You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/security-center/built-in-vulnerability-assessment.md
+35-14Lines changed: 35 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,6 +1,6 @@
1
1
---
2
2
title: Built-in vulnerability scanner in Azure Security Center
3
-
description: Azure Security Center includes a fully integrated vulnerability assessment solution from Qualys. This article describes how to deploy and use the tool.
3
+
description: Azure Security Center includes a fully integrated vulnerability assessment solution from Qualys. Learn more about this Security Center extension on this page.
4
4
services: security-center
5
5
documentationcenter: na
6
6
author: memildin
@@ -10,7 +10,7 @@ ms.devlang: na
10
10
ms.topic: conceptual
11
11
ms.tgt_pltfrm: na
12
12
ms.workload: na
13
-
ms.date: 03/22/2020
13
+
ms.date: 03/30/2020
14
14
ms.author: memildin
15
15
16
16
---
@@ -24,23 +24,44 @@ This feature is currently in preview.
24
24
> [!NOTE]
25
25
> Security Center supports the integration of tools from other vendors, but you'll need to handle the licensing costs, deployment, and configuration. For more information, see [Deploying a partner vulnerability scanning solution](partner-vulnerability-assessment.md). You can also use those instructions to integrate your organization's own Qualys license, if you choose not to use the built-in vulnerability scanner included with Azure Security Center.
26
26
27
-
## Deploying the Qualys built-in vulnerability scanner (Standard tier only)
27
+
28
+
## Overview of the integrated vulnerability scanner
29
+
30
+
The vulnerability scanner extension works as follows:
31
+
32
+
1.**Deploy** - Azure Security Center deploys the Qualys extension to the selected virtual machine/s.
33
+
34
+
1.**Gather information** - The extension collects artifacts and sends them for analysis in the Qualys cloud service in the defined region.
35
+
36
+
1.**Analyze** - Qualys's cloud service conducts the vulnerability assessment and sends its findings to Security Center.
37
+
38
+
> [!IMPORTANT]
39
+
> To ensure the privacy, confidentiality, and security of our customers, Microsoft doesn't share customer details with Qualys. [Learn more about the privacy standards built into Azure](https://www.microsoft.com/trust-center/privacy).
40
+
41
+
42
+
1.**Report** - The findings are available to you in Security Center.
43
+
44
+
[](media/built-in-vulnerability-assessment/va-vm-flow-diagram.png#lightbox)
45
+
46
+
47
+
48
+
## Deploying the Qualys built-in vulnerability scanner
28
49
29
50
The simplest way to scan your Azure-based virtual machines for vulnerabilities is to use the built-in vulnerability scanner.
30
51
31
52
To deploy the vulnerability scanner extension:
32
53
33
-
1. Open Azure Security Center and go to the **Recommendations** page.
54
+
1. Open Azure Security Center and go to the **Recommendations** page for a subscription on the standard pricing tier.
34
55
35
-
1. Select the recommendation named "Enable the built-in vulnerability assessment solution on virtual machines (powered by Qualys)".
56
+
1. Select the recommendation named **"Enable the built-in vulnerability assessment solution on virtual machines (powered by Qualys)"**.
36
57
37
58
[](media/built-in-vulnerability-assessment/va-recommendations-enable-selected.png#lightbox)
38
59
39
60
Your VMs will appear in one or more of the following groups:
40
61
41
62
***Healthy resources** – the vulnerability scanner extension has been deployed to these VMs.
42
63
***Unhealthy resources** – the vulnerability scanner extension can be deployed to these VMs.
43
-
***Not applicable resources** – these VMs can't have the vulnerability scanner extension deployed. Your VM might be in this tab because it's on the free pricing tier, it's missing the ImageReference class (relevant to custom images and VMs restored from backup, as explained in the Azure for .NET documentation](https://docs.microsoft.com/dotnet/api/microsoft.azure.batch.imagereference?view=azure-dotnet), or it's not running one of the supported OSes:
64
+
***Not applicable resources** – these VMs can't have the vulnerability scanner extension deployed. Your VM might be in this tab because it's on the free pricing tier, it's missing the ImageReference class (relevant to custom images and VMs restored from backup, as explained in [this Azure for .NET page](https://docs.microsoft.com/dotnet/api/microsoft.azure.batch.imagereference?view=azure-dotnet)), or it's not running one of the supported OSes:
44
65
45
66
- All versions of Windows
46
67
- Red Hat Enterprise Linux 6.7, 7.6
@@ -60,7 +81,7 @@ To deploy the vulnerability scanner extension:
60
81
61
82
## Viewing and remediating discovered vulnerabilities
62
83
63
-
When Security Center identifies vulnerabilities, it presents findings and related information as recommendations. The related information includes remediation steps, related CVEs, CVSS scores, and more. You can view the identified vulnerabilities for one or more subscriptions, or for a specific virtual machine.
84
+
When Security Center identifies vulnerabilities, it presents findings and related information as recommendations. The related information includes remediation steps, related CVEs, CVSS scores, and more. You can view the identified vulnerabilities for one or more subscriptions, or for a specific VM.
64
85
65
86
To see the findings and remediate the identified vulnerability:
66
87
@@ -72,7 +93,7 @@ To see the findings and remediate the identified vulnerability:
72
93
73
94
[](media/built-in-vulnerability-assessment/va-findings-all.png#lightbox)
74
95
75
-
1. To filter the findings by a specific VM, open the "Affected resources" section and click the VM that interests you. Alternatively, select a VM from the resource health view, and view all relevant recommendations for that resource.
96
+
1. To filter the findings by a specific VM, open the "Affected resources" section and click the VM that interests you. Or you can select a VM from the resource health view, and view all relevant recommendations for that resource.
76
97
77
98
Security Center shows the findings for that VM, ordered by severity.
78
99
@@ -104,7 +125,7 @@ For full instructions and a sample ARG query, see this Tech Community post: [Exp
104
125
## Built-in Qualys vulnerability scanner FAQ
105
126
106
127
### Are there any additional charges for the Qualys license?
107
-
No. The built-in scanner is free to all standard tier users. The "Enable the built-in vulnerability assessment solution on virtual machines (powered by Qualys)" recommendation deploys a scanner that includes all the necessary licensing and configuration information. No additional licenses are required.
128
+
No. The built-in scanner is free to all standard tier users. The "Enable the built-in vulnerability assessment solution on virtual machines (powered by Qualys)" recommendation deploys the scanner with its licensing and configuration information. No additional licenses are required.
108
129
109
130
### What permissions are required to install the Qualys extension?
110
131
You'll need write permissions for any VM on which you want to deploy the extension.
@@ -136,18 +157,18 @@ Some updates to the vulnerability scanner extension may require manual deploymen
136
157
137
158

138
159
139
-
1. If the version is 1.0.0.4, click **Uninstall** and wait until the extension is no longer listed in the Extensions page of the VM.
160
+
1. If the version is 1.0.0.4, click **Uninstall** and wait until the extension is no longer listed in the VM's extensions page.
140
161
141
162
1. Restart the VM.
142
163
143
-
1. When the VM's status is "Running", deploy the extension as described above in [Deploying the Qualys built-in vulnerability scanner](#deploying-the-qualys-built-in-vulnerability-scanner-standard-tier-only).
164
+
1. When the VM's status is "Running", deploy the extension as described above in [Deploying the Qualys built-in vulnerability scanner](#deploying-the-qualys-built-in-vulnerability-scanner).
144
165
145
166
### Why does my VM show as "not applicable" in the recommendation?
146
167
When you open the recommendation, you'll see your VMs in one or more of the following groups:
147
168
148
169
-**Healthy resources** – the vulnerability scanner extension has been deployed to these VMs.
149
170
-**Unhealthy resources** – the vulnerability scanner extension can be deployed to these VMs.
150
-
-**Not applicable resources** – These VMs can't have the vulnerability scanner extension deployed. Your VM might be in this tab because it's on the free pricing tier, it's missing the ImageReference class (relevant to custom images and VMs restored from backup, as explained in the Azure for .NET documentation](https://docs.microsoft.com/dotnet/api/microsoft.azure.batch.imagereference?view=azure-dotnet), or it's not running one of the supported OSes:
171
+
-**Not applicable resources** – These VMs can't have the vulnerability scanner extension deployed. Your VM might be in this tab because it's on the free pricing tier, it's missing the ImageReference class (relevant to custom images and VMs restored from backup, as explained in [this Azure for .NET page](https://docs.microsoft.com/dotnet/api/microsoft.azure.batch.imagereference?view=azure-dotnet)), or it's not running one of the supported OSes:
151
172
152
173
- All versions of Windows
153
174
- Red Hat Enterprise Linux 6.7, 7.6
@@ -161,12 +182,12 @@ When you open the recommendation, you'll see your VMs in one or more of the foll
161
182
The scanner is running on your virtual machine and looking for vulnerabilities of the VM itself. From the virtual machine, it can't scan your network.
162
183
163
184
### Does the scanner integrate with my existing Qualys console?
164
-
The Security Center extension is a separate tool from your existing Qualys scanner and, because of licensing restrictions, must be used within Azure Security Center.
185
+
The Security Center extension is a separate tool from your existing Qualys scanner. Licensing restrictions mean that it can only be used within Azure Security Center.
165
186
166
187
### Microsoft Defender Advanced Threat Protection also includes Threat & Vulnerability Management (TVM). How is the Security Center Vulnerability Assessment extension different?
167
188
Microsoft is actively developing world-class vulnerability management with Microsoft Defender ATP's Threat & Vulnerability Management solution, built into Windows.
168
189
169
-
Today, Azure Security Center's Vulnerability Assessment extension is powered by Qualys. This ensures support for both Windows and Linux virtual machines. The extension also benefits from Qualys's own knowledge of vulnerabilities that don't yet have CVEs.
190
+
Today, Azure Security Center's Vulnerability Assessment extension is powered by Qualys. The Qualys extension ensures support for both Windows and Linux VMs. The extension also benefits from Qualys's own knowledge of vulnerabilities that don't yet have CVEs.
170
191
171
192
## Next steps
172
193
This article described the Azure Security Center Vulnerability Assessment extension (powered by Qualys) for scanning your VMs. For related material, see the following articles:
0 commit comments