• Hanging Scanners

    I have three scanners in a group doing a large scan. The same scanner appliance in both scans is showing zero IPs scanned and its at 12% availability.   Anyone ever have something like this where the scanner ha...
    John Sponheimer
    last modified by John Sponheimer
  • Inquiry - Rough time after Patch Tuesday for MS QIDs to be done

    All,   I am just looking for a ballpark here. Anyone have a rough estimate on how long from the release of the Microsoft Patch Tuesday patch release till usable QIDs are available for usage in scanning?   ...
    John Sponheimer
    last modified by John Sponheimer
  • How do I properly secure a config file from a XAMPP sever?

    I'm running a test web server on a machine. I thought the config file was secure but Qualys scan says otherwise, gives me a level 4 vulnerability because the config file is not hidden or secured. I'm not sure if it's ...
    Abraham Padilla
    created by Abraham Padilla
  • Vulnerability Report Customization with respect to Severity

    I am new with the Qualys, can some one help me to generate two vulnerability reports, one with Severity 5 and other with Severity 4?   Although, I have tried to customize the report template but unable to find a...
    Tabish Jafri
    created by Tabish Jafri
  • NetApp Filer Authentication through LDAP

    Hi there,    I'm trying to get a deep-dive auth report into the state of play with our Filer environment, and struggling with auth records.   Our Storage team have given us access through an AD accoun...
    created by Chalky_White
  • In Beta VM Dashboard - Any way to export data yet?

    Hey all...I have been playing in the Beta VM Dashboard and it has some better features...the question is...how do I get that data out to excel.  Anyone have any comments on it yet?  No export to CVS feature ...
    John Sponheimer
    last modified by John Sponheimer
  • Cloud Agent vs. Authenticated Scan detection

    Is there any difference between which vulnerabilities that are discovered by a Qualys Cloud Agent and a Qualys Authenticated Scan? Or will they find the exact same vulnerabilities?
    Bob Bobson
    last modified by Bob Bobson
  • SNMPv3 + Qualys auth record

    Does anyone else use SNMPv3 to aid Qualys OS detection? If so, how does your organization respond to the lack of AES256 encryption support, and the lack of SHA2 hashing support, in Qualys Authentication records? 
    Jake VanMast
    last modified by Jake VanMast
  • How to best scan Windows Workstations?

    When scanning Windows workstations, which is more resource intensive to the target device, a scan using a dissolvable agent or a scan using a traditional Windows authentication record with remote registry services ena...
    Jeremy _
    last modified by Jeremy _
  • CVE vs. QID

    Hi All,   Thought I would raise a finding here which I feel is questionable. Interested to hear other viewpoints.   This is regarding the recent MS Vulnerability, CryptAPI. The CVE reference is 2020-0601. ...
    Chris Jones
    last modified by Chris Jones
  • QID: 86847  - Apache Partial HTTP Request Denial of Service Vulnerability

    Hi,   Please help to understand. Mentioned QID is reported as a reference of CVE-2007-6750. In Results I see: QID: 86847 detected on port 443 over TCP - Apache 2.2.3# But I'm running Apache 2.4.29  ...
    Lev Sturmer
    created by Lev Sturmer
  • External Scanning Option Profile (Best Practices)

    We are looking for best practices to create an option profile for external scanning. We have been using the PCI Option profile but it is limited and not user configurable. The external scans will be unauthenticat...
    Jon Rhodes
    last modified by Jon Rhodes
  • Best Practice for Workstation Scanning?

    I'm curious what some of you do for scanning workstations in large environemnts? (ie: >1000 Workstations) Do you scan a sample subset of workstations for vulnerabilities? Do you scan every single PC? I can't seem...
    last modified by kelkin
  • TLS Protocol Session Renegotiation Security Vulnerability

    Hello all,   I am having some issues trying to figure out what we need to do about this vulnerability that is showing up for printers...   There are patches and registry hacks to get it remediated for serv...
    Jung Choi
    created by Jung Choi
  • Is it possible to forward the scan engine OS security logs to Splunk either by being able to install one of our Splunk agents or sending the logs via Syslog

    Looking to improve overall security monitoring.  We use Virtual Appliances, all are at current configurations.
    Daniel Johnson
    created by Daniel Johnson
  • HTTP/2 DoS - QID 91566

    Qualys released a new QID last week, QID 91566, for an HTTP/2 Denial of Service vulnerability. It appears this is the latest vulnerability addressed by Microsoft that requires both a patch and a registry key to be dep...
    Jordan Greene
    last modified by Jordan Greene
  • Windows Client unable to connect to Windows DB server if weak ciphers are disabled

    Hi Guys,   I have disabled all weak ciphers on a windwos 2012 rserver and has 2016 SQL installed. 1 application on the workstation is connecting to the DB on server. We found out that if this registry key is de...
    Mina Medel
    created by Mina Medel
  • Deprecated SSH Cryptographic settings diffie-hellman-group1-sha1

    Folks,              We have a lot of Cisco Devices running a fairly recent code (Nexus, IOS, Catalyst). Our Qualys network vulnerability scanner is complaining about deprecated...
    Tarun Pahuja
    last modified by Tarun Pahuja
  • Change Severity based on Operating System

    Hello all, I am looking for a way to change the severity of vulnerability based on the operating system.  The use case is for a vulnerability that requires local access to exploit, i.e. Meltdown/Spectre.  A...
    Joseph Miller
    created by Joseph Miller
  • QID for CryptoAPI?

    Hi all -   ETA on QID for CryptoAPI?
    Grant Johnson
    last modified by Grant Johnson