Qualys Cloud Platform
  • 01 Jan 2024
  • 15 Minutes to read
  • Dark
    Light
  • PDF

Qualys Cloud Platform

  • Dark
    Light
  • PDF

Article Summary

Qualys Cloud Platform monitors customers' global security and compliance posture using sensors. This adapter connects to the Qualys Cloud Platform service to import information about devices and vulnerabilities.

Types of Assets Fetched

This adapter fetches the following types of assets:

  • Devices
  • Users

About Qualys Cloud Platform

Use cases the adapter solves
Discovery and asset enrichment are secondary to the collection of vulnerability (missing patch and configuration) elements The case of unmanaged devices can partially be solved using Qualys for automation of enforcing scanning regimes. Qualys using the Scanning Appliance can be used for discovering assets that are unknown through any other source.

Data retrieved by Qualys Cloud Platform adapter
Qualys Cloud Platform brings device and service data from systems, including OS, Distribution, Interfaces, Network details, Last users, Installed software, vulnerable software, vulnerability details. ​

Related Enforcement Actions:

Parameters

  1. Qualys Cloud Platform Domain (required) - The hostname of the Qualys API (for example, qualysapi.apps.qualys.com). For more details on how to determine your Qualys API URL, see Identify your Qualys platform.

  2. User Name and Password (required) - The credentials for a user account that has the Required Permissions to fetch assets.

  3. Qualys Tags Include list (optional) - Specify a comma-separated list of Qualys tags.

    • If supplied, the connection for this adapter will only fetch devices tagged in Qualys with the tags provided in this list.
    • If not supplied, the connection for this adapter will fetch all devices from Qualys Cloud Platform.
  4. API Rate Limit (Requests per Hour) (optional) - Specify a rate limit for the number of requests per hour to be sent to Qualys.

    • If supplied, the number of requests initiated per hour by the connection for this adapter will be limited to the specified value. During data fetch from this connection, if the API rate limit is reached, the connection will be paused for an hour, and then will resume the data fetch.
    • If not supplied, the number of requests initiated by the connection for this adapter will not be limited.
    Note:

    This setting is applicable only for the Global IT Asset Inventory API.

  5. Verify SSL - Select whether to verify the SSL certificate offered by the value supplied in Hostname or IP Address. For more details, see SSL Trust & CA Settings.

  6. HTTPS Proxy (optional) - A proxy to use when connecting to the value supplied in Qualys Cloud Platform Domain.

  7. HTTPS Proxy User Name (optional) - The user name to use when connecting to the value supplied in Qualys Cloud Platform Domain via the value supplied in HTTPS Proxy.

  8. HTTPS Proxy Password (optional) - The password to use when connecting to the value supplied in Qualys Cloud Platform Domain via the value supplied in HTTPS Proxy.

To learn more about common adapter connection parameters and buttons, see Adding a New Adapter Connection.

Qualys.png


Advanced Settings

Note:

Advanced settings can either apply for all connections for this adapter, or you can set different advanced settings and/or different scheduling for a specific connection, refer to ​Advanced Configuration for Adapters.

  1. Use Qualys API (required, default: true) - Select whether to use the Qualys API to fetch data.

  2. Asset CVE on Host Detection - Select this option to fetch Asset CVEs on host detection.

  3. Use Global IT Asset Inventory API - Select whether to use Global IT Asset Inventory API.

    • If enabled, all connections for this adapter will use the Global IT Asset Inventory API to fetch data.
      Note:
      • If enabled, Axonius will not fetch vulnerabilities from Qualys Cloud Platform, even if the Fetch vulnerabilities data option is enabled. For more information, see Fetch Vulnerabilities.
      • If enabled, it is highly recommend to clear the Use Qualys API option in Advanced Settings in order to prevent fetching multiple Qualys entities for a single device.
    • If disabled, all connections for this adapter will not use the Global IT Asset Inventory API to fetch data.
  4. Fetch vulnerabilities data (required, default: true) - Select to fetch vulnerabilities from the Qualys Cloud Platform. For more information, see Fetch Vulnerabilities.

  5. Ignore fixed vulnerabilities - Select this option to ignore Vulnerabilities where the Status field is set to "Fixed".

  6. Fetch authentication report - Select whether to fetch authentication report information from Qualys Cloud Platform. The authentication report includes the authentication status for the scanned hosts: Passed, Failed, Passed with insufficient privileges, or Not Attempted.

    • If enabled, all connections for this adapter will also fetch authentication report information from Qualys Cloud Platform.
    • If disabled, all connections for this adapter will not fetch authentication report information from Qualys Cloud Platform.
  7. Fetch tickets - Select whether to fetch tickets associated with devices from information Qualys Cloud Platform.

    • If enabled, all connections for this adapter will also fetch tickets information for tickets associated with devices from Qualys Cloud Platform.
    • If disabled, all connections for this adapter will not fetch tickets associated with devices from Qualys Cloud Platform.
  8. Use DNS name as hostname even if NetBIOS name exists - Select whether to use DNS name or NetBIOS name as the device hostname if both exists.

    • If enabled, all connections for this adapter use the DNS name as the device hostname even if NetBIOS name also exists.
    • If disabled, all connections for this adapter use the NetBIOS name as the device hostname, when exists.
  9. Fetch unscanned IP addresses - Select whether to fetch yet-to-be-scanned hosts. Such devices' data will contain only an IP address (also as ID).

    • If enabled, all connections for this adapter will also fetch unscanned IP addresses from Qualys Cloud Platform.
    • If disabled, all connections for this adapter will not fetch unscanned IP addresses from Qualys Cloud Platform.
  10. Fetch Asset Groups - Select whether to fetch Asset Groups.

    • If enabled, all connections for this adapter will also fetch Asset Groups.
    • If disabled, all connections for this adapter will not fetch Asset Groups.
  11. Do not fetch devices with no MAC address and hostname - Select whether to exclude fetching devices without MAC addresses and hostnames.

    • If enabled, all connections for this adapter will only fetch devices that have MAC addresses or hostnames.
    • If disabled, all connections for this adapter will fetch devices even if they do not have MAC addresses and hostnames.
  12. Fetch PCI and Patchable Flags - Select whether to add PCI and Patchable flags to fetched vulnerabilities. When you fetch the Patchable flag you can create queries based on patch availability.

    • If enabled, all connections for this adapter will add a PCI Flag and a Patchable flag to fetched vulnerabilities.
    • If disabled, all connections for this adapter will not add a PCI Flag and a Patchable flag to fetched vulnerabilities.
    Note:

    To use this functionality, the value supplied in User Name must have one of the following roles: Manager, Unit Manager, Scanner, Reader.

  13. Fetch scanner appliances - Select whether to fetch scanner appliances as devices.

    • If enabled, all connections for this adapter will fetch scanner appliances as devices.
    • If disabled, all connections for this adapter will not fetch scanner appliances data.
  14. Fetch policy compliance - Select whether to fetch policy compliance associated with devices.

    • If enabled, all connections for this adapter will also fetch policy compliance associated with each device.
    Note:

    Policy compliance is only fetched if Fetch policy posture information is enabled.

    • If disabled, all connections for this adapter will not fetch policy compliance associated with each device.
  15. Fetch policy posture information - Select whether to fetch the posture information of every policy compliance.

    • If enabled, all connections for this adapter will also fetch policy posture information associated with policy compliance.
    • If disabled, all connections for this adapter will not fetch policy posture information.
  16. Add STIG rules to policy posture - Select this option to fetch STIG rule IDs rule IDs associated with policy compliance and add that information to the fetched posture information.

Note:

STIG rules are fetched only if Fetch policy posture information is enabled.

  1. Fetch vm detection - Select this option to fetch additional vulnerability management information for AWS, Azure and GCP cloud appliances. You have to select both this option and 'Enrich vulnerabilities from detections' in order to populate the Qualys Vulnerability: Status, Qualys Vulnerability: Last Fixed and
    Qualys Vulnerability: Status fields on the adapter.

  2. Fetch QID CVE IDs - Select whether to fetch additional CVEs for each QID in the vulnerability list from the next URL API.

    • If enabled, all connections for this adapter will fetch additional CVEs.
    • If disabled, all connections for this adapter will not fetch additional CVEs.
  3. Fetch users - Select whether to fetch user account data from Qualys.

    • If enabled, all connections for this adapter will fetch user account data from Qualys.
    • If disabled, all connections for this adapter will not fetch user account data from Qualys.
  4. Use ‘lastCheckedIn’ field as ‘last_seen’ - Define how to compute the 'last_seen' attribute in Qualys, depending on the API used to integrate with Axonius.

    • If you are using the Qualys API:
      • If selected, the last_seen attribute is calculated from lastCheckedIn. If the lastCheckedIn value isn't present, the last_seen attribute is calculated from lastVulnScan.
      • If cleared, the last_seen attribute is calculated from the most recent date fetched from any of the following fields: lastVulnScan, lastCheckedIn, lastComplianceScan, lastSystemBoot, or modified.
    • If you are using the Global IT Asset Inventory API:
      • If selected, the last_seen attribute is calculated from lastCheckedIn. If the lastCheckedIn value isn't present, the last_seen attribute is calculated from lastVulnScan.
      • If cleared, the last_seen attribute is calculated from the most recent date fetched from any of the following fields: createdDate, lastCheckedIn, sensorLastUpdatedDate, lastModifiedDate, lastUpdated, lastActivity, lastInventory, lastVMScan, lastComplianceScan, lastFullScan.
  5. Do not fetch devices without Last Seen - Define whether to fetch devices without the last_seen attribute.

    • If enabled, all connections for this adapter will not fetch devices without the last_seen attribute.
    • If disabled, all connections for this adapter will fetch devices without the last_seen attribute.
  6. Do not fetch devices without Host Name - Select this option to not fetch devices without a Host Name.

  7. Do not populate hostname when tracking method is IP - Set whether to populate the device hostname field when the tracking method is IP.

    • If enabled, all connections for this adapter will not populate the device hostname field when the tracking method is IP.
    • If disabled, all connections for this adapter will populate the device hostname field.
  8. Parse Software from VM detections - Select whether to parse installed software using the Vulnerability Management detection. When you select this option the system will parse the software from the next detections QID’s: 45453, 90235, 90295, 91228, 372899, 105310, 45141. To implement this feature you must also select Fetch VM detection.

  9. Enrich vulnerabilities from detections - Select whether to enrich the vulnerabilities information using results from the VM detection information for all connections for this adapter. This means it will add data from the VM detection to vulnerabilities by QID. To implement this feature you must also select Fetch vulnerabilities data and Fetch VM detection.

  10. Enrich vulnerabilities from vulnerability base - Select whether to enrich the vulnerabilities information from the vulnerability base API by pulling all details of the vulnerabilities. To implement this feature you must also select Fetch vulnerabilities data.

  11. Fetch affect running kernel from vm detection - Select whether to fetch the AFFECT_RUNNING_KERNEL field from the VM detection API . To implement this feature you must also select Fetch VM detection.

  12. Fetch affect running service from VM detection - Select whether to fetch the AFFECT_RUNNING_SERVICE field from the VM detection API. To implement this feature you must also select Fetch VM detection.

  13. Fetch affect exploitable config from VM detection - Select whether to fetch the AFFECT_EXPLOITABLE_CONFIG field from the VM detection API. To implement this feature you must also select Fetch VM detection.

  14. Fetch certificates as devices (Inventory API) - Select whether to fetch certificates as devices. Use Inventory API to fetch certificate information. Super User or CERTVIEW.API.ACCESS permissions are required for this,

  15. Fetch only fixed VM detections from last X days (optional, default: 0) - Specify the maximum number of days to fetch from VM detection only assets that have a Fixed vulnerability status. If a number is specified, VM detections will be fetched even if the Fetch VM detections option is unchecked.

  16. Fetch Qualys Detection Score - Select this option to fetch the Qualys Quality Detection Score.

  17. Fetch VM scans (optional) - Select whether to fetch VM scan information from the /api/2.0/fo/scan/ endpoint of the connected devices. For more details, see Qualys API User Guide (PDF), page 26.

Note:

The Global IT Asset Inventory API is supported. When using the Global IT Asset Inventory API, the following advanced settings also fetch devices:

  • Fetch VM detections
  • Fetch policy compliance
  • Fetch policy posture information
  • Fetch policy posture actual settings
  • Add STIG rules to policy posture
  • Fetch affect exploitable config from VM detection
  • Fetch affect running service from VM detection
  • Fetch affect running kernel from VM detection
  1. Fetch compliance scans - Select to fetch compliance scans.
  2. Ignore devices by tracking methods - Do not fetch devices that have one or more of the tracking methods selected from the dropdown.
  3. Do not include Public IPs in Network Interfaces - When selected, Public IP addresses won't be included in Network Interface devices.
  4. Fetch parents' tags - Select to fetch parent tags.
  5. Exclude packages from software (Inventory API) - Select to exclude packages from software. This option is only relevant for the Inventory API since the data doesn't appear in the Qualys API.
  6. Fetch devices by - Use this drop-down to fetch relevant devices with the recommended 'Last Seen Threshold'. Either select 'Last modified' or 'Last scanned for vulnerabilities'. From version 4.8.4 the default value the first time you connect this adapter is 'Last modified'. Consult Axonius support to find the best setting for your system.
  7. Incremental fetch from last successful - Use this setting to only fetch changes in Qualys. This needs to be configured together with an additional Qualys connection. Refer to Incremental Fetch.
  8. Fetch Hosts (default: true) - Select this option to fetch additional host information for each device.
  9. VM Concurrency Limit - Enter a value for the system to use as the concurrency limit (the maximum number of requests to send in one go) to access the Qualys API.
  10. Fetch vulnerabilities seen in last X days - Enter a number of days to only fetch vulnerabilities from that number of days back.
  11. Insert QIDs without CVEs- Select this option to fetch Qualys Vulnerabilities that only have a QID and do not have a CVE. Note that in order to see each CVE on a separate row and to present Qualys Vulnerabilities that only have QIDs you need to make sure the System Setting under Data>Cache and Performance> Don’t split source vulnerabilities into CVEs is not enabled.
  12. Parse System Serial from detection - Select this option to set the Device Manufacturer Serial source to be from Qualys detections (QID: 45208).
  13. Ignore installed software - Select this option to drop all installed software information from found devices.
Note:

For details on general advanced settings under the Adapter Configuration tab, see Adapter Advanced Settings.

Fetch Vulnerabilities

You can fetch vulnerabilities via the Qualys API, which automatically fetches vulnerabilities by default.
Alternatively, you can fetch vulnerabilities via the Global IT Asset Inventory API.

To fetch vulnerabilities via the Global IT Asset Inventory API, select the following Advanced Settings options:

  • Use Global IT Asset Inventory API
  • Fetch vulnerabilities data or Enrich vulnerabilities from vulnerability base
  • Fetch VM detection


Configuring Incremental Fetch

Use Incremental Fetch to fetch big Qualys inventories, which can take a long time to fetch. In order to use Incremental Fetch you need to configure two Qualys connections.

Configuring Full Fetch for the first Connection (not delta)

  1. Configure the first connection to run at a low frequency (our best practice for big inventories is once a month, usually over the weekend). Refer to Adapter Custom Schedule
  2. In the Qualys Configuration dialog make sure the Incremental fetch from last successful parameters is left empty.

Configuring Incremental Fetch for the Second Connection

  1. Configure a second Qualys connection (an Incremental connection), that will perform the Incremental fetch.
  2. Configure this connection to run more frequently than the first, (our best practice is once a day or each discovery cycle).
  3. On the Qualys parameter connection screen select Incremental fetch from last successful

General Configuration for Incremental Fetch

  • In the adapter Advanced Settings the values of the following parameters must be greater than the frequency set for the full fetch connection.
    • Ignore devices that have not been seen by the source in the last X hours
    • Ignore users that have not been seen by the source in the last X hours
    • Delete devices and other assets that have not been returned from the source in the last X hours
    • Delete users that were not been returned from the source in the last X hours

DElta3

APIs

Axonius uses the following APIs for integration from Qualys:

Required Permissions

The value supplied in User Name must be associated with one of the following user roles and with the following permissions:

  • Manager role with full scope.

  • Reader role with full scope.

  • Non-manager role with the following permissions:

    • Access Permission "API Access".
    • Asset Management Permission "Read Asset".
    • Requested asset in their scope.
    Note:

    It is highly recommended to provide the user permissions and access to all objects in the subscription.

To provide permissions and access to all objects in the subscription

  1. From the Qualys Administration utility, select Users > User Management.
  2. Click the user account and select Actions > Edit.

Qualys1.png

  1. Navigate to Roles and Scopes and select the Allow user full permissions and scope option.

Qualys2.png



To enable user access to the API

  1. From the Qualys Administration utility, click User next to the Logout -> User Profile. The Edit User page is displayed.

    image.png

  2. From the left sidebar, click User Role. Then select the API option to enable API Access.
    image.png

  3. Click Save.

Note:

Qualys enforcement actions may require additional permissions. Refer to appropriate action for information.



Was this article helpful?

Changing your password will log you out immediately. Use the new password to log back in.
First name must have atleast 2 characters. Numbers and special characters are not allowed.
Last name must have atleast 1 characters. Numbers and special characters are not allowed.
Enter a valid email
Enter a valid password
Your profile has been successfully updated.