Qualys Search list use cases

Mannu Aggarwal
1 min readNov 25, 2023

--

1. In validation vulnerability advisory:- For validating multiple CVEs at one time over any scan for getting vulnerable assets report.

2. In Scanning:- When you have to perform/requirement for doing scan against any vulnerability. In that, you can make a search list for specific vulnerabilities which will reduce the time to perform a scan.

3. In re-validation of vulnerability:- Here, you will do the action of scanning after the remediation phase. You can run the scan or get the report by creating a search list of vulnerabilities over specific assets.

4. Managing scanning time and network bandwidth:- By creating a search list, you can manage scan time or network bandwidth by narrowing down the vulnerability scope.

  • You can narrow it down by creating a search list of critical vulnerabilities.
  • By creating the list of vulnerabilities that you received in an advisory.
  • Create multiple search lists on your own specified filter for reducing the load in the network bandwidth.

5. Managing assets and resources:-

  • That will help you to keep asset resources available during scanning through the creation of multiple scans by multiple search lists.

TO BE CONTINUED

Let's meet in another story with new detection in cyber security.

--

--

Mannu Aggarwal
Mannu Aggarwal

Written by Mannu Aggarwal

I am managing vulnerabilities and assessment smartly I enjoy using my skills to contribute to the exciting technological advance. I am here to share my thoughts

No responses yet