Contents Security Operations Previous Topic Next Topic Add a third-party vulnerability scanner Subscribe Log in to subscribe to topics and get notified when content changes. ... SAVE AS PDF Selected Topic Topic & Subtopics All Topics in Contents Share Add a third-party vulnerability scanner You can integrate Vulnerability Response with third-party vulnerability scanners to scan and identify potential vulnerabilities. Before you begin Before you add a third-party scanning service, obtain a license or account to use that service. Often, an API key or API credentials must be obtained to facilitate the integration. You must also define a scanner implementation script include. Role required: sn_vul.vulnerability_admin About this taskA vulnerability scanner lets you launch a vulnerability scan with a third-party vulnerability vendor. You can modify and extend the baseline Qualys scanner that is provided in the baseline system, or you can create a scanner. All scanners must extend VulnerabilityScannerBase. Procedure Navigate to Vulnerability > Vulnerability Scanning > Scanners. Click New. Fill in the fields, as needed. Table 1. Vulnerability Scanner form Field Description Name Enter a name for the vulnerability scanner. Active Select this check box to activate this vulnerability scanner. Application The application that owns this scanner. Default To make this scanner the default vulnerability scanner, select this check box.Note: Set at least one default scanner, or related links for initiating scans in Security Incident Response (if activated) and on the Vulnerable Item form are not available. Scanner factory script Enter a script to construct the scanner implementation that is defined by a script include. The script include must extend VulnerabilityScannerBase, and provide the mechanism that makes scan requests. The last line of the script must be the constructed integration implementation. Click Submit. Define a scanner implementation script includeWhen defining a scanner to be used by Vulnerability Response, you are asked to add a script include to identify the actual scanning behavior.Vulnerability scan rate limitsYou can define the rate that different types of scans are performed to limit the number of requests that are sent to an external scanner. After you have defined rate limits, you can apply them to different scanners. On this page Send Feedback Previous Topic Next Topic
Add a third-party vulnerability scanner You can integrate Vulnerability Response with third-party vulnerability scanners to scan and identify potential vulnerabilities. Before you begin Before you add a third-party scanning service, obtain a license or account to use that service. Often, an API key or API credentials must be obtained to facilitate the integration. You must also define a scanner implementation script include. Role required: sn_vul.vulnerability_admin About this taskA vulnerability scanner lets you launch a vulnerability scan with a third-party vulnerability vendor. You can modify and extend the baseline Qualys scanner that is provided in the baseline system, or you can create a scanner. All scanners must extend VulnerabilityScannerBase. Procedure Navigate to Vulnerability > Vulnerability Scanning > Scanners. Click New. Fill in the fields, as needed. Table 1. Vulnerability Scanner form Field Description Name Enter a name for the vulnerability scanner. Active Select this check box to activate this vulnerability scanner. Application The application that owns this scanner. Default To make this scanner the default vulnerability scanner, select this check box.Note: Set at least one default scanner, or related links for initiating scans in Security Incident Response (if activated) and on the Vulnerable Item form are not available. Scanner factory script Enter a script to construct the scanner implementation that is defined by a script include. The script include must extend VulnerabilityScannerBase, and provide the mechanism that makes scan requests. The last line of the script must be the constructed integration implementation. Click Submit. Define a scanner implementation script includeWhen defining a scanner to be used by Vulnerability Response, you are asked to add a script include to identify the actual scanning behavior.Vulnerability scan rate limitsYou can define the rate that different types of scans are performed to limit the number of requests that are sent to an external scanner. After you have defined rate limits, you can apply them to different scanners.
Add a third-party vulnerability scanner You can integrate Vulnerability Response with third-party vulnerability scanners to scan and identify potential vulnerabilities. Before you begin Before you add a third-party scanning service, obtain a license or account to use that service. Often, an API key or API credentials must be obtained to facilitate the integration. You must also define a scanner implementation script include. Role required: sn_vul.vulnerability_admin About this taskA vulnerability scanner lets you launch a vulnerability scan with a third-party vulnerability vendor. You can modify and extend the baseline Qualys scanner that is provided in the baseline system, or you can create a scanner. All scanners must extend VulnerabilityScannerBase. Procedure Navigate to Vulnerability > Vulnerability Scanning > Scanners. Click New. Fill in the fields, as needed. Table 1. Vulnerability Scanner form Field Description Name Enter a name for the vulnerability scanner. Active Select this check box to activate this vulnerability scanner. Application The application that owns this scanner. Default To make this scanner the default vulnerability scanner, select this check box.Note: Set at least one default scanner, or related links for initiating scans in Security Incident Response (if activated) and on the Vulnerable Item form are not available. Scanner factory script Enter a script to construct the scanner implementation that is defined by a script include. The script include must extend VulnerabilityScannerBase, and provide the mechanism that makes scan requests. The last line of the script must be the constructed integration implementation. Click Submit. Define a scanner implementation script includeWhen defining a scanner to be used by Vulnerability Response, you are asked to add a script include to identify the actual scanning behavior.Vulnerability scan rate limitsYou can define the rate that different types of scans are performed to limit the number of requests that are sent to an external scanner. After you have defined rate limits, you can apply them to different scanners.