QVM User Guide
QVM User Guide
Version 7.2.4
User Guide
Note
Before using this information and the product that it supports, read the information in Notices on page 83.
Product information
This document applies to IBM QRadar Security Intelligence Platform V7.2.4 and subsequent releases unless
superseded by an updated version of this document.
Copyright IBM Corporation 2012, 2014.
US Government Users Restricted Rights Use, duplication or disclosure restricted by GSA ADP Schedule Contract
with IBM Corp.
Contents
Introduction to IBM Security QRadar Vulnerability Manager . . . . . . . . . . . . . vii
Chapter 1. What's new for users in QRadar Vulnerability Manager V7.2.4. . . . . . . . 1
Chapter 2. QRadar Vulnerability Manager installations and deployments . . . . . . . . 3
Vulnerability processor and scanner appliance activation keys . . . . . . . . .
Vulnerability backup and recovery . . . . . . . . . . . . . . . . . .
Options for moving the vulnerability processor in your QRadar Vulnerability Manager
Deploying a dedicated QRadar Vulnerability Manager processor appliance . . .
Moving your vulnerability processor to a managed host or console . . . . . .
Verifying that a vulnerability processor is deployed . . . . . . . . . . .
Removing a vulnerability processor from your console or managed host . . . .
Options for adding scanners to your QRadar Vulnerability Manager deployment . .
Deploying a dedicated QRadar Vulnerability Manager scanner appliance . . . .
Deploying a vulnerability scanner to a QRadar console or managed host . . . .
Scanning the assets in your DMZ . . . . . . . . . . . . . . . . .
Verifying that a vulnerability scanner is added to your deployment. . . . . .
Supported web browsers . . . . . . . . . . . . . . . . . . . .
Supported web browsers . . . . . . . . . . . . . . . . . . . .
. . . . .
. . . . .
deployment .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 4
. 4
. 5
. 5
. 6
. 7
. 7
. 7
. 8
. 9
. 10
. 11
. 11
. 12
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
15
16
16
16
17
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
19
19
20
21
21
22
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
23
24
24
25
26
26
27
28
28
29
29
31
31
31
32
33
34
35
iii
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
36
37
38
39
45
45
46
46
46
47
48
48
49
49
. .
. .
. .
. .
. .
. .
. .
start
. . .
. . .
. . .
. . .
. . .
. . .
. . .
and stop
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
51
52
52
53
53
54
54
54
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
57
57
58
59
61
61
62
62
62
63
63
63
64
65
66
66
67
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 69
. 70
. 70
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 71
. 71
. 73
. . . . . . . . . . . . . . . . . . . . . . . . 75
iv
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
75
75
77
77
77
. 78
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
81
81
82
82
Notices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Trademarks . . . . . .
Privacy policy considerations
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 84
. 85
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
A.
C.
D.
E.
F.
H.
I .
N.
O.
P.
R.
S.
T.
U.
V.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
87
87
87
87
87
87
88
88
88
88
88
88
88
88
89
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Contents
vi
Intended audience
System administrators responsible for configuring IBM Security QRadar
Vulnerability Manager must have administrative access to IBM Security QRadar
SIEM and to your network devices and firewalls. The system administrator must
have knowledge of your corporate network and networking technologies.
Technical documentation
For information about how to access more technical documentation, technical
notes, and release notes, see Accessing IBM Security Documentation Technical Note
(http://www.ibm.com/support/docview.wss?rs=0&uid=swg21612861).
vii
viii
Learn more...
Learn more...
Learn more...
Ensure that following applications are installed on all desktop systems that you
use to access the QRadar product user interface:
v Java Runtime Environment (JRE) version 1.7 or IBM 64-bit Runtime
Environment for Java V7.0
v Adobe Flash version 10.x
For more information about the deployment editor, see the Administration Guide for
your product.
Related concepts:
Options for adding scanners to your QRadar Vulnerability Manager deployment
on page 7
If you have a large network and require flexible scanning options, you can add
more scanners to your IBM Security QRadar Vulnerability Manager deployment.
Options for moving the vulnerability processor in your QRadar Vulnerability
Manager deployment on page 5
If required, you can move the vulnerability processor from your QRadar console to
a dedicated QRadar Vulnerability Manager managed host appliance.
For more information about vulnerability backup and recovery, see the
Administration Guide for your product.
Procedure
1. Click the Admin tab.
2. On toolbar, click Deployment Editor.
3. From the menu, select Actions > Add a Managed Host.
In the managed host wizard, ensure that you select the IP address of the
QRadar Vulnerability Manager managed host processor appliance.
You must wait several minutes while the managed host is added.
4. In the Validation Error window, select the QRadar Vulnerability Manager
managed host processor and click OK.
5. Click Yes.
6. In the deployment editor menu, select File > Save and close.
7. On the Admin tab toolbar, select Advanced > Deploy Full Configuration.
8. Click OK.
Related concepts:
Vulnerability processor and scanner appliance activation keys on page 4
You can scan and process your vulnerabilities by using dedicated QRadar
Vulnerability Manager managed host appliances.
Related tasks:
Verifying that a vulnerability processor is deployed on page 7
In IBM Security QRadar Vulnerability Manager, you can verify that your
vulnerability processor is deployed on a QRadar console or QRadar Vulnerability
Manager managed host.
Procedure
1. Click the Admin tab.
2. On the toolbar, click Deployment Editor.
3. Click the Vulnerability View tab.
4. In the Vulnerability Components pane click QVM Processor.
5. Type a memorable name for the QVM Processor that you want to add, then
follow the instructions in the user interface and click Next.
6. In the Adding a new component window, ensure that you select the host for
the console or managed host appliance.
If your processor is on the managed host, you can select only the QRadar
console.
Procedure
1. Log in to the QRadar console.
2. On the Admin tab, click the Deployment Editor.
3. Select the Vulnerability View tab.
4. Verify that the QVM Processor is displayed in the Vulnerability View pane.
Procedure
1.
2.
3.
4.
of your scanning operations. For example, you can scan specific areas of your
network with different scanners and at different scheduled times.
Procedure
1. Click the Admin tab.
2. On the toolbar, click Deployment Editor.
3. From the menu, select Actions > Add a managed host.
In the managed host wizard, ensure that you select the IP address of the
QRadar Vulnerability Manager managed host scanner appliance.
You must wait several minutes while the deployment saves.
4. At the Adding Managed Host dialog box, click OK.
5. From the deployment editor menu, select File > Save and close.
6. On the Admin tab toolbar, select Advanced > Deploy Full Configuration..
7. Click OK.
Related concepts:
Vulnerability processor and scanner appliance activation keys on page 4
You can scan and process your vulnerabilities by using dedicated QRadar
Vulnerability Manager managed host appliances.
Related tasks:
Verifying that a vulnerability scanner is added to your deployment on page 11
Use QRadar Vulnerability Manager to verify that a vulnerability scanner is added
to your deployment.
Procedure
1. On the Admin tab, click Deployment Editor.
2. Select the Vulnerability View tab.
3. On the Vulnerability Components pane, click QVM Scanner.
4. Type a unique name for the QVM Scanner that you want to add.
Restriction: The name can be up to 20 characters in length and can include
underscores or hyphens.
5. Click Next.
Chapter 2. QRadar Vulnerability Manager installations and deployments
6. From the Select a host list box, select the IP address of the QRadar managed
host or console.
Restriction: You cannot add a scanner to a QRadar console when the
vulnerability processor is on the console. You must move the vulnerability
processor to a QRadar Vulnerability Manager managed host.
7.
8.
9.
10.
11.
Click Next.
Click Finish.
From the deployment editor menu, select File > Save and close.
On the Admin tab toolbar, select Advanced > Deploy Full Configuration..
Click OK.
What to do next
Run an automatic update after you add the scanner or other managed host with
scanning capabilities. Alternatively, you can scan after the default daily scheduled
automatic update runs.
Related tasks:
Moving your vulnerability processor to a managed host or console on page 6
If required, you can move your vulnerability processor between a QRadar
Vulnerability Manager managed host appliance and your QRadar console.
Verifying that a vulnerability scanner is added to your deployment on page 11
Use QRadar Vulnerability Manager to verify that a vulnerability scanner is added
to your deployment.
Procedure
1. Configure your network and assets for external scans.
2. Configure QRadar Vulnerability Manager to scan your external assets.
Procedure
1. Configure outbound internet access on port 443.
2. Send the following information to QRadar-QVM-HostedScanner@hursley.ibm.com:
v Your organization's external IP address.
Restriction: The IP address must be configured before you can run external
scans.
10
Procedure
1.
2.
3.
4.
5. Click Next.
6. Type your external IP address and click Next.
Restriction: You cannot scan external assets until your external IP address is
configured. Ensure that you email details of your external IP address to IBM.
7. Optional: If your network is configured to use a proxy server, then type the
details of your server, then click Next.
8.
9.
10.
11.
Click Finish.
From the deployment editor menu, select File > Save and close.
On the Admin tab toolbar, select Advanced > Deploy Full Configuration.
Click OK.
Procedure
1. Click the Vulnerabilities tab.
2. On the navigation menu, select Administrative > Scan Profiles.
3. On the toolbar, click Actions > Create.
4. In the Details tab, click the Scan Server list and ensure that your scanner is
displayed.
If the scanner is not listed, open the deployment editor and verify that you
added the scanner.
11
Supported versions
Mozilla Firefox
9.0
Google Chrome
10.0
Procedure
1. In your Internet Explorer web browser, press F12 to open the Developer Tools
window.
2. Click Browser Mode and select the version of your web browser.
3. Click Document Mode.
v For Internet Explorer V9.0, select Internet Explorer 9 standards.
v For Internet Explorer V10.0, select Internet Explorer 10 standards.
Supported versions
Mozilla Firefox
9.0
Google Chrome
10.0
Procedure
1. In your Internet Explorer web browser, press F12 to open the Developer Tools
window.
12
2. Click Browser Mode and select the version of your web browser.
3. Click Document Mode.
v For Internet Explorer V9.0, select Internet Explorer 9 standards.
v For Internet Explorer V10.0, select Internet Explorer 10 standards.
13
14
Vulnerability scanning
In IBM Security QRadar Vulnerability Manager, vulnerability scanning is controlled
by configuring scan profiles. Each scan profile specifies the assets that you want to
scan and the scan schedule.
Vulnerability processor
When you license QRadar Vulnerability Manager, a vulnerability processor is
automatically deployed on your QRadar console. The processor contains a QRadar
Vulnerability Manager scanning component.
Deployment options
Vulnerability scanning can be deployed in different ways. For example, you can
deploy your scanning capability to a QRadar Vulnerability Manager managed host
scanner appliance or a QRadar managed host.
Configuration options
Administrators can configure scans in the following ways:
v Schedule scans to run at times convenient for your network assets.
v Specify the times during which scans are not allowed to run.
v Specify the assets that you want to exclude from scans, either globally or for
each scan.
v Configure authenticated patch scans for Linux, UNIX, or Windows operating
systems.
15
v Configure different scanning protocols or specify the port ranges that you want
to scan.
Related concepts:
Options for adding scanners to your QRadar Vulnerability Manager deployment
on page 7
If you have a large network and require flexible scanning options, you can add
more scanners to your IBM Security QRadar Vulnerability Manager deployment.
Options for moving the vulnerability processor in your QRadar Vulnerability
Manager deployment on page 5
If required, you can move the vulnerability processor from your QRadar console to
a dedicated QRadar Vulnerability Manager managed host appliance.
Procedure
1. Click the Dashboard tab.
2. On the toolbar, in the Show Dashboard list, select Vulnerability Management.
Procedure
1.
2.
3.
4.
5.
16
Procedure
1. Click the Dashboard tab.
2. On the toolbar, click New Dashboard.
3. Type a name and description for your vulnerability dashboard.
4. Click OK.
5. On the toolbar, select Add Item > Vulnerability Management > Vulnerability
Searches and choose the default saved search that you want to show on your
dashboard.
6. On the header of the new dashboard item, click the yellow Settings icon.
7. Select Patch from the Group By list and then select one of the following
options from the Graph By list:
v If you want to see how many assets need to a have the patch applied, select
Asset Count.
v If you want to see the cumulative risk score by patch, select Risk Score.
v If you want to see the number of vulnerabilities that are covered by a patch,
select Vulnerability Count.
8. Click Save.
9. To view vulnerability details on the Manage Vulnerabilities > By Vulnerability
page on the Vulnerabilities tab, click the View in By Vulnerability link at the
bottom of the dashboard item.
17
18
19
Integration components
A typical QRadar Vulnerability Manager IBM Endpoint Manager integration
consists of the following components:
v An IBM Security QRadar console.
v A licensed installation of QRadar Vulnerability Manager.
v An IBM Endpoint Manager server installation.
v An IBM Endpoint Manager agent installation on each of the scan targets in your
network.
Vulnerability remediation
Depending on whether you installed and integrated IBM Endpoint Manager,
QRadar Vulnerability Manager provides different information to help you
remediate your vulnerabilities.
v If IBM Endpoint Manager is not installed, then QRadar Vulnerability Manager
provides information about vulnerabilities for which a fix is available.
QRadar Vulnerability Manager maintains a list of vulnerability fix information.
Fix information is correlated against the known vulnerability catalog.
Using the QRadar Vulnerability Manager search feature, you can identify
vulnerabilities that have an available fix.
v If IBM Endpoint Manager is installed, then QRadar Vulnerability Manager also
provides specific details about the vulnerability fix process. For example, a fix
might be scheduled or an asset might be already fixed.
The IBM Endpoint Manager server gathers fix information from each of the IBM
Endpoint Manager agents. Fix status information is transmitted to QRadar
Vulnerability Manager at pre-configured time intervals.
Using the QRadar Vulnerability Manager search feature, you can quickly identify
those vulnerabilities that are scheduled to be fixed or are already fixed.
Related tasks:
Identifying the patch status of your vulnerabilities on page 67
In IBM Security QRadar Vulnerability Manager, you can identify the patch status
of your vulnerabilities.
Procedure
1. To download the public key certificate, open your web browser and type
https://IP address/webreports.
Remember: The IP address is the IP address of your IBM Endpoint Manager
server.
2. Click Add Exception.
3.
4.
5.
6.
7.
20
Procedure
1. Using SSH, log in to the IBM Security QRadar SIEM console as the root user.
2. Change directory to following location:
/opt/qvm/iem
3. To configure the QRadar Vulnerability Manager IBM Endpoint Manager
adapter, type the following commands:
a. Type ./iem-setup-webreports.pl
b. Type the IP address of the IBM Endpoint Manager server.
c. Type the User name of the IBM Endpoint Manager server.
d. Type the Password of the IBM Endpoint Manager server.
4. Optional: At the Use SSL encryption? prompt, type the appropriate response.
Important: If you type Yes, then ensure that the prerequisite conditions are
met.
5. Type the location of your truststore.
6. Type your truststore password.
21
When you configure SiteProtector, the vulnerabilities that are detected by scans are
automatically forwarded to SiteProtector.
SiteProtector receives vulnerability data from QRadar Vulnerability Manager scans
that are performed only after the integration is configured.
Procedure
On the Admin tab, click Deployment Editor.
Select the Vulnerability View tab.
On the Vulnerability Components pane, click SiteProtector Adapter.
Type a unique name for the SiteProtector Adapter that you want to add and
click Next.
The name can be up to 20 characters in length and can include underscores or
hyphens.
5. Type the IP address of the IBM Security SiteProtector agent manager server.
6. Click Next.
7. Click Finish.
1.
2.
3.
4.
8. From the deployment editor menu, select File > Save and close.
9. On the Admin tab toolbar, select Advanced > Deploy Full Configuration.
10. Click OK.
What to do next
Scan your network assets to determine if the vulnerability data is displayed in
your SiteProtector installation.
22
Scan profiles
Use scan profiles to do the following tasks:
v Specify the network nodes, domains, or virtual domains that you want to scan.
v Specify the network assets that you want to exclude from scans.
v Create operational windows, which define the times at which scans can run.
v Manually run scan profiles or schedule a scan to run at a future date.
v Use centralized credentials to run Windows, UNIX, or Linux operating systems.
v Scan the assets from a saved asset search.
Related concepts:
Centralized credential sets on page 35
When you run authenticated scans, you can use a central list that stores the login
credentials for your Linux, UNIX, or Windows operating systems. Your system
administrator must configure the list of credentials.
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, click Administrative > Scan Profiles.
3. On the toolbar, click Actions > Create.
4. In the Details tab of the Scan Profile Configuration page, enter a name for the
scan profile in the Name field.
5. Enter the IP address, IP range, or CIDR range of the assets you want to scan
in the IP Addresses field and click >.
To create a scan profile, the only mandatory fields are the Name and IP
Addresses fields.
6. If you added more scanners to your QRadar Vulnerability Manager
deployment, select a different scanner from the Scan Server list.
7. To scan your network by using a predefined set of scanning criteria, select a
scan type from the Scan Policies list.
8. To specify which scanner to use for each CIDR range, click the Dynamic
server selection check box.
9. If you configured centralized credentials for assets, click the Use Centralized
Credentials check box. For more information, see the IBM Security QRadar
Administration Guide.
10. Click Save.
Related concepts:
Copyright IBM Corp. 2012, 2014
23
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, click Administrative > Scan Profiles.
3. On the toolbar, click Actions > Create.
4. In the Details tab of the Scan Profile Configuration page, enter a name for the
Scan Profile in the Name field.
To create a scan profile, the only mandatory fields are the Name and IP
Addresses fields.
5.
6.
7.
8.
9. Click Save.
24
Procedure
Click the Vulnerabilities tab.
In the navigation pane, click Administrative > Scan Profiles.
On the toolbar, click Actions > Create Benchmark Profile.
In the Details tab of the Benchmark Profile Configuration page, enter a name
for the scan profile in the Name field.
To create a scan profile, the only mandatory field in the Details tab is the
Name field.
5. If you want to use pre-defined centralized credentials, select the Use
Centralized Credentials check box.
Credentials that are used to scan Linux systems must have root privileges.
Credentials that are used to scan Windows systems must have administrator
privileges.
1.
2.
3.
4.
6. Select the QRadar Vulnerability Manager scanner from the Scan Server list.
7. In the When To Scan tab, set the run schedule, scan start time, and any
pre-defined operational windows.
8. In the Email tab, define what information to send about this scan and to
whom to send it.
9. If you are not using centralized credentials, add the credentials that the scan
requires in the Additional Credentials tab.
Credentials that are used to scan Linux systems must have root privileges.
Credentials that are used to scan Windows systems must have administrator
privileges.
10. Click Save.
Related concepts:
Centralized credential sets on page 35
When you run authenticated scans, you can use a central list that stores the login
credentials for your Linux, UNIX, or Windows operating systems. Your system
administrator must configure the list of credentials.
Procedure
1.
2.
3.
4.
25
Related tasks:
Managing scan results on page 52
In IBM Security QRadar Vulnerability Manager, on the Scan Results page, you can
manage your scan results and manage the scans that are running.
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, select Manage Vulnerabilities > By Asset.
3. On the By Asset page, identify the asset that you want to rescan.
4. Right-click the IP Address and select Run QVM Scan.
5. In the Run QVM Scan window, select the scan profile that you want use when
the asset is rescanned.
The scanning process requires a scan profile. The scan profile determines the
scanning configuration options that are used when the scan runs.
Important: The scan profile that you select might be associated with multiple
scan targets or IP address ranges. However, when you use the right-click
option, only the asset that you select is scanned.
6. Click Scan Now.
7. Click Close Window.
8. To review the progress of your right-click scan, in the navigation pane, click
Scan Results.
Right-click scans are identified by the prefix RC:.
Related concepts:
Asset vulnerabilities on page 62
In IBM Security QRadar Vulnerability Manager, you can display summary
vulnerability data that is grouped by each scanned asset.
26
Description
Active
Update asset
model
Specifies whether you want to send your scan results to the QRadar
asset model. When you configure a scan profile, this check box is
selected by default.
For more information about Assets and the QRadar asset model, see the
Users Guide for your product.
Scan Server
The scanner that is used to run the scan profile. The scanner that you
select depends on your network configuration. For example, to scan
DMZ assets, then select a scanner that has access to that area of your
network.
The Controller scan server corresponds to the scanner that is deployed
with the vulnerability processor on your QRadar console or QRadar
Vulnerability Manager managed host.
Restriction: You can have only one vulnerability processor in your
deployment. However, you can deploy multiple scanners either on
dedicated QRadar Vulnerability Manager managed host scanner
appliances or QRadar managed hosts.
Dynamic server
selection
Related concepts:
Dynamic vulnerability scans on page 46
In IBM Security QRadar Vulnerability Manager, you can configure a scan to use
certain vulnerability scanners for specific CIDR ranges in your network. For
example, your scanners might have access only to certain areas of your network.
Scan policies on page 48
In IBM Security QRadar Vulnerability Manager, a scan policy is associated with a
scan profile and is used to control a vulnerability scan. For example, you can
configure the scanning protocol, scanned ports, or the scan tools that are used
during a scan.
Scan scheduling
In IBM Security QRadar Vulnerability Manager, you can schedule the dates and
times that it is convenient to scan your network assets for known vulnerabilities.
Scan scheduling is controlled by using the When To Scan pane, in the Scan Profile
Configuration page.
27
A scan profile that is configured with a manual setting must be run manually.
However, scan profiles that are not configured as manual scans, can also be run
manually.
When you select a scan schedule, you can further refine your schedule by
configuring a permitted scan interval.
Related tasks:
Configuring a permitted scan interval on page 45
In IBM Security QRadar Vulnerability Manager, you can create an operational
window to specify the times that a scan can run.
Reviewing your scheduled scans in calendar format on page 29
In IBM Security QRadar Vulnerability Manager, the scheduled scan calendar
provides a central location where you can review information about scheduled
scans.
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, select Administrative > Scan Profiles.
3. On the toolbar, select Actions > Create.
4. In the Details tab of the Scan Profile Configuration page, enter a name for the
scan profile in the Name field.
5. Click the When To Scan tab.
6. From the Run Schedule list, select Monthly.
7. In the Start Time field, select a start date and time for your scan.
8. In the Day of the month field, select a day each month that your scan runs.
9. Click the Domain and Web App tab.
10. In the Domain field, type the URL of the asset that you want to scan and click
>.
11. Click Save.
12. Optional: During and after the scan, you can monitor scan progress and
review completed scans.
Procedure
1. Click the Assets tab.
2. In the navigation pane, click Asset Profiles, then on the toolbar click Search >
New Search.
3. To specify your newly discovered, unscanned assets, complete the following
steps in the Search Parameters pane:
a. Select Days Since Asset Found, Less than 2 then click Add Filter.
b. Select Days Since Asset Scanned Greater than 2 then click Add Filter.
c. Click Search.
28
4. On the toolbar, click Save Criteria and complete the following steps:
a. In the Enter the name of this search field, type the name of your asset
search.
b. Click Include in my Quick Searches.
c. Click Share with Everyone.
d. Click OK.
5. Click the Vulnerabilities tab.
6. In the navigation pane, select Administrative > Scan Profiles.
7. On the toolbar, select Actions > Create.
8. In the Details tab, type a name for your scan profile in the Name field.
Restriction: The profile name must be greater than 4 characters.
9. Select your saved asset search from the Asset Saved Searches list.
When you include a saved asset search in your scan profile, the assets and IP
addresses associated with the saved search are scanned.
10. Click the When To Scan tab and in the Run Schedule list, select Weekly.
11. In the Start Time fields, type or select the date and time that you want your
scan to run on each selected day of the week.
12. Select the check boxes for the days of the week that you want your scan to
run.
13. Click Save.
For more information about using the Assets tab and saving asset searches,
see the Users Guide for your product.
Related tasks:
Searching vulnerability data on page 58
In IBM Security QRadar Vulnerability Manager, you can identify important
vulnerabilities by searching your vulnerability data.
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, click Administrative > Scheduled Scans.
3. Optional: Hover your mouse on the scheduled scan to display information
about the scheduled scan.
For example, you can show the time that a scan took to complete.
4. Optional: Double-click a scheduled scan to edit the scan profile.
29
You can exclude a specific host or range of hosts that must never be scanned. For
example, you might restrict a scan from running on critical servers that are hosting
your production applications. You might also want to configure your scan to target
only specific areas of your network.
QRadar Vulnerability Manager integrates with QRadar by providing the option to
scan the assets that form part of a saved asset search. For more information, see
Scheduling scans of new unscanned assets on page 28.
Domain scanning
You can add domains to your scan profile to test for DNS zone transfers on each of
the domains that you specify.
A host can use the DNS zone transfer to request and receive a full zone transfer for
a domain. Zone transfer is a security issue because DNS data is used to decipher
the topology of your network. The data that is contained in a DNS zone transfer is
sensitive and therefore any exposure of the data might be perceived as a
vulnerability. The information that is obtained might be used for malicious
exploitation such as DNS poisoning or spoofing.
For more information about configuring a Domain Scan, see Scanning domains
monthly on page 28
30
Virtual webs
You can configure a scan profile to scan different URLs that are hosted on the same
IP address.
When you scan a virtual web, QRadar Vulnerability Manager checks each web
page for SQL injection and cross site scripting vulnerabilities.
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, click Administrative > Scan Exclusions.
3. On the toolbar, select Actions > Add.
4. In the IP/IP Range field, type the IP address or range of IP addresses that you
want to exclude from all scanning.
Restriction: You cannot type the IP address of an asset that is already excluded
from scanning
5. In the Description field, type information about the scan exclusion.
Provide a description that it is identifiable in the future. The description must
contain at least 5 characters.
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, click Administrative > Scan Exclusions.
3. From the list on the Scan Exclusions page, click the Scan Exclusion that you
want to modify.
4. On the toolbar, select an option from the Actions menu.
5. Depending on your selection, follow the on-screen instructions to complete this
task.
31
Description
The default scan protocol that scans common ports in the range 1 1024.
Remember: Compared with other scanning protocols, TCP and UDP
might generate more network activity.
TCP
SYN
ACK
Similar to SYN, but in this case an ACK flag is set. The ACK scan
does not determine whether the port is open or closed, but tests if the
port is filtered or unfiltered. Testing the port is useful when you probe
for the existence of a firewall and its rule sets. Simple packet filtering
enables established connections (packets with the ACK bit set),
whereas a more sophisticated stateful firewall might not. The default
port range is 1-65535.
FIN
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, select Administrative > Scan Profiles.
3. On the toolbar, select Actions > Create.
4. In the Details tab of the Scan Profile Configuration page, enter a name for the
scan profile in the Name field.
Restriction: The profile name must be greater than 4 characters.
5. Enter the CIDR range of the assets you want to scan in the IP Addresses field
and click >
To create a scan profile, the only mandatory fields are the Name and IP
Addresses fields.
6. Click the How To Scan tab.
7. In the Protocol field, accept the default values of TCP & UDP.
8. In the Range field, type 1-65535.
32
Procedure
1. Click the Assets tab.
2. In the navigation pane, click Asset Profiles then on the toolbar, click Search >
New Search.
3. To specify assets with open ports, configure the following options in the
Search Parameters pane:
a. Select Assets With Open Port, Equals any of 80, and click Add Filter.
b. Select Assets With Open Port, Equals any of 8080, and click Add Filter.
c. Click Search.
4. On the toolbar, click Save Criteria and configure the following options:
a. In the Enter the name of this search field, type the name of your asset
search.
b. Click Include in my Quick Searches.
c. Click Share with Everyone and click OK.
5. Click the Vulnerabilities tab.
6. In the navigation pane, select Administrative > Scan Profiles.
7. On the toolbar, select Actions > Create.
8. In the Details tab, type a name for your scan profile in the Name field.
Restriction: The profile name must be greater than 4 characters.
9. Select your saved asset search from the Asset Saved Searches list.
When you include a saved asset search in your scan profile, the assets and IP
addresses associated with the saved search are scanned.
10. Click the When To Scan tab and select Manual from the Run Schedule list.
11. Click Save.
For more information about saving an asset search, see the Users Guide for
your product.
What to do next
Perform the steps in the procedure, Running a scan profile manually on page 25.
Chapter 5. Vulnerability scanning
33
34
Procedure
1. Click the Admin tab.
2. In the System Configuration pane, click Centralized Credentials.
3. In the Centralized Credentials window, on the toolbar, click Add.
35
To configure a credential set, the only mandatory field in the Credential Set
window is the Name field.
4. In the Credential Set window, click the Assets tab.
5. Type a CIDR range for the assets that you want to specify credentials for and
click Add.
6. Optional: Click the Linux/Unix, Windows, or Network Devices (SNMP) tabs,
then type your credentials.
7. Click Save.
Procedure
1. Using SSH, log in to the QRadar console or managed host as the root user.
2. Generate a public DSA key pair by typing the following command:
su -m -c 'ssh-keygen -t dsa' qvmuser
3. Accept the default file by pressing Enter or type a file name.
4. Type a passphrase for the DSA key or accept the default by pressing the Enter
key.
5. Copy the public key to the scan target by typing the following command:
ssh-copy-id -i ~/.ssh/id_dsa.pub root@<IP address>
Where <IP address> is the scan target.
6. Type the password for the scan target.
7. To test that the encryption key is correctly configured, you can start an SSH
session with the scan target.
If the public key is correctly configured, you can SSH to the scan target without
typing a password.
Related tasks:
Configuring an authenticated scan of the Linux or UNIX operating systems on
page 37
In IBM Security QRadar Vulnerability Manager, you can configure an
authentication scan of the Linux or UNIX operating systems that are on your
network. You can manually specify the credentials in the scan profile or use a
credential set.
36
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, select Administrative > Scan Profiles.
3. On the toolbar, select Actions > Create.
4. In the Details tab of the Scan Profile Configuration page, enter a name for the
scan profile in the Name field.
5. Enter the IP address, IP range, or CIDR range of the assets you want to scan
in the IP Addresses field and click >.
To create a scan profile, the only mandatory fields are the Name and IP
Addresses fields.
6. Optional: Click Use Centralized Credentials to scan your Linux or UNIX
operating systems.
If a credential set is not configured and you do not manually specify the
credentials, the scan tools run but no credentials are passed in.
If a credential set exists for the hosts that you are scanning, any credentials
that you manually specify in the Scan Setup pane, override your credential
set.
7. Click the When To Scan tab.
8. In the Run Schedule list, select Manual.
9. Click the Additional Credentials tab.
10. In the Linux/Unix Patch Scanning area, type the user name and password for
the Linux or UNIX hosts that you want to scan.
You do not require a password if you configured secure public key
authentication between your console and your scan target.
11. Click Save.
12. In the Scan Profiles page, on the toolbar select Actions > Run Now.
Related concepts:
Centralized credential sets on page 35
When you run authenticated scans, you can use a central list that stores the login
credentials for your Linux, UNIX, or Windows operating systems. Your system
administrator must configure the list of credentials.
Related tasks:
Configuring a credential set on page 35
In IBM Security QRadar Vulnerability Manager, you can create a credential set for
the assets in your network. During a scan, if a scan tool requires the credentials for
a Linux, UNIX, or Windows operating system, the credentials are automatically
passed to the scan tool from the credential set.
Chapter 5. Vulnerability scanning
37
Procedure
1. SSH to the asset.
2. Run the following uname commands:
uname
uname
uname
uname
uname
uname
uname
-m
-n
-s
-r
-v
-p
-a
Commands
Read the contents of the following files that are relevant for your
distribution:
v
/etc/redhat-release
/etc/SuSE-release
/etc/debian-version
/etc/slackware-version
/etc/mandrake-version
/etc/gentoo-version
38
/usr/bin/svcs -a
/usr/bin/pkginfo -x \| awk { if ( NR % 2 ) { prev = \$1 }
else { print prev\" \"\$0 } }
/usr/bin/showrev -p
/usr/sbin/patchadd -p
/usr/bin/isainfo -b
/usr/bin/isainfo -k
/usr/bin/isainfo -n
/usr/bin/isainfo -v
Operating
System
Commands
HP-UX
AIX
oslevel -r
lslpp -Lc
ESX
Procedure
Click the Vulnerabilities tab.
In the navigation pane, select Administrative > Scan Profiles.
On the toolbar, select Actions > Create.
In the Details tab of the Scan Profile Configuration page, enter a name for the
scan profile in the Name field.
5. Enter the IP range of the assets you want to scan in the IP Addresses field
and click >.
1.
2.
3.
4.
39
If a credential set exists for the hosts that you are scanning, any credentials
that you manually specify in the Scan Setup pane, override your credential
set.
Click the When To Scan tab.
In the Run Schedule list, select Manual.
Click the Additional Credentials tab.
In the Windows Patch Scanning area, type the Domain, Username, and
Password for the Windows hosts that you want to scan and click >.
11. Click Save.
12. In the Scan Profiles page, on the toolbar select Actions > Run Now.
Related concepts:
Centralized credential sets on page 35
When you run authenticated scans, you can use a central list that stores the login
credentials for your Linux, UNIX, or Windows operating systems. Your system
administrator must configure the list of credentials.
7.
8.
9.
10.
WMI
Administrative Shares
It is possible scan computers for Windows patches without using WMI and
Administrative Shares but the results are not complete and are prone to false
positives.
Use complex passwords. However, some special characters can cause issues. Limit
the special characters to numbers, periods, colons, semi-colons, quotation marks,
percentage signs, and spaces.
Remote Registry
The Remote Registry service must be enabled and started and accessible from both
the QRadar Vulnerability Manager scanner appliance and the configured scanning
user used in the scan profile.
If the remote registry cannot be accessed, windows patch scanning fails completely.
If QRadar Vulnerability Manager cannot access the remote registry, the scan results
record the following error:
Local Checks Error Remote Registry Service Not Running
In QRadar Vulnerability Manager version 7.2.3 and later, a yellow triangle icon is
displayed next to the asset in the scan results.
The status of the remote registry service can be verified from the Administrative
Control Panel under Services. Ensure that the following dependent services are
started:
v Remote Procedure Call (RPC)
v DCOM Server Process Launcher
40
QRadar Vulnerability Manager can access the remote registry over the classic
NetBIOS (ports 135, 137, 139) or the newer NetBIOS over TCP (on port 445).
Network or personal firewalls that block access to either of these protocols
prevents access to Windows patch scans.
Administrative user accounts have access to the remote registry by default.
Non-administrative user accounts do not have access to the remote registry. You
must configure access.
Procedure
1. Log in to your Windows-based system.
2. Click Start.
3. In the Search programs and files field, type services and press Enter.
4. In the Services window, locate the Remote Registry service.
5. Right-click the Remote Registry service and click Start.
6. Close the Services window.
Procedure
1. On the target Windows computer, create or designate a Local or Global User
(example, "QVM_scan_user") and assign read-only Registry access to the
non-administrative user account.
2. Log on to your Windows computer by using an account that has administrator
privileges. Click Start > Run.
3. Type regedit.
4. Click OK.
5. Go to the key:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\
SecurePipeServers \winreg.
The permissions that are associated with this registry key control which users
or group can access the registry remotely from the network.
6. Highlight the winreg key and do one of the following steps:
v On Windows XP or later, click Edit > Permissions.
v On Windows 2000, click Security > Permissions.
7. Give read-only access to the designated "QVM_scan_user" account.
On Windows XP, the ForceGuest setting is enabled by default when in
workgroup mode. This setting might cause access problems for WMI
connections and shares access, other DCOM services, and RPC services. You
cannot disable the ForceGuest setting on Windows XP Home computers.
41
Procedure
1. On the target server, go to Control Panel > Administrative Tools > Computer
Management.
Expand Services and Applications.
Right-click WMI Control and click Properties.
Click the Security tab.
Click Security.
Optional: If necessary, add the monitoring user, and click the Remote Enable
check box for the user or group that requests WMI data. To add a monitoring
user or group:
a. Click Add.
b. In the Enter the object names to select field, type the name of your group
or user name.
c. Click OK.
7. Click Advanced and apply to the root and sub name spaces.
2.
3.
4.
5.
6.
Note: In some cases, you might also need to configure the Windows firewall
and DCOM settings.
If you experience WMI issues, you can install the WMI Administrative tools
from the Microsoft website.
The tools include a WMI browser that helps you connect to a remote machine
and browse through the WMI information. These tools help you to isolate any
connectivity issues in a more direct and simpler environment.
42
Procedure
1. Click Start > Run, type DCOMCNFG, and then click OK.
2. In the Component Services dialog box, expand Component Services, expand
Computers, and then right-click My Computer and click Properties.
3. In the My Computer Properties dialog box, click the COM Security tab.
4. Under Launch and Activation Permissions, click Edit Limits.
5. In the Launch Permission dialog box, if your name or your group does not
appear in the Groups or user names list, follow these steps:
a. In the Launch Permission dialog box, click Add.
b. In the Select Users, Computers, or Groups dialog box, add your name and
the group in the Enter the object names to select box, and then click OK.
6. In the Launch Permission dialog box, select your user and group in the Group
or user names box.
7. In the Allow column under Permissions for User, select Remote Launch and
select Remote Activation, and then click OK.
Procedure
1. Click Start > Run, type DCOMCNFG, and then click OK.
2. In the Component Services dialog box, expand Component Services, expand
Computers, and then right-click My Computer and click Properties.
3. In the My Computer Properties dialog box, click the COM Security tab.
Chapter 5. Vulnerability scanning
43
Administrative shares
All Windows computers have administrative shares, \\machinename\driveletter$
enabled, especially when they are part of a domain.
QRadar Vulnerability Manager uses administrative shares to detect vulnerabilities
on the following limited set of applications:
v Mozilla Firefox
v Mozilla Thunderbird
v Java FX
v Apache Archiva
v Apache Continuum
v Google ChromePreferences
Administrative shares are not visible to non-administrative users, and some
organizations disable administrative shares or use non-administrative user accounts
to scan. If administrative shares are not accessible, QRadar Vulnerability Manager
might miss vulnerabilities in the products in the preceding list or produce false
positives. In general, QRadar Vulnerability Managervulnerability tests use only
administrative shares as a last resort, and use registry scans and WMI.
Procedure
1. Click Start > Run and type regedit.
Go to the key: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Policies\System
3. Right-click WMI Control and click Properties.
2.
Procedure
1. Click Start > Run and type regedit.
44
2.
Note: This action does not disable the IPC$ share. Although this share is not
used to access files directly, ensure that anonymous access to this share is
disabled. Alternatively, you can remove the IPC$ share completely by deleting
it at start-up by using the following command:
net share IPC$ /delete
Use this method to remove the C$ and D$ shares also.
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, select Administrative > Operational Window.
3.
4.
5.
6.
7.
8. Optional: If you selected Weekly from the Schedule list, then click the desired
days of the week check boxes in the Weekly area.
9. Optional: If you selected Monthly from the Schedule list, then select a day
from the Day of the month list.
10. Click Save.
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, select Administrative > Operational Window.
3. On the toolbar, select Actions > Add.
4. Type a name for your operational window, then configure a permitted time
interval and click Save.
5. In the navigation pane, select Administrative > Scan Profiles.
6. On the toolbar, select Actions > Create.
7. In the Details tab of the Scan Profile Configuration page, enter a name for the
scan profile in the Name field.
45
8.
9.
10.
11.
12.
13.
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, select Administrative > Operational Window.
3. Select the operational window that you want to edit.
4. On the toolbar, select an option from the Actions menu.
5. Follow the instructions in the user interface.
Restriction: You cannot delete an operational window that is associated with a
scan profile. You must first disconnect the operational window from the scan
profile.
Procedure
1. Click the Vulnerabilities tab.
In the navigation pane, select Administrative > Scan Profiles.
Select the scan profile that you want to edit.
On the toolbar, select Actions > Edit.
Click the When To Scan tab.
From the Name list in the Operational Windows area, select the operational
window that you want to disconnect and click <.
7. Click Save.
2.
3.
4.
5.
6.
46
During a scan, QRadar Vulnerability Manager determines which scanner to use for
each CIDR, IP address, or IP range that you specify in your scan profile.
To use dynamic scanning, you must do the following actions:
1. Add vulnerability scanners to your QRadar Vulnerability Manager deployment.
For more information, see Options for adding scanners to your QRadar
Vulnerability Manager deployment on page 7.
2. Associate vulnerability scanners with CIDR ranges.
3. Configure a scan of multiple CIDR ranges and enable Dynamic server
selection in the Scan Profile Details pane.
Related concepts:
Options for adding scanners to your QRadar Vulnerability Manager deployment
on page 7
If you have a large network and require flexible scanning options, you can add
more scanners to your IBM Security QRadar Vulnerability Manager deployment.
Scan profile details on page 26
In IBM Security QRadar Vulnerability Manager you can describe your scan, select
the scanner that you want to use, and choose from a number of scan policy
options.
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, select Administrative > Scanners.
Attention: By default, the Controller scanner is displayed. The Controller
scanner is part of the QRadar Vulnerability Manager processor that is deployed
on either your QRadar Console or on a dedicated QRadar Vulnerability
Manager processing appliance. You can assign a CIDR range to the Controller
scanner, but you must deploy extra scanners to use dynamic scanning.
3. Click a scanner on the Scanners page.
4. On the toolbar, click Edit.
Restriction: You cannot edit the name of the scanner. To edit a scanner name,
you must use the deployment editor.
5. In the CIDR field, type a CIDR range or multiple CIDR ranges that are
separated by commas.
6. Click Save.
Related concepts:
Options for adding scanners to your QRadar Vulnerability Manager deployment
on page 7
If you have a large network and require flexible scanning options, you can add
more scanners to your IBM Security QRadar Vulnerability Manager deployment.
Chapter 5. Vulnerability scanning
47
Procedure
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
Scan policies
In IBM Security QRadar Vulnerability Manager, a scan policy is associated with a
scan profile and is used to control a vulnerability scan. For example, you can
configure the scanning protocol, scanned ports, or the scan tools that are used
during a scan.
You can create a new scan policy or copy and modify a pre-configured policy that
is distributed with QRadar Vulnerability Manager.
If your scanning requirements change, you can modify the scan policy in one
central location, rather than updating each scan profile.
48
Discovery scan
Database scan
Patch scan
PCI scan
Web scan
Procedure
1.
2.
3.
4.
5. Click Copy.
6. In the Copy scan policy window, type a new name in the Name field and click
OK.
7. Click the copy of your scan policy and on the toolbar, click Edit.
8. In the Description pane, type new information about the scan policy.
Important: If you modify the new scan policy, you must update the
information in the description.
9. To modify your scan policy, use the Port Scan, Vulnerabilities, Tool Groups, or
Tools tabs.
Restriction: Depending on the Scan Type that you select, you cannot use all
the tabs on the New Scan Policy window.
Scan Type
Tabs Enabled
Discovery Only
Zero credentialled
Patch
Full
Procedure
Click the Vulnerabilities tab.
In the navigation pane, select Administrative > Scan Policies.
On the toolbar, click New.
Type the name and description of your scan policy.
To configure a scan policy, the only mandatory fields in the New Scan Policy
window are the Name and Description fields.
5. Click a Scan Type, upon which to base your scan policy.
1.
2.
3.
4.
Restriction: Depending on the Scan Type that you select, you cannot use all
the tabs on the New Scan Policy window.
49
Scan Type
Tabs Enabled
Discovery Only
Zero credentialed
Patch
Full
50
Scan results
You can use the Scan Results page to investigate the following information:
v The progress of a scan and the scanning tools that are queued and running.
v The status of a scan. For example, a scan with a status of Stopped indicates that
the scan completed successfully or was canceled.
v The degree of risk that is associated with each completed scan profile. Risk is
indicated by the Score column and shows the total Common Vulnerability
Scoring System (CVSS) score for the completed scan profile.
v The total number of assets that were found by the scan.
v The total number of vulnerabilities that were discovered by the completed scan
profile.
v The total number of open services that were discovered by the completed scan
profile.
Vulnerability counts
The Scan Results page shows Vulnerabilities and Vulnerabilities Instances.
v The Vulnerabilities column shows the total number of unique vulnerabilities
that were discovered on all the scanned assets.
v When you scan multiple assets, the same vulnerability might be present on
different assets. Therefore, the Vulnerability Instances column shows the total
number of vulnerabilities that were discovered on all the scanned assets.
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, click Scan Results.
3. On the toolbar, select Search > New Search.
To search your scan results, there are no mandatory fields. All parameters are
optional.
51
4. To show scan results for scans that completed within a recent number of days,
type a value in the Scan Run in the last days field.
5. To show scan results for a specific vulnerability, click Browse in the Contains
Vulnerability field.
6. To show scan results for scans that were only scheduled, click Exclude on
demand scan.
7. Click Search.
Related concepts:
Scan scheduling on page 27
In IBM Security QRadar Vulnerability Manager, you can schedule the dates and
times that it is convenient to scan your network assets for known vulnerabilities.
Procedure
1. Click the Assets tab.
2. In the navigation pane, click Asset Profiles, then on the toolbar click Search >
New Search.
3. In the field containing column names, in the field on the left, click the column
headings you want to include in your search, and click the arrow button to
move the selected headings to field on the right.
4. Click the up and down buttons to change the priority of the selected column
headings.
5. When the field on the right contains all the column heading that you want to
search on, click Search.
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, click Scan Results.
3. Optional: If you want to rerun a completed scan, select Actions > Run Now.
A completed scan has a status of Stopped.
4. Optional: To delete a set of completed scan results:
a. On the Scan Results page, select a set of completed scan results.
b. On the toolbar, select Actions > Delete.
If you delete a set of scan results, no warning is displayed. The scan results
are immediately deleted.
Remember: When you delete a set of scan results, neither the scan data in
the QRadar asset model or the scan profile are deleted.
5. Optional: To cancel a scan that is running:
52
Risk score
Each vulnerability that is detected on your network has a risk score that is
calculated by using the Common Vulnerability Scoring System (CVSS) base score.
A high risk score provides an indication of the potential for a vulnerability
exploitation.
On the Scan Results Hosts page the Score column is an accumulation of the risk
score for each vulnerability on an asset. The accumulated value provides an
indication of the level of risk that is associated with each asset.
To quickly identify the assets that are most at risk to vulnerability exploitation,
click the Score column heading to sort your assets by the risk level.
53
Procedure
1. Search for the asset that you want to confirm the patch status for.
2. Click the Asset IP address to open the Asset Details window.
3. Click Details > Properties to open the Asset Properties window.
4. Click the Windows Patches arrow.
5. View the patch status in the Pending column.
v True - the asset has pending patches to download.
v False - the asset has no pending patch downloads.
54
Procedure
1.
2.
3.
4.
5.
v Reports
6. If you selected the Reports check box in the What To Email area, select the
reports that you want to email from the Available Reports field, and click the
arrow to move reports into the Selected Reports field.
Reports can be large. Confirm that the sent reports are not rejected by the
recipient's email provider.
7. In the Who to Email area, select the recipients that you want to receive the
emails:
v To email the configured technical owners of the scanned assets, select the
Technical Owners check box. Technical owners receive emails about their
assets only.
v To enter or select email addresses in the field, select the To Addresses check
box. Select emails in the field on the left, and click Add Me to email the
selected email addresses. Entered email addresses receive emails and reports
for all scanned assets.
8. Click Save.
55
56
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, click Manage Vulnerabilities.
3. Optional: Click the Risk Score column to sort your vulnerabilities by risk.
4. To investigate the risk score, hover you mouse on a vulnerability risk score.
Risk Score
The Risk Score provides specific network context by using the Common
Vulnerability Scoring System (CVSS) base, temporal, and environmental metrics.
When QRadar Risk Manager is not licensed the Risk Score column shows the
CVSS environmental metric score with a maximum value of 10.
57
Exploitability subscore
Exploitability is calculated as a subset of the CVSS base score by using the
following elements:
v Access Vector provides an indication of risk that is based on the remoteness for
example, local, adjacent network, or network, of an attacker.
v Access Complexity provides an indication of risk that is based on attack
complexity. The lower the complexity the higher the risk.
v Authentication provides an indication of risk that is based on authentication
attempts. The fewer the attempts the higher the risk.
Risk adjustments
If IBM Security QRadar Risk Manager is installed and you configured vulnerability
risk policies, then the risk adjustments are listed. The adjustments either increase
or decrease the overall risk that is associated with a vulnerability.
Related concepts:
IBM Security QRadar Risk Manager and IBM Security QRadar Vulnerability
Manager integration on page 19
IBM Security QRadar Vulnerability Manager integrates with QRadar Risk Manager
to help you prioritize the risks and vulnerabilities in your network.
Related tasks:
Prioritizing high risk vulnerabilities by applying risk policies on page 65
In IBM Security QRadar Vulnerability Manager, you can alert administrators to
higher risk vulnerabilities by applying risk policies to your vulnerabilities.
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, click Manage Vulnerabilities.
3. On the toolbar, select Search > New Search.
4. If you want to load a saved search, do the following steps:
a. Optional: Select a group from the Group list.
b. Optional: In the Type Saved Search field, type the saved search that you
want to load.
c. From the Available Saved Searches list, select a saved search, and then
click Load.
58
d. Click Search.
5. If you want to create a new search, do the following steps in the Search
Parameters pane:
a. In the first list, select the parameter that you want to use.
b. In the second list, select a search modifier. The modifiers that are available
depend on the search parameter that you select.
c. In the third list, type or select the specific information that is related to
your search parameter.
d. Click Add Filter.
For example, to email the vulnerabilities that are assigned to a technical user,
select Technical Owner Contact and provide an email address that is
configured on the Vulnerability Assignment page.
6. Click Search.
7. Optional: On the toolbar, click Save Search Criteria.
Important: Vulnerability reports use saved search information. If you want to
create a report that emails a technical user, you must save your search criteria.
Related concepts:
Vulnerability search parameters
In IBM Security QRadar Vulnerability Manager, you can search your vulnerability
data and save the searches for later use.
Description
Access Complexity
Access Vector
Authentication
Availability Impact
59
Description
Confidentiality Impact
Impact
Integrity Impact
60
Vulnerability reference
Vulnerability state
Description
Quick Search
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, click Manage Vulnerabilities.
3. On the toolbar, select Search > New Search and complete the search of your
data.
4. On the toolbar, click Save Search Criteria.
5. In the Save Search Criteria window, type a recognizable name for your saved
search.
6. Optional: To include your saved search in the Quick Searches list on the
toolbar, then click Include in my Quick Searches.
7. Optional: To share your saved search criteria with all QRadar users, then click
Share with Everyone.
8. Optional: To place your saved search is a group, then click a group or click
Manage Groups to create a new group.
For more information about managing search groups, see the Administration
Guide for your product.
9. Optional: If you want to show the results of your saved search when you click
any of the Manage Vulnerabilities pages in the navigation pane, then click Set
As Default.
10. Click OK.
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, select Manage Vulnerabilities > By Network
3. On the toolbar, select Search > New Search.
4. On the Vulnerability Manager Search page, in the Available Saved Searches
list, select the saved search that you want to delete.
5. Click Delete.
6. Click OK.
61
Vulnerability instances
In IBM Security QRadar Vulnerability Manager, you can display the vulnerabilities
on each of the scanned assets in your network. Each vulnerability might be listed
multiple times because the vulnerability exists on several of your assets.
If you configure third-party vulnerability assessment (VA) scanners, by using the
QRadar Admin tab, then the vulnerabilities that are detected are automatically
displayed in the By Vulnerability Instances page.
For more information about VA scanners, see the Administration Guide for your
product.
The By Vulnerability Instances page provides the following information:
v A view of every vulnerability that was detected by scanning your network
assets.
v The risk that each vulnerability poses to the Payment Card Industry (PCI).
v The risk that a vulnerability poses to your organization. Click the Risk Score
column to identify the highest risk vulnerabilities.
v The name or email address of the user that is assigned to remediate the
vulnerability.
v The numbers of days in which a vulnerability must be remediated.
Related concepts:
Risk score details on page 57
In IBM Security QRadar Vulnerability Manager, vulnerability risk scores provide an
indication of the risk that a vulnerability poses to your organization.
Network vulnerabilities
In IBM Security QRadar Vulnerability Manager, you can review vulnerability data
that is grouped by network.
The By Network page provides the following information:
v An accumulated risk score that is based on the vulnerabilities that are detected
on each of your networks.
v The number of the assets, vulnerabilities, and open services for each network.
v The number of vulnerabilities that are assigned to a technical user and are
overdue for remediation.
Asset vulnerabilities
In IBM Security QRadar Vulnerability Manager, you can display summary
vulnerability data that is grouped by each scanned asset.
You can use the By Asset page to prioritize the remediation tasks for assets in your
organization that pose the greatest risk.
The By Asset page provides the following information:
v An accumulated risk score that is based on the vulnerabilities that are detected
on each of your assets.
Click the Risk Score column to sort your assets by their risk.
62
v The number of asset vulnerabilities that are assigned to a technical user and are
overdue for remediation.
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, click Manage Vulnerabilities.
3. Optional: Search your vulnerability data.
4. Click the vulnerability that you want to investigate.
5. On the toolbar, select Actions > History.
Related tasks:
Searching vulnerability data on page 58
In IBM Security QRadar Vulnerability Manager, you can identify important
vulnerabilities by searching your vulnerability data.
Procedure
1. Click the Assets tab.
2. In the navigation pane, select Server Discovery.
3. To automatically create false positive exception rules for vulnerabilities on
specific server types, from the Server Type list, select one of the following
options:
v
v
v
v
FTP Servers
DNS Servers
Mail Servers
Web Servers
63
4. Optional: From the Network list, select the network for your servers.
5. Click Discover Servers.
6. In the Matching Servers pane, select the servers where the vulnerability
exception rules are created.
7. Click Approve Selected Servers.
Results
Depending on your server type selection the following vulnerabilities are
automatically set as false positive exception rules:
Table 6. Server type vulnerabilities
Server Type
Vulnerability
FTP Servers
DNS Servers
Mail Servers
Web Servers
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, click Manage Vulnerabilities.
3. On the By Vulnerability Instances page, click the Risk Score column heading to
sort the vulnerabilities by risk score.
4. To investigate the CVSS metrics that are used to derive the risk score, hover
your mouse on the Risk Score field.
5. Identify the vulnerability that has the highest score and click the Vulnerability
link.
6. In the Vulnerability Details window, investigate the vulnerability:
a. To view the IBM Security Systems website, click the X-Force link.
b. To view the National Vulnerability Database website, click the CVE link.
The IBM Security Systems website and National Vulnerability Database
provide remediation information and details on how a vulnerability might
affect your organization.
c. To open the Patching window for the vulnerability, click the Plugin Details
link. Use the tabs to discover Oval Definition, Windows Knowledge Base, or
UNIX advisory information about the vulnerability. This feature provides
information on how QRadar Vulnerability Manager checks for vulnerability
details during a patch scan. You can use it to identify why a vulnerability
was raised on an asset or why it was not.
d. The Solution text box contains detailed information about how to remediate
a vulnerability.
Related concepts:
Risk score details on page 57
In IBM Security QRadar Vulnerability Manager, vulnerability risk scores provide an
indication of the risk that a vulnerability poses to your organization.
64
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, click Manage Vulnerabilities.
3. On the toolbar click Search > New Search.
4. In the Search Parameters pane, configure the following filters:
a. Risk Equals High
b. Days since vulnerabilities discovered Greater than or equal to 40
5. Click Search and then on the toolbar click Save Search Criteria.
Type a saved search name that is identifiable in QRadar Risk Manager.
6. Click the Risks tab.
7. In the navigation pane, click Policy Monitor.
8. On the toolbar click Actions > New.
9. In the What do you want to name this question field, type a name.
10. In the Which tests do you want to include in your question field, click are
susceptible to vulnerabilities contained in vulnerability saved searches.
11. In the Find Assets that field, click the underlined parameter on the are
susceptible to vulnerabilities contained in vulnerability saved searches.
12. Identify your QRadar Vulnerability Manager high risk vulnerability saved
search, click Add, then click OK.
13. Click Save Question.
14. In the Questions pane, select your question from the list and on the toolbar
click Monitor.
Restriction: The Event Description field is mandatory.
15. Click Dispatch question passed events.
16. In the Vulnerability Score Adjustments field, type a risk adjustment
percentage value in the Percentage vulnerability score adjustment on
question fail field.
17. Click Apply adjustment to all vulnerabilities on an asset then click Save
Monitor.
What to do next
On the Vulnerabilities tab, you can search your high risk vulnerabilities and
prioritize your vulnerabilities
Related concepts:
65
IBM Security QRadar Risk Manager and IBM Security QRadar Vulnerability
Manager integration on page 19
IBM Security QRadar Vulnerability Manager integrates with QRadar Risk Manager
to help you prioritize the risks and vulnerabilities in your network.
Related tasks:
Saving your vulnerability search criteria on page 61
In IBM Security QRadar Vulnerability Manager, you can save your vulnerability
search criteria for future use.
Procedure
1. In IBM Security QRadar, select Vulnerabilities > Vulnerability Assignment >
Risk Preferences.
2. In the Greater than or equal to column, enter the minimum risk score value for
High, Medium, Low, and Warning.
3. In the Color column, select or define a color to represent High, Medium, Low,
and Warning risk scores.
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, click Manage Vulnerabilities.
3. On the toolbar, select Search > New Search
4. In the Search Parameters pane configure the following options:
a. In the first list select External Reference of type.
b. In the second list select Equals.
c. In the third list select IBM Endpoint Manager Patch.
d. Click Add Filter.
e. Click Search.
The By Vulnerability Instances page shows the vulnerabilities that have an
available fix.
5. Optional: Order your vulnerabilities according to their importance by clicking
the Risk Score column heading.
6. Optional: To investigate patch information for a vulnerability, click a
vulnerability link in the Vulnerability column.
7. Optional: In the Vulnerability Details window, scroll to the bottom of the
window to view the vulnerability patch information.
The Site ID and Fixlet ID are unique identifiers that you use to apply
vulnerability patches by using IBM Endpoint Manager.
66
The Base column indicates a unique reference that you can use to access more
information on a knowledge base.
Procedure
1.
2.
3.
4.
Description
Pending Downloads
Pending Restart
Fixed
67
68
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, click Manage Vulnerabilities > By Network.
3. Optional: Search your vulnerability data. On the toolbar, click Search > New
Search.
4. Click the Vulnerability Instances column link.
5. Select the vulnerability that you want to create an exception rule for.
6. On the toolbar, select Actions > Exception.
To apply a vulnerability exception rule, the only mandatory field is the
Comment text box. All other parameters are optional.
7. Optional: In the Maintain Exception Rule window, choose one of the following
options:
v Type a date when your vulnerability exception must expire.
v If the vulnerability exception must never expire, click Never Expires.
69
8. In the Notes section of the Maintain Exception Rule window, type text in the
Comments text box.
9. Click Save.
Related tasks:
Searching vulnerability data on page 58
In IBM Security QRadar Vulnerability Manager, you can identify important
vulnerabilities by searching your vulnerability data.
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, click Vulnerability Exception.
3. Click the vulnerability that you want to manage.
4. On the toolbar, select an option from the Actions menu.
Important: If you delete a vulnerability exception rule, no warning is
displayed. The vulnerability is immediately deleted.
5. Click Save.
Procedure
1.
2.
3.
4.
70
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, select Manage Vulnerabilities.
3. Optional: Search your vulnerability data.
4. Select the vulnerability that you want to assign for remediation.
5. On the toolbar, click Actions > Assign/Edit.
None of the fields on the Assign/Edit Vulnerability window are mandatory.
6. Optional: Select an alternative user from the Assigned User list.
7. Optional: In the Due Date list, select a future date when the vulnerability must
be remediated.
If you do not select a date, the Due Data is set as the current date.
8. Optional: In the Notes pane, type useful information about the reason for the
vulnerability assignment.
9. Click Save.
71
You can automatically email reports to your technical users with the details of
vulnerabilities that they are responsible for fixing.
Procedure
Click the Vulnerabilities tab.
In the navigation pane, click Vulnerability Assignment.
On the toolbar, click Add.
Type a name, email address, and CIDR range.
To automatically assign a technical user in the New Asset Owner window, the
only mandatory fields are Name, Email, and CIDR.
5. To filter the list of assets in your CIDR range by asset name, type a text string
in the Asset Name Filter field.
6. To filter the list of assets in your CIDR range by operating system, type a text
string in the OS Filter field.
7. Optional: Click Asset Search to assign the technical user to the assets
associated with a saved asset search.
1.
2.
3.
4.
8. Click Save.
9. Optional: On the toolbar, click Remediation Times.
You can configure the remediation time for each type of vulnerability,
depending on their risk and severity.
For example, you might need high risk vulnerabilities to be fixed within 5
days.
10. Optional: On the toolbar, click Schedule.
By default, the technical user contact for your assets is updated every 24
hours.
New assets added to your deployment and falling within the CIDR range that
you specified are automatically updated with the technical contact that you
specified.
Important: The schedule applies to the associations you made between
technical users and groups of assets.
11. Optional: Click Update Now, to immediately set the owner of your assets.
Attention: Depending on the size of your deployment, it might take an
extended time to update your assets.
12. Click Save.
Any vulnerabilities that are already assigned to a technical user for
remediation are updated with the new technical user.
13. If vulnerabilities were not previously assigned to a technical user, you must
scan the assets that you assigned to the technical user.
Important: Scanning the assets ensures that any vulnerabilities assigned to a
technical user exist on the asset.
72
Procedure
1.
2.
3.
4.
5. Update the remediation times for vulnerabilities that are based on their risk
and severity.
6. Click Save.
73
74
Procedure
1. Click the Reports tab.
2. From the list of reports, click the report that you want to run.
For example, you might want to show a report of your vulnerability overview
for the last seven days.
3. On the toolbar, select Actions > Run Report, then click OK.
4. To view the completed report in a PDF format, click the icon in the Formats
column.
75
Procedure
Click the Reports tab.
On the toolbar, select Actions > Create.
Click Weekly and then click Next.
Click the undivided report layout that is displayed on the upper left section of
the report wizard and click Next.
5. Type a Report Title.
6. In the Chart Type list, select Asset Vulnerabilities and type a Chart Title.
1.
2.
3.
4.
7. Optional: If a technical contact owner is responsible for more than five assets
and you want to email all asset information, increase the value in the Limit
Assets To Top list.
Remember: By using the Assets tab, you must ensure that the same technical
contact owner is assigned to each asset that they are responsible for.
8. In the Graph Type field, select AggregateTable.
If you select any value other than AggregateTable, the report does not
generate a vulnerability sub-report.
9. In the Graph Content pane, click Search to Use and select your saved
technical contact vulnerability search then click Save Container Details.
10. Click Next and select your report output type.
11. In the report distribution section of the report wizard, click Multiple Reports.
12. Click All Asset Owners.
13. Optional: Click Load asset owners to display all list of the technical users
contact details.
You can remove any technical users that you do not want to email with a list
of assigned vulnerabilities.
14. On the Reports list, select the report that you created and on the toolbar, select
Actions > Run Report.
Related tasks:
Assigning a technical user as the owner of asset groups on page 71
In IBM Security QRadar Vulnerability Manager you can configure groups of assets
and automatically assign their vulnerabilities to technical users.
Searching vulnerability data on page 58
In IBM Security QRadar Vulnerability Manager, you can identify important
vulnerabilities by searching your vulnerability data.
76
Procedure
1. Run a PCI scan for the assets in your network that store or process PCI
information.
For more information, see Creating a scan profile on page 23.
2. Update your asset compliance plans and software declarations.
Your compliance plan and software declarations are displayed in the special
notes section of the executive summary.
For more information, see the PCI security standards for approved software
vendors.
3. Create and run a PCI compliance report for the assets that you scanned.
Related tasks:
Creating a scan profile on page 23
In IBM Security QRadar Vulnerability Manager, you configure scan profiles to
specify how and when your network assets are scanned for vulnerabilities.
Procedure
1.
2.
3.
4.
5. In the Edit Asset Profile window, click the CVSS, Weight & Compliance pane.
6. Complete the following fields. Use the hover help if you need assistance:
v
v
v
v
v
Compliance
Compliance
Compliance
Compliance
Compliance
Plan
Notes
Notes Declaration
Notes Description
Out Of Scope Reason
7. Click Save.
77
The PCI compliance report demonstrates that your assets involved in PCI activities
comply with security precautions that prevent outside attack.
Procedure
1.
2.
3.
4.
5.
6.
7.
8.
Results
The report is displayed in the reports list and is automatically generated.
Procedure
1. Click the Assets tab.
2. In the navigation pane, click Asset Profiles, then on the toolbar click Search >
New Search.
3. In the field containing column names, in the field on the left, click the column
headings you want to include in your search, and click the arrow button to
move the selected headings to field on the right.
78
4. Click the up and down buttons to change the priority of the selected column
headings.
5. When the field on the right contains all the column heading that you want to
search on, click Search.
79
80
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, select Research > Vulnerabilities.
3. Optional: If no vulnerabilities are displayed, select an alternative time range
from the Viewing vulnerabilities from list.
4. Optional: To search the vulnerabilities, on the toolbar, select Search > New
Search.
5. Identify the vulnerability that you want to investigate.
6. Click the vulnerability link in the Vulnerability Name column.
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, click Research > News.
3. If no news articles are displayed, select an alternative time range from the
Viewing news from list.
4. To search the news articles, on the toolbar, select Search > New Search.
5. Identify the news article that you want to find out more about.
6. Click the news article link in the Article Title column.
81
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, click Research > Advisories.
3. If no advisories are displayed, select an alternative time range from the
Viewing advisories from list.
4. If you want to search the security advisories, on the toolbar, select Search >
New Search.
5. Click the advisory link in the Advisory column.
Each security advisory might include vulnerability references, solutions, and
workarounds.
Procedure
1. Click the Vulnerabilities tab.
2. In the navigation pane, click one of the following options:
v Research > Vulnerabilities.
v Research > News.
v Research > Advisories.
3. On the toolbar, select Search > New Search.
4. Type a search phrase in the Phrase field.
5. If you are searching news items, select a news source from the Source list.
6. In the By Date Range area, specify the date period for the news or advisory
that you are interested in.
7. If you are searching a published vulnerability, specify a vendor, product, and
product version in the By Product area.
8. If you are searching a published vulnerability, specify a CVE, Vulnerability, or
OSVDB ID in the By ID area.
82
Notices
This information was developed for products and services offered in the U.S.A.
IBM may not offer the products, services, or features discussed in this document in
other countries. Consult your local IBM representative for information on the
products and services currently available in your area. Any reference to an IBM
product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product,
program, or service that does not infringe any IBM intellectual property right may
be used instead. However, it is the user's responsibility to evaluate and verify the
operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not grant you
any license to these patents. You can send license inquiries, in writing, to:
IBM Director of Licensing
IBM Corporation
North Castle Drive
Armonk, NY 10504-1785 U.S.A.
For license inquiries regarding double-byte character set (DBCS) information,
contact the IBM Intellectual Property Department in your country or send
inquiries, in writing, to:
Intellectual Property Licensing
Legal and Intellectual Property Law
IBM Japan Ltd.
19-21, Nihonbashi-Hakozakicho, Chuo-ku
Tokyo 103-8510, Japan
The following paragraph does not apply to the United Kingdom or any other
country where such provisions are inconsistent with local law:
INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS
PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER
EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE. Some states do not allow disclaimer of express or
implied warranties in certain transactions, therefore, this statement may not apply
to you.
This information could include technical inaccuracies or typographical errors.
Changes are periodically made to the information herein; these changes will be
incorporated in new editions of the publication. IBM may make improvements
and/or changes in the product(s) and/or the program(s) described in this
publication at any time without notice.
Any references in this information to non-IBM Web sites are provided for
convenience only and do not in any manner serve as an endorsement of those Web
sites. The materials at those Web sites are not part of the materials for this IBM
product and use of those Web sites is at your own risk.
Copyright IBM Corp. 2012, 2014
83
IBM may use or distribute any of the information you supply in any way it
believes appropriate without incurring any obligation to you.
Licensees of this program who wish to have information about it for the purpose
of enabling: (i) the exchange of information between independently created
programs and other programs (including this one) and (ii) the mutual use of the
information which has been exchanged, should contact:
IBM Corporation
170 Tracer Lane,
Waltham MA 02451, USA
Such information may be available, subject to appropriate terms and conditions,
including in some cases, payment of a fee.
The licensed program described in this document and all licensed material
available for it are provided by IBM under terms of the IBM Customer Agreement,
IBM International Program License Agreement or any equivalent agreement
between us.
Any performance data contained herein was determined in a controlled
environment. Therefore, the results obtained in other operating environments may
vary significantly. Some measurements may have been made on development-level
systems and there is no guarantee that these measurements will be the same on
generally available systems. Furthermore, some measurements may have been
estimated through extrapolation. Actual results may vary. Users of this document
should verify the applicable data for their specific environment.
Information concerning non-IBM products was obtained from the suppliers of
those products, their published announcements or other publicly available sources.
IBM has not tested those products and cannot confirm the accuracy of
performance, compatibility or any other claims related to non-IBM products.
Questions on the capabilities of non-IBM products should be addressed to the
suppliers of those products.
All statements regarding IBM's future direction or intent are subject to change or
withdrawal without notice, and represent goals and objectives only.
All IBM prices shown are IBM's suggested retail prices, are current and are subject
to change without notice. Dealer prices may vary.
This information contains examples of data and reports used in daily business
operations. To illustrate them as completely as possible, the examples include the
names of individuals, companies, brands, and products. All of these names are
fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
If you are viewing this information softcopy, the photographs and color
illustrations may not appear.
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of
International Business Machines Corporation in the United States, other countries,
or both. If these and other IBM trademarked terms are marked on their first
occurrence in this information with a trademark symbol ( or ), these symbols
84
indicate U.S. registered or common law trademarks owned by IBM at the time this
information was published. Such trademarks may also be registered or common
law trademarks in other countries. A current list of IBM trademarks is available on
the Web at Copyright and trademark information (www.ibm.com/legal/
copytrade.shtml).
Java and all Java-based trademarks and logos are trademarks or registered
trademarks of Sun Microsystems, Inc. in the United States, other countries, or both.
Linux is a trademark of Linus Torvalds in the United States, other countries, or
both.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of
Microsoft Corporation in the United States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
Other company, product, and service names may be trademarks or service marks
of others.
Notices
85
86
Glossary
This glossary provides terms and definitions for
the IBM Security QRadar Vulnerability Manager
software and products.
The following cross-references are used in this
glossary:
v See refers you from a non-preferred term to the
preferred term or from an abbreviation to the
spelled-out form.
v See also refers you to a related or contrasting
term.
For other terms and definitions, see the IBM
Terminology website (opens in new window).
A C D E F H I on page 88 N on
page 88 O on page 88 P on page 88 R on
page 88 S on page 88 T on page 88 U on
page 88 V on page 89
C
CDP
D
DNS
encryption
In computer security, the process of
transforming data into an unintelligible
form in such a way that the original data
either cannot be obtained or can be
obtained only by using a decryption
process.
F
See collateral damage potential.
console
advisory
A document that contains information
and analysis about a threat or
vulnerability.
asset
H
HA
87
I
Internet Protocol (IP)
A protocol that routes data through a
network or interconnected networks. This
protocol acts as an intermediary between
the higher protocol layers and the
physical network. See also Transmission
Control Protocol.
See Internet Protocol.
IP
N
national vulnerability database (NVD)
A United States repository of
standards-based vulnerability
management data.
NVD
O
offense
A message sent or an event generated in
response to a monitored condition. For
example, an offense will provide
information on whether a policy has been
breached or the network is under attack.
on-demand scan
A scan that runs only when initiated by
the user. The types of scans include full
scans, discovery scans, patch scans, PCI
scans, database scans and web scans.
operational window
A configured time period within which a
scan is permitted to run.
PCI DSS
See Payment Card Industry Data Security
Standard.
PCI severity level
The level of risk that a vulnerability poses
to the payment card industry.
R
remediation process
A process of assigning, tracking, and
fixing vulnerabilities that have been
identified on an asset.
S
scan exclusion list
A list of assets, network groups, and
CIDR ranges that are ignored by scans.
scan profile
The configuration information that
specifies how and when the assets on a
network are scanned for vulnerabilities.
Simple Network Management Protocol (SNMP)
A set of protocols for monitoring systems
and devices in complex networks.
Information about managed devices is
defined and stored in a Management
Information Base (MIB).
SNMP
See Simple Network Management
Protocol.
T
TCP
P
Payment Card Industry Data Security Standard
(PCI DSS)
A worldwide information security
standard assembled by the Payment Card
Industry Security Standards Council (PCI
SSC). The standard was created to help
organizations that process card payments
to prevent credit card fraud through
increased controls around data and its
exposure to compromise. The standard
applies to all organizations which hold,
process, or pass cardholder information
from any card branded with the logo of
one of the card brands.
88
U
UDP
V
vulnerability
A security exposure in an operating
system, system software, or application
software component.
Glossary
89
90
Index
A
deployment editor
verifying the vulnerability
processor 7
DMZ
scanning 10
DMZ scanning
configuring QRadar Vulnerability
Manager 11
DMZ scans
asset configuration 10
network configuration 10
document mode
Internet Explorer web browser 12
domain scanning
scheduling 28
domain scans
configuring 28
activation keys
QRadar Vulnerability Manager 4
QRadar Vulnerability Manager
appliances 4
administrative shares 44
asset configuration
DMZ scanning 10
asset search filters
custom asset properties 52, 78
asset vulnerabilities
analyzing 62
authenticated scanning 38
Linux,UNIX 37
B
backup and recovery
vulnerability data 4
benchmark scan profiles
configuring 25
creating 25
browser mode
Internet Explorer web browser
E
exception rules
manage 69
managing 70
excluded scan targets
managing 31
executing
scans 25, 26
12
C
CIDR ranges 48
scanning 30
customized vulnerability dashboards
creating 16
F
false positive vulnerabilities
reducing 63
D
dashboards
creating for vulnerability
management 16, 17
displaying for vulnerability
management 16
information about vulnerability
management 16
DCOM 43
default vulnerability management
dashboard
displaying 16
default vulnerability reports
running 75
deployment
DMZ scanner 10, 11
managed host processor 6
managed host scanner 9
QRadar Vulnerability Manager
processor 6
removing a vulnerability processor
verifying the vulnerability
processor 7
Vulnerability scanners 8
G
glossary
87
H
high risk assets and vulnerabilities
identifying 64
high risk vulnerabilities
prioritizing 65
high risk vulnerability reports
emailing 76
L
Linux 38
patch scanning
34
M
managed host
deploying a processor 6
deploying a scanner 9
installation and processor
deployment 6
N
network administrator vii
network configuration
DMZ scanning 10
network vulnerabilities
reviewing 62
new asset scans
scheduling 28, 29
new features
version 7.2.4 user guide overview
news articles
researching 81
O
open port
scans 33
open port scans
configuring 33
open service vulnerabilities
analyzing 63
operational window
removing from scan profile
scans 45
operational windows
creating 45
editing 46
46
P
patch compliance dashboards
creating 17
patch scanning 40, 41, 42, 43, 44
Linux 34
UNIX 34
Windows 34, 39
pending patch downloads 54
91
Q
QRadar managed host
deploying a scanner 9
scanner deployment 9
QRadar Risk Manager
integration 19
QRadar Vulnerability Manager
activation keys 4
connecting IBM Security
SiteProtector 22
DMZ scanner deployment 11
DMZ scanning 10
installation and deployment 3
integrating IBM Endpoint
Manager 20, 21
overview 15
QRadar Vulnerability Manager appliance
activation keys 4
QRadar Vulnerability Manager processor
deployment 6
removal 7
QRadar Vulnerability Manager scanner
deployment 9
QRadar Vulnerability Manager scanners
additional deployments 8
R
remote registry 41
risk score
color coding 66
risk scores
investigating 57
S
saved vulnerability searches
deleting 61
scan exclusions
creating 31
managing 31
scan profile
configuration options 26
scan profile details
configuring 26
scan profiles
configuring 23, 24
creating 23, 24
excluding assets from scans 31
port range scanning 32
removing operational windows 46
running manually 25, 26
scheduling scans 28
specifying scan targets 30
windows patch scanning 39
scan results
management of 52
92
T
technical owner asset details
configuring 77
U
UNIX 38
patch scanning 34
UNIX authenticated scans
38
V
vulnerabilities
assigning for remediation
automatically 72, 73
manually 71
backup and recovery 4
managing 57
researching 81
researching advisories 82
risk score 57
scanning 15, 23
scheduling scans 28
viewing history 63
vulnerability advisories
reviewing 82
vulnerability data
reviewing 53
vulnerability exception rules
applying automatically 63
creating 69
vulnerability exceptions
automatic configuration 63
searching 58
vulnerability history
viewing 63
vulnerability instances
analyzing 62
vulnerability management
creating a customized dashboard 16
creating a patch compliance
dashboard 17
displaying the default dashboard 16
overview 15
vulnerability patch status
identifying 67
vulnerability processor
adding to deployment 6
deploying on a managed host 5
deploying to a QRadar console 6
deploying to a QRadar Vulnerability
Manager managed host 6
moving to a managed host 5
removal 7
verifying deployment 7
vulnerability remediation
management 71
vulnerability reports
creating and scheduling 78
emailing 76
pci compliance 77
Vulnerability reports
overview 75
vulnerability research
overview 81
vulnerability risk
scoring vulnerabilities 57
vulnerability risk and pci severity
reviewing 54
vulnerability risk levels
reviewing 53
vulnerability scanning
scan profiles 23
specifying scan targets 30
vulnerability scans 38, 40, 41, 42
during permitted times 45
email when scans start and stop 55
excluding assets from scans 31
open port scanning 33
permitted scan intervals 45
port ranges 32
public key authentication 36
scheduling 28
UNIX authenticated scans 37
Windows patch scans 39
vulnerability search
parameters 59
vulnerability searches
saving criteria 61
W
web browser
supported versions 11, 12
what's new
version 7.2.4 user guide overview 1
Windows 40, 41, 42
patch scanning 34
Windows patch scanning 40, 41, 42, 43,
44
configuring 39
Windows remote registry access
configuring 41
Windows scanning
enabling remote registry access 41
WMI
40, 42, 43
Index
93