Enterprise TruRisk Management Release 1.8

March 27, 2026

Introduced TruConfirm

TruConfirm is a new automated exposure validation capability integrated directly into Qualys Enterprise TruRisk Management (ETM). It introduces a proof‑based approach to vulnerability risk. It confirms whether a detected vulnerability is truly exploitable in your environment, under your current controls and configurations. 

TruConfirm delivers evidence‑driven validation that helps security, IT, and compliance teams focus on exposures that present real, immediate risk. TruConfirm is available as part of Enterprise TruRisk Management and requires no separate deployment. 

Prerequisite

TruConfirm is available as a separate tab within the ETM user interface. To access it, connect with your Technical Account Manager (TAM) or Qualys support.

TruConfirm: Key Highlights

Following are the key highlights of TruConfirm:

Real Exploitability Validation

TruConfirm employs Modified Benign Payloads and safe, purpose‑built interactions to verify whether the vulnerable code path on an asset is reachable and executable. These payloads are not exploits and do not perform any harmful actions. Validation results classify each finding as:

  • Confirmed Exploitable: The vulnerable path is reachable.
  • Blocked by Control: Existing controls prevented execution.
  • Not Validated: No validation payload available or inconclusive results.

Fully Integrated with Enterprise TruRisk Management

TruConfirm is built natively into the Enterprise TruRisk Management platform and uses the existing Qualys collection framework. It does not require any separate infrastructure, agents, or standalone tools. Validation outcomes seamlessly feed into dashboards and Enterprise TruRisk Management workflows. This ensures consistent prioritization from detection through remediation.

Multi‑Source Validation Support

TruConfirm can validate exposure data from:

  • Qualys VMDR
  • Tenable.io and Tenable.sc
  • Rapid7 Insight VM
  • Microsoft Defender for Endpoint

The platform treats all findings imported into Enterprise TruRisk Management (ETM) as unvalidated until TruConfirm provides confirmation or evidence of blocking controls.

Safe for Production Environments

TruConfirm is designed with a safety‑first approach that ensures:

  • No exploit kits
  • No data extraction
  • No configuration changes
  • No bypassing of controls
  • Zero persistent footprint

All validations are performed using non‑intrusive interactions that are engineered to operate safely on live assets.

Coverage for High‑Impact CVEs 

TruConfirm supports validation for thousands of vulnerabilities. Coverage expands continuously through the Qualys research engine.

Enhanced TruLens 

This release introduces comprehensive threat intelligence and vulnerability management capabilities. These capabilities provide security teams with actionable insights into threats affecting their organizations.

Release highlights are:

  • Advanced threat actor profiling and intelligence
  • Comprehensive vulnerability management and tracking
  • Performance benchmarking against peer organizations
  • Geographic threat mapping: See where threats come from and how they affect your systems
  • Query Query Language support for advanced threat analysis
  • Industry-specific threat filtering and recommendations

TruLens is available as a separate tab within the Enterprise TruRisk Management (ETM) user interface. To access this tab, connect with your Technical Account Manager (TAM) or Qualys support.

Enhancements in User Interface

  • Streamlined navigation
    Navigation is now easier, with a consistent design across all pages to make the platform simpler to use.
  • Optimized query processing
    Query processing is now faster for both free-text and Query Language searches, so you get results more quickly and with less delay.
  • Enhanced geographic mapping
    Geographic mapping and asset impact visuals now include interactive features, allowing for deeper analysis.
  • Filtering Capabilities
    You can now use advanced filters, including Boolean operators and field-specific queries, for more precise threat analysis.
  • Logical organization
    Threat actor details, vulnerabilities, and remediation information are now organized more logically, making them easier to find.
  • Accessibility
    All pages now have better color contrast, easier keyboard navigation, and improved support for screen readers.

New Threat Actor Tab

We introduced a new Threat Actors tab. The Threat Actors tab provides a comprehensive view of threat actors relevant to your organization, tailored to your industry and environment. It helps you to identify which threat groups are most active, understand their attack patterns, and assess their potential impact on your assets. The threat actor system includes:

  • Threat actor identification and classification
  • Known aliases and alternate names
  • Geographic origin and targeting patterns
  • Industry sector specialization
  • Incident type classification (nation-state, criminal, espionage)
  • Recent campaign tracking and analysis

To access the Threat actors, go to TruLens > Threat Actors.

View Threat Actors page.

Threat Actor Detail Page

You can view the threat actors' details by clicking the name from Threat Actors. The details for each threat actor feature:

  • Comprehensive threat actor profiles
  • Associated vulnerabilities and exploits
  • MITRE ATT&CK Framework integration
  • Attack tactics and techniques
  • Known asset impact assessment
  • Recent Campaigns information

To view the Threat actor's details, go to TruLens > Threat Actors > select the threat.

View Threat Actors details page.

Performance Benchmarking Metrics on TruLens Home page

We enhanced the Performance & Benchmarking section. To view Performance & Benchmarking, go to TruLens > Overview. The following table explains the enhanced comparison:

Metric Updates include Benefit
Peer Comparison Peer Min, Median, Max Three-tier comparative analysis
Performance Status Color-coded classification Visual performance indicator
MTTR Display Color scale and message Contextual performance meaning
Benchmark Data Dynamic industry updates Current peer comparison data

The following screenshot displays the Peer & Performance Benchmarking section.

Introduced Tokens for TruLens Tab

We have introduced the following tokens:

Token

Tab

Description

finding.accessVector

TruLens > CVEs

Search for vulnerabilities based on how they can be exploited, as defined in the CVSS vector string.

finding.accessVector: ADJACENT_NETWORK

finding.cveDescription

TruLens > CVEs

Search for the finding with a matching CVE description.

finding.cveDescription: PX4 autopilot is a flight control solution for drones.

finding.cveId

TruLens > CVEs

Search for findings based on the CVE ID of the vulnerability.

finding.cveId: CVE-2026-32705

finding.cvePublishedDate

TruLens > CVEs

Search for findings by specifying a date or date range that matches when the CVE ID was published.

finding.cvePublishedDate: [2025-08-25 .. 2021-01-15]

finding.cveStatus

TruLens > CVEs

Search for findings with current lifecycle CVE statuses such as Analyzed, Awaiting Analysis, Deferred, Modified, Received, Rejected, or Undergoing Analysis.

finding.cveStatus: Undergoing Analysis

finding.cveTitle

TruLens > CVEs

Search the CVE details using the title.
finding.cveTitle: CVE-2026-32705

finding.cvss3BaseScore

TruLens > CVEs

Search for vulnerabilities with a specific CVSS 3.0 Base score.

finding.cvss3BaseScore: 9.1

finding.cvss4BaseScore

TruLens > CVEs

Search for vulnerabilities with a specific CVSS 4.0 Base score.

finding.cvss4BaseScore: 5.1

finding.isPatchAvailable

TruLens > CVEs

Search for vulnerabilities with available patches.

finding.isPatchAvailable: TRUE

finding.isQualysPatchable

TruLens > CVEs

Search for vulnerabilities that are patchable via Qualys.

finding.isQualysPatchable: TRUE

finding.qvss

TruLens > CVEs

Search for vulnerabilities based on a specific detection score.

finding.qvss: 8

finding.riskFactor.exploitCodeMaturity

TruLens > CVEs

Search for vulnerabilities based on the maturity level of their exploit code.

finding.riskFactor.exploitCodeMaturity: poc

finding.riskFactor.isActivelyExploited

TruLens > CVEs

Search for vulnerabilities that are currently being exploited in the wild.

finding.riskFactor.isActivelyExploited: TRUE

finding.riskFactor.isCisaKnownExploit

TruLens > CVEs

Search for vulnerabilities that are listed in CISA's Known Exploited Vulnerabilities Catalog.

finding.riskFactor.isCisaKnownExploit: TRUE

finding.riskFactor.rti

TruLens > CVEs

Search vulnerabilities based on Real-time Threat Indicators.

finding.riskFactor.rti: Easy_Exploit

finding.truConfirm.isApplicable

TruLens > CVEs

Search whether a TruConfirm assessment can be launched for the given CVE ID.

finding.truConfirm.isApplicable: TRUE

finding.mitre.attack.technique.id

TruLens > CVEs

TruLens > Threat Actors

Search for findings associated with MITRE ATT&CK using the MITRE ATT&CK technique ID.

finding.mitre.attack.technique.id: T1490

finding.mitre.attack.technique.name

TruLens > CVEs

TruLens > Threat Actors

Search for findings associated with MITRE ATT&CK using the MITRE ATT&CK technique name.

finding.mitre.attack.technique.name: Password Cracking

finding.riskFactor.threatActorName

TruLens > CVEs

TruLens > Threat Actors

Search for a threat actor by its primary, canonical name.

finding.riskFactor.threatActorName: APT29

finding.mitre.attack.tactic.name

TruLens > Threat Actors

Search for findings associated with MITRE ATT&CK using the MITRE ATT&CK tactic name.

finding.mitre.attack.tactic.name: Impact

finding.riskFactor.threatActorAlias

TruLens > Threat Actors

Search for a threat actor using any of its alternate names.

finding.riskFactor.threatActorAlias: Nobelium

finding.riskFactor.threatActorDescription

TruLens > Threat Actors

Search for details about the threat actor’s background, behavior, and known campaigns.

finding.riskFactor.threatActorDescription: MuddyWater is an Iranian threat group that has primarily targeted Middle Eastern nations

finding.riskFactor.threatActorIncidentType

TruLens > Threat Actors

Search for a threat actor by primary motivation or incident type.

finding.riskFactor.threatActorIncidentType: espionage

finding.riskFactor.threatActorIndustry

TruLens > Threat Actors

Search for threat actors based on the industry sectors they commonly target.

finding.riskFactor.threatActorIndustry: Healthcare

Introduced Exploitability and Exposure Metrics in CVE Details

We introduced a new card on the CVE Details page to provide insights into exploitability and exposure metrics. This enhancement helps security teams better understand attacker behavior and assess the effectiveness of their responses.

To view the CVE details, go to TruLens > CVEs > Select the required CVE.

The following are key benefits of explore matrics:

  • Understand attacker timelines with real-world exploit data
  • Measure remediation performance across assets
  • Identify exposure gaps and prioritize patching efforts
  • Improve risk posture with actionable metrics

The CVE Details page now includes a new section Remediation Efficiency Gap, which includes new metrics such as Window of Weaponization,  Average Window of Exposure, Exposure, and Gap.

Window of Weaponization (WOW)

The time taken by attackers to develop an exploit after a CVE is publicly disclosed. This is calculated as the number of days between CVE publication and the first known exploit availability.

The WOW can be:

  • Positive: Exploit created after disclosure
  • Negative: Exploit existed before public disclosure (indicating early attacker awareness)

The following is exmple of calculating  WOW:
If a CVE was published on May 12 and an exploit appeared on May 14, WOW is 2 days. And if an exploit occurred before publication, WOW is positive, as the exploit was created after disclosure.

Average Window of Exposure (AWE)

AWE is the average time taken to remediate (patch) affected assets in your environment. AWE is calculated across all impacted assets for a given CVE. It reflects how long systems remained vulnerable before being patched. If remediation is still in progress, the value is marked as OPEN, GROWING.

If multiple assets are patched over different durations, AWE represents the average remediation time.

Remediation Efficiency Gap (REG)

REG is a comparative metric showing how your remediation speed aligns with attacker activity.

REG Calculation:
REG = AWE − WOW

  • Positive REG indicates that attackers are faster, indicating a higher exposure risk
  • Negative REG indicates you are mitigating vulnerabilities faster than attackers can weaponize them

Gap (REG)

Gap (REG – Residual Exposure Gap) represents the time difference between when attackers are ready to exploit a vulnerability and when it is remediated in your environment, highlighting the period during which you are at active risk.

Exposure (AWE)

The Exposure represents the average duration your assets remain vulnerable before being remediated. For example, the following image displayed that your organization is taking approximately 10 months on average to fix vulnerabilities after they are disclosed. It reflects the time window during which your systems are exposed to potential exploitation.

View REG details.

Introduced Tag-based Widget

This release introduces the Tag-based Widget, a new visualization component that enables you to view and analyze security findings organized by tags.

Release highlights include:

  • Tag-based widget for dashboard analytics and reporting
  • Support parent-child tag relationships
  • Flexible column configuration for customized data display
  • Integration with access control to restrict data based on user permissions

To add the widget to your dashboard, navigate to Dashboard, click Add Widget, and then add Build your Widget.

Tags are now available as a new way to display results in the Table Widget. This lets you generate query results based on tags, including data for Asset Count, TruRisk™ Score, and Vulnerability Count. To create this widget, you must have Add Tag or Remove Tag permissions enabled from the Administration application.

View tag based asset.

Enhanced Sorting for Bar, Table, and Pie Widgets

We introduced improved sorting capabilities for widgets that support grouping by Criticality Score (ACS). This sorting is available for Bar, Table, and Pie widgets.

The following enhancements have been made:

  • Widgets of type Bar, Table, and Pie that use Group By: CriticalityScore now support sorting directly by Criticality Score.
  • A new Sort By Criticality Score (Descending) option has been added for these configurations.

Previously, Bar widgets were limited to sorting by count. This enhancement introduces criticality-based sorting for bar widgets, enabling more intuitive and security-focused data visualization. This enhancement enables:

  • Clearer prioritization of high-risk items
  • Improved readability of bar charts
  • Strengthened data analysis aligned with security criticality

You can edit your existing widget or select the Sort By option while creating a new Bar, Table, or Pie Widget.

To add the widget to your dashboard, navigate to Dashboard, click Add Widget, and then add Build your Widget. You can view the option in Query Settings.

View ACS sorting in widget.

Introduced AI-Generated Title Indicator for CVE Details

We introduced a visual indicator to highlight when a CVE title is generated using AI. The  icon is now displayed alongside the title on the CVE Details page. This icon signifies that the displayed title is generated using AI.

This enhancement improves transparency by clearly indicating the origin of the CVE title. You can quickly identify when AI-generated content is being used, helping them better assess and interpret the information.

Now you have greater clarity and trust in the displayed data, along with improved awareness of AI-assisted content within CVE analysis.

Introduced Tokens for Risk Management Tab

Token

Tab

Description

finding.truConfirm.isApplicable

Risk Management > All

Risk Management > Vulnerabilities

Search whether a TruConfirm assessment can be launched for the given CVE ID.

finding.truConfirm.isApplicable: TRUE

finding.truConfirm.status

Risk Management > All

Risk Management > Vulnerabilities

Select a TruConfirm status (for example, Exploitation Validated, Exploitation Ruled Out, Exploit Inconclusive, or Validation Available) to filter findings based on their TruConfirm assessment results.

finding.truConfirm.status: Exploit Inconclusive

finding.truConfirm.statusDate

Risk Management > All

Risk Management > Vulnerabilities

Search when the TruConfirm status was last updated for a finding. This timestamp reflects the completion of a TruConfirm scan and the subsequent pipeline update for the associated CVE ID.

finding.truConfirm.statusDate: [2025-01-01 .. 2025-01-15]

Introduced a New Token for Assets

Token

Tab

Description

asset.uid

  • Risk Management > All > Asset

  • Risk Management > Vulnerabilities > Asset

  • Risk Management > Misconfiguration > Asset

  • Risk Management > Risk Workbench > Prioritization > Assets

  • DashboardQuery Settings > Assets Query 

Search for assets by their unique identifier.

asset.uid"12345678"

Issues Addressed

There are no notable customer issues in this release.