Your VM/VMDR Dashboard
For subscriptions upgraded to VMDR
When your account is upgraded to VMDR, click the Dashboard option on the top menu and you’ll get the new VMDR Dashboard. This replaces the Classic UI Dashboard in VM.
Want to go back to the Classic UI? No problem. Simply click the “Go back to Classic UI” link and you’ll get your old dashboard back. This option is only available for accounts that were upgraded from VM to VMDR, not new accounts.
New VM/VMDR accounts get the VMDR dashboard by default.
For subscriptions without VMDR
Go to VM > Dashboard. You'll see the classic VM dashboard with a summary of your overall security posture based on the most recent vulnerability scan results.
How do I configure the dashboard?
Click the Configure link to select the vulnerabilities and potential vulnerabilities you’re interested in. (Note that disabled and ignored vulnerabilities are not included in your dashboard.) Learn more
How often is the dashboard updated?
It's updated automatically as new scan results become available. You might want to start a scan from here (if you have scanning permissions). This is a convenient way to get the latest vulnerability data in your dashboard view.
Customizable dynamic dashboards
Dashboards help you visualize your assets, see your threat exposure, leverage saved searches, and fix the priority of vulnerabilities quickly.
We have integrated Unified Dashboard (UD) with VMDR. UD brings information from all Qualys applications into a single place for visualization. UD provides a powerful new dashboard framework along with platform service that will be consumed and used by all other products to enhance the existing dashboard capabilities.
You can use the default VMDR dashboard provided by Qualys or easily configure widgets to pull information from other modules/applications and add them to your dashboard. You can also add as many dashboards as you like to customize your vulnerability posture view. Learn more.
Learn more about the classic dashboard
Tell me about the counts for New, Active, Reopened
Tell me about the Vulnerabilities by severity graph
What are the Top 10 vulnerabilities?
What are the Most Vulnerable Hosts?