Skip to main content

Setup Integration from Qualys

Qualys VMDR Integration Guide 

Integrate Qualys Vulnerability Management, Detection and Response (VMDR)

This Qualys VMDR (external, opens in a new tab or window) integration is a cloud-based service that gives you immediate, global visibility into where your IT systems might be vulnerable to the latest Internet threats and how to protect them. It helps you to continuously identify threats and monitor unexpected changes in your network before they turn into breaches.

The Qualys VMDR integration uses REST API mode to collect data. Elastic Agent fetches data via API endpoints.

Compatibility

This module has been tested against the latest Qualys VMDR version v2.

Data streams

The Qualys VMDR integration collects data for the following three events:

Event Type
Asset Host Detection
Knowledge Base
User Activity Log

Starting from Qualys VMDR integration version 6.0, the Asset Host Detection data stream includes enriched vulnerabilities data from Qualys Knowledge Base API.

Requirements

  • Elastic Agent must be installed.
  • You can install only one Elastic Agent per host.
  • Elastic Agent is required to stream data through the REST API and ship the data to Elastic, where the events will then be processed via the integration's ingest pipelines.
Agentless Enabled Integration

Agentless integrations allow you to collect data without having to manage Elastic Agent in your cloud. They make manual agent deployment unnecessary, so you can focus on your data instead of the agent that collects it. For more information, refer to Agentless integrations (external, opens in a new tab or window) and the Agentless integrations FAQ (external, opens in a new tab or window). Agentless deployments are only supported in Elastic Serverless and Elastic Cloud environments. This functionality is in beta and is subject to change. Beta features are not subject to the support SLA of official GA features.

Installing and managing an Elastic Agent:

You have a few options for installing and managing an Elastic Agent:

Install a Fleet-managed Elastic Agent (recommended):

With this approach, you install Elastic Agent and use Fleet in Kibana to define, configure, and manage your agents in a central location. We recommend using Fleet management because it makes the management and upgrade of your agents considerably easier.

Install Elastic Agent in standalone mode (advanced users):

With this approach, you install Elastic Agent and manually configure the agent locally on the system where it’s installed. You are responsible for managing and upgrading the agents. This approach is reserved for advanced users only.

Install Elastic Agent in a containerized environment:

You can run Elastic Agent inside a container, either with Fleet Server or standalone. Docker images for all versions of Elastic Agent are available from the Elastic Docker registry, and we provide deployment manifests for running on Kubernetes.

There are some minimum requirements for running Elastic Agent and for more information, refer to the link here.

Description:

Integrate Qualys Vulnerability Management, Detection and Response (VMDR) with the Elastic Stack usingvia REST API-based methods. This allows youAPI to ingest vulnerability, asset, and detection data directly into Elasticsearch for centralized security monitoring, visualization,monitoring and analysis.

Credentials & API Access Setup

WhatBefore Itconfiguring Does:

the
    integration,
  • Connectsyou’ll need to Qualysprepare VMDR using the REST API
  • Fetches vulnerability data, asset inventory, and host-level detections
  • Enables structured indexing, Kibana dashboards, and Elastic SIEM correlation
  • Supports both manual script-based integration and automated Elastic Agent setup

Option 1: API-Based Script Integration

Description:

Use Qualys' RESTyour API withcredentials ain custom script (e.g., Python) to pull data and send it to Elasticsearch.Qualys:

What It Does:

  • Fetches Qualys scan results, vulnerabilities, and asset data on demand
  • Allows you to customize scheduling, parsing, and indexing behavior
  • Works with any self-managed Elastic cluster or Elastic Cloud deployment

Steps:

Prepare API Access:

    1. Log in to the Qualys Admin Portal.

    2. Go to User Management.

    3. Create or select a dedicated API userUser with:

      • API Access permission

      • Access toto:

        VMDR,
          Host,
        • and

          VMDR Module

        • Host Detection

          modules
        • Asset Inventory

        • Knowledge Base

        • User Activity Log (if required)

    4. SaveTake thenote username and password for authentication

Call the API:

 

GET https://qualysapi.qualys.com/api/2.0/fo/asset/host/vm/detection/

 

Use Basic Authentication with your API user credentials.

Python Example Script:

 

import requests, json
from requests.auth import HTTPBasicAuth

response = requests.get(
    "https://qualysapi.qualys.com/api/2.0/fo/asset/host/vm/detection/",
    auth=HTTPBasicAuth("QUALYS_USER", "PASSWORD"),
    headers={"X-Requested-With": "curl"}
)

data = {"raw_data": response.text}

requests.post(
    "http://<elasticsearch>:9200/qualys-vulns/_doc",
    headers={"Content-Type": "application/json"},
    data=json.dumps(data)
)

 

Option 2: Elastic Agent – Qualys VMDR Integration (REST API)

Description:

Use Elastic Agent’s built-in Qualys VMDR integration to automatically fetch vulnerability and asset data via the REST API and ingest it directly into Elasticsearch.

What It Does:

  • Connects to Qualys VMDR using a dedicated API user
  • Fetches data streams like detections, vulnerabilities, and host asset inventory
  • Provides ready-made Kibana dashboards and works with Elastic Security rules
  • Fully managed through Fleet UI in Elastic Cloud or self-managed Elastic Stack
Steps:

Enable API Access in Qualys:of:

  • Ensure a Qualys API user existsUsername

  • GrantPassword

    the
  • following:
  • Your Qualys Platform API URL:

    • APICheck Accessvia: Qualys Platform Identification

    • AccessOr log in to VMDR,Qualys Host, Detection,Help and InventoryAbout modules assee needed“Security Operations Center (SOC)” for your URL.

Install

Elastic Agent:

Integration
    Configuration

  • In

    InstallKibana:

    Elastic Agent on your server, endpoint, or VM

  • Enroll it into Fleet via Kibana or Elastic Cloud

  • Add the Qualys VMDR Integration:

      1. Go to Kibana → FleetManagement → Integrations

      2. Search for “Qualys VMDR” and click Add Integration

      3. Enter:

        • API Server URL (e.g., https://qualysapi.qualys.com)

        • API Username

        • API Password

        • Optional: page size or polling interval

    Choose Data Streams to Collect:

    • vulnerability

    • detection

    • host

    • asset_inventory (if supported)

    Save the Integration Policy:

    • Attach the policy to an Elastic Agent

    • Agent will start fetching and shipping data automatically

    References:

     

    What Happens Next

    When you run your custom script (Option 1):
    → Data is pulled from Qualys via REST API and posted to a target Elasticsearch index
    → You control the fetch frequency, field mappings, and transformation logic
    → Dashboards must be manually built or customized in Kibana

    When you enable Elastic Agent integration (Option 2):
    → Agent continuously pulls vulnerability and detection data from Qualys
    → Prebuilt dashboards populate in Kibana
    → Vulnerabilities can be used in SIEM detection rules or custom queries

    Integration Requirements Overview

    ComponentRequired for Option 1 (Script)Required for Option 2 (Elastic Agent)Purpose
    Qualys API UserYesYesAuthenticates to Qualys for REST API access
    VMDR Module AccessYesYesNeeded to access host, detection, and vulnerability data
    Role-Based Access Control (RBAC)YesYesEnsures the API user only accesses required modules
    Custom ScriptYesNoRequired only for manual API integration
    Elastic AgentNoYesRequired for Fleet-managed automatic integration
    Kibana AccessYesYesUsed to view dashboards and run security queries

    Permissions
    Asset Host Detection
    Role
    Permission
    Managers
    All VM scanned hosts in subscription
    Unit Managers
    VM scanned hosts in user’s business unit
    Scanners
    VM scanned hosts in user’s account
    Readers
    VM scanned hosts in user’s account
    Knowledge Base

    ManagersUnit ManagersScannersReaders have permission to download vulnerability data from the KnowledgeBase.

    User Activity Log
    Role
    Permission
    Managers
    All actions taken by all users
    Unit Managers
    Actions taken by users in their business unit
    Scanners
    Own actions only
    Readers
    Own actions only

    Setup

    To collect data through REST API, follow the below steps:
    • Considering you already have a Qualys user account, to identify your Qualys platform and get the API URL, refer this link.
    • Alternative way to get the API URL is to log in to your Qualys account and go to Help > About. You’ll find your URL under Security Operations Center (SOC).
    Enabling the integration in Elastic:
    1. In Kibana go to Management > Integrations

    2. In "Search for integrations"the search bar, type Qualys VMDR.

    3. ClickSelect on the "Qualys VMDR" integrationVMDR from the search results.

    4. Click on the Add Qualys VMDR Integration button to add the integration..

    While adding

    Provide the integration,following ifconnection details based on the data you want to collectcollect:

    datathefollowingdetails:

  • username
  • batch
  • size

    or if you want to collect Knowledge Base data via REST API, then you have to put the following details:

    • username
    • password
    • url
    • initial interval
    • interval
    • input parameters

    or if you want to collect

    datatoput
    Data StreamRequired Details
    Asset Host Detection username, viapassword, RESTAPI API,URL, theninterval, youinput haveparameters, tobatch putsize
    Knowledge
      Base
    username,
  • password
  • password,
  • url
  • API
  • interval
  • URL,
  • initial interval, interval, input parameters
  • User Activity logLog username, viapassword, RESTAPI API,URL, theninitial youinterval, haveinterval
    1. Save the following details:

      • username
      • password
      • url
      • initial interval
      • interval
      integration.

    Permissions

    Reference (API User)
    Data StreamRolePermission Scope
    ScreenshotAsset Host DetectionManagers, Unit Managers, Scanners, ReadersVM scanned hosts (depending on role scope)
    Knowledge BaseManagers, Unit Managers, Scanners, ReadersCan download vulnerability data
    User Activity LogManagers, Unit Managers, Scanners, ReadersCan view user actions (own or others, depending on role)

    image.png