- 15 Oct 2024
- 19 Minutes to read
- Print
- DarkLight
- PDF
Qualys Cloud Platform
- Updated on 15 Oct 2024
- 19 Minutes to read
- Print
- DarkLight
- PDF
Qualys Cloud Platform monitors customers' global security and compliance posture using sensors. This adapter connects to the Qualys Cloud Platform service to import information about devices and vulnerabilities.
Related Enforcement Actions:
Types of Assets Fetched
This adapter fetches the following types of assets:
- Devices
- Users
- Vulnerabilities
- Software
- SaaS Applications
- Tickets
About Qualys Cloud Platform
Use cases the adapter solves
Discovery and asset enrichment are secondary to the collection of vulnerability (missing patch and configuration) elements The case of unmanaged devices can partially be solved using Qualys for automation of enforcing scanning regimes. Qualys using the Scanning Appliance can be used for discovering assets that are unknown through any other source.
Data retrieved by Qualys Cloud Platform adapter
Qualys Cloud Platform brings device and service data from systems, including OS, Distribution, Interfaces, Network details, Last users, Installed software, vulnerable software, vulnerability details.
Related Enforcement Actions:
- Qualys - Add IP Addresses to Asset Group
- Qualys - Add IP Addresses to User Subscription
- Qualys Cloud Platform - Update Asset Names to Host Names
- Qualys Cloud Platform - Add IP Addresses as Host Assets
- Qualys Cloud Platform - Remove Tags from Host Asset
- Qualys Cloud Platform - Add Tags to Host Asset
Parameters
Qualys Cloud Platform Domain (required) - The hostname of the Qualys API (for example, qualysapi.apps.qualys.com). For more details on how to determine your Qualys API URL, see Identify your Qualys platform.
User Name and Password (required) - The credentials for a user account that has the Required Permissions to fetch assets.
Qualys Tags Include list (optional) - Specify a comma-separated list of Qualys tags.
- If supplied, the connection for this adapter will only fetch devices tagged in Qualys with the tags provided in this list.
- If not supplied, the connection for this adapter will fetch all devices from Qualys Cloud Platform.
API Rate Limit (Requests per Hour) (optional) - Specify a rate limit for the number of requests per hour to be sent to Qualys.
- If supplied, the number of requests initiated per hour by the connection for this adapter will be limited to the specified value. During data fetch from this connection, if the API rate limit is reached, the connection will be paused for an hour, and then will resume the data fetch.
- If not supplied, the number of requests initiated by the connection for this adapter will not be limited.
Note:This setting is applicable only for the Global IT Asset Inventory API.
Verify SSL - Select whether to verify the SSL certificate offered by the value supplied in Hostname or IP Address. For more details, see SSL Trust & CA Settings.
HTTPS Proxy (optional) - A proxy to use when connecting to the value supplied in Qualys Cloud Platform Domain.
HTTPS Proxy User Name (optional) - The user name to use when connecting to the value supplied in Qualys Cloud Platform Domain via the value supplied in HTTPS Proxy.
HTTPS Proxy Password (optional) - The password to use when connecting to the value supplied in Qualys Cloud Platform Domain via the value supplied in HTTPS Proxy.
To learn more about common adapter connection parameters and buttons, see Adding a New Adapter Connection.
Advanced Settings
Advanced settings can either apply for all connections for this adapter, or you can set different advanced settings and/or different scheduling for a specific connection, refer to Advanced Configuration for Adapters.
- Use Qualys API (required, default: true) - Select whether to use the Qualys API to fetch data.
- Asset CVE on Host Detection (DEPRECATED) - Not currently being used and will be deprecated. Previously it added CVE information to host detections, but Qualys now does this by default.
- Use Global IT Asset Inventory API - Select whether to use Global IT Asset Inventory API.
- If enabled, all connections for this adapter will use the Global IT Asset Inventory API to fetch data.Note:
For Qualys API, you can enable only Fetch vulnerabilities data; however, to ensure maximum coverage, it is recommended to also enable Enrich vulnerabilities from detection.
- If disabled, all connections for this adapter will not use the Global IT Asset Inventory API to fetch data.
- If enabled, all connections for this adapter will use the Global IT Asset Inventory API to fetch data.
- Fetch vulnerabilities data (required, default: true) - Select to fetch vulnerabilities from the Qualys Cloud Platform. For more information, see Fetch Vulnerabilities.
- Ignore fixed vulnerabilities - Select this option to ignore vulnerabilities where the Status field is set to "Fixed".
- Fetch authentication report - Select whether to fetch authentication report information from Qualys Cloud Platform. The authentication report includes the authentication status for the scanned hosts: Passed, Failed, Passed with insufficient privileges, or Not Attempted.
- If enabled, all connections for this adapter will also fetch authentication report information from Qualys Cloud Platform.
- If disabled, all connections for this adapter will not fetch authentication report information from Qualys Cloud Platform.
- Fetch tickets - Select whether to fetch tickets associated with devices from information Qualys Cloud Platform.
- If enabled, all connections for this adapter will also fetch tickets information for tickets associated with devices from Qualys Cloud Platform.
- If disabled, all connections for this adapter will not fetch tickets associated with devices from Qualys Cloud Platform.
- Use DNS name as hostname even if NetBIOS name exists - Select whether to use DNS name or NetBIOS name as the device hostname if both exists.
- If enabled, all connections for this adapter use the DNS name as the device hostname even if NetBIOS name also exists.
- If disabled, all connections for this adapter use the NetBIOS name as the device hostname, when exists.
- Fetch unscanned IP addresses - Select whether to fetch yet-to-be-scanned hosts. Such devices' data will contain only an IP address (also as ID).
- If enabled, all connections for this adapter will also fetch unscanned IP addresses from Qualys Cloud Platform.
- If disabled, all connections for this adapter will not fetch unscanned IP addresses from Qualys Cloud Platform.
- Fetch Asset Groups - Select whether to fetch Asset Groups.
- If enabled, all connections for this adapter will also fetch Asset Groups.
- If disabled, all connections for this adapter will not fetch Asset Groups.
- Do not fetch devices with no MAC address and hostname - Select whether to exclude fetching devices without MAC addresses and hostnames.
- If enabled, all connections for this adapter will only fetch devices that have MAC addresses or hostnames.
- If disabled, all connections for this adapter will fetch devices even if they do not have MAC addresses and hostnames.
- Fetch PCI and Patchable Flags - Select whether to add PCI and Patchable flags to fetched vulnerabilities. When you fetch the Patchable flag you can create queries based on patch availability.
- If enabled, all connections for this adapter will add a PCI Flag and a Patchable flag to fetched vulnerabilities.
- If disabled, all connections for this adapter will not add a PCI Flag and a Patchable flag to fetched vulnerabilities.
Note:To use this functionality, the value supplied in User Name must have one of the following roles: Manager, Unit Manager, Scanner, Reader.
- Fetch scanner appliances - Select whether to fetch scanner appliances as devices.
- If enabled, all connections for this adapter will fetch scanner appliances as devices.
- If disabled, all connections for this adapter will not fetch scanner appliances data.
- Fetch Web Applications - Select this option to fetch Web Applications. This setting requires permission to read from the “Web Application Scanning API”.
- Fetch policy compliance - Select whether to fetch policy compliance associated with devices.
- If enabled, all connections for this adapter will also fetch policy compliance associated with each device.
Note:Policy compliance is only fetched if Fetch policy posture information is enabled.
- If disabled, all connections for this adapter will not fetch policy compliance associated with each device.
- Fetch policy posture information - Select whether to fetch the posture information of every policy compliance.
- If enabled, all connections for this adapter will also fetch policy posture information associated with policy compliance.
- If disabled, all connections for this adapter will not fetch policy posture information.
- Add STIG rules to policy posture - Select this option to fetch STIG rule IDs rule IDs associated with policy compliance and add that information to the fetched posture information.
STIG rules are fetched only if Fetch policy posture information is enabled.
Fetch VM detection - Select this option to fetch additional vulnerability management information for AWS, Azure and GCP cloud appliances. You have to select both this option and 'Enrich vulnerabilities from detections' in order to populate the Qualys Vulnerability: Status, Qualys Vulnerability: Last Fixed and
Qualys Vulnerability: Status fields on the adapter.Fetch QID CVE IDs - Select whether to fetch additional CVEs for each QID in the vulnerability list from the next URL API.
- If enabled, all connections for this adapter will fetch additional CVEs.
- If disabled, all connections for this adapter will not fetch additional CVEs.
Fetch users - Select whether to fetch user account data from Qualys.
- If enabled, all connections for this adapter will fetch user account data from Qualys.
- If disabled, all connections for this adapter will not fetch user account data from Qualys.
Use ‘lastCheckedIn’ field as ‘last_seen’ - Define how to compute the 'last_seen' attribute in Qualys, depending on the API used to integrate with Axonius.
- If you are using the Qualys API:
- If selected, the last_seen attribute is calculated from lastCheckedIn. If the lastCheckedIn value isn't present, the last_seen attribute is calculated from lastVulnScan.
- If cleared, the last_seen attribute is calculated from the most recent date fetched from any of the following fields: lastVulnScan, lastCheckedIn, lastComplianceScan, lastSystemBoot, or modified.
- If you are using the Global IT Asset Inventory API:
- If selected, the last_seen attribute is calculated from lastCheckedIn. If the lastCheckedIn value isn't present, the last_seen attribute is calculated from lastVulnScan.
- If cleared, the last_seen attribute is calculated from the most recent date fetched from any of the following fields: createdDate, lastCheckedIn, sensorLastUpdatedDate, lastModifiedDate, lastUpdated, lastActivity, lastInventory, lastVMScan, lastComplianceScan, lastFullScan.
- If you are using the Qualys API:
Filter assets only on adapter side - Select this option to have the adapter request all assets without using the Ignore devices that have not been seen by the source in the last X hours adapter configuration (see General Configuration for Incremental Fetch) as a time delta filter, so it will filter them only on the adapter's side.
Do not fetch devices without Last Seen - Define whether to fetch devices without the last_seen attribute.
- If enabled, all connections for this adapter will not fetch devices without the last_seen attribute.
- If disabled, all connections for this adapter will fetch devices without the last_seen attribute.
Do not fetch devices without Host Name - Select this option to not fetch devices without a Host Name.
Fetch policy posture actual settings - Select this option to fetch policy posture actual settings.
Do not populate hostname when tracking method is IP - Set whether to populate the device hostname field when the tracking method is IP.
- If enabled, all connections for this adapter will not populate the device hostname field when the tracking method is IP.
- If disabled, all connections for this adapter will populate the device hostname field.
Parse Software from VM detections - Select whether to parse installed software using the Vulnerability Management detection. When you select this option the system will parse the software from the next detections QID’s: 45453, 90235, 90295, 91228, 372899, 105310, 45141. To implement this feature you must also select Fetch VM detection.
Enrich vulnerabilities from detections - Select whether to enrich the vulnerabilities information using results from the VM detection information for all connections for this adapter. This means it will add data from the VM detection to vulnerabilities by QID. To implement this feature you must also select Fetch vulnerabilities data and Fetch VM detection.
Fetch affect running kernel from VM detection - Select whether to fetch the AFFECT_RUNNING_KERNEL field from the VM detection API . To implement this feature you must also select Fetch VM detection.
Fetch affect running service from VM detection - Select whether to fetch the AFFECT_RUNNING_SERVICE field from the VM detection API. To implement this feature you must also select Fetch VM detection.
Fetch affect exploitable config from VM detection - Select whether to fetch the AFFECT_EXPLOITABLE_CONFIG field from the VM detection API. To implement this feature you must also select Fetch VM detection.
Fetch certificates as devices (Inventory API) - Select whether to fetch certificates as devices. Use Inventory API to fetch certificate information. Super User or CERTVIEW.API.ACCESS permissions are required for this.
Fetch only fixed VM detections from last X days (optional, default: 0) - Specify the maximum number of days to fetch from VM detection only assets that have a Fixed vulnerability status. If a number is specified, VM detections will be fetched even if the Fetch VM detections option is unchecked.
Fetch Qualys Detection Scores - Select this option to fetch the Qualys Quality Detection Scores.
Parse "BIOS Serial" as "Device Manufacturer Serial" - Select this option to parse BIOS serial numbers as device manufacturer serial numbers.
Fetch VM scans (optional) - Select whether to fetch VM scan information from the /api/2.0/fo/scan/ endpoint of the connected devices. For more details, see Qualys API User Guide (PDF), page 26.
The Global IT Asset Inventory API is supported. When using the Global IT Asset Inventory API, the following advanced settings also fetch devices:
- Fetch VM detections
- Fetch policy compliance
- Fetch policy posture information
- Fetch policy posture actual settings
- Add STIG rules to policy posture
- Fetch affect exploitable config from VM detection
- Fetch affect running service from VM detection
- Fetch affect running kernel from VM detection
- Fetch compliance scans - Select to fetch compliance scans.
- Ignore devices by tracking methods - Do not fetch devices that have one or more of the tracking methods selected from the dropdown.
- Do not include Public IPs in Network Interfaces - When selected, Public IP addresses won't be included in Network Interface devices.
- Fetch parents' tags - Select to fetch parent tags.
- Exclude packages from software (Inventory API) - Select to exclude packages from software. This option is only relevant for the Inventory API since the data doesn't appear in the Qualys API.
- Fetch devices by - Use this drop-down to fetch relevant devices with the recommended 'Last Seen Threshold'. Either select 'Last modified' or 'Last scanned for vulnerabilities'. From version 4.8.4 the default value the first time you connect this adapter is 'Last modified'. Consult Axonius support to find the best setting for your system.
- Incremental fetch from last successful - Use this setting to only fetch changes in Qualys. This needs to be configured together with an additional Qualys connection. Refer to Incremental Fetch.
- Fetch Hosts (default: true) - Select this option to fetch additional host information for each device.
- VM Concurrency Limit - Enter a value for the system to use as the concurrency limit (the maximum number of requests to send in one go) to access the Qualys API.
- Fetch vulnerabilities last seen in X days - Enter a number of days to only fetch vulnerabilities from that number of days back.
- Insert QIDs without CVEs- Select this option to fetch Qualys Vulnerabilities that only have a QID and do not have a CVE. Note that in order to see each CVE on a separate row and to present Qualys Vulnerabilities that only have QIDs you need to make sure the System Setting under Data>Cache and Performance> Don’t split source vulnerabilities into CVEs is not enabled.
- Insert both CVE and QID as vulnerable software - Select this option to fetch and parse both CVE and QID-based vulnerable software. The adapter will add one vulnerable software for each QID and one vulnerable software for each available CVE ID.
- Parse System Serial from detection - Select this option to set the Device Manufacturer Serial source to be from Qualys detections (QID: 45208).
Ignore installed software - Select this option to drop all installed software information from found devices.
Parse domain from hostname (default: true) - Select this option to parse the domain from the hostname when there is no precise domain value brought by the API.
Classify CVEs from low to critical - Enable this option to map Qualys vulnerabilities to Axonius vulnerabilities, as follows:
* Minimal -> Info
* Medium -> Low
* Serious -> Medium
* Critical -> High
* Urgent -> Critical
This feature is available from version 6.1.32 and later. When you enable this setting, it is recommended that you update existing queries with Qualys adapter CVE severities so that they match the newly mapped values. Otherwise, the existing queries will not be valid and will give incorrect results.
- Devices tags deny list - Enter Qualys tags to skip device ingestion.
Tickets Advanced Settings
Edit tickets advanced settings - Toggle on to begin editing the tickets advanced settings.
- Fetch Tickets as Assets - Select this option to fetch tickets as separate assets instead of adding them to devices.
- Ticket States - Enter a list of possible ticket states.
- Vulnerability Severities - Specify the number of vulnerability severities to fetch. Only vulnerabilities with these severity numbers will be included in the ticket.
- Potential Vulnerability Severities - Specify the number of potential vulnerability severities to fetch. Only potential vulnerabilities with these severity numbers will be included in the ticket.
- Modified Since X days - Specify the number of days back to fetch modified vulnerabilities. Only vulnerabilities modified in the last X days will be included in the ticket.
Detections Advanced Settings
Edit Detections Advanced Settings - Toggle on to begin editing the detections advanced settings.
- Show Information Gathering - Select this option to show detection records with information gathered along with confirmed vulnerabilities and potential vulnerabilities.Warning
This increases the time to fetch detection, as the API response becomes slower.
- Mandatory vulnerabilities QID - Enter a list of vulnerabilities QID the adapter should try to fetch as mandatory.
- Detections Statuses - Enter a list of detection statuses to fetch.
Knowledge Base Advanced Settings
Edit Knowledge Base Advanced Settings - Toggle on to begin editing the knowledge base advanced settings.
- Skip Information Gathering Vulnerabilities (default: true) - When checked, this checkbox ignores vulnerabilities with the type “Information Gathering.”
- Vulnerabilities Details - Select the level of vulnerability details. "Basic" includes basic elements plus CVSS Base and Temporal scores. "All" includes all vulnerability details, including the basic details.
For details on general advanced settings under the Adapter Configuration tab, see Adapter Advanced Settings.
Fetch Vulnerabilities
You can fetch vulnerabilities via the Qualys API, which automatically fetches vulnerabilities by default.
Configuring Incremental Fetch
Use Incremental Fetch to fetch big Qualys inventories, which can take a long time to fetch. In order to use Incremental Fetch you need to configure two Qualys connections.
Configuring Full Fetch for the first Connection (not delta)
- Configure the first connection to run at a low frequency (our best practice for big inventories is once a month, usually over the weekend). Refer to Adapter Custom Schedule
- In the Qualys Configuration dialog make sure the Incremental fetch from last successful parameters is left empty.
Configuring Incremental Fetch for the Second Connection
- Configure a second Qualys connection (an Incremental connection), that will perform the Incremental fetch.
- Configure this connection to run more frequently than the first, (our best practice is once a day or each discovery cycle).
- On the Qualys parameter connection screen select Incremental fetch from last successful
General Configuration for Incremental Fetch
- In the adapter Advanced Settings the values of the following parameters must be greater than the frequency set for the full fetch connection.
- Ignore devices that have not been seen by the source in the last X hours
- Ignore users that have not been seen by the source in the last X hours
- Delete devices and other assets that have not been returned from the source in the last X hours
- Delete users that were not been returned from the source in the last X hours
APIs
Axonius uses the following APIs for integration from Qualys:
Axonius fetches data from the following Qualys endpoints:
api/2.0/fo/asset/ip
- List IP addresses in the user account.- api/2.0/fo/asset/host/ - Download a list of scanned hosts in the user’s account.
api/2.0/fo/report
- View a list of reports in the user’s account when Report Share feature is enabled.msp/ticket_list.php
- View a list of selected tickets which the API user has permission to access.msp/user_list.php
- List user accounts in the subscription that are visible to the API user.api/2.0/fo/appliance
- List scanner appliances in your account with their configurations.qps/rest/3.0/search/was/webapp
- Returns a list of web applications that are in the user’s scope.qps/rest/3.0/search/was/finding
- Returns a list of findings (vulnerabilities, sensitive contents, information gathered) found in web applications that are in the user’s scope.api/2.0/fo/asset/group
- List asset groups in the user’s account.api/2.0/fo/scan
- List vulnerability scans in the user’s account.api/2.0/fo/scan/compliance
- List of compliance scans in your account.api/2.0/fo/knowledge_base/vuln
- Download a list of vulnerabilities from Qualys’ KnowledgeBase.api/2.0/fo/compliance/control
- View a list of compliance controls that are visible to the user.api/2.0/fo/compliance/policy
- View a list of compliance policies visible to the user.api/2.0/fo/compliance/posture/info/
- The Policy Compliance APIs help you gain essential insight into the compliance posture of the hosts within your account.api/2.0/fo/asset/host/vm/detection/
- Download a list of hosts with the hosts' latest vulnerability data, based on the host-based scan data available in the user’s account./certview/v1/certificates
- List CertView certificates based on an input filter query and list.qps/rest/2.0/search/am/tag
- Returns a list of tags that match the provided criteria./rest/2.0/count/am/asset
- Returns the number of assets that match the provided criteria./rest/2.0/search/am/asset
- Returns a list of assets matching the provided criteria.
Required Permissions
The value supplied in User Name must be associated with one of the following user roles and with the following permissions:
Manager role with full scope.
Reader role and AssetView Reader role with full scope.
Non-manager role with the following permissions:
- Access Permission "API Access".
- Asset Management Permission "Read Asset".
- Requested asset in their scope.
Note:It is highly recommended to provide the user permissions and access to all objects in the subscription.
To provide permissions and access to all objects in the subscription
- From the Qualys Administration utility, select Users > User Management.
- Click the user account and select Actions > Edit.
- Navigate to Roles and Scopes and select the Allow user full permissions and scope option.
To enable user access to the API
From the Qualys Administration utility, click User next to the Logout -> User Profile. The Edit User page is displayed.
From the left sidebar, click User Role. Then select the API option to enable API Access.
Click Save.
Some Qualys advanced settings may require additional permissions. Refer to the appropriate setting for information.
Qualys enforcement actions may require additional permissions. Refer to appropriate action for information.