Skip to content

Qualys Continuous Monitoring

Qualys Continuous Monitoring

About

Qualys Continuous Monitoring lets you see your perimeter the way hackers do — directly from the Internet — and acts as a sentinel in the cloud, constantly watching your network for changes that could put you at risk. Qualys CM automates monitoring of your global perimeter, tracking systems in your global network, wherever they are.

Product Details

Vendor URL: Qualys Continuous Monitoring

Product Type: Network Monitoring

Product Tier: Tier II

Integration Method: Custom

Log Guide: N/A

Parser Details

Log Format: JSON

Expected Normalization Rate: Near 100%

Data Label: QUALYS_CONTINUOUS_MONITORING

UDM Fields (list of all UDM fields leveraged in the Parser):

Log File Field UDM Field
appName principal.application
appVersion metadata.product_version
eventType metadata.product_event_type
hostname principal_host
id security_result.threat_id
ipAddress principal.ip
operatingSystem principal.platform_version
port principal.port
profile.id additional.fields
protocol network.ip_protocol
service network.application_protocol
source metadata.description
sslIssuer network.tls.client.certificate.issuer
sslName additional.fields
sslOrg additional.fields
ticketId additional.fields
triggerUuid metadata.product_log_id
vpeConfidence additional.fields
vpeStatus additional.fields
vulnTitle security_result.summary

Product Event Types

type,subtype UDM Event Classification
General GENERIC_EVENT

Log Sample

{"Alert":{"id":12345678,"source":"REMEDIATION","eventType":"HOST_FOUND","qid":0,"triggerUuid":"a12b345c-1a23-1234-a123-12345a6b1234","vulnTitle":"Installed Applications Enumerated From Windows Installer","vulnSeverity":0,"vulnType":"Configuration File","vulnCategory":"Ig","ipAddress":"10.xxx.xxx.xxx","hostname":"hostname.np.domain.com","isHidden":"false","eventDate":"2023-06-08T14:27:16Z","alertDate":"2023-06-08T14:27:16Z","profile":{"id":123456,"title":"Test CM"},"alertInfo":{"operatingSystem":"EulerOS / Ubuntu / Fedora / Tiny Core Linux / Linux 3.x / IBM / FortiSOAR","port":20,"protocol":"udp","service":"ssh","appName":"CrowdStrike Sensor Platform","appVersion":"6.54.16812.0","sslName":"name","sslOrg":"org","sslIssuer":"issuer","ticketId":0,"ticketState":"","vpeConfidence":"","vpeStatus":""}}}

Sample Parsing

metadata.description = "REMEDIATION"
metadata.product_event_type = "HOST_FOUND"
metadata.product_log_id = "a12b345c-1a23-1234-a123-12345a6b1234"
metadata.product_version = ""6.54.16812.0"
security_result.threat_id = "12345678"
security_result.summary = "Installed Applications Enumerated From Windows Installer"
principal.ip = "10.xxx.xxx.xxx"
principal.hostname = "hostname"
principal.administrative_domain = "np.domain.com"
prinicpal.port = 20
principal.application = "CrowdStrike Sensor Platform"
principal.platform_version = "EulerOS / Ubuntu / Fedora / Tiny Core Linux / Linux 3.x / IBM / FortiSOAR"
network.ip_protocol = UDP
network.application_protocol = SSH
network.tls.client.certificate.issuer = "issuer"
additional.fields["Profile Id"] = "123456"
additional.fields["Vulnerabilty Type"] = "Configuration File"
additional.fields["Vulnerabilty Category"] = "Ig"
additional.fields["Profile Title"] = "Test CM"
additional.fields["SSL Name"] = "name"
additional.fields["SSL Org"] = "org"

Rules

Coming Soon