Getting Started with TruConfirm

TruConfirm is an automated exposure-validation layer integrated within the Qualys Enterprise TruRisk Management (ETM) platform that safely confirms whether prioritized exposures are actually exploitable in production. TruConfirm:

  • Validates real-world exploitability on live production assets using safety-first, benign techniques
  • Converts scanner findings into decision-grade evidence: exploitable now vs not exploitable/ blocked.
  • Operationalizes the result as a native experience inside Qualys ETM.

TruConfirm is available as a separate tab within the ETM user interface. To access it, connect with your Technical Account Manager (TAM) or Qualys support.

Prerequisites

Before deploying TruConfirm, confirm the following prerequisites are in place: 

  • An active Qualys ETM subscription with VMDR enabled.
  • For third-party scanner findings, configured connectors for Tenable (io/sc), Rapid7 InsightVM, or Microsoft Defender for Endpoint within ETM.
  • TruConfirm requires network reachability from the ETM validation engine to the target assets on the relevant service ports.
  • Out-of-Band validation: Target assets must be able to initiate outbound DNS queries and HTTP requests to the Qualys-hosted listener infrastructure. If egress filtering is in place, work with your network team to permit callbacks to the designated Qualys listener endpoints.
  • TruConfirm operates in an agentless mode for network-reachable services. 
  • An Option Profile is created in VM. 

 TruConfirm maintains a continuously updated payload library. Not every CVE in the VMDR catalog has a corresponding validation payload. The ETM interface indicates per-finding validation support. CVEs without a payload remain at their original TruRisk score and are unaffected by TruConfirm processing.

Understand TruConfirm Validation

Understanding the four-stage loop before you run your first validation will help you interpret the result correctly.

TruConfirm selects the appropriate validation method: Direct Response, Cryptographic Verification, or Out-of-Band, based on the CVE's characteristics and how the target is expected to respond. You do not need to select a method manually. 

 For more information, refer to the TruConfirm Validation Workflow section.

Where Can You Launch TruConfirm Scans From

  • From the left-navigation panel, go to TruConfirm tab > Scan tab:

  • From the left-navigation panel, go to the Risk Management tab > Findings > Vulnerabilities tab.

How TruConfirm Validation Works

TruConfirm selects the most appropriate validation method based on the specific CVE characteristics and the environment's expected response behavior. Following are the three methods, each designed for a distinct class of vulnerability:

Direct Response Validation

How it works:

A purpose-built request is sent to the target service. If the service is vulnerable, it returns a predictable, non-harmful response.

The proof:

The presence of that specific response confirms the vulnerability is reachable and the affected code path is active.

Cryptographic Verification

How it works:

Each request sends a unique, cryptographically signed marker. When TruConfirm receives a response, it knows the system executed the payload.

The proof:

Signature verification ensures tamper-proof confirmation that the target executed the payload.

Out-of-Band (OOB) / Silent Validation

How it works:

Used for blind vulnerabilities where the target returns no direct response. TruConfirm instructs the target to perform a controlled callback, via DNS query or HTTP request, to a secure, Qualys listener via a DNS query or HTTP callbacks. 

The proof:

Receipt of the callback at the listener proves the payload executed on the target, even when no data is returned to the scanner.

What are Modified Benign Payloads?
The term Modified Benign Payload refers to a purpose-built interaction, not a traditional exploit. Traditional exploit code is engineered to gain unauthorized access, elevate privileges, or exfiltrate data. A Modified Benign Payload is engineered exclusively to elicit a vulnerability-specific, observable response that confirms or denies a reachable execution path.

TruConfirm End-to-End Validation Workflow

TruConfirm is positioned after initial detection and before active remediation, acting as the final verification filter that determines actual exploitability. The workflow proceeds in four stages:

Stage 1. Multi-Source Ingestion 
TruConfirm is vendor-agnostic within the ETM ecosystem. It ingests exposure data and validates vulnerabilities discovered by Qualys VMDR, Tenable.io / Tenable.sc, Rapid7 InsightVM, and Microsoft Defender for Endpoint. 

Stage 2. Exploitability validation
TruConfirm runs modified benign payloads against each unvalidated detection using the appropriate validation method (Direct Response, Cryptographic Verification, or OOB/Silent). Payloads are selected based on the CVE characteristics and the target's expected response behavior. This stage produces a definitive validation status: Confirmed Exploitable, Blocked by Control, or Inconclusive.

Stage 3. QVSS Score Update

The QVSS score is adjusted based on the exploit validation outcome.

  • If a vulnerability is validated, the QVSS score is elevated, indicating a higher risk and the need for prioritized remediation.
  • If the vulnerability is ruled out, the QVSS score remains unchanged at its original level.

Stage 4. ETM Remediation Guidance

ETM provides remediation guidance to patch or mitigation exploitation. 

Related Topics

Understand TruConfirm

TruConfirm Overview