Perform a Vulnerability Scan Using Qualys
Table of Contents
Expand all | Collapse all
-
- Integrate IoT Security with AIMS
- Set up AIMS for Integration
- Set up IoT Security and XSOAR for AIMS Integration
- Send Work Orders to AIMS
- Integrate IoT Security with Microsoft SCCM
- Set up Microsoft SCCM for Integration
- Set up IoT Security and XSOAR for SCCM Integration
- Integrate IoT Security with Nuvolo
- Set up Nuvolo for Integration
- Set up IoT Security and XSOAR for Nuvolo Integration
- Send Security Alerts to Nuvolo
- Send Vulnerabilities to Nuvolo
- Integrate IoT Security with ServiceNow
- Set up ServiceNow for Integration
- Set up IoT Security and XSOAR for ServiceNow Integration
- Send Security Alerts to ServiceNow
- Send Vulnerabilities to ServiceNow
-
- Integrate IoT Security with Cortex XDR
- Set up Cortex XDR for Integration
- Set up IoT Security and XSOAR for XDR Integration
- Integrate IoT Security with CrowdStrike
- Set up CrowdStrike for Integration
- Set up IoT Security and XSOAR for CrowdStrike Integration
- Integrate IoT Security with Microsoft Defender XDR
- Set up Microsoft Defender XDR for Integration
- Set up IoT Security and Cortex XSOAR for Microsoft Defender XDR Integration
- Integrate IoT Security with Tanium
- Set up Tanium for Integration
- Set up IoT Security and XSOAR for Tanium Integration
-
- Integrate IoT Security with Aruba AirWave
- Set up Aruba AirWave for Integration
- Set up IoT Security and Cortex XSOAR for Aruba AirWave Integration
- View Device Location Information
- Integrate IoT Security with Aruba Central
- Set up Aruba Central for Integration
- Set up IoT Security and XSOAR for Aruba Central Integration
- Integrate IoT Security with Cisco DNA Center
- Set up Cisco DNA Center to Connect with XSOAR Engines
- Set up IoT Security and XSOAR for DNA Center Integration
- Integrate IoT Security with Cisco Meraki Cloud
- Set up Cisco Meraki Cloud for Integration
- Set up IoT Security and XSOAR for Cisco Meraki Cloud
- Integrate IoT Security with Cisco Prime
- Set up Cisco Prime to Accept Connections from IoT Security
- Set up IoT Security and XSOAR for Cisco Prime Integration
- Integrate IoT Security with Network Switches for SNMP Discovery
- Set up IoT Security and Cortex XSOAR for SNMP Discovery
- Integrate IoT Security with Switches for Network Discovery
- Set up IoT Security and Cortex XSOAR for Network Discovery
-
- Integrate IoT Security with Aruba WLAN Controllers
- Set up Aruba WLAN Controllers for Integration
- Set up IoT Security and XSOAR for Aruba WLAN Controllers
- Integrate IoT Security with Cisco WLAN Controllers
- Set up Cisco WLAN Controllers for Integration
- Set up IoT Security and XSOAR for Cisco WLAN Controllers
-
- Integrate IoT Security with Aruba ClearPass
- Set up Aruba ClearPass for Integration
- Set up IoT Security and XSOAR for ClearPass Integration
- Put a Device in Quarantine Using Aruba ClearPass
- Release a Device from Quarantine Using Aruba ClearPass
- Integrate IoT Security with Cisco ISE
- Set up Cisco ISE to Identify IoT Devices
- Set up Cisco ISE to Identify and Quarantine IoT Devices
- Configure ISE Servers as an HA Pair
- Set up IoT Security and XSOAR for Cisco ISE Integration
- Put a Device in Quarantine Using Cisco ISE
- Release a Device from Quarantine Using Cisco ISE
- Apply Access Control Lists through Cisco ISE
- Integrate IoT Security with Cisco ISE pxGrid
- Set up Integration with Cisco ISE pxGrid
- Put a Device in Quarantine Using Cisco ISE pxGrid
- Release a Device from Quarantine Using Cisco ISE pxGrid
- Integrate IoT Security with Forescout
- Set up Forescout for Integration
- Set up IoT Security and XSOAR for Forescout Integration
- Put a Device in Quarantine Using Forescout
- Release a Device from Quarantine Using Forescout
-
- Integrate IoT Security with Qualys
- Set up QualysGuard Express for Integration
- Set up IoT Security and XSOAR for Qualys Integration
- Perform a Vulnerability Scan Using Qualys
- Get Vulnerability Scan Reports from Qualys
- Integrate IoT Security with Rapid7
- Set up Rapid7 InsightVM for Integration
- Set up IoT Security and XSOAR for Rapid7 Integration
- Perform a Vulnerability Scan Using Rapid7
- Get Vulnerability Scan Reports from Rapid7
- Integrate IoT Security with Tenable
- Set up Tenable for Integration
- Set up IoT Security and XSOAR for Tenable Integration
- Perform a Vulnerability Scan Using Tenable
- Get Vulnerability Scan Reports from Tenable
Perform a Vulnerability Scan Using Qualys
Use IoT Security integration with Qualys to perform a
vulnerability scan.
Because active scanning can be disruptive
to the services running on a scanned device, only account owners
have permission to perform vulnerability scans by default. Owners
can also set scanning permissions per administrator account, thereby
delegating it to just a few individuals.
By default, vulnerability
scanning is disabled for new administrator accounts. To enable it,
log in to the IoT Security portal as an owner, click AdministrationUser Accounts,
and then click the email address (username) of an administrator
for whom you want to enable vulnerability scanning. Slide the Allow
device vulnerability scans toggle from Off to On and
then Save.
The
ability to do vulnerability scanning is only available to owners
and administrators. There is no option to enable vulnerability scanning
for deployment and read-only users.
- Initiate a Qualys vulnerability scan from IoT Security.
- Log in as an owner or administrator who has vulnerability scanning enabled, click Devices, and then click the entry in the Device Name column for the device you want to scan.
- Because IoT Security only supports one vulnerability scan of a device at a time, make sure no other scans of this device are currently in progress.Click ReportsVulnerability Scan Reports and check the Status column. If you see Processing... for the device you want to scan, wait until the current scan finishes before starting a new one.When you see that the device isn’t already being scanned, you can continue with a new scan.Only initiate a scan of a device that’s in the Qualys inventory and that’s not currently active (and will remain inactive until the scan completes).
- Click Devices and then click the entry in the Device Name column for the device you want to scan.
- At the top of the Device Details page, click the Action menu (three vertical dots) and then click Scan.
- Read the caution about scanning active devices and, if the device is currently inactive, Continue.
Set parameters for the vulnerability scan you want Qualys to perform.Select the scan engine to perform the vulnerability scan and a profile to define the type of scan to run. Qualys provides a set of predefined profiles. You can also define and use your own.Click Scan.While the scan is in progress, a label appears at the top of the Device Details page indicating its status.When done, the label changes to show that the scan either failed or succeeded. You also receive an email alerting you that the report is ready.Download the vulnerability scan report, which is in PDF format.You have three options for viewing the report:- Click the Vulnerability Report Ready label at the top of the Device Details page.
- Navigate to ReportsVulnerability Scan Reports and then click the report name.
- Click Download Report in the email message. This opens the ReportsVulnerability Scan Reports page where you can download the report.
Open the report in a PDF viewer.The report consists of three major sections: Report Summary, Summary of Vulnerabilities, and Detailed Results.IoT Security incorporates the results of the vulnerability scan into the risk score calculations for the device. In addition, any CVEs included in the scan report are made available in the Risks section on the Device Details page and on the RisksVulnerabilities page. IoT Security immediately updates the risk score and CVEs on the Device Details page. Updates to the CVEs on the RisksVulnerabilities page are not made immediately and can take up to 24 hours to appear.