Dashboard Toolbox - AssetView: Open Ports Management & RTI (v1.0)

Document created by Felix Jimenez Employee on Oct 8, 2018Last modified by Felix Jimenez Employee on May 31, 2019
Version 26Show Document
  • View in full screen mode

This AssetView Dashboard will enable you to be more pro-active in your Open Ports Management. Get a quick easy glance to KPIs for Open Ports.


Data packets travel to and from numbered network ports associated with particular IP addresses and endpoints, using the TCP or UDP transport layer protocols. All ports are potentially at risk of attack because no port is natively secure. Each port and underlying service has its risks. The risk comes from the version of the service, whether someone has configured it correctly, and, if there are passwords for the service, whether these are strong? There are many more factors that determine whether a port or service is safe.


What makes these ports risky?

Total of 65,535 TCP ports and another 65,535 UDP ports!

TCP and UDP port protocols are used by protocols of the application layer, of the Internet protocol suite for the establishment of host-to-host connectivity.

Port numbers are assigned in various ways, based on three ranges: 

System Ports (0-1023)

User Ports (1024-49151)
Dynamic and/or Private Ports (49152-65535) (ephemeral ports)

See [RFC6335] for more info


The JSON file for this pre-built dashboard can be found in the attachment section at the end of this article. You may download & import it into Qualys AssetView (note: see warning below) in your Qualys subscription.


Dashboard Demonstration Images:



























The Dashboard requires the following Tags to be created for each as shown below,

and named exactly the same for the "Commonly Hacked Ports" Widget to work without any edits. 

The following Widgets Require ThreatProtection to be Purchased or in Trial mode:  

1. Vuln by Ports Protocol - Severity 1 - 5

2. Ports Protocol - RTI - DOS

3. Ports Protocol - RTI - Public Exploit

4. Ports Protocol - RTI - ZeroDay

5. Ports Protocol - RTI - Malware

6. Ports Protocol - RTI - High Data Loss


Example of Tags & Widget Structure:



How to Enable Trending on the widgets:

Open the desired widget in edit mode and select the Collect trend data check box.



API Guide  - Evaluate Tag: 

Asset Mgmt and Tagging v2 API See Page:  31

* * * Re-Evaluate the Tags as needed * * *

Evaluate all tags that have OPEN_PORTS tag rules.

API Request:  **Note the POD API url & the file.xml needs to be created**

POD 1: curl -u "USERNAME:PASSWORD" -H "content-type: text/xml" -X "POST" --data-binary @- "https://qualysapi.qualys.com/qps/rest/2.0/evaluate/am/tag" < file.xml

POD 2: curl -u "USERNAME:PASSWORD" -H "content-type: text/xml" -X "POST" --data-binary @- "https://qualysapi.qg2.apps.qualys.com/qps/rest/2.0/evaluate/am/tag< file.xml

POD 3: curl -u "USERNAME:PASSWORD" -H "content-type: text/xml" -X "POST" --data-binary @- "https://qualysapi.qg3.apps.qualys.com/qps/rest/2.0/evaluate/am/tag< file.xml

Request POST data:   file.xml
<?xml version="1.0" encoding="UTF-8" ?>
<Criteria field="ruleType"



Qualys - Training Videos:

Self-Paced Class: Vulnerability Management Asset Tags

Self-Paced Class: AssetView and Threat Protection

AssetView Dashboards


Help Link:

POD - 1 - Apply Tags to Organize Your Assets

POD - 2 - Apply Tags to Organize Your Assets

POD - 3 - Apply Tags to Organize Your Assets





Looking for additional Qualys Documentation use the Resource link in the Qualys Portal (Help > Resources)


Related community Post:


Additional AssetView Dashboards:#performance_mgmt

Dashboard Toolbox - Asset View: How To - Import a Dashboard json 

- - - - - - - - - - - - - - - - - - - - - - - - - - - -- - - - - - - - - - - - - - - - - - - - - - - - 

Dashboard Toolbox - AssetView: Performance Management (v1.1)
Dashboard Toolbox - AssetView: Host Scan Time Management (v1.1) 
Dashboard Toolbox - AssetView: Scanning Activity Management (v1.0)

Dashboard Toolbox - AssetView: EOL/Obsolete Software & RTI MGMT (v1.0)

Dashboard Toolbox - AssetView: Windows Authentication Management (v1.4) 


External References: 

List of TCP/IP Ports 

Ephemeral port - Wikipedia 

List of TCP and UDP port numbers - Wikipedia 

Service Name and Transport Protocol Port Number Registry - iana.org

TCP/IP Ports 

Trojan TCP/IP Ports 


RFC 6335 - Internet Assigned Numbers Authority (IANA) Procedures for the Management 



WARNING: Read Before Downloading

Dashboard and Widget JSON files are not interchangeable between application dashboards. AssetView JSON files may only be used in AssetView and Vulnerability Management JSON files may only be used in Vulnerability Management. If you make a mistake and import a JSON file from one application into the other, you must contact Qualys Support to have the error corrected in the database for your subscription. Again, there is no way to reverse this mistake within the UI, it must be done in the database.



fjimenez This page contains information to create a Scorecard dashboard leveraging data in your Qualys Vulnerability Management subscription. This dashboard is part of AssetView Dashboard Program. If you have any questions regarding the content, please comment below or Contact Support - Technical Assistance Inquiry Form | Qualys, Inc.


Dashboard Collaborators:



Back to Dashboarding and Reporting

1 person found this helpful