Scanning Strategies

Learn advanced features of Qualys Vulnerability Management, with a focus on how to better scan more complex networks of devices.

For the best experience, Qualys recommends the certified Scanning Strategies course: self-paced or instructor-led.

To learn the individual topics in this course, watch the videos below.

Scanning Best Practices Introduction January 24, 2018 See what the self-paced course covers and get a review of Host Assets.
Scan Process Diagram January 24, 2018 Understand the Qualys scan process and get an overview of four of the modules that are triggered when a scan is launched - Host Discovery,...
Authenticated Scanning Benefits January 24, 2018 Understand the benefits of authetnicated scanning. See differences between "untrusted" and "trusted" scan.
Secure Windows Authentication January 24, 2018 Create a Windows authentication record using the Active Directory domain option. Understand the different options for configuration protocols...
Secure Unix Authentication January 24, 2018 Create a Unix Authentication Record using a "non-privileged" account and root delegation. See how private keys are used as a more secure...
Agentless Tracking January 24, 2018 Enable, configure, and manage Agentless Tracking. Understand the Qualys Tracking Methods, before defining Agentless Tracking. Enable...
Scanner Appliance Deployment Locations January 24, 2018 Understand scanner placement strategy and the difference between internal and external scans.
Virtual Scanner Appliance January 24, 2018 Deploy a Qualys Virtual Scanner Appliance. Use a scanner personalization code for deployment. Verify your scanner in the Qualys UI.
VLAN Tagging January 24, 2018 Get an explanation of VLAN Trunking. Understand the difference between management traffic and scan traffic. Directly connect your scanner to...
Static Route January 24, 2018 Get an explanation on static routing and how to configure them on your Qualys scanner appliance to scan remote networks.
Scanning through Firewalls January 24, 2018 Understand the risks of scanning through firewalls and how to decrease the likelihood of issues with firewalls. Review the Half-Open SYN...
Segmenting Your Scans January 24, 2018 Understand the impact of segmenting scan jobs for performance and efficiency. A formula is provided for calculating the number of hosts...
Scanner Parallelization January 24, 2018 See how scanner parallelization works to increase scan performance. Use multiple scanners on a scan job and understand how microslicing...
Scan Performance January 24, 2018 Get best practices and recommendations to improve performance. Configure performance settings and scanning options in the Option Profile. Use...
Continuous Scanning January 24, 2018 Understand the advantages and process of setting up continuous scans.
Monitoring Scan Time January 24, 2018 Monitor scan time and troubleshooting in case of long scan times. Identify IP's that may be causing the scan to run for long and how to...
Host Discovery January 24, 2018 Understand and configure the "Host Discovery" feature found in the "Additional" section of an Option Profile. Identify the different types of...
Blocked Resources January 24, 2018 Configure Blocked Resources found in the "Additional" section of an Option Profile to avoid IDS/IPS challenges, and to exclude suspect...
Packet Options January 24, 2018 Configure the Packet Options feature found in the "Additional" section of an Option Profile. Use Packet Options to avoid "ghost" IPs in your...
Scanning Cloud Agent Host Assets January 24, 2018 Scan host assets that already have Qualys Cloud Agent installed. Understand the difference between local and remote detections. Create a...
Delegating Scan Tasks & Privileges January 24, 2018 Configure a user with the permission to perform a scan based on Asset Group configuration.