Document toolboxDocument toolbox

vuln.qualys

Introduction

The tags beginning with vuln.qualys identify events generated by Qualys.

Valid tags and data tables

The full tag may have up to 4 levels. The first two are fixed as vuln.qualys. The third level identifies the type of events sent, and the fourth level indicates the event subtype

Technology

Brand

Type

Subtype

Technology

Brand

Type

Subtype

vuln

qualys

  • hosts

  • hostsdetections

  • useractivitylog

  • vulnerabilities

xml

These are the valid tags and corresponding data tables that will receive the parsers' data:

Tag

Data table

Tag

Data table

vuln.qualys.hosts

vuln.qualys.hosts

vuln.qualys.hostdetections

This source tag is used in collector’s versions less than 1.5.0



vuln.qualys.hostdetections

vuln.qualys.hostdetections.xml

This source tag is used in collector’s versions greater than or equal to 1.5.0



vuln.qualys.hostdetections

vuln.qualys.useractivitylog

vuln.qualys.useractivitylog

vuln.qualys.vulnerabilities

vuln.qualys.vulnerabilities

How is the data sent to Devo?

To send logs to these tables, Devo uses a collector that retrieves the required events and sends them to your Devo domain. Contact us to start sending your logs to Devo using the collector.