Qualys Cloud Agent for Windows Release 6.2.4
Limited Customer Release
September 06, 2025
We are introducing the following new features and enhancements for Windows Cloud Agent.
New Module — Identity Security Posture Management
We are introducing a new add-on module for the Qualys Enterprise TruRisk™ Management application to secure the identity of your IT infrastructure.
ISPM provides a single-pane view for identity-related cyber risks, currently focusing on the identity security of Active Directory servers.
The ISPM is currently available only for Windows servers.
With ISPM, we offer you the following benefits:
- Continuous Assessment: ISPM continuously scans to identify the orphaned accounts, privileged users, inactive accounts, and accounts managed by non-human entities.
- Centralized Data Representation: ISPM collects and identifies potentially vulnerable identities and displays that data in one place for easy analysis, prioritization, and remediation.
- Automated Remediation: ISPM can enforce least privilege access to a compromised identity and remove unused accounts from your subscription.
- Compliance and Reporting: ISPM helps you achieve compliance with industry-accepted standards such as HIPAA and PCI-DSS and generates audit-ready reports.
The ISPM module has limited customer availability. Contact Qualys Support or your Technical Account Manager (TAM) to enable this feature.
Onboarding with ISPM
The following are the onboarding steps for ISPM.
Prerequisites for ISPM
You must meet the following requirements to start with ISPM.
- Activating ISPM automatically activates Vulnerability Management (VM) and Policy Audit (AP)/Policy Compliance (PC). You must have access to the VM and PA/PC.
- You must have access to the Enterprise TruRisk™ Platform.
ISPM Workflow
Perform the following steps to start using ISPM features:
Steps 1: Activate ISPM for Cloud Agent
Once the ISPM is enabled for your subscription, perform the following steps to activate the Cloud Agent for ISPM.
- In the Cloud Agent user interface, navigate to Agent Management > Agents tab.
- Select an activation key, and in the Quick Actions menu, click the Activate Agent for <modules> option. This will activate the Cloud Agent for ISPM.
Step 2: Access ETM and View ISPM as an Add-On Module
- Navigate to the ETM application.
- Go to the Add-On section where the ISPM module is available.
- Once activated, the default ETM dashboard becomes visible.
Step 3: View Asset Inventory
The inventory section displays server assets where Active Directory is installed. To learn more about managing asset inventory, refer to Manage Asset Inventory.
Non-Windows servers will not appear in the asset inventory.
Step 4: Automatic Scanning and Risk Management
- Background scans run automatically once in a week for risk assessment.
- Misconfiguration and vulnerability data are continuously updated.
- Vulnerabilities are updated from both the Server and Active Directory, while misconfigurations are updated only from Active Directory.
Step 5: View Attack Path
- The Active Path section displays the attack path between the start object and the target object from the selected Domain.
- Users can view and analyze potential attack routes and refer to remediation instructions to mitigate the risk.
To learn more about ISPM, refer to Identity Security Posture Management Overview.