Qualys Asset Tracking Best Practices
Qualys Asset Tracking Best Practices
Steps:
1. If DNS scanning exists today, convert all to IP scanning.
2. Ensure Option Profile option to “Purge host data when OS has changed” is disabled.
3. Enable the Agent Correlation Identifier option – Primary user only.
4. Enable Agentless Tracking across the Enterprise – Primary user only.
5. Ensure Agentless Tracking is enabled across all authentication records.
6. Deploy the Qualys Cloud Agent on every asset that can use it.
a. Supported OS have a version under VM and PC here:
https://success.qualys.com/support/s/article/000006675.
7. Perform fully authenticated scans using the scanner appliances for all IP ranges.
a. If a device has an agent, all interfaces/virtual IPs on that device will collapse into
a single asset. You will still be able to view all IPs in Host Details. The agent will
ensure that the main device/interface “wins” the naming rights, so Qualys will
list the actual hostname as the asset hostname.
b. If the device does not have an agent, all interfaces/virtual IPs on that device will
remain separate, keeping current behavior in place. This will prevent the main
asset from being renamed to a virtual hostname or the IP changing.
5. Deploy the Qualys Cloud Agent on every asset that can use it
5.1. This will allow you to take advantage of the tracking methods above on everything
possible, especially the Agent Correlation Identifier.
5.2. This will keep usage down because Agent-enabled devices will collapse into a single
host.
5.3. This will reduce duplicate vulnerability counts, so your vuln counts reflect the number
of actionable fixes.
6. Perform fully authenticated scans using the scanner appliances for all IP ranges.
6.1. This will allow Qualys scans to pick up all possible information and collapse the hosts
according to your configured merging options.
6.2. If you have authentication issues:
6.2.1. Agent-enabled devices will still pick up the Agent Correlation Identifier and
merge correctly.
6.2.2. Non-Agent devices will create a duplicate asset in Qualys, using IP-tracking, with
the information we could gather.
6.3. You should consistently look for authentication issues and correct them when found.
6.3.1. You can use the Authentication Report in the Qualys UI.
6.3.2. You can also track Authentication-Failed QIDs for various OS to find these assets
quickly.
6.3.2.1. Reference:
https://qualysguard.qualys.com/qwebhelp/fo_portal/authentication/auth_st
at_qids.htm
6.3.2.2. You can dashboard these Auth-Failed QIDs if desired.
Smart Merging is not the best path, however I’ve explained here since it is an option for you:
I suggest reading up on it before selecting it, and would prefer the standard unified view
approach, but the decision is ultimately up to the team.
https://qualysguard.qg2.apps.qualys.com/qwebhelp/fo_portal/host_assets/agent_merge_data
.htm