Qualys Vulnerability R&D Lab has released new vulnerability checks in the Qualys Cloud Platform to protect organizations against 57 vulnerabilities that were fixed in 16 bulletins announced today by Microsoft. Customers can immediately audit their networks for these and other new vulnerabilities by accessing their Qualys subscription. Visit Qualys Security Blog to prioritize remediation.
Non-Qualys customers can audit their network for these and other vulnerabilities by signing up for a Qualys Free Trial, or by trying Qualys Community Edition.
Microsoft has released 16 security bulletins to fix newly discovered flaws in their software. Qualys has released the following checks for these new vulnerabilities:
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-055 Windows 10 Version 1511 for 32-bit Systems
MS16-055 Windows 10 Version 1511 for x64-based Systems
MS16-055 Windows 10 for 32-bit Systems
MS16-055 Windows 10 for x64-based Systems
MS16-055 Windows 7 for 32-bit Systems Service Pack 1(KB3156013)
MS16-055 Windows 7 for 32-bit Systems Service Pack 1(KB3156016)
MS16-055 Windows 7 for 32-bit Systems Service Pack 1(KB3156019)
MS16-055 Windows 7 for x64-based Systems Service Pack 1(KB3156013)
MS16-055 Windows 7 for x64-based Systems Service Pack 1(KB3156016)
MS16-055 Windows 7 for x64-based Systems Service Pack 1(KB3156019)
MS16-055 Windows 8.1 for 32-bit Systems(KB3156013)
MS16-055 Windows 8.1 for 32-bit Systems(KB3156016)
MS16-055 Windows 8.1 for 32-bit Systems(KB3156019)
MS16-055 Windows 8.1 for x64-based Systems(KB3156013)
MS16-055 Windows 8.1 for x64-based Systems(KB3156016)
MS16-055 Windows 8.1 for x64-based Systems(KB3156019)
MS16-055 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(KB3156013)
MS16-055 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(KB3156016)
MS16-055 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(KB3156019)
MS16-055 Windows Server 2008 R2 for x64-based Systems Service Pack 1(KB3156013)
MS16-055 Windows Server 2008 R2 for x64-based Systems Service Pack 1(KB3156016)
MS16-055 Windows Server 2008 R2 for x64-based Systems Service Pack 1(KB3156019)
MS16-055 Windows Server 2008 for Itanium-based Systems Service Pack 2(KB3156013)
MS16-055 Windows Server 2008 for Itanium-based Systems Service Pack 2(KB3156019)
MS16-055 Windows Server 2008 for x64-based Systems Service Pack 2(KB3156013)
MS16-055 Windows Server 2008 for x64-based Systems Service Pack 2(KB3156016)
MS16-055 Windows Server 2008 for x64-based Systems Service Pack 2(KB3156019)
MS16-055 Windows Server 2012(KB3156013)
MS16-055 Windows Server 2012(KB3156016)
MS16-055 Windows Server 2012(KB3156019)
MS16-055 Windows Server 2012 R2(KB3156013)
MS16-055 Windows Server 2012 R2(KB3156016)
MS16-055 Windows Server 2012 R2(KB3156019)
MS16-055 Windows Vista Service Pack 2(KB3156013)
MS16-055 Windows Vista Service Pack 2(KB3156016)
MS16-055 Windows Vista Service Pack 2(KB3156019)
MS16-055 Windows Vista x64 Edition Service Pack 2(KB3156013)
MS16-055 Windows Vista x64 Edition Service Pack 2(KB3156016)
MS16-055 Windows Vista x64 Edition Service Pack 2(KB3156019)
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-057 Windows 10 Version 1511 for 32-bit Systems
MS16-057 Windows 10 Version 1511 for x64-based Systems
MS16-057 Windows 10 for 32-bit Systems
MS16-057 Windows 10 for x64-based Systems
MS16-057 Windows 8.1 for 32-bit Systems
MS16-057 Windows 8.1 for x64-based Systems
MS16-057 Windows Server 2012 R2
This security update is rated Important for all supported editions of Windows Vista and Windows 2008.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-058 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-058 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS16-058 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-058 Windows Vista Service Pack 2
MS16-058 Windows Vista x64 Edition Service Pack 2
This security update is rated Important for Microsoft .NET Framework 2.0 Service Pack 2, Microsoft .NET Framework 3.5, Microsoft .NET Framework 3.5.1, Microsoft .NET Framework 4.5.2, Microsoft .NET Framework 4.6, and Microsoft .NET Framework 4.6.1 on affected releases of Microsoft Windows.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-065 Windows 10 Version 1511 for 32-bit Systems
MS16-065 Windows 10 Version 1511 for x64-based Systems
MS16-065 Windows 10 for 32-bit Systems
MS16-065 Windows 10 for x64-based Systems
MS16-065 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-065 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 4.5.2)
MS16-065 Windows 7 for 32-bit Systems Service Pack 1(Microsoft .NET Framework 4.6/4.6.1)
MS16-065 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-065 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.5.2)
MS16-065 Windows 7 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.6/4.6.1)
MS16-065 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 3.5)
MS16-065 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 4.5.2)
MS16-065 Windows 8.1 for 32-bit Systems(Microsoft .NET Framework 4.6/4.6.1)
MS16-065 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 3.5)
MS16-065 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 4.5.2)
MS16-065 Windows 8.1 for x64-based Systems(Microsoft .NET Framework 4.6/4.6.1)
MS16-065 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-065 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 3.5.1)
MS16-065 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.5.2)
MS16-065 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Microsoft .NET Framework 4.6/4.6.1)
MS16-065 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 3.5.1)
MS16-065 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 4.5.2)
MS16-065 Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)(Microsoft .NET Framework 4.6/4.6.1)
MS16-065 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-065 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 4.5.2)
MS16-065 Windows Server 2008 for 32-bit Systems Service Pack 2(Microsoft .NET Framework 4.6)
MS16-065 Windows Server 2008 for Itanium-based Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-065 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-065 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 4.5.2)
MS16-065 Windows Server 2008 for x64-based Systems Service Pack 2(Microsoft .NET Framework 4.6)
MS16-065 Windows Server 2012(Microsoft .NET Framework 3.5)
MS16-065 Windows Server 2012(Microsoft .NET Framework 4.5.2)
MS16-065 Windows Server 2012(Microsoft .NET Framework 4.6/4.6.1)
MS16-065 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 3.5)
MS16-065 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 4.5.2)
MS16-065 Windows Server 2012 (Server Core installation)(Microsoft .NET Framework 4.6/4.6.1)
MS16-065 Windows Server 2012 R2(Microsoft .NET Framework 3.5)
MS16-065 Windows Server 2012 R2(Microsoft .NET Framework 4.5.2)
MS16-065 Windows Server 2012 R2(Microsoft .NET Framework 4.6/4.6.1)
MS16-065 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 3.5)
MS16-065 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 4.5.2)
MS16-065 Windows Server 2012 R2 (Server Core installation)(Microsoft .NET Framework 4.6/4.6.1)
MS16-065 Windows Vista Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-065 Windows Vista Service Pack 2(Microsoft .NET Framework 4.5.2)
MS16-065 Windows Vista Service Pack 2(Microsoft .NET Framework 4.6)
MS16-065 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 2.0 Service Pack 2)
MS16-065 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 4.5.2)
MS16-065 Windows Vista x64 Edition Service Pack 2(Microsoft .NET Framework 4.6)
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-066 Windows 10 Version 1511 for 32-bit Systems
MS16-066 Windows 10 Version 1511 for x64-based Systems
MS16-066 Windows 10 for 32-bit Systems
MS16-066 Windows 10 for x64-based Systems
A vulnerability exists in Windows Media Center that could allow remote code execution if Windows Media Center opens a specially crafted Media Center link (.mcl) file that references malicious code.
This security update is rated Important for all supported editions of Windows Media Center when installed on Windows Vista, Windows 7 or Windows 8.1.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-059 Windows 7 for 32-bit Systems Service Pack 1(Windows Media Center)
MS16-059 Windows 7 for x64-based Systems Service Pack 1(Windows Media Center)
MS16-059 Windows 8.1 for 32-bit Systems(Windows Media Center)
MS16-059 Windows 8.1 for x64-based Systems(Windows Media Center)
MS16-059 Windows Vista Service Pack 2(Windows Media Center)
MS16-059 Windows Vista x64 Edition Service Pack 2(Windows Media Center)
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-060 Windows 10 Version 1511 for 32-bit Systems
MS16-060 Windows 10 Version 1511 for x64-based Systems
MS16-060 Windows 10 for 32-bit Systems
MS16-060 Windows 10 for x64-based Systems
MS16-060 Windows 7 for 32-bit Systems Service Pack 1
MS16-060 Windows 7 for x64-based Systems Service Pack 1
MS16-060 Windows 8.1 for 32-bit Systems
MS16-060 Windows 8.1 for x64-based Systems
MS16-060 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS16-060 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-060 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-060 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS16-060 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-060 Windows Server 2012
MS16-060 Windows Server 2012 R2
MS16-060 Windows Vista Service Pack 2
MS16-060 Windows Vista x64 Edition Service Pack 2
The security update addresses the vulnerability by modifying the way that Microsoft Windows handles RPC messages.
This security update is rated Important for all supported releases of Microsoft Windows.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-061 Windows 10 Version 1511 for 32-bit Systems
MS16-061 Windows 10 Version 1511 for x64-based Systems
MS16-061 Windows 10 for 32-bit Systems
MS16-061 Windows 10 for x64-based Systems
MS16-061 Windows 7 for 32-bit Systems Service Pack 1
MS16-061 Windows 7 for x64-based Systems Service Pack 1
MS16-061 Windows 8.1 for 32-bit Systems
MS16-061 Windows 8.1 for x64-based Systems
MS16-061 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS16-061 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-061 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-061 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS16-061 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-061 Windows Server 2012
MS16-061 Windows Server 2012 R2
MS16-061 Windows Vista Service Pack 2
MS16-061 Windows Vista x64 Edition Service Pack 2
The update addresses the vulnerability by modifying how Windows Journal parses Journal files.
This security update is rated Critical for all supported editions of Windows Vista, Windows 7, Windows 8.1, Windows RT 8.1, and Windows 10.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-056 Windows 10 Version 1511 for 32-bit Systems
MS16-056 Windows 10 Version 1511 for x64-based Systems
MS16-056 Windows 10 for 32-bit Systems
MS16-056 Windows 10 for x64-based Systems
MS16-056 Windows 7 for 32-bit Systems Service Pack 1
MS16-056 Windows 7 for x64-based Systems Service Pack 1
MS16-056 Windows 8.1 for 32-bit Systems
MS16-056 Windows 8.1 for x64-based Systems
MS16-056 Windows Vista Service Pack 2
MS16-056 Windows Vista x64 Edition Service Pack 2
This security update is rated Critical for affected versions of the VBScript scripting engine on supported editions of Windows Vista, Windows Server 2008, and Server Core installations of Windows Server 2008 R2.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-053 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Server Core installation only)(JScript 5.8 and VBScript 5.8)
MS16-053 Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)(VBScript 5.7)
MS16-053 Windows Server 2008 for Itanium-based Systems Service Pack 2(VBScript 5.7)
MS16-053 Windows Server 2008 for x32-bit Systems Service Pack 2(VBScript 5.7)
MS16-053 Windows Server 2008 for x64-based Systems Service Pack 2(VBScript 5.7)
MS16-053 Windows Server 2008 for x64-based Systems Service Pack 2(Server Core installation only)(VBScript 5.7)
MS16-053 Windows Vista Service Pack 2(VBScript 5.7)
MS16-053 Windows Vista x64 Edition Service Pack 2(VBScript 5.7)
The update addresses the vulnerabilities described in Adobe Security bulletin APSB16-02.
This security update is rated Critical for Adobe Flash Player in Internet Explorer 10, Internet Explorer 11 and Microsoft Edge.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-064 Windows 8.1 for 32-bit Systems(Adobe Flash Player)
MS16-064 Windows 8.1 for x64-based Systems(Adobe Flash Player)
MS16-064 Windows Server 2012(Adobe Flash Player)
MS16-064 Windows Server 2012 R2(Adobe Flash Player)
This security update resolves multiple vulnerabilities in Internet Explorer. The most severe of the vulnerabilities could allow remote code execution if a user views a specially crafted webpage using Internet Explorer.
This security update is rated Critical for Internet Explorer 9 (IE 9), and Internet Explorer 11 (IE 11) on affected Windows clients, and Moderate for Internet Explorer 9 (IE 9), Internet Explorer 10 (IE 10), and Internet Explorer 11 (IE 11) on affected Windows servers.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-051 Windows 10 Version 1511 for 32-bit Systems
MS16-051 Windows 10 Version 1511 for x64-based Systems
MS16-051 Windows 10 for 32-bit Systems
MS16-051 Windows 10 for x64-based Systems
MS16-051 Windows 7 for 32-bit Systems Service Pack 1(Internet Explorer 11)
MS16-051 Windows 7 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS16-051 Windows 8.1 for 32-bit Systems(Internet Explorer 11)
MS16-051 Windows 8.1 for x64-based Systems(Internet Explorer 11)
MS16-051 Windows Server 2008 R2 for x64-based Systems Service Pack 1(Internet Explorer 11)
MS16-051 Windows Server 2008 for 32-bit Systems Service Pack 2(Internet Explorer 9)
MS16-051 Windows Server 2008 for x64-based Systems Service Pack 2(Internet Explorer 9)
MS16-051 Windows Server 2012(Internet Explorer 10)
MS16-051 Windows Server 2012 R2(Internet Explorer 11)
MS16-051 Windows Vista Service Pack 2(Internet Explorer 9)
MS16-051 Windows Vista x64 Edition Service Pack 2(Internet Explorer 9)
This security update resolves vulnerabilities in Microsoft Edge. The most severe of the vulnerabilities could allow code execution with elevated privileges if a user views a specially crafted webpage using Microsoft Edge.
This security update is rated critical for Microsoft Edge on Windows 10.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-052 Windows 10 Version 1511 for 32-bit Systems
MS16-052 Windows 10 Version 1511 for x64-based Systems
MS16-052 Windows 10 for 32-bit Systems
MS16-052 Windows 10 for x64-based Systems
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts.
Microsoft has released a security update that addresses the vulnerabilities by correcting how Office handles objects in memory, and by correcting how the Windows font library handles embedded fonts.
The security update is rated Critical for all support Office versions.
Impact of Workaround #1: Users who have configured the File Block policy and have not configured a special "exempt directory" will be unable to open documents saved in the RTF format.
2) Prevent Word from loading RTF files
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-054 Microsoft Office 2007 Service Pack 3
MS16-054 Microsoft Office 2007 Service Pack 3
MS16-054 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS16-054 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS16-054 Microsoft Office 2010 Service Pack 2 (32-bit editions)
MS16-054 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS16-054 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS16-054 Microsoft Office 2010 Service Pack 2 (64-bit editions)
MS16-054 Microsoft Office 2013 Service Pack 1 (32-bit editions)
MS16-054 Microsoft Office 2013 Service Pack 1 (64-bit editions)
MS16-054 Microsoft Office 2016 (32-bit edition)
MS16-054 Microsoft Office 2016 (64-bit edition)
MS16-054 Microsoft Office Compatibility Pack Service Pack 3
MS16-054 Microsoft Office Web Apps 2010 Service Pack 2
MS16-054 Microsoft Word 2007 Service Pack 3
MS16-054 Microsoft Word 2010 Service Pack 2 (32-bit editions)
MS16-054 Microsoft Word 2010 Service Pack 2 (64-bit editions)
MS16-054 Microsoft Word 2013 Service Pack 1 (32-bit editions)
MS16-054 Microsoft Word 2013 Service Pack 1 (64-bit editions)
MS16-054 Microsoft Word 2016 (32-bit edition)
MS16-054 Microsoft Word 2016 (64-bit edition)
MS16-054 Microsoft Word 2016 for Mac
MS16-054 Microsoft Word Viewer
MS16-054 Microsoft Word for Mac 2011
MS16-054 Word Automation Services on Microsoft SharePoint Server 2010 Service Pack 2
A security feature bypass vulnerability exists in Windows kernel that could allow an attacker to retrieve information that could lead to a Kernel Address Space Layout Randomization (KASLR) bypass.
An elevation of privilege vulnerability exists when the DirectX Graphics kernel subsystem (dxgkrnl.sys) improperly handles objects in memory.
An elevation of privilege vulnerability exists when Windows improperly handles objects in memory and incorrectly maps kernel memory.
The security update addresses the vulnerabilities by correcting how the Windows kernel-mode driver handles objects in memory, how the Windows kernel handles memory addresses and the way in which the Microsoft DirectX graphics kernel subsystem (dxgkrnl.sys) handles certain calls and escapes to preclude improper memory mapping and prevent unintended elevation from user-mode.
This security update is rated Important for all supported releases of Windows.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-062 Windows 10 Version 1511 for 32-bit Systems
MS16-062 Windows 10 Version 1511 for x64-based Systems
MS16-062 Windows 10 for 32-bit Systems
MS16-062 Windows 10 for x64-based Systems
MS16-062 Windows 7 for 32-bit Systems Service Pack 1
MS16-062 Windows 7 for 32-bit Systems Service Pack 1
MS16-062 Windows 7 for x64-based Systems Service Pack 1
MS16-062 Windows 7 for x64-based Systems Service Pack 1
MS16-062 Windows 8.1 for 32-bit Systems
MS16-062 Windows 8.1 for 32-bit Systems
MS16-062 Windows 8.1 for x64-based Systems
MS16-062 Windows 8.1 for x64-based Systems
MS16-062 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS16-062 Windows Server 2008 R2 for Itanium-based Systems Service Pack 1
MS16-062 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-062 Windows Server 2008 R2 for x64-based Systems Service Pack 1
MS16-062 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-062 Windows Server 2008 for 32-bit Systems Service Pack 2
MS16-062 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS16-062 Windows Server 2008 for Itanium-based Systems Service Pack 2
MS16-062 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-062 Windows Server 2008 for x64-based Systems Service Pack 2
MS16-062 Windows Server 2012
MS16-062 Windows Server 2012
MS16-062 Windows Server 2012 R2
MS16-062 Windows Server 2012 R2
MS16-062 Windows Vista Service Pack 2
MS16-062 Windows Vista Service Pack 2
MS16-062 Windows Vista x64 Edition Service Pack 2
MS16-062 Windows Vista x64 Edition Service Pack 2
The security update addresses the vulnerability by ensuring that access to USB disks over RDP is correctly enforced to prevent non-mounting session access.
This security update is rated Important for all supported editions of Windows 8.1, Windows Server 2012, Windows Server 2012 R2, and Windows RT 8.1.
Patches:
The following are links for downloading patches to fix these vulnerabilities:
MS16-067 Windows 8.1 for 32-bit Systems
MS16-067 Windows 8.1 for x64-based Systems
MS16-067 Windows Server 2012
MS16-067 Windows Server 2012 R2
These new vulnerability checks are included in Qualys vulnerability signature 2.3.309-4. Each Qualys account is automatically updated with the latest vulnerability signatures as they become available. To view the vulnerability signature version in your account, from the Qualys Help menu, select the About tab.
To perform a selective vulnerability scan, configure a scan profile to use the following options:
In addition, prior to running a scan for these new vulnerabilities, you can estimate your exposure to these new threats by running the Risk Analysis Report, available from the Qualys Vulnerability Management Reports tab.
Platforms and Platform Identification
For more information, customers may contact Qualys Technical Support.
The Qualys Cloud Platform and its integrated suite of security and compliance applications provides organizations of all sizes with a global view of their security and compliance solutions, while drastically reducing their total cost of ownership. Qualys solutions include: continuous monitoring, vulnerability management, policy compliance, PCI compliance, security assessment questionnaire, web application scanning, web application firewall, malware detection and SECURE Seal for security testing of web sites.