Scan Report Template Findings
Scan Report Template Findings
In this tutorial, you'll examine the options within the "Findings" section, of a Scan Report Template. To
get started, click REPORTS at the top of the page.
Here in the "Reports" section of Qualys VMDR, click the "Templates" tab.
Here under the "Templates" tab, you can edit, or run a report from an existing template. To create a new
template, click the "New" button (just below the "Reports" tab)...
A Scan Report Template, allows you to distribute vulnerability scan results and findings to operational
and remediation teams within your organization. We'll provide a Title for this template.
To make this template available to other Qualys users, click the check box to "Make this a globally
available template."
The options at the top of the "Findings" section, specify the type of data to be included in this report.
Host-based findings encompass the "unpurged" scan history, for all assets in your account, while Scan-
based findings are comprised of your account's individual scan results (those you would normally find
under the "Scans" tab).
We'll demonstrate both types of data in this tutorial, starting with Host-based findings. Only host-based
findings provide the option to include trending. Just below the "Host-based Findings" radio button, click
the check box to "Include trending."
Just right of the "Include trending" check box, click the "Select time frame" link.
For best results, Qualys recommends a trending time frame of 90-days or less. You can also customize
the trending time frame for specific date ranges.
With trending enabled for 90-days, let's choose the host targets for this report. Targets can comprise of
Asset Groups, IP addresses, or Asset Tags,
... and select the "Type: Domain Controller" tag (at the top of the "Favorite Tags" list).
This report is now configured to target Windows Domain Controllers, and will use host-based findings
with trending enabled. Click the "Test" button (bottom right-corner).
A scan report with host-based vulnerability findings, has been successfully created for Domain
Controllers. We'll scroll down to view the Detailed Results.
Along with the Asset Tags assigned to this host, its TruRisk Score and Asset Criticality Score are
provided.
Host-based findings are comprised of all "unpurged" scan results for all assets in your account.
This provides the advantage of viewing each vulnerability's present status. All of these are "Active,"
meaning they have been detected more than once on the same host.
With host-based findings driving this report, the "First Detected" and "Last Detected" dates are provided
for each vulnerability.
In an upcoming lab tutorial, you'll learn to configure "Display" options to provide specific vulnerability
details. We'll now return to the template, to take a look at the "Scan-based Findings" option.
Let's see how this template behaves, when we switch to Scan-based Findings.
Notice that the options to Choose Host Targets, has been removed. The host IPs for all scan-based
findings, are contained within the individual scan results, which you will select in just a moment. Click
the "Test" button (bottom-right).
Reports that use scan-based findings, require a Qualys user to manually select the desired scan results,
at the time of report creation. These are the same scan results found under the scans tab.
Notice that each scan result comes with its own list of host IP addresses; therefore, no need to specify
these targets back in the template.
A useful scan-based findings feature, allows you to single-out one or more IPs, when the report is
created. This is helpful when troubleshooting or analyzing host anomalies.
A report with scan-based findings has been successfully created. We'll scroll down to view the Detailed
Results.
While scan-based findings include all of the vulnerability detections encountered during a scan...
... without history data, this report cannot display the present status of each vulnerability; each report
represents an isolated "snapshot" in time.
While vulnerability details are available for this scan instance or snapshot, without vulnerability history
data, the "First Detected" and "Last Detected" dates are unavailable. We'll scroll down to view more
results for this host.
Because scan-based findings are useful for troubleshooting or analyzing anomalies, the "Information
Gathered" data in this report provides an abundance of scan details and statistics.
Hundreds of "Information Gathered" QIDs provide everything from authentication results, to individual
host scan times. The QIDs in this section can be converted into Widgets that monitor asset health
within your account.
Remember, Scan-based Findings get host targets from the scan results you manually select at report
runtime; and therefore, are not required in the template, when the "Scan-based Findings" radio button is
selected.
Scan-based findings are commonly used for troubleshooting or analyzing scan performance. Reports
that use scan-based findings, do not provide vulnerability status or history information.
The host-based findings option requires you to choose the host targets for a report, using Asset
Groups, IP addresses, or Asset Tags.
The host-based findings option is a requirement, if you want to include trending in your report. For best
results, Qualys recommends a trending time frame of 90-days.
Host-based findings have the advantage of providing vulnerability status and history information, which
makes it a recommended option for creating vulnerability reports.
To save this template and create future reports, click the "Save" button (lower-right corner).
The "RSBP Scan Report Template" has been successfully added to this account's "Templates" tab.
In addition to making future edits and updates, you can run any report from its "Quick Actions" menu,
here under the "Templates" tab.
This concludes the "Scan Template Findings" tutorial. You may close this window and return to your
Lab Tutorial Supplement.