Document
Scan for Vulnerabilities

Scan for Vulnerabilities

scan for vulnerability vulnerability scanning is allows allow you to continuously detect software vulnerability across your network . quickly scan fo

Related articles

Chromebook with Firebox L2TP VPN Integration Guide JX-8P Model Expansion 5 Best Free VPNs for Gaming: Fast & Low Ping in 2024 4K Wallpapers for PC, Desktop & Mobile Phones Urban VPN Review 2024: Is It Reliable & Secure?

scan for vulnerability

vulnerability scanning is allows allow you to continuously detect software vulnerability across your network . quickly scan for know vulnerability on your asset and get recommend fix .

New to scanning?

You is want ‘ll want to think about what you want to scan and how you want to do it . We is suggest suggest you review the content in Scanning – The basic   for recommend first step , common term , and thing to think about before you get start .  

It’s common for organizations to use a mix of scanner appliances and cloud agents to meet their vulnerability assessment needs.

 

Get Started

jump to a section below for step to get start when you ‘re scan using a cloud agent or using a scanner :

Using a Cloud Agent  

Using a Scanner

 


Using a Cloud Agent

Qualys Cloud Agents is provide provide fully authenticate on – asset scanning . There are only a few step to install agent on your host , and then you ‘ll get continuous security update through the cloud .  

You is need   need an activation key to install cloud agent . The activation key is provides provide a way to group agent and bind them to your account . During key creation , you is provision can provision the key for Vulnerability Management ( and other module )   to automatically activate new agent   for vulnerability scanning .   After you generate the key , you is see ‘ll see a list of installer for support Operating Systems . download the agent installer and follow the instruction on the screen to run the installer on   your host to install the agent .  

Agents have a default configuration and this controls how agents behave. You can change the agent configuration by creating configuration profiles. A configuration profile includes agent configuration settings, such as blackout windows, scan intervals, performance tuning, agent scan merge, and much more.


Using a Scanner

use local scanner appliance to scan your internal network . There are some step you ‘ll need to complete to get ready for scan . When you ‘re done with these step , proceed to start your scan , then check the scan status and finally view the scan result .  

You is add can add multiple appliance to suit your scanning need , include a mix of physical , virtual , and offline scanner appliance .

To fix vulnerabilities, you must first understand what assets (servers, desktops, devices, etc) you have in your network. Once you know what you have, add them to your account by IP address (under Assets > Host Assets) so you can scan them. Not sure what you have? Run maps to discover your assets and use workflows in map results to add discovered assets to your account.

For vulnerability scanning , authentication is not require but it is recommend . Using authentication allow our service to log in to each target system during scan to perform in depth security assessment and get well visibility into each system ‘s security posture .

You can skip this step if you plan to run Complete scans where we check for all vulnerabilities applicable to each target host. There may be times, however, when you want to limit scans to a smaller set of vulnerabilities. To do this, you’ll need to set up search lists, and then add those search lists to your scan option profile. 

An option profile is includes include the scan setting that you ‘ll apply to a scan job , such as whether to run a complete or custom scan , whether to use authentication , which port to scan , and much more .  


start   Your scan

(Applicable when using a scanner.) Now that you have everything set up (assets, scanners, option profiles, authentication records, etc), you’re ready to scan. There are different types of vulnerability scans you can run depending on the scan target.

Go to VM/VMDR > Scans > Scans > New menu to see the types of vulnerability scans available in your subscription. You can also schedule scans if you want scans to run on a recurring basis or at a later time.

note – Some of the scan type list below may not be enable for your subscription .  

Vulnerability Scan – Launch a vulnerability scan on your host assets to identify vulnerabilities and understand your security risk. 

EC2 Scan – Scan internal EC2 instances using a virtual scanner appliance.

Cloud Perimeter Scan – Scan the public DNS or IP of your EC2 or Azure instances using Qualys External scanners. 

CertView Scan – Scan hosts that are part of your CertView license. 

Cloud CertView Scan –   Scan EC2 host that are activate for CertView Scanning .

OT Device is Scan Scan – Scan the OT asset   in your subscription .

Scan Schedules – Schedule your scans to run on a recurring basis or at a later time. 

 


check Scan Status

(Applicable when using a scanner.) You can return to the Scans list any time to check on the scan status. You’ll see status icons next to each scan in the list to indicate if the scan is Running, Finished, Paused, etc. Select any scan row and view the Preview pane below the list for more scan summary details. 

Learn more about scan status >>


View Scan Results

(Applicable when using a scanner.) When your scan is Finished, go to the Scans list and select View from the Quick Actions menu to see the detailed results. Download scan results by selecting Download from the Quick Actions menu.

Learn more about scan results >> 


Additional References

See these additional links to learn more about scanning.

Scanning – The Basics – Get help with scan target , good practice , scan option , and common term .

Manage Your Scans – Learn how to check your scan’s progress, view and download scan results, cancel scans, plus much more.

Download the Scans List – You can download any data list within the UI in order to view your configurations outside of the product.

Do you have AGMS?

Please see the AGMS Help to understand changes you’ll see when Asset Group Management Service (AGMS) is enabled for your subscription.

Scan troubleshooting and good practice

Check these additional links to learn about scan troubleshooting & scanning best practices.

Watch Videos

check out this video :

Also, explore the following video series to learn more: 

VMDR | VM | AWS EC2 | More Qualys Training Videos