and response.
The sensors which we focus on this course are Cloud Agents, Virtual
Scanners, Scanner Appliances, and Internet (aka Remote) Scanners.
9
Scanner role or above in Qualys, you’ll automatically be able to launch
scans against your external (public IP) assets.
• Qualys Cloud Agents run as a local process on the host they protect.
Qualys agents support a wide variety of OS platforms. Agents play a
special role in VMDR, by providing the patching and response functions.
• Cloud and SaaS Connectors work with the native services of your cloud
and SaaS providers to identify misconfigurations and security blind
spots. Cloud Connectors can be created for your AWS, Google Cloud,
and Microsoft Azure accounts. SaaS Connectors are available for O365,
Google Workspace, Zoom, and Salesforce.
9
correct vulnerable images, during the build process.
9
WHERE CAN YOU DEPLOY CLOUD AGENTS?
IaaS Providers
Remote Users
Coffee Shop
Corporate Environment
Cloud Agent delivers visibility and security solutions for assets that are not
easily scanned from the network including remote or roaming users,
distributed offices and cloud server instances.
The agent initiates all connections on port 443 from the agent to the
platform using REST over HTTPS/TLS.
10
AGENT HOSTS
Once the agents are successfully deployed, you will see respective agent hosts under the ”Agents” tab in the
Cloud Agent application. You do not see these agent hosts listed in the VMDR application under VMDR > Assets >
Address Management tab.
Use the “Quick Actions” menu for any agent host listed here, to view
specific asset details. The Asset Summary displays host OS details,
geolocation information, names and addresses, activity updates, and Asset
Tags.
11
There is also a Cloud Agent tag which automatically gets associated with
any asset where cloud agent is deployed. This is important to know when
reporting, scanning and using CSAM or GlobalAsset view. You can use this
tag to include or exclude cloud agent hosts in your scans, reports and
queries.
11
ADDING HOST ASSETS
When you add hosts to your subscription you will then be able to scan
them and report against them. You can also remove hosts from your
subscription. A full purge of the data for that host is done at the time of
removal. When you add hosts to your subscription you are required to
identify its associated IP address; however you are also required to choose
a tracking method that specifies how vulnerability findings will be tracked
or indexed.
12
idCXoBLjaXhJqNA1YsBZwTyqAxsxiRR4zKY9LWA0g
?e=seq1TQ
12
UNIFIED VULNERABILITY VIEW
There are multiple ways to scan an asset, for example authenticated, unauthenticated scans, Agent based, and
Agentless.
Regardless of which scanning technique is used, it is important that the vulnerability detections link back to the
same asset, even if the key identifiers for the asset, like IP address, network card, and so on, have changed over
its lifecycle.
Tracking Methods
• When adding scannable hosts to the subscription, you choose IP, DNS, or NetBIOS tracking method.
• Cloud Agent findings are tracked by a UUID called the Qualys Host ID that gets written on the host asset.
• Agentless Tracking provides scannable hosts with the same Qualys Host ID that the Cloud Agent uses.
• The Correlation Identifier also provides a unique identifier, published by the Cloud Agent for scannable hosts.
• You will be able to merge scan and agent data for the asset into a Unified View if you are scanning agent hosts.
For a more detailed discussion, please see the Scanning Strategies and Best Practices course.
Once the scannable host has a Qualys Host ID, the asset will have a
common ID that can be used to merge scan and agent data together.
Unified View refers to a single record for the asset that includes both scan
and agent data.
13
KNOWLEDGEBASE
14
VMDR KNOWLEDGEBASE
The Qualys KnowledgeBase is the central location in Qualys that stores and shows all the possible vulnerability
checks. It is not a list of vulnerabilities that you have in your environment.
We have the most up-to-date KnowledgeBase of vulnerabilities in the security industry, it is updated continually
and managed by a dedicated team.
The KnowledgeBase table contains QID, vulnerability title, severity, CVE ID, vendor reference, CVSS scoring, CVSS3
Base score, BugTraq number, and when it was modified/created.
The colorful icons associated with a QID represent the different properties or
characteristics of its associated vulnerability:
A pencil icon identifies QIDs that have been edited by a Manager user. Only the Manager
user role can edit QIDs in your account knowledgebase. The green wi-fi antenna icon
identifies vulnerabilities that can be detected remotely by a (Qualys Scanner Appliance)
without the use of authentication. If authentication is required for successful vulnerability
detection, the QID will be associated with the blue key icon. The red cross icon identifies
vulnerabilities that are patchable. QIDs with the red cross icon typically provide a direct
link to the vendor's patch. The black hat icon is used to identify vulnerabilities that have a
known exploit. The red, hazardous material icon identifies vulnerabilities associated with
malware. The blue gear icon is associated with vulnerabilities that can potentially be
protected from exploits, by making specific configuration changes on the target host. The
hex icon identifies vulnerabilities that are associated with services that are not currently
running.
15
KNOWLEDGEBASE SEARCH
Use the search functionality to find vulnerabilities by QID, title, CVE ID, CVSS base score, Qualys severity level,
product name, or by many other criteria.
With tens of thousands of QIDs in the Qualys knowlegebase, you'll want to take
advantage of the numerous search options available in the knowledgebase search tool.
The search tool provides more than 30 different options for locating specific QIDs or
types of vulnerabilities within the knowledgebase.
Some of the search options feature a NOT operator, which allows you to exclude QIDs
that match your search criteria.
You can perform searches using CVE IDs, various CVSS scores, bugtraq IDs, and even the
date QIDs were published or modified.
16
KB VULNERABILITY COMPONENTS
Associated Malware
Malware information correlated with the vulnerability, obtained from the
Trend Micro Threat Encyclopedia.
Bugtraq ID
The Bugtraq ID number assigned to the vulnerability by SecurityFocus.
Category
Each vulnerability is assigned to a category. Some categories are platform-
specific (for example Debian and SUSE) while others are more general (for
example Database and Firewall).
CVE ID
The CVE name(s) associated with the vulnerability. CVE (Common
Vulnerabilities and Exposures) is a list of common names for publicly
known vulnerabilities and exposures.
CVSS Access Vector
CVSS Access Vector is part of the CVSS Base metric group, and reflects the
17
level of access required to exploit a vulnerability. The more remote an
attacker can be to exploit a vulnerability, then the higher the score and
risk. CVSS Access Vector values are Local Access, Adjacent Network and
Network. This value is used in reporting when CVSS Scoring is enabled for
your subscription. CVSS Base Score
This score represents the fundamental, unchanging qualities of the
vulnerability and is provided by NIST, unless the score is marked with the
footnote [1] which indicates the score is provided by the service. This value
is used in reporting when CVSS Scoring is enabled for your subscription.
CVSS Temporal Score
This score represents time dependent qualities of the vulnerability and is
provided by the service. This value is used in reporting when CVSS Scoring
is enabled for your subscription
Discovery Method
Identifies the type of scan that will detect the vulnerability - authenticated,
remote (unauthenticated), or both.
Exploitability
Exploitability information correlated with the vulnerability, includes
references to known exploits and related security resources. This field is
auto-populated by scripts that search the Internet at known exploit sites.
When an exploit is found, the QID is updated with a link to the exploit.
Note - The QID modified date is not updated based on changes to
exploitability information since these changes don't affect the signature
code, scoring or the QID description.
PCI Vuln
Indicates whether the vulnerability must be fixed to pass a PCI compliance
scan.
QID
The unique Qualys ID number assigned to the vulnerability.
Severity Level
Each vulnerability is assigned a severity level (1-5) which is determined by
the security risk associated with its exploitation.
Tracking Method
You must assign a tracking method to each host in your subscription: IP
address, DNS Hostname or NetBIOS hostname. The tracking method
determines how the host will be reported in scan reports.
Do you have Cloud Agent? Hosts with cloud agents are identified with a
tracking method of Cloud Agent (or AGENT). Tip - You can quickly find your
agent hosts by clicking the Search option above the list and choosing the
Network "Global Cloud Agent Network".
17
Vendor Reference
A reference number released by the vendor in regards to the vulnerability,
such as a Microsoft Security Bulletin like MS03-046.
17
VULNERABILITY TYPE
Confirmed vulnerabilities have one or more active tests, that can be used to confirm the presence of the
vulnerability.
Potential Vulnerabilities include vulnerabilities that cannot be fully verified. In these cases, at least one necessary
condition for the vulnerability is detected. It's recommended that you investigate these vulnerabilities further.
Information Gathered data or IG data for short, consists of various configuration settings and other host
inventory and scan information.
Vulnerability QIDs that are half-red/half-yellow, have two very predictable scan results, depending on your use of
authentication. When scans are performed in authenticated mode, these vulnerabilities will be confirmed and
colored red. When scan are performed without authentication, these vulnerabilities will be listed as potential and
colored yellow.
Confirmed vulnerabilities have one or more active tests, that can be used to confirm the
presence of the vulnerability. Vulnerabilities of this type are color coded: red.
Potential Vulnerabilities include vulnerabilities that cannot be fully verified. In these cases,
at least one necessary condition for the vulnerability is detected. It's recommended that
you investigate these vulnerabilities further. The service can verify the existence of some
potential vulnerabilities when authenticated trusted scanning is enabled.
Please note that even if a QID is detected by an authenticated scan or a cloud agent that
doesn't mean that the vulnerability will be categorized as Confirmed. You can have
potential vulnerabilities detected by authenticated scans and agents. These often include
vulnerabilities where we don't have any mechanism to detect if the patch/workaround is
applied or not.
Information gathered data or IG data for short, consists of various configuration settings
and other host inventory and scan information. Information gathered QIDs are not
vulnerabilities and are color coded: blue.
Vulnerability QIDs that are half-red/half-yellow, have two very predictable scan results,
depending on your use of authentication. When scans are performed in authenticated
mode, these vulnerabilities will be confirmed and colored red. When scan are performed
without authentication, these vulnerabilities will be listed as potential and colored yellow.
18
VULNERABILITY SEVERITY LEVELS
A severity level 5 vulnerability is the most urgent, because it presents the greatest risk to
your organization. A severity 5 vulnerability could potentially allow an attacker to gain
root or admin privileges to the vulnerable host.
Severity level 3 and 4 vulnerabilities also involve some type of potential compromise of
the host system or one of its applications or services.
A severity level 1 vulnerability is the least urgent. Severity level 1 and 2 vulnerabilities
involve the disclosure of sensitive data that could potentially be very useful to an attacker.
19
EDITING A QID
Editing a vulnerability
Several vulnerability customization options give Managers greater control over
how vulnerabilities appear in reports and how they are eventually prioritized for
remediation. For example, by changing a vulnerability from a severity 2 to a
severity 5, remediation tickets for the vulnerability could have a higher priority
and shorter deadline for resolution.
20
FURTHER RESOURCES
These links are also found in the Lab Tutorial Supplement - Appendix C
Here are some additional learning resources which you may find helpful.
https://community.qualys.com/vulnerability-
detection-pipeline/
https://success.qualys.com/discussions/s/article/
000006767
Recommendation - take a look at each site, and bookmark them for future
use!
21
KNOWLEDGEBASE:
SEARCH LISTS
22
SEARCH LIST USE CASES
The Complete Vulnerability Detection option provides the most comprehensive and thorough list of vulnerability
assessment checks. This is the recommended “Vulnerability Detection” option.
There are, however, use cases for creating a subset of vulnerabilities, known as a Search List.
• Create more useful, human readable reports for specific types of vulnerabilities:
• Microsoft’s Patch Tuesday vulnerabilities
• PCI vulnerabilities
• Only the vulnerabilities published in the last 30 days
• Applications using the default credentials
• Scan for all vulnerabilities except for those scanned by Cloud Agent.
• Create a Remediation Policy that assigns or ignores vulnerabilities (when they are detected).
Search lists are custom lists of vulnerabilities that you can save and use in
order to customize vulnerability scans, reports and ticket creation.
Further ideas for Search Lists used in Reporting can be found here:
https://success.qualys.com/discussions/s/article/000006215
23
USING SEARCH LISTS
Report Templates
Example - reporting to provide insights
A search list is one of the most powerful filtering tools in the Qualys Vulnerability
Management application for tasks such as scanning, reporting, and remediation. You can
use search lists to create vulnerability reports that focus on specific groups of
vulnerabilities that are high priority targets within your organization.
You may find the need to target a specific list of vulnerability QIDs, when scanning
(especially on those occasions where you don't have time to wait for a complete scan to
finish). Remember: Qualys normally recommends scanning for everything, and then using
Report Templates containing targeted search lists, to filter your scan results.
24
SEARCH LIST OVERVIEW
There are two different types of Search List:
Dynamic search list - Defined based on search criteria and updated when new QIDs are added to the knowledgebase.
You can create a static list, a dynamic list or import a search list from the Qualys search
list library.
25
STATIC SEARCH LIST
A static search list (as its name implies) contains a fixed number of QIDs and can only be
created and updated, manually.
26
DYNAMIC SEARCH LIST
Dynamic search list - Defined based on search criteria and updated when new QIDs are added to the knowledgebase.
You can create a static list, a dynamic list or import a search list from the Qualys search
list library.
For a dynamic search list, targeted QIDs must be specified using a "List Criteria" consisting
of any combination of the KnowledgeBase search options. The criteria you specify here
will determine which QIDs are presently added to the list, and moving forward it will
determine whether or not new QIDs get added. You can use any of the search options
found here in the KnowledgeBase search tool to build your own custom search lists.
27
USING RTI
With the addition of the Threat Protection application to the Qualys cloud
platform, this calculation is improved by including known threats into the
equation, which can have a significant impact on vulnerabilities of all
severity levels.
The goal of Qualys Threat Protection is to help you pinpoint your assets
that have the highest exposure to the latest known threats, so that you
can prioritize and mitigate the high risk vulnerabilities quickly.
28
SEARCH LIST INFORMATION
You can use the Quick Actions menu to edit an existing Search List or view its information.
Here you will find the list criteria, its list of QIDs, and any Option Profiles, Report
Templates or Remediation Policies that use this list.
29
TRURISK
What is TruRisk
What is TruRisk used for
Benefits of using TruRisk
30
QUALYS TRURISK
Qualys TruRisk™ is a new approach to prioritize vulnerabilities, assets, and groups of assets based on the actual
risk they pose to the organization.
This helps organizations quantify cyber risk so that they can accurately measure it, take steps to reduce exposure,
track risk reduction trends over time, and better measure the effectiveness of their cyber security program.
Attackers can exploit the vulnerabilities while you are in the process of
reviewing, prioritizing, and patching all the reported vulnerabilities.
31
PRIORITIZE VULNERABILITIES BASED ON RISK
Qualys TruRisk™ assesses risk by taking into account multiple factors such as evidence of vulnerability
exploitation, asset criticality, its location, and evidence of compensating controls on the asset among many other
factors to assess the accurate risk posture for an organization.
With TruRisk, organizations can pinpoint which CVEs are exploited in the wild (even those that don’t have a QID)
and which malware, ransomware, or threat actor groups are exploiting them. These insights can then be used to
prioritize vulnerabilities based on risk.
Qualys TruRisk assesses risk by taking into account multiple factors such
as evidence of vulnerability exploitation, asset criticality, its location, and
evidence of compensating controls on the asset among many other
factors to assess the accurate risk posture for an organization.
With TruRisk, organizations can pinpoint which CVEs are exploited in the
wild (even those that don’t have a QID) and which malware, ransomware,
or threat actor groups are exploiting them. These insights can then be
used to prioritize vulnerabilities based on risk.
32
QUALYS TRURISK COMPONENTS
• Qualys TruRisk places detected vulnerabilities within the context of your critical and non-critical host assets to
help you remediate and fix the vulnerabilities that really count
33
*/
3. TruRisk Score (ARS) /* token = riskScore */
33
QUALYS DETECTION SCORE
Qualys Detection Score (QDS) begins with the CVSS base score of detected
vulnerabilities. It then adds temporal factors such as Threat Intelligence
(including exploit code maturity, associated malware, active threat actors,
and vulnerabilities trending on the dark web) and mitigating and
remediating controls related to the exposure.
QDS range is 1-100 and has four levels: Critical (90-100), High (70-89),
Medium (40-69) and Low (1-39). QDS is derived from the following factors:
• Vulnerability technical details (e.g., CVSS base score)
• Vulnerability temporal details (Is the exploit code mature? Is the vuln
associated with ransomware?)
• Vulnerability remediation details (Has the vendor released a patch?)
QDS considers:
• CVSS Score
• External Threat Intelligence (exploit code maturity, malware, active
threat actors, and vulnerabilities trending on the dark web).
• Mitigating Controls (CIDs) associated with the vulnerability (host
specific).
34
• Remediating Controls or patches
• It is important to note that if multiple CVEs contribute to a QID, the CVE
with the highest score is considered for the QDS calculation.
34
QUALYS DETECTION SCORE
Qualys Detection Score (QDS) begins with the CVSS base score of detected vulnerabilities (i.e., technical
vulnerability details)
It then adds temporal factors such as Threat Intelligence (including exploit code maturity, associated malware,
active threat actors, and vulnerabilities trending on the dark web)
Mitigating and remediating controls related to the exposure are included in the QDS calculation
Critical range indicates CVSS score is critical, there is a weaponized exploit available, and there is evidence of
exploitation by threat actors
Qualys Detection Score (QDS) begins with the CVSS base score of detected
vulnerabilities. It then adds temporal factors such as Threat Intelligence
(including exploit code maturity, associated malware, active threat actors,
and vulnerabilities trending on the dark web) and mitigating and
remediating controls related to the exposure.
QDS range is 1-100 and has four levels: Critical (90-100), High (70-89),
Medium (40-69) and Low (1-39). QDS is derived from the following factors:
• Vulnerability technical details (e.g., CVSS base score)
• Vulnerability temporal details (Is the exploit code mature? Is the vuln
associated with ransomware?)
• Vulnerability remediation details (Has the vendor released a patch?)
QDS considers:
• CVSS Score
• External Threat Intelligence (exploit code maturity, malware, active
threat actors, and vulnerabilities trending on the dark web).
• Mitigating Controls (CIDs) associated with the vulnerability (host
specific).
35
• Remediating Controls or patches
• It is important to note that if multiple CVEs contribute to a QID, the CVE
with the highest score is considered for the QDS calculation.
35
ASSET CRITICALITY SCORE
You can define the asset criticality score for a tag while creating asset tags
in Global AssetView (GAV) / CyberSecurity Asset Management (CSAM).
You can set the asset criticality score between 1 to 5 with 1 being the
lowest and 5 being the highest. If you don’t select an asset criticality score,
a criticality score of 2 is applied to the asset by default.
36
ASSET CRITICALITY SCORE
The INVENTORY section displays all assets where Qualys has collected
data. Clicking on the Criticality score of an asset displays all the Asset Tags
assigned to the asset along with their configured Criticality Scores. The
Asset Criticality Score (ACS) is automatically calculated based on highest
aggregated criticality across all tags assigned to the asset.
In this illustration, the asset has multiple tags with Criticality Scores of 5, 4
and 3. So the Asset Criticality Score of the asset is 5, that is, the highest
Criticality Score among the assigned tags.
If the tags associated with your assets do not have criticality score set, by
default the asset criticality score 2 will be applied to that asset.
Asset Criticality Score setting is turned off by default when creating a new
37
Asset Tag.
ACS has a big effect on the asset's risk score. It is very important to have a
solid tagging structure and criticality values set that reflect to importance
of your assets, or the services that run on them. Many customers have
asked questions why an asset would have a low risk score, but high QDS
scores. The reason for that is the criticality of the asset is low. There
should be a company policy for defining critical assets and medium assets
and low assets. This is very important because if everything is critical, then
nothing is critical.
37
TRURISK SCORE
The TruRisk Score is the overall risk score assigned to the asset. The ARS
range is between 0 to 1000, and is divided as follows:
- Severe: 850-1000
- High : 700-849
- Medium : 500-699
- Low: 0-499
38
Avg(QDS) - Average of Qualys risk score for each severity level of QIDs
38
ORGANIZING AND MANAGING
ASSETS:
The differences between Global Asset View (free) and Cybersecurity Asset
Management (paid)
How GAV and CSAM categorize, normalize and enrich asset information.
39
FEATURE COMPARISON
GAV is free with any number of agents & passive scanners to give you
baseline visibility of your asset inventory.
40
CATEGORIZATION, NORMALIZATION & ENRICHMENT
OPERATING SYSTEM
Raw Data Microsoft Windows Server 2022
Datacenter (21H2 Insider Preview Build
20348.169 64-Bit) Raw Data
Architecture 64-Bit
Lifecycle Stage GA
End of Service Oct 14 2031
Advanced Asset Information
License Type Commercial
41
1: Virtualization, Level 2: Hypervisor Type-1 (Bare Metal)
There are currently 13 Level 1 categories and 5 Level 2 categories for
classifying operating systems.
Enrichment
OS, hardware, and software data is then enriched with Lifecycle stage and
support information. This information is not only important from a
security perspective, it's also useful to the people in you company that are
tasked with hardware and software budgeting and procurement.
41
CATEGORIZATION, NORMALIZATION & ENRICHMENT
HARDWARE
Raw Data IBM Power System S924 9009-42G Raw Data
Categorization
The Qualys platform categorizes hardware assets based on an internally
developed classification/categorization system. The categorization, which
gives the user an idea about the primary function of the product, has been
derived from standard industry terms as well as other well-known industry
classification systems.
It follows a two-level classification system – namely Level 1 Category and
Level 2 Category
- Level 1 category: Major/ broad category to which the hardware asset
belongs.
- Level 2 category: Subcategory, i.e specific to the product’s primary
function.
42
Enrichment
OS, hardware, and software data is then enriched with Lifecycle stage and
support information. This information is not only important from a
security perspective, it's also useful to the people in you company that are
tasked with hardware and software budgeting and procurement.
42
CATEGORIZATION, NORMALIZATION & ENRICHMENT
SOFTWARE
Raw Data openssl-1.1.1c-2.el8.x86_64
Raw Data
Update 1.1.1c
Architecture 64-bit
Categorization
Normalized data in CyberSecurity Asset Management (CSAM) has software
applications categorized based on an internally developed classification/
categorization system. The categorization, which gives the user an idea
about the primary function of the product, has been derived from
standard industry terms as well as other well-known industry classification
systems.
It follows a two-level classification system – namely Level 1 Category and
Level 2 Category
Level 1 Category: Major or broad category to which the software
application belongs.
Level 2 Category: Subcategory, i.e. specific to the product's core function.
43
Enrichment
OS, hardware, and software data is then enriched with Lifecycle stage and
support information. This information is not only important from a
security perspective, it's also useful to the people in you company that are
tasked with hardware and software budgeting and procurement.
43
NORMALIZE SEARCHES WITH ASSET CATEGORIES
Use hardware, software, and OS tokens to help “normalize” your query conditions to uncover more precise asset
details.
Syntax Examples
hardware.category1: value1 hardware.category1: `Networking Device`
hardware.category2: value2 hardware.category2: `Switch`
hardware.category: value1 / value2 hardware.category: `Networking Device / Switch`
The Qualys catalog is vast. In the CSAM Inventory section, use the
following to determine value1 and value2:
• Group Assets by – Hardware – Category
• Group Assets by – Operating System – Category
• Software – Group Software by – Category
This will show the category 1 and category 2 values of the Qualys catalog
that match your asset population.
44
ORGANIZING AND MANAGING
ASSETS:
ASSET TAGS
45
ASSET TAGS
Asset tags are commonly grouped or organized into Asset Tag Hierarchies. These
hierarchies allow you to nest one asset tag below another, creating various parent/child
relationships (the idea or objective is to build child tags that represent a subset of host
assets represented by its associated parent tag).
Qualys Platform will already create the following tags for you:
Business Units
46
Business Units tag is a parent tag. The child tags underneath are for the business units in
your account are created. Assets in a business unit are automatically assigned the tag for
that BU.
Asset Groups
Asset Groups tag is a parent tag. The child tags underneath are for the asset groups in
your account. Assets in an asset group are automatically assigned the tag for that asset
group. You create Asset Groups in VMDR.
Asset Search Tags
Asset Search Tags is a parent tag. The child tags underneath are tags that you create
from the Asset Search area of VMDR.
Cloud Agent
Cloud Agent tag is created by the system and will be applied to all assets that have the
Cloud Agent deployed. This is a quick way to reference your asset population with agents
deployed.
Internet Facing Assets
Internet Facing Assets tag is created and assigned to an asset if it has a public-facing IP
address.
Unmanaged
All passively sensed assets that do not have a cloud agent or have not been scanned by
Qualys scanner have this tag
Passive Sensor
All assets reported by the passive sensor appliance have this tag.
ICS_OCA
The assets sensed from project files uploaded by the user in the Industrial Control System
(ICS) module have this tag.
EASM
All assets reported by Qualys External Attack Surface Monitoring have this tag.
Shodan
This is a legacy tag that is applied to assets when Qualys pulls information from Shodan.
EASM is the tag you should reference when navigating your external inventory.
Default Dashboard Access Tag
This tag is added to new dashboards to allow by default all users to view all dashboards.
46
ASSET TAGS
Asset Tags can be specified with Qualys Query Language to filter list results.
Asset Tagging provides a flexible and scalable way to automatically label and organize the
assets in your environment and ensures that your scans and reports are always
synchronized with your dynamic business environment
In this example, an Asset Tag called ”Linux” is being used with the Qualys Query Language
to filter search results.
47
ASSET TAGS
Dashboards help you visualize your assets. Each dashboard is a collection of widgets
showing resource data of interest.
48
ASSET TAG TYPES
Static Tags
• Assigned manually to host assets
• Commonly used as the starting point of an Asset Tag Hierarchy
Dynamic Tags
• Host assignment is determined by Asset Tag Rule Engine
• Tags dynamically change with updates to host
Note:
The Cloud Agent tag is a static tag created by the system and will be
applied to all assets that have the Cloud Agent deployed. This is a quick
way to reference your asset population with agents deployed.
Static tags: You can build static tags that you would then manually assign to selected host
assets within your account. Static tags are commonly used to establish the starting point
for individual asset tag hierarchies.
Dynamic tags: These are automatically assigned to host assets, based on their rule
engine. Asset tag rule engines focus on different host attributes, and when these
attributes change, so do their respective tags.
Asset tags are commonly grouped or organized into Asset Tag Hierarchies. These
hierarchies allow you to nest one asset tag below another, creating various parent/child
relationships (the idea or objective is to build child tags that represent a subset of host
assets represented by its associated parent tag).
Qualys Platform will already create the following tags for you:
Business Units
Business Units tag is a parent tag. The child tags underneath are for the business units in
your account are created. Assets in a business unit are automatically assigned the tag for
that BU.
Asset Groups
49
Asset Groups tag is a parent tag. The child tags underneath are for the asset groups in
your account. Assets in an asset group are automatically assigned the tag for that asset
group. You create Asset Groups in VMDR.
Cloud Agent
Cloud Agent tag is a static tag created by the system and will be applied to all assets that
have the Cloud Agent deployed. This is a quick way to reference your asset population
with agents deployed.
Newer Tags:
- Unmanaged: All passively sensed assets that do not have a cloud agent or have not
been scanned by Qualys scanner have this tag.
- Passive Sensor: All assets reported by the passive sensor appliance have this tag.
- ICS_OCA: The assets sensed from project files uploaded by the user in the Industrial
Control System (ICS) module have this tag.
- EASM: All assets reported by Qualys External Attack Surface Monitoring have this tag.
- Shodan: This is a legacy tag that is applied to assets when Qualys pulls information
from Shodan. EASM is the tag you should reference when navigating your external
inventory.
- Default Dashboard Access Tag: This tag is added to new dashboards to allow by
default all users to view all dashboards.
49
DYNAMIC RULE-BASED TAGS
The “Asset Inventory” rule engine allows you to build Other “dynamic” rule engines are also available.
tags using query tokens, including the Hardware, OS,
and Software category tokens.
Learning to build queries is a very useful skill, in the Qualys UI. From
queries you can build both Dashboard Widgets and Asset Tags.
When building Asset Tags, the ”Asset Inventory” rule engine can be used to
leverage the power of the hardware, OS, and software categories.
Some other example use cases for Dynamic Asset Tags are:
•You are trying to get your assets listed by their operating systems or
firmware versions.
•You might be looking for the active assets in your subscription.
•You need a list of software that you installed on your assets within a
specific period.
•You are looking for a list of open ports on your machines.
50
ASSET TAG HIERARCHY DESIGN
• Attempt to group tag hierarchies (parent/child relationships) around some type of common criteria.
• Child tags do NOT inherit the attributes or properties of their parent tags.
• Multiple tags can be combined when selecting targets for scanning and reporting
Do your best to choose tag names that are descriptive, but brief.
To help organize Asset Tag hierarchies, avoid mixing multiple types of rule engines in a
single hierarchy.
With this design structure in place, multiple Asset Tags can be combined when selecting
targets for scanning and reporting.
The ”Desktop” and “Server” tags in the “Bad Tree” do not inherit location information from
their parents.
51
ASSET CRITICALITY SCORE
52
ORGANIZING AND MANAGING
ASSETS:
CMDB INTEGRATION
How the Qualys platform integrates with two major third-party CMDB
platforms.
53
SERVICENOW INTEGRATION
54
JIRA INTEGRATION
55
ORGANIZING AND MANAGING
ASSETS:
ASSET GROUPS
How the Qualys platform integrates with two major third-party CMDB
platforms.
56
ASSET GROUPS
Asset Groups allow you to manually group “scannable” assets in your account.
You typically build multiple Asset Groups that reflect your scanning targets.
Asset Groups are set up within VM/VMDR. Instead of typing in IP address ranges for your
scan targets, you can organize these IP blocks into Asset Groups. You typically build
multiple Asset Groups that reflect your customary or regular scanning targets.
We recommend using Asset Tags to organize assets around criteria such as Operating
System, device type, business priority, etc. It is best to build Asset Groups by IP
range/location.
An IP address may belong to more than one Asset Group. It is not possible to nest Asset
Groups (a group within a group).
57
BUSINESS IMPACT SCORE
Note the Business Impact setting:
• The business impact level you select is
automatically applied to all hosts in the
group.
• The default impact is High.
58
You should consider setting the Business Impact Level to Minor so that the Asset Tag with
the same name which gets automatically created is assigned an Asset Criticality Score of
2.
58
ASSET GROUPS EXAMPLE
Map out how you’d like to divide up your IP address space. AG: Chicago - EXT - ALL
64.39.96.0/24, 64.39.97.0/24, 64.39.100.0/24, 64.39.101.0/24
Thoughtfully planning your Asset Group structure will save time scanning
your hosts with a scanner appliance and when going to report.
Understanding how you want to build your scans will be a piece of this
puzzle.
In this example, you see Asset Groups built for a Chicago location. There
are ALL groups for both internal (private IP addressing) and external
(public IP addressing) Asset Groups. From there, there are smaller groups
to identify the specific buildings or network segments / subnets.
By using this type of naming convention, you can find all assets in any
building or any location very easily.
The Asset Groups for each building reflect where you should deploy
scanner appliances and then scan those locally (instead of trying to scan
59
all of Chicago from one location).
Example queries:
• Show all internal assets regardless of location
tags.name:” – Internal”
59
ASSET GROUPS OR ASSET TAGS?
1. Asset Groups – This is the traditional way but still has useful functionality.
2. Asset Tags – This is the newer way and should be your focus.
This article will provide a framework for successfully setting up tags. The more you work to get these right, the
easier finding assets and reporting on them will be. Asset Tags: Are You Getting The Best Value?
You can learn more about organizing and managing your assets in this course:
CyberSecurity Asset Management (CSAM)
Organize Assets
Your sensors will collect data about your assets, but you must organize
them in Qualys. This is a vital piece of success and often frustrates
organizations.
60
yourself in the long run. Use this article to help you set up both
groups and tags:
https://success.qualys.com/support/s/article/000005819
60
ORGANIZING AND MANAGING
ASSETS:
ACCOUNT MAINTENANCE
61
STALE ASSET RECORDS
Stale asset records, are something we encounter all the time when working with our customers during health
checks. The most significant issue caused by stale asset records is the decline in data accuracy that affects your
reports and dashboards.
Stale Assets:
• Decrease accuracy
• Impact your security posture
• Affect your compliance position
• Reduce Performance
• Increase your license costs
62
accuracy that affects your reports and
dashboards.
62
PURGING
Purging is one of a few maintenance activities that must be performed on a regular basis for most subscriptions.
In this context “Purging” refers to the removal of stale asset data. That is, data about assets that no longer exist in
the environment. In most environments host assets come and go on a regular basis.
In some highly ephemeral cloud environments especially, the host asset data in the subscription can rapidly
become out of date.
Purging can be performed via the UI or automated through API calls.
Note: Purging is covered in more detail in our Reporting Strategies and Best Practices course.
63
LEARNING RESOURCES
Link Description
Purging: What, why, when, how, what This article will walk you through how purging
happens to the data? works.
These links are also found in the Lab Tutorial Supplement - Appendix E
Here are some additional learning resources which you may find helpful.
https://www.qualys.com/training/
https://qualys.com/learning
https://www.qualys.com/docs/qualys-cloud-
platform-whitepaper.pdf
https://www.qualys.com/documentation/
https://www.qualys.com/training/library/vmdr-onboarding/
Recommendation - take a look at each site, and bookmark them for future
use!
64
FURTHER PURGING RESOURCES
1. Purging: What, why, when, how, what happens to the data? - This article
will walk you through how purging works.
2. Purging Stale Data – Watch this video on why you need a good purging
practice for account maintenance. This will save you and your team time and
energy in the long run.
3. Subscription Health Dashboard and Purging Explanation – Find the
Subscription Health dashboard on this page. Download the file as a JSON file
and import it into your account.
4. Stale records using QQL and groovy tags – Use this article to help you find
stale assets, and create a groovy tag.
5. Qualys Help for setting up purge rules – This will show you the process for
setting up purge rules.
65
4. Stale records using QQL and groovy tags – Use this
article to help you find stale assets, and create a
groovy tag.
5. Qualys Help for setting up purge rules – This will
show you the process for setting up purge rules.
65
VULNERABILITY ASSESSMENT
66
VM SENSORS
LAN 2
• EC2/VPC Remote Users
• Azure
• Google
DMZ
LAN 1
Our training lab targets live in a typical DMZ environment, where the
67
perimeter firewall has been configured to allow packets from Qualys'
External Scanner Pool. External scanners are ideal for scanning public
facing targets, or host assets with a public IP address. By default, any
Qualys user with scanning privileges, has access to the External Scanner
Pool.
Internal scanner appliances are commonly used to scan host assets that
reside on PRIVATE IP subnets like LAN 1 in this diagram. Deploying an
internal scanner appliance as a member of this subnet, will allow you to
scan subnet assets directly, without the obstacle of network filtering
devices.
LAN 2 in this diagram presently does not have a scanner appliance and is
isolated from the rest of the network by a firewall. To meet the
vulnerability management objectives for this subnet, Qualys Cloud Agent
will be installed on each host. Each agent will collect metadata from its
host and send it to the Qualys Cloud Platform for processing. Vulnerability
assessment tests (all the heavy lifting) are intentionally kept off of the
agent, and performed within the Qualys Platform. Qualys Cloud Agent is
ideal for Remote Users (or any host assets that are difficult to scan), and it
can be deployed on assets hosted by your Cloud Service Providers.
67
HOST PERSPECTIVES
A scanner appliance has a remote perspective since it scans into the host through open ports
Cloud Agent has a local perspective since it installs as a thin service on the host’s OS
To better understand the benefits provided by Qualys Cloud Agent and the
benefits of a Qualys Scanner Appliance, it helps to understand the
different PERSPECTIVES that each option provides.
Qualys Cloud Agent; on the other hand, has a LOCAL perspective of its
host system. QIDs with Remote Only Discovery Method in the Qualys
KnowledgeBase require a network connection to detect/confirm the
vulnerability. The agent cannot create networking connections back onto
the asset to assess every hosted service. This introduces a use case to run
supplemental scans for agent assets that host services, like server
systems. Scanning an agent host, gains the benefit of having both LOCAL
and REMOTE perspectives for the same host.
68
Authentication can be used for the scan, but it is not a necessary
condition. Remote Only Discovery QIDs are performed without
authentication.
68
SCAN CONFIGURATION COMPONENTS
Scan
What is being scanned? Which settings are being used? What is performing the scan?
This diagram illustrates the basic components that comprise a vulnerability scan. To
launch a vulnerability assessment scan you will certainly need at least one scanner
appliance. The lab exercises in this course use the Qualys Cloud's Pool of External
Scanners, which is the default setting for the Qualys student trial account you may be
using. When selecting a scanner appliance for any scan task, you will need to consider the
host assets your scan intends to target, which is another required component for
launching a scan.
Your scanning targets include netblocks or specific ranges of IP addresses or even a single
IP address in your Qualys subscription. Host IPs must be added to your subscription first,
before you can scan them. Any host asset in your Qualys subscription can be added to an
Asset Group which is another option for targeting a scan.
Asset Tags, the last scan target option, provide a dynamic and automated solution for
managing host assets in your Qualys subscription.
Every vulnerability assessment scan must select an Option Profile, containing various scan
preferences and scanning options. If your scan uses an Option Profile with authentication
enabled, one more component, an authentication record, is added to this of required
scan components.
69
AUTHENTICATION
70
AUTHENTICATION RECORDS
Go to Scans > Authentication and create new records from the New menu. For each record you'll provide login
credentials that our service will use to log in to each host at scan time
Go to Scans > Authentication and create new records from the New menu.
For each record you'll provide login credentials that our service will use to
log in to each host at scan time. Each record is defined for a technology,
like Windows, Unix, Oracle, etc and you can have multiple records per
technology.
Credentials are securely handled by the service and are only used for the duration of
the scan.
Process Overview
Step 1 – Set up a Windows user account to be used by our security service for
authentication.
Step 2 – Using Qualys:
1) Create Windows authentication records.
2) Select an option profile. For a vulnerability scan be sure to select “Windows” in the
Authentication section.
3) Launch a scan.
4) Verify that authentication passed for each target host. Tip - Run the Authentication
Report to view the authentication status (Passed or Failed)
71
OPTION PROFILE
The Option Profile defines the settings you want to use for a scan job.
• Performance
• Authentication
• Firewalls detected
Please see the Qualys Scanning Strategies and Best Practices self-
paced training class for a more detailed discussion and analysis
of scan settings and features found in the Option Profile.
In this course we focus on the basic configuration settings in an option profile, such as the
TCP and UDP port settings, preset scan performance options, vulnerability detection
options, and the different options for performing a scan in authenticated mode.
For an extended discussion of these and other scanning topics, please see the Qualys
Scanning Strategies and Best Practices training course.
72
LAUNCH ASSESSMENT SCAN - SCAN SETTINGS
73
ASSESSMENT SCAN - ON DEMAND
Choose View from the Quick Actions menu for any running scan. You'll see
the IPs that have already been scanned, the IPs currently being scanned
and the IPs waiting to be scanned. For a vulnerability scan, you can also
access partial results as they become available. Once the scan is finished
you'll be able to view and download the full results.
When the scan has completed, the scan status will show "Finished". At this
time you can select View from the Quick Actions menu to see the full
results in an HTML report.
74
SCHEDULING ASSESSMENT SCANS
What obviously makes a scheduled scan different are the Scheduling options. Begin by
selecting the date and time for this scheduled scan to start. The start time for each
scheduled scan will reflect the time zone you specify.
To keep this scan from bumping into high-demand or peak capacity times of day, you can
choose a maximum scan duration and the action to take, if any scan reaches this
threshold. If you configure the option to pause a long running scan, you'll need to specify
how and when you would like it to resume.
You can schedule your scans to run daily, weekly, or monthly. You can schedule scans
that have an unlimited number of occurrences, or select the option to deactivate a
scheduled scan after a set number of occurrences is reached. Notifications will
automatically be sent to the owner of a scheduled scanning task.
Additional options are available for sending notifications before and after a scan, to any
email distribution groups you create.
75
SCAN RESULTS SUMMARY
The "summary" section at the top of the report includes information like:
• Scan date, time and duration
• Information about the host assets targeted
• IP address of the scanner appliance
• Short summary of authentication results
The "Appendix" at the bottom provides more details about the hosts that were
successfully or unsuccessfully scanned and a breakdown of the scanning options
configured within the option profile
76
SCAN RESULTS DETAIL
By default, a raw scan report is designed to display all scan findings and details,
including:
• information gathered findings
• potential vulnerability findings
• confirmed vulnerability findings
Simply expand any of the findings to view the vulnerability details, such as: the
vulnerability title, QID number, Solution for fixing or mitigating the vulnerability, and
all other QID data items and information found in the Qualys KnowledgeBase; a raw
scan report contains everything.
77
AGENT DATA COLLECTION INTERVAL
• Data Collection Interval setting specifies the frequency of VM, PC, and SCA scans.
• At each interval agents perform assigned tasks and collect host metadata (as specified in the application
manifest(s).
• To complete each interval, collected data is transferred to the Qualys Platform for processing.
• NOTE: The countdown to the very next interval will begin as soon as the data transfer and post-processing
steps have been completed.
The VM, PC, and SCA Scan Interval setting determine how often Cloud
Agent collects vulnerability and compliance assessment data. Configured
at its minimal value, data collections will occur every four hours.
NOTE: The countdown to the very next interval will begin as soon as the
data transfer and post-processing steps have been completed. The
countdown to the next interval begins at the END of the previous interval
(i.e., it does NOT begin at the START of the previous interval).
78
REMOTE ONLY QIDS
79
SCAN RESULTS STORAGE
The principal contact in your organization can configure scan data storage.
The Storage Setup dialog shows for how long the Qualys platform will
store your raw scan and map results. This can be changed as needed by
the principal contact in your organization.
Any raw results older than that specified here will be discarded by the
Qualys platform. These are the results you can see under than Scans tab.
80
SCANNING RECOMMENDATIONS
5. There are different types of scans you can use. Configure an Option Profile for each
type.
• Discovery Scan – Using a “Light Inventory” Option Profile, you can scan a few ports for a quick scan to identify assets.
• Vulnerability Scan – Running Standard Authenticated Scans regularly across the organization.
• Certification Scan – Running a full scan on all ports on a host before you connect it to your network. This type of scan can also
be run at intervals to ensure full coverage.
6. Understand Scan Results
Review our online help about Scan Results – This is a quick read and will help teach you more about scan behavior.
81
intervals to ensure full coverage.
6. Understand Scan Results
a. No Host Alive – If you run a scan and receive the message “No
Host Alive,” you’ll want to troubleshoot your scan. Make sure you
understand how hosts get discovered during a scan.
b. Review our online help about Scan Results – This is a quick
read and will help teach you more about scan behavior.
c. Ghost Hosts – If IP addresses appear in your scan results as
“scanned,” but you know there is no actual host associated with that IP
address, this is called a “Ghost Host.”
i. Here are some Solutions:
1. Place a scanner as close to the target as possible.
2. Consider using VLAN scanning.
ii. Long Scan Times - Use this article to troubleshoot long scan
times.
81
REPORTING:
PRIORITIZATION
82
VMDR PRIORITIZATION REPORT
VMDR Prioritization identifies and remediates the vulnerabilities that pose risk to your organziation and business.
The Prioritization process correlates the vulnerability information with threat intelligence and asset context to
zero in on the highest risk vulnerabilities.
The VMDR Prioritization report guides you to focus resources in the right area to first patch the highest risk
vulnerabilities.
83 Qualys, Inc. Corporate Presentation
83
Patch Management app is enabled in your subscription).
- Includes only the confirmed vulnerabilities.
83
USE ASSET TAGS TO ADD CONTEXT
• Design and build Asset Tags that help to distinguish the “context” of your assets.
• Leverage tags that use the “Asset Inventory” rule engine, along with
Not all assets within your business or enterprise architecture are the
same. Some assets are considered critical, others are not. Different assets
perform different functions (they provide different services) and are
impacted by different vulnerabilities and threats.
The "Asset Inventory" rule engine that applies tags based on hardware, OS,
and software categories can be very useful here.
You'll want to keep the Prioritization Report in mind when building and
designing Asset Tags for you Qualys account.
84
PRIORITY OPTIONS - TRURISK OPTION
Qualys has introduced the TruRisk feature. Using this feature, you can
detect vulnerabilities within the context of your critical and non-critical
host assets to help you remediate and fix the vulnerabilities that really
count.
This mode provides data for Asset Criticality, Qualys Detection Score
(QDS), and TruRisk Score (ARS). This mode helps prioritize Assets or
Vulnerabilities based on risks generated in the result.
85
will be prioritized.
From the picture in the slide, Cloud Agents with Critical severity QDS score
will be prioritized.
TruRisk Score:
TruRisk Score is the overall risk score assigned to an asset. It combines the
Criticality Score of a single host with a weighted average of its combined
vulnerability detections. While the Qualys Detection Score provides a
useful metric for measuring the impact of a single vulnerability, the TruRisk
Score places the vulnerability in the context of other vulnerabilities
discovered on the same host.
It is dependent on:
• a. Asset Criticality Score (ACS)
• b. Qualys Detection Score (QID) for each severity level (Critical [C], High
[H], Medium [M], Low [L])
• c. Auto assigned weighing factor (w) for each criticality level of QID
Tokens:
Qualys Detection Score (QDS) token = vulnerability.detectionScore
Asset Criticality Score (ACS) token = criticalityScore
TruRisk Score (ARS) token = riskScore
85
PRIORITY OPTIONS - TRADITIONAL METHOD
86
GENERATE PRIORITIZATION REPORT
Patchable assets have Cloud Agent installed and Patch Management activated.
Once you establish your priority options, the last step is to click the
Prioritize Now button to build your report.
By default, this report will produce a list of vulnerabilities that match your
priority options. If you adjust any of the priority options, the report will be
automatically updated.
You can also toggle the report view between Vulnerabilities, Patches, and
Assets.
87
ZERO-TOUCH PATCH JOB - FROM PRIORITIZATION REPORT
88
EXPORT TO DASHBOARD
After building a Prioritization Report, simply click the "Export to Dashboard" button to build a Prioritization Report
Widget and then add it to an existing Dashboard.
Additionally, the report can be saved and downloaded as a CSV or PDF file
format.
89
REPORTING:
REPORT TEMPLATES
90
REPORTING OPTIONS
VM Templates High Level & Detailed CSV, DOCX, HTML, MHT, PDF, XML
Hybrid – VM Templates & High Level & Detailed CSV, DOCX, HTML, MHT, PDF, XML
APIs
Third Party Integration (For High Level & Detailed Varies depending on third party
example ServiceNow.) application
Prioritization Report High Level & Detailed PDF, and can export to
dashboards
There are multiple ways to get data with Qualys – queries, widgets and
dashboards, VM reports, and API. The table in this slide indicates the
various options that can be used for reporting. Some of the factors that
decide the choice of a particular option include accessibility by
Qualys\non-Qualys users, interactivity, level of details that can be included
in the report and report data format. Reporting using Dashboards, QQL
queries and VM templates are covered in this course.
On-Demand QQL Queries are interactive in so far as you can refocus the
view until you reach the format most meaningful to you.
*When using APIs for exporting data from your Qualys account note that
not all API extracts support JSON. Please consult the API guides for
specifics.
Please subscribe to the Qualys API Fundamentals Self-Paced Course for
more information on using APIs for reporting.
91
Example Use-cases
91
QUALYS AUTHENTICATION REPORT
- Passed
- Failed
- Passed with insufficient privileges
- Not Attempted
The authentication report will help you to quickly identify authentication issues, with
details that will help you to resolve the problem at hand.
https://qualys.secure.force.com/articles/Knowledge/000001087/p
92
REPORT TEMPLATE LIBRARY
Report templates allow you to select from dozens of filtering and display options, which
are then saved and used again and again to conveniently reproduce the same report
behavior. Report templates can be customized for different target audiences within your
organization. A report template simply takes the data and information from your RAW
scan results and formats, filters, and displays this information in a way that is meaningful
and useful to its target audience.
For example the Executive template will present vulnerability findings in a fashion that is
more suitable for executive or managerial members of your organization, providing
helpful graphics and summary statistics, but omitting the type of details that are more
useful to patching and mitigation teams.
The Technical report template; on the other hand, is more suitable for members of your
operational teams, because it focuses on the information and details needed to patch
and mitigate detected vulnerabilities.
Under the Templates tab you'll find pre-built templates for many useful reporting tasks,
and you can import more templates from the Template library.
93
SCAN BASED VS. HOST BASED FINDINGS
SCAN BASED FINDINGS
10.10.10.10
Scan 1 : 10 vulns
Daily Daily Daily
Scan 1 Scan 2 : 2 vulns
Scan 2 Scan n
Patch applied
Scan 3 : 5 active vulns
The "scan-based" findings in your account are comprised of each individual vulnerability
scan performed, where each scan tells a unique story based on its position or placement
within your scanning timeline. Reports that use scan-based findings are often referred to
as "snapshot" reports, because they represent an individual snapshot in time without any
influence from scans that have been performed previously or scans that have occurred
later in time. You'll find all of your scan-based findings listed under the Scans tab.
All scan based findings are poured into another bucket or database known as the host-
based findings. The host-based findings database collects data from completed scans and
indexes each detected vulnerability according to the "tracking method" you have selected
for each host asset. Host-based findings will allow you to view the vulnerability history of
any host asset, and
unlike scan-based findings; host-based findings allow you to create vulnerability "trend"
reports that track the status of any vulnerability (from new, to active, fixed, or reopened)
on any host.
94
SCAN REPORT COMPONENTS - SUMMARY
Scan-based Host-based
Findings Findings
This diagram illustrates the basic components needed to build a report (scorecard
reports, authentication reports and asset search reports, do not require a report
template).
All report types require that you select a report source or the assets you intend to target
in your report. You can accomplish this using a range of IP addresses or even a single IP,
or any asset groups or asset tags you've created.
For the report types that require a report template, you can choose a custom template
that you have created, or select one from the Qualys Report Template Library. A report
template provides dozens of options for selecting the data and findings that will be
included in your report, how that data will be displayed, and who will be able to view the
reports that are generated.
Notice that a Qualys scanner appliance is not included in this diagram. Running a report
does not in any way launch a scan. Scanning and reporting are separate tasks, and
therefore scans must be completed, prior to building thier associated reports.
95
REPORTING BEST PRACTICES
1. Refer to your security policy to find out which assets are the most critical.
2. Refer to your security policy to find out the vulnerability metrics you should be using
to prioritize remediation.
4. Assign reports to users within Qualys or share them via secure distribution.
6. Data Hygiene
1. Refer to your security policy to find out which assets are the most critical.
2. Refer to your security policy to find out the vulnerability metrics you should be using to prioritize remediation.
4. Assign reports to users within Qualys or share them via secure distribution.
6. Data Hygiene
96
96
REPORTING:
DASHBOARDS
Dashboards
Dashboard Templates
Risk Widgets
Dashboard Tags
97
DASHBOARDS
Using data visualization, dashboards visually communicate metrics to help users understand complex relationships
in their data.
Visualize risk across your asset inventory and take actions for remediation.
98
score, cloud posture, and external attack surface. Below the top row you
see individual geos where the risk score widget is isolating to each
continent via the location token.
98
CREATE A NEW DASHBOARD FROM A TEMPLATE
You can use the out-of-box Dashboard and Widget Templates or you can create your own custom Dashboards
and Widgets.
You can use the out-of-box Dashboard and Widget Templates or you can
create your own custom Dashboards and Widgets.
You can even create Dashboard Widgets from the VMDR Prioritization
reports you build.
99
IMPORTING DASHBOARDS
You can export and import Dashboard and Widget configurations to a file in a JSON format allowing you to share
them between accounts or within the Qualys community. The exported and imported dashboards or widgets are
copies of the primary dashboard or widget.
You can import and export Dashboard and Widget configurations to a file
in a JSON format allowing you to share them between accounts or within
the Qualys community. The imported and exported dashboards or widgets
are copies of the primary dashboard or widget.
100
OUT-OF-BOX DASHBOARD TEMPLATES
We provide with ready to use templates for dashboards that you could quickly add to your list of dashboards and
start monitoring your assets.
You can use the out-of-box Dashboard and Widget Templates or you can
create your own custom Dashboards and Widgets.
You can even create Dashboard Widgets from the VMDR Prioritization
reports you build.
101
NUMERICAL WIDGET
The “Numerical Widget” can be configured to automatically change color, when specific conditions or thresholds
are met.
You can fetch data and display the count of mathematical operations in a
numerical widget. You could also compare numbers with multiple queries.
For example, you can view the count of malicious files, missing patches, or
assets where patch installation is pending.
102
ENABLE TRENDING IN WIDGETS
103
TRURISK WIDGET
The TruRisk Score widget type will show data based on the risk score of assets in your environment.
The TruRisk Score widget type will show data based on the risk score of
assets in your environment.
You can recompute the risk score for a subset of assets within your
environment by modifying the query score using tags.
104
FILTER DASHBOARD DATA WITH TAGS
1. Click the Tag selector The tag tree displays recent and favorite tags and
all tags in your account.
2. Select the tags from Recent & Favorites or All Tags. Using the Search
Tags field, you can type the tag name and select the tag. Parent and
Child tags are selected individually.
3. Selected tags are listed in the Selected Tags section.
4. To remove the selected tags click Reset and click Apply.
105
DASHBOARD TAGS
From the Administration Utility you can create custom roles to control
which tagging permissions should be assigned to a user with that role. By
default, a Manager user is assigned all the tagging permissions.
106
PATCHING VULNERABILITIES
Patch Sources
Patch Catalog
Patch Supersedence
Prioritization Reports
107
PATCH ASSESSMENT AND DEPLOYMENT
Patch Assessment
• The Qualys VMDR module enables you to discover, assess, prioritize, and identify patches for critical
vulnerabilities.
• This functionality is included in VMDR licensing.
Patch Deployment
• The Qualys Patch Management module provides instant visibility on patches available for your asset and
allows you to deploy new patches as and when they are available.
• This functionality requires Qualys Patch Management licensing.
108
The Patch Management module helps you save time and effort by
automating patch management on Windows and Linux assets using a
single patch
management application. It provides instant visibility on patches available
for your asset and allows you to automatically deploy new patches as and
when they are available.
The Windows Cloud Agent downloads the required patches from external
sources. However, patches that require authentication cannot be
downloaded by the agent. You can manually download and install such
patches on the assets. Qualys Patch Management will then identify these
patches as installed. The Linux Cloud Agent access the patches from the
YUM repository and deploys the patches to the Linux assets in Patch
Management.
108
QUALYS PM WORKFLOW
Assign target agent host to a CA Configuration Profile that has PM configuration enabled.
Here is the list of steps, or workflow of events, that will allow Qualys PM to
begin patch assessments and deployments on host assets:
1. The first step is to install the Qualys agent on targeted host assets.
2. In step two, you’ll then assign your targeted assets to a CA
Configuration Profile that has PM enabled.
3. If you have not already activated the PM module, you’ll perform this
task in step 3. Notice that steps 1, 2, and 3 are all performed within the
Cloud Agent application.
4. Step four is performed within the PM application. Here you’ll assign
target assets to an enabled PM Assessment Profile to perform patch
assessment scans at regular intervals.
5. To perform the task of installing (or deploying) patches and perhaps
even uninstalling patches, you’ll need to build a patch job; step number
five.
6. Step six is only needed if you decide (at a later time) to deactivate the
PM module on an agent host; perhaps you would like reclaim its license
and use it on another agent host.
109
one, when Asset Tags are strategically used to assign host assets to their
appropriate profiles and jobs.
109
PATCH ASSESSMENT PROFILE
Specifies frequency of patch assessment scans, which assess agent host assets for missing and/or installed
patches.
The Profiles tab displays a default assessment profile. Cloud Agents scan
for patches (missing and installed) at a specific interval using the
configuration defined in the default Assessment Profile.
110
PATCH LICENSE SCREENSHOT
From the Licenses tab, you can see the license consumption details for Windows, Linux, and Mac assets.
You can select asset tags to include or exclude for patch management.
The Licenses tab, enabled only for paid subscribers, shows the number of licenses
consumed by Patch Management (PM). You can include asset tags to allow patch
installing and rolling back on the assets contained in those asset tags. The Total
Consumption counter may exceed 100% if the number of assets activated for PM are
more than the number of PM licenses you have.
Assets in the excluded asset tags are not considered for patch management and you
cannot deploy patches on those assets
111
PATCH SOURCES
Agent host assets receive their patches from Vendor Global Content
Distribution Networks (CDNs). Host assets will receive their patches
directly from the vendors that created the patches; this includes both OS
and application patches.
This will save Internet download bandwidth from the Qualys cloud platform to the on-
premise network as only one copy of unique files will be downloaded. For
environments will large number of Cloud Agents deployed, this can save a significant
amount of download bandwidth.
112
Further information about Qualys Gateway Server:
https://www.qualys.com/docs/qualys-gateway-service-user-guide.pdf
If you are using the Qualys Gateway Server as a proxy for your Cloud
Agents, this can help you configure it.
https://www.qualys.com/training/library/qgs-training/
Use this video series to understand what it does and how to configure it
correctly.
112
PATCH CATALOG
The patches listed in the Patch Management patch catalog are the ones
missing on your hosts which were detected using the Patch Management
scan.
Patches tab lists two types of patches:
Qualys Patchable - Qualys Patchable are the patches that can be installed
using Patch Management. Most of the patches listed on the Patches tab
are Qualys Patchable.
113
displayed. This is done to help you focus on the essential patches required
by your host assets.
To view ALL patches in the catalog, remove (uncheck) the “Missing” and
“Non- superseded” filter options.
113
PATCH SUPERSEDENCE
• Build more efficient patch jobs by targeting patches that have not been superseded.
• By default, the “Patch Selector” displays patches that are “Within Scope” of the host asset(s) your job is
targeting.
Along with search tokens, you can use filters to find missing/installed
patches or non-superseded latest missing patches for Windows and Mac
assets.
By default, the Patch Selector only lists patches that are "Within Scope" of
the host assets that are targeted.
114
DEPLOY PATCHES USING TRURISK PRIORITIZATION
Reduce remediation time by deploying the patches from the same platform in an integrated workflow, at the click
of a button.
This feature can reduce remediation time by deploying the patches from
the same platform in an integrated workflow, at the click of a button.
115
THANK YOU
116 Qualys, Inc. Corporate Presentation
Thank you for attending this class! We hope you found it useful!
116