
May 21, 2024
1.1.0
ThreatQ versions >= 4.45.0
Qualys Operation
Overview
The ThreatQuotient Integration for Qualys Operation is used for searching Qualys for assets that are vulnerable for specific CVE IDs.
Upon execution of the operation for a selected CVE ID in ThreatQ,
- it searches for hosts vulnerable for that CVE, and if it finds any, it would list the hosts IPs, the Qualys IDs associated with the vulnerability, the severities, and the dates of the execution of the scan.
- The operation provides the users the option to store the vulnerable hosts as Assets in ThreatQ. The Assets is a custom object and this document contains the instructions for the installation.
ThreatQuotient’s mission is to improve the efficiency and effectiveness of security operations through a threat-centric platform. By integrating an organization’s existing processes and technologies into a single security architecture, ThreatQuotient accelerates and simplifies investigations and collaboration within and across teams and tools. Through automation, prioritization and visualization, ThreatQuotient’s solutions reduce noise and highlight top priority threats to provide greater focus and decision support for limited resources.