Reference: Option Profile

The <OptionProfile> element includes sub elements used to define an option profile. A reference of these elements is provided below. An asterisk * indicates a complex element.

Parameter

Mandatory

/Optional

Data Type

Description

id

Optional

integer

The ID of the option profile.

name

Optional

text

The name given to the option profile.

tags

Optional

 

Filter by tags applied.

tags.id

Optional

integer

ID of the tag assigned to option profile.

tags.name

Optional

text

Tag name assigned to option profile.

createdDate

Optional

date

The date when the option profile was created in WAS, in UTC date/time format.

updatedDate

Optional

date

The date when the option profile was updated in WAS, in UTC date/time format.

usedByWebApps

Optional

boolean

Web applications used/not used by the option profile.  

usedBySchedules

Optional

boolean

Scan schedules used/not used by the option profile.

owner.id

Optional

Long with operator: EQUALS, IN, NOT EQUALS, GREATER or LESSER

ID of the owner who created the option profile.

owner.name

Optional

text

Full name of the user who created the option profile.

owner.username

Optional text

Username of the owner who created the option profile. (like user_ab3).

isDefault

Optional  

Default option profile for the subscription

formSubmission

Optional keyword

Type of form: None, Post, Get, POST& GET

maxCrawlRequests

Optional  

Total number of links and forms to follow and test within the scan scope. If performing a Discovery Scan, this is the maximum links that will be crawled, as there will not be any testing  performed

userAgent

Optional  

Stores the browser and OS details.

parameterSet

Optional  

A parameter set tells us the request parameter settings you would like us to inject into your web applications during scanning. We provide a default one and it is easy to configure more. Once defined just select the parameter set name in your scan's option profile.

ignoreBinaryFiles

Optional  

If you choose these option files with extension zip, pdf, doc are not scanned.

performance

Optional keyword

Scan Intensity: LOWEST, LOW, MEDIUM, HIGH, MAXIMUM.

customPerformance*

Optional  

Configure the custom intensity level for web application scans.

Example:

<customPerformance>
     <numOfHttpThreads>10</numOfHttpThreads>
     <delayBetweenRequests>5</delayBetweenRequests>
</customPerformance>

Note: performance and customPerformance are mutually exclusive parameters and cannot be used together. You can use only either of them for an option profile.

numOfHttpThreads

Optional integer

Number of threads to be used to scan each host. The valid range is from 1 to 10.

delayBetweenRequests

Optional integer

The duration of delay introduced by WAS in between the scanning engine requests sent to the applications server. The valid range is from 0 to 2000 milliseconds.

bruteforceOption

Optional  

The level of brute forcing you prefer with options ranging from "Minimal" to "Exhaustive".

bruteforceList

Optional keyword: User List/SYSTEM LIST

System list: we'll attempt to guess the password for each detected login ID.

User list: to select a bruteforce list defined in your account .

numberOfAttempts

Optional  

The threshold to be reached before stopping the scan. If you deactivate this settings, the scan will keep running no matter how many errors it will find.

detection

Optional keyword

Select if scans launched with this profile shall perform a full assessment for all WAS detections the engine is able to discover, or if the scan shall focus on the detection of specific vulnerabilities and/or information: Core, Categories, Custom Search list, XSS Power Mode, Everything.

If <detectionScope> is present then the detection scope = CORE or EVERYTHING
Core: Core scope includes vulnerabilities that Qualys considers most common in today's web applications. It does not include all the vulnerabilities that WAS can detect.
Everything: Everything scope includes all the vulnerabilities that WAS can detect.
Example:

<detection>
<detectionScope>EVERYTHING</detectionScope>
</detection>

 If <includedSearchLists> or <excludedSearchLists> are present then the detection scope = CUSTOM

 If <detectionCategories> is present then the detection scope = CATEGORY

 if <xssPowerMode> is true then the detection scope = XSS

Note: The <includedSearchLists>, <excludedSearchLists>, <detectionCategories>, <xssPowerMode>, <detectionScope> elements are mutually exclusive elements.

sensitiveContent

Optional  

Credit Card Numbers, Social Security Numbers (US), Custom Contents.

keywordsUrlSearch

Optional text

Specify keywords in the form of strings and regular expressions to search for URL links that contains the specified keyword. Currently, we search for keywords only in the internal links that are found in the crawling phase for target web applications in a Discovery/Vulnerability scan.

You can enter a maximum of 10 keywords where each keyword appears on a separate line. A keyword should be 5 to 200 characters long.

During a Discovery/Vulnerability scan, we search for these keywords in the internal links and report all the unique links that contain the specified keywords in the Get Finding Details API output under information gathered QID 150141. Note that we show the crawled links under QID 150009.

enhancedCrawling

Optional boolean

Improve scan coverage for your web application with the enhanced crawling enabled. We will re-crawl individual directories present in the links which are found during crawling.

For example, if the following link is found during crawling:

https://www.example.com/foo/abc/xyz/register.php

If the enhanced crawling is enabled, it will first make a request to https://www.example.com/foo/abc/xyz

and will then remove the directory "xyz/" from the URL and crawl, https://www.example.com/foo/abc/  

and later it will further remove "abc/" and will crawl https://www.example.com/foo/.

All the links found during this process of removal and re-crawling will get added to the crawl queue thus improving the scan coverage.

comments

Optional  

User-defined comments.