RSBP Slides For Lab Tutorials - V2
RSBP Slides For Lab Tutorials - V2
Welcome to the Qualys Reporting Strategies and Best Practices (RSBP) training.
In this course, we will discuss the different strategies and tools that can be used to
produce various types of reports for different stakeholders in your organization.
RSBP Training Documents
• Presentation Slides
• LAB Tutorial Supplement
https://qualys.com/learning
We’ll begin this training class with a quick overview of the items needed to complete
the RSBP training course, namely the lab tutorial supplement and presentation slides.
You will find the training documents for this course on our learning portal
qualys.com/learning.
Note that you will need a PDF reader like Adobe Acrobat to view these files.
2
Lab Tutorial Supplement
Participants will perform all lab activity for this training in a simulated lab
environment. Please consult the RSBP Lab Tutorial Supplement document for further
instructions.
3
Starting the Lab Tutorial
1
Navigate to the URL provided in the lab tutorial supplement to start the
tutorial for a topic:
Open this link or copy/paste
the link in a separate
Lab 1: Add Host Assets and Launch a Scan Job browser window/tab
https://ior.ad/7Aty 2
Maximize the
screen
3
Start the
tutorial
Scroll down in your Lab tutorial supplement to the specific topic to find the lab
tutorial link. Open the link in a separate browser tab or window and start the lab
tutorial.
Collapse the lab window when done and read through the lab tutorial supplement for
further instructions.
4
Complimentary Course Recommendation
Qualys recommends that you take and get certified in the Qualys Vulnerability
Management course and the Scanning Strategies and Best Practices course before
taking this course:
5
Agenda
❑ Sources of Data Collection (Lab)
❑ Reporting Philosophy
❑ Understanding Factors that Impact Report Data (Lab)
❑ Maintaining Data Hygiene (Lab)
❑ Reporting - Dashboards, Widgets, and Queries (Lab)
❑ Reporting - VM Templates and Reports (Lab)
❑ Exception Handling (Lab)
❑ Reporting Use Cases (Lab)
❑ Summary
We will start the course with a discussion on the different sensors that are used by
Qualys to collect data from your infrastructure.
We will then talk about the different approaches to reporting and look at a use case
where an organization’s custom severity ranking can be translated to a configuration
within Qualys.
Next, we will understand the various factors that impact report data which include
authentication, configuration changes and other environment specific factors.
In the following topic we will discuss the best practices and recommendations for
getting clean data for reporting by using appropriate house keeping options and
maintaining good purging practice to remove stale data from the environment.
Moving further, we will talk about the use cases and best practices concerning
interactive reporting tools such as dashboards, widgets and queries with an emphasis
on the VM/VMDR dashboard, Unified dashboard (UD) and the Qualys threat
protection application.
6
Next, we will talk about the best practices applicable to UI based vulnerability
reporting. Then we will discuss how to configure VM report templates, the different
types of findings that can be included in a template and the different options and
filters that can be configured in a template to tweak the output that is shown in a
report. Further we will discuss some of the available report types such as
Authentication report, Patch report and Scorecard report and understand how to
distribute reports to different users.
We will then consider a few scenarios where you can apply some of the concepts
covered in this training to generate appropriate reports.
Finally, we’ll finish the course with a checklist or a summary of all key points that you
need to consider for an effective reporting strategy.
6
Sources of Data Collection
This section covers the different data collection mechanisms used by Qualys.
Qualys Sensors
Scalable, self-updating & centrally managed
Qualys has various sensor types that collect data for you.
Scanner Appliances: Intranet and internal scanners, physical or virtual, used to scan
on-prem or cloud assets.
Cloud Agent: lightweight agents that can be installed on clients and servers for real-
time visibility. Ideal for assets with dynamic IP, remote/roaming users, ephemeral
cloud instances, and systems sensitive to external scanning.
Cloud Connectors: collect metadata from cloud platforms such as Amazon Web
Services, Microsoft Azure and Google Cloud Platform.
Passive Sensor: Available as physical or virtual appliance, continuously monitors all
network traffic, profiles devices and flags any asset activity.
Container Sensor: Available as an image for Docker-based containers, designed to
discover, track and continuously secure containers – from build to runtime.
Out-of-band Sensor: Out-of-band configuration assessment helps you extract IT,
configuration, and vulnerability data for assets deployed on disconnected (air-
gapped) networks.
8
Populating the Platform for Visibility
The Qualys Sensors are all populating the the platform with your inventory,
vulnerability, threat, compliance, cloud, and web app data. This gives you your data in
one place.
This is where the conversation on reporting starts. We are taking data that is already
in the Qualys platform, and we are viewing it in different ways.
9
Lab 1: Add Host Assets and Launch a Scan
• Add Host Assets
• Create Asset Groups
• Create Authentication Records
• Perform Authenticated Scan
15 mins
10
Reporting Philosophy
This section provides an overview of the basic concepts and components needed to
build custom reports in the Qualys Vulnerability Management application.
Tips for Success
• Align your security policy, standards and guidelines with Qualys.
• Use Dashboards
• Consider using the API to create a hybrid report archival program and for integrations.
12
12
Policy and Standards
Vulnerabilities identified Corporate CVSS Corporate Vulnerability Severity Evaluation Criteria
Sev erity Score
will be ranked on an
Ranking
ascending severity scale
Level 5 8.0 – 10.0 The vulnerability may allow:
from one to five. (Critical) • An attacker to assume remote administrator or root privileges
• Exposure (full read and write access) of a host, application or backend database
• An attacker to issue remote commands or execute arbitrary code
Some options for ranking:
Level 4 (High) 6.0 – 7.9 The vulnerability may allow:
• CVSS Base Scores • An attacker to assume only user privileges, or perform a complete denial of
• CVSS Temporal Scores service attack
• Partial Exposure (read access only) of, for example, the host file system or a
• Qualys Severity listing of all host or application users
Rankings Level 3 4.0 – 5.9 The vulnerability may allow:
• Qualys RTIs* (Medium) • An attacker to abuse or misuse a host or application, or perform a partial denial
of service attack
• Partial Exposure (read access only) to sensitive host or network security
See also Qualys
Online configuration details or source code that allows an attacker to research additional
13
There are various other ways by which vulnerabilities may be ranked and prioritized.
This includes CVSS scores, Real-time Threat Indicators (aka RTI’s),etc.
It is important that you align your corporate severity ranking mechanism to one of
these methods. This will allow you to have a consistent, org-wide security policy for
dealing with vulns.
One way to do this is by using CVSS scores.
For example, CVSS score 8.0 and above may be classified as Level 5 (Critical).
Similarly, Levels 4 (High), 3 (Medium) , 2 (Low) and 1 (Minimal) are mapped to the
corresponding CVSS scores, as shown in the slide.
Qualys supports CVSS Version 2 and CVSS Version 3. Please consult
https://qualysguard.qg2.apps.qualys.com/portal-
help/en/was/knowledgebase/cvss.htm for more information on CVSS scores.
13
Alternatively, you may also map your corporate severity rankings to Qualys severity
ratings.
For example, Qualys Severity rating 4 and 5 corresponds to High, 3 corresponds to
Medium, and1 and 2 corresponds to Low.
13
Set Standards for Remediation
Remediation timelines are based on infrastructure segments, those being:
• External
• Internal
• Endpoints
Corporate Sev erity Ranking External Facing Assets Internal Facing Assets Endpoint Sy stems
Level 5 1 day 30 days 7 days
14
Severity and threats to organization, play a part. Remediation for certain types of
vulnerabilities should be prioritized. This is based on highest attack surface and
severity.
It’s equally important to consider the asset context when prioritizing remediation. For
instance, your external assets with high severity vulnerabilities are going to have a
high priority. We are using Level 5 here as the highest severity, but this could also
include your threat protection RTIs.
Your endpoint systems may also have a high priority as they can be “on an island all
by themselves.”
14
Aligning with Corporate Policies and Standards
Question: How do I select specific types of vulnerabilities based on corporate severity rankings?
Answer: Qualys Search List
You want to align your Corporate Policy with what you are doing in Qualys.
In the example above, let’s say you are ranking your vulnerabilities by severity and
CVSS. Maybe you are using base scores for external and temporal scores for internal
because they depend on environment. You then want to build your search lists that
are relevant for the types of reports you are creating for each type of asset, internal
vs external vs endpoint.
15
Planning – Targeted Reporting
Segmentation Method Example Explanation
Tiered Reporting C-Level, VP-Level, D-Level, Manager, How technical should reports be for
Technical SME-Level each level of the organization?
Lines of Business within your Corporate, Subsidiary, Divisional, Create customized templates for
Organization Regional, Branch your internal stakeholders
Internal/External/DMZ, Build reports based on the team
OnPrem/Cloud, Production, Pre- that manages them, and the
Infrastructure/Network Segments
Production, QA, Test, Development, priority on which they should be
Sandboxed addressed.
Hardware/Software/Out-of-Band, Make your reports more
Operating System, Application, consumable by breaking them
Database, Network, Server, Client down by device type.
Technical/Remediation Team
Endpoint, Wireless,
structure(s)
Internal/External/DMZ, Web Apps,
Appliance, Physical, Virtual,
Domains, etc.
16
When planning your reports in Qualys VM/VMDR, first make sure you understand
which levels of the organization need to see reports and what they need to see. For
example, does a C-level need to see the specific patch needed for all of your
Windows workstations? Or do they want to better understand the overall risk
posture.
Next, consider lines of business. Should they have their own separate reports?
16
Factors that Impact Report Data
This section outlines some of the factors that impact report data, and which must be
considered before using report data for analysis and decision making.
17
Data Quality as the Foundation for Effective Reporting
• Consider factors that impact data consistency before using report data
18
18
Environment Factors that Impact Reports
Scan target configuration or environment specific factors:
• Authentication failures
• Assets pending reboot following patching
• Change in host “Live/Dead” Status
• Change in host OS
• Change in host IP address or hostname Host Status Change
• Change in asset’s business function
• Ephemeral Cloud Instances
19
This slide outlines some of the factors that impact report data. Changes to host IP
address and/or hostname are common. And then there may be changes to the
authentication setup or other environment issues that may impact existing
authenticated scans. Also Assets are decommissioned at the end of their asset
lifecycle or used in a completely new role. These changes can result in stale and
inconsistent vulnerability data in your account. And sometimes the asset may be
pending reboot following a security patching exercise. In this case the vulnerability
continues to be flagged as open or active even though it has been fixed as the
changes will only take effect after a reboot.
Lastly, the ephemeral nature of assets deployed in the cloud can generate lot of stale
vulnerability data in your Qualys account.
19
Scan Configuration Factors that Impact Reports
Change in
Vulnerability
Change in Target Ports
Detection
Criteria
20
20
Impact of Stale and Inconsistent Data
21
So, it is clear that Without proper asset housekeeping processes in place, you will
have stale and inconsistent data in your account that will impact dashboards and
reports.
Moreover, if the stale asset continues to remain in your subscription and the
associated IP/hostname has been assigned to another asset, when new findings come
in, it will result in inconsistent scan reports.
Vulnerability tickets of the stale asset will continue to remain open affecting your risk
calculation and SLA metrics. Remediation performance will be impacted too.
21
Lab 2: Analyze Impact of Configuration Changes
• Change Option Profile Settings
• Run Scan Jobs
• Analyse Findings
20 mins
Please consult pages 10 to 12 in the lab tutorial
supplement for details.
22
Maintaining Data Hygiene
23
Addressing Data Consistency Issues
Dashboards and authentication reports can help you identify and fix authentication
issues. You can also use dashboards to identify assets pending reboot.
It’s recommended that you track and classify assets throughout their lifecycle.
Conduct regular assessment of your IT infrastructure to identify decommissioned,
inactive and repurposed assets. Consider the use of Qualys asset tagging feature to
automate this classification where applicable.
Qualys also provides asset housekeeping options within the scan option profile to
manage stale data from “dead” or inactive assets and assets with major changes to
their OS. Consider using these options where applicable.
In all scenarios where automatically deployed assets are spun up, you must also
consider the automated process of purging or removing them from your Qualys
24
account. You can setup purging rules to automatically identify stale and inactive
assets and remove stale data from your account.
Being proactive in addressing factors that cause data inconsistency will save you time,
resources and hassle in the long run.
24
Addressing Data Consistency Issues
25
We recommend that you scan regularly to get a more up to date and consistent
vulnerability posture of your assets.
Also simplify scanning by limiting the number of option profiles configured in your
account.
We recommend that you setup appropriate user roles in your Qualys account to
restrict who is allowed to make changes to the option profile settings. It is also
important to apply appropriate change management policies to your scan job
configuration to prevent ad hoc configuration changes.
25
consider purging s such vulnerabilities.
25
Patched but still vulnerable?
Examine Results section for the Is the vulnerable Windows asset
vulnerability QID in scan report pending reboot following patching?
26
At times, you’ll find patched vulnerabilities still appearing in your scan results and
reports. This happens for various reasons, like old registry keys, DLL or temp files,
pending reboot etc.
To investigate why the vulnerability is still being flagged, open your Scan Results, and
look at the Results section of the QID in the scan results or report.
Also identify if such hosts are pending reboot following patching. QID 90126 can be
used to build a dashboard widget or added to a Search List as a filter to identify such
assets pending reboot. Note that you must perform authenticated scans to accurately
identify hosts that are pending reboot using this QID.
Lastly, keep in-mind that discrepancies in your vulnerability findings can be resolved
by performing an additional scan. When analyzing such discrepancies, compare the
"last detected" date of the suspect finding to the date of your report. Wide gaps
between the last detected date and the report date could be an indicator that an
additional scan is required.
26
Identify Stale Records
By Qualys Query Language (QQL) By Asset Search
Commonly used criteria for
identifying stale records:
• Assets not scanned in 90 days
• Agents not checked in in 90
days
• EC2 instances in a terminated
state By Asset Tag Rule
• Inactive\Decommissioned
Assets
27
There could be several criterial used to identify stale records. Common ones include
assets that haven’t been scanned for a certain no of days, AWS EC2 instances in a
terminated state, inactive or decommissioned assets, etc. Once assets are identified
and validated, you can purge such assets via the Qualys UI or API.
You can search for such assets using Asset Search in the VM/VMDR application . You
can also use search queries to search for required assets or build dashboard widgets
to identify assets for purging. You can also build widgets using search queries to
automatically identify assets for purging. Lastly, you can also use asset tag rules to
automatically identify and tag assets for purging.
27
Purging
• Purging refers to removal of stale scan data (host-based findings) to ensure
that it accurately reflects the environment.
28
28
Purging refers to the removal of stale asset data from your Qualys account. Purging is
required when a host is decommissioned or used in a completely new role - new
operating system, new applications, new purpose. Purging becomes very important in
highly dynamic and ephemeral environments where assets are replaced or deleted
very frequently such as in Cloud provider environments.
28
Purge vs Remove IP?
29
29
While purging allows you to retain the IP in your subscription and delete the
associated data from your subscription, removing the IP causes the IP and associated
data to be deleted from your subscription.
Purging is recommended when the IP has been reassigned to another asset or the
asset has been assigned to another role.
Removing is recommended when you no longer to the scan the IP. In practice,
removing an IP is seldom used, as in most cases the same IP is reused and assigned to
another asset. So, purging the IP is better suited for most scenarios. This way when a
new asset is assigned the IP of a decommissioned asset, you don’t need to add the
asset again to your Qualys account to scan it.
29
Impact of Purging vs Removing an Asset
Impacted Entity Purge Remove
Inventory Information Deleted Deleted
Vulnerability History Deleted Deleted
Remediation Tickets Deleted Deleted
Comments No change Deleted
Host Assets No change Deleted
Asset Groups No change Deleted
Authentication Records No change Deleted
Scan Findings No change Deleted
Scheduled Scans / Reports No change No change
Global Exclusion List No change No change
30
30
30
Before you purge
Consider:
• Size of environment
• Level of automation
• How frequently IP gets re-used
• Decommissioning of assets
Consider:
• How often assets are decommissioned / purged ?
• How stale is the asset before purging ?
31
31
Before you start purging, consider the size of your environment and how many IP’s
you intend to purge. Purging a large number of IP’s can take time. If you need to
purge on a regular basis, it’s a good idea to automate this using APIs.
Also note that once you purge an asset, all host scan data (findings) for the asset is
removed from your Qualys account, and this action is irreversible. So, consider
exporting host scan data for the concerned asset before purging. We recommend
using Qualys APIs for exporting this data as APIs are better suited for bulk data export
operations.
31
Lab 3: Purging
• Identify Stale Records
• Purge an IP
• Remove an IP
15 mins
Please consult pages 13 to 19 in the lab tutorial
supplement for details.
32
Reporting Options
This section provides an overview of the options that can be used for vulnerability
reporting.
Reporting Options
Option User Scope Interactive Batch Vulnerability Details Report Data Format
VM Templates Qualys & Non- X High Level & Detailed CSV, DOCX, HTML, MHT,
Qualys Users PDF, XML
Hybrid – VM Qualys & Non- X High Level & Detailed CSV, DOCX, HTML, MHT,
Templates & APIs Qualys Users PDF, XML
Third Party Non-Qualys X High Level & Detailed Varies depending on
Integration Users third party application
(QRADAR, Splunk,
ServiceNow, etc.)
34
There are multiple ways to get data with Qualys – queries, widgets and dashboards,
VM reports, and API. The table in this slide indicates the various options that can be
used for reporting. Some of the factors that decide the choice of a particular option
include accessibility by Qualys\non-Qualys users, interactivity, level of details that can
be included in the report and report data format. Reporting using Dashboards, QQL
queries and VM templates are covered in this course.
On-Demand QQL Queries are interactive in so far as you can refocus the view until
you reach the format most meaningful to you.
*When using APIs for exporting data from your Qualys account note that not all API
extracts support JSON. Please consult the API guides for specifics.
Please subscribe to the Qualys API Fundamentals Self-Paced Course for more
information on using APIs for reporting.
34
Where should I get my data?
Am I tryi ng to get an answer to a quick one-time question?
Examples:
• How many assets do I have with this CVE?
• Wha t does the vulnerability posture l ook like of a single host?
• How do I get a quick list of hosts that need patching?
Answer: Us e queries
35
Queries – this is the fastest way to get data and is best-suited when you’re looking for
quick answers, typically to one-time questions. Examples include – how many of my
assets are vuln to a specific QID, how many vulns of severity 5 exist, how many hosts
have not been scanned in the past 30 days, how many hosts with a specific operating
system or software exist.
Widgets and dashboards – this allows for visual representation of data. This includes
count, bar, table and pie graph widgets. Use widgets for data needs to be constantly
monitored. Examples include – assets taking long to scan, assets not rebooted, count
of vulns, distributions of operating systems etc.
Qualys APIs, VM/VMDR, Threat Protection (TP) and CyberSecurity Asset Management
(CSAM) / Global AssetView (GAV) are commonly used for fetching asset and
vulnerability data for reporting.
While AssetView is also widely used, it has reached its end-of-life (EOL) stage and will
go away soon. Please contact your Qualys TAM for more information on AssetView
EOL.
35
Where should I get my data?
Am I tryi ng to get in-depth technical vulnerability data for many
hos ts?
Examples:
• I wa nt a full list of all my patchable vulnerabilities that a re severity
5 on my workstations
• Am I tryi ng to audit my patching program?
Answer: Us e VM Reporting
36
VM/VMDR Reports – this should be used when you want detailed technical reports.
These reports can be customized to show only specific data such as patches,
malware, threat, compliance etc. and can be shared with other teams. This should
also be used when you want to automate reports.
Qualys APIs – use this when you want to download large amounts of data. APIs are
also used when you’re trying to integrate Qualys with third-party applications like
Splunk, ServiceNow, etc.
36
Reporting - Dashboards, Widgets, and Queries
This section provides an overview of the considerations for using interactive reporting
options such as dashboards, widgets and queries for vulnerability and asset tracking.
Interactive Reports and Batch Reports
Interactive Batch
(Dashboard) (Reporting)
Dashboards and Reporting are two sides of the same "Data Visualization" coin
Dashboards are interactive reports…so there's no need to change the approach between
reporting and dashboarding schemas.
38
Comparing dashboarding and reporting data is not as cut and dry as you might think.
In-depth understanding of your detection data, proper query formatting and proper
template/search list selections is/are required.
Some considerations...
•All dashboards are not created equal
•To process historical data properly, be sure to specify date/time in queries:
lastVmScanDate, lastPcScanDate, lastCheckedIn, firstFound, lastFound.
Also, dashboard trend graphs are not meant to be an audit-ready method of tracking
data over time. The data is too volatile for that, as it can easily be wiped with a
widget change. It is designed to be a visual indicator that something changed, so a
major change in the widget count can be noticed. It only provides context for the
count, because without it, you only have a current-state number.
38
Dashboards, Widgets, and Queries
Query:
• A quick answer to a question about your asset, threat, or vulnerability data
• A command given to get a list of data
Widget:
• A visual representation of a query
• Building block of a dashboard
• Can show trending data
Dashboard:
39 Comprised of widgets, usually with a common theme
If you’re looking for an answer to a quick question, use a Query. This includes
examples like – how many devices have a specific port open, how many devices have
an SSL vulnerability, how many devices have a zero-day vulnerability etc.
If you’d like to visually represent a query, use a Widget. Widgets can be pinned on
dashboards and tracked over a period of time.
Dashboards are made up of multiple widgets. Widgets having a common theme are
placed in a single dashboard. For example, a dashboard for SSL/TLS, a dashboard for
Cloud Agent health, a dashboard for WannaCry vulnerabilities etc.
39
Dashboard, Widget, and Query Locations
VM/VMDR Dashboard:
• Query NEW, ACTIVE, REOPENED and FIXED vulns • TP is included with VMDR
• For accounts with VM, TP must
• Results are returned as Assets and Vulns
be included in your subscription
package to use RTI query tokens
Threat Protection (TP):
• Correlate with external threat feeds and prioritize patching
• Use Real-time Threat Indicators (RTI’s) with your search queries
40
Queries, widgets and dashboards can be used across multiple apps in Qualys.
Knowing which app to use will help you get the required data fast.
VM/VMDR Dashboard – this has more powerful and flexible search options. It is
designed to give you a list of asses AND list of vulns matching your search query. It
includes NEW, ACTIVE, REOPENED, and FIXED vulnerabilities.
Threat Protection is included with VMDR and provides RTIs to the VMDR
Prioritization Report, that will help you identify the potential impact of discovered
vulnerabilities, as well as vulnerabilities that have known or existing threats.
Global AssetView (GAV) / CyberSecurity Asset Management (CSAM) - use this to get a
more granular picture of your assets. This includes standard asset data collected in
40
AssetView plus details such as manufacturer name, product name, software version,
hardware and software product release dates, end-of-life dates and license
categories.
40
Dashboarding Best Practices
• Align dashboard queries with client security policies, standards and guidelines.
• Dashboard routine should coincide with scanning routine. For example - if you scan
weekly, query now-7d.
• Import dashboards when possible – Search for Dashboards on Qualys Community
• Trend graphs are designed to be a visual indicator that something changed, so a
major change in widget count can be noticed.
41
The queries used to populate your dashboards should align with your security policies
and your scanning routines. For example, if you’re scanning every week, use now-7d
in your queries. For example, vulnerabilities.firstFound: now-7d.
Trend graphs should be used when you need to monitor the variance of a specific
metric, such as, assets not scanned in the last 30 days, total vulns fixed in the last 7
days etc.
For more information on dashboarding best practices please consult the FAQ on
https://success.qualys.com/discussions/s/article/000005976
41
Getting Started with Dashboards
(most effort)
42
You can create your own dashboard using existing widget templates that we provide,
customize existing widgets or create your own widgets to suit your need.
Creating Dashboards Using Template
Qualys provides ready to use templates for dashboards that you could quickly add to
your list of dashboards and start monitoring your assets. Amongst the templates,
choose the one that suits your need of data population for your
assets and create a dashboard. Your dashboard is ready to use. You could add more
widgets to dashboard, edit existing widgets, change the layout of widgets and many
more things in your dashboard. New templates are regularly
added to the template library in your Qualys account as and when these are
published.
42
Creating Dashboards From Scratch
This involves the most effort as you will need to create your own widgets using search
queries. A good understanding of query tokens and query formatting requirements
and best practices are a prerequisite to using this approach to build your own custom
dashboards and widgets.
42
Unified Dashboard
This section outlines the features and benefits of the Unified Dashboard (UD).
Introduction
Unified Dashboard (UD) brings information from all Qualys applications into a single
place for visualization. UD provides a powerful new dashboarding framework along
with platform service that will be consumed and used by all other products to
enhance the existing dashboard capabilities. You can use widget builder and
improvise dashboards to make it uniform across all products.
44
⎼Multi-dimensional group-by
⎼more to come…
Please consult the following document to know how to enable the Unified Dashboard
in your Qualys account:
https://success.qualys.com/discussions/s/article/000006183
44
Template Library
• Leverage multiple
out-of-box
dashboards and
widgets using the
Template Selector
45
UD enables security teams can see their IT asset inventory along with vulnerability
and the current patch posture breakdown for their organization in one place. UD can
cohesively and dynamically work with Global IT Asset Inventory, EDR, Vulnerability
Management, Patch Management, and many more widgets to give a single view of
your enterprise.
45
VM/VMDR Dashboard
47
The VM/VMDR Dashboard allows you to query your assets and vulnerabilities. It
includes FIXED vulns, along with NEW, ACTIVE and REOPENED.
Unlike AssetView, where your query results are primarily in the form of assets,
VMVMDR Dashboard allows you to view results in the form of assets or
vulnerabilities.
47
VM/VMDR Search
Switch between Asset and Vulnerability search queries Click + to add Search box
1 2
3
Switch between Asset and Vulnerability findings
48
The Vulnerabilities tab gives you an integrated, incremental search and browse
experience to help you find all about your assets.
Choose Vulnerability to display vulnerability data or Asset for asset data. From there
you can easily browse the data list and explore details.
How to Search
https://qualysguard.qg2.apps.qualys.com/portal-
help/en/assetview/assets/asset_search_samples.htm
48
Organize and Filter Data
49
The Group By option help you organize your data. For example, you can select Group
By Severity, then click Vulnerability Count for severity 5 to see all severity 5
vulnerabilities .
The Filters option lets you choose the type of vulnerabilities to filter the
vulnerabilities further. By default, Fixed, Disabled and Ignored vulnerabilities are
excluded from the search results. Information Gathered (IG) QIDs are also
excluded. You can uncheck the appropriate checkbox(s) under Filters if you wish to
see these excluded vulnerabilities\QIDs in the search results.
49
Query Formatting Recommendations
Don’t mix query tokens Change global exclude filters when checking for
vulnerability status
No vulnerability queries should go here
No asset queries should go here
When you are working on a dashboard that contains more than one data source
query box as indicated by the plus sign on the right of the query search box, make
absolutely certain that you only include the tokens applicable to the data source
indicated on the left of the query search box. In other words, do not enter asset
tokens in the vulnerability box, and vice-versa. Doing so will produce invalid results.
Next, when working in the VM/VMDR dashboard, note that nesting within a query is
only required for ASSET, not for VULNERABILITY type of queries.
Also avoid the use of NOT clause within vulnerability queries and opt instead
to using explicit includes vs excludes to improve accuracy.
Next, note that by default, Information QIDs and Fixed, Disabled and Ignored
vulnerabilities are not included in the search results. So when using the query tokens
to list vulnerabilities by their status ,you need to UNCHECK the appropriate checkbox
under Filters to list all vulnerabilities including FIXED or Disabled or Ignored
50
vulnerabilities and Information gathering QIDs.
We also recommend that you try to reduce the use of range queries, where possible
to improve query performance. The checked queries indicate the most performant
queries.
Lastly note the Maximum Character Limits for using queries. For Query Tokens this is
limited to 256 characters and for Query String it is 4096 characters. Note that these
limits are inclusive of any alphanumeric characters, special characters and spaces
used in the search query.
50
SLA and Management Information
51
51
This is an example of how you can represent your corporate remediation SLA within
your VM/VMDR dashboard using custom widgets.
51
Critical and High SLA Queries Tips:
• Be specific when choosing target(s) for
your query
• Use a good naming convention for your
Asset Groups/Tags
Asset Tag names are case sensitive
52
This slide illustrates some of the queries used to build the custom dashboard widgets
illustrated in the previous slide.
The first query looks for all external facing assets that have vulnerabilities with
CVSSv3 Base score of 8 and above and which have been first found more than 1 day
ago:
tags.name:"External Assets" AND
vulnerabilities.vulnerability.cvss3Info.baseScore>=8.0 AND
vulnerabilities.firstFound<now-1d
The second query looks for all external facing assets that have vulnerabilities with
CVSSv3 Base score of 6 and above but less than or equal tp 7.9 and which have been
first found more than 7 day ago:
tags.name: "External Assets" AND
vulnerabilities.vulnerability.cvss3Info.baseScore>=6.0 AND
vulnerabilities.vulnerability.cvss3Info.baseScore<=7.9 AND vulnerabilities.firstFound
<now-7d
Qualys recommends using a good naming convention when using Asset Groups
52
and/or Asset Tags for organizing and managing the IT assets in your Qualys account.
We also recommend being specific when choosing a target(s) for reporting. Also note
that asset tag names are case sensitive.
Please consult
https://qualysguard.qualys.com/qwebhelp/fo_portal/host_assets/tags_asset_tagging
.htm for more information on getting started with Asset Tags.
52
Authentication Dashboard
• Dashboards enables you to be more pro-
active in your authentication management of
Qualys Scans.
• Authentication dashboards:
• Allow to drill-down into details
• Updated automatically
• Provide more details regarding authentication
failures compared to authentication reports
53
Lab 4: VM/VMDR Dashboard
• Faceted Search
• Search Queries
• Create Dashboards and Widgets using Templates
• Create Custom Widgets 30 mins
• Import Dashboards
54
Threat Protection
This section explains how Threat Protection can be used to prioritize vulnerabilities
for remediation. Threat Protection datasheet -
https://www.qualys.com/docs/threatprotect-datasheet.pdf
55
Prioritizing remediation
56
There are several parameters that you can use to determine which vulns to fix first.
A common way of doing this is to use the Qualys severity ratings and start with the
high priority ones. This includes severity 4 and 5 vulns. You may also include other
factors such as an exploit being available, a malware associated with the vulnerability,
how important is the asset and whether it affects your overall compliance posture.
Another way to prioritize is to look at CVSS scores.
Qualys Threat Protection provides real-time threat indicators that can also be used to
prioritize remediation. These RTI’s correlate your vulnerabilities to external threat
vectors such as zero-day, denial of service attacks, etc.
56
How to prioritize remediation
57
To prioritize remediation, at the most basic level, you need to be aware of all the
hardware and software in your organization. You must have a complete, unobstructed
view of your IT environment at all times, and be instantly aware of its changes.
Just like you must have a clear and deep knowledge of your organization’s IT assets,
YOU ALSO NEED TO PLUG INTO THE FIREHOSE OF EXTERNAL VULNERABILITY
DISCLOSURES, SO YOU’RE AWARE OF THE LATEST THREATS OUT IN THE WILD.
Once you have a comprehensive view of your IT asset landscape and vulnerability
disclosures, you need to correlate these, continuously. This will give you a dynamic
snapshot of all the vulnerabilities that exist in your IT environment at any given
moment.
Once you have correlated your internal and external threat data and identified
impacted IT assets, you must be able to drill down on the data, mine it for patterns,
slice and dice it, aggregate it in custom reports and represent it graphically. You
should be able to measure your progress and remediation efforts with real-time trend
analysis and generate scan and patch reports for your stakeholders.
57
Finally, you should factor in various criteria for assessing how critical certain threat
scenarios are in your organization’s specific context using actionable intelligence.
57
Threat Protection
58
Threat Protection allows you to identify assets associated with threats, not just
having vulnerabilities. This way you can prioritize those assets that have a higher risk
and that have multiple threats associated with them.
58
Sources of Threat Feeds
Exploit Sources Malware Sources
Source Type Data Type Source Type Data Type
Core Security PoC Exploits mapped to CVEs Reversing Labs CVEs associated with
malware
Exploit-DB PoC Exploits mapped to CVEs
Trend Micro Malware names
Metasploit PoC Exploits mapped to CVEs associated with CVEs
McAfee Ransomware mapped to
Contagio Dump Exploit Kits mapped to CVEs
CVEs
The table on this slide lists threat data subscriptions used by Threat Protection.
59
Threat Protection in VMDR Lifecycle
VMDR®
Patch Threat Risk and
Management Prioritization
60
The VMDR Lifecycle, begins (step 1) by identifying and managing all assets
throughout your business or enterprise architecture.
Once your assets have been discovered, the next step is to scan them for
vulnerabilities and configuration gaps and report on the findings.
Next step is to identify vulnerabilities associated with different threats and prioritize
them based on the threat perception. When you have lots of assets that need to be
patched, or lots of patches that need to be applied, it
becomes important to prioritize. Which asset to patch first and which patch to
deploy? Threat Protection allows you focus on vulnerabilities that have threats
associated with them. Examples include zero-day, denial of service,
actively attacked vulns etc.
In the final step of the VMDR Lifecycle (step 4), Qualys Patch Management (PM) then
allows you to respond to detected vulnerabilities and threats, within days or even
60
hours, rather than weeks or months.
60
VMDR Prioritization Report
• Threat Protection (included with VMDR) provides Real-Time Threat Indicators to the
Prioritization Report
• RTIs provide accurate, timely and actionable information aggregated from multiple
61 reliable data sources to prioritize and shrink flood of security alerts
The VMDR Prioritization Report is designed to help you prioritize and patch
vulnerabilities, using multiple factors, including: Asset Context, Vulnerability Age,
Threat Intelligence, and Attack Surface dynamics.
The Qualys Threat Protection application (which is part of VMDR) provides Real-Time
Threat Indicators to the Prioritization Report, that will help you identify the potential
impact of discovered vulnerabilities, as well as
vulnerabilities that have known or existing threats.
Simply select the threat indicators you want to use to prioritize vulnerabilities. If you
select multiple threat indicators, be sure to select the appropriate logical operator, in
the upper-right corner.
Match Any == OR
Match All == AND
Real-time Threat Indicators are data points collected per vulnerability. It is accurate,
timely and actionable information aggregated from multiple reliable data sources to
prioritize and shrink flood of security alerts.
Current Real-time Threat Indicators are categorized into 2 types:
61
Potential Impact Real-Time Threat Indicators:
1. High Data Loss
2. High Lateral Movement
3. Wormable
4. Denial of Service
5. Patch Not Available
6. Privilege Escalation
7. Unauthenticated Exploitation
8. Remote Code Execution
Please subscribe to the VMDR training course to learn more about the VMDR
prioritization report.
61
Lab 5: Threat Protection
• View and customize threat feeds
• Import Threat Protection Dashboard
62
UI (Batch) Reporting – Best Practices
This section provides an overview of Qualys UI reporting related best practices and
philosophy.
Reporting Best Practices
• Implement appropriate asset housekeeping and data hygiene practices to maintain data
consistency
• For best results, use Host-Based reports with targeted asset groups and/or asset tags and
focused search lists vs Scan Based reports
• Reporting routine should coincide with scanning routine - if you scan weekly, report weekly.
• Maintain a consistent reporting structure over time for improved trending results.
• Engage report consumers frequently and assess how reports can be best aligned with
maintenance processes
• Consider leveraging the Qualys API to create a hybrid report archival program
• Take advantage of Qualys API integrations (e.g. Splunk)
Remember:
Qualys UI Reporting is intended to generate reports that are easy to read,
understand and prioritize, not for exporting every vulnerability from a subscription.
Qualys UI Reporting is not designed for large scale data exports. Qualys provides
APIs for large data exports e.g. exporting every vulnerability from a subscription.
For best results, use Host-Based reports with targeted asset groups and/or asset tags
and focused search lists vs Scan Based reports.
Please consult https://qualys-secure.force.com/discussions/s/article/000006215 for
focused search lists that make it possible to track, and quickly spot or check, relevant
indicators in your environment.
64
Reporting routine should coincide with scanning routine - if you scan weekly, report
weekly.
Maintain a consistent reporting structure over time for improved trending results.
Engage report consumers frequently and assess how reports can be best aligned with
maintenance processes.
Qualys provides APIs for large data exports e.g. exporting every vulnerability from a
subscription to create a hybrid report archival program.
You can also take advantage of Qualys API integrations with third party applications.
E.g. the Qualys App for Splunk Enterprise pulls (via the TA-QualysCloudPlatform)
vulnerability and compliance detection data from your Qualys account and puts it in
Splunk for easier searching and reporting.
64
Reporting Philosophy
Use reports to drive security and operational activities:
▪ A Patch Report sorted by patch, is an excellent source for an operations team that is going to push
out patches
▪ Use the Scan Report Template to build detailed reports containing prioritized/urgent vulnerabilities,
results, and patches
Use reports that contain useful metrics to assess the progress of your vulnerability management
program:
▪ Dashboards allow you to see high level data
▪ Fixed Vulnerabilities Report lists vulnerabilities fixed in the specified timeframe.
▪ Remediation Reports can be used to measure the effectiveness of your patching program
▪ Use trend reports, such as the Executive Report, to assess “Business Risk by Asset Group Over
Time”
65
You can also build a patch report to show the necessary patches required in your
environment. Best practice is to sort by patch.
Using dashboards, you can see high level data on assets and vulnerabilities you want
to track. They also allow you to query your data quickly.
Vulnerability Scorecard reports can help you define a goal for remediation and see
how you are doing it.
65
Report Generation
Major attributes that affect Report Generation:
• Amount of data the platform must process (trending)
• Amount of data in the output file:
• Number of assets
• Number of detections
Suggestion:
• Reduce the trending period and/or filter the vulnerabilities using focused search
lists and/or use focused asset targets.
• Else, consider API for data export.
Reporting Best Practices FAQ
https://success. qualys.com/discussions/s/article/000005984
66
Suggestion: Reduce the trending period and/or apply vulnerability filtering and/or
apply asset filtering. All these actions will reduce the data the Qualys platform has to
process and increase the success rate.
66
Authentication Report
When running an authentication report, you must first define the report format. The
PDF file format is commonly used, with "scheduled" authentication reports. Other
options include: HTML, CSV, and XML.
Next, select the assets to report on. This can be either Business Units, Asset Groups,
IP, or Asset Tags. The option you select here determines how the report data will be
grouped.
Host assets from the target you select will be listed along with the status (PASS/FAIL)
of the last authentication attempt.
68
Lab 6: Authentication Report
• Authentication Report
69
Report Template
This section outlines the steps to create a vulnerability report and the two types of
findings that can be included in a report.
Steps to Create a Vulnerability Report
71
Before you can create a custom vulnerability report, you'll first need to perform an
assessment of targeted host assets, to collect the host data that will ultimately
produce various findings. Presently, Qualys provides two different ways for you to
perform a host assessment: You can launch a scan using a Qualys Scanner Appliance
or you can deploy Qualys Cloud Agent directly onto your host assets.
Once you have used scanners or agents to collect your host data, you'll then build or
create a Report Template that contains your custom reporting preferences.
When you have a Report Template that satisfies your needs, you'll use it to generate a
report for host assets you target.
It's important to note that data collection via scanner appliance or agent must be
completed first before generating a report.
71
Scan Based Findings
• Scan Based findings (or “raw” scan reports) are found under the “Scans”
tab.
• Scan Based findings are ideal for “snapshot” reports that target a specific
point in time.
72
You can view all of your SCAN data within the Vulnerability Management application
by clicking the "Scans" menu, followed by the "Scans" tab. These are your Scan Based
findings.
Every vulnerability scan performed within your Qualys account is listed here; not
counting, of course, any scans that have been deleted.
If you want to create a report that focuses on data and findings collected at a specific
time--on a specific date--your report should use Scan Based findings.
72
Scan Based Reporting Key Points
• Only a Qualys Scanner Appliance generates “Scan Based” findings (CA data is
only accessed from the “Host Based” findings database).
• Reports that use Scan Based findings do not display vulnerability status (e.g.,
new, active, fixed, reopened) or trending data. Each report represents a
“snapshot” in time.
• Reports that use Scan Based findings are commonly used for scan analysis and
troubleshooting purposes:
• Example: Why did authentication fail for nine Windows hosts, last Tuesday?
73
Scan Based findings are only generated for assets that have been scanned with the
Qualys scanner appliance. Since the Qualys Cloud Agent is in an automated
continuous scan mode, it only generates Host Based findings.
Scan Based findings include point in time snapshots of the assets. As a result,
vulnerability status is not displayed.
Most of the time you’ll be using Host Based findings – this focusses on the latest
posture of the asset.
Scan Based findings are occasionally used to view a past-dated posture of the asset or
for troubleshooting purposes – like how did it take to scan a host on a day, did
authentication pass or fail, which authentication protocol was used, how many hops
were detected, etc.
73
Host Based Findings
Scan Based Findings
Scan Scan -----
Scan
1 2 n
74
All Scan Based findings are poured into another bucket known as the Host Based
findings.
The Host Based findings database collects data from completed scans and indexes
each detected vulnerability according to the "tracking method" you have selected for
each host asset.
Host Based findings will allow you to view the vulnerability history of any host asset,
and unlike Scan Based findings; Host Based findings allow you to create vulnerability
"trend" reports that track the status of any vulnerability (from new, to active, fixed, or
reopened) on any host.
74
Host Based Findings
• Changes in authentication mode (trusted vs. untrusted).
75
When working with Host Based findings, be aware of the impact made by: 1)
Changes in authentication mode, 2) Changes in the targeted service ports, and 3)
Changes in host "LIVE/DEAD" status
Another factor to consider when working with Host Based findings are changes in
host name or IP address. If a host is configured to use its host name or IP address to
track its detected vulnerabilities, any changes to the host name or IP address could
potentially result in vulnerabilities being associated with the wrong host. Purging the
host-based findings immediately following a host name change or IP address change,
is a commonly used practice.
When analyzing such discrepancies, compare the "last detected" date of the suspect
finding to the date of your report. Wide gaps between the last detected date and the
report date could be an indicator that an additional scan is required.
75
Asset Tags
• Using Asset Tags allows you to include hosts that match certain criteria,
even if your network is constantly changing as hosts are added and
removed.
• For example – all windows hosts, or hosts with port 443 open
76
Asset Tags can be used as targets for your reports. Tags allow you to target hosts
without worrying about hosts changing IP addresses. Asset Tags support
include/exclude where asset groups and IP ranges do not, or not without extra effort.
76
Lab 7: Host Based and Scan Based Findings
20 mins
Please consult pages 40 to 47 in the lab tutorial
supplement for details.
77
Hosts with Cloud Agents
In this section, we’ll focus on report settings and options available for Cloud Agent
hosts that are also scanned with a scanner appliance.
One Host...Two Different Sources
Scanner
• By default, Scan data and Cloud Agent data are displayed separately
in reports
• Configure Asset Tracking and Data Merging options for your Qualys
Cloud Agent account to merge data into a single unified view
79
When you use a Qualys scanner appliance to scan a cloud agent host, the scan data in
your account is kept separate from the agent data.
In this example a Windows host (IP address 192.168.1.242) is the source of both
AGENT data as well as SCAN data.
By default, when you run a report on this host you will see two records for the same
host. One record contains data collected by the scanner appliance, and another
contains data collected by the Cloud Agent. This is true for both authenticated and
unauthenticated scans.
Unifying scan data and agent collections is key for asset management, metrics and
understanding the overall risk for each asset.
To merge data from the scanner and the Cloud Agent into a single unified view, you
must enable appropriate Asset Tracking and Data Merging options for your Qualys
account. This is explained further in the subsequent slides.
79
Scanning Hosts with Cloud Agents
Note: Accepting both unique asset identifiers maximizes the probability of merge.
80
Note that once accepted, there are additional steps that must be completed before
you can start scanning with Agentless Tracking Identifier or the Agent Correlation
Identifier.
80
Data Merging
81
MERGE OPTIONS:
1. Do not merge data - Data collected from agents are displayed separate from data
collected by scanner appliances. Hosts with IP tracking enabled will display
separate asset records for all scanned interfaces.
2. Merge data by scan method - When combined with the Agentless Tracking
Identifier, option two merges data collected from from all scanned interfaces (i.e.,
IP tracking enabled) into a single asset record.
3. Merge data for a single unified view - Data collected from agents are merged with
data collected from scanner appliances into a single unified view.
4. Enable smart merging - Option three will be automatically selected for hosts with
agents installed. Option one will be used for hosts without agents.
When option number three is selected, SCAN data and AGENT data are merged
together into a single unified view.
81
Data Merging Options
Data Merge Options Merge SCAN data Merge multiple Description
with AGENT data host interfaces
82
The table in this slide indicates scenarios where Scan data from one or more IP
interfaces is merged with Cloud Agent data depending the Data Merging options
configured in the Qualys account.
82
Report Options for Hosts with Cloud Agents
This option must
be enabled for
unified view
Agent Data Agent Data, only Agent data PLUS Scan data af ter Agentless Tracking Identifier or Agent
Correlation Identifier was enabled
All Data Scan and Agent Data • Agent data PLUS Scan data af ter Agentless Tracking Identifier or Agent
Correlation Identifier was enabled
• Scan data bef ore Agentless Tracking Identifier or Agent Correlation
Identifier was enabled
83
When configuring the report template, under the Findings tab, we have a setting that
applies to hosts with Cloud Agents. Here we can choose to display the scan data or
data collected by the agent or both. When you make the selection here, the data
shown in the report is dependent on whether Unified View is enabled for your
subscription or not.
When you have Unified View disabled for your subscription, choosing scan data will
only produce scan data, agent data will only produce agent data and all data will
include both scan data and agent data displayed as 2 separate records.
When you have Unified View enabled for your subscription, and you select SCAN
data, the report will only include scan data before any of the unique asset tracking
identifiers were enabled for your subscription.
Choosing the Agent data option, will include AGENT data and any SCAN data that was
generated after any of the unique asset tracking identifiers were enabled for the
subscription.
And lastly, with All data selected, the report will include SCAN data from both before
83
and after any of the unique asset tracking identifiers were enabled. Plus you will also
have agent data.
83
Agent Scan Merge Scenarios
• While merging agent scans, there are different scenarios that may produce different
results
• Data merging will occur from the time of configuration going forward and will not
apply retroactively
• Stale records can occur when agent identifier and unified view are enabled and
Qualys is unable to retrieve the entity IDs (Host ID, Asset ID, Qualys Host ID,
Correlation ID, etc.) during a remote scan
• It may be necessary to identify and purge any stale records where necessary
84
While merging Cloud Agent data with scan data, there are different scenarios
depending on whether a scan (authenticated\unauthenticated) was run first or Cloud
Agent data was collected before any scan. These scenarios may produce different
results. Here are some of the scenarios to consider:
• Agent Collection followed by Unauthenticated scan
• Unauthenticated scan followed by Agent Collection
• Agent Collection followed by Authenticated scan
• Authenticated scan followed by Agent Collection
• EC2 hosts- Agent Collection followed by Internal EC2 scan
• EC2 hosts- Appliance Scan first (No IP tracked record and no agent
tracked record)
• EC2 hosts- Agent Collection first (No IP tracked record and no agent
tracked record)
Also, stale records can occur when unique asset identifiers and unified view are
84
enabled but the scanner is unable to retrieve the Agentless Tracking Identifier (due
to failed authentication) or the Agent Correlation ID (ports blocked, QID 48143 not
included in scan, etc.).
It’s necessary to identify and purge any stale records when above conditions
exist.
Identification of Stale Records with Agentless Identifier and Unified View Enabled
https://success.qualys.com/support/s/article/000006149
84
Report Template – Display Options
In this section, we’ll breakdown the various “Display” options in a Scan Report
Template.
Scan Report Template - Display Options
Remember..
The success rate for report generation depends on the amount of
data the Qualys Cloud Platform must process and the amount of data
that must be published on the output file.
Best Practice:
Ensure you’re building your reports as efficiently as possible.
86
A common theme you’ll find when building reports is considering the audience.
Whenever building a report, ask the question, for whom am I building this report?
Are you sharing this report with a high-level executive, or are you sharing it with a sys
admin who is going to be part of the patching program? Obviously, that will dictate
what goes in your report.
The next question you should ask is, what do they need to see?
The point is to make your reports as succinct at possible. You can always add more
information to your template if requested. Best practice is to ensure you’re building
your reports as efficiently as possible.
86
Graphics
• Consider your target audience,
when selecting graphics
options.
• Some graphics options require
“trending” data.
• Add a custom footer up to
4000 characters in length.
87
The next item we come to in the display section is graphics. Does the person viewing
the report care to see a graphic in the report that provides a breakdown what you’ve
checked?
A quick note on a couple of these options. If using the top two graphic options, you
have to be using trending host based findings over a period of time, otherwise these
options will be greyed out.
The custom footer allows you to put information at the bottom of your report. Maybe
you are distributing the report, and you want people know that it’s confidential.
87
Display Host Details
• Select the “Host Details” checkbox for additional Cloud Agent information.
• Select the “Host Asset Group Details” checkbox to show Asset Group associated with
the asset.
• Select the “Cloud Related Information” to include AWS EC2 and Azure Virtual Machine
metadata.
• Select the “Qualys System IDs” checkbox to include host identifiers such as host ID,
asset ID, etc.
88
Select the “Host Asset Group Details” checkbox to show Asset Group associated with
the asset.
For reports that target AWS EC2 and Azure Virtual Machine assets, select the “Cloud
Related Information” check box.
Azure metadata information: public IP address, image offer, image version, subnet,
VM state, private IP address, size, subscription ID, location, and resource group name
EC2 metadata information: public and private DNS name, image ID, VPC ID, instance
state, instance type, account ID, region code and subnet ID.
Select the "Qualys System IDs" check box to include host identifiers such as host ID,
asset ID in the host-based scan report template.
88
Include Detailed Results
Remember..
Qualys UI Reporting is intended to generate human-readable reports, not for
exporting every vulnerability from a subscription
89
If you’ve taken the Qualys vulnerability management course, you know that all
vulnerabilities or QIDs include A LOT of information.
Checking all boxes will increase the amount of detail, as well as the report size and
the amount of time required to generate the report.
When selecting included details ask: “What does the target audience need to see?”
What information is required to meet the objective at hand?
89
Lab 8: Report Display Options
90
Report Template – Filter Options
In this section we will breakdown the filter options within the Scan Report Template.
Scan Report – Filter Options
92
With the filter options you can start to filter down on the number and type of QIDs
along with the specific operating systems, giving you the ability to create specific
reports for the different teams in your organization.
92
Filter Reports Using Search Lists
• Use search lists to filter
the QID’s included in the
report.
• Add one or more search
lists.
• Use search lists to also
exclude QID’s from the
report.
93
93
Selective Reporting Using Search Lists
94
This is an example of how you can align your corporate severity rankings using Search
Lists.
This example uses CVSS Base Score to create a search list of external facing vulns and
CVSS Temporal score for internal facing vulnerabilities. The assets have been
identified using Asset Tags.
94
Use RTI’s with Search Lists
• RTI’s can be used to
create Search Lists.
95
Threat Protection RTI’s can also be used to build search lists. Multiple RTI’s can be
selected in a single search list.
These search lists can then be used with Option Profiles to limit your scan, and in
your reporting templates.
95
Vulnerability Filters
• Filter reports by
vulnerability status:
• New
• Acti ve
• Re-Opened
• Fi xed
• Filter reports by
vulnerability state:
• Confi rmed
• Potential
• Information Gathered
96
Vulnerability Filters allows you to define the status of the vulnerabilities you wish to
see in the report. A vulnerability can one of four statuses:
The first time a vulnerability is detected on an asset it’s status will be new. For any
vulnerabilities that have been detected more than once it’s status will be active.
When a vulnerability is no longer detected then it’s status will be fixed. For any
vulnerabilities that have been fixed and are rediscovered then the status is re-
opened. Please note that if you want to report on fixed vulnerabilities you need to
have the trending option in the findings enabled.
Along with the its status a vulnerability also has a state, with the default state being
active. Meaning that it actively scanned for and reported on. A vulnerability can also
be disabled via the knowledge base. Meaning it is globally filtered out from all hosts
in the scan report
96
An ignored vulnerability is a specific vulnerability that is ignored on a specific asset.
96
Non-Running Kernels Filters
- OR -
• Exclude non-running
kernels from the report.
97
By default, we report all vulnerabilities on all Linux kernels (the running kernel and
non-running kernels). Choose the display option to add a new section to your report
listing vulnerabilities on non-running kernels or choose the exclude option to filter
them out.
97
Pre-defined QID Filters
98
Select filters to exclude certain vulnerabilities from your reports like vulnerabilities
found on non-running ports/services and vulnerabilities that can’t be exploited
because of a host configuration. These filters apply to certain QIDs only.
98
Filter Superseded Patches
• Exclude older patches from reports that have been superseded by more
recent patches.
• Operating system vulnerabilities, only.
99
The exclude superseded patches when enabled will exclude any superseded patches
that fix a vulnerability. For example, if patch A and patch B both are needed on an
asset and if patch A is superseded by patch B, then with this option checked,
the report will only show patch B related QID and not have any information related to
patch A related QID. With this option unchecked, the report will list both the patches.
99
Patch Supersedence - Key Points
100
Remember using the 'Exclude Superseded Patches' feature is analyzing QIDs that are
flagged on hosts, not whether or not patches are installed or missing on those hosts.
100
search lists and patch supersedence.
Note that Scorecards reports and VM/VMDR dashboards do not currently support
patch supercedence.
Please consult the following links for more information on Patch Supersedence:
Patch Supersedence: How it works in detail
https://success.qualys.com/discussions/s/article/000006214
100
Filter by Categories
101
Each the QID’s in the Knowledge base are assigned a category. If you wish can filter
down the QID’s listed in the reporting by their category. For example. If you just
wanted to report on vulnerabilities in the TCP/IP category.
Qualys would normally recommend that you have all categories selected therefore
reducing the chances of some vulnerabilities not appearing in the report. If you want
to see a list of the vulnerabilities in a category this can be done using the search
feature in the knowledge base.
101
Lab 9: Report Filter Options
102
Scorecard Reports
103
Scorecard Reports
Note: Dashboards also provide high level data and can be used as an alternate to
scorecard reports where feasible.
104
The scorecard reports are designed to be high level reports. In that they do not
contain any technical details on the vulnerabilities or patches. Instead, they are there
to give you the overall security status of your assets.
The scorecard report has a set of predefined templates that can be customized or
used as is to run reports. These reports can also be scheduled to run automatically so
stakeholders regularly get high-level reports that help them understand the overall
security posture.
Please note that dashboards also provide high level data and can be considered
instead of scorecard reports where applicable. However, be aware of the differences
between these reporting tools. For instance, dashboards can only be accessed by a
Qualys user whereas you can schedule and share your scorecard reports to non-
104
Qualys users too.
Some considerations...
•All dashboards are not created equal
•To process historical data properly, be sure to specify date/time in queries:
lastVmScanDate, lastPcScanDate, lastCheckedIn, firstFound, lastFound.
•Comparing dashboarding and reporting data is not as cut and dry as you might think.
In-depth understanding of your detection data, proper query formatting and proper
template/search list selections is/are required.
Also, dashboard trend graphs are not meant to be an audit-ready method of tracking
data over time. The data is too volatile for that, as it can easily be wiped with a
widget change. It is designed to be a visual indicator that something changed, so a
major change in the widget count can be noticed. It only provides context for the
count, because without it, you only have a current-state number.
104
Scorecard Templates
105
These templates are, the Vulnerability scorecard report which shows the latest
vulnerability status of the selected assets.
The Ignored Vulnerability report, will list the ignored vulnerabilities on the selected
assets.
The most prevalent vulnerability report will list the top 10 most prevalent
vulnerabilities and the affected assets.
Most vulnerable hosts, will list the top vulnerable hosts with the number of
vulnerabilities at the defined severity.
The patch report will list assets that are missing specific patches and software.
105
Patch Report Template
This section explains the different options that can be configured in a Patch Report
Template.
Patch Report
107
The patch report is designed to list patches that need to be installed to fix the current
discovered vulnerabilities.
The patch report is most commonly used as online report which means that a person
viewing the report can navigate through the report content.
In this online format the report cannot be downloaded, but there are options to
download the report content in a PDF, XML, or CSV format.
Anyone who wishes to view this repot in its online format must have an account in
your subscription.
107
Patch Reports with Supersedence
108
When you use the patch report, the Qualys platform will automatically use the patch
supersedence. This means that any patches displayed in report will be latest patches
required to fix the QID. That patch may also be used to fix other QID’s and in that
case all those QID’s will be group together.
108
Display Patch Severity
109
With the Display patch severity setting you can define how the severity level for each
patch is displayed. The default of Assigned Severity means the patch severity in the
report will match the severity assigned to the QID for the recommended patch. For
example, if the KnowledgeBase has a QID for MS09-015 with severity 3, then the
patch for MS09-015 is listed with severity 3, even if other vulnerabilities fixed by the
patch have a higher severity.
If you wish to see the patch severity in the report to match the highest severity across
all QIDs detected on the host that can be fixed by the patch, then select Highest
Severity. For example, let’s say patch MS09-015 fixes three QID’s at severity levels 3,
4, and 5. If all three QIDs are detected on the host, then the patch severity is 5. If QID
at severity 5 is not detected on the host but the other QIDs are, then the patch
severity is 4.
QID 90492 (severity 3), QID 90397 (severity 4) and QID 90342 (severity 5). If all three
QIDs are detected on the host, then the patch severity is 5. If QID 90342 is not
detected on the host but the other QIDs are, then the patch severity is 4.
109
Selective Patch Reporting
110
By default, all available patches are included in the report. The filter option “Selective
Patch Reporting” allows you to identify patch QIDs to include or exclude from the
report. select Complete to show all known patch QIDs, select Custom to show only
specific patch QIDs, and select Exclude Patch QIDs to filter out certain patch QIDs
from the report.
For example, if you want to generate a patch report of Microsoft vulnerabilities but
you want to filter out service pack QIDs. In this case, you need 2 search lists. The first
search list includes vulnerabilities associated with the vendor Microsoft. The second
search list includes all vulnerabilities with “Service Pack” in the vulnerability title.
Use the “Selective Vulnerability Reporting” and select “Custom” and then add the
Microsoft Vulnerabilities search list. Only vulnerabilities associated with the vendor
Microsoft will be included in the report. Next use “Selective Patch Reporting” to
identify the patch QIDs you want to filter out of the report. Select “Exclude Patch
QIDs” and then add the Service Pack search list. Any QID associated with a Service
Pack will be filtered out of the report. Patch reports generated with this template will
include all Microsoft vulnerabilities that are not associated with service packs.
110
Lab 10: Patch Report
• Patch Report
111
Distributing Reports
112
Reporting Rollout
Consider:
• What reports should we run?
113
What types of reports should be run? You have a lot of scan data and cloud agent
data to chew through. What kinds of reports need to be run to ensure you are
prioritizing and remediating effectively and providing the right high-level data to
internal stakeholders?
Who is supposed to get them? Which users in the organization need to receive
reports in order to do their jobs effectively, and how can you ensure accountability?
Which users need to see high level reports to ensure the vulnerability management
program is working and which users need reports that help drive and/or verify
remediation.
When are they supposed to receive them? This is the process of scheduling reports
and automating as much of the vulnerability management process as possible.
113
Report Distribution
Distribute reports to Qualys users - Option 1
1. Manager assigns the required asset(s) to the non-manager user (Reader/Scanner role
users).
2. Non-manager user builds or schedules report using templates.
Distribute reports to Qualys users - Option 2
1. Manager builds the Report Template.
2. Manager assigns Template to non-manager user (Reader/Scanner role users).
3. Manager builds or schedules report using the template.
4. Non-manager user logs in and can automatically see the report.
114
- The Manager user schedules a report and includes the distribution group.
- When the report runs at the scheduled time, the users in the distribution group
will receive an attachment or link (depending on the configuration) to access the
report.
114
Scheduling Reports
115
Scheduled Reporting
116
Scheduled Reporting
Like with mapping and scanning, users can schedule reports to run automatically at a
scheduled time, on a recurring basis. Users can also set options to notify select
distribution groups when a report is complete and ready for viewing.
Schedule a Report
There are several report types that can be scheduled. You can schedule template-
based scan reports (set to Auto source selection), scorecard reports, patch reports,
template-based compliance reports and remediation reports.
To create a new report schedule, go to Reports > Schedules and select the type of
report you’re interested in from the New menu. In the example below, a new
template-based scan report will be scheduled.
116
Scheduled Reports Setup
117
When configuring scheduled reports, there are four options to distribute them:
Attachment or Link – with this option, the report is sent as an attachment if it’s under
5MB in size, else a link is sent.
Attachment Only – with this option, the report is sent an an attachment if it’s under
5MB in size, else no report is sent.
Link Only – with this option, a report link is always sent.
Don’t Send the Report – with this option, the report is not sent as an attachment or
link. The user will need to login to the Qualys console to view the report.
Note that when a report is sent as a link recipients must download the report from
the link as soon as possible as the report is deleted from the report share after
7 days or earlier (if the user share limit reaches the maximum allocated size).
117
Distribution Groups
You can choose distribution groups for several email notifications, including scan
notifications, report notifications and the vulnerability notification. For example, you
can notify the group when a scan or report is finished.
You can create Distribution Groups from under the User-> Distribution Groups tab in
the VM application.
You can include email addresses for users in the subscription (simply select users
from the list) and include email addresses for users outside of the subscription by
typing them into the field provided.
118
Subscription Set Up
By default, every Qualys user has 200 MB for report storage. A Manager user can
increase this to up to 500 MB per user.
Secure PDF distribution can be enabled to encrypt the PDF reports.
These settings can be found under Reports > Setup > Report Share.
119
Scheduling and Report Notification
120
To create a new report schedule, go to Reports > Schedules and select the type of
report you’re interested in from the New menu. The New Scan Report page appears.
SCHEDULING
Define a start date and time for your scheduled report, and how often you’d like the
report to run. You can schedule the report to run daily, weekly or monthly on the days
that you specify.
REPORT NOTIFICATION
Define who should be notified when the report is complete and ready for viewing.
The report notification will be sent to all email addresses listed in the selected
distribution groups, including users with Qualys accounts and those who do not have
accounts. You may customize these attributes of the email: the sender (you or Qualys
Support), the subject line, and the body of the email. If the generated report is less
than 5MB it will be sent as an attachment to the email in the format in which it was
generated. If greater than 5MB a link will be provided in the email instead of the
attachment.
Note that when a report is sent as a link recipients must download the report from
the link as soon as possible as the report is deleted from the report share after 7 days
or earlier (if the user share limit reaches the maximum allocated size). A good
practice is to add such information to the Custom Message area so that report
recipients are aware.
120
Scheduled reports will appear on the Schedules list and your report will run at its
scheduled time.
120
When is the Best time to run a Report?
Calendar View
You should also consider Cloud Agent scan activity when reporting on agent hosts.
This part is a little trickier as not all cloud agents may upload scan data to the Qualys
cloud platform at the same time. Using queries (lastFullScan) or
dashboards to track Cloud Agent activity to determine the best time to run reports on
agent hosts in your environment.
121
Scheduling Calendar
Sunday Monday Tuesday Wednesday Thursday Friday
Patch Report –
San Jose
Patch Report –
San Jose
Patch Report –
San Jose
122
This is an example of how your reporting activities can be scheduled over a week.
Vulnerability scans are scheduled to occur over the weekend. These scans are
authenticated scans.
The first thing to do post an authenticated scan is to verify authentication status. If
authentication fails, all QID’s cannot be tested. So, it is important to first verify that
authentication was successful, this is achieved using Authentication Reports – these
are scheduled to be distributed automatically on Monday.
Patch reports are scheduled to occur on Tuesday, and these are automatically
distributed to the patching teams.
Scans, authentication and patch reports are repeatable tasks and can be scheduled to
occur automatically.
When there’s a major vulnerability release (e.g. high severity exploitable
vulnerability), it will need to be fixed immediately. We’ll need to scan and report on
this vulnerability everyday, until it is no longer found on the network.
One-off reports can be generated manually to check for assets that are missing a
critical software, check remediation metrics, look for scan-based findings etc.
Reports like fixed vulnerability report and executive summary can help you measure
progress. These reports can be scheduled to occur monthly and configured to be
distributed to stakeholders.
122
Additionally, Dashboards can also be included as part of regular reviews – they help
you get an overall high-level picture of your infrastructure and can also be used to
drilldown into specific asset and vulnerability information.
122
Lab 11: Report Scheduling and Distribution
• Create a user
• Create a Distribution Group
• Define report distribution method
• Assign user to a template
20 mins
• Schedule a report
123
Exception Management
124
Need for Exceptions
125
Accepting the risk posed by a vulnerability is not really a mitigation strategy because
accepting a risk does not reduce its effect. However, risk acceptance is a legitimate
option in vulnerability management.
In the context of reporting, exceptions are used to suppress (hide) information from
vulnerability counts. While our vulnerability flag is Closed/Ignored, it is important to
note that the detection information is still in the subscription database.
125
Scenarios that Qualify for Exception Handling
Vul nerability mitigation not required Vul nerability mitigation not possible
Exception
Handling
126
Here are some scenarios where vulnerability remediation or mitigation may not be
possible or practical.
Firstly, not all vulnerabilities need to be fixed. For example, if the vulnerability is
identified in Adobe Flash Player but the use of Flash Player is already disabled in all
web browsers and applications company-wide, there is no need for action.
Other times, you may experience pushback from your own organization. This often
happens when a vulnerability is on some type of customer-facing system and your
company wants to avoid the downtime required to
patch a vulnerability.
Lastly, you may need to temporarily close a vulnerability due to various reasons. For
instance, you may have to an ongoing investigation for a false positive case where in
the vulnerability does not exist but is falsely identified as being present and you may
want to temporarily close such vulnerabilities until you have conclusive data. Another
126
instance could be that your patching team needs time to test patches in a test or UAT
environment before deploying in production and you want to temporarily close such
vulnerabilities that will be patched later. Or it could be a scenario where your
organization may have imposed a change freeze and you may need to temporarily
close specific vulnerabilities and defer remediation activities to a later date.
126
Manage Exceptions Automatically
Business Owner
Define criteria for exception handling
System
Administrator
Manager
Monitor ignored vulnerabilities
Scanner
Reader
127
This slide outlines the steps to setup exception handling using remediation policies in
Vulnerability Management.
When creating and approving exceptions, it’s important to understand that they
address sensitive business issues. When an exception is approved, it also means that
you're accepting a risk because you’re acknowledging and agreeing to the
consequences of not remediating the vulnerability. So how these exceptions will be
evaluated and how they will be granted is important. Hence, it’s recommended to
have a clear and well-defined process for managing exceptions.
Business or asset owners and system administrators should be a part of setting the
criteria for raising and approving exceptions. And any deviations from established
processes should go through proper approval and change management process.
The next step is to apply the criteria to identify vulnerabilities that qualify for
exception handling. You can use Search Lists (static and dynamic) to filter specific
vulnerabilities matching your exception handling criteria. The Qualys Manager user
account has permissions to setup search lists.
127
Remediation policies are commonly used to assign detected vulnerabilities to
remediation owners for mitigation. However, these policies can also be used to
automatically ignore vulnerabilities and hence accept risk for vulnerabilities you do
not plan to address as per your exception handling criteria. You can also ignore
vulnerabilities manually using scan reports (HTML format) based on host-based
findings and from host information
available through asset search results.
Lastly, you need to track, and monitor ignored vulnerabilities to ensure that the
exception handling process is functioning as desired. You can use filters in your scan
report template to report on all ignored vulnerabilities in your account.
127
Configure Remediation Policy (Ignore Vulnerabilities)
You can set up a rule for vulnerabilities that can't be remediated or the ones that
need to be deferred for a specific period, by identifying the impacted vulnerabilities
through a search list (static or dynamic). This way you can automate the process to
ignore select vulnerabilities.
128
Tickets will be created in Closed/Ignored state and assigned to a user.
128
Prioritize Rules to Ignore Vulnerabilities
• Remediation policy rules are applied to scan results in the order in which they
are listed
• When a rule is applied on a vulnerability, no subsequent rules are applied on it
again even if the condition matches the vulnerability
• Recommended to place rule(s) meant for exception handling at the top
129
Remediation rules support ordering, that is, the rule with the highest priority is run
first. When a rule is applied on a vulnerability, no subsequent rules are applied on it
again even if the condition matches the vulnerability.
So, it’s important that you place the rule(s) to ignore vulnerabilities at the top of the
rule list so that they are applied first.
129
Managing Exceptions Manually
Manually ignore vulnerabilities from Host Scan Report
130
You can manually ignore any vulnerability instance directly from within a vulnerability
report (HTML format) or ignore a vulnerability from host information.
To ignore a vulnerability from host information, go to VM/VMDR > Assets > Host
Assets or Assets > Asset Search, find a vulnerable host and then open the Host
Information page for that host. Select Vulnerabilities on the left side and view the list
of vulnerabilities (or potential vulnerabilities). Click + next to the vulnerability
instance you want to ignore and then choose Ignore Vulnerability from the menu that
appears.
130
Exception Handling Use Case
Scenario:
My organization recently implemented a policy to disable Adobe Flash Player in all
w eb brow sers and applications on all server assets. And so the security team has
decided that all such vulnerabilities need to be autom atically identified and ignored
as accepted risk w ithout any tim e lim its for expiry, except on assets categorized
as custom er-facing or external assets. Also, all such ignored vulnerabilities must
be assigned to the asset ow ner for review and tracking. How can w e accomplish
this?
131
Let’s consider the following scenario where you are required to create a remediation
policy to ignore specific vulnerabilities automatically as per the criteria set up by your
security team:
"My organization recently implemented a policy to disable Adobe Flash Player in all
web browsers and applications company-wide. And so the security team has decided
that all Adobe Flash Player vulnerabilities need to be ignored as accepted risk without
any time limits for expiry, except on assets categorized as customer-facing or external
assets. Also, all such ignored vulnerabilities must be assigned to the Qualys Manager
user for review and tracking. How can we accomplish this?”
Note that policy rules are applied to scan results in the order in which they are listed.
If a detected vulnerability matches more than one rule, the action specified for the
first rule it matches takes precedence. So, it’s important that you place the rule(s) to
ignore vulnerabilities at the top of the rule list so that they are applied first.
131
Monitor Ignored Vulnerabilities
You can use the Disabled/Ignored Vulnerabilities v.1 template from the template
library which is configured to display both disabled and ignored vulnerabilities in your
environment.
Lastly, you can use a search query to list ignored vulnerabilities. The query
Vulnerabilities.ignored: TRUE will display ignored vulnerabilities in the search results.
However please note that Ignored vulnerabilities are not listed in the search query
results by default. To see these vulnerabilities, change Filter settings and uncheck
‘Ignored’ vulnerabilities.
You can use the same search query and the corresponding filter setting to create a
132
dashboard widget to track ignored vulnerabilities. We recommend enabling trend
data collection in the widget to track ignored vulnerabilities over time.
132
Lab 12: Ignore Vulnerabilities
133
Reporting Use Cases
In this section, we'll discuss how to address vulnerability reporting for a couple of
practical use cases including the lifecycle of identifying the QID's associated with a
major vulnerability, building the required search lists and managing Patch Tuesday
release updates using search queries and dashboard widgets.
Reporting Use Case - Major Vulnerability Release
135
In some cases, organizations are required to address certain high severity or high-
threat vulnerabilities immediately. These types of vulnerabilities are in the “address
now, not later” category.
135
Reporting on Spectre and Meltdown Vulnerabilities
1
Create Search List
For a large list of CVE IDs, we
recommend using the
Dynamic Search List API or
create additional search list(s).
2
Customize Report Template
136
The first step is to detect the vulnerability. A normal VM scan will target all QID’s
(default setting in Option Profile).
You can create a Search List that only includes the required QID’s for reporting. Eg.
Spectre and Meltdown vulnerabilities. Once a Search List has been created, it can be
used as a vulnerability filter within a report template– this will result in the report
only including QIDs matching the Search List configuration.
Note that the UI is limited in the number of characters you can enter. If you are
building a Search List which has a very large list CVE IDs, we recommend using the
Dynamic Search List API. Refer to the VM API user guide for more information.
Alternately, you can create additional search list(s). You can include more than one
search list in the report template for reporting.
136
Reporting Use Case - Patch Tuesday Release
• Qualys Vulnerability R&D Lab releases new vulnerability checks for Patch
Tuesday releases each month
137
Patch Tuesday (also known as Update Tuesday) is an unofficial term used to refer to
when Microsoft, Adobe, Oracle and others regularly release software patches for
their software products. It is widely referred to in this way by
the industry. Microsoft formalised Patch Tuesday in October 2003. Patch Tuesday
occurs on the second, and sometimes fourth, Tuesday of each month in North
America. Minor updates are also released outside Patch Tuesday.
Please consult the following WIKI article to know more about Patch Tuesday
https://en.wikipedia.org /wiki/Patch_Tuesday
137
Discover Patch Tuesday Vulnerabilities
Using QQL searches
For routine
monthly update
users
138
Qualys also provides dashboards and widgets for each Patch Tuesday release. The
query strings used in this dashboard are created leveraging the monthly Qualys
Security Alerts posts that include the QIDs released for Microsoft and Adobe for the
indicated monthly Patch Tuesday cycle. Bookmarking Qualys Security Alerts for future
reference is highly recommended.
Latest Patch Tuesday dashboards and widgets are available for download on this link:
https://success.qualys.com/discussions/s/article/000006505.
For entirely new Dashboard users, please download and import (contains a single
json) from the file named: QLYS_Patch_Tuesday_2021-xx-Month_Vmdashboard.
For routine monthly update users, please download and import (contains multiple
widget json files) from the file named: 2021-xx-Month_UDWidget_JSON.
You need to enable "Enable historical data collection" following your JSON import(s).
138
Please consult https://success.qualys.com/discussions/s/article/000006156 for
information on enabling historical data collection for your dashboard widgets.
138
Create Dashboard Widget from Report Template
vulnerabilities.lastFound
AND
tags.name
OR vulnerabilities.status
NOT vulnerabilities.typeD etected
vulnerabilities.ignored
139
vulnerabilities.disabled
You may want to create dashboard widgets mapped to a report template for better
data visualization. Its important to understand how your report template
settings\fields map to the VM query tokens as otherwise your batch report counts
will not match your dashboard counts. The slide illustrates images that map VM
query tokens to Scan Report Template Findings/Detection Date, Asset Selection Fields
and vulnerability filter settings.
139
https://success.qualys.com/discussions/s/article/000005938
139
Create Dashboard Widget from Report Template
vulnerabilities. nonRunningKernel:TRUE
140
140
Report takes too long to generate and/or errors out
141
You may come across a situation where the report takes too long to generate and\or
sometimes errors out. These conditions usually occur due to selection of excessive
timeframes, or a very large asset scope or other settings, which when used in
conjunction with excessive detection timeframes and large asset scope may lead to
long time for report data processing and errors. This use case analyzes some of the
areas in the VM report template which can be fine tuned to execute your reports
efficiently, effectively and successfully.
141
Report takes too long to generate and/or errors out
Template Section Comments Recommendations & Resources
Only include what is needed. Fine Check in with your report recipients to
tune data selections to create a make sure having the report sorted by
template that will execute host works for them.
efficiently, effectively, and
successfully.
142
Report takes too long to generate and/or errors out
Template Section Comments Recommendations & Resources
This is a not a valid use case The custom include QID This is a valid use case
because the exclusions are because the exclusions are
NOT part of the CUSTOM list search list doesn’t part of the CUSTOM list
include the QIDs in the
Exclude QIDs list.
143
143
Report takes too long to generate and/or errors out
Template Section Comments Recommendations & Resources
Only include what is needed. • Make sure the selections in this section
Fine tune the data selections to align to the scope of the report. If your
create a template that will execute policy is “We remediate Confirmed,
efficiently, effectively, and Severity 3, 4 & 5”, then there are too
successfully. many boxes checked.
• In trend reports, it is rare to see
information gathered data included in
the report data selection criteria.
• Consider running a set of reports for all
OPEN items (e.g. New, Active and
Reopened); and a separate report for
Closed items (e.g. Fixed).
• Breaking reports into Open and Closed
makes for smaller, more digestible
reports for recipients, and reduces the
chances of error conditions.
144
144
Lab 13: Map a Widget to a Report Template
145
Summary
This section summarizes the key points covered in this course to drive an effective
reporting strategy.
146
Wrapping it up..
Align reports with your organization’s security standards, policies and guidelines
Start by defining what you want to achieve, why you need to write that report, and
who you are writing it for. This will give you a clear idea about your deliverables.
Track and classify assets throughout their lifecycle by regular assessment of your IT
infrastructure. This way you can identify inactive, decommissioned and repurposed
147
assets proactively and take steps to purge stale data from your Qualys account.
147
Thank You
training@qualys.com