Qualys Cloud Agent for Solaris Release 7.1
February 02, 2026
The following new features and enhancements are introduced in this release of Cloud Agent for Solaris.
Solaris Cloud Agent does not support auto-upgrade from its previous versions, 3.11.x to 7.1.0 as the installer type is updated from .PKG to .P5P (SVR4 to IPS-based package). To learn more about upgrading Solaris Cloud Agent, refer to Qualys Cloud Agent for Solaris: Transitioning from SVR4 to IPS.
Support for Qualys Applications
We updated the Solaris Cloud Agent to support the following important applications:
File Integrity Management
Qualys File Integrity Monitoring (FIM) is a cloud-based security solution designed to monitor and detect unauthorized changes to critical files, directories, and registry settings across IT environments.
For optimal performance of FIM we recommend a host asset with 4 Core CPU and 4GB RAM.
Qualys FIM offers the following benefits:
- Real-Time Monitoring: Tracks changes to files, folders, and registry objects in real time.
- Alerting & Reporting: Generates alerts when changes to files or directories are detected.
- Compliance Support: Helps meet standards like PCI DSS 4.0, HIPAA, and more.
| Required Application Version | File Integrity Monitoring 4.9.0 |
To learn more about FIM, refer File Integrity Monitoring Online Help.
Custom Assessment and Remediation
Qualys Custom Assessment and Remediation (CAR) provides a proactive approach to identifying vulnerabilities and executing custom scripts for rapid remediation. By leveraging automated assessments, role-based access control, and seamless script execution, CAR enhances security posture while eliminating the need for third-party tools.
CAR offers the following benefits:
- Centralized Risk Management: CAR can help you consolidate findings from multiple sources in a unified view. It also helps you identify assets with blind spots, custom configurations, and zero-day vulnerabilities.
- Custom Script Execution: CAR supports multiple scripting languages like Python, Shell, Lua, Perl, and so on. You can execute these scripts as per pre-defined schedules or on demand for various platforms such as Windows, Linux, macOS, AIX, and BSD.
- Automated Remediation: CAR supports specifically designed orchestrated workflows that help in remediating vulnerabilities faster without relying on third-party remediation tools.
| Required Application Version | Custom Assessment and Remediation 2.7.1 |
To learn more about CAR, refer to Custom Assessment and Remediation Online Help.
Updated Certificate Verification
The new Solaris package is updated to .PKG. With this update, we have also updated the certificate verification process for Solaris Cloud Agents. The new signing process help you fix the permission errors that may be encountered during the Cloud Agent installation.
To learn more about certificate verification, refer to Certificate Verification for Solaris Package.
Enhancements for Solaris Cloud Agent
We have upgraded the Solaris Cloud Agent to support the following features:
| Feature | Description |
|---|---|
| Troubleshooting | Use this feature to perform the troubleshooting actions on your Cloud Agents. The Cloud Agent for Unix has support for the following options to help you with troubleshooting: |
| Change Activation Key | Use this feature to change the activation key assigned to a Cloud Agent(s) directly from the user interface. Refer Change Activation Key to learn more. |
| On Demand Scan | Use this feature to instantly launch a Cloud Agent scan, directly from the Cloud Agent user interface. Refer On Demand Scan to learn more. |
You must have Enterprise TruRisk™ Platform 3.23.0.0 and higher versions to use the above-mentioned features for Solaris Cloud Agent.
Behavioral Change
Solaris Cloud Agent does not support auto-upgrade from its previous versions, 3.11.x to 7.1.0 as the installer type is updated from .PKG to .P5P (SVR4 to IPS-based package). To learn more about upgrading Solaris Cloud Agent, refer to Qualys Cloud Agent for Solaris: Transitioning from SVR4 to IPS.
Platform Coverage Support
The following are the changes to platform coverage support for Solaris Cloud Agent:
- The Solaris Cloud Agent 7.1.0 now supports Solaris 11.4.
- The Solaris Cloud Agent 7.1.0 does not support Solaris 11.3 and lower versions.
Issues Addressed
The following important and notable issues are fixed in this release:
| Category/Component | Description |
|---|---|
| Configuration Profile Status | We fixed an issue where the Solaris Cloud Agent reported an incorrect status of Configuration Pending Download even when the configuration had already been successfully downloaded. Now, we display the correct status as Download Complete. |
| Reporting | The Agent Provisioning Rule could not merge duplicate asset records because MAC addresses were not collected for asset validation. Now, Cloud Agent collects the MAC addresses to validate the duplicate assets. |
Known Issues, Limitations, and Workarounds
Known Issues for Solaris Cloud Agent
- Solaris Cloud Agent does not support the auto-upgrade from its previous versions 3.x to 7.1.0. To avoid Cloud Agent upgrade failure, install the latest Solaris Cloud Agent version manually.
To learn more about manual installation and upgradation, refer to Cloud Agent Installation Steps and Cloud Agent Upgradation. - Uninstalling Solaris Cloud Agent using system command packages such as
pkg uninstall -v qualys-cloud-agentmay not remove all the agent-related files and directories. Execute the following script to remove these remaining files and directories:
/etc/qualys/.postremove
We recommend uninstallation using the qagent_uninstall script packaged with the Cloud Agent installer.
Alternatively, you can use the following command to uninstall the Cloud Agent manually:
sudo /opt/qualys/cloud-agent/bin/qagent_uninstall.sh
Known Issues for FIM with Solaris Cloud Agent
Qualys File Integrity Monitoring Application (FIM) has the following limitations for Solaris Cloud Agent:
- FIM does not support the file access monitoring features for Solaris Cloud Agents.
- The FIM user interface does not display the executed full command, as the Solaris Cloud Agent does not report proctitle in Audit Records for Solaris.
- For Solaris platforms incomplete data from the Audit service can prevent the FIM event reporting. In some cases Cloud Agent may report FIM events incorrectly, due to insufficient audit data. When full audit data is available, FIM event reporting works fine.
- FIM reports the Change event when a touch command is executed for the second time on an existing file.
- For Solaris FIM,
auditdservice is not restarted everytime the FIM process start or stop. It is restarted only when FIM is unable to track the audit log directory. - Solaris FIM creates a backup of existing audit configuration in
/etc/security/audit_config.bakbefore updating the required audit configuration.