Qualys Cloud Suite 8.4 New Features

Pronamika Abraham

Last updated on: June 3, 2020

This new release of the Qualys Cloud Suite, version 8.4, includes updates for usability and functionality across the platform as well as Vulnerability Management and Policy Compliance.

Feature Highlights

Qualys Cloud Suite 8.4 will be released in production in the coming weeks and includes enhancements to Vulnerability Management (VM) and Policy Compliance (PC), the Qualys Cloud Platform and the API.

For release notifications containing details specific to each platform, including the release date, and to subscribe to release notifications for your platform, please see the following:

Qualys Cloud Platform Updates

Launch Scan from the Host Assets List

We’ve heard from customers the need to quickly perform ad-hoc scans directly from the host assets list; the following two features will enable that capability.


Launch Scan on EC2 Classic Hosts Only

Now you can avoid scanning VPC hosts in a selected EC2 region. Just select the new checkbox “Only scan EC2 Classic Hosts in the region” when defining your EC2 scan.


We’ve received feedback that previously deleting networks was a long task due to having to remove the data within the networks first.  We’ve now automated that task and provided a wizard to detail what exactly you’re deleting.

Delete Networks with Data

Now you can easily delete networks, even if there is data associated with your network.


We’ll provide you with a conflict report when the network has data associated with it like assets, schedules and scanner appliances. Review the report for all the details.

Check out this sample report:


Support for MySQL Authentication

We’ve expanded database authentication to include MySQL databases.


Show Passing Credentials in Breakdown

With one click you can find authentication records with credentials that were successful 100% of the time (in the last 30 days). Tip – The credentials breakdown is a great way to learn about your records – which ones are failing, problematic, unused, etc.


Change Your Time Zone

Your time zone setting affects how dates/times will be shown in the UI and reports. By default it’s set to your browser’s time zone (Auto). Your time zone selection will be the default for new schedules. You can override the time zone in the Scheduling details.


New Columns added to the Users List

The SAML SSO column identifies whether SAML is enabled for the user’s account. The External ID column shows the external ID assigned to the user, if any.


New columns are hidden initially. When the option is selected to show the columns in the list, the details will appear in downloaded reports. You can quickly find users that have SAML SSO enabled or disabled by using the Search and Filter options above the Users list.


Enhanced Support for Restricted View of User Information

We’ll no longer show a user’s email address and phone number in the Users list to users outside of their Business Unit. This is in addition to the following information which is already hidden: fax, address, SAML SSO and external ID.  Managers can restrict the view of user information.



New Extended View of Asset Groups within Workflows

Users will now be able to view the asset group information when they need it – while selecting asset groups for scans and reports. Starting with release 8.4, we have made enhancements by adding an extra column named “Info” in the Select Asset Groups window. This column provides a clickable information icon against every asset group listed in the window.

The detailed information displays in a separate frame within the “Select Asset Groups” window. Users with permissions to edit asset groups can also edit the asset group.



Improved Asset Group Auto-Complete Widget

We have added improved auto-complete functionality to the Asset Groups widget for asset group selection in Scans, Assets, Reports, and other launch pages. The new multi-select combo box provides features like auto-complete, multiple selection of items, clearing all items in one go, and adding or removing the selected items. The combo box expands as the number of items increase allowing you to view all selected items without scrolling inside the component.


Change Contact Info in Email Notifications

You may want to change the contact that appears in email notifications to ensure users are reaching out to the appropriate person or group. Managers can provide a single contact for the subscription, and they can allow Unit Managers to override the contact for each business unit.


As a Manager, you can change the name and email address to display for a contact.

Vulnerability Management (VM)

Ability to Delete Domains

While the ability to delete domains has been available by request from support, we’ve now added the ability for our customers to delete those domains themselves.

Managers can now delete domains from the subscription. Any domain can be deleted except for the system-provided domain “qualys-test.com”.

What happens next?

  • The unique domain (network/domain) will be removed from the account along with any map data associated with it. This data cannot be recovered once deleted.
  • Any scheduled maps on the domain will be deactivated at the next scheduled launch time.

Find Out when a Host was First Discovered by a Map

The Host Information window provides the detailed information including the “First Found” date.

If a dash is displayed, your host was not discovered by a map, or it was discovered before December 2011, which is when we started saving the first found date.

You can also use the Asset Search to list hosts found within a certain time frame, for example hosts found within the last 30 days.

On clicking Search the Asset Search Report opens.

Easily Disable DNS Traffic for Your Maps

If your maps are generating too much DNS traffic, overwhelming your DNS server(s), or you want to get a map back quickly, you can disable DNS traffic in an option profile and run your maps using that profile.  This option applies only to maps on target domains with netblock(s), e.g. none:[].

How it works
We’ll perform network discovery only for the IP addresses in the netblocks:

  • No forward or reverse DNS lookups, DNS zone transfers or DNS guessing / bruteforcing will be made
  • DNS information will not be included in map results

New Ways to Search and View Certificates

Tag-based Certificate Search: This new option on the Certificates dashboard allows you to filter the list to only show certificates for hosts with certain tags. If you don’t see this option, Asset Tagging is not enabled for your account. Please contact your Account Manager or Support to get this feature.

Additional Certificate detection via Option Profile: Finding certificates is no longer limited to the ports only. With this new option (and the use of authentication) we can find certificates in more locations on your hosts, like in Apache, Tomcat, Java KeyStore, and Windows IIS.

Newly discovered certificates will be added automatically to your certificates list as new scan results are processed. Certificate details will include the location where the certificate was found. A certificate may be found on a port, on a location or both. A new search option lets you quickly find certificates found exclusively on ports.

View the Signature Algorithm: You can now view the signature hash algorithm in the Certificate Information page.

Note – You must run new vulnerability scans on your hosts to get this information.

New information details – signature algorithm and location – will also appear in the CSV report when you click Download.

Remediation Policy Rule – Exclude Non-Running Kernels

By selecting this option, you can be sure tickets are only created for vulnerabilities found on the running Linux kernel. Sound familiar? That’s because this filter already exists in your scan report templates for filtering vulnerabilities from your reports.

Patch Report – Display CVSS Base Scores

A new option is available in the patch report template to display CVSS base scores. For each patch, you can show the assigned score for the patch detection or the highest score across all QIDs fixed by the patch. You’ll also see the score for each QID in your report (when you choose to display QIDs).

Check out the following samples. The assigned score for patch MS10-030 is 9.3 and the highest score is 10. Also note the CVSS Base score for each QID fixed by the patch.

Most Vulnerable Hosts Report – Filter QIDs by Severity

Your Most Vulnerable Hosts Scorecard Report will now include confirmed vulnerabilities with severity 3 and above by default (previously this report included severity 4 and 5 only). Edit the filter settings in your scorecard template to include more or fewer severity levels.  When you choose to filter QIDs by severity level, you cannot also filter QIDs by search list.

This sample report shows the 10 most vulnerable hosts – the hosts with the highest number of vulnerabilities with severity levels 3, 4 and 5.  When you include confirmed and potential vulnerabilities, we’ll add them together and show the sum for each severity level.

Vulnerability Scorecard Report – PDF Improvements

You’ll notice these improvements to the PDF version of the Vulnerability Scorecard Report: 1) we now display the Business Risk Goal setting and 2) nicer page breaks.

CVSS Vectors added to CSV reports

Your vulnerability scan reports in CSV format will now show the CVSS vector for each CVSS Base and Temporal score. The vector is a string of abbreviated metrics and values that describe the components used to calculate the score. For example, you might see:

    CVSS Base
    9.3 (AV:N/AC:M/Au:N/C:C/I:C/A:C)

In this example, the base vector includes these metric values: Access Vector: Network, Access Complexity: Medium, Authentication: None, Confidentiality Impact: Complete, Integrity Impact: Complete, Availability Impact: Complete.

Want to know more? Go to CVSS v2 Complete Documentation

Here’s a sample report:

Associated Tags added to CSV reports

With this release vulnerability scan reports in CSV format will show asset tags associated with each host listed in the report. Tags appear in a new “Associated Tags” column when your report target includes asset tags and your report template is configured for host based findings (automatic data). Associated tags already appear in other report formats like HTML and PDF.

Here’s a sample report:

Policy Compliance (PC)

Reopen Exceptions when Evidence changes

With this option, we’ll automatically reopen an exception if a future scan returns a value for the control that is different than the value at the time of the original approval when the control is still failing.

For example, let’s say CID 1071 “Status of the ‘Minimum Password Length’ setting” has an expected value of 8 and your host returned a value of 5, which is failing. You request an exception for the host and it gets approved. The next scan of the host returns a value of 6 which is an improvement but still failing. If the reopen feature was enabled, then the exception status changes from Approved to Pending. The exception will need to be re-evaluated and approved again.

You can choose this option when requesting the exception or when approving it.

You’ll see a check mark next to the Approved status when the option “Reopen exception on change of evidence” is enabled for the exception.

Criticality added to Dashboard and Reports

Get trend information and control statistics broken down by criticality. Check out the changes we made to the Dashboard, Policy Summary and Scorecard Report.

Dashboard: Get passed/failed statistics across all your policies for each criticality level.

Policy Summary: This new pie chart shows the number of failed control instances at each criticality level.

Scorecard Report: Edit your scorecard report template to select the criticality levels and sections to include in your reports.

Here’s a sample scorecard report. Check out the new pie chart in the Report Discoveries section.

Scroll down further to see the Compliance by Criticality section.

The last section of the report shows the Top 5 failed controls for each criticality level.

Apache HTTP Server 2.4 Support

We’ve extended our support for Apache Web Server authentication to include Apache HTTP Server 2.4. These technologies are already supported: Apache HTTP Server 2.2, IBM HTTP Server 7.x and VMware vFabric Web Server 5.x.

Policy Library Content and Label Updates

Finding the policy you want in our Compliance Policy Library is easier than ever. Just choose one of the new labels on the left to filter the list. “New” policies were added in the last 90 days and “Updated” policies were changed in the last 90 days.

We’ve also removed the unlocked versions of the CIS Benchmarks, and older content that has been replaced with newer versions of policies.

Release Schedule

For release notifications containing details specific to each platform, including the release date, and to subscribe to release notifications for your platform, please see the following:

Share your Comments


Your email address will not be published. Required fields are marked *