Skip to content

Commit 12e1510

Browse files
authored
Merge pull request #109448 from memildin/asc-melvyn-20200129
Added a flow diagram (and a whole overview section)
2 parents 99fd5ab + c532bd3 commit 12e1510

File tree

2 files changed

+35
-14
lines changed

2 files changed

+35
-14
lines changed

articles/security-center/built-in-vulnerability-assessment.md

Lines changed: 35 additions & 14 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: Built-in vulnerability scanner in Azure Security Center
3-
description: Azure Security Center includes a fully integrated vulnerability assessment solution from Qualys. This article describes how to deploy and use the tool.
3+
description: Azure Security Center includes a fully integrated vulnerability assessment solution from Qualys. Learn more about this Security Center extension on this page.
44
services: security-center
55
documentationcenter: na
66
author: memildin
@@ -10,7 +10,7 @@ ms.devlang: na
1010
ms.topic: conceptual
1111
ms.tgt_pltfrm: na
1212
ms.workload: na
13-
ms.date: 03/22/2020
13+
ms.date: 03/30/2020
1414
ms.author: memildin
1515

1616
---
@@ -24,23 +24,44 @@ This feature is currently in preview.
2424
> [!NOTE]
2525
> Security Center supports the integration of tools from other vendors, but you'll need to handle the licensing costs, deployment, and configuration. For more information, see [Deploying a partner vulnerability scanning solution](partner-vulnerability-assessment.md). You can also use those instructions to integrate your organization's own Qualys license, if you choose not to use the built-in vulnerability scanner included with Azure Security Center.
2626
27-
## Deploying the Qualys built-in vulnerability scanner (Standard tier only)
27+
28+
## Overview of the integrated vulnerability scanner
29+
30+
The vulnerability scanner extension works as follows:
31+
32+
1. **Deploy** - Azure Security Center deploys the Qualys extension to the selected virtual machine/s.
33+
34+
1. **Gather information** - The extension collects artifacts and sends them for analysis in the Qualys cloud service in the defined region.
35+
36+
1. **Analyze** - Qualys's cloud service conducts the vulnerability assessment and sends its findings to Security Center.
37+
38+
> [!IMPORTANT]
39+
> To ensure the privacy, confidentiality, and security of our customers, Microsoft doesn't share customer details with Qualys. [Learn more about the privacy standards built into Azure](https://www.microsoft.com/trust-center/privacy).
40+
41+
42+
1. **Report** - The findings are available to you in Security Center.
43+
44+
[![Process flow diagram for Azure Security Center's built-in vulnerability scanner](media/built-in-vulnerability-assessment/va-vm-flow-diagram.png)](media/built-in-vulnerability-assessment/va-vm-flow-diagram.png#lightbox)
45+
46+
47+
48+
## Deploying the Qualys built-in vulnerability scanner
2849

2950
The simplest way to scan your Azure-based virtual machines for vulnerabilities is to use the built-in vulnerability scanner.
3051

3152
To deploy the vulnerability scanner extension:
3253

33-
1. Open Azure Security Center and go to the **Recommendations** page.
54+
1. Open Azure Security Center and go to the **Recommendations** page for a subscription on the standard pricing tier.
3455

35-
1. Select the recommendation named "Enable the built-in vulnerability assessment solution on virtual machines (powered by Qualys)".
56+
1. Select the recommendation named **"Enable the built-in vulnerability assessment solution on virtual machines (powered by Qualys)"**.
3657

3758
[![Recommendations page in Azure Security Center filtered to Qualys recommendations](media/built-in-vulnerability-assessment/va-recommendations-enable-selected.png)](media/built-in-vulnerability-assessment/va-recommendations-enable-selected.png#lightbox)
3859

3960
Your VMs will appear in one or more of the following groups:
4061

4162
* **Healthy resources** – the vulnerability scanner extension has been deployed to these VMs.
4263
* **Unhealthy resources** – the vulnerability scanner extension can be deployed to these VMs.
43-
* **Not applicable resources** – these VMs can't have the vulnerability scanner extension deployed. Your VM might be in this tab because it's on the free pricing tier, it's missing the ImageReference class (relevant to custom images and VMs restored from backup, as explained in the Azure for .NET documentation](https://docs.microsoft.com/dotnet/api/microsoft.azure.batch.imagereference?view=azure-dotnet), or it's not running one of the supported OSes:
64+
* **Not applicable resources** – these VMs can't have the vulnerability scanner extension deployed. Your VM might be in this tab because it's on the free pricing tier, it's missing the ImageReference class (relevant to custom images and VMs restored from backup, as explained in [this Azure for .NET page](https://docs.microsoft.com/dotnet/api/microsoft.azure.batch.imagereference?view=azure-dotnet)), or it's not running one of the supported OSes:
4465

4566
- All versions of Windows
4667
- Red Hat Enterprise Linux 6.7, 7.6
@@ -60,7 +81,7 @@ To deploy the vulnerability scanner extension:
6081

6182
## Viewing and remediating discovered vulnerabilities
6283

63-
When Security Center identifies vulnerabilities, it presents findings and related information as recommendations. The related information includes remediation steps, related CVEs, CVSS scores, and more. You can view the identified vulnerabilities for one or more subscriptions, or for a specific virtual machine.
84+
When Security Center identifies vulnerabilities, it presents findings and related information as recommendations. The related information includes remediation steps, related CVEs, CVSS scores, and more. You can view the identified vulnerabilities for one or more subscriptions, or for a specific VM.
6485

6586
To see the findings and remediate the identified vulnerability:
6687

@@ -72,7 +93,7 @@ To see the findings and remediate the identified vulnerability:
7293

7394
[![List of findings from Qualys for all selected subscriptions](media/built-in-vulnerability-assessment/va-findings-all.png)](media/built-in-vulnerability-assessment/va-findings-all.png#lightbox)
7495

75-
1. To filter the findings by a specific VM, open the "Affected resources" section and click the VM that interests you. Alternatively, select a VM from the resource health view, and view all relevant recommendations for that resource.
96+
1. To filter the findings by a specific VM, open the "Affected resources" section and click the VM that interests you. Or you can select a VM from the resource health view, and view all relevant recommendations for that resource.
7697

7798
Security Center shows the findings for that VM, ordered by severity.
7899

@@ -104,7 +125,7 @@ For full instructions and a sample ARG query, see this Tech Community post: [Exp
104125
## Built-in Qualys vulnerability scanner FAQ
105126

106127
### Are there any additional charges for the Qualys license?
107-
No. The built-in scanner is free to all standard tier users. The "Enable the built-in vulnerability assessment solution on virtual machines (powered by Qualys)" recommendation deploys a scanner that includes all the necessary licensing and configuration information. No additional licenses are required.
128+
No. The built-in scanner is free to all standard tier users. The "Enable the built-in vulnerability assessment solution on virtual machines (powered by Qualys)" recommendation deploys the scanner with its licensing and configuration information. No additional licenses are required.
108129

109130
### What permissions are required to install the Qualys extension?
110131
You'll need write permissions for any VM on which you want to deploy the extension.
@@ -136,18 +157,18 @@ Some updates to the vulnerability scanner extension may require manual deploymen
136157

137158
![Qualys agent extension version information](media/built-in-vulnerability-assessment/qualys-agent-extension-version.png)
138159

139-
1. If the version is 1.0.0.4, click **Uninstall** and wait until the extension is no longer listed in the Extensions page of the VM.
160+
1. If the version is 1.0.0.4, click **Uninstall** and wait until the extension is no longer listed in the VM's extensions page.
140161

141162
1. Restart the VM.
142163

143-
1. When the VM's status is "Running", deploy the extension as described above in [Deploying the Qualys built-in vulnerability scanner](#deploying-the-qualys-built-in-vulnerability-scanner-standard-tier-only).
164+
1. When the VM's status is "Running", deploy the extension as described above in [Deploying the Qualys built-in vulnerability scanner](#deploying-the-qualys-built-in-vulnerability-scanner).
144165

145166
### Why does my VM show as "not applicable" in the recommendation?
146167
When you open the recommendation, you'll see your VMs in one or more of the following groups:
147168

148169
- **Healthy resources** – the vulnerability scanner extension has been deployed to these VMs.
149170
- **Unhealthy resources** – the vulnerability scanner extension can be deployed to these VMs.
150-
- **Not applicable resources** – These VMs can't have the vulnerability scanner extension deployed. Your VM might be in this tab because it's on the free pricing tier, it's missing the ImageReference class (relevant to custom images and VMs restored from backup, as explained in the Azure for .NET documentation](https://docs.microsoft.com/dotnet/api/microsoft.azure.batch.imagereference?view=azure-dotnet), or it's not running one of the supported OSes:
171+
- **Not applicable resources** – These VMs can't have the vulnerability scanner extension deployed. Your VM might be in this tab because it's on the free pricing tier, it's missing the ImageReference class (relevant to custom images and VMs restored from backup, as explained in [this Azure for .NET page](https://docs.microsoft.com/dotnet/api/microsoft.azure.batch.imagereference?view=azure-dotnet)), or it's not running one of the supported OSes:
151172

152173
- All versions of Windows
153174
- Red Hat Enterprise Linux 6.7, 7.6
@@ -161,12 +182,12 @@ When you open the recommendation, you'll see your VMs in one or more of the foll
161182
The scanner is running on your virtual machine and looking for vulnerabilities of the VM itself. From the virtual machine, it can't scan your network.
162183

163184
### Does the scanner integrate with my existing Qualys console?
164-
The Security Center extension is a separate tool from your existing Qualys scanner and, because of licensing restrictions, must be used within Azure Security Center.
185+
The Security Center extension is a separate tool from your existing Qualys scanner. Licensing restrictions mean that it can only be used within Azure Security Center.
165186

166187
### Microsoft Defender Advanced Threat Protection also includes Threat & Vulnerability Management (TVM). How is the Security Center Vulnerability Assessment extension different?
167188
Microsoft is actively developing world-class vulnerability management with Microsoft Defender ATP's Threat & Vulnerability Management solution, built into Windows.
168189

169-
Today, Azure Security Center's Vulnerability Assessment extension is powered by Qualys. This ensures support for both Windows and Linux virtual machines. The extension also benefits from Qualys's own knowledge of vulnerabilities that don't yet have CVEs.
190+
Today, Azure Security Center's Vulnerability Assessment extension is powered by Qualys. The Qualys extension ensures support for both Windows and Linux VMs. The extension also benefits from Qualys's own knowledge of vulnerabilities that don't yet have CVEs.
170191

171192
## Next steps
172193
This article described the Azure Security Center Vulnerability Assessment extension (powered by Qualys) for scanning your VMs. For related material, see the following articles:
74.8 KB
Loading

0 commit comments

Comments
 (0)