vuln.qualys
Introduction
The tags beginning with vuln.qualys identify events generated by Qualys.
Valid tags and data tables
The full tag may have up to 4 levels. The first two are fixed as vuln.qualys. The third level identifies the type of events sent, and the fourth level indicates the event subtype
Technology | Brand | Type | Subtype |
---|---|---|---|
vuln | qualys |
| xml |
These are the valid tags and corresponding data tables that will receive the parsers' data:
Tag | Data table |
---|---|
vuln.qualys.hosts | vuln.qualys.hosts |
vuln.qualys.hostdetections This source tag is used in collector’s versions less than 1.5.0 | vuln.qualys.hostdetections |
vuln.qualys.hostdetections.xml This source tag is used in collector’s versions greater than or equal to 1.5.0 | vuln.qualys.hostdetections |
vuln.qualys.useractivitylog | vuln.qualys.useractivitylog |
vuln.qualys.vulnerabilities | vuln.qualys.vulnerabilities |
How is the data sent to Devo?
To send logs to these tables, Devo uses a collector that retrieves the required events and sends them to your Devo domain. Contact us to start sending your logs to Devo using the collector.