Policy Audit Release 1.4
October 23, 2025
Upgrade to Policy Audit - Update
All users are to be upgraded from Policy Compliance to Policy Audit by default on 18th January 2026.
With Policy Audit, you can handle complex audits more effectively through continuous monitoring, risk-based insights, and (with the add-on) automated remediation workflows, all within a single platform.
As part of this transition, when you log into your Policy Compliance, you will see a prompt explaining the upgrade to Policy Audit and the What's New section listing the features of Policy Audit.

If you are already using Policy Audit, you will see a prompt with the What’s New section and a reminder of the maximum time available to switch back to Policy Compliance is until 18th January 2026.

For more information and updates on the transition, refer to our blog for updates.
Improved Merging of Agent and Scan Data
With this release, we have introduced a new option Agent Correlation Identifier to address the issue of duplicate records being created during compliance scans, especially for databases. On selecting this option, merging of agent and scan data is ensured, thereby, avoiding duplicate host entries.
Previously, it was observed that duplicate records were being created for the same host when running compliance scans. This was because agent merging was only supported for Unix and Windows authentication records and did not apply to databases.
To enable Agent Correlation Identifier for your account, navigate to Assets > Setup > Asset Tracking & Data Merging > Unique Asset Identifiers > Select Accept Agentless Tracking Identifier.

To access the Agent Correlation Identifier, navigate to Scans > Option Profiles > New > Compliance Profile > Additional.

It is preferred to add the same ports as mentioned in the Cloud Agent Configuration Profile. You can view the ports in the Configuration Profile of Cloud Agent (Cloud Agent > Configuration Profiles > New Profile > Agent Scan Merge in the left pane > Enable the Agent Scan Merge).
A maximum of 5 ports can be entered. If more than 5 ports are entered, an error is displayed.

You can even edit an existing compliance profile to enable the Agent Correlation Identifier, by navigating to Scans > Option Profiles > for a compliance profile, select Quick Actions > Edit > Additional.

To view the existing Agent Correlation Identifier details for a compliance profile, navigate to, Scans > Option Profiles > for a compliance profile, select Quick Actions > Info > Additional.

By default, the correlation uses ports 10001 to 10005. You can enable the Agent Correlation Identifier checkbox to edit these ports.
View Source for Host in Posture Tab
With this release, we have added a new column Source in the Posture tab. This column identifies whether the scanned host was a scanner or an agent. This enhancement provides clarity when multiple scan sources are associated with the same host.
Previously, when a host had the same Host ID with different scan sources (agent and scanner), the system updated the Last Scanned Date for all controls whenever any scan was performed. This created confusion, as the updated date did not correspond to the scan type they initiated. There had no direct way to identify whether a control was evaluated by an agent or scanner.
Thus, the addition of the Source column helps clear this confusion by identifying the type of scan sources (agent or scanner). To view the Source column, navigate to the Posture tab. The
indicates agent and the
indicated scanner.

You can also view the Source column in the downloaded version of the host details. To download a particular authentication report, navigate to Posture > Download.

To enable the Source column for your account, contact Qualys Support or Technical Account Manager (TAM)
Timeframe Selection of Report Template in CSV Format
With this release, we have introduced Timeframe Selection for compliance policy report templates downloaded in CSV format. When creating or editing a template, you can now specify a timeframe so that reports (in CSV format) include only hosts scanned within that period.
Previously, reports in CSV formats often included outdated data, such as legacy technologies, non-evaluated policy controls, and decommissioned databases, which were no longer relevant. This enhancement ensures more accurate and up-to-date reporting by allowing you to filter results based on the selected timeframe.
You can add a timeframe for CSV format reports by navigating to the Timeframe Selection section, go to Reports > Templates > New > Policy Template > Layout > Timeframe Selection.

Similarly, you can add a timeframe for CSV format report for an existing report template, by navigating to Reports > Templates > Select the report template > Quick Actions > Edit > Layout > Timeframe Selection.

You can also view the timeframe details for a report templates by navigating to Reports > Templates > Select the report template > Quick Actions > Info > Display Setting.

Support for New Authentication Technologies
With this release, we have added support for the following new technologies:
Oracle Directory Server
With this release, Oracle Directory Server 11.1.1.7 technology is supported for Policy Audit authenticated scans using scanners and agents. This technology is now available for use at the following places, at both the scanner and the agent:
- Policy Editor
When you create or edit a policy compliance, Oracle Directory Server is now available in the list of supported technologies.
- Search Controls
When you search controls, you see Oracle Directory Server in the list of technologies. Go to Policies > Controls > search and select Oracle Directory Server in the list.
- Authentication Report
To display all OS authentication-based instance technologies per host, including Oracle Directory Server, in your authentication report, go to Reports > New > Compliance Report > Authentication Report and under Appendix, enable OS Authentication-based Technology option.

Scroll down to the Appendix section of your authentication report to view Oracle Directory Server mentioned under Targets with OS authentication-based technologies.
- Option Profile
Make sure you have enabled the OS Authentication-based Technology option. Under Scans, select Option Profiles > New > Compliance Profile > Instance Data Collection. Oracle Directory Server Enterprise is available under Application and Other Technologies.
- Scan Results
Oracle Directory Server is now listed under Application technologies found based on OS-level authentication in the Appendix section of a compliance scan result.
Middleware Asset
If you are using Cloud Agent for Policy Compliance (PC), the Cloud Agent auto-discovers Oracle Directory Server. When an agent scan detects an Oracle Directory on a host, it is displayed on the PC > Assets > Middleware Assets.
Sample Report
The sample report displays the tracking method and the instances for the scanner and the agent.
- Scanner
In Compliance Reports, you can view the instances of Oracle Directory Server for scanned hosts. The sample report displays the scanner's tracking method as IP with an instance of Oracle Directory Server.
- Agent
In Compliance Reports, you can view the instances of Oracle Directory Server for scanned hosts. The sample report displays the tracking method for the agent as AGENT with an instance of Oracle Directory Server.
Confluent Kafka
With this release, Confluent Kafka 7.x technology is supported for Policy Audit authenticated scans using scanners and agents. This technology is now available for use at the following places, at both the scanner and the agent:
- Policy Editor
When you create or edit a policy compliance, Confluent Kafka is now available in the list of supported technologies.
- Search Controls
When you search controls, you see Confluent Kafka in the list of technologies. Go to Policies > Controls > search and select Confluent Kafka in the list.
- Authentication Report
To display all OS authentication-based instance technologies per host, including Confluent, in your authentication report, go to Reports > New > Compliance Report > Authentication Report and under Appendix, enable OS Authentication-based Technology option.

Scroll down to the Appendix section of your authentication report to view Confluent mentioned under Targets with OS authentication-based technologies.
- Option Profile
Make sure you have enabled the OS Authentication-based Technology option. Under Scans, select Option Profiles > New > Compliance Profile > Instance Data Collection. Confluent is available under Application and Other Technologies.
- Scan Results
Confluent is now listed under Application technologies found based on OS-level authentication in the Appendix section of a compliance scan result.
Middleware Asset
If you are using Cloud Agent for Policy Audit (PA), the Cloud Agent auto-discovers Confluent. When an agent scan detects a Confluent on a host, it is displayed on the PC > Assets > Middleware Assets.
Sample Report
The sample report displays the tracking method and the instances for the scanner and the agent.
- Scanner
In Compliance Reports, you can view the instances of Confluent for scanned hosts. The sample report displays the scanner's tracking method as IP with an instance of Confluent.
- Agent
In Compliance Reports, you can view the instances of Confluent for scanned hosts. The sample report displays the tracking method for the agent as AGENT with an instance of Confluent.
Red Hat Enterprise Linux 10.x
With this release, Red Hat Enterprise Linux 10.x technology is supported for Policy Audit authenticated scans using scanners. This technology is now available for use at the following places, at both the scanner and the agent:
- Policy Editor
When you create or edit a policy compliance, Red Hat Enterprise Linux 10.xis now available in the list of supported technologies.
- Search Controls
When you search controls, you see Red Hat Enterprise Linux 10.x in the list of technologies. Go to Policies > Controls > search and select Red Hat Enterprise Linux 10.x in the list.
- Authentication Report
To display all OS authentication in your authentication report, go to Reports > New > Compliance Reports. Click Run to generate the authentication report.,
- Scan Results
Red Hat Enterprise Linux 10.x is now listed under Application technologies found based on OS-level authentication in the Appendix section of a compliance scan result.

- Sample Report
In Compliance Reports, you can view the instances of Red Hat Enterprise Linux 10.x for scanned hosts.
Script Based UDC Support for Windows 2008 Server
We have added Script based User Defined Control (UDC) technology support for Windows 2008 Server. You can now create a new UDC where you can select and use Windows 2008 Server under Control Technologies.
The basic flow to create a User Defined Control (UDC) for Windows 2008 Server using the new control technology support is as follows:
- Navigate to Policies > Controls. Here, we provide many controls for you to choose from and create your own UDCs.
- Click New > Controls > UDC.
The New Control window is displayed. - In the left pane, select Windows Control Types.
- Select Script Result Check (Agent Only) control type from Windows Control Types list.

Script Result Check window is displayed. - Under Control Information, select Windows 2008 Server from the list and provide the mandatory information.
- Click Create.
Script based UDC for Windows 2008 Server is created.
Support for New Operators in asset.compliance.score Token
With this release, we have added support for the operators >, >=, <, and <= for the QQL token asset.compliance.score. These operators were previously not available for this token.
For example,
asset.compliance.score:80 - The search result displays findings with this compliance score.
asset.compliance.score > 60.55 - The search result displays list of assets that have compliance score field value higher than 60.55
asset.compliance.score >= 60.55 - The search result displays list assets that have compliance score field value higher than or equal to 60.55
asset.compliance.score < 60.55 - The search result displays list of assets that have compliance score field value less than 60.55
asset.compliance.score <= 60.55 - The search result displays list of assets that have compliance score field value less than or equal to 60.55
The description for the QQL token has also been updated to include examples for all supported operators. This enhancement allows you to perform more operations using the asset.compliance.score token.

Issues Addressed
The following reported and notable customer issues are fixed in this release:
| Component/Category | Application |
Description |
| PA / PC - Reports | Policy Compliance | When users generated the Policy Compliance Report for PA/PC and SCA accounts, the data for non-SCA controls (6399) was not displayed in the report, even though it was available in the Posture tab. Relevant code changes have been made to fix the issue, and now, consistent data is visible in both the report and the Posture tab. |
| PA / PC - Middleware | Policy Audit / Policy Compliance | When the user performed a middleware scan where no technologies were detected via the agent, the COMPLIANCE tag was not included in the scan results. Relevant code changes have been made to fix the issue. After the fix, scan processing continues even when the COMPLIANCE tag is missing in middleware scans. |
| PA / PC - Middleware | Policy Audit / Policy Compliance | When the user scanned newer middleware technologies such as IBM WebSphere Liberty 24, it is observed that these were not registered in the internal lookup table used for identifying technologies eligible for deletion. Due to this, the data deletion process could not happen for these technologies. Relevant code changes have been made to fix the issue. |