Qualys Rollout Guide
Qualys Rollout Guide
Qualys Rollout Guide
Rollout Guide
August 4, 2015
Qualys, Inc.
1600 Bridge Parkway
Redwood Shores, CA 94065
1 (650) 801 6100
Preface
Chapter 1 Introduction
Operationalizing Security and Compliance ................................................................ 10
Qualys Best Practices ...................................................................................................... 11
14
14
14
15
16
19
20
20
20
21
21
22
24
25
27
28
29
29
31
31
32
33
33
34
35
36
37
37
38
39
40
41
41
42
Contents
42
43
44
44
45
48
49
50
51
52
53
55
56
59
60
61
63
64
65
67
69
73
74
76
78
78
81
83
83
84
84
85
90
92
93
94
95
95
95
97
99
Contents
101
102
103
105
106
106
109
110
111
112
112
112
113
114
116
116
117
119
119
120
121
125
128
Chapter 5 Compliance
Achieving Compliance .................................................................................................
Vulnerability Reporting and Trend Analysis ............................................................
Executive Report with Trending ......................................................................
Asset Search.........................................................................................................
Risk Analysis .......................................................................................................
Vulnerability Compliance Reports...................................................................
Remediation Reporting.................................................................................................
Payment Card Industry (PCI) Compliance................................................................
PCI Data Security Standard ..............................................................................
Quarterly PCI External Scans Workflow.........................................................
Quarterly PCI Internal Scans Workflow .........................................................
Policy Compliance (PC) ................................................................................................
Auditor User Role...............................................................................................
Policy Editor ........................................................................................................
Policy Manager ...................................................................................................
Policy Compliance Reporting ...........................................................................
Running Template Based Reports....................................................................
Running Interactive Reports .............................................................................
Exceptions Management....................................................................................
Policy Compliance Current Regulations and Mandates.....................................
QualysGuard Rollout Guide
130
131
132
133
136
138
139
142
142
142
144
146
146
146
148
149
149
149
151
152
5
Contents
158
159
160
161
162
163
Preface
This user guide is intended for security mangers and auditors responsible for the
successful rollout of Qualys Security and Compliance Suite in the enterprise. Qualys
is the widely adopted vulnerability management and policy compliance solution
from Qualys, Inc.
About Qualys
Qualys, Inc. (NASDAQ: QLYS) is a pioneer and leading provider of cloud security
and compliance solutions with over 7,700 customers in more than 100 countries,
including a majority of each of the Forbes Global 100 and Fortune 100.The Qualys
Cloud Platform and integrated suite of solutions help organizations simplify security
operations and lower the cost of compliance by delivering critical security
intelligence on demand and automating the full spectrum of auditing, compliance
and protection for IT systems and web applications. Founded in 1999, Qualys has
established strategic partnerships with leading managed service providers and
consulting organizations including Accenture, Accuvant, BT, Cognizant Technology
Solutions, Dell SecureWorks, Fujitsu, HCL Comnet, InfoSys, NTT, Tata
Communications, Verizon and Wipro. The company is also a founding member of the
Cloud Security Alliance (CSA).
For more information, please visit www.qualys.com.
Preface
1
INTRODUCTION
This guide combines many of the best practices gained from our experience with
supporting customers of varying sizes and complexity with Qualys rollouts. These
projects are large in scale, most often deployed globally on distributed, segmented
networks, and frequently involve many users with diverse responsibilities within the
enterprise. As you start your own Qualys rollout, it makes sense for us to share with
you our best practices approach so that you can quickly and effectively take
advantage of Qualys to automate the process of vulnerability management and
policy compliance within your organization.
The goal of this document is to take you step by step through the process of both
getting Qualys running in production and learning the best practices that will
maximize the value you will receive from enhanced network security.
We have arranged this guide into the sections described below.
Chapter 2, Rollout First Steps, covers the basics of setting up the service, adding
users, defining the scope of user actions, installing QualysGuard Scanner Appliances,
and planning for distributed scanning with multiple Scanner Appliances.
Chapter 3, Getting Started with Security Auditing, leads you through the steps of
running your first scans and understanding scan results. In preparation to this we
discuss QualysGuard tools that help you discover your network and prioritize assets.
Once you have performed and reviewed your first scans, we will describe the options
for customizing scans.
Chapter 4, Enterprise Management and Reporting, takes you through the steps of
implementing a successful Qualys rollout across the enterprise. This is focused on a
phased approach that allows you to start out with a basic process and to enhance the
process, as required, over time. It involves using Qualys enterprise management
tools for security auditing and reporting as well as the remediation workflow feature.
Chapter 1 Introduction
Operationalizing Security and Compliance
Chapter 5, Compliance, helps you to use Qualys to show the progress you are making in
managing your vulnerabilities and the security risk in your network. This will also help
you in making the adjustments to your vulnerability management systems options and
processes to achieve your required results. A key element in tracking your progress is
how this will assist you in meeting the myriad of regulations which have network
security as part of their requirements.
In Chapter 6, Successful Qualys Rollout Case Studies, we have taken real customer
examples, from various industries, to help you understand their ingredients for success.
You can learn from the challenges they faced and have an implementation plan that
leverages their experience.
While this document is intended to assist you with a successful rollout of Qualys, it is
important to note that there are many product features that are not outlined here. As you
become familiar with Qualys you will find additional features and capabilities. We
recommend that you fully explore the application and reference the online help and other
resources documents to allow you to take full advantage of the power of the application.
Before we start it is important that we have a common understanding of Qualys benefits
and a set of high level best practices which we have found to lead to successful
implementations.
10
Chapter 1 Introduction
Qualys Best Practices
Automate
Integrate
Distribute Use
Automate
Once you are ready to begin assessing the security risks on your network, it is important
to have an assessment plan and use Qualys to automate the scanning process.
Automation yields consistent scanning activities which will, in turn, help increase the
consistency of the results. Automation also makes certain you are assessing your risk
regularly (e.g. weekly or monthly). Within Qualys, you can automate network discovery
scans, vulnerability scans, the creation of remediation tickets, and the delivery of
vulnerability reports.
Integrate
Greater value can be achieved by integrating the components of your security solution to
provide an overall view of your security posture. Qualys has available more than 20
out-of-the-box integrations with patch management solutions, intrusion detection /
prevention solutions, SIM (Security Information Management) solutions, ticketing
solutions, and asset management solutions.
11
Chapter 1 Introduction
Qualys Best Practices
Distribute Use
Qualys advocates performing vulnerability scans from each network vantage point. To
achieve this in a geographically distributed or segmented network, customers must
distribute QualysGuard Scanner Appliances throughout the network. Consider placing a
Scanner Appliance in each security zone on the internal network and use the Qualys
provided Remote Internet Scanners to assess risk from the Internet.
In addition, it is important to empower users throughout the organization by distributing
the use of Qualys across functional teams and throughout all levels of the organization.
Many enterprises have reported success in reducing risks by empowering network and
systems administrators to scan their assets. Similarly, by distributing the use of Qualys to
internal and external audit teams, customers have recognized efficiencies in process and
reduced auditing fees. Consider using the five-tier hierarchical role-based access controls
built into Qualys to empower as many users as appropriate within your organization.
12
2
ROLLOUT FIRST STEPS
The rollout project setup involves building a deployment plan based on network
analysis and business objectives, and then distributing vulnerability management
and policy compliance responsibility to multiple users. Its recommended that you
do your homework in advance to understand your network environment and its
segmentation before you begin network security auditing. With your understanding
of the network and the people responsible for managing the various systems and
network segments, you will add user accounts, install Scanner Appliances, and
assign users asset responsibility by defining asset groups and optionally business
units.
To achieve the best rollout project setup in the quickest time, please complete the
following activities in the order presented:
FIRST LOGIN
Note: The rollout project setup requires Manager user privileges. If you are the
subscription owner, then your user account has these privileges by default. You may
choose to add additional Manager users to assist with the rollout project setup. We
will discuss adding users as well as user roles and privileges in this chapter.
FIRST LOGIN
Be sure to complete your first login and check to be sure that you are ready to start
security auditing activities using the account.
BEST PRACTICES
Be sure to complete your account registration. Follow the instructions provided,
starting with the Qualys Registration - Start Now email and ending with accepting the
terms and conditions.
Check configurations before you begin. Its recommended that you view the
IP addresses in your account, add IP addresses and virtual hosts as needed, classify
assets in your account, check network accessibility to target hosts, and review password
security options for the subscription.
ROLLOUT STEPS
Your Qualys account
When your new subscription is created, you will receive an email notification titled
Qualys Registration - Start Now. This email includes a secure link to your user login ID
and password (this is a one-time only link).
After completing the registration steps, you will receive an email notification titled
Qualys Registration - Complete.
Soon we will discuss adding user accounts to the subscription. When you add user
accounts, each new user will receive a Qualys Registration email and will need to
complete the same registration process.
14
Click
(View host information) next to a host to view comprehensive host information,
including the hosts attributes, current vulnerabilities and tickets as well as an activity log
listing actions involving the host.
15
The host assets list displays all hosts in your account. All hosts may be the target for a
vulnerability scan. Compliance hosts may be the target for a compliance scan, when the
policy compliance module is enabled in the subscription. To view compliance hosts only,
select Filters > Compliance Hosts.
Managers can view information on the total IPs
purchased and total IPs in subscription in the
Account Info section (go to Help > Account Info).
Please contact Support or an Account representative
for help with purchasing more IPs.
Add Hosts
To add hosts, go to New > IP Tracked Hosts. (Youll see you have the option to select the
DNS or NetBIOS tracking method if hosts in your network are assigned IP addresses
dynamically.) Use the wizard to enter your new hosts.
16
Host IPs
In the Host IPs section enter IP addresses/ranges. Multiple entries are comma separated.
The policy compliance module may be enabled in your account. If so, the check box Add
to Policy Compliance Module appears. Select this check box if you want the new hosts
to also be added to the policy compliance module. When selected you can perform
vulnerability scans and compliance scans on the hosts.
Host Attributes
In the Host Attributes section, enter host attributes (optional). The host attributes are
displayed in host security views throughout the application, and in scan status reports
(automatic). Initially the names are set to Location, Function, and Asset Tag. Go to
Setup > Host Attributes if you want to customize host attribute names.
17
18
Scheduled Scans will be deactivated at the next launch (except when the target
includes asset groups only and at least one asset group has remaining IPs).
Automatic host data will be purged, also Tickets and Exceptions will be deleted.
Select the IPs you want to remove and then click Remove.
19
Virtual Hosts
Depending on your network configuration, you may want to add virtual hosts to your
subscription. A virtual host is defined as a single machine that acts like multiple systems,
hosting more than one domain (FQDN). Adding virtual host configurations ensures that
the scanning service analyzes all specified domains associated with each IP address
scanned, possibly increasing the number of vulnerabilities detected. To view the virtual
hosts in your account, go to Assets > Virtual Hosts. From the virtual host list you can add
a new virtual host configuration by going to New > Virtual Host.
Manager users have the ability to allow user-defined passwords. This option is not
enabled in new subscriptions. To enable this option, go to Users > Setup > Security. and
select Allow user defined passwords. Any password security settings you make will
apply to all user accounts in the same subscription.
20
User Role
Summary of privileges
Manager
Auditor
21
User Role
Summary of privileges
Unit Manager
Scanner
Reader
Contact
22
Figure 2-2. Organizing Assets into Asset Groups and Business Units
Starting with all the assets in the subscription, you create logical asset groups. Each
Scanner and Reader account is assigned one or more asset groups. You have the option to
go one step further and define business units including asset groups and users. Each
business unit must be assigned one or more Unit Managers who have management
responsibility for a limited set of assets in the subscription.
BEST PRACTICES
Add at least one user account. Qualys recommends that you add at least one new user
account. We suggest that you add a Manager or Unit Manager to begin, although a user
account with any role except Contact is fine. If the subscriber account is lost or misplaced,
this makes it possible for Qualys Support to reset the password for the subscriber account
while retaining all saved results and user configurations for the subscription.
Add users with management responsibility first Managers and Unit Managers.
These users will have management responsibility for the rollout project and they will
have the ability to add more users.
Create a flexible solution. Delegating roles and responsibilities to multiple users
involves creating a flexible solution that adapts to operating environments and maintains
global standards. Refer to Defining Scope of User Actions for developing an approach
to building the solution for your organization.
23
ROLLOUT STEPS
Add at least one user account. Add at least one new user account with privileges to
access the Qualys web application. To add a new user select Users from the top menu and
then select New > User. See Adding a Manager and Adding Scanners and Readers
for help.
Add a Unit Manager. If you wish to use a business unit you ned to add a Unit Manager.
See Adding Unit Managers to Business Units for information.
Review user account information. Gain an understanding of user account information
and privileges for the various user roles. Apply this information when setting up
multiple users.
Adding a Manager
As the subscriber, your user account is automatically assigned the Manager role. You can
choose to add another Manager user so that there is redundancy at the Manager level for
the subscription. All Managers have full privileges.
To add a user, go to Users. From the users list select New > User. Using the new user
wizard, enter user settings.
Under General Information, provide the users name and contact information.
24
Under User Role, select the user role Manager. (The service automatically adds
Managers to the Unassigned business unit).
Under Notification Options select email notifications for the user. After creating the
account, the user has the ability edit these settings.
After you save the account, the new user will automatically receive a registration email
with a secure link to the credentials for their new account and login instructions.
Description
General Information
User Role
Options: Notification
25
Description
26
Asset Groups
Permissions
27
BEST PRACTICES
Understand your network and the people managing the systems. Evaluate the
number of users you expect and what their responsibilities will be, and then match them
to asset groups and business units accordingly.
Follow asset grouping guidelines. When creating asset groups, apply some
conventions for naming and organizing them. As an option, you may use the asset
management workflows from map reports and asset search reports to add assets to asset
groups. See Chapter 3 for information.
ROLLOUT STEPS
Add asset groups and business units.
Add user accounts. Add Managers, Unit Managers, Scanners and Readers as
appropriate for your rollout project.
View users and their asset groups. Refer to the Hierarchy Chart to assist with building
teams and managing users.
28
Settings
IPs
Domains
Scanner Appliances
Business/CVSS Info
Notes about adding users within a business unit: Unit Managers can create Scanners and
Readers for their own business units. When a Unit Manager adds a new user, the asset
groups in the Available list correspond to the asset groups in the Unit Managers
business unit. Unit Managers are responsible for managing assets and users in their own
business unit.
29
Using the new business unit wizard, enter a business unit name. In the Assets section,
assign the business unit assets for scanning (IP addresses, domains and Scanner
Appliances) by moving selected asset groups to the Assigned Asset Groups list. One
asset group is required. In the Users section you can assign users to the asset group
(optional).
Managers can limit the number of new IP addresses that Unit Managers can add, when
these users have accounts with permission to add assets. To enable these controls, go to
Setup > Business Units and select the option Enable limiting the number of new IPs that
Unit Managers can add.
When enabled, Managers have the option to assign a New IP Limit to a business unit.
The New IP Limit is the total number of new IP addresses (not already in the
subscription) that Unit Managers can add. A unique New IP Limit may be assigned to
each business unit.
30
31
The transfer wizard appears. In the Options section confirm the user transfer and select
options. You may choose to keep users personal configurations and asset groups. Please
be aware that if you move users personal configurations without the asset groups, its
possible user configurations may need to be modified after the transfer (for example, in
order for user schedules to run as defined). For more information, see the online help.
32
The Owner menu lists all users who can be assigned the asset group. Possible assignees
depend on the role of the manager making the transfer and the users business unit.
Manager Doing
Transfer
Owners
Business Unit
Manager
Unassigned
Manager
Custom
Manager in Unassigned business unit - or Unit Manager in current owners business unit
Unit Manager
Custom
33
In the case where a Manager transfers an asset group from a user in a custom business
unit to a Manager (in the Unassigned business unit), the asset group automatically
remains in the custom business unit so that users in the custom business unit can
continue to use it.
Deleting Users
Managers and Unit Managers have the ability to delete users. Managers can delete any
user in the subscription, while Unit Managers can delete users in their own business unit.
To delete a user from the user accounts list, select
the check box next to the user you wish to delete,
and then select Actions > Delete. Its possible to
select multiple check boxes to delete multiple users
in bulk.
Confirm the user delete action. Youll have the option to delete the users scan results.
Also youll have the option to transfer the users business objects to another user. These
objects include profiles, report templates, asset groups, scheduled tasks, authentication
records, policies, exceptions, vulnerability tickets and search lists.
Map and Scan Results. When map and scan results are deleted results will no longer be
available to other users for reporting.
User Business Objects. Assign the users business objects to another user or select No
New Owner. Possible assignees are Managers plus other users with the same or greater
user role as the user you are deleting. For example, if deleting a Scanner, the New Owner
menu lists Managers plus Unit Managers and Scanners in the users same business unit.
When No New Owner is selected, the users personal business objects are deleted.
34
BEST PRACTICES
Plan for Scanner Appliance installations. First evaluate your network setup and access
to the Qualys platform. Qualys Support is available to assist you with network
evaluation and analysis to determine the recommended number of Scanner Appliances
for your organization.
Place Scanner Appliances as close to targets as possible. Its best to place Scanner
Appliances as close to scan targets as possible to minimize latency and maximize
bandwidth for scanning traffic, which is much heavier than reporting traffic.
ROLLOUT STEPS
Add user account for installation. A Qualys user account is required to install each
appliance. Its recommended that you create a dedicated Qualys user account - a
Manager or Unit Manager account is required. See Adding User Accounts.
Physical Scanner Appliances. Follow the simple 3-step installation steps in the Qualys
Scanner Appliance User Guide. You can download the latest version from the online help.
Virtual Scanner Appliances. Qualys offers multiple distributions to support
deployments on multiple virtualization platforms. For information, see the Qualys Virtual
Scanner User Guide. You can download the latest version from the online help.
35
Proxy Support
36
37
BEST PRACTICES
Check Scanner Appliance Status before you start scanning. Check the scanner
appliance status within your Qualys account to be sure the status is online and the most
recent heartbeat check performed by the service was successful for the appliances in your
account.
Evaluate which Scanner Appliances to add to which Asset Groups. Once installed a
Scanner Appliance is available to all Managers. Other users (Unit Managers, Scanners,
Readers) must be granted access to Scanner Appliances. To do this you add the
appliances to asset groups and then assign the groups to users accounts and/or business
units.
ROLLOUT STEPS
View your Scanner Appliances. View and manage Scanner Appliances in your Qualys
account from the scanner appliances list.
Check out the Scanner Capacity Chart. This chart shows the percentage of used
capacity for the appliance over the past 7 days. Also the service calculates a capacity
trend so you can track usage over time.
Grant users access to Scanner Appliance. Only Managers can view/access newly
installed Scanner Appliances. See Assign Scanner Appliances to Asset Groups and
Grant Users Access to Scanner Appliances.
38
39
The Scanner Capacity chart shows the capacity of the appliance within the past 7 days,
calculated in 15 minute increments. Place your cursor over any point in the chart to see
the used capacity for that moment in time, expressed as a percentage. For example Used
Capacity: 18% means the appliance used 18% of its capacity and 82% of its capacity was
available at that time. Youll see the date and time the capacity was calculated.
A trend line shows you the capacity trend, calculated in 6 hour intervals. Every 6 hours
the service takes an average of the used capacity and shows this in the middle of a 6 hour
window. For example, for the period 3pm to 9pm the average appears at 6pm. Average
over 6 hours: 10% means the average of the used capacity was 10% and 90% of its
capacity was available for the 6 hour window.
40
41
42
Need help with organizing your assets? See Asset Categorization and Workflows in
Chapter 3 where we discuss how to use Qualys to identify, prioritize and classify assets
into asset groups.
43
Assign the asset groups containing the Scanner Appliance to each user account.
You need to edit each users account and add the asset groups to the users
Assigned Asset Groups list.
Manager: Add the asset groups containing the Scanner Appliance to the target
business unit. This grants Unit Managers access to the appliance.
Manager or Unit Manager: Assign the asset groups containing the Scanner
Appliance to each user account. You need to edit each users account and add the
asset groups to the users Assigned Asset Groups list.
44
Manager: Add a master asset group for each business unit, where each master asset
group contains all IPs and domains for an individual business unit. Since these
asset groups are created by a Manager, they can be edited only by Manager users.
Note Scanner Appliances will be added to these asset groups later in Step 6.
Manager or Unit Manager: Add more users to each business unit. Unit Managers
have the ability to add additional users (Unit Managers, Scanners, Readers) to their
assigned business unit.
Qualys Rollout Guide
Manager or Unit Manager: Install Scanner Appliances. After completing this step,
only Managers have privileges to view and manage the appliances.
Manager: Assign Scanner Appliances installed in Step 5 to the master asset group
for each business unit. Completing this step makes the Scanner Appliances for each
business unit available to Unit Managers.
45
46
Under Replace Scanner Appliance, choose the old and new scanner appliance and
click Replace. Important: If the new appliance is currently defined in asset groups
and scheduled tasks, then it will be removed from those business objects.
Review the warning message and then click the View Report button to see the
scanner appliance settings to be migrated to the new appliance.
Review the Replace Scanner Appliance Report. Its recommended that you do not
replace a scanner appliance if scans are running.
3
VULNERABILITY SCANNING
Getting started with security auditing involves learning about Qualys security audits
and developing an approach to security auditing that will meet your organizations
network security goals. Typically multiple users participate in security auditing. Its
important to demonstrate the value of Qualys to gain the trust and confidence of the
operating teams and outsourcers. The best way to do this is to support them in their
first experiences with security auditing and to provide them with guidelines, which
are the focus of this chapter.
Qualys gives users the ability to learn more about their network environment first,
before launching security audits on an enterprise scale. In fact this is reported by
many customers with successful rollouts as an ingredient for their success with their
rollout project. This chapter discusses network discovery and workflow features that
are designed to assist users with learning more about their networks.
To get started with security auditing in the quickest time, please complete the
following activities in the order presented:
NETWORK DISCOVERY
VULNERABILITY KNOWLEDGEBASE
CUSTOMIZING SCANS
NETWORK DISCOVERY
Network discovery produces a baseline map of your network infrastructure from which
you can identify and categorize assets. Depending on your network, there may be more
than one network domain to discover.
The network discovery feature identifies network devices and reports comprehensive
information about them. Starting with a domain name you supply such as
mycompany.com, the service uses the domains DNS to discover hosts and gather
information about hosts. Map results are available in both text and graphic formats.
BEST PRACTICES
Perform network analysis before you begin. Perform network analysis with the
Security and Network teams at the outset of the project to produce a working inventory
of your organizations assets.
Use Qualys mapping to understand your network. Use the Qualys mapping feature
to produce a map of your network and learn about the devices it contains. Check the map
results and compare against your own asset inventory.
ROLLOUT STEPS
View the domains in your account in the Domain Assets section. Run an on demand map
for a target domain using the profile Initial Options and view the map results. To make
the maps manageable, you may choose to run multiple maps on separate network
segments. Then schedule one or more maps to run weekly, and run differential reports to
measure network changes.
Launch a Map
Go to Scans > Maps. Then select New > Map.
In the Launch Map window, enter a map title, select an option profile (the profile "Initial
Options" is recommended to get started) and map targets under Target Domains. For the
map target, you may specify any combination of IPs/ranges, domains and asset groups.
When Scanner Appliances are in your account, select a scanner option on the Scanner
Appliance menu. Click Launch to start the map.
For each map request, well create one or more maps, depending on the map targets you
specify. When multiple maps are created, theyll share the same map title.
49
You can track the maps progress on the Maps tab. Youll see the status Running when the
map is in progress, and the status Finished indicates the map has completed. You can
cancel a map in progress at any time by selecting the map (row) and then selecting
Actions > Cancel.
Host indicators in the Results section provide additional host information. A - Approved
host for the domain. S - Scannable host, already in the subscription. L - Host was alive at
time of discovery. N - Host in the domains netblock. In the Hosts section, you can view
host details for each discovered host.
Click the right arrow next to any host to view a list of open services on the host. Youll
find the discovery method used to detect each service along with the port that the service
was found to be running on (if available).
For a scannable host, click the host IP address to view detailed, current host information.
50
Click on any host in the map to see details in the Preview pane (below). Youll see basic
information on the discovered host, its OS, and how it was identified:
51
Map Settings
Target Domains
Each time you launch or schedule a map, you specify one or more map targets in the
Target Domains section. You may specify any combination of registered domains, IP
addresses/ranges, and asset groups. When you select an asset group for the map target,
you have the option to map the domains and/or the IPs defined in the asset group.
When multiple map targets are submitted in a single map request, well automatically
create multiple map reports - 1 report for each registered domain and for each group of
IPs. For example, if you enter 2 registered domains, then well create 2 map reports. If
you enter 2 registered domains plus a range of IPs, then well create 3 map reports. All of
the maps created from a single request will share the same map title. The Targets column
in your Maps list identifies the registered domain name or the IP addresses/ranges
included in each map report.
What are netblocks? When your map target is a registered domain, netblocks are used to
expand the scope of discovery beyond the domain itself - the IPs in the netblocks are
included in the discovery process and resulting maps. When your map target is the
special none domain, discovery is limited to the user-configured IPs/ranges.
Tell me about using the none domain. First define the none domain is defined with
IPs/ranges in your account, add the none domain to asset groups, and then launch
maps on this domain. We recommend these option profile settings for the scan: Perform
Live Host Sweep and Exclude Hosts Only Discovered via DNS.
Option Profile
Your network scan (map) configuration settings are defined in an option profile. We
recommend the profile Initial Options to get started with your first maps. You may
choose to customize this profile. See Option Profile Settings and the online help for
details.
52
Scanner Selection
External scanners are available for mapping external domains. When there are Scanner
Appliances in your account, you select a scanner option for internal scanning from the
Scanner Appliance menu. Note that you need to use a Scanner Appliance to create maps
for internal domains (those with private use internal IPs).
Option
Description
External
Default
The service identifies the Name Server (NS), and then sends a request to list all the
hosts managed by the NS. Note that this request is not always allowed and may be
forbidden by the administrator.
Using a proprietary list of roughly 100 common names, such as www or ftp, to form
a list of Fully Qualified Domain Names (FQDN), the service queries the NS to find
the IP address assigned to each FQDN.
After hosts are identified, the service determines whether hosts are alive and gathers
information about the hosts, such as information about the operating system and routers
detected on each host. Operating system detection is mainly based on TCP/IP stack
fingerprinting. Multiple information gathering methods may be employed. Note that the
precise methods used relate to the option profile configuration.
53
Network discovery is a dynamic process that involves two main events: host discovery
and basic information gathering. The standard behavior for these events is described
below. The service enables this standard behavior in new option profiles, including the
Initial Options profile. You can modify this standard behavior by creating or editing an
option profile and applying the profile to the map request.
Host Discovery
Upon receiving a map request for a registered domain, Qualys gathers data from public
records to identify hosts using various methods including Whois lookups, DNS zone
transfer, and DNS brute force. The service then checks availability of the hosts in the
target domain. For each host, the service checks whether the host is connected to the
network, whether it has been shut down and whether it forbids all Internet connections.
The service pings each target host using a combination of TCP, UDP, and ICMP probes
based on the option profile configuration. If these probes trigger at least one response
from the host, the host is considered alive and the service proceeds to the next event as
described in Basic Information Gathering on Hosts below. If a host is found to be not
alive, discovery stops for that host.
The types of probes sent to hosts and the list of ports scanned during host discovery are
configurable as additional options (Additional section) in the option profile. With the
standard options enabled, the service sends probes to TCP, UDP, and ICMP ports for
common services, such as HTTP, HTTPS, FTP, SSH, Telnet, SMTP, DNS and NetBIOS.
54
BEST PRACTICES
Perform network analysis before you begin. As a reminder to one of our best practices
under Network Discovery, be sure to perform network analysis with the Security and
Network teams to produce a working inventory of the organizations assets. Your
analysis will assist with prioritizing assets using Qualys.
Use discovery scans (maps). Use the Qualys mapping feature to understand the assets
on your network and to assist with prioritizing those assets.
Use a phased approach to asset prioritization. Our customers with successful rollouts
use a phased approach that is integrated with their Qualys security management
program:
Phase 1. Define initial asset groups. Typically customers define by location, function,
importance, or ownership and assign user responsibility following steps in
Chapter 1, Rollout First Steps.
Phase 2. Run first scans following steps in Your First Scans. Update asset groups
based on findings from first maps and scans.
Phase 3. Run trend reports to identify network changes and update asset groups
based on the findings.
55
Some of our customers that have completed successful rollouts offer this advice:
Consider your reporting goals and check that your asset groups will meet your
reporting needs.
Customer quote: Trend reporting works well when you scan the same hosts every
week. If the hosts change from week to week, the trend results are not meaningful.
Customer quote: I would have had better, more meaningful reports more quickly,
if I had setup asset groups differently from the start of my project.
ROLLOUT STEPS
Add Asset Groups that reflect business operations. Based on your network analysis,
create asset groups and assign business priority to them accordingly. Asset groups
should be defined according to network segments, business units, asset location and
function. You have the option to use the Qualys workflow to first discover assets and
then add them to asset groups.
Take Workflow Actions. From a map report, take workflow actions to manage hosts on
your network. For example, you can take workflow actions to add hosts to asset groups
and add hosts to the subscription so that they can be scanned.
Assign Scanner Appliances to asset groups. When Scanner Appliances will be used,
be sure to assign the Scanner Appliances to the appropriate asset groups. This will allow
users to run distributed scans across multiple Scanner Appliances on asset groups that
include Scanner Appliances.
56
After selecting hosts, go to the Actions menu at the top of your report window and select
Add to a new Asset Group from the drop-down menu, and then click Apply.
The asset group wizard appears and you will notice the IPs you selected are assigned to
the asset group automatically. Use the IPs section to add IPs, the Domains section to add
domains, and the Business/CVSS Info section to assign business impact values. When
there are Scanner Appliances in your account, use the Scanner Appliances section to add
appliances.
The Scanner Appliances section for a sample asset group appears in Chapter 2 in the
section Scanner Appliance Installation and Setup.
The Business Info section is where you specify an impact level used to calculate business
risk in scan status reports (automatic). The impact level High is assigned automatically
for a new asset group.
When CVSS Scoring is enabled for the subscription, CVSS metrics appear and you can
assign values. The CVSS metrics are used to calculate CVSS scores for vulnerabilities in
scan status reports. For a new asset group, the service sets these values to Not Defined
by default, following the CVSS Version 2 standards.
57
More information on business risk and CVSS scoring in reports is covered in the next
chapter in Enterprise Reporting.
58
Add to a new Asset Group. Add selected hosts to a new asset group.
Add to Asset Groups. Add selected hosts to one or more asset groups.
Remove from Asset Groups. Remove selected hosts from one or more asset groups.
Launch Vulnerability Scan. Launch an on demand vulnerability scan on selected hosts.
Launch Compliance Scan. Launch an on demand compliance scan on selected
compliance hosts (policy compliance module required).
Schedule Vulnerability Scan. Add a scheduled vulnerability scan on selected hosts.
Schedule Compliance Scan. Add a scheduled compliance scan on selected compliance
hosts (policy compliance module required).
Edit. Edit selected hosts. You may edit the tracking method (IP address, DNS, NetBIOS),
owner, host attributes and comments.
Purge. Purge selected hosts. When you take this action on selected hosts, the service
deletes all vulnerability information (from vulnerability scans) and compliance
information (from compliance scans). Deleted information is not recoverable and is not
displayed in the UI and reports. The action to purge hosts is available to all Managers. It
is available to other users when granted this permission on an individual basis.
Add to Subscription. Add selected hosts to the subscription. This action is available to
Managers. Unit Managers may be granted this permission.
59
60
BEST PRACTICES
Important! Do not scan your entire network at first. Instead start with a host, then a
few hosts, move to a subnet or organizational unit, and then to an entire Class B or
Class C. By limiting the scope of your first scans your scan results and remediation tasks
are manageable. When you want to scan multiple IPs, use asset groups or asset tags as
scan targets, instead of individual IPs.
Here are rollout steps for first scans that are used by several customers with successful
rollout projects:
1
Scan your asset groups or asset tags and review the scan results.
Review your initial scan reports with management. This is an important step to
ensure your continued success with Qualys within the organization.
Take steps towards setting expectations. While offering many tremendous benefits,
scanning for security vulnerabilities can have potential impact to certain systems and
configurations. Keep in mind that there can be issues with software not reported to the
public or issues that we are not aware of. Its recommended that you review the known
issues covered in the Qualys document Potential Impact to Systems that is available in
the Resources section (go to Help > Resources > Qualys Support). Publicizing this
document to all parties involved will help to gain the trust and confidence of operating
61
teams and outsourcers. Our experience is that executive support of your security and
compliance program and corporate communications to the parties involved in advance
of your first scans is an advantage, leading to successful experience with scanning.
ROLLOUT STEPS
Launch Scans. The scan feature allows you to test the security of one or more hosts
identified in your map report. By launching a scan on a selected host, youll receive a
detailed scan report with the vulnerabilities detected on the target host.
62
Review initial scan results. As you are getting started, pay close attention to your scan
results so that you can refine your scans and possibly your asset groups to best suit your
organizations needs. Next steps will involve setting up scheduled scans on your asset
groups so that scans run automatically and new scan results are available for reporting.
See Add Scheduled Scans and Maps in the next chapter.
63
In the Launch Vulnerability Scan window, enter a title for tracking (optional) and select
target hosts (asset groups and/or IP addresses). For Option Profile, we recommend
Initial Options to get started (see Option Profile Settings). When there are Scanner
Appliances in your account, select a scanner option (see Scanner Appliance Setting).
Click Launch to start the scan.
Youll notice you can select asset tags as target hosts when Asset Tagging has been added
to your account and you have accepted the New Data Security Model (go to Users >
Setup > Security for information).
The scan status window appears automatically to show you the scan job status. You can
safely close this window and open again from the scans list.
64
Scan Status
You can easily track a scan and its status by going to the scans list. The solid icon
tells
you all scan results have been processed and these results are available for reporting. The
next time you create a scan report (based on automatic data) the scan results from the
scan will be included. Also youll see the scan results throughout the application.
1) Scan Status Icons. A solid icon (filled-in) means all results available for the scan have
been processed, meaning the host scan data (Auto data) has been updated throughout
the application, and these results are available for reporting. A hollow icon means results
processing is in progress. When a scan is finished and the results have been processed,
youll see . If the results processing is in progress, youll see . You can always mouse
over an icon to see the scan status.
2) Summary in the Preview Pane. The summary includes the number of hosts scanned
and the number of appliances used. For a vulnerability scan you also see the number of
vulnerabilities detected. A summary statement gives you the status of the scan and
whether the results have been processed. In the example above, the scan is finished and
all results from the scan have been processed. There were a total of 3 hosts scanned and 6
vulnerabilities detected. Also, if your scan was interrupted or if there was a scan error,
such as the scanner appliance was unavailable, then youll see the error returned.
3) View Summary. Click this link to see the current status of the scan and details about
scanner usage, including which scanners were used to scan target hosts. Note that the
Scanners section is only visible in accounts with New Scanner Services enabled.
65
Click on the Scanners section and expand details for a scan segment to see which
scanners (external scanners and/or scanner appliances) were used to scan hosts. In the
following example, the external scanner with IP 10.10.21.120 was used to scan 3 hosts.
When a scanner appliance is used, the scanners friendly name appears
4) View Results. Click this link to open the Scan Results report. Youll notice that you can
also get to the results by clicking the View Results button in the Scan Status window.
: Initial Options
Launched By
Company
Launch Type
Scan Status
Next Action
: Finished
: None
: 16
67
Severity 5 "Urgent"
Severity 4 "Critical"
Severity 3 "Serious"
Severity 2 "Medium"
Severity 1 "Minimal"
Total
:3
:1
:0
:2
:0
(+3)
(+1)
(=)
(-2)
(-1)
:6
: 26
(+)(-)(=): Difference with previous detection for each host/vulnerability pair. For a complete explanation
of trend information, refer to the online help.
----------------------------------------------------------------------------------------------------------Click here to view your full scan report:
https://qualysguard.qualys.com/fo/report/report_view.php?ref=scan/1309378087.24272&authfirst=true&em=1
68
69
70
Detailed Results
Detailed Results show a list of detected vulnerabilities sorted by host and characterized
by operating system. The severity level icon is Red for a Confirmed vulnerability, Yellow
for a Potential Vulnerability, and Blue for information gathered (see the Appendix for
descriptions of the vulnerabilities and severity levels).
Click on a vulnerability title to see vulnerability details. THREAT is a description of the
threat posed by the vulnerability, IMPACT describes the impact of the vulnerability if
exploited, and SOLUTION is a verified solution for the issue provided by the service.
Scrolling down further, additional details may be provided.
Compliance
COMPLIANCE information describes various government and industry-specific
regulations that are associated with a detected vulnerability.
71
Exploitability
EXPLOITABILIITY information may appear with vulnerability details. Qualys correlates
exploitability information from third party vendors and/or publicly available sources to
provide up to date references to exploits and related security sources. Exploitability
information enables users to perform risk-oriented analysis of vulnerabilities and to
further prioritize their remediation plans. Sample EXPLOITABILITY section:
Associated Malware
ASSOCIATED MALWARE information may appear with vulnerability details. Qualys
correlates malware information with Qualys-detected vulnerabilities when malware
threats for vulnerabilities are published in the Trend Micro Threat Encyclopedia. This
correlation allows users to prioritize and filter vulnerabilities so that they can get
actionable information to administrators for remediation of vulnerabilities that can lead
to malware infections. Sample MALWARE section:
Results
RESULTS shows scan test results returned by the scanning engine, if any. Sample section:
72
73
VULNERABILITY KNOWLEDGEBASE
Vulnerabilities are used for vulnerability scanning and reporting. Qualys has the
industrys largest and most complete Vulnerability KnowledgeBase, an inventory of
thousands of known vulnerabilities that covers all major operating systems, services and
applications. Vulnerability checks in the KnowledgeBase are continuously added and
updated, without requiring software to install and maintain.
To view the KnowledgeBase, select Knowledgebase.
In the upper right corner, youll see the total number of vulnerabilities next to options for
paging through the list. Using the arrow icons you can go to the next page, previous
page, first page and last page. Using the page selector drop-down menu, you can jump to
a list section.
Each entry in the vulnerabilities list provides summary information about a particular
vulnerability, including the QID (Qualys ID), vulnerability category, title and severity
level. Links to related CVE names and vendor references are displayed when available.
To view information about a vulnerability, mouse over a vulnerability (row), click
and
then select Info from the Quick Actions menu. The information wizard provides many
sections with general information, QID details, descriptions for impact, threat and
solution, and correlation information for exploitability and associated malware.
Youll notice the Title column includes icons for vulnerability identification. You can
mouse over the icons to understand their meaning.
74
A patch is available.
Exploitability information is available. The service correlates exploitability
information with service-detected vulnerabilities when known exploits are
published by third party vendors and/or publicly available sources.
Malware information is associated with this issue. The service correlates
malware information with vulnerabilities when malware threats for
vulnerabilities are published in the Trend Micro Threat Encyclopedia.
75
Confirmed Vulnerabilities
A Confirmed Vulnerability is a design flaw or mis-configuration which makes your
network (or a host on your network) susceptible to malicious attacks from local or remote
attackers. Depending on the severity of the security risk, a successful exploitation of a
Confirmed Vulnerability can vary from the disclosure of information to a complete
compromise of the host.
Severity icon
Severity level
Description
5 - Urgent
Intruders can easily gain control of the host, which can lead
to the compromise of your entire network security.
4 - Critical
3 - Serious
2 - Medium
1 - Minimal
Potential Vulnerabilities
A Potential Vulnerability is a vulnerability that we cannot confirm exists. In these cases,
at least one necessary condition for the vulnerability is detected. The only way to verify
the existence of this type of vulnerability would be to perform an intrusive scan on your
network, which could result in a denial of service. This is strictly against our policy.
Instead, we urge you to investigate potential vulnerabilities further. The service can
verify the existence of some potential vulnerabilities when trusted scanning is enabled.
76
Severity icon
Severity level
Description
5 - Urgent
4 - Critical
3 - Serious
2 - Medium
1 - Minimal
Information Gathered
Information Gathered is a vulnerability that includes visible information about the
network related to the host, such as traceroute information, Internet Service Provider
(ISP), or a list of reachable hosts. Information Gathered issues include Network Mapping
data, such as detected firewalls, SMTP banners, or a list of open TCP services.
Severity icon
Severity level
Description
3 - Serious
2 - Medium
1 - Minimal
77
Vulnerability Search
When viewing the KnowledgeBase, click Search above the list area to search for
vulnerabilities by attributes. Many options are provided, including QID (vulnerability
ID), vulnerability title, discovery method, authentication type required for detection,
vulnerability severity levels, whether the vulnerability has patches, has a certain vendor
reference and more.
Scroll down to search for vulnerabilities by vendor and/or product associated with them.
Vendor and product information is provided by NIST as part of CVE information.
Important! Not all vulnerabilities (QIDs) have an associated vendor and product
information from NIST. This means if you search for a certain vendor name, the search
results may not list all QIDs associated with that vendor.
78
For example, a user may define a dynamic list with all Apache vulnerabilities and add
this to an option profile. A dynamic list is created by the service when a scan is launched
with this option profile. In this way, the dynamic list is updated automatically as new
Apache QIDs are added and new patch information becomes available.
To view the search lists in your account, click KnowledgeBase on the top menu and then
click the Search Lists tab.
There are many ways to use vulnerability search lists in your account. Here are a few
ways you can use search lists:
Create a dynamic list for an always up-to-date Microsoft patch Tuesday scan
report, scan option profile and remediation rule.
Create a dynamic list of QIDs for a particular vendor or product, such as Apache,
Cisco, Microsoft, or Sendmail.
Create a dynamic list of QIDs that are remotely exploitable on the .net framework.
79
To add a dynamic search list, go to KnowledgeBase > Search Lists. From the search lists
area, select New > Dynamic List. Enter a title to identify the list. Under Criteria, select
vulnerability search criteria.
Editing Vulnerabilities
Editing vulnerabilities gives Managers greater control over how vulnerabilities appear
online and within reports and how they are prioritized for remediation. Customized
settings are global and appear to all users in the subscription.
To edit a vulnerability, go to the KnowledgeBase. From the vulnerabilities list, select a
vulnerability (row), click
and then select Edit from the Quick Actions menu. Use the
Edit Vulnerability wizard to edit settings. You can change the severity level, disable the
vulnerability, and add custom comments for the Threat, Impact and Solution. The Restore
Defaults option allows you to reset the vulnerability settings to the defaults provided by
the service.
81
OVAL Support
OVAL stands for the Open Vulnerability and Assessment Language, which is an
international information security baseline standard to check for the presence of
vulnerabilities and configuration issues on computer systems. The OVAL standard
includes vulnerability definitions and schemas.
Qualys supports the OVAL standard, including OVAL definitions for Windows file and
registry tests plus compound tests. Using Qualys you can add OVAL version 4.0, 4.1 and
4.2 vulnerabilities to the KnowledgeBase.
To add an OVAL vulnerability (Manager only), go to the KnowledgeBase. From the
vulnerabilities list, select New > OVAL Vulnerability and follow the workflow provided.
Once added, any user in the subscription can scan and report on the OVAL vulnerability.
82
CUSTOMIZING SCANS
Qualys supports customization of scans, giving users the ability to scan specific ports and
specific vulnerabilities as needed, to enable trusted scanning, and to fine-tune
parameters. These scan options are specified in profiles. When launching or scheduling
scans, users apply an option profile to the task. For vulnerability scans, Qualys provides
pre-defined option profiles, and users with scanning privileges can create custom
profiles.
BEST PRACTICES
Use Initial Options to get started. Qualys provides the Initial Options profile with
standard settings based on our experience with supporting Qualys users.
Learn about the option profiles provided. Review the option profiles provided and
use them to run scans before creating new profiles.
ROLLOUT STEPS
Scanner Appliance setting. External scanners are available for external scanning. When
there are Scanner Appliances in your account, you may select another scanner option.
Note that you cannot select external scanners to scan private use internal IPs.
View your option profiles. The service provides pre-defined profiles in your account
for vulnerability scans. Other profiles may also be listed. View the list of option profiles
to learn about them. You can create, edit, delete, and view profiles from the option
profiles list.
Edit option profiles. Add, edit, and delete option profiles as needed. Before launching a
compliance scan, you need to create at least one compliance profile.
Description
External
83
Option
Description
Default
Initial Options. Qualys recommends this as a starting point for new users.
Qualys Top 20 Options. Use to scan for the Qualys Top 20 real-time vulnerabilities.
SANS 20 Options. Use to scan for the SANS Top 20 vulnerabilities, published by
The SANS Institute. (Important: The SANS Top 20 list was last updated in 2008. For
more accurate information on the most prevalent and critical real-world
vulnerabilities use the Qualys Top 20 list.)
Payment Card Industry (PCI) Options. Use to perform a scan that analyzes whether
target hosts are compliant with the Payment Card Industry Data Security Standard
(PCI DSS). See Online Merchants and Retailers in Chapter 5.
84
The Scan section settings in an option profile (for a vulnerability scan) are below.
Scan Option
Description
85
Scan Option
Description
Authoritative Option
Performance
86
Scan Option
Description
Vulnerability Detection
Authentication
87
Scan Option
Description
Share Enumeration
88
Description
Host Discovery
Specify which probes are sent and which ports are scanned
during host discovery. Settings affect how the service
detects hosts and determines if hosts are alive.
Initial settings:
TCP Ports - Standard Scan (maximum 20 ports)
UDP Ports - Standard Scan (maximum 6 ports)
ICMP - Enabled
Blocked Resources
Ignore firewall-generated
TCP RST packets
Ignore firewall-generated
SYN-ACK packets
89
The Vulnerabilities section identifies the current vulnerabilities based on the most recent
vulnerability scan of the host.
The Compliance section appears when the policy compliance module is enabled. This
section lists the compliance policies that apply to the host with current compliance status.
90
4
ENTERPRISE MANAGEMENT AND REPORTING
An enterprise management program should include plans for security auditing,
reporting and remediation. Its recommended that you form an enterprise
management plan addressing these constituent parts and publish the plan to all
parties involved. When developing your plan, keep in mind that its best to start with
a phased approach to security auditing, reporting and remediation with realistic
goals.
For enterprise management to be successful, its important to understand the needs
of the different parties involved. Learning when its best to schedule scans and maps
often requires discussion with multiple corporate groups users responsible for
scanning as well as IT and network groups. Be sure to document your procedures
thoroughly and set expectations within the organization on the frequency and scope
of security auditing.
To implement an enterprise management program in the quickest time, please
complete the following activities in the order presented:
ENTERPRISE REPORTING
REMEDIATION WORKFLOW
BEST PRACTICES
Define a scanning policy. Determine how frequently scans will occur and who will be
responsible for which scans. Since your trend reports will incorporate scan results,
consider your reporting requirements when defining your scanning policy.
Schedule scans. Our customers are most successful and see the most remediation
progress by running scheduled scans on a regular basis. Following this best practice
ensures that there are scan results data that can be incorporated into trend reports at all
times.
ROLLOUT STEPS
Add scheduled scans. Setup scheduled scans to run on a regular basis. We recommend
that you scan hosts at least monthly. Separate scheduled tasks running at different times
may be easily setup to do this.
Review your option profiles. Review your option profiles for vulnerability scans. You
can view the option profiles list and detailed information about each profile. Be sure to
review the default option profile and understand its function.
Define option profiles. Qualys provides option profiles for vulnerability scans that you
can use right away. You may edit the option profiles provided or create new ones to suit
your organizations needs. (For compliance scans, you need to create at least one
compliance profile). Settings in option profiles enable scanning for selected
vulnerabilities and trusted scanning. Manager users can create global option profiles
which are automatically published to user accounts with scanning privileges.
Check Scanner Appliance status. From your scanner appliances list you can view
detailed information about the scanners in your account and identify whether they have
passed the most recent health check and whether they are currently performing scans.
Use Scanner Parallelization for large scans. Use the scanner parallelization feature to
distribute scanning across multiple Scanner Appliances in parallel to increase scan speed
when scanning a large number of hosts. This feature is available for on demand and
scheduled scans.
92
The Manager primary contact has the option to allow users to configure a scheduled scan
to relaunch once a scan instance finishes, when New Scanner Services is enabled for the
subscription. This gives users the ability to perform continuous scanning by launching a
new scan as soon as the previous one finishes. This option is set by going to Scans > Setup
> Scheduled Scans. Once configured, users have the option to start continuous scanning
by configuring a schedule and selecting Relaunch on Finish from the Occurs menu.
Please note:
1) The schedule will be deactivated the first time a scan error is reported unless you
choose to deactivate it after two or more scans have errors.
2) Be aware that each active scan counts towards the concurrent scans limit set for your
subscription. Also any scan may have impact to your network and the same impact could
occur repeatedly, until the schedule is deactivated, canceled or paused.
The Manager primary contact has the option to prevent the service form starting a new
scheduled scan when there's an instance of it running. In this case the service skips
launching the second scan, sets the next launch date to the future, and counts the skipped
scan as an occurrence. This option is set by going to Scans > Setup > Scheduled Scans.
Qualys Rollout Guide
93
Users privileges to option profiles depends on the users assigned user role and assets.
User Role
Manager
Unit Manager
Scanner
Reader
- global profiles
You can add an option profile, which may be applied to vulnerability scans, by editing a
profile provided by the service or creating a new one. See Customizing Scans in
Chapter 3 for details on the scan settings.
94
Global option profiles that are available to all users in the same
business unit. Only Unit Managers can create these profiles for
their own business unit.
To designate an option profile as a global option profile, edit the profile and select the
option Make this a globally available option profile.
95
When Complete is selected the service runs all vulnerability checks in the
KnowledgeBase, except any custom OVAL checks. Select OVAL checks to include
OVAL checks.
Select Custom to scan for a custom set of vulnerabilities in one or more search lists.
When you select Custom the search list section opens, as shown below, and you are
prompted to add search lists. Select Add Lists and select search lists (up to 10) with the
vulnerabilities you want to exclude from scanning, and then click OK. When Custom is
selected, we recommend you select Basic host information checks.
The Exclude option is used to exclude certain vulnerabilities. When this option is
selected, you are prompted to select search lists (similar to the Custom option). Select
Add Lists and select search lists (up to 10) with the vulnerabilities you want to exclude
from scanning, and then click OK.
96
Trusted Scanning
Trusted Scanning allows organizations to systematically audit their network
infrastructure without the burden of deploying agents on every desktop and server. With
trusted scanning, more system intelligence is gathered from target hosts.
Qualys offers trusted scanning for Windows, Unix, Oracle, SNMP, Cisco IOS, VMware,
IBM DB2, MS SQL Server (for compliance scans) and more. Oracle Listener
authentication allows users to obtain a list of Oracle System IDs (SIDs) discovered behind
the Listener. With this list you can create Oracle records for the SIDs and perform trusted
scans.
Good to Know:
- For vulnerability scans, authentication to hosts is required for trusted scanning. If
authentication to a host fails the service performs standard scanning for vulnerabilities.
Scan results will show vulnerabilities detected, if any.
- For compliance scans, authentication to hosts is required. If authentication to a host
fails, the host is not scanned.
97
When defining a Windows or Unix record, you have the option to use an authentication
vault in your account. To add a new authentication vault, select New > Authentication
Vaults to go to the vaults list. From the vaults list, select New > Cyber-Ark PIM Suite,
New > Thycotic Secret Server, or New > Quest Vault (for Quest One Privileged Password
Manager, formerly e-DMZ Par).
98
Scanner Parallelization
The scanner parallelization feature increases scan speed making a scan up to 4 times
faster, depending on the size of your network, while maintaining scan accuracy. Such an
increase in scan speed allows scanning all ports when required.
The scanner parallelization feature allows you to distribute a scan task to multiple
Scanner Appliances, when the scan target includes asset groups. When enabled, the scan
task is distributed to multiple Scanner Appliances in parallel. The first 5 Scanner
Appliances added to each target asset group make up the pool of scanners used to scan
the groups IP addresses. At the completion of the scan, the service compiles a single
report with scan results.
99
Scanner parallelization is available for both on demand and scheduled scans. To select
this scanner option, select All Scanners in Asset Group from the Scanner Appliance
drop-down menu. (This menu appears when Scanner Appliances are in your account.)
The service can apply the All Scanners in Asset Group option for scanner
parallelization when you submit a scan task on asset groups. If you wish to submit a scan
task on individual IP addresses/ranges instead of asset groups, a Scanner Appliance
must be applied to the task.
During scan processing, if a Scanner Appliance is not available for some reason, perhaps
because it is offline, the service automatically distributes the scan task to another
appliance in the same asset group.
A scan task may be distributed across Scanner Appliances that have the same software
versions vulnerability signatures and scanner at the time of the scan. If one of the
Scanner Appliances in the pool has a software version that does not match the other
Scanner Appliances, then it will not be used. If some Scanner Appliances have identical
software versions and others do not, then appliances with the most matching versions are
used, regardless of whether the software is the most current. For example, if 3 appliances
have the same software version and the other 2 appliances have a different version, then
the 3 appliances with the same software version are used.
100
ENTERPRISE REPORTING
Develop a network security reporting plan for your enterprise. This involves
determining frequency of running reports, as well as user responsibility. Documenting
your plan will assist with building internal confidence.
Well be discussing reporting capabilities that are available when your account has
Report Share enabled - this is a subscription level feature. Report Share allows users to
run all report types and share them automatically with other users. Want to know if this
is enabled for your account? Go to VM > Reports. If you see the Reports tab then Report
Share is enabled.
BEST PRACTICES
Define a reporting policy. Determine the types of reports needed, who will review the
various reports, who will be responsible for producing the reports, and the frequency
with which they will be produced.
Regularly run reports. Our customers are most successful and see the most remediation
progress by running reports on a regular basis. We recommend that you run status and
trend reports at least monthly, and status reports in between as needed.
ROLLOUT STEPS
View templates and run reports. Several pre-defined report templates are available to
all users at any time. Run these reports right away to view your security status.
Define report templates. Global templates can be created by users with management
privileges and published to all users for consistency in reporting.
Schedule reports. By scheduling reports you can run reports at a particular time and
ensure the latest scan results information is included.
Report sharing. Run all report types and share them with other users from a central
location. You can schedule reports to run at a certain date and time in the future when
this feature is enabled for your subscription. Completed reports are available to users
based on user role. Managers and Unit Managers have the ability to distribute reports to
the right people at the right time.
Download data lists. Most data lists throughout the user interface can be downloaded
to these formats: CSV, XML, HTML, and MHT.
101
102
User Role
Manager
Unit Manager
Scanner
Reader
Enter report settings: Enter a title, select the report format and template, review the
report source (asset groups and/or IP addresses) and update settings if needed. To run an
on-demand report: Click Run. Your report will be launched right away and you can view
it in the reports list.
The Scheduling option allows you to schedule a report as part of the run report
workflow. A separate workflow for scheduling reports is also available from the Reports
> Schedules tab. See Scheduling Reports.
103
The finished report and its status appears on the Reports tab where you can track its
progress. Once the report is Finished, click
to view the report.
For each report, this information is provided: the report title, type, the report template,
the user who launch the report, the report format, the date/time when the report was
created, the report expiration date, the report size (in megabytes), and the report status
(percentage complete or Finished).
A report is saved in your account for 7 days after its creation date by default. Each user is
assigned a storage space limit in Report Share (scan and map results are not included in
this space). Managers can adjust the user limit (go to Reports > Setup > Report Share).
Use the Actions menu (above the list) to take actions on one or more selected reports.
Select Delete to delete one or more saved reports if
you want to delete them before they expire (by
default reports expire in 7 days).
Select Cancel one or more running reports.
104
Scheduling Reports
Scheduled reporting allows users to automatically generate reports at scheduled times.
For example, you can schedule reports to run at important milestones, like the last day of
the quarter, without having to depend on someone logging in to do it. Scheduling reports
is possible when Report Share is enabled for your subscription and a Manager has
enabled the Scheduled Reporting feature.
Select the Scheduling option under Report Options to enter schedule settings. This
option is available in the new report workflow and in the report schedule wizard (go to
Reports > Schedules, select New and then a report type).
Select Notification if you want to send an email notification when the report is
complete. The report will be sent according to the report distribution method set for your
subscription as shown. (To configure this, go to to Reports > Setup > Schedule Reports).
You can password protect the report and limit the total number of downloads.
105
Sharing Reports
Sharing reports allows business line managers to distribute reports to the right people at
the right time. Managers and Unit Managers have the ability to share reports with users
who do not have access to reports due to their assigned user roles. By default reports are
available to users based on their user role.
User Role
Manager
Unit Manager
Scanner
Reader
Auditor
Managers and Unit Managers can share reports and scan templates. To share a completed
report, go to the Reports tab, select a report and then select Info from the Quick Actions
menu. Go to the User Access section and click the Add button. To share all reports
generated from a scan template, go to the Templates tab and edit the template. Go to the
User Access section and add users to the access list.
Good to Know:
- Users may be granted access to reports containing IPs which the users do not have
privileges to.
- Users may be granted access to reports generated in a business unit outside of the users
own business unit.
106
Once Report Share is enabled for the subscription, Managers and Unit Managers will see
the Add Secure Distribution link when launching reports.
Click the link Add Secure Distribution to enter the encryption password and select the
user distribution list.
Encryption Enter a password and then confirm the password in the fields provided. If
your subscription has enabled user-defined passwords, then the security settings for
user-defined passwords on the Setup > Security page are enforced.
Important: The user who launches the report must communicate the password to all
users who will access the report, including the email recipients in the distribution groups
and Qualys users who will access the report from the report history list.
107
Distribution List Select one or more distribution groups, identifying the target email
recipients. A recipient may be any user, with or without an account for the subscription.
Click the Add Group link to select a distribution group for the current report you are
launching. The Add Distribution Group window appears, displaying your saved
distribution groups.
Select one or more groups from the Distribution Groups list and then click Add to list.
The groups will appear under Recipient Groups in the new report window. (If you need
to add a group first, click the New button (on the right).)
Automatic Report Distribution
Note: Acrobat Version 7 or greater is required to view secure PDF reports.
When a secure PDF report is completed in Report Share, the service automatically makes
the report available to users. The report is distributed automatically via email and the
report history list. From the report history list Managers and Unit Managers may view
secured PDF reports from the report history list, like other reports, based on their user
role access privileges.
A secured PDF report is identified in the report history list with the Secured PDF format
(PDF ) in the Format column. Users are prompted to enter a report password each time
they select a PDF encrypted report to view or download.
108
Scorecard Reports
Qualys provides template-based scorecard reports that can be used to communicate the
state of security within the enterprise directly to persons in charge of security operations
and business line owners.
Scorecard reports provide vulnerability data and statistics appropriate for different
business groups and functions. By configuring scorecard reports to use different views
and asset groupings, you can create multiple reports based on the same data satisfying
both security operations personnel and business line leaders. You can then share each
generated report with the people who need it in a format that is meaningful to them.
To run a scorecard report, go to VM > Reports and select New > Scorecard Report. Select
a report template on the left and then click Run to run the report.
Youll be prompted to select hosts to report on and a report format. You can select hosts
by asset group, asset tag or business unit. Asset tags can be selected when Asset Tagging
has been added to your account and you have accepted the New Data Security Model (go
to Users > Setup > Security for information).
Do you want to create custom templates? Simply select a template title and then click
Edit (under the list) and enter settings. Once saved you can run the template to create
your report.
109
Patch Reports
The Qualys Patch Report helps you streamline the patching process and improve
remediation efficiency. The patch report leverages standard Qualys capabilities to
provide accurate, actionable and focused reports so you can quickly and efficiently
remediate vulnerabilities without applying unneeded, redundant patches.
For the most accurate results in your patch report, be sure that authenticated scanning
was used to scan the hosts selected for the report. Using authenticated scanning allows
the scanning engine to collect the most detailed information about each target host
including the host's operating system. When this information is in your account, the
service identifies the most appropriate missing patch(es) in your patch report.
Qualys provides a pre-configured patch template Qualys Patch Report. Using this
template you can identify the patches you need to apply right away.
Your patch report can be saved in these formats: PDF, CSV and Online Report. The
Online Report format provides a feature-rich user interface including numerous ways to
navigate through your report content. HTML content is displayed in your browser using
Ext, a client-side Java framework.
A sample Online Patch Report is shown below. This report was generated using the preconfigured template Qualys Patch Report. In this report patches are grouped by host.
110
This patch report summary shows: 196 total patches need to be applied to fix the
vulnerabilities on the target hosts, 14 hosts require patches to be applied in order to fix
the vulnerabilities, and 318 vulnerabilities in the user's account are addressed in the
report.
(1) To view the target asset groups and/or IPs: Click View Report Targets.
(2) To sort the HOSTS list by a host attribute: Click a host attribute (column title) in the
HOSTS list. The arrow next to the column title indicates the sort order: ascending (Up
arrow) or descending (Down arrow). Click the column title again to toggle the sort order.
(3) To view the missing patches for a particular host: Move your mouse pointer over a
host in the HOSTS list and click the host row. The missing patches for the host appear in
the PATCHES list (on the right). In the PATCHES header you'll see the number of missing
patches for the selected host. In this case, there are 13 missing patches for the host
10.10.24.47.
(4) To page through the HOSTS list: Use the arrow keys (under the list area) to page
forward and backward through the list. Enter a number in the field provided to jump to a
certain page number.
(5) To apply a filter to the HOSTS list: Enter a string in the Filter field (under the list area).
The HOSTS list will be updated to display only hosts with attributes matching the string
you enter. For example, if you enter 10.10.25.6 the report will display only IP addresses
including that string.
(6) To read the vendor's security bulletin related to a patch: Click the vendor ID link for a
patch in the PATCHES list.
(7) To view the vulnerabilities that will be fixed after applying a patch on a host: Refer to
the Vulns column for a patch in the PATCHES list. Click the number of vulnerabilities
link to view a list of vulnerabilities which the patch will fix (this link is available if "QIDs
that will be fixed by each patch" is selected in the patch template used).
Consultant Reports
*Consultant reports apply only to Consultant subscriptions. Consultants have the ability
to create consultant templates and generate consultant reports specific to their customers
needs. These formats are supported: PDF, HTML, MHT, XML, CSV and Microsoft DOCX.
Using the consultant template you can define the report layout and filtering options
similar to scan report templates. The consultant template includes configurations for
cover page, customer information and report summary.
111
Report Templates
Report templates give you great flexibility in creating custom report templates. There are
several report templates available to choose from.
You might want to customize reports using a report template. You can import a template
from our library and customize it. Also you can create new templates. Just go to Reports
> Templates and then select New > template type (for example, New > Scan Template),
configure the options and click Save.
The data list is downloaded to a file on the local file system in this format:
DL_<datalist_name>_<user_login>_<date>.<format_extension>
For example:
DL_scan_history_acme_dd_20071030.csv
112
REMEDIATION WORKFLOW
Qualys provides fully secure audit trails that track vulnerability status for all detected
vulnerabilities. As follow up audits occur, vulnerability status levels new, active, fixed,
and re-opened are updated automatically and identified in trend reports, giving users
access to the most up-to-date security status. Using Remediation Workflow, the service
automatically updates vulnerability status in remediation tickets, triggering new tickets,
ticket updates and closure in cases where vulnerabilities are verified as fixed.
Remediation Workflow is an optional feature that is not enabled in new Qualys
subscriptions. When this feature is enabled, new tickets are created automatically, based
on newly available scan results and the Manager-defined policy consisting of policy
rules. The remediation policy specifies conditions for ticket creation and user assignment.
113
BEST PRACTICES
Set achievable remediation goals. Defining user roles and responsibilities as well as
prioritizing assets will assist with developing achievable goals with remediation. Our
customers report that they were surprised at the large number of tickets produced from
their first security audits with the remediation workflow feature enabled.
Develop a phased approach. When getting started with a rollout project, many
customers report that they are surprised at the large number of remediation tickets
initially created.
Regularly run and publish remediation reports. Your remediation reports show
remediation status and progress over time. We recommend that you run remediation
reports at least monthly. Its a good idea to run remediation reports with the same
frequency that you run vulnerability status and trend reports.
ROLLOUT STEPS
Enable Remediation Workflow. To do this, you add a remediation policy with one or
more policy rules. Optionally, set remediation policy options to grant privileges to alter
ticket state. Also, you can enable Unit Managers to define a remediation policy for their
business unit.
Take action on tickets. Typically multiple users are involved with taking action on
tickets. Their activities involve fixing vulnerabilities, and optionally editing tickets by
adding comments, reassigning to different users, or marking as ignored.
Run remediation reports. There are remediation reports for management and technical
analysis that you can run at any time. See Remediation Reporting in Chapter 5.
114
For each rule, define conditions for automatic ticket creation. You may select target hosts
or vulnerabilities:
You choose whether tickets will be assigned to a specific user or ignored. Tickets may be
assigned to the user running the scan. When assigned to a user, a deadline is set so tickets
are assigned a due date. The deadline is set to 7 days by default (so tickets will be
assigned due date 7 days in the future).
The policy rules are applied to all scans run by all users. A business unit policy may be
defined by Unit Managers who are granted this permission (by Managers). When
defined, the business unit policy is applied first and then the subscription policy.
115
Click Search on the top menu bar to view the ticket search options. You can search by
attributes of tickets, hosts and vulnerabilities. For example, you can search by ticket
number, due date, asset IP address, ticket state, vulnerability title and severity level. You
can also search for a users associated tickets, which are tickets not owned by the user but
based on assets in the users account.
116
Method a. Two steps. a-1) After fixing vulnerabilities, users edit tickets and mark them
Resolved. a-2) During the next scan, the service verifies that the vulnerabilities are fixed
and closes the tickets.
Method b. One step. A user fixes vulnerabilities. During the next scan, the service
verifies that the vulnerabilities are fixed and closes the tickets.
117
Method c. One step. Users ignore tickets they dont plan to fix. Ignored tickets remain in
the closed state until a user chooses to reopen them by editing the tickets.
Method a. One step. The service automatically reopens tickets previously marked as
Resolved when the vulnerabilities related to the Resolved tickets are detected in
subsequent scans.
Method b. One step. The service automatically reopens tickets previously closed by the
service when the vulnerabilities are detected again in subsequent scans. (The service
closes tickets automatically when vulnerabilities related to tickets are verified as fixed.)
Method c. One step. Users have the option to reopen previously ignored tickets.
118
BEST PRACTICES
Understand your security policy and review risk levels. Applying your existing
security policy to risk level settings will ensure that security risk and compliance
information presented and reported on is most meaningful and accurate to your
organization.
Regularly run reports. Our customers are most successful and see the most remediation
progress by running reports on a regular basis. We recommend that you run status and
trend reports at least monthly, and status reports in between as needed. Be sure to
publish reports to all teams and individuals with security management responsibility.
ROLLOUT STEPS
Customize vulnerabilities Several pre-defined report templates are available to all
users at any time. Run these reports right away to view your vulnerability status and
your most important vulnerability information.
Review business risk setup and edit as appropriate. Qualys provides a default
business risk setup that is a good starting point for business risk calculations. Its
recommended that you review the setup settings and adjust to match your security
policy and reporting practices.
Enable CVSS scoring. Qualys supports CVSS scoring using this industry standard
scoring technique that allows organizations to take into consideration their own security
metrics. For a new subscription, CVSS scoring is not enabled by default. You can enable
CVSS scoring so that CVSS scores appear with vulnerability details.
Ignore vulnerabilities Ignoring vulnerabilities on a host/port combination provides a
method for filtering out vulnerability instances from application views and reports.
Customizing Vulnerabilities
Users with the Manager role can edit vulnerabilities in the KnowledgeBase to affect how
vulnerabilities are displayed in user interface views and in reports. All customizations
are global, affecting all users in the subscription. These attributes may be edited: the
severity level, text descriptions for threat, impact and solution, and the disabled
vulnerability flag. See Vulnerability KnowledgeBase in Chapter 3.
119
120
First well calculate security risk for each asset group based on the vulnerabilities
detected and their associated severity levels (see Security Risk in Scan Reports below).
Then well look up the business impact level for the asset group based on its security risk.
For example, in the case where security risk is 4 and business impact is Medium, the
business risk is 16.
121
security risk for each host (the highest severity level detected or the average
severity level detected, see below)
number of hosts matching filters (hosts in the report matching the filters set in the
scan report template)
Note that the average security risk for the report displays the average for all hosts in the
report, and is not affected by the sorting method applied to the Detailed Results section.
See Security Risk in Detailed Results below.
The following formula is used for calculating the average security risk.
122
in the scan report template. In the examples below, detailed results are sorted by host, the
Text Summary option is selected in the scan report template, and active vulnerabilities
and potential vulnerabilities are included in the report.
Example when Security Risk is set to Average severity level detected:
123
If you sort detailed results by host, then the service shows the security risk for each host.
All vulnerabilities and potential vulnerabilities detected on each host are included in the
security risk calculation. If you sort detailed results by some other method, like operating
system, the service shows the security risk for the hosts with the same operating system.
All vulnerabilities and potential vulnerabilities detected on hosts with each operating
system are included in the calculation.
124
CVSS Scoring
CVSS stands for Common Vulnerability Scoring System (CVSS), the emerging open
standard for vulnerability scoring (using a scale of 1 to 10). CVSS was commissioned by
the National Infrastructure Advisory Counsel (NAIC) and is currently maintained by
FIRST (www.first.org/cvss). CVSS is widely supported by security organizations and
vendors including: CERT, MITRE, Cisco, Symantec, Microsoft and Qualys.
Qualys supports CVSS Version 2.
CVSS scores are displayed in many places for vulnerabilities and potential vulnerabilities
throughout the application when the CVSS Scoring feature is enabled in your account.
When enabled, CVSS Base and Temporal scores are displayed in vulnerability scan
reports and compliance reports that include vulnerability details, as well as in online
views of hosts, tickets and vulnerabilities. Also, final CVSS scores are calculated and
displayed in automatic scan reports.
125
Collateral Damage Potential. This environmental metric represents the possibility for
loss in physical equipment and property damage.
Target Distribution. This environmental metric represents the relative size of the
field of the target systems susceptible to the vulnerability.
The following Security Requirements metrics enable users to customize the CVSS score.
126
Integrity Requirement. This environmental metric represents the impact that loss of
integrity has on the organization or individuals associated with the organization.
Availability Requirement. This environmental metric represents the impact that loss
of availability has on the organization or individuals associated with the
organization.
Qualys Rollout Guide
127
Ignoring Vulnerabilities
Vulnerabilities and Potential Vulnerabilities detected on a host/port combination may be
marked as ignored for the subscription. All users with scanning privileges can ignore
vulnerability instances. Ignoring vulnerabilities provides a method for filtering out
vulnerability instances from application views and reports.
You can ignore vulnerability instances while viewing vulnerabilities in scan status
reports (automatic) and asset search results. Select a vulnerability in the report, place
your cursor over the red cross (
) next to a vulnerability instance and select
Ignore vulnerability from the drop-down menu.
The Ignored Vulnerabilities Report lists ignored vulnerabilities defined for your account.
See Scorecard Reports.
128
5
COMPLIANCE
Automated trend reporting gives users the ability to compare security audit results
over a period of time, putting a spotlight on vulnerability and compliance trends and
overall security posture. Trend reporting on a regular basis is a security management
best practice. Producing trend reports allows you to document your progress and
publicize your success within the organization. Remediation reporting on
vulnerability scan data provides detailed host information including the current
status of all vulnerabilities detected on each host.
Qualys allows you to comply with information security regulations and other
industry standards. Its recommended that you learn about these security regulations
and standards and incorporate best practices towards achieving compliance.
To track progress and achieve policy compliance using Qualys most effectively in the
quickest time, the following activities are involved:
ACHIEVING COMPLIANCE
REMEDIATION REPORTING
Chapter 5 Compliance
Achieving Compliance
ACHIEVING COMPLIANCE
Organizations are required by law to comply with a growing number of government and
industry-specific regulations designed to safeguard electronic data from information
security breaches. Companies that do not fully comply and stay up-to-date with
information security regulations face serious consequences including heavy fines and
legal action. Using Qualys, you can take advantage of Qualyss secure and permanent
reporting audit trail to document and demonstrate compliance.
BEST PRACTICES
Perform vulnerability management on a regular basis. Perform security auditing,
trend reporting and remediation following the guidelines provided in this guide.
Connect vulnerability management practices with policy compliance objectives.
Stay informed and up-to-date on regulations and their requirements.
ROLLOUT STEPS
Run trend reports and publish to auditors. Refer to Remediation Reporting to run
appropriate reports and publish them to your auditors.
Run compliance reports. The service provides a wide variety of template-based reports
for achieving compliance with a wide variety of security standards and regulations,
including Payment Card Industry (PCI) Data Security Standard (DSS), HIPAA, GLBA,
SB 1386, Sarbanes-Oxley, FISMA, the CobIT information technology standard plus
others. Interactive compliance reports are available when the policy compliance module
is enabled.
Use Qualys Payment Card Industry (PCI) Module. The Payment Card Industry (PCI)
Compliance feature provides a workflow for achieving compliance with PCI DSS
requirements for quarterly PCI external scans and quarterly PCI internal scans.
Use Qualys Policy Compliance (PC) Module. The policy compliance module provides
customers with a way to audit and document compliance to internal and external
auditors to meet corporate security policies, laws and regulations.
Understand current regulations. Refer to Policy Compliance Current Regulations
and Mandates for information about the current regulations for which many companies
today must demonstrate compliance.
130
Chapter 5 Compliance
Vulnerability Reporting and Trend Analysis
BEST PRACTICES
Regularly run trend reports. Our customers report the best remediation progress as the
result of producing trend reports on a regular basis.
Check first trend reports. Check your first trend reports to be sure that the trending
information is both meaningful and useful for your organization. Its possible that you
may want to add asset groups (for scanning and/or reporting), customize scan options
set in option profiles, and customize the business risk calculation.
Publish reports with trending. Publish your trend reports to all parties involved
throughout your organization.
Perform business risk analysis first. Initial business risk settings are provided so trend
reports include a business risk value automatically. Its recommended, however, that you
first perform business impact analysis on assets in your organization, and then apply
those findings to your asset groups and the business risk lookup table. This way the
business risk calculation and resulting business risk values match your organizations
security policy.
ROLLOUT STEPS
Run reports with trending. You can run pre-defined reports and custom scan reports
with user-defined settings. The pre-defined templates with trending information include
the Executive Report (scan template) and remediation reports. Several pre-defined
graphs can be included in scan reports. Trend graphs may be included in a scan report
when the template has the scan results selection setting Status with Trend.
Run custom scan templates with trending. When adding a custom scan report
template, select the Scan Results Selection setting Status with Trend. Refer to
Scorecard Reports in Chapter 4 for information.
131
Chapter 5 Compliance
Vulnerability Reporting and Trend Analysis
Adjust business risk setup. Adjust business risk setup settings that affect how the
business risk rating is calculated for scan status reports (automatic) based on the business
risk analysis youve performed. See Business Risk in Scan Reports in Chapter 4 for
information.
Use Asset Search. Use the Asset Search feature to search and view current host
information, and take remediation actions.
The Top 10 Vulnerability Categories table illustrates the top 10 areas that need the most
attention, and how much the exposure has changed over time.
The Vulnerabilities by Severity over Time graph visually identifies the total number of
confirmed vulnerabilities and potential vulnerabilities at each severity level.
132
Chapter 5 Compliance
Vulnerability Reporting and Trend Analysis
You can modify the Executive Report template to include vulnerability details and
additional graphs, and to adjust the time period that the report covers. See Enterprise
Reporting in Chapter 4 for more information.
Asset Search
The Asset Search feature allows you to search and view current host information in your
account. The Asset Search retrieves information on hosts that have already been scanned.
Only scanned hosts are searched and returned in the asset search results. The service
searches the most recent vulnerability scan data by default. When the Compliance
application is available in the user account, the service searches the most recent
compliance scan data as well.
To access Asset Search, go to Assets > Asset Search. Using the Asset Search form, identify
the target hosts to search for. You may specify one or more of these targets: asset groups,
IP addresses/ranges, a DNS hostname, or a NetBIOS hostname. Note that hosts matching
any target are returned. .
133
Chapter 5 Compliance
Vulnerability Reporting and Trend Analysis
Optionally, select search attributes to refine your search. For example, you may specify a
host tracking method, an operating system name, open ports, running services, a
vulnerability ID (QID), and last scan date. After making entries, click Search.
The Asset Search Report includes a Report Summary section at the top followed by the
Results section with hosts that match your search criteria.
134
Chapter 5 Compliance
Vulnerability Reporting and Trend Analysis
Each entry in the report identifies a target host, including its IP address, the DNS and
NetBIOS hostname (as applicable and when available), its operating system, the asset
groups to which the host belongs, the host tracking method and the last scan date.
Additional information is returned when certain attributes are entered such as Open
Ports, Running Services and QID.
When viewing the Asset Search Report you can take workflow actions by selecting hosts
and a workflow action on the Actions menu. See Taking Workflow Actions (page 59)
for more information. You can also view current host information by clicking the host IP
address. See Current Host Information (page 90).
135
Chapter 5 Compliance
Vulnerability Reporting and Trend Analysis
Risk Analysis
The Risk Analysis is used to analyze selected hosts for a risk due to a specific threat (a
vulnerability or potential vulnerability). The service uses existing vulnerability scan data
(results returned from previous scans) to determine if hosts are at risk. By running Risk
Analysis you can address high risk vulnerabilities on critical assets, without waiting for
the next scan opportunity.
To run Risk Analysis, go to Reports > Risk Analysis.
In the Risk Analysis form, identify the target hosts to analyze asset groups and/or
individual IPs and select a vulnerability or potential vulnerability that you want to
test. Then click Run to start the analysis.
The Risk Analysis Report includes a Report Summary section at the top followed by the
Hosts Possibly Exposed section (under the Qualys ID and title). Hosts possibly exposed
are listed by business impact, allowing you to readily assess the impact to your business
and fix the most vulnerable hosts first.
As with other reports, you can print and download the report in multiple formats.
136
Chapter 5 Compliance
Vulnerability Reporting and Trend Analysis
From the Risk Analysis Report you can take workflow actions by selecting hosts and an
action on the Actions menu. See Taking Workflow Actions (page 59). You can view
current host information by clicking the host IP address. See Current Host Information
(page 90).
Each entry in the report identifies a target host, including its IP address, NetBIOS
hostname, the asset groups to which the host belongs, and the business impact assigned
to the asset group. Check marks to the right indicate the possible exposure to the
vulnerability.
QID
OS
Port
Check indicates the host has an open TCP or UDP port related to
the vulnerability.
Service
Check indicates the host runs one or more services related to the
vulnerability.
Results
137
Chapter 5 Compliance
Vulnerability Reporting and Trend Analysis
Run the SANS Top 20 Report to discover whether you are exposed to SANS Top 20
vulnerabilities identified by The SANS Institute as the most critical Internet security
vulnerabilities. These vulnerabilities are sorted into categories, each of which may
include several vulnerability checks.
Run the Payment Card Industry (PCI) Reports to identify compliance with the Payment
Card Industry (PCI) Data Security Standard. The Technical Report is used to identify and
prioritize remediation; it includes verified solutions for detected vulnerabilities. The PCI
Executive Report is used to submit to acquiring banks as proof of compliance.
138
Chapter 5 Compliance
Remediation Reporting
REMEDIATION REPORTING
Centralized reporting provides users access to current host remediation information and
status based on the latest vulnerability scans. Access to current host-based remediation
data is crucial to successful vulnerability management and policy compliance. These
features are provided.
Remediation Reports When Remediation Workflow is enabled, remediation reports
provide security managers with a current viewpoint on remediation progress,
vulnerability status and ticket trends. Qualys provides four different remediation reports
appropriate for management and in-depth technical analysis with trending.
Daily Trouble Ticket Updates When Remediation Workflow is enabled, users may
choose to receive the Daily Trouble Ticket Updates email notification, reporting
remediation ticket status and trends on a daily basis. This notification is a user account
option that can be enabled by editing the user account. Users may enable this notification
in their own accounts.
139
Chapter 5 Compliance
Remediation Reporting
BEST PRACTICES
Review host information and status. Review current host information and
remediation status based on the latest available scan results. To do this, use Qualys
reporting features described earlier in Remediation Reporting. Also use the features
Asset Search and Risk Analysis.
Regularly run remediation reports. We recommend that you run remediation reports
at least monthly, with the same frequency that you run trend scan reports.
Check first remediation reports. Check your first remediation reports to be sure that
the trending information is both meaningful and useful for your organization. Its
possible that you may want to add asset groups and make other customizations such as
scan option profiles, the business risk calculation, and remediation policy.
Publish remediation reports. Publish your trend reports to all parties involved in the
organization.
ROLLOUT STEPS
Run remediation reports. Qualys provides four pre-defined remediation reports that
can be run at any time when Remediation Workflow is enabled.
Review Daily Trouble Ticket Updates. Select this email notification in your account.
Run Risk Analysis. Use the Risk Analysis feature to find out whether hosts that are
likely exposed to security vulnerabilities. For hosts likely to be exposed, view current
host information and take remediation actions.
Remediation Reports
There are four pre-defined remediation reports in all user accounts. These reports may be
run when Remediation Workflow is enabled.
Executive Report. This report includes a ticket status table and graphical elements
illustrating the total number of open and closed tickets at each severity level, ticket state
changes for the past 12 weeks, and an open ticket trend for the past 12 weeks.
Tickets per Asset Group. This report includes a ticket status table and tickets per asset
group data. All asset groups in the user account are listed. For each asset group the report
shows the total number of tickets, the number of tickets in each ticket state, the average
number of days for resolution on tickets, and the total number of overdue tickets.
Tickets per User. This report includes a ticket status table and tickets per user data. All
users in the subscription are listed. For each user the report shows the total number
tickets assigned, the number of tickets in each ticket state, the average number of days for
resolution on tickets, and the total number of overdue tickets.
140
Chapter 5 Compliance
Remediation Reporting
Tickets per Vulnerability. This report includes a ticket status table and tickets per
vulnerability data. For each vulnerability the report shows the total number of tickets
related to the vulnerability, the number of tickets at each ticket state, the average number
of days for resolution on tickets, and the total number of overdue tickets.
To run and view a remediation report, go to Reports > Templates. From the report
templates list, locate a remediation report with the template type
in the Type column.
Select a report row, click
and then select Run from the Quick Actions menu.
All remediation reports display a Ticket Status table with current ticket status.
The Executive Remediation Report includes pie charts showing the total number of open
tickets and total number of closed tickets by severity level. In the sample below, 40% of
the total number of open tickets represent severity level 5 vulnerabilities.
141
Chapter 5 Compliance
Payment Card Industry (PCI) Compliance
142
Chapter 5 Compliance
Payment Card Industry (PCI) Compliance
Go to Scans > Setup > PCI Account Links. Add another account link if you wish to
share a scan with a PCI account that is not listed. A Manager can create a new PCI
Merchant subscription and link to it. (Note: A Manager must be the first user to link
to any PCI Merchant subscription.)
Now go back to the Scans tab. Click anywhere in the row for a PCI scan and click
the Share with PCI link in the preview pane.
143
Chapter 5 Compliance
Payment Card Industry (PCI) Compliance
Select the PCI Merchant account that you want to share the scan with. All PCI
merchant accounts that you have linked to are listed. (Note: While a scan is being
shared with an account, you cant share another scan with the same account.)
The service always shares the full scan results, including all IPs in the scan
target, regardless of whether the user who shares the PCI scan has permissions
to all IPs in the scan results.
Any IPs that are not already included in the destination PCI account will be
added automatically.
Review the success message that confirms the PCI scan has been exported to your
selected PCI account.
Click the PCI Login button to log into the PCI service with your account.
View the current vulnerabilities (go to Network > Vulnerabilities). If there are PCI
vulnerabilities detected for the scan you must perform remediation and rescan to
verify that all PCI vulnerabilities are fixed.
View the compliance status (go to Compliance > Compliance Status) and generate
PCI network reports.
Complete report approval and submit 1) submit the report to your ASV for
approval, and 2) once approved, submit the report to your acquiring banks.
144
Chapter 5 Compliance
Payment Card Industry (PCI) Compliance
Follow these simple steps to meet the PCI DSS requirements for quarterly internal scans.
145
Chapter 5 Compliance
Policy Compliance (PC)
Compliance Scanning extends the Qualys global scanning capabilities to audit hosts
to measure compliance with corporate security policies, laws and regulations.
Technical Controls Library includes controls based on CIS and NIST standards and
mapped to several frameworks and regulations. Like vulnerability signatures, the
controls software is updated automatically on a regular basis by the service.
Policy compliance features are available when this module is enabled for the
subscription. Please contact Technical Support or an Account Manager for information.
Managers access these features automatically; sub-account users may be assigned access.
Policy Editor
The Policy Editor provides a graphical user interface for Managers and Auditors to create
and edit policies, and assign them to assets. Go to Policies and then select New > Policy.
The policy may be divided into sections and can include a cover page to describe its
purpose within the organization.
146
Chapter 5 Compliance
Policy Compliance (PC)
The application prompts you to set technologies operating systems and applications,
such as Windows XP Desktop, Windows 2003 Server, Oracle and provide a policy title.
Use the top menu bar to add controls and assign asset groups with compliance hosts. For
each control, one or more checks (data points) are listed.
Control
Technology
Data Point
147
Chapter 5 Compliance
Policy Compliance (PC)
Policy Manager
Saved policies are saved in the Policy Manager. Over time policies may be updated to
reflect new business practices, security policies and regulations. For each policy, the
service tracks the user who created the policy, the date when created, the user who
updated the policy and the date when last updated.
The service provides a Compliance Policy Library containing several sample policies as
part of the Policy Manager, giving Auditors and Managers the ability to import them into
the subscription and use them for compliance reporting. The sample policies are based on
several popular compliance frameworks. Locked policies are available in the library for
certification purposes, for example to certify that you are meeting all requirements
outlined in a particular CIS benchmark.
To import a sample policy, go to Policies. From the Policies tab select New > Import
Compliance Policy > Import from Library. The library includes multiple policies to
choose from. Select a policy and then follow the workflow provided to assign asset
groups to it.
148
Chapter 5 Compliance
Policy Compliance (PC)
149
Chapter 5 Compliance
Policy Compliance (PC)
Select settings for report source, display and sorting from within the report, and then run
the report.
Report results appear in the same window as the report settings so you can change the
settings and run the report again to find the compliance information youre most
interested in. Note: Interactive compliance reports are not saved to Report Share.
The details section of a sample Individual Host Compliance Report is below. For each
control, the report identifies the expected value and actual value, as returned in the latest
compliance scan results.
150
Chapter 5 Compliance
Policy Compliance (PC)
Exceptions Management
When viewing an interactive compliance report, users have the ability to submit
exception requests for host/control pairs shown in the Results section.
Exceptions List Go to Exceptions to view your exceptions list. All users view the status
of all exception requests. Managers and Auditors approve requests. Unit Managers may
be assigned this privilege for requests in their own business unit.
Submit in Single and Batch Mode Users can submit exception requests one at a time or
in batch mode. To submit a single request from the Control Pass/Fail Report, select the
Request link next to a host. To submit requests in batch, select hosts using check boxes
and then click the Request Exception button. The exceptions appear in the exceptions list
which is available to all users.
Exception Approval Exception requests must be accepted by an approver. Managers
and Auditors are designated approvers.
Exception Timeframe Exception requests may be approved for an explicit period of
time, after which the exception expires automatically.
Exception Audit Trail All information from the exception requestor and approver is
captured and available for viewing. To view exception information, go Exceptions. From
the exceptions list, select an exception row, click
and then select Info from the Quick
Actions menu.
151
Chapter 5 Compliance
Policy Compliance Current Regulations and Mandates
Healthcare HIPAA regulates the security and privacy of health data, including
patient records and all individually identifiable health information.
Online Merchants and Retailers The Payment Card Industry mandates the
protection of customer information residing with merchants, safe from attackers,
viruses, and other potential security risks.
Healthcare
152
DEFINITION:
CHALLENGE:
SOLUTION:
Chapter 5 Compliance
Policy Compliance Current Regulations and Mandates
Financial Institutions
DEFINITION:
CHALLENGE:
GLBA has introduced a great deal more rigor in how banks and credit
unions have to handle, manage and secure their customers' personal
information. In today's world much of our information is computerized
making information security a major component of GLBA compliance.
The guidelines define customer information as any record containing a
customer's non-public personal information, whether in printed,
electronic or other form. They require each institution to implement a
written information security program that includes administrative,
technical and physical safeguards appropriate to the size and complexity
of the bank as well as the nature and scope of its activities.
SOLUTION:
153
Chapter 5 Compliance
Policy Compliance Current Regulations and Mandates
CHALLENGE
The PCI Data Security Standard requirements apply to all payment card
network members, merchants and service providers that store, process
or transmit cardholder data, and affect all payment channels, including
retial (brick-and-mortar), mail/telephone order and e-commerce.
Failure to comply with these security standards may result in fines,
restrictions or permanent expulsion from card acceptance programs.
For more information on the PCI Data Security Standard, visit
https://www.pcisecuritystandards.org
SOLUTION:
Public Companies
154
DEFINITION:
CHALLENGE:
SOLUTION:
Chapter 5 Compliance
Policy Compliance Current Regulations and Mandates
Government
DEFINITION:
CHALLENGE:
SOLUTION:
Qualys enables agencies to audit and measure their network risk, enforce
security policies and document compliance with FISMA requirements.
Qualys will explain each policy violation and tell you how to remediate
the violation through a verified solution, for example by making a
configuration change or applying a patch from a vendor.
California Commerce
DEFINITION:
CHALLENGE:
Organizations who fail to comply with CA 1798.82 face civil or class action
lawsuits. The law covers not just California-based agencies but all private
enterprises doing business in California. The law requires that California
customers be notified if any unauthorized individuals have acquired their
personal and/or financial information, thereby giving them the
opportunity to take proactive steps to ensure that they do not become
victims of identity theft.
Organizations that do not apply generally accepted security and detection
best practices may be considered criminally negligent by State and Federal
law. Becoming compliant with CA 1789.82 is not a one-time event, but
rather a process that requires continuous measurement and management
of network risks.
SOLUTION:
155
Chapter 5 Compliance
Policy Compliance Current Regulations and Mandates
156
6
SUCCESSFUL QUALYS ROLLOUT CASE
STUDIES
As a step toward helping you understand how to succeed in your rollout of Qualys, it
makes sense to provide you with actual case studies that call out practical examples
and lessons learned. On the next several pages you will read summaries of choices
made by some of our customers, the results of those choices emphasizing the real
benefits Qualys provided to their organizations.
Case 1 Global Online Retailer
Case 2 Web Meeting Application Provider
Case 3 Global Electronics Manufacturer
Case 4 Global UK Bank
Case 5 Large Chemical Company
Case 6 Global Food Services Company
Over 100,000 systems in 25 countries with strong presence in Asia and EMEA
Centralized management of IT resources from corporate headquarters
Situation before introduction of enterprise VM
Maintain confidence with the online marketplace that online transactions are in face secure
through their systems
Have a tool to prove compliance to industry standards
Need to quickly prioritize remediation when a severe new vulnerability emerges
Reduce the costs around their patching process through automation
Usage of VM
Encourage highest ranking executive in your respective chain to send out an introductory
email to all affected groups. The email should acknowledge that there is always uncertainty
with such a program, however the benefits to the larger organization outweigh the risks.
Exec support proves instrumental during the infrequent system failures that can occur.
#2 Use VM to learn more about your environment first
Discover, understand and organize your network and the people managing the systems.
Form Asset Groups and Business Units around the existing logical structure.
Create a flexible solution to support a living process which adapts to different local
operating environments while maintaining global standards and visibility
#3 Build internal confidence demonstrate that the technology is safe
Gain the trust and confidence of the operating teams and outsourcers.
Work with Network and Operations Groups to identify the core pieces of infrastructure
early and then form mapping/scanning plans around them.
158
Trending data displaying the progress toward security posture can build confidence with
internal groups.
159
40 users in rollout
3 scanner appliances centrally managed
Hold local administrators accountable to respond to regional remediation reports
Weekly scanning of EMEA, APAC and Americas
Security Group may feel like they have to yell louder to get response from IT/Network
Groups if there is not Executive sponsorship.
Plan ahead to avoid an overreaction from IT/Network Groups to remediation efforts.
Remediation policies can be very digestible if handled properly.
IT Groups should be encouraged to display trend data on their progress.
160
38,000 systems in 75 countries with strong presence in Asia, Middle East and Africa
600 applications running on a diverse infrastructure
Systems managed by dozens of different IT teams and outside service providers
Situation before introduction of enterprise VM
Network topology and system configurations unknown, spot auditing with pen-testing
Local operating teams perform occasional scanning with various tools
No ability to assess exposure and take corrective action
Motivation for introducing VM
Gain the trust and confidence of the operating teams and outsourcers
#2 Use VM to learn more about your environment first
Discover, understand and organize your network AND the people managing the systems
Allow for ongoing changes in an iterative process
#3 Have a strong service delivery ownership of the process
161
Understanding the network (agents too expensive and not available for some devices)
Reduce cycle time for patching from over 30 days to 5 days across the enterprise
Verify patches and standard builds
Simplify IT audits via central repository vs. costly punctual audits
Usage of VM
162
No VM solution
Branches with wide-ranging autonomy
No ability to centralize the supervision of the network security
Network topology and system configurations unknown
Motivation for introducing VM
Each organizational unit was given control and responsibility over its own resources
Use Scans, Maps, Reports, Remediation & Schedules
74 users, 6 business units, 7 managers
Typically 40 scheduled Scans per month, and 35 on demand Scans per month
Typically 6 scheduled Maps per month, and 27 on demand Maps per month
163
164