Skip to content

Commit 00d5793

Browse files
committed
Added port and protocol info for Qualys' back-end
1 parent 581dfbf commit 00d5793

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

articles/security-center/built-in-vulnerability-assessment.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -91,7 +91,7 @@ To deploy the vulnerability scanner extension:
9191

9292
Scanning begins automatically as soon as the extension is successfully deployed. Scans will then run at four-hour intervals. This interval is hard-coded and not configurable.
9393

94-
1. If the deployment fails on one or more VMs, ensure the target VMs can communicate with Qualys's cloud service on the following two IP addresses:
94+
1. If the deployment fails on one or more VMs, ensure the target VMs can communicate with Qualys's cloud service on the following two IP addresses (via port 443 - the default for HTTPS):
9595

9696
- 64.39.104.113
9797
- 154.59.121.74
@@ -150,7 +150,7 @@ You'll need write permissions for any VM on which you want to deploy the extensi
150150

151151
The Azure Security Center Vulnerability Assessment extension (powered by Qualys), like other extensions, runs on top of the Azure Virtual Machine agent. So it runs as Local Host on Windows, and Root on Linux.
152152

153-
During setup, Security Center checks to ensure that the VM can communicate with Qualys's cloud service on the following two IP addresses:
153+
During setup, Security Center checks to ensure that the VM can communicate with Qualys's cloud service on the following two IP addresses (via port 443 - the default for HTTPS):
154154

155155
- 64.39.104.113
156156
- 154.59.121.74

0 commit comments

Comments
 (0)