Enterprise TruRisk Management Release 1.2.0

March 04, 2025

Support for New Connectors

We are expanding our connector ecosystem with four new API integrations and one new Generic CSV integration.

Microsoft Defender for Endpoints

The Microsoft Defender for Endpoints (MDE) connector collects asset and vulnerability data from Microsoft's security platform. This API integration provides visibility into Windows endpoint security findings and fetches its host assets. Learn more about the MDE Connector.

AWS Inspector

This connector integrates AWS Inspector's automated security assessment service. The API integration imports findings about vulnerabilities, and host assets in AWS environments. Learn more about the AWS Inspector Connector.

CrowdStrike Exposure Management

Supporting CrowdStrike's container-based solution, this on-premise API connector integrates vulnerability findings and host assets from CrowdStrike Falcon. Learn more about the CrowdStrike OnPrem Connector.

BitSight

The BitSight connector imports security ratings and findings from BitSight's security ratings platform. This API integration fetches vulnerability and patching cadence findings from BitSight while also mapping its security ratings with Qualys TruRisk Scores. Learn more about the BitSight Connector.

Amazon S3 Bucket 

This connector enables integration of vulnerability data from custom sources through CSV files stored in Amazon S3 buckets. 

The new connectors automatically fetch vulnerability and host assets data from their respective platforms. This data flows directly into the ETM application, enabling comprehensive risk prioritization across your security ecosystem. Learn more about the AWS S3 Connector.

Custom Attributes 

We have introduced a new feature of Custom Attributes allowing you to define and manage Custom Attributes for findings within Qualys ETM. This enhancement provides enhanced flexibility to create calculated fields for findings in ETM.  

Benefits
  • Customization

    Write your own formula to calculate custom attributes for each finding.

  • Efficient Reporting and Filtering

    Flexibility in using custom attributes as QQL tokens for creating dashboard widgets and filtering all findings.

  • Coordinated workflows

    The presence of custom attributes facilitates the seamless integration of ETM workflows with other systems using ETM Finding APIs. To learn more about ETM APIs, refer ETM API User guide

  • Enhanced Data Visibility

    Custom attributes provide better visibility into high risk findings, allowing you the ability to generate alerts automatically.   

You can view details of custom attributes in Findings Details page.

View Custom attributes details.

For more details, refer to ETM Online help.

Purge Findings

With this release, we have introduced the purge Findings. It is designed to facilitate the routine removal of outdated information, notably findings that are no longer relevant in your environment. In fast-paced, dynamic settings such as cloud environments, data can quickly become outdated, and this feature helps ensure your data stays accurate and reliable.

Benefits
  • Enhanced Data Accuracy

    Regular purging helps maintain fresh and accurate data in your subscription, reducing the presence of stale findings that can lead to unresolved vulnerabilities, subsequently affecting security scores, remediation performance, and overall trust in data.

  • Flexible Frequency

    We recommend a purging schedule ranging from monthly to quarterly, depending on the size and dynamics of your environment, striking a balance between data accuracy and the effort required.

You can create a purge rule to automate the process. You can either purge on-demand or schedule a daily purge rule. To access this feature, navigate to Risk Management > Finding Rules > Purge > Create Rule.

For more details, refer to ETM Online help.

Support for CSAM and VMDR QQL Search Tokens for Assets

With this release, we have extended support for CSAM and VMDR QQL search tokens for assets. The following are the categories for which we have introduced tokens.

  • Asset Inventory and Passive Sensor

    Use these tokens to view asset inventory by CSAM and passive sensors.

  • AWS EC2

    Use these tokens for searching your AWS EC2 assets.

  • Microsoft Azure

    Use these tokens for searching Microsoft Azure assets.

  • Google Cloud Platform

    Use these tokens for searching Google Cloud Platform assets.

  • Oracle Cloud Infrastructure

    Use these tokens for searching Oracle Cloud Infrastructure (OCI) assets.

  • IBM Cloud

    Use these tokens for searching IBM Cloud assets.

  • Alibaba

    Use these tokens for searching Alibaba assets.

  • Passive Sensor Only

    Use these tokens for searching assets identified by Passive Sensor only.

For more details on these tokens, refer to Search Tokens for Findings.

New Tokens for Findings Tab

Name

Description

Example

finding.custom
Number1 

finding.custom
Number2

finding.custom
Number3

finding.custom
Number4

finding.custom
Number5

Provide a numeric value to search for findings with a specific value or within a range of values. 

finding.customNumber2:
 80

The token displays all the findings related to formula used for customNumber2 token.

finding.epssScore

Use the token as an integer value to help you search findings based on a EPSS score.

finding.epssScore: 
0.7088

finding.ruleName

Note: This token is designed for use in the Rule Query field when creating an alert.

Use the token to view the findings using rule name. 

finding.ruleName:
"find TruRisk score"

finding.id

Note: This token is designed for use in the Rule Query field when creating an alert.

Use an integer as token value to help you search findings based on a rule ID.

finding.id: 7088

For more details on these tokens, refer to Search Tokens for Findings.

New Tokens for Business Entities 

Name

Description

Example

businessEntity.
business
Value

 

Use business values provided at the time of business creation to find the business entity.

businessEntity.business
Value: 100000

businessEntity.
currency
Code

 Use currency code as AUD, CAD, EUR, INR, JPY, SGD, or USD to find the business entity.

businessEntity.currency
Code: USD

businessEntity.
name

Use values within quotes or backticks to find the business entity using name.

businessEntity.
name:"Qualys"

businessEntity.
riskAppetite

Use risk appetite values as a token to find the business entity. While defining the business entity, you can assign values from 0 to 1000.

businessEntity.
riskAppetite: 800

businessEntity.
title

Use values within quotes or backticks to find the business entity using business title.

businessEntity.
title:"Engineering"

businessEntity.
truRiskScore

Use TruRisk score to find the business entity.

businessEntity.
truRiskScore: 100

For more details on these tokens, refer to Search Tokens for Business Entities.

New Tokens for Purge Rule

Name

Description

Example

name

 

Use this token to search for purge rules by name.

name: MS Defender-Finding-Purge

enabled

Select the token value as TRUE or FALSE to view the list of rules that are enabled for purging the findings.

enabled: TRUE

For more details on these tokens, refer to Search Tokens for Purge Findings.

New Default Dashboard

With this release, we have introduced a default dashboard designed to enhance your user experience. A predefined dashboard that allows new users to quickly start view finding. As you become more familiar with the platform you have the option to create your own custom dashboards tailored to your specific needs and requirements.

View new default dashboard.

Integration with Qualys Applications: PC, SCA, and WAS

ETM now supports integration with other Qualys applications, including PC (Policy Compliance), SCA (Security Configuration Assessment), and WAS (Web Application Scanning). You can view findings from these applications in the ETM Findings tab.

The Risk Management tab provides a comprehensive overview of findings, list of findings with details categorized as Vulnerabilities and Misconfigurations.

You can identify and monitor vulnerabilities and misconfigurations, with the ability to take necessary actions for threat mitigation in Findings.

Access detailed information such as Summary QDS details, including the highest contributing CVEs, associated malware and threat actors, exploitability, additional insights, and detection details (exploitability, patches, malware, sources).

You can search for Vulnerabilities and Misconfiguration in integrated applications and utilize the Group By option to organize data effectively. For instance, selecting Group By Vendors Product Name allows you to click values in the detection Count column to see a list of assets with the corresponding vendors.

For more details, refer to the Discover and Manage Security Risks section from ETM Online Help.

Support for Venn Chart in ETM Dashboard Widget

With this release, you can use a Venn diagram representation for your widgets. A Venn diagram is a powerful tool for representing findings. It visually illustrates relationships between different elements, highlighting overlaps, gaps, and inter-dependencies within complex data.

View Support for Venn Chart.

New Group By Option for Vulnerabilities and Misconfigurations

When you have findings ready, you can organize them further into logical groupings. We offer several Group by options like Detection age, CVE Protocol, and so on. With this release, you can group your findings by using Type Detected for Vulnerability and Sub Type for Misconfigurations.

Enter a search query for Vulnerabilities and and get the results of your findings. Then choose a Type Detected as Group by option from the drop-down.

New Group By Option for Vulnerabilities and Misconfigurations.

Enter a search query for Misconfigurations and and get the results of your findings. Then choose a Sub Type as Group by option from the drop-down.

Enter a search query for Misconfigurations.

API Features and Enhancements

With this release, we have introduced ETM Report APIs designed for asynchronous operations. For detailed information on APIs, refer to the ETM API Release Notes.