Search Your Qualys Data in Splunk
Choose Search & Reporting on the Splunk Home page. Then enter your search query in the search field. Here are some sample search queries to get you started.
Most Prevalent Vulnerabilities
Hosts not Scanned in more than 30 days
Search Container Security Data
Search FIM Data for Events and Incidents
Search Secure Enterprise Mobility Data
Search Policy Compliance Reporting Service Data
Search Cyber Security Asset Management Data
Most Prevalent Vulnerabilities
Host Distribution by OS
Scan Volume
Hosts not Scanned in more than 30 days
Search Container Security Data
CS data is in JSON format. TA indexes CS events in a structured format. You can search the CS data in Splunk using DOT notation.
Use these event types to search for different types of container data: cs_image_info_event
to search for vulnerabilities of images, qualys_cs_container_details, qualys_cs_container_vuln to search for container data and qualys_cs_container_vuln_summary to search for container vulnerabilities.
For more information on creating search queries to filter CS data, refer to the Splunk Search Reference.
Sample JSON query to filter images matching a registry object in a repo list
Use search query eventtype="cs_image_info_event"
to filter the data.
Sample JSON query to search images with a specific vulnerability severity count
Use search query eventtype="cs_image_info_event" "vulnerabilities.severity2Count"="2"
to filter the data.
Sample JSON query to search vulnerabilities on running containers
Use search query eventtype=qualys_cs_container_vuln [search eventtype=qualys_cs_container_details state=RUNNING | dedup containerId | fields + containerId]
to filter the data.
You can use Debug option to view debug information for one or more data input parameters
Search FIM Data for Events and IncidentsSample query to search for FIM incidents
FIM events, Ignored events and incidents ingested in splunk can be searched using their eventtype. Further, user can search them using SPL of desired filters.
Here are some sample queries for searching FIM data in Splunk.
Sample query to search for FIM events
Use search query eventtype="qualys_fim_event"
to filter the data.
Sample query to search for FIM ignored events
Use search query eventtype="qualys_ignored_fim_event"
to filter the data.
Sample query to search for FIM incidents
Use search query eventtype="qualys_fim_incident"
to filter the data.
Search EDR Data
You can search for specific EDR events that TA has pulled in Splunk from your Qualys account.
Use eventtype="qualys_edr_event"
or create your own SPL search query to filter the data.
Search Activity Log Data
You can search for specific Activity Log events that TA has pulled in Splunk from your Qualys account.
Use eventtype="qualys_activity_log_event"
or create your own SPL search query to filter the data.
Search Secure Enterprise Mobility Data
You can search for specific Secure Enterprise Mobility (SEM) events that TA has pulled in Splunk from your Qualys account. Use eventtype=“qualys_sem_asset_summary_event” to fetch the asset information and eventtype=“qualys_sem_detection_event” to fetch the asset detection information. You can create your own SPL search query to filter the data.
The Sample search shows asset information for asset summary event.
Search Policy Compliance Reporting Service Data
You can search for specific Policy Compliance Reporting Service (PCRS) events that TA has pulled in Splunk from your Qualys account. Use eventtype="qualys_pcrs_posture_info_event" to fetch the number of posture events, eventtype="qualys_pcrs_policy_info_event" to fetch the policy information and eventtype="qualys_pcrs_policy_summary" to fetch the policy summary. You can create your own SPL search query to filter the data.
The sample search shows posture info event.
Sample search shows policy info event.
The sample search shows policy summary.
Search Cyber Security Asset Management Data
You can search for specific Cyber Security Asset Management (CSAM) assets that TA has pulled in Splunk from your Qualys account. Use foloowing event types
eventtype="qualys_csam_assets"
to fetch the asset data,
eventtype="qualys_csam_businessApps"
to business app data and
eventtype="qualys_csam_softwares"
to fetch the software data.
You can create your own SPL search query to filter the data.
The sample search shows CSAM assets.
The sample search shows CSAM software assets.
The sample search shows CSAM business application.
Search CertView Data
You can search for specific CertView data that TA has pulled in Splunk from your Qualys account.
Use the following event type
eventtype="qualys_certview_certificates"
to fetch the certificate information.
You can create your own SPL search query to filter the data.
The sample search shows Certview certificates.
Search TotalCloud Data
You can search for specific TotalCloud data that TA has pulled in Splunk from your Qualys account.
Use the following event types:
qualys_cspm_aws_postureInfo_event
"
to fetch the CSPM AWS data.
qualys_cspm_azure_postureInfo_event"
to fetch the CSPM Azure data.
qualys_cspm_gcp_postureInfo_event
"
to fetch the CSPM GCP data.
You can create your own SPL search query to filter the data.
The sample search shows the CSPM AWS Posture Info Events:
The sample search shows the CSPM Azure Posture Info Events:
The sample search shows the CSPM GCP Posture Info Events: