Connect this data source on your own, using the Hunters platform.
📘 Note
This source is not currently mapped to an alert, schema, or IOC Search.
Qualys Host Detections is used for enrichment purposes only.
TL;DR
Supported data types | 3rd party detection | Hunters detection | IOC search | Search | Table name | Log format | Collection method |
---|---|---|---|---|---|---|---|
Qualys Knowledgebase | qualys_knowledgebase | XML | API | ||||
Qualys Host Detections | qualys_host_detections | XML | API | ||||
Qualys Hosts | qualys_hosts | XML | API |
Overview
Qualys is a cloud-based security and compliance platform that provides a range of solutions for vulnerability management, continuous monitoring, and policy compliance. The platform helps organizations identify, track, and mitigate security risks across their IT environments, including on-premises, cloud, and hybrid infrastructures. Qualys scans systems for vulnerabilities, misconfigurations, and compliance gaps, offering detailed insights into the state of security across networks, applications, and endpoints.
Supported data types
Qualys Knowledgebase
Table name: qualys_knowledgebase
Qualys Knowledgebase logs are detailed records generated by the Qualys platform related to vulnerability scanning, assessment, and management. These logs provide information about security vulnerabilities, patches, and configurations detected across an organization’s infrastructure. They include data about specific vulnerabilities found, including CVE identifiers, severity levels, and affected systems. The Knowledgebase logs also track the progress of vulnerability remediation efforts and any changes in the security posture over time. By reviewing these logs, security teams can gain insights into potential risks, compliance status, and the effectiveness of their patching or mitigation strategies.
Qualys Host Detections
Table name: qualys_host_detections
Qualys Host Detections are records generated by the Qualys platform that identify and track vulnerabilities, misconfigurations, or threats found on specific hosts (servers, workstations, or other devices) within an organization's network. These detections are part of vulnerability management and help security teams prioritize remediation based on the severity and impact of the issues detected on each host. The logs contain details about the host's IP address, operating system, the specific vulnerabilities identified (such as CVEs), and whether the issue has been mitigated or requires further action. By analyzing Host Detections, organizations can strengthen security and ensure compliance across their infrastructure.
Qualys Hosts
Table name: qualys_hosts
Qualys Hosts logs are records generated by the Qualys platform that provide detailed information about the devices (hosts) within an organization's network. These logs track various aspects of the hosts, including their configuration, vulnerability status, IP addresses, operating systems, and security posture. The logs capture any changes or actions taken on the hosts, such as detected vulnerabilities, system updates, or compliance checks. By analyzing Qualys Hosts logs, security teams can monitor the health of their infrastructure, prioritize remediation efforts, and ensure that all devices remain secure and compliant with industry standards.
Send data to Hunters
Hunters supports the collection of logs from Qualys using API.
To connect Qualys logs:
Retrieve the following information from Qualys:
Host (you can find your host here based on Qualys documentation).
User ID
Password
Complete the process on the Hunters platform, following this guide.
Expected format
Qualys API credentials sample
{
"host": "http://host.com",
"user_id": "user",
"password": "password"
}
Qualys Knowledgebase Sample
<VULN_LIST>
<VULN>
<QID>1</QID>
<VULN_TYPE>Vulnerability</VULN_TYPE>
<SEVERITY_LEVEL>3</SEVERITY_LEVEL>
<TITLE><![CDATA[Title]]></TITLE>
<CATEGORY>Database</CATEGORY>
<LAST_SERVICE_MODIFICATION_DATETIME>2022-08-03T00:00:00Z</LAST_SERVICE_MODIFICATION_DATETIME>
<PUBLISHED_DATETIME>2022-08-03T00:00:00Z</PUBLISHED_DATETIME>
<PATCHABLE>1</PATCHABLE>
<SOFTWARE_LIST>
<SOFTWARE>
<PRODUCT><![CDATA[product]]></PRODUCT>
<VENDOR><![CDATA[vendor]]></VENDOR>
</SOFTWARE>
</SOFTWARE_LIST>
<VENDOR_REFERENCE_LIST>
<VENDOR_REFERENCE>
<ID><![CDATA[id]]></ID>
<URL><![CDATA[url]]></URL>
</VENDOR_REFERENCE>
</VENDOR_REFERENCE_LIST>
<CVE_LIST>
<CVE>
<ID><![CDATA[CVE-id]]></ID>
<URL><![CDATA[url]]></URL>
</CVE>
</CVE_LIST>
<DIAGNOSIS><![CDATA[diagnosis]]></DIAGNOSIS>
<CONSEQUENCE><![CDATA[consequence]]></CONSEQUENCE>
<SOLUTION><![CDATA[possible solution]]></SOLUTION>
<CVSS>
<BASE>5.0</BASE>
<TEMPORAL>3.0</TEMPORAL>
<VECTOR_STRING>vector</VECTOR_STRING>
</CVSS>
<CVSS_V3>
<BASE>7.0</BASE>
<TEMPORAL>6.0</TEMPORAL>
<VECTOR_STRING>vector</VECTOR_STRING>
<CVSS3_VERSION>3.0</CVSS3_VERSION>
</CVSS_V3>
<PCI_FLAG>1</PCI_FLAG>
<THREAT_INTELLIGENCE>
<THREAT_INTEL id="5"><![CDATA[Easy_Exploit]]></THREAT_INTEL>
</THREAT_INTELLIGENCE>
<DISCOVERY>
<REMOTE>0</REMOTE>
<AUTH_TYPE_LIST>
<AUTH_TYPE>Unix</AUTH_TYPE>
</AUTH_TYPE_LIST>
<ADDITIONAL_INFO>Patch Available</ADDITIONAL_INFO>
</DISCOVERY>
</VULN>
</VULN_LIST>
Qualys Host Detections Sample
<HOST_LIST>
<HOST>
<ID>1</ID>
<ASSET_ID>1</ASSET_ID>
<IP>1.1.1.1</IP>
<TRACKING_METHOD>IP</TRACKING_METHOD>
<NETWORK_ID>0</NETWORK_ID>
<OS><![CDATA[os]]></OS>
<OS_CPE><![CDATA[cpe]]></OS_CPE>
<DNS><![CDATA[dns]]></DNS>
<DNS_DATA>
<HOSTNAME><![CDATA[dub-citwi-01]]></HOSTNAME>
<DOMAIN><![CDATA[iconcr.com]]></DOMAIN>
<FQDN><![CDATA[dub-citwi-01.iconcr.com]]></FQDN>
</DNS_DATA>
<NETBIOS><![CDATA[netbios]]></NETBIOS>
<LAST_SCAN_DATETIME>2022-08-03T11:10:19Z</LAST_SCAN_DATETIME>
<LAST_VM_SCANNED_DATE>2022-08-03T11:10:19Z</LAST_VM_SCANNED_DATE>
<LAST_VM_SCANNED_DURATION>1</LAST_VM_SCANNED_DURATION>
<LAST_VM_AUTH_SCANNED_DATE>2022-08-03T11:10:19Z</LAST_VM_AUTH_SCANNED_DATE>
<LAST_VM_AUTH_SCANNED_DURATION>1</LAST_VM_AUTH_SCANNED_DURATION>
<DETECTION_LIST>
<DETECTION>
<QID>1</QID>
<TYPE>Confirmed</TYPE>
<SEVERITY>2</SEVERITY>
<PORT>80</PORT>
<PROTOCOL>tcp</PROTOCOL>
<SSL>0</SSL>
<RESULTS><![CDATA[result]]></RESULTS>
<STATUS>Active</STATUS>
<FIRST_FOUND_DATETIME>2017-06-11T04:55:13Z</FIRST_FOUND_DATETIME>
<LAST_FOUND_DATETIME>2022-08-03T07:38:33Z</LAST_FOUND_DATETIME>
<QDS severity="LOW">15</QDS>
<QDS_FACTORS>
<QDS_FACTOR name="name"><![CDATA[No_Patch]]></QDS_FACTOR>
</QDS_FACTORS>
<TIMES_FOUND>1</TIMES_FOUND>
<LAST_TEST_DATETIME>2022-08-03T07:38:33Z</LAST_TEST_DATETIME>
<LAST_UPDATE_DATETIME>2022-08-03T11:43:41Z</LAST_UPDATE_DATETIME>
<IS_IGNORED>0</IS_IGNORED>
<IS_DISABLED>0</IS_DISABLED>
<LAST_PROCESSED_DATETIME>2022-08-03T11:43:41Z</LAST_PROCESSED_DATETIME>
</DETECTION>
</DETECTION_LIST>
</HOST>
</HOST_LIST>
Qualys Hosts Sample
<HOST_LIST>
<HOST>
<ID>111</ID>
<ASSET_ID/>
<IP>10.10.10.10</IP>
<TRURISK_SCORE_FACTORS>
<TRURISK_SCORE_FORMULA/>
<VULN_COUNT qds_severity="1">0</VULN_COUNT>
<VULN_COUNT qds_severity="2">0</VULN_COUNT>
<VULN_COUNT qds_severity="3">0</VULN_COUNT>
<VULN_COUNT qds_severity="4">0</VULN_COUNT>
<VULN_COUNT qds_severity="5">0</VULN_COUNT>
</TRURISK_SCORE_FACTORS>
<TRACKING_METHOD>Cloud Agent</TRACKING_METHOD>
<DNS>ip-10-10-10-10.ec2.internal</DNS>
<DNS_DATA>
<HOSTNAME>ip-10-10-10-10</HOSTNAME>
<DOMAIN>ec2.internal</DOMAIN>
<FQDN>ip-10-10-10-10.ec2.internal</FQDN>
</DNS_DATA>
<CLOUD_PROVIDER>AWS</CLOUD_PROVIDER>
<CLOUD_SERVICE>EC2</CLOUD_SERVICE>
<CLOUD_RESOURCE_ID>i-000</CLOUD_RESOURCE_ID>
<OS>Amazon Linux 2</OS>
<QG_HOSTID>asdf</QG_HOSTID>
</HOST>
<HOST>
<ID>222</ID>
<ASSET_ID/>
<IP>20.20.20.20</IP>
<TRURISK_SCORE_FACTORS>
<TRURISK_SCORE_FORMULA/>
<VULN_COUNT qds_severity="1">0</VULN_COUNT>
<VULN_COUNT qds_severity="2">0</VULN_COUNT>
<VULN_COUNT qds_severity="3">0</VULN_COUNT>
<VULN_COUNT qds_severity="4">0</VULN_COUNT>
<VULN_COUNT qds_severity="5">0</VULN_COUNT>
</TRURISK_SCORE_FACTORS>
<TRACKING_METHOD>Cloud Agent</TRACKING_METHOD>
<DNS>ip-20-20-20-20.us-west-2.compute.internal</DNS>
<DNS_DATA>
<HOSTNAME>ip-20-20-20-20</HOSTNAME>
<DOMAIN>us-west-2.compute.internal</DOMAIN>
<FQDN>ip-20-20-20-20.us-west-2.compute.internal</FQDN>
</DNS_DATA>
<CLOUD_PROVIDER>AWS</CLOUD_PROVIDER>
<CLOUD_SERVICE>EC2</CLOUD_SERVICE>
<CLOUD_RESOURCE_ID>i-111</CLOUD_RESOURCE_ID>
<OS>Amazon Linux 2</OS>
<QG_HOSTID>zxcv</QG_HOSTID>
</HOST>
</HOST_LIST>