Welcome to

Vulnerability Management, Detection and Response (VMDR) Help

With Qualys VMDR, you can easily perform Vulnerability Management, Detection and Response. VMDR enables you to discover, assess, prioritize, and identify patches for critical vulnerabilities in real time and across your global hybrid-IT landscape all in one solution.

What Is VMDR

Vulnerability Management, Detection and Response (VMDR) enables you to discover, assess, prioritize, and identify patches for critical vulnerabilities in real time and across your global hybrid-IT landscape all in one solution. It combines asset inventory, vulnerability and configuration assessment, threat risk and prioritization, and patch detection to ensure comprehensive visibility and a remediation strategy prioritized based on context.

VMDR starts with asset discovery and inventory to make sure you have an accurate account of all devices in your environment. It performs continuous vulnerability assessments with cloud agents and a variety of sensors and leverages artificial intelligence to instantly assess and prioritize threats based on relevant context.

How Does VMDR Work 

Key Features of VMDR

TruRiskTM

⟳

TruRiskâ„¢ analyzes vulnerability location, asset criticality, and the potential business impact of a compromise to help prioritize risk effectively.

Learn More →

Mitigation

⟳

Mitigation provides enhanced visibility into vulnerability remediation strategies, empowering teams to address CISA Known Exploited Vulnerabilities (KEVs).

Learn More →

MITRE ATT&CK Matrix

⟳

MITRE Adversarial Tactics, Techniques, and Common Knowledge framework enhances your organization's network security using a standardized matrix.

Learn More →

Threat Intelligence

⟳

Threat Intelligence provides visibility into emerging cyber threats, allowing you to focus remediation efforts where they matter most.

Learn More →

VMDR Journey: From Discovery to Remediation

      Identify      Assets

      Manage     Assets

Configure Scans

Assess Environment

Prioritize Vulnerabilities

Remediate Vulnerabilities

Generate Reports

Response and Alerts

How do I Get Started with VMDR

Prerequisites (User Roles and Permissions)

Before using VMDR, ensure the application is enabled for your subscription and your user account has the appropriate role and access permissions.

Learn More →

Support Prioritization using TruRisk™ 

VMDR supports prioritization to review vulnerabilities by risk score and focus efforts on the highest business-impact threats.

Learn More →

Qualys TruRisk™ and Mitigate

Measure the likelihood of vulnerability exploitation using Qualys TruRiskâ„¢, powered by QVS and QDS.
Use Mitigate to gain visibility into remediation strategies and proactively address CISA Known Exploited Vulnerabilities(KEVs).

Learn More →

VM and PA APIs

Get started with VM and PA APIs to integrate third-party applications with Qualys cloud security and compliance solutions using an extensible XML interface.

Learn More →

Get Started Now →

Looking for something else

Get the most out of your Qualys VMDR with these helpful resources.

Training Videos Knowledge Base Articles Blogs SupportWebinars Product Tours