Search Tokens for Findings
You can use the search tokens in the Findings tab to refine your search results. We have broadly classified the asset and vulnerability/misconfiguration search tokens in the Findings tab. Click each token to learn more about it.
Vulnerability/Misconfiguration | Asset
Vulnerability/Misconguration Tokens
Use these tokens to define search criteria for vulnerabilities and misconfigurations.
Use quotes or backticks within values to help you find the title.
After the colon, enter the title.
Examples
Show any findings related to this title.
finding.title: 'Remote Code Execution
Show any findings that contain "Remote" or "Code" in title:
finding.title: "Remote Code"
Show any findings that match exact value "Remote Code" :
finding.title: `Remote Code`
finding.descriptionfinding.description
Use quotes or backticks within values to help you find the finding with matching description. After the colon, enter the description.
Examples
Show any findings related to this description:
finding.description: "Remote Code Execution"
Show any findings that contain "Remote" or "Code" in description:
finding.description: "Remote Code"
Show any findings that match the exact value "Remote Code":
finding.description: `Remote Code`
Use an integer value (0-100) to help you find vulnerabilities based on specific detection score. After the colon, enter the value.
Examples
Show vulnerabilities with detection score 80:
finding.qds:80
Show vulnerabilities with detection score greater than 80:
finding.qds: > 80
finding.subTypefinding.subType
Select a finding type (Vulnerability, Misconfiguration, Malware, Compliance) to find findings of this type. Select from names in the drop-down menu.
Example
Show findings with this type.
finding.SubType: Vulnerability
finding.typeDetectedfinding.typeDetected
Select a detection type (Confirmed, Potential, or Information) to search for findings of this type. Select from names in the drop-down menu.
Example
finding.typeDetected: confirmed
finding.sourceIdfinding.sourceId
Use a text value to search for findings based on the ID used by the source vendor.
Examples
Show findings with the specified source ID
finding.sourceId:500034
finding.vendorNamefinding.vendorName
Select a detection source (Wiz, Qualys, Microsoft) to search findings from the specified source. Select from names in the drop-down menu.
Example
Show findings with this source.
finding.vendorName: Qualys
finding.severityfinding.severity
Use an integer value to view the severity level set by Qualys to search findings. The severity level ranges between 1-5. Select from values in the drop-down menu.
Example
Show findings with severity set by Qualys as 5:
finding.severity: 3
Select a status (for example, Active, Fixed, New, or Reopened) to search findings with certain statuses. Select from names in the drop-down menu. If you select the status as Fixed, the list will only show vulnerabilities that have been fixed in the last 365 days.
Example
Show vulnerabilities with Fixed status:
finding.status: Fixed
finding.vendorProductNamefinding.vendorProductName
Select a detection source's product name (for example, Nessus) to search findings with the product name of the detection source. Select from names in the drop-down menu.
Example
Show findings with the product name:
finding.vendorProductName:Nessus
finding.vendorFindingIdfinding.vendorFindingId
Use a text value to search findings with the specified source finding ID. - external id. It is the unique ID of an instance of the finding.
Example
Show finding with this source finding id.
finding.vendorFindingId:9d7ef6e4-baed-47ba-99ec-a78a801f1e19
finding.vendorUrlfinding.vendorUrl
Use quotes or backticks within values to help you find the finding with matching url.\
Examples
Show any findings related to this url:
finding.vendorUrl:https://app.wiz.io
Show any findings that contain "app" or "wiz" in url.
finding.vendorUrl:"app wiz"
Show any findings that match exact value.
finding.vendorUrl:`https://app.wiz.io/explorer/vulnerability-findings#5e95ff50-5490-514e-87f7-11e56f3230ff`
finding.discoveryTypefinding.discoveryType
Select a discovery type (Remote or Authenticated) to search findings having this discovery type. Select from names in the drop-down menu.
Example
Show findings with Remote discovery type:
finiding.discoveryType:REMOTE
finding.firstFoundfinding.firstFound
Use the date range or specific date to define when findings were first found.
Examples
Show findings first found within certain dates:
finding.firstFound:[2015-10-21 ... 2016-01-15]
Show findings first found starting 2016-01-01, ending 1 month ago:
finding.firstFound:[2016-01-01 ... now-1M]
Show findings first found starting 2 weeks ago, ending 1 second ago:
finding.firstFound:[now-2w ... now-1s]
Show findings first found on a certain date:
finding.firstFound:'2016-01-11'
Show findings first found within a certain number of days:
finding.firstFound:[91..180]
finding.lastFoundfinding.lastFound
Use the date range or specific date to define when findings were last found.
Examples
Show findings last found within certain dates:
finding.lastFound:[2015-10-21 ... 2016-01-15]
Show findings last found starting 2016-01-01, ending 1 month ago:
finding.lastFound:[2016-01-01 ... now-1M]
Show findings last found starting 2 weeks ago, ending 1 second ago:
finding.lastFound:[now-2w ... now-1s]
Show findings last found on a certain date:
finding.lastFound:'2016-01-11'
Show findings last found within a certain number of days:
finding.lastFound:[91..180]
finding.reopenedfinding.reopened
Use the date range or specific date to define when findings were reopened.
Examples
Show findings reopened within certain dates:
finding.reopened:[2015-10-21 ... 2016-01-15]
Show findings reopened starting 2016-01-01, ending 1 month ago:
finding.reopened:[2016-01-01 ... now-1M]
Show findings reopened starting 2 weeks ago, ending 1 second ago:
finding.reopened:[now-2w ... now-1s]
Show findings reopened on a certain date:
finding.reopened:'2016-01-11'
Show findings reopened within a certain number of days:
finding.reopened:[91..180]
finding.lastFixedfinding.lastFixed
Use a date range or specific date to define when findings were last fixed.
Examples
Show findings last fixed within certain dates:
finding.lastFixed:[2015-10-21 ... 2016-01-15]
Show findings last fixed starting 2016-01-01, ending 1 month ago:
finding.lastFixed:[2016-01-01 ... now-1M]
Show findings last fixed starting 2 weeks ago, ending 1 second ago:
finding.lastFixed:[now-2w ... now-1s]
Show findings last fixed on a certain date:
finding.lastFixed:'2016-01-11'
Show findings last fixed within a certain number of days:
finding.lastFixed:[91..180]
Use an integer value to help you search findings discovered on a specific port.
Example
Show findings discovered on this port
finding.port:443
finding.protocolfinding.protocol
Use a text value (UDP or TCP) to define the port protocol.
Example
Show findings discovered on TCP protocol
finding.protocol:TCP
finding.instancefinding.instance
Use a text value to search findings discovered on a certain instance.
Example
Show findings with the specified instance
finding.instance:oracle
finding.applicationURLfinding.applicationURL
Use a text value to search findings discovered on a certain application URL.
Example
Show findings with the specified application URL
finding.applicationURL:http://funkytown.vuln.qa.qualys.com/cassium/xss/
Use the number of days to determine the findings based on the Total and First Found time to remediate. The token accepts range input as number of days. You can also customize the range input.
Examples
Show vulnerabilities findings based on total and first found calculation
finding.ttr:[61..90]
Use custom query to see the vulnerabilities findings based on total and first found calculation
finding.ttr:[0..90]
finding.detectionAgefinding.detectionAge
Select the number of days from the range (00..30, 31..60, 61..90, 91..180,180..+) since the vulnerability was first detected (by a scanner or cloud agent) on the asset till the current date. The age is calculated irrespective of the vulnerability status.
Example
Show findings that were detected in the last 30 days.
finding.detectionAge:[00..30]
finding.riskFactor.exploitCodeMaturityfinding.riskFactor.exploitCodeMaturity
Select from the drop-down menu (poc, weaponized) to find vulnerabilities based on the maturity level of their exploit code.
Example
Show vulnerabilities with Functional exploit code maturity
finding.riskFactor.exploitCodeMaturity: poc
finding.riskFactor.threatActorNamefinding.riskFactor.threatActorName
Provide a string value to find vulnerabilities associated with a specific threat actor or group.
Example
Find vulnerabilities associated with the threat actor "APT29"
finding.riskFactor.threatActorName: APT29
finding.riskFactor.cisaKnownExploitsfinding.riskFactor.cisaKnownExploits
Select (True, False) to find vulnerabilities that are or are not listed in CISA's Known Exploited Vulnerabilities Catalog.
Example
Show vulnerabilities listed in CISA's Known Exploited Vulnerabilities Catalog
finding.riskFactor.cisaKnownExploits: true
finding.riskFactor.rtifinding.riskFactor.rti
Provide a numeric value to find vulnerabilities based on their Real-Time Intelligence (RTI) score.
Example
Find vulnerabilities with an RTI score of 8
finding.riskFactor.rti: 8
finding.riskFactor.malwareNamefinding.riskFactor.malwareName
Provide a string value to find vulnerabilities associated with a specific malware.
Example
Find vulnerabilities associated with the "WannaCry" malware
finding.riskFactor.malwareName: WannaCry
Use a text value to search for findings based on the CVE ID of the vulnerability.
Examples
Show findings with the specified CVE ID
finding.cveId:CVE-2020-27814
finding.cvss2Basefinding.cvss2Base
Provide a numeric value (0.0 to 10.0) to find vulnerabilities with a specific CVSS 2.0 Base score.
Examples Find vulnerabilities with CVSS 2.0 Base score of 7.5
finding.cvss2Base: 7.5
finding.cvss2Temporalfinding.cvss2Temporal
Provide a numeric value (0.0 to 10.0) to find vulnerabilities with a specific CVSS 2.0 Temporal score.
Examples
Find vulnerabilities with CVSS 2.0 Temporal score of 6.5
finding.cvss2Temporal: 6.5
finding.cvss3Basefinding.cvss3Base
Provide a numeric value (0.0 to 10.0) to find vulnerabilities with a specific CVSS 3.0 Base score.
Examples
Find vulnerabilities with CVSS 3.0 Base score of 9.1
finding.cvss3Base: 9.1
finding.cvss3Temporalfinding.cvss3Temporal
Provide a numeric value (0.0 to 10.0) to find vulnerabilities with a specific CVSS 3.0 Temporal score.
Examples Find vulnerabilities with CVSS 3.0 Temporal score of 8.3
finding.cvss3Temporal: 8.3
finding.disabledfinding.disabled
Select (True, False) to find vulnerabilities that are disabled or enabled in the vendor system.
Example
Show vulnerabilities that are disabled.
finding.disabled: true
finding.ignoredfinding.ignored
Select (True, False) to find vulnerabilities that are marked as ignored or not ignored.
Example
Show vulnerabilities that are not marked as ignored.
finding.ignored: false
finding.technologyCategoryfinding.technologyCategory
Use this token to search for misconfigurations related to a given technology category.
Example
Search misconfigurations that are associated with "Linux / Server".
finding.technologyCategory: "Linux/Server"
finding.technologyNamefinding.technologyName
Use this token to search for misconfigurations related to a given technology name.
Example
Search misconfigurations that are associated with "Red Hat Enterprise Linux Server ".
finding.technologyName: "Red Hat Linux Server"
finding.policyNamefinding.policyName
Use this token to search for misconfigurations related to a given policy name.
Example
Search misconfigurations that are associated with "CIS Benchmark".
finding.policyName: "CIS Benchmark"
finding.owaspTopTenNamefinding.owaspTopTenName
Use this token to search for vulnerabilities of a specific OWASP Top Ten name type. Choose the name from the drop-down menu.
Example
Search vulnerabilities that are impacted by Injection.
finding.owaspTopTenname: "Injection"
Asset Tokens
The following asset tokens will list all the assets mentioned in the QQL.
Use an integer value to help you find certain Qualys asset IDs (UUIDs), assigned by an agent or a scanner appliance when Agentless Tracking is used.
Examples
- Show this asset ID:
asset.assetID: 2918869
- Show the asset IDs within this range:
asset.assetID: [3546997..12945655]
- Show the 2 listed asset IDs:
asset.assetID: [3546997,12945655]
asset.criticalityScoreasset.criticalityScore
Use an integer value (1-5) to help you find assets based on specific criticality score. After the colon, enter the value.
Examples
- Show assets with a criticality score of 5:
asset.criticalityScore:5
- Show assets with a criticality score of 2:
asset.criticalityScore:2
Use quotes or backticks within values to find the asset with specified asset name. After the colon, enter the value.
Examples
- Show assets related to the given name:
asset.name: QK2K12QP3-65-53
- Show assets that contain parts of the given name:
asset.name:"QK2K12QP3-65-53"
Show assets that match exactly match the given name:
asset.name:`QK2K12QP3-65-53`
Use an integer value (0-1000) to find assets based on a specific risk score. After the colon, enter the value.
Examples
- Show assets with TruRisk score 60:
asset.truRisk: 60
- Show assets with TruRisk score 25:
asset.trurisk: 25
Use an integer value to find assets with the specified open port. After the colon, enter the value.
Example
- Show all assets with open port 80:
openPorts.port: 80
inventory.sourceinventory.source
Use a text value ##### to find assets from the specified Qualys source. Select values from the drop-down.
Examples
- Show all assets from cloud agents:
inventory.source: Cloud Agent
Show all assets from passive sensor:
inventory.source: Passive Sensor
hardware.categoryhardware.category
Use quotes and backticks within the values to find assets with specified hardware category. After the colon, enter the value.
Examples
- Show all assets that include a part of the specified hardware category value:
hardware.category: "Computer/Server"
Show all assets that match exactly match the specified hardware category value:
hardware.category: `Computer/Server`
accounts.usernameaccounts.username
Use a text value ##### to help you find an account username you are looking for.
Example
- Show findings with username administrator:
accounts.username: "administrator"