The Dissolvable Agent (Agent) is a small executable that is pushed to a Windows system during a scan and automatically removed when the last scan of the asset is complete. The Dissolvable agent size is about 200K, and the time to upload and launch has a negligible impact on the overall scan duration.
- The agent is deployed only if the manager installs the dissolvable agent by navigating to Scans > Setup > Dissolvable Agent.
Note: If you are not able to view or do not have access to the Dissolvable Agent setup, then contact your subscription's primary contact.
The Dissolvable Agent Setup is displayed. Click Accept.
- Once accepted, any user with scan permissions can enable the dissolvable agent for their scans by selecting Enable the Dissolvable Agent in their option profile (under Scans > Option Profiles).
Notes:
Vulnerability scans: Windows Share Enumeration
Compliance scans: Windows Share Enumeration | Password Auditing | Detailed Security Auditing for Windows Vista, 7 and 2008
The Agent is required for certain Windows User-Defined Controls, including File Integrity Check, Directory Integrity Check, Directory Search, Registry Key Existence, Registry Value Existence, Registry Value Content Check and Registry Permission Control.
At scan time the Agent is installed on Windows devices to collect data, and once the scan is complete the Agent removes itself completely from target systems. All traces of the Agent are removed automatically when the scan on the host is complete, including removal of the temporary directory.
The Agent is temporarily stored in one of these directories, depending on the OS configuration and CPU of the machine.
32-bit Windows on x86 CPU or 64-bit Windows on IA64 CPU (Itanium):
%windir%\System32\Qualys
64-bit Windows (AMD CPU):
%windir%\SysWOW64\Qualys
The Agent collects information that is securely transmitted to the scanner appliance using a cryptographically secure protocol. The information is encrypted and integrity-protected and is not stored on the scanner appliance except in memory while the information is processed. The information is discarded securely as soon as it is no longer needed.