Enable vulnerability scanning with the integrated Qualys scanner (deprecated) - Microsoft Defender for Cloud (2024)

  • Article

Important

Defender for Server's vulnerability assessment solution powered by Qualys, is on a retirement path that set to complete on May 1st, 2024. If you are a currently using the built-in vulnerability assessment powered by Qualys, you should plan to transition to the Microsoft Defender Vulnerability Management vulnerability scanning solution.

For more information about our decision to unify our vulnerability assessment offering with Microsoft Defender Vulnerability Management, see this blog post.

Check out the common questions regarding the transition to Microsoft Defender Vulnerability Management.

Customers who want to continue using Qualys, can do so with the Bring Your Own License (BYOL) method.

A core component of every cyber risk and security program is the identification and analysis of vulnerabilities. Defender for Cloud regularly checks your connected machines to ensure they're running vulnerability assessment tools.

When a machine is found that doesn't have a vulnerability assessment solution deployed, Defender for Cloud generates the security recommendation: Machines should have a vulnerability assessment solution.Use this recommendation to deploy the vulnerability assessment solution to your Azure virtual machines and your Azure Arc-enabled hybrid machines.

Defender for Cloud includes vulnerability scanning for your machines. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Defender for Cloud. This page provides details of this scanner and instructions for how to deploy it.

Tip

The integrated vulnerability assessment solution supports both Azure virtual machines and hybrid machines. To deploy the vulnerability assessment scanner to your on-premises and multicloud machines, connect them to Azure first with Azure Arc as described in Connect your non-Azure machines to Defender for Cloud.

Defender for Cloud's integrated vulnerability assessment solution works seamlessly with Azure Arc. When you've deployed Azure Arc, your machines will appear in Defender for Cloud and no Log Analytics agent is required.

If you don't want to use the vulnerability assessment powered by Qualys, you can use Microsoft Defender Vulnerability Management or deploy a BYOL solution with your own Qualys license, Rapid7 license, or another vulnerability assessment solution.

Availability

AspectDetails
Release state:General availability (GA)
Machine types (hybrid scenarios):Enable vulnerability scanning with the integrated Qualys scanner (deprecated) - Microsoft Defender for Cloud (1) Azure virtual machines
Enable vulnerability scanning with the integrated Qualys scanner (deprecated) - Microsoft Defender for Cloud (2) Azure Arc-enabled machines
Pricing:Requires Microsoft Defender for Servers Plan 2
Required roles and permissions:Owner (resource group level) can deploy the scanner
Security Reader can view findings
Clouds:Enable vulnerability scanning with the integrated Qualys scanner (deprecated) - Microsoft Defender for Cloud (3) Commercial clouds
Enable vulnerability scanning with the integrated Qualys scanner (deprecated) - Microsoft Defender for Cloud (4) National (Azure Government, Microsoft Azure operated by 21Vianet)
Enable vulnerability scanning with the integrated Qualys scanner (deprecated) - Microsoft Defender for Cloud (5) Connected AWS accounts

Overview of the integrated vulnerability scanner

The vulnerability scanner included with Microsoft Defender for Cloud is powered by Qualys. Qualys' scanner is one of the leading tools for real-time identification of vulnerabilities. It's only available with Microsoft Defender for Servers. You don't need a Qualys license or even a Qualys account - everything's handled seamlessly inside Defender for Cloud.

How the integrated vulnerability scanner works

The vulnerability scanner extension works as follows:

  1. Deploy - Microsoft Defender for Cloud monitors your machines and provides recommendations to deploy the Qualys extension on your selected machine/s.

  2. Gather information - The extension collects artifacts and sends them for analysis in the Qualys cloud service in the defined region.

  3. Analyze - Qualys' cloud service conducts the vulnerability assessment and sends its findings to Defender for Cloud.

    Important

    To ensure the privacy, confidentiality, and security of our customers, we don't share customer details with Qualys. Learn more about the privacy standards built into Azure.

  4. Report - The findings are available in Defender for Cloud.

Deploy the integrated scanner to your Azure and hybrid machines

  1. From the Azure portal, open Defender for Cloud.

  2. From Defender for Cloud's menu, open the Recommendations page.

  3. Select the recommendation Machines should have a vulnerability assessment solution.

    Tip

    The machine server16-test, is an Azure Arc-enabled machine. To deploy the vulnerability assessment scanner to your on-premises and multicloud machines, see Connect your non-Azure machines to Defender for Cloud.

    Defender for Cloud works seamlessly with Azure Arc. When you've deployed Azure Arc, your machines will appear in Defender for Cloud and no Log Analytics agent is required.

    Your machines appear in one or more of the following groups:

    • Healthy resources – Defender for Cloud detected a vulnerability assessment solution running on these machines.
    • Unhealthy resources – A vulnerability scanner extension can be deployed to these machines.
    • Not applicable resourcesthese machines aren't supported for the vulnerability scanner extension.
  4. From the list of unhealthy machines, select the ones to receive a vulnerability assessment solution and select Remediate.

    Important

    Depending on your configuration, this list might appear differently.

    • If you haven't got a third-party vulnerability scanner configured, you won't be offered the opportunity to deploy it.
    • If your selected machines aren't protected by Microsoft Defender for Servers, the Defender for Cloud integrated vulnerability scanner option won't be available.

    Enable vulnerability scanning with the integrated Qualys scanner (deprecated) - Microsoft Defender for Cloud (8)

  5. Choose the recommended option, Deploy integrated vulnerability scanner, and Proceed.

  6. You're asked for one further confirmation. Select Remediate.

    The scanner extension is installed on all of the selected machines within a few minutes.

    Scanning begins automatically as soon as the extension is successfully deployed. Scans run every 12 hours. This interval isn't configurable.

    Important

    If the deployment fails on one or more machines, ensure the target machines can communicate with Qualys' cloud service by adding the following IPs to your allowlists (via port 443 - the default for HTTPS):

    • https://qagpublic.qg3.apps.qualys.com - Qualys' US data center

    • https://qagpublic.qg2.apps.qualys.eu - Qualys' European data center

    If your machine is in a region in an Azure European geography (such as Europe, UK, Germany), its artifacts will be processed in Qualys' European data center. Artifacts for virtual machines located elsewhere are sent to the US data center.

Automate at-scale deployments

Note

All of the tools described in this section are available from Defender for Cloud's GitHub community repository. There, you can find scripts, automations, and other useful resources to use throughout your Defender for Cloud deployment.

Some of these tools only affect new machines connected after you enable at scale deployment. Others also deploy to existing machines. You can combine multiple approaches.

Some of the ways you can automate deployment at scale of the integrated scanner:

  • Azure Resource Manager – This method is available from view recommendation logic in the Azure portal. The remediation script includes the relevant ARM template you can use for your automation:
  • DeployIfNotExists policyA custom policy for ensuring all newly created machines receive the scanner. Select Deploy to Azure and set the relevant parameters. You can assign this policy at the level of resource groups, subscriptions, or management groups.
  • PowerShell Script – Use the Update qualys-remediate-unhealthy-vms.ps1 script to deploy the extension for all unhealthy virtual machines. To install on new resources, automate the script with Azure Automation. The script finds all unhealthy machines discovered by the recommendation and executes an Azure Resource Manager call.
  • Azure Logic Apps – Build a logic app based on the sample app. Use Defender for Cloud's workflow automation tools to trigger your logic app to deploy the scanner whenever the Machines should have a vulnerability assessment solution recommendation is generated for a resource.
  • REST API – To deploy the integrated vulnerability assessment solution using the Defender for Cloud REST API, make a PUT request for the following URL and add the relevant resource ID: https://management.azure.com/<resourceId>/providers/Microsoft.Security/serverVulnerabilityAssessments/default?api-Version=2015-06-01-preview​

Trigger an on-demand scan

You can trigger an on-demand scan from the machine itself, using locally or remotely executed scripts or Group Policy Object (GPO). Alternatively, you can integrate it into your software distribution tools at the end of a patch deployment job.

The following commands trigger an on-demand scan:

  • Windows machines: REG ADD HKLM\SOFTWARE\Qualys\QualysAgent\ScanOnDemand\Vulnerability /v "ScanOnDemand" /t REG_DWORD /d "1" /f
  • Linux machines: sudo /usr/local/qualys/cloud-agent/bin/cloudagentctl.sh action=demand type=vm

Next steps

Remediate the findings from your vulnerability assessment solution

Defender for Cloud also offers vulnerability analysis for your:

  • SQL databases - Explore vulnerability assessment reports in the vulnerability assessment dashboard
  • Azure Container Registry images - Vulnerability assessments for Azure with Microsoft Defender Vulnerability Management
Enable vulnerability scanning with the integrated Qualys scanner (deprecated) - Microsoft Defender for Cloud (2024)

FAQs

How do I enable vulnerability scanning in OCI? ›

Getting Started
  1. Create Vulnerability Scanning IAM Policies. ...
  2. Create the Required IAM Policy for Compute Scanning Recipes. ...
  3. Open the navigation menu and click Identity & Security. ...
  4. Click Create Scan Recipe. ...
  5. Click Create Target. ...
  6. Click View Scan Result.

Does Defender for Cloud do vulnerability scanning? ›

Microsoft Defender for Cloud includes built-in vulnerability scanning powered by Qualys without the need for a separate Qualys license.

How do I run a vulnerability scan in Qualys? ›

Start your scan Click KnowledgeBase on the top menu. Go to Scans on the top menu and then select New Scan > Vulnerability Scan. The launch scan wizard walks you through the steps. Tell us the web application you'd like to scan for vulnerabilities and select scan settings.

How much does OCI vulnerability scanning cost? ›

OCI Vulnerability Scanning Service is offered at no cost for all paying customers. Customers can later choose the option of integrating with optional third-party scanning vendors to see findings in those platforms, as well as in OCI.

Which vulnerability scanning service Cannot identify OCI? ›

Final answer: Oracle Cloud Infrastructure (OCI) Vulnerability Scanning Service can identify OS configurations, OS packages needing updates, and open ports, but cannot directly identify Cross-Site Scripting (XSS) as it's related to web application vulnerabilities, not the cloud infrastructure layer.

Why should you enable unified vulnerability view in Qualys? ›

It allows users to merge unauthenticated scan results with Qualys Cloud Agent collections for the same asset, providing the attacker's point of view into a single unified view of the vulnerabilities.

How to deploy Microsoft Defender vulnerability management? ›

To start onboarding your devices to Defender Vulnerability Management:
  1. Go to the Onboarding section in the Microsoft Defender portal.
  2. Choose the operating system for the devices you wish to onboard.
  3. Select the Deployment method you plan to use.
  4. Follow the instructions to onboard your devices.
Apr 24, 2024

How do I access my vulnerability? ›

Some tips for doing this when you notice yourself covering up your vulnerable side include:
  1. Give yourself compassion. ...
  2. Avoid focusing on other people's opinions of you. ...
  3. Slow down if you need to. ...
  4. Give up perfection. ...
  5. Be forthcoming with your needs. ...
  6. Vocalize your feelings. ...
  7. Be in the moment.
Aug 25, 2021

Does Azure use qualys? ›

Qualys integrates with Azure Stack and secures both its infrastructure and user workloads.

What is the difference between Microsoft Defender for Cloud and Defender for Cloud Apps? ›

Defender for Cloud can help you prevent misconfigurations, detect threats, respond to incidents, and remediate vulnerabilities in your cloud environment. Defender for Cloud Apps is a solution that helps you secure your cloud applications across Microsoft 365 and other SaaS providers.

Does Azure do vulnerability scanning? ›

You can count on Azure web app vulnerability scanning and vulnerability detection tools to keep track of essential software changes.

Is Qualys a good vulnerability scanner? ›

Conclusion. Qualys may not be the only solution for vulnerability scanning or vulnerability management, but it is one of the best ones available.

What are the requirements for Qualys scanner? ›

Qualys Virtual Scanner Appliance is packaged and qualified for deployment on a variety of virtualization and cloud platforms. The number of CPUs to allocated RAM ratio should always be 1:2, e.g. 4 CPUS and 8 GB RAM. Using a snapshot or clone of a virtual scanner instance to create a new instance is strictly prohibited.

How do you implement vulnerability scanning? ›

10 Steps of a Vulnerability Scan
  1. Step 1: Define the Scope and Objectives. ...
  2. Step 2: Choose and Install the Right Scanning Tools. ...
  3. Step 3: Configure the Tool Settings. ...
  4. Step 4: Configure the Scan Settings. ...
  5. Step 5: Initiate and Execute the Scan. ...
  6. Step 6: Monitor the Scan. ...
  7. Step 7: Interpret and Prioritize the Scan Results.
Jul 20, 2023

How do I enable access scanner and access protection? ›

On-access Scanning
  1. Use the check box to turn on-access scanning on or off. Warning. ...
  2. For a quick configuration, select the security level that best suits your needs (Aggressive, Normal or Permissive). ...
  3. You can configure the scan settings in detail by selecting the Custom protection level and clicking the Settings link.

How do I enable data safe on OCI? ›

  1. Create an Oracle Data Safe Service Account on Your Target Database. ...
  2. Grant Roles to the Oracle Data Safe Service Account on Your Target Database. ...
  3. Create a Wallet or Certificates for a TLS Connection. ...
  4. Configure a TLS Connection Between the On-Premises Connector on Your Host Machine and Your Oracle Database.

How do I enable logging analytics in OCI? ›

Enable Logging Analytics

The Logging Analytics service is available from the top level OCI console menu. Navigate to Observability & Management and click Logging Analytics.

Top Articles
May 2024 Jobs Report: 272,000 Jobs Added, Sharply Beating Expectations | J.P. Morgan
FAQs: What is Root of Trust?
Paris 2024: Kellie Harrington has 'no more mountains' as double Olympic champion retires
Rainbird Wiring Diagram
Craigslist Free Stuff Appleton Wisconsin
Noaa Weather Philadelphia
Sinai Web Scheduler
Daniela Antury Telegram
Mawal Gameroom Download
Signs Of a Troubled TIPM
Bestellung Ahrefs
Burn Ban Map Oklahoma
Walmart Double Point Days 2022
Mbta Commuter Rail Lowell Line Schedule
Ups Access Point Lockers
Charter Spectrum Store
Craigslist Southern Oregon Coast
Rugged Gentleman Barber Shop Martinsburg Wv
Craigslist Personals Jonesboro
Putin advierte que si se permite a Ucrania usar misiles de largo alcance, los países de la OTAN estarán en guerra con Rusia - BBC News Mundo
Gazette Obituary Colorado Springs
Rust Belt Revival Auctions
12 Facts About John J. McCloy: The 20th Century’s Most Powerful American?
Used Patio Furniture - Craigslist
Evil Dead Rise Showtimes Near Sierra Vista Cinemas 16
Orange Park Dog Racing Results
Courtney Roberson Rob Dyrdek
Uky Linkblue Login
3473372961
Wisconsin Volleyball Team Leaked Uncovered
Kristen Hanby Sister Name
Six Flags Employee Pay Stubs
Lehpiht Shop
24 slang words teens and Gen Zers are using in 2020, and what they really mean
The Ride | Rotten Tomatoes
Shoreone Insurance A.m. Best Rating
Aveda Caramel Toner Formula
Craigslist Tulsa Ok Farm And Garden
2020 Can-Am DS 90 X Vs 2020 Honda TRX90X: By the Numbers
Indio Mall Eye Doctor
Below Five Store Near Me
R: Getting Help with R
Bekkenpijn: oorzaken en symptomen van pijn in het bekken
Mychart University Of Iowa Hospital
'The Nun II' Ending Explained: Does the Immortal Valak Die This Time?
Cvs Minute Clinic Women's Services
Tanger Outlets Sevierville Directory Map
Besoldungstabellen | Niedersächsisches Landesamt für Bezüge und Versorgung (NLBV)
Zom 100 Mbti
Morgan State University Receives $20.9 Million NIH/NIMHD Grant to Expand Groundbreaking Research on Urban Health Disparities
Pauline Frommer's Paris 2007 (Pauline Frommer Guides) - SILO.PUB
Latest Posts
Article information

Author: Nathanial Hackett

Last Updated:

Views: 5366

Rating: 4.1 / 5 (72 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Nathanial Hackett

Birthday: 1997-10-09

Address: Apt. 935 264 Abshire Canyon, South Nerissachester, NM 01800

Phone: +9752624861224

Job: Forward Technology Assistant

Hobby: Listening to music, Shopping, Vacation, Baton twirling, Flower arranging, Blacksmithing, Do it yourself

Introduction: My name is Nathanial Hackett, I am a lovely, curious, smiling, lively, thoughtful, courageous, lively person who loves writing and wants to share my knowledge and understanding with you.