Qualys Search list use cases
1. In validation vulnerability advisory:- For validating multiple CVEs at one time over any scan for getting vulnerable assets report.
2. In Scanning:- When you have to perform/requirement for doing scan against any vulnerability. In that, you can make a search list for specific vulnerabilities which will reduce the time to perform a scan.
3. In re-validation of vulnerability:- Here, you will do the action of scanning after the remediation phase. You can run the scan or get the report by creating a search list of vulnerabilities over specific assets.
4. Managing scanning time and network bandwidth:- By creating a search list, you can manage scan time or network bandwidth by narrowing down the vulnerability scope.
- You can narrow it down by creating a search list of critical vulnerabilities.
- By creating the list of vulnerabilities that you received in an advisory.
- Create multiple search lists on your own specified filter for reducing the load in the network bandwidth.
5. Managing assets and resources:-
- That will help you to keep asset resources available during scanning through the creation of multiple scans by multiple search lists.
TO BE CONTINUED
Let's meet in another story with new detection in cyber security.