Configuring Qualys Cloud Agents for Deployment
Configuring Qualys Cloud Agents for Deployment
0
Training Documents
• Presentation Slide
• LAB Tutorial Supplement
https://qualys.com/learning
You will need to download the training documents needed to complete the Cloud
Agent course from the Qualys learning portal: qualys.com/learning.
Note that you will need a PDF reader like Adobe Acrobat to view these files.
1
Play Lab Tutorials
1. When you click the link to open a lab tutorial, it will open up in your default Web
browser. If you would like to play the tutorial in a different browser, you can copy
this link and paste it into the address field of another browser.
2. When the lab tutorial opens, click the icon in the upper-right corner, to maximize
your screen size.
3. When you are ready to play the tutorial, click the start button.
2
Agenda
§ Cloud Agent Overview
§ Cloud Agent Installation & Deployment
• Agent Activation Key
• Installation Components
• Agent Installation Options
§ Agent Asset Inventory & Details
§ Cloud Agent Lifecycle and Configuration
3
Overview
4
Cloud Agent Overview
Cloud Agent delivers visibility and security solutions for assets that are not easily
scanned from the network including remote or roaming users, distributed offices and
cloud server instances.
5
Agent OS Support
6
Full Stack Solution for Red Hat OpenShift
Container Sensor
(Container and Image
Vulnerability and Compliance
Assessment)
Container
Container
Cloud Agent for RedHat
CoreOS on OpenShift
4.x In-Container
(Host level assessment) Instrumentation
(Runtime Protection)
OpenShift 4.x
OpenShift 4.x Infrastructure CRI-O
Security RHCOS Represents an installed Qualys Sensor
At Qualys, we have focused on delivering a full stack solution for Red Hat OpenShift.
To do this, we utilize both Container Sensors and Cloud Agents.
As you can see in the diagram, our container sensor solution is deployed as its own
container. It assesses images and running containers in your runtime environment.
This solution is technically independent from the Cloud Agent container and provides
inventory, vulnerability, and compliance assessments; with data merging and sharing
between modules on the Qualys Cloud Platform.
Our Container Security Solution has been in the market for a while now and supports
Docker, Container-D, and Crio runtimes.
But what about the Host OS? RHCOS does not permit modification of the host. This is
a powerful security measure.
7
That does not mean it is impervious to attack, but it does provide a strong base for
building excellent layered security solutions.
Easily deployed, our containerized agent scans the Host OS to provide visibility,
actionable intelligence, and auditing.
Qualys full-stack security for Red Hat OpenShift adds visibility, actionable intelligence,
and security auditing for Red Hat Enterprise Linux CoreOS, the operating system that
underpins OpenShift deployments for running containers securely. With this new
offering, Qualys is now the first and only solution with the ability to scan directly into
Red Hat Enterprise Linux CoreOS in Red Hat OpenShift, so you can manage and
reduce risk at both the host OS and container levels. Built on the Qualys Cloud
Platform, Qualys’ solution seamlessly integrates with customers’ vulnerability
management workflows, reporting and metrics to help reduce risk.
7
Agent Application Support
§ Vulnerability Management (VM)
• Continuous Monitoring (CM)
• Threat Protection (TP)
Qualys Cloud Agent supports the applications listed here from the Qualys Cloud
Platform:
Qualys File Integrity Monitoring, Endpoint Detection & Response, Extended Detection
and Response, Custom Assessment and Remediation and Patch Management are
agent exclusive applications i.e., they are not supported by other Qualys sensors.
8
Cloud Agent Deployment
In the previous slides, we saw that Cloud Agent supports multiple Windows, Linux
and other platforms.
9
Agents as Data Collectors
Functioning in the “data collector” role, agents collect everything needed by its
activated Qualys application modules.
Agents are designed to capture Operating System and application metadata, including
installed applications, registry keys, running processes, and system configurations.
Apart from collecting data for asset inventory, vulnerability and compliance
assessment, the Agent also supports the ability to respond to security gaps on the
host. This is achieved by way of patching through Patch Management, malicious file
and process remediation through EndPoint Detection and Response and
misconfiguration remediation through Custom Assessment and Remediation.
By design, the processing of agent data begins only after it is successfully transferred
to the Qualys Platform. This helps to minimize the number of resources needed by
the agent.
10
Cloud Agent Benefits
§ Extends visibility to assets not easily scanned:
• Remote users working from home
• Assets behind network load balancers or filtering devices
• Ephemeral assets with erratic processing cycles
• Hosts that are not always powered on, or ephemeral instances that may not
be available during scheduled scan windows
• Hosts that live in IaaS Platforms such as AWS and Microsoft Azure
§ More frequent visibility of critical assets without increasing network traffic (via
delta uploads)
§ Works well with host assets that frequently change names or IP addresses (uses
Qualys Host ID tracking)
§ Agents do not rely on Authentication Records
10 Qualys, Inc. Corporate Presentation
Cloud Agent extends visibility to assets not easily scanned, including roaming devices
such as laptops, remote users working from home, ephemeral cloud instances that
are not always online, and assets behind network filtering devices or load balancers.
Once the agent successfully transfers initial data “snapshot” to the Qualys Platform,
all successive data transfers will focus exclusively on the things that have changed, i.e.
deltas. This can significantly reduce the amount of bandwidth typically consumed by
traditional scanner appliances, allowing you to monitor critical hosts more frequently.
Unlike the traditional scanner appliance, Agent uniquely tracks its findings using
Qualys Host ID or agent host UUID, which makes the process ideal for hosts that
frequently change names or IP addresses.
Cloud Agent is installed as a local service with SYSTEM-level privileges, so it does not
require authentication records to access local system data and artifacts.
11
Cloud Platform
IaaS Providers
Remote Users
Coffee Shop
Corporate Environment
11 Qualys, Inc. Corporate Presentation
12
Agent Platform Communication
13
Installation and Deployment
14
Large Cloud Agent Deployment
• Consider:
- # of agents deployed per location
- Amount of internet egress bandwidth
The best practice recommendation is to deploy initial Cloud Agents across a wider
“network geography” taking into account the number of agents in a specific location
and the amount of Internet egress bandwidth. You can easily deploy 50,000 agents at
once if they’re spread across multiple locations and have different Internet egress
links; however, the recommendation is to stagger the installation over a few hours or
days if they’re all located in the same data center or backhauled from multiple
locations that share a single Internet egress link.
If many are deployed at the same time, agents will back off from calling home
(communicating with the platform) if there are any interruptions in communication.
This helps prevent connection storms to the platform.
The agents will also randomize to prevent them from calling home all at once if they
are in the same location.
Installation of large groups of agents at one time should also have a Low-performance
profile assigned to them prior to installation such that the initial snapshot upload is
spread over a longer time period to smooth out bandwidth usage; after the initial
snapshot is uploaded, the agents can be changed to a Normal or High-performance
profile if required.
15
Pre-installation Checks
www.qualys.com/platform-identification/
Next, you want to verify you have connectivity between each target host and the
Qualys Cloud Platform. There are test URLs for each public platform. Add these URLs
to agent deployment packages (SCCM, BigFix, etc.) to test for successful connectivity,
before installing the Cloud Agent.
It is a good idea to update OS patches and root certificates (on target hosts) before
installing the Cloud Agent.
Starting with the Windows 1.6.0 agent version, the agent and installers are signed
with an Extended Validation (EV) code-signing certificate. This requires the OS to
validate the signed executables using certificates from the trusted root CA. You will
encounter errors in the agent log file if the appropriate root certificates are not
installed.
16
Agent Activation Key
1. Activation Keys contain the components to successfully deploy agents. You must
first create one or more Activation Keys, before installing an agent.
Log into the Qualys Cloud Agent application, and under Agent Management-
>Activation keys, generate a new activation key.
2. Give the key a title. Creating different keys for different types of hosts in your
network or different deployments is recommended.
3. It is also recommended to create a “static” tag so that any asset deployed with this
key, will receive this tag. This is a very important feature of implementation. More on
this is covered in later parts of the course. There is a philosophy around configuring
your tags and you should do some planning when tagging your agent hosts. Tagging
assets from here will allow you to assign performance to a given set of deployed
agents. You may want to differ performance on workstations vs servers, or prod vs
dev. Tags can also be used in reports.
For example, if you want to report against workstations that have the agent that have
been deployed out of San Francisco.
3. If I don’t select any of the checkboxes explicitly, the agent would do some basic
information gathering of the host. I’d get OS, hostname, and IP information
17
since CyberSecurity Asset Management or Global AssetView is selected by default
depending on which of these applications is included in your subscription. So, you
get automatic and free inventory of hosts where agents are deployed.
A license is charged per application you activate. You can deploy the agent to collect
data for Vulnerability Management, EndPoint Detection and Response, Extended
Detection and Response, Secure Config Assessment, Policy Compliance, Patch
Management or File integrity monitoring.
17
Activation Key Limits
§ Create keys that are unlimited or choose the option to set limits
§ If both limits are selected, the key will expire when the first limit is reached
By default, the activation key usage is unlimited and can be deployed for as many
host systems as your subscription allows.
1. The first option for setting limits is by configuring maximum number of agents, like
if you want to provision the same key for a specific business unit or location.
2. You can also limit by date, which is used in a case where you want to trial the
agent, or you want it to be temporary.
If both settings are configured, the key will expire when the first limit is reached.
18
Lab Tutorial 1
5 min.
19
Install Agents
This is the next wizard after clicking on “generate key” presenting installation
instructions and artefacts for an Activation Key. You can get the same wizard by
selecting an activation key, opening its “Quick Actions” menu and selecting “Install
Agent”.
Click “Install Instructions” for any OS, to view agent installation instructions
and download its agent installation components.
20
Installation Components
1. Agent installation
command
§ When using third-party applications to build custom deployment packages, these two
components should be included
Before we install the agent via the command line, we’ll first need to copy this
command and also download the executable, which will need to be on the machine
where we issue the command.
21
Lab Tutorial 2
5 min.
22
MSI Extract
Traditionally, the Cloud Agent has relied on .exe for installation on Windows hosts.
However, as an admin, you can preconfigure an MSI file to make easy deployment
within an organisation. Starting with Cloud Agent version 4.5 and above, Qualys
supports MSI Install.
From the high-level user's perspective, the new setup is an exe containing the setup
components to install Qualys agent on the target machine. The exe contains two MSIs
– one for 32-bit machines, and another one for 64-bit machines. The exe would
extract the correct MSI and invoke the MSI engine to begin the installation process.
The exe can also be instructed to only extract the MSI/MSI(s).
23
MSI Extract
To extract MSI from the downloaded exe file, run the following command:
QualysCloudAgent.exe ExtractMSI=<value>
Any agent version above 4.5 will support MSI
For example, if you want to install cloud agent on a 32-bit machine, you need
to extract MSI package with value for ExtractMSI=32
32: Extracts 32-bit MSI Installer
To extract MSI from the downloaded exe file, run the following command:
QualysCloudAgent.exe ExtractMSI=<value>
24
Agent Deployment Options
• In this course, you will manually install an agent from the command line.
25
Lab Tutorial 3
5 min.
26
Verify Agent Installation
Qualys Cloud Agent Process
ps –e | grep qualys
Following a successful agent installation, the Qualys Cloud Agent process will appear
in Windows Task Manager. View a list of running processes on a Unix or Linux host to
view the Cloud Agent process.
27
Verify Agent Installation
Qualys Host ID
• Provisioning tasks typically have not completed if Qualys Host ID is not present
• EXCEPTION: “Gold Images” and hosts configured for Agentless Tracking may already have a
Qualys Host ID
26 Qualys, Inc. Corporate Presentation
The presence of a Qualys Host ID is a good indicator that the agent has successfully
contacted the Qualys Cloud Platform. On Windows hosts, the Host ID can be found
under the Qualys registry key. On a Unix or Linux host the Host ID is stored in a plain
text file (/etc/qualys/hostid).
If an agent host has not acquired its Host ID, provisioning may still be in progress, or
the agent was unsuccessful in contacting the Qualys Cloud Platform.
NOTE: Virtual hosts (created from a gold or master) image may potentially already
have a Qualys Host ID. We’ll examine a couple of solutions to this challenge, in the
“Provisioning” discussion, later.
If the “Agentless Tracking” feature is enabled in Qualys VM, VMDR, or PC, a host may
have already received Its Qualys Host ID, before an agent is installed. In this case, the
agent will simply use the Qualys Host ID provisioned by the Agentless Tracking
feature. For more information on the “Agentless Tracking” feature, please see the
Qualys “Scanning Strategies & Best Practices” and “Reporting Strategies & Best
Practices” training courses.
28
Verify Agent Installation
Cloud Agent Log File
§ Windows: \ProgramData\Qualys\QualysAgent\Log.txt
§ Unix: /var/log/qualys/qualys-cloud-agent.log
CA log file contains a list of cloud agent activity. Searching this file will reveal agent
connection attempts that are successful (return code 2xx) and unsuccessful (return
code 4xx, 5xx). It is best to search the end of the CA log file for the most recent
connections attempts.
On a Linux host search for the character string “Http request.” On a Windows host
search for the character string “Http status.”
Members of the Qualys Technical Support team will typically request a copy of your
agent log file, when working on agent support calls:
• Unix/Linux: var/log/qualys/qualys-cloud-agent.log
• Windows: \ProgramData\Qualys\QualysAgent\Log.txt
See Lab Appendix D, to learn about the information that is useful when working with
the Qualys Technical Support Team.
29
Regarding some other files present in the same path:
• A manifest is what the cloud agent is supposed to collect from the host system.
Consider it the recipe it follows for data collection. Different manifests exist for
different Qualys applications you’ve activated. There is a folder for self-patching.
The agent will update itself automatically unless configured not to. Config files
relate to how and when the agent should act and when it shouldn’t generate
network activity.
• The agent also maintains a snapshot locally to mirror the snapshot stored in the
platform.
29
Proxy Configuration
Qualys Cloud agent supports the use of a Proxy for agent communication.
See “Proxy Configuration” in the lab tutorial supplement for this course for more
proxy configuration details.
30
Agents and Proxies
Then, proxy server (QGS or otherwise) will connect with Qualys Cloud Platform on
behalf of agent hosts.
QGS also provides a cache for patch downloads and other agent artifacts including
manifests and agent binaries.
• By default, Windows agents use the same proxy configuration as their host OS and
Linux agents operate in non-proxy mode.
Note: If proxy connection fails then agent will attempt a direct connection outbound
31
(Fail Open).
31
32 Qualys, Inc. Corporate Presentation
29 Qualys, Inc. Corporate Presentation
Without any proxy server, all agent hosts will contact the vendor CDN individually to
download the respective patches, consuming high amounts of network bandwidth.
However, with QGS configured as a proxy server, QGS will download and cache all
these patches locally and agent assets can download them from here as per patch
deployment job schedules. This saves network bandwidth consumption.
For ex. What if multiple agent hosts are to download the same patch? They can now
get the same from QGS’ cache locally rather than individually probing vendor CDNs.
32
TLS 1.2 Required
TLS 1.2 is a host requirement, for communicating with the Qualys Cloud Platform.
Any agent host that does not meet this requirement (e.g., Windows XP and Windows
Server 2003) will need to communicate with the Qualys Platform through a proxy
server that supports TLS 1.2. Qualys Gateway Server meets this requirement.
33
Proxy Configuration for Windows agents
§ By default, agent proxy settings are not configured to talk through a proxy
§ The agent attempts to detect a Windows Proxy Auto-Discovery (WPAD) auto-proxy
§ Proxy settings are stored under the Qualys registry key (HKLM\SOFTWARE\Qualys\Proxy)
§ The Qualys Proxy utility (QualysProxy.exe) will automatically create this key, if not already present
§ Use third-party software management and distribution tools or the Windows Remote
Registry service to set the proxy configuration for agents, during or after agent installation
31 Qualys, Inc. Corporate Presentation
By default, agent proxy settings on Windows clients are not configured to talk
through a proxy, and the agent attempts to detect a Windows Proxy Auto Discovery
(WPAD) auto-proxy.
Windows agent proxy configuration can be accomplished by creating and editing the
Qualys Proxy registry key (HKLM\SOFTWARE\Qualys\Proxy). The Qualys Proxy utility
(QualysProxy.exe) will automatically create this key, if it is not already present.
Steps to use QualysProxy.exe:
From an elevated command prompt, execute QualysProxy.exe to:
• Configure Proxy Server(s) and port(s)
• Configure proxy username and password if authentication is required
• Configure Proxy Auto-Configuration (PAC) file URLs (when WPAD is not available)
• Enable/disable WPAD for agent hosts
Any application that can access the Remote Registry Service (including Group Policy
Management Console, Group Policy, WMI, etc.) can create or modify agent proxy
configuration settings.
Use third-party software management and distribution tools or the Windows Remote
Registry service to set the proxy configuration for agents, during or after agent
34
installation.
34
Proxy Configuration for Linux agents
2. /etc/default/qualys-cloud-agent (.deb)
By default, Linux agents operate in non-proxy mode. Agents can be configured for
proxy communications using the ’qualys-cloud-agent’ proxy configuration file:
• /etc/sysconfig/qualys-cloud-agent (.rpm)
• /etc/default/qualys-cloud-agent (.deb)
If this file does not already exist, you must create it. Both .rpm and .deb
environments support proxy configuration in the /etc/environment file.
If the proxy is specified with the https_proxy environment variable, it will be used for
all commands performed by the Cloud Agent. If the proxy is specified with the
qualys_https_proxy environment variable, it will only be used by the Cloud Agent to
communicate with our cloud platform.
35
The URL to the PAC file must be set in http_proxy or https_proxy in the following
format: https_proxy=pac+http://url.to/proxy.pac in the same file.
35
Post Deployment
In this section, we’ll review the info seen after deploying the agents:
1. Identify the agent asset details provided by the Cloud Agent application and other
Qualys applications.
2. Learn to use the Qualys Query Language (QQL) and Query Tokens, to search for
agent assets.
Further, we will explore the new Windows Self-protection feature for Windows cloud
agents.
36
Agents Tab
Once the agents are successfully deployed, i.e. installed and communicating with the
Qualys Cloud platform, you will see respective agent hosts under the ”Agents” tab in
the CA application. Use the “Quick Actions” menu for any agent host listed here, to
view specific asset details.
The Asset Summary displays host OS details, geolocation information, names and
addresses, activity updates, and Asset Tags.
There is also a Cloud Agent tag which automatically gets associated with any asset
where cloud agent is deployed. This is important to know when reporting, scanning
and using CSAM or GlobalAsset view. You can use this tag to include or exclude cloud
agent hosts in your scans, reports and queries.
The very next lab tutorial provides a quick tour of the various asset detail
components.
37
Lab Tutorial 4
5 min.
1. View asset details for host with all agent modules activated
2. Display all ”View Mode” options including GCP Instance Information
3. Use lastCheckedIn query token find agent host that have not checked-in for seven
days
4. Download the result set into a spreadsheet (.csv) file
38
Search for Assets
§ All agent hosts are labeled with the “Cloud Agent” Asset Tag
One of the more useful queries (when searching for agent hosts) uses the
“lastcheckedIn” query token, which can help you with identifying agents that are
failing to communicate with the Qualys Platform. For example, if someone manually
uninstalls an agent from its host (without using the Qualys UI or API), a stale host
record will remain in your account, until you remove it. Use the “lastCheckedIn”
token to help you find stale agent hosts, using a timeframe of your choice.
All agent host assets are labelled with the “Cloud Agent” tag. Using the “tags.name”
token (with a value of “Cloud Agent”) will help you to find agent host assets from the
search field of any Qualys application.
39
How To Search
Information and examples for using Qualys Query Language (QQL) to build effective
queries can be found by clicking the “Help” icon, inside the “Search” field.
40
Windows Self Protection Feature
In this topic, we’ll explore the Self-Protection feature for Windows cloud agents
which helps prevent tampering of cloud-agent binaries and processes by
unauthorised users and processes.
41
Windows Cloud Agent Self-Protection (SPF)
• Prevents tampering of Qualys Cloud Agent binaries and processes on Windows systems
o Prevents user-defined scripts, that is the scripts uploaded by Custom Assessment, Remediation, and Patch
Management, from making changes to the protected areas
• On-demand scan configuration in registry and proxy configuration are not impacted by SPF
The Cloud Agent Self-protection feature helps prevent non-trusted processes from
making unwanted changes to the file directories and registry entries used by the
Qualys Cloud Agent.
It also prevents:
• Uninstallation of Cloud Agent, Termination of Cloud Agent processes, Tampering
with Cloud Agent driver, Tampering with Cloud Agent registry keys and Prevents
the debugger from attaching to the Qualys agent service. Lastly, It prevents user-
defined scripts, i.e. the scripts uploaded by Qualys Custom Assessment and
Remediation, and Patch Management, from making changes to the protected
areas.
To get this feature enabled in your account, please contact your Qualys TAM or
engage Qualys support.
42
Lab Tutorial 5
5 min.
43
Lifecycle and Configuration
44
Cloud Agent Lifecycle Events
3. Manifest Download
4. Agent-Platform Synchronization
5. Activate/Deactivate Application Module
6. Agent Uninstall (if necessary)
• Agent provisioning was demonstrated in the first part of this course. It involves
validation of legitimate agents on the Qualys cloud platform. This stage also
involves agent clone detection and re-provisioning.
• Next, an agent will download its manifest for applications, that are activated for
agent data collection. The manifest tells the agent the metadata to collect for a
particular application such as VM, PC, EDR, etc. from the host. Data collection will
begin now.
• Once an agent has successfully transferred its first data “snapshot” to the Qualys
Platform, it will regularly perform synchronization checks, to ensure data on both
sides is accurate and consistent.
45
of agents.
45
Cloud Agent Activity
As agents complete various lifecycle events, different status flags are displayed in the
host’s “Last Activity” column.
In this slide, you can see a comprehensive list of status flags for an agent host.
You can also find them by navigating to the online help page from the Agents tab:
Under the “agent status” quick link.
OR
Refer to the agent log file.
You can see the various agent status flags based on agent activity from the time the
agent is provisioned to the time data collection and scanning are complete.
The last time an agent checked in is displayed in the host’s “Last Checked In” column.
46
Agent Provisioning and Re-provisioning
This section covers the 1st step of the agent lifecycle: Agent Provisioning and Re-
provisioning.
47
Provisioning
§ EXCEPTION: “Gold Images” and hosts configured for Agentless Tracking may already
have a Qualys Host ID
After the agent is deployed, it calls home to the platform with its customer id and
activation key that were provided during installation.
The platform then identifies the agent as legitimate based on the customer ID and
activation key validation. All communication is initiated outbound from the agent to
the platform using REST over https.
For Linux/Unix hosts, upon successful validation, the agent generates a host ID or
universally unique ID for the asset. For Windows agents, the host id is provisioned
directly without verification. The Host ID is used to uniquely track or identify the
asset without relying on its hostname, IP address, or anything else that can change.
If you’ve been scanning the host with a scanner appliance, and have activated the
Agentless Tracking Identifier, and if the Host ID already exists, the agent will use that
existing ID and merge your agent data and scan results to provide a single unified
view of the asset. For more information on the “Agentless Tracking Identifier”
feature, please see the Qualys “Scanning Strategies & Best Practices” and “Reporting
Strategies & Best Practices” training courses.
After being provisioned, the agent does not perform any subsequent provisioning
actions except in the case of duplicate host IDs. Agents that cannot communicate to
the platform for provisioning will keep retrying with an exponentially increasing delay.
48
After provisioning, the agent downloads its assigned configuration profile and
executes based on the defined parameters in the profile, including performance
parameters and network blackout windows. So, you want to be sure your
configuration profile is built and assigned appropriately before installation.
48
Clone Detection
The next step is for the platform to verify that the Host ID is unique. This feature is
always enabled and not exposed as a configurable setting.
The most common case where duplicate host IDs are created is when an agent is
provisioned in a gold image that is used to create clones, including cloud instances,
virtual environments, or physical environments. In this case, cloned agents will have
the same host ID as the agent in the gold image thus creating duplicate host IDs in
the platform when the cloned agents connect. To remedy this, the platform will find
the duplicate ID and issue a re-provision command so the agent will regenerate a new
unique host ID.
49
Cloud Agent Preparation for Cloning / Gold Image
Cloud Agent configuration steps and deployment best practices are available in the
agent OS Installation Guides available on qualys.com/documentation:
While Qualys has coded the agent to deduplicate host IDs, the best practice involves
building a gold image without provisioning the Qualys Host ID to avoid agent re-
provisioning later. For example, when building a master image, avoid renegotiation by
deploying agent on a host that is disconnected from the network.
Please note that the Gold image will not consume an agent license.
50
Configuration Profile Download
This section covers the 2nd step of the agent lifecycle: Configuration Profile
Download
Here, we will also discuss the various settings of the configuration profile.
Note: Before installing the agent, you’ll want to create the configuration profile.
When the agent first gets installed and calls home, it will ask for it’s configuration
profile before it does much else.
So, this profile marries the performance configured for the assigned hosts.
51
CA Configuration Profile
Agents can only use one Configuration Profile at-a-time but may change from one
profile to another
Agents can only use one Configuration Profile at-a-time but may change from one
profile to another.
• Blackout Windows
• Agent Performance
• Assigned Hosts
52
Lab Tutorial 6
15 min.
53
Configuration Profile Precedence
§ The “Default” profile will be used for any agent host not assigned to a Configuration Profile
§ If an agent host is assigned to more than one profile, the profile closest to the top of the list will
take precedence (top-down)
46 Qualys, Inc. Corporate Presentation
You can create multiple Configuration Profiles for your needs. This allows you the
flexibility to adjust agent performance for different system and network conditions.
However, since Each Cloud Agent host can have only 1 profile assigned, there is a
precedence that occurs. If an agent is assigned to more than one profile; the highest
priority profile will be assigned to the host, i.e. The matching profile closest to the top
of your configuration profile list is assigned to the agent.
Always keep generic configuration profiles at the bottom and more specific profiles at
the top of the list.
Notice that configuration profiles can be reordered to establish the appropriate order
of precedence.
Note: A Default profile also exists for hosts that do not have one assigned explicitly.
54
Configuration Profile: General Info
This topic covers the various settings in the configuration profile starting with the
General Settings.
The General Information settings establish things like the profile name and
description, along with some default data collection and update options.
55
Default Profile
§ Only one profile can be designated as the default profile for your
subscription. If an agent host does not meet the host assignment criteria
for any other configuration profile, the default will be used
Only one profile can be designated as the default profile for your subscription. If an
agent host does not meet the host assignment criteria for any other configuration
profile, the default will be used.
56
Suspend Data Collection
§ Although not commonly used, selecting this option will stop agents from
performing VM, PC, SCA, and Inventory scans
§ Agents will continue to get manifest updates, configuration updates, and
even agent version updates
The option to suspend data collection from agents will effectively stop the agent from
performing VM, PC, SCA and Inventory scans. Although scanning has stopped, agents
will continue to receive manifest updates, configuration updates and agent version
updates.
57
In-Memory SQLite Databases
Windows agents with SQLite In-Memory Databases enabled, consume slightly higher
memory while using slightly less CPU and disk space resources.
58
Agent version Upgrades
§ By default, Cloud Agents will automatically upgrade to the latest version
§ ~80% of all agents have the auto-upgrade option enabled
§ To certify and upgrade agents via a third-party software manager, click the ”Prevent auto
updating of the agent binaries” check box
By default, agents will automatically upgrade to the latest agent version. This setting
is configurable.
For organizations that wish to use third-party software distribution tools to upgrade
deployment agent versions instead of the Qualys platform, this feature can be used to
prevent upgrades entirely.
It is recommended that you update your agents within three months of release of a
newer agent version. This will ensure the agent is properly covering all vulnerabilities
for vulnerability management and controls for policy compliance.
59
End-of-Service Cloud Agent Versions
§ Cloud Agent versions that are no longer supported:
ACTION REQUIRED: Upgrade your cloud agents to the latest version and take
advantage of new agent features.
Some older versions of Cloud Agent have reached end-of-support and should be
upgraded to the latest version to take full advantage of new features and benefits.
Please consult the Cloud Agent Platform Support Availability matrix for more
information on end-of-service agents.
60
Find Agents No Longer Supported
Search for QID 105961, using the vulnerability qid token, to detect End of
Service Cloud Agent versions in the Cloud Agent and VMDR applications.
You can also use the “agentVersion” token for this purpose which is supported in
Cloud Agent, Global AssetView or CSAM and VMDR applications.
The “software name” and “software lifecycle stage tokens are supported in the CSAM
application.
Lastly, you can use the “Agent Version Distribution” widgets in the Cloud Agent
Dashboard.
61
Cloud Agent Dashboard
Click on any version number in the bar chart to display its agent hosts and you have
the option to download that list as well.
62
Best Practices for Agent Binary Upgrade
Although not all hosts are candidates for the agent auto-upgrade feature, Qualys
recommends using this option wherever possible to take advantage of the latest
agent features.
When using third-party software distribution tools such as SCCM, BigFix, Chef and
others to upgrade agents, Qualys recommends performing agent upgrades quarterly.
At a minimum, upgrade all EOS agents and continue to keep agents upgraded on an
as-needed basis.
63
Third-Party Tool Tips
64
Configuration Profile: Blackout Windows
This topic covers the next setting in the configuration profile: Blackout Windows.
65
Blackout Windows
§ Prevent communication
between agents and the
Qualys Platform at
specified times of the
week
§ This is useful if you want
your agents to stop
communicating during
expected times of heavy
or increased network
traffic
You can add blackout windows to stop communication between the agent and the
Qualys Cloud platform, at specified times each day of the week. This can be
especially useful when coordinating the communication flows for different groups of
agents, or simply use this option to stop agent communications during expected
times of peak network traffic.
66
Configuration Profile: Performance
This topic covers the agent configuration settings that have a significant impact on
agent CPU and network performance.
67
Performance
To control the amount of system or network resources used by each agent, you can
use the preset performance settings of (LOW, NORMAL, or HIGH). Or use the
"Customize" option for more granular control.
68
Status Interval
‘Agent status interval’ acts as a heartbeat for the agent to communicate with the
platform.
All communication between an agent and the Qualys Platform must be initiated by
the agent.
The agent must call home regularly to verify any new and relevant updates. The agent
calls home on a configurable interval, between 15 - 45 minutes, to request any new
content or actions to perform. If you are in a steady state production environment,
there are rarely new updates at each status check, so the request and reply is usually
under 1KB in size.
69
Performance - Agent Bandwidth Usage
The "Delta Upload Interval" setting and the "Chunk sizes for file fragment uploads"
setting, both work together.
When an agent is ready to transmit a “snapshot” to the Qualys Cloud Platform, the
“Chunk sizes for file fragment uploads” setting will determine whether the
“snapshot” file will be broken-up into smaller fragments or chunks.
If more than one “chunk” is to be sent to the Qualys Cloud Platform, the “Delta
Upload Interval” setting determines the amount of time between individual “chunk”
transmissions.
Data collections are compared to latest snapshot and only changes (deltas) are
uploaded to the Qualys Platform.
Cloud Agent network performance is impacted by agent status interval, delta upload
interval, and chunk sizes for file fragment uploads.
The agent status interval or agent heartbeat will determine how often an agent
"checks-in" to collect new manifests, configuration profiles, and perform other agent
management tasks.
70
The delta upload interval combined with the Chunk sizes for file fragment uploads
setting, will have the greatest impact on network performance.
Agents that operate in a network environment with limited capacity will typically
benefit from using smaller chunk or fragment sizes.
Larger chunk or fragment sizes typically work best in network environments with
greater resources and bandwidth.
Increasing the delta upload interval, will force longer delays between data uploads,
reducing impact on the agent's network environment.
Lower delta upload interval settings work best in network environments with greater
capacity.
70
Bandwidth Considerations For Large Deployments
§ Bandwidth usage is typically greatest at agent deployment (e.g., initial
data transfer does not have same efficiency as delta transfers)
§ Consider creating a special “Deployment” Configuration Profile that
uses LOW bandwidth performance settings and/or Blackout Windows
§ If agent deployment covers a wide geographic area, identify the number
of deployment locations and the total number of agents per location
§ Stagger agent deployments if many hosts are in the same location.
§ Leverage the Qualys Gateway Service (QGS) for:
• Consolidate agent communications and data transfers
• Cache agent downloads and manifests
Bandwidth usage is typically greatest at agent deployment (e.g., initial data transfer
does not have same efficiency as delta transfers). When deploying agents in an
enterprise (large) environment, consider spacing out your deployment over time and
wide geographic areas. Consider creating a special “Deployment” Configuration
Profile that uses LOW bandwidth performance settings and/or Blackout Windows.
Qualys Gateway Server provides proxy services for cloud agents. It an be used for
assets that don’t have direct internet access or when you want to optimize
bandwidth.
71
Performance – CPU Limit & Throttle
While the agent “Data Collection Interval” setting determines how often or frequently
an agent collects assessment and inventory data, the CPU Performance settings
determine how quickly or slowly the agent goes about the task of data collection.
For Windows, faster data collections speeds are associated with higher “CPU Limit”
percentages and slower data collection speeds are associated with lower “CPU Limit”
settings.
For Unix/Linux, faster data collection speeds are associated with lower “CPU
Throttle” values and slower data collection speeds are associated with higher “CPU
Throttle” values.
72
CPU Throttle & Limit Comparison
CPU
CPU Limit
Throttle Notes
(Windows)
(Linux/Mac)
Notice that the windows CPU Limit column is included in this table to help illustrate
the inverse relationship between the CPU Throttle setting, and agent performance.
The middle (blue) rows in this table represent the agent performance sweet spot.
This is a good place to start and attempts to balance agent performance with CPU
usage. Adjustments should then be made higher or lower, according to available
resources and performance needs.
73
Recommended settings
Windows CPU Limit and Linux/Mac CPU Throttle
WINDOWS
5% 20% 80%
CPU Limit
LINUX/MAC
800 ms 100 ms 0 ms
CPU Throttle
To help you choose the correct CPU performance settings for your agents, Qualys
provides these recommendations:
For LOW performance agents, those that reside on host assets with limited CPU
resources:
Qualys recommends a 5% CPU Limit for Windows and 800 milliseconds for the Linux
or Mac CPU Throttle.
The NORMAL setting provides the best balance between CPU usage and agent
performance.
Here, Qualys recommends a 20% Windows CPU Limit and a 100 millisecond Linux or
Mac CPU Throttle.
And finally for host assets with extended resources and the best possible agent
performance:
Qualys recommends an 80% or greater Windows CPU Limit and a Linux or Mac CPU
Throttle of 0 milliseconds.
74
Recommended settings
Agent Status Interval, Delta upload Interval, and File Fragment Chunk Sizes
Agent Status
1800 sec. 900 sec. 600 sec.
Interval
Delta Upload
10 sec. 5 sec. 1 sec.
Interval
To help you choose the right network performance settings for your agents, Qualys
provides these recommendations:
To limit or reduce an agent's impact on it’s network, use the low settings:
1800 seconds for Agent Status Interval
10 seconds for Delta Upload Interval
and chunk sizes of 1024K
For maximum agent performance, on networks with adequate capacity, use the high
settings;
600 seconds for Agent Status Interval
a 1 second delta upload interval
and chunk sizes of 4096K
For network environments that fall somewhere in-between the high-end and the low-
end, use the normal settings:
a 900 second agent status interval
5 second delta upload interval
and chunk sizes of 2048K
75
Performance – Upgrade Reattempt Interval
Logging level for agent
The "Upgrade Reattempt Interval" specifies the amount of time an agent will wait
before re-attempting an agent version update.
Logging level for agent determines the amount and detail of log messages generated
by the agent. Value can be Verbose, Info (i.e. informational), Warn (i.e. Warning),
Error or None. Recommended: Verbose for all performance levels.
When practical, Qualys recommends using the "Verbose" agent logging level.
Priority Status Upload Interval is the interval between the completion of the Priority
Status Upload and the start of the next Priority Status Upload. Specify a value
between 30 and 300 seconds. Default is 60 seconds.
76
VM Scan Mode
By default, the Qualys Cloud Agent for Linux runs a VM scan with the same privileges
configured by the Qualys user to run the agent.
VM Scan Mode now allows the Cloud Agent for Linux hosts to run VM scans with
different levels of privileges.
You can define the VM scan mode in the configuration profile, under the Performance
section, under Unix Specific Parameters.
By default, the Customize toggle button is turned off. To enable the VM Scan Mode,
you need to enable the Customize toggle button.
Once the Customize toggle button is turned on, the Agent User option is selected in
the VM Scan Mode drop-down menu.
77
VM Scan Modes
• Agent configured user permissions: Runs VM scan with the same privileges
configured by the user to run Qualys Agent
• Safe mode: Runs VM scan only with lower privileges and would not run any
commands/binary with elevated privileges
• Dynamic privilege elevation: By default, Qualys Agent runs
the VM scan lower privileges. However, the Cloud Agent will dynamically
elevate the privileges to root access only for those commands that failed due
to permissions with lower privileges
Note: For the Safe mode and Dynamic Privilege elevation, the Cloud Agent must be
configured with the non-root user which is part of the Sudo group.
78
Agent User Modes through API
• You can Configure VM Scan Modes using Cloud Agent API as well:
• The VM scan modes can be set using the vmScanMode parameter in create and update
configuration profile APIs
Please consult the Qualys Cloud Agent API guide for more information on setting the
Agent User mode through the API.
79
Configuration Profile: Assign Hosts
This topic covers the "host assignment" option in the configuration profile which
helps to ensure the agents you deploy are assigned to the correct configuration
profile.
80
Assign Hosts
If a deployed agent does not meet the host assignment criteria for any of your
configuration profiles, the "default" configuration profile will be used.
81
Activation Key Tag Strategy
• BEST PRACTICE:
Assign “static”
tags to agent
Activation Keys
and use them to
ensure agent
hosts receive
their
appropriate
performance
settings,
patching
licenses, and
patch job
assignments
70 Qualys, Inc. Corporate Presentation
BEST PRACTICE: Use this strategy to assign agent host assets to their appropriate
profiles, licenses, and jobs (at the time of agent deployment):
Assign a “static” tag to each agent Activation Key to easily locate the agent hosts it
deploys. You can then use the same “static” tag to assign these hosts to their
Configuration Profile.
82
Configuration Profile: Agent Scan Merge
This topic covers the ”Agent Scan Merge" option in the configuration profile.
83
Remote Only QIDs
§ A Qualys Scanner’s
“remote” perspective is
required to detect “Remote
Only” QIDs
§ Perform supplemental scans
for agent hosts that are
impacted by “Remote Only”
QIDs
§ These hosts will have both
SCAN data and AGENT data
84
Qualys Scanner Appliances produce SCAN data. Qualys Agents produce AGENT
data. When a Qualys Scanner is used to scan a host that already has a Qualys
Agent installed, both SCAN data and AGENT data records are collected and
stored.
SCAN data and AGENT data can be successfully merged, when both types of
records contain a common field or attribute. The Agent Correlation Identifier
provides this common attribute.
Once Agent Scan Merge is enabled, the ‘agentid-service’ can be viewed from
Windows Task Manager or within a Unix/Linux process list. Use the netstat
command to view its assigned port number(s).
85
85
Once the Agent Correlation Identifier is accepted, within the “Asset Tracking
and Data Merging Setup” options (in Qualys VM or VMDR), Qualys Scanners will
attempt to read the Agent Correlation Identifier from agent hosts.
AGENT data and SCAN data can be successfully merged using the Agent
Correlation Identifier attribute.
86
86
Configuration Profile: Agent Data Collection
This topic covers the Data Collection Intervals setting in the configuration profile for
VM, PC and SCA.
87
Interval vs. Event-Driven Data Collection
The remaining options, allow you to customize the data collection methods used by
agent hosts. Some Qualys applications collect data at user-defined intervals and
other applications capture events as they occur on the host.
Focusing on data collection allows the agent to remain relatively lightweight, while
sending the collected data to the Qualys platform for assessment and enrichment.
VM, PC, and SCA provide user-defined intervals for data collection, while FIM and EDR
use event-driven techniques. Although Patch Management (PM) provides user-
defined intervals for its patch assessment scans, this setting must be configured
within the PM application.
88
Scan Intervals
• Data Collection Interval setting specifies the frequency of VM, PC and other scans
• At each interval agents perform assigned tasks and collect host metadata (as
specified in the application manifest(s)
• To complete each interval, collected data is transferred to the Qualys Platform for
processing
• NOTE: The countdown to the very next interval will begin as soon as the data
transfer and post-processing steps have been completed
The Cloud Agent operates together with the Qualys platform to optimize the
discovery, classification, and reporting for asset inventory, vulnerability management,
policy compliance, file integrity monitoring and Endpoint Detection and Response.
The agent uses a lightweight data collection mechanism to simply capture metadata
about the operating system and installed applications and sends this data to the
platform for analysis and reporting. In this way, the agent does not perform any
analysis on the system but is simply a conduit to capture the relevant information in
an optimized lightweight manner for the platform to process. So, the actual
vulnerability, compliance and other evaluations happen in the cloud.
The agent executes a data collection, called a “snapshot”, the first time after
installation for collecting Asset Inventory data. It will also do so for each activated
module. This happens every 4 hours by default for Vulnerability Management and
Policy Compliance.
Again, agents know what data to collect from the manifests they receive from the
Qualys platform. The agent stores the results from the data collection locally on the
system. If let’s say the Policy Compliance module is activated after the initial agent
installation, the agent will perform the initial snapshot when that module is activated.
Subsequent data collections performed by the agent are compared to a local copy of
89
the previous collections and only changed information, called “deltas”, are uploaded
from the agent to the platform, i.e. The agent does not re-transmit data that hasn’t
changed on the asset.
NOTE: The countdown to the very next interval will begin as soon as the data transfer
and post-processing steps have been completed. The countdown to the next interval
begins at the END of the previous interval (i.e., it does NOT begin at the START of the
previous interval).
89
On-demand Scan
This topic covers the on-demand scan feature which provides the flexibility to initiate
a scan without waiting for the next scheduled scan.
90
On-Demand Scan
• USE-CASE: You are using a third-party patching tool and you want to
validate successful vulnerability patches, immediately
For example, if you’re using a third-party patching tool and you want to validate
successful vulnerability patching immediately, you can use the on-demand scan
feature to do such a validation without having to wait for the scheduled scan.
Scan on Demand is a single use execution that is initiated manually on the host itself,
using locally or remotely executed scripts or GPO, or from software distribution tools
at the end of a patch deployment job.
Note that this type of scan will work if the agent is not already scanning.
91
On-Demand Scan
The target application module must be activated and its associated manifest must be
downloaded, prior to performing an “on-demand” scan.
The On Demand Scan runs independently of the interval scan that you configure in
the Configuration Profile and will reset the scan interval on the local agent after a
successful scan.
92
Launch On-Demand Scan from Agent Host
§ On-demand scans for Windows are configured in the Windows Registry
§ On-demand scans for Linux are executed from the command line
First, let’s see how we can launch an on-demand scan from the host system:
You can also use the ‘ScanOnStartup’ registry key to initiate an on-demand scan
whenever the host starts up. Simply, set this registry key value to 1 and the on-
demand scan will start every time the host starts or restarts.
On-demand scans for Linux are executed from the command line using the
cloudagentctl script.
The same command can be used on Mac Operating Systems as well.
Please see the lab tutorial supplement for this course for more examples and details
for running on-demand scans for Windows and Linux.
93
On-Demand Scan from Cloud Agent Module
The on-demand scan feature helps you with the flexibility to initiate a scan without
waiting for the next scheduled scan. You can now initiate the on-demand scan using
the Cloud Agent User Interface, in addition to the defined interval scans.
This can be launched for individual Agent hosts or for multiple hosts in bulk.
Currently, you can initiate 1000 on-demand scans concurrently for each subscription.
And you can send a maximum of 15000 on-demand scan requests per day.
94
Launch On-Demand Scan from Cloud Agent Module
• Following on-demand scans can
be initiated from the Cloud
Agent module:
o Inventory
o Vulnerability Scan
o Policy Compliance Scan
o UDC Scan
o SCA Scan
• Selected scan type must be
activated for the agent host
• Select the checkbox to use CPU
throttle limits from the
Configuration Profile assigned to
the agent host
80 Qualys, Inc. Corporate Presentation
Using this feature, you can initiate VM, PC, Inventory, UDC, and SCA scans. The
modules required for the selected scan type must be activated for the agent host.
By default, Cloud Agent for Windows uses a throttle value of 100, and Cloud Agent for
Linux uses a value of 0 (no throttling).
If you want to use the values in the configuration profile, select the Use CPU Throttle
limits set in the respective Configuration Profile for agents check box.
Note: This feature is supported only on Windows and Linux and will be available only
when the Windows and Linux agent binaries with on-demand scan support will be
available.
Supported agent versions are :
Windows Agent 5.0.1 or greater
Linux Agent 5.6 or greater
(Above Agent Versions are not GA yet)
Please consult the Cloud Agent Platform Support Matrix, Features by Agent Version
section for up-to-date information on supported agents.
95
Lab Tutorial 7
10 min.
1. Launch on-demand scan for a windows host by changing the registry key
2. Launch on-demand scan for another host from the Cloud agent UI
96
Scan Delay and Scan Randomization
This topic covers the use cases for the scan delay and scan randomization settings
that are a part of the VM/PC data collection interval.
97
Multiple Cloud Agent Network Challenges
• Whenever new Cloud Agents are deployed, all the agents trying to
communicate with the QCP at the same time can be taxing on the network
• New Manifests come out and the same need to be transferred at the same
time for all Cloud Agents deployed in a network
• Agents are also responsible for data collection which they are doing all at
the same time
• Post blackout windows, the agent assets would all start processing at the
same time
This slide outlines the impact of agent communication on network resources in the
absence of any way to stagger this communication.
98
CA communication without Scan Delay and Scan
Randomization(1/4)
Scan Interval 4 hours
Corporate Environment
1. As you can see here, all the agents are trying to communicate with the platform
at the same, time, this can be taxing on your network and your firewalls
2. Sample bandwidth utilization 2mb/agent * no of agents
3. Network Bandwidth Usage=Bandwidth utilization per agent *no of agents
99
Scan Delay and Scan Randomization(2/4)
• Scan Delay: The time added to the start of scanning, both for new installs and for
interval scanning. Value of 0 (zero) means no delay added.
Scan Delay and Scan Randomize values can be configured to make sure that agents
don’t collect and send data to the Qualys platform all at the same time during delta
uploads. It is a means to stagger agent communication with the Qualys platform, so
that impact on the network is reduced. This can also help avoid excessive disk I/O on
VDI assets when all of them share the same underlying infra or for preventing agent
hosts that are coming out of blackout windows from starting a scan and delta upload
all at the same time, and in other similar scenarios.
100
Scan Delay (3/4)
Scan Interval 4 hours
T= Scan Interval Scan Delay 20 mins
TCA = Time when agent sends data to QCP
Scan Randomization 0
TCA = T +20
Corporate Environment
T would be the time when agent is restarted, or agent host is restarted, instead of
downloading manifest immediately, there is delay.
101
Scan Randomization(4/4)
T= Scan Interval Scan Interval 4 hours
TCA = Time when agent sends data to QCP Scan Delay 20 mins
Scan Randomization 30 mins
TCA = T + 20 +12
Randomize= 12 min
TCA = T + 20
1. With scan delay and scan randomization, you can now control the effect that the
agents have on your network resources, and not send all their data, at the same
time.
2. Here the network bandwith will be /3
3. So if we put sample values of scan delay=20 mins and Randomize any value
between 1-30, this is a sample of how we will be able to stagger the
communication between the agents and the Platform. The delay interval is
applied to all the agents and the randomize value is a means to stagger
communication between 2 consecutive agents communicating with the platform.
4. Scan data is being sent, here also we need to set t, t will be scan interval . Time
when agent will send data toTCA= scan interval(T) +delay+randomize
102
Event-Driven Data Collection
Kernel drivers allow agents to collect event data for FIM, EDR and XDR, as the events
occur on the agent host. The “Payload Threshold Time” setting specifies the
frequency of event log transmissions to the Qualys Platform.
103
Data Collection Summary
On-Demand Scans
• Perform “on-demand” VM, PC, SCA, UDC, and inventory scans on Windows and Linux agent
hosts
Event-Driven Data Collection
• Events are captured and logged as they happen for FIM, EDR and XDR
• Logged events are transferred to the Qualys Platform at frequent intervals (i.e., Payload
Threshold Time
This slide provides a summary of the various agent data collection methods.
Agent data collection methods are dependent on the Qualys application module.
104
Manifest Download
This section covers the next agent lifecycle stage: Manifest Download.
105
Application Manifests
A manifest identifies the metadata an agent will collect from its host for a given
application. Qualys Application Modules have their own separate manifests.
When a new application module is activated for an agent host, the agent receives a
new manifest and data collection begins. Data collection also begins after an agent
receives an updated manifest.
106
Manifest Type Description Data Collection
Inventory Collects asset inventory such as hardware, Daily Intervals
software, active services, etc...
Vulnerability Collects data defined by QIDs in the Qualys User-Defined Intervals (240 -
Vulnerability KnowledgeBase. 43200 min.)
PolicyCompliance Collects System Defined Control (SDC) datapoints User-Defined Intervals (240 -
defined in the PC Control Library. 43200 min.)
UDC Collects User Defined Control (UDC) datapoints 4 hour intervals
defined in the PC Control Library.
SCA Collects compliance datapoints defined in CIS User-Defined Intervals (240 -
Policy Controls. 43200 min.)
AutoDiscovery Automatically discovers host middleware 1 hour interval
technologies.
MiddlewarePC Collects compliance datapoints for host 4+ hour intervals
middleware assessments.
FIM Collects events for targeted file and directory Event-Driven (Payload
changes and modifications. threshold time 30 - 1800 sec.)
EDR Collects events for targeted processes, process Event-Driven (Payload
mutex, registry keys, and suspect file locations. threshold time 30 - 1800 sec.)
This table provides a summary of manifest types along with their respective data
collection methods.
Inventory data is collected daily, Vulnerability and compliance data every 4 hours by
default, and FIM ,EDR data on an event-driven basis.
107
Agent – Platform Synchronization
This section covers the next agent lifecycle stage: Agent - Platform Synchronization.
108
Host Snapshot Synchronization
• Both Cloud Agent and the Qualys Cloud Platform maintain a copy of the
host snapshot
If the integrity check fails on either side, the agent will re-synchronize automatically,
i.e. Both the agent and the platform will delete existing snapshot data and start as if
it’s a newly provisioned agent.
Note that Digital signatures are used to validate communications between agent and
the platform.
109
Activate, Deactivate & Uninstall Agents
In this section, we will discuss how to activate, deactivate and uninstall agents for
different applications.
110
Activate Application Modules
OR
• Activate module(s) from agent host’s
“Quick Actions” menu (for agents that
have already been deployed)
Qualys application modules (selected within an agent Activation Key) are activated at
the time of agent deployment. Application modules can also be activated from the
“Quick Actions” Menu of any agent hosts.
111
Lab Tutorial 8
10 min.
If you didn’t activate your agents at the time of key creation, it can be done after
deployment. Remember, activation of the agent is required if you want it to collect
data for a particular application. This is what counts against the number of licenses
you purchased.
112
Deactivate Application Module
§ Deactivate individual
application modules
for agent host assets
You can also deactivate agents. You can do so in bulk by using the actions menu, or
you can do so individually by using the quick actions menu. When you deactivate an
agent, you are saying, “I no longer want my agent on this host to collect data for a
particular application, such as Vulnerability management, or policy Compliance.” This
will free up a license you purchased for that application.
You can also activate or deactivate for FIM, EDR, XDR and/or Patch Management.
113
Uninstall And Purge
Approaches:
1. Uninstall agents using the “Uninstall Agent” action in the
Qualys UI or using API
• Automatically purges VM and PC data
Agents can be manually uninstalled using either “Uninstall Agent” action in the Cloud
Agent user interface or through the Cloud Agent API. You can uninstall agents from
the Qualys user interface individually or in bulk.
This will trigger an uninstallation command for the agent to pick up on the next Status
Interval request, if the agent is still running and removes the agent license from any
assigned modules, thereby freeing up a license to be used for other systems. Any
asset inventory, vulnerability, or policy compliance data is purged from the platform.
Cloud agents must be uninstalled using this method to ensure appropriate data clean-
up measures are performed.
Agents uninstalled using the local OS uninstaller will remove the agent locally on that
system but will not free up that agent’s license nor purge the results as the platform
will not know that the agent was uninstalled. Any asset inventory, vulnerability, or
policy compliance data is retained in the platform, i.e. agent data will not be removed
during a local uninstallation. Administrators will need to uninstall the agent from the
Cloud Agent UI or API to free up the license and purge the data.
Agents can also be uninstalled and purged automatically using Purge Rules configured
under the Global AssetView or CyberSecurity Asset Management application. The
rules can be based on time-related and cloud-provider metadata. More on Purge
Rules will be covered later.
114
Bulk Agent Updates
The objective of this section is to understand the different options for updating
agents in bulk.
115
Actions Button
Select multiple agent hosts from the Cloud Agent UI and then use the “Actions”
button to perform updates in bulk.
116
Edit Activation Key
Adding and removing application modules can be performed for all existing agents
using their associated Activation Key. Simply select the “Apply Changes to all existing
agents” option. Future agent deployments will receive the updated module
configuration.
117
Cloud Agent API
Uninstall Agents
118
Agent Purge Rules
Qualys Global AssetView/CSAM
• lastActivity
• lastCheckedIn
• activatedForModule
• agentActivationKey
• agentVersion
• configurationProfile
You can configure purge rules for cloud agent assets (assets in public cloud using
cloud provider metadata or otherwise).
Please refer to the cloud agent video library for more details on how to configure
purging for agent hosts:
https://www.qualys.com/training/library/cloud-agent/
Note: This feature is not enabled by default. Please contact your Qualys TAM/Support
for further assistance.
119
Last Reminders
Certification Exam
• Multiple choice questions
• Answer 70% of the questions correctly to receive a passing score
• Please consult the Cloud Agent presentation slides and lab tutorial supplement to help you answer the
exam questions
Trial Account
https://www.qualys.com/free-trial/
You can enrol for the Cloud Agent Examination to get certified.
You can request a free Qualys limited trial account by submitting a request on this link
https://www.qualys.com/free-trial/
120
Thank You
121