In this article you will find:

  1. How to define Qualys connector in Vulcan

  2. How to fetch assets and vulnerabilities from Qualys

  3. How to automate remediation actions with Qualys

  4. Filter kernel vulnerabilities

1. Defining a connector

In the Connectors page, click on Add a Connector.

Click on a Qualys connector.

Fill in all the relevant fields.

Platform – Name of your Qualys platform.
You can check your platform version by your URL.

Username - User to authenticate with Qualys.
Use a user with the role 'Scanner' and allow access to GUI and API. You can go with admin account into Qualys --> Administration --> User Management --> View username --> view the user's permissions.

  • for Qualys WAS, make sure that the "WAS" granted modules is added as well.

Asset groups - Add all asset groups to the user

  • Click on the Users tab in the Users section, then edit the user.

  • In the 'Edit user' screen click on 'Asset Groups' and 'Add All' or just the groups you're interested in.

Password - Password in order to authenticate with Qualys
The password must match the user.

We highly recommend login to your Qualys account with the credentials you've provided. 

Map Qualys Business Impact to Vulcan tag’s impact
You can choose to map Qualys Business impact to Vulcan tag’s impact per asset group by enable the mapping functionality:

Please note the following mapping mechanism (from Qualys to -> Vulcan)
•   Critical, High -> High
•   Medium -> Medium
•   Minor, Low -> Low

Vulcan tag’s impact affect the Risk Calculations and can be edit per tag in Vulcan's platform.

Click on Create

  • You can see the connector's progress in the Log tab

2. Getting assets and vulnerabilities from Qualys

In Assets --> Hosts, new assets from your Qualys account will be added to Vulcan.

You can view in Sources the product that identified the asset.
Also, you have full visibility of vulnerabilities found on each specific asset and other important details about the asset (OS, last scan, tags and more) 

Click on an asset to view its Asset Card.
All the vulnerabilities found by Qualys will be displayed under the Vulnerabilities tab.

Depends on your scan type, you can pull the packages installed on your asset via Qualys under Packages.

All the relevant data from Qualys is pulled and can be viewed under the Details tab.

3. Automating Remediation Actions on Qualys

With Vulcan, you can automate remediation actions on specific assets.

Navigate to the Automation, click on Create new Playbook.

Name your playbook. For example: “Remediate Qualys”

Add a description to your Playbook (optional)

Choose your Playbook’s trigger (Vulnerabilities to fix)

  • Vulnerability from source – The connector from which we pulled assets. For example: Vulnerabilities from source Qualys.

  • Vulnerability where – The rule which the playbook will be attached by. For example: Vulnerability where CVSS Score is greater than 7.

  • On assets where – The asset’s property you wish to be automated. For example: On assets where OS is Windows.

  • In this example, the vulnerability that will be fixed is any vulnerability with CVSS score higher than 7, which was found on assets with Windows OS, and that was discovered by Qualys connector.

  • Choose an action at Remediation actions to automate the process. For example: Open ServiceNow ticket and assign it to the relevant team.

4. Filter kernel vulnerabilities

Qualys has an option to filter out vulnerabilities related to kernel. using this fillter can remove vulnerabilities that might already be patched but the old kernel is still installed.

To modify this setting go to the Qualys connector under arf_kernel_filter and use one of these configurations:

Not set - default value. matches 0 the default configuration in Qualys.

0 - vulnerabilities are not filtered based on kernel activity.
1 - exclude kernel related vulnerabilities that are not exploitable (found on non-running kernels).
2 - only include kernel related vulnerabilities that are not exploitable (found on non-running kernels).
3 - only include kernel related vulnerabilities that are exploitable (found on running kernels).
4 - only include kernel related vulnerabilities.

more details from Qualys documentation


For fetching the Detections, meaning, the connections between an Asset and a Vulnerabilities, this API is used:


Did this answer your question?