Vulnerability Management Slides For Lab Tutorials
Vulnerability Management Slides For Lab Tutorials
6. 2. Organize
Verify Assets
5. 3.
Remediate Assess
4.
Report
VM Sensors
LAN 1 DMZ
§ Manager Users
• Add assets to
subscription
• Remove assets from
subscription
• Delegate “Add assets”
privilege to Unit
Managers
§ Tracking Method
• IP Address (works best
for static IPs)
• DNS Name
• NetBIOS Name
* Host Assets tab is replaced by the Address Management tab, when AGMS is enabled.
8
Add Agent Hosts
5 min.
Details - QID, CVE ID, Bugtraq ID and other vendor references info
Disabled vulnerabilities are still scanned for but they are not reported or ticketed.
KnowledgeBase
Editing Vulnerabilities
§ Change Severity
Levels
§ Threat – Impact –
Solution have user
comments field
§ Edited vulnerabilities
are noted in Scan
results
KnowledgeBase Search
5 min.
Report
Template &
Scorecards
On which vulns
do we want to
Option Profile report? Remediation
Policy
For which vulns
are we For which vulns do
scanning? we want tickets?
SEARCH
LISTS
Search List Info.
5 min.
Asset Asset
Search
Details Groups
Asset Asset
Search
Details Tags
Asset Groups
5 min.
• Add hosts by
DNS or
NetBIOS
names.
• Use Asset
Groups to
1.
2.
Qualys account must have “Scan by Hostname” enabled.
Use the DNS or NetBIOS options to add members to Asset
“scan by
Group. hostname.”
3. Scanner appliance must resolve hostname to IP address.
4. Only hostnames resolved to IPs in your subscription will be
scanned.
34
Asset Group: Business Impact
• Business Impact is used to calculate the Business Risk Score, which assigns a higher
weight to critical host assets.
• Demonstrate progress by lowering the Business Risk Score or your Asset Groups.
AV
Asset Tags
Dynamic Tags
§ Host assignment is determined by Asset Tag Rule Engine.
§ Tags dynamically change with updates to host.
Tags: Server
Chicago
Branch (Scanner)
TELNET ON
Network
10.0.30.16/28
01001
?
10.0.30.20 10.0.30.17
10.0.30.19
Workstation 10.0.30.18
Server Workstation
Chicago Server
Chicago Chicago
Chicago
TELNET ON
Initial Asset Tags
• Asset Groups
• Business Units
• Cloud Agent
• Internet Facing Assets
• Malware Domain Assets
Lab Tutorial 5
10 min.
Asset Groups:
1. Manually updated.
2. Used to assign access rights to Qualys users.
3. Identifies the “Business Impact” of host assets.
Asset Tags:
1. Dynamically updated.
2. Hierarchical organization of assets (nesting).
3. Help to automate scanning and reporting tasks.
Qualys automatically creates asset tags to match each asset
group.
Search For Assets
10 min.
Core Engine
§ Inference-Based Scanning Engine.
§ Intelligently launches modules specific to each unique host.
§ Provides for optimal performance and accuracy.
Modules
§ Collect configuration data from targeted hosts:
• Open ports
• Active services
• Host operating system
• Installed software applications
§ Assessment modules are then launched based upon information collected.
§ Hundreds of modules can coexist during a single scan.
Data Collection Modules
OS Detection Module
Requires: {Open Port} (at least one open TCP port)
Task: Detects host OS
Produces: {OS}
Host Discovery Module
GOAL: Identify “LIVE” hosts and eliminate “DEAD” hosts from your
vulnerability scans (default).
TCP (connection-oriented):
• 0 to 65535 ports.
• Standard Scan targets the
most commonly used port
numbers (i.e., effective
coverage with being
excessive).
• Half-open/Syn Scan:
Scanner appliance sends a
RST packet, after receiving
acknowledgement from
host.
UDP (connectionless):
• 0 to 65535 ports (Standard scan
uses 180 ports).
• Open UDP ports do not always
respond to packets sent.
• Closed UDP ports will typically
respond with ICMP “Port
Unreachable” (which may be blocked
by filtering rules).
• UDP Service Detection is performed
during UDP port scanning.
. . . HTTP 80/tcp
. . . SNMP 161/udp
Note: Qualys VM can detect more than 600 different services on TCP
and UDP ports. To review these services go to the Help > About Section.
Host Discovery
§ Checks for availability of target hosts. One response from the host indicates the
host is "alive"
Port Scanning
§ Finds all open TCP and UDP ports on target hosts (based on scan preferences)
Service Discovery
§ Identify which services are running on open ports
Vulnerability Assessment
§ Based on 1) Operating System, 2) Active Services, and 3) Installed Software
Scan Configuration
Scan
Scanner Target
Option Profile
Appliance Host Assets
Scan Options:
• TCP & UDP Port config • Additional Cert Detection
Please see Qualys’ “Scanning Strategies and Best Practices” self-paced training class for a more
detailed discussion and analysis of scan settings and features found in the Option Profile.
Lab Tutorial 7
10 min.
§ Standard Scan provides most effective coverage without being too excessive.
§ Configure network filtering devices and host-based firewalls to permit traffic on
the ports your scan is targeting.
Option Profile
Scan Performance Settings
§ High
§ Low
§ Normal
Option Profile
Vulnerability Detection
• In large organizations
where thousands of
machines are scanned
regularly for vulnerabilities,
managing passwords is a
challenge.
• Some organizations are
reluctant to let their
credentials leave the
network
Lab Tutorial 8
10 min.
10 min.
10 min.
10 min.
10 min.
- Passed
- Failed
- Passed with insufficient privileges
- Not Attempted
10 min.
Scanner
Vulnerability Scans
Network Discovery Maps
Reader Reporting
Least privileged
Other User Roles
§ Auditor
• This role is used exclusively by the Policy Compliance application and has no privileges
within VM.
§ Contact
• This role only receives email notifications from Qualys Cloud Platform Services and is not
assigned login credentials.
§ User Administrator
• Has access to Users, Asset Groups, Business Units, and Distribution Groups.
• Can create and edit other user accounts (including Managers), but cannot create or edit
other User Administrators.
Different Roles
§ Each role has its own permission set
§ Each user can get extended permissions
§ Extended permissions vary from role to role.
Lab Tutorial 14
10 min.
• Assign Users
Business Unit Manager
Privileges:
Perform all vulnerability management functions:
Map, Scan
Remediation
Reporting
Manage assets, add users, and publish
template reports within their Business Unit
Extended Permissions :
Add assets
Create profiles
Purge host information
Create/edit configurations (remediation policy,
authentication records/vaults, virtual hosts)
Manage compliance, web applications
Manage virtual appliances
Restrictions:
Can only be in one Business Unit
Can only be created if the Business Unit has been established
Limited to Asset Groups defined in their Business Unit
May not have rights to run specific reports via the API
Business Unit Illustration
Subscription Setup
Security
• Restrict IP access
• External IDs
• Session Timeout
Remediation
Assignment
• A specific user
• Asset Owner
• The user who
launched
the scan
10 min.
10 min.
10 min.
Map
Domains/
Map Netblocks
Preferences
Asset Groups
Mapping Options
Mapping Benefits
Shows an overall view of your corporate assets
A: Approved
S: Scannable
L: Live
N: Netblock
Mapping: Graphic Mode
Mapping: Choosing A Target
1. Domain - Qualys service will identify domain members via DNS
interrogation.
2. Netblock - Target a specific netblock range using the “none” domain.
3. Domain + Netblock – Use an IP address range to identify the upper
and lower boundaries of a domain.
4. Asset Group
- Associated Domains
- Associated IPs (already in your subscription)
Mapping Goals
1. Use map results and reports to discover and add new hosts to your
subscription and identify dead and rogue hosts.
2. Ensure network and system admin teams participate in the Mapping
and Reporting responsibilities.
Unknown Devices Report
133
Thank You
training@qualys.com