Is there a document that shows the exact list of commands Qualys uses when authenticated to Cisco devices?
Please see What commands are used on the Cisco command line ?
Can you confirm that those are the commands used by Vulnerability scans, not just Policy Compliance?
Curious, did anyone respond back to this question about the commands executed for the PC side of the house?
Retrieving data ...