Search criteria Brief description Customer value Prerequisites Access complexity The complexity of the process of exploiting vulnerability. Low complexity are very easy to exploit and don’t require any end user actions (e.g. clicking on a link) Vulnerabilities with a low access complexity are VERY easy to exploit, and should be remediated quickly. None Network exploitable vulnerabilities are very easy to exploit. When combined with access complexity and authentication (see below), really easily exploitable vulnerability can be identified that should be remediated quickly None This is a CVSS Base metric, see http://www.first.org/cvss for further details Access Vector Used to identify vulnerabilities that can be exploited remotely, i.e. the attacker does not have have physical access to the vulnerable asset. This is a CVSS Base metric, see http://www.first.org/cvss for further details Asset saved search Only returns vulnerabilities that are on assets returned by an asset saved search in created in the Asset tab Useful for limiting the assets returned by more complexity criteria (e.g. assets in a specific location) Asset saved search must exist Assigneduser Only returns vulnerabilities assigned to users where the user name meets the specified criteria To generate reports about vulnerabilities assigned to specific users or groups of users as part of a vulnerability remediation process Vulnerabilities must have been assigned. This can be done manually or my setting up asset owners in ‘vulnerability assignment’ Authenticatio n Returns vulnerabilities that either required no authentication or for the attack to authentication (i.e. logon) to the a system ‘No authentication required’ vulnerabilities are very easy to exploit and should be remediated ASAP None to exploit the vulnerability This is a CVSS Base metric, see http://www.first.org/cvss for further details Availability Impact Determines if the vulnerable system can be made unavailable (e.g a DDOS vulnerability) if the target system is exploited Can easily find DDOS vulnerabilities None Determine what vulnerabilities can lead to data leakage None This is a CVSS Base metric, see http://www.first.org/cvss for further details Confidentialit y Impact Determines if the vulnerability when exploited has the potential to enable a of leak confidential information This is a CVSS Base metric, see http://www.first.org/cvss for further details CVE ID Returns vulnerabilities with a specific CVE ID CVE ID is the most common method user to reference vulnerabilities. Virtually every vulnerability published now has a CVE ID None CVSS Base Score Enables vulnerabilities to be filtered based on their CVSS score see http://www.first.org/cvss CVSS is the most common and widely recognise vulnerability risk scoring mechanism None Days since asset found Only returns vulnerabilities on assets based on when QRadar (i.e. from logs, flows, and/or vulnerability scans) first discovered the asset Very useful to only report on vulnerabilities on assets that have been added to a network recently as these are ones that typically have a lot of nasty vulnerabilities (e.g. default configuration) None Days since associated vulnerability service traffic Only returns vulnerabilities where there has been L7 network traffic in or out of the asset (detected by Qflow) where the L7 application correlates with the L7 application of the vulnerability. The L7 application associated with a vulnerability can be seen in the vulnerability details screen under ‘Associated service’ Very useful to only report on vulnerabilities where there has been associated traffic that indicates the product is in use and that the traffic could be carrying exploit attempts. A lot of servers are installed with vulnerable software that is never actually used. So applying this filter criteria is a great way to focus on vulnerabilities that have a much high probability of exploitation QFlow installed Days since exploit attempt Only returns vulnerabilities that have had an exploit attempt against them in the last X days. Obviously it is very important to remediate such vulnerabilities ASAP QRadar SIEM with IPS/IDS events Days since vulnerability discovered Only returns newly discovered vulnerabilities Very often it is useful to focus on only vulnerabilities that have been newly discovered and remove all the vulnerabilities that are already known about None Days since vulnerability published Only returns vulnerabilities that have been published in the last X days. Very useful to focus on None newly published vulnerability. E.g. MS publishes new vulnerabilities each month. After a scan it is useful to only report on those new ones, and not ones that are many years old External reference of type In QVM vulnerabilities can have numerous external references (e.g. CVE ID, MS Bulletin, x-Force ID). This search parameter only returns vulnerabilities where a specific external reference exists for a Easy to filter on MS vulnerabilities, e.g. were external reference is of type ‘MS Bulletin’. Or for example where a patch exists to fixed the vulnerability None vulnerability ‘Endpoint Manager Patch’ Found by scan profile Only returns vulnerabilities that were discovered by a specific scan profile. Often useful to only report on vulnerabilities that were found by a specific QVM scan profile e.g. “Daily DMZ Scan” None Found by Scanner Only returns vulnerabilities discovered by a specific scanner QVM can take scan data from multiple 3rd party scanners. It is often useful to only view vulnerabilities retuned by a specific scanned, e.g. AppScan to view all web application vulnerabilities, and Endpoint Manager to view those reported (and therefore remediable) by End point Manager A 3rd party scanner feed Hostname Only returns vulnerabilities on assets where the hostname matches the criteria Useful to only view vulnerabilities on a specific host or a series of hosts that have a common naming scheme (e.g. EXCH*) None Impact Only returns vulnerabilities, that if exploited, have a specific potential business impact Useful for building reports of None vulnerabilities were the impact could be one or more of, access control low, denial of service etc. Include early warnings Includes vulnerabilities discovered using QVMs early warning capabilities. These are hidden by default. QVM detects early warning vulnerabilities by correlating installed products (from the last scan) with product information in newly published vulnerabilities without needing a new scan. It is very useful to see new vulnerabilities very quickly, e.g. After the MS patch Tuesday vulnerabilities have been published A previous scan must have been run Include vulnerability exceptions This includes vulnerabilities that have had an exception marked against them. These are hidden by default. Useful to see completed vulnerabilit posture, including those that have been exceptioned. Often required by auditors Vulnerabilities must have been exceptioned Integrity Impact Only includes vulnerabilities that meet the CVSS integrity impact criteria Useful to view vulnerabilities that can impact business integrity None This is a CVSS Base metric, see http://www.first.org/cvss for further details IPv4address Only includes Common need to produce vulnerabilities on assets reports on specific IPs with a specific IP address or CIDR None Network Only includes vulnerabilities on assets in specific networks Common need to produce network reports for uses None Only include assets with risk Only includes assets that have passed or failed a specific QRM risk policy. Vulnerabilities on assets that are particularly ‘at risk’. E.g. those that have been talking to potentially malicious IPs, are at much higher risk of exploitation and should be remediated first. QRM policies are a very powerful way of determining what assets are most at risk QRadar Risk Manager risk managed policies defined and being monitored Only include early warnings Only includes vulnerabilities discovered by QVM’s early warning capability Often useful to only see early warning vulnerabilities and not those discovered by scanning, so that quick actions can be taken. None Makes for a good dashboard item. Only include vulnerability Only includes vulnerabilities that have an For auditing purposes it is often very important to be None exceptions exception able to view what vulnerabilities have been exceptions Only include PCI Failures Only includes vulnerabilities that have failed the PCI criteria For reporting and auditing purposes on assets that need to adhere to PCI compliance, it is important to view vulnerabilities that would cause failure, as not all vulnerabilities do None Overdue by days Only includes vulnerabilities that have been assigned for remediation and are now overdue by a number of days Every network has 1000’s of vulnerabilities, therefore a vulnerability management program needs to be in place were these are remediated. This criteria enables users to see what vulnerabilities are failing outside of that process and require escalation. For example ‘ Vulnerabilities must have been assigned for remediation ‘high risk vulnerabilities that are more than 10 day overdue’ Patch Status Only returns vulnerabilities on assets that a fixed with a patch with a specific status A lot of vulnerabilities (e.g. MS ones) are fixed by patch management systems such as IBM End point manager. This criteria allows users to report, or exclude those vulnerabilities before another scan is run to confirm the patch has been applied IBM Security Endpoint Manager installed PCI Severity Only returns vulnerabilities with a specific PCI severity status. PCI defined 5 severity levels, the top 3 being automatic failures None Quick Search Only returns vulnerabilities were the vulnerability details (i.e. that shown in vulnerability details) meets Enables more broad sets of vulnerabilities to be filtered on. E.g. (“default password” None the search criteria AND Microsoft”). Wild card characters can also be included. This is often used to only report on vulnerabilities from a specific vendor, or a quick, single point to enter an external reference (e.g. CVE ID, or IPS signature etc.). Risk Only returns vulnerabilities that match the specific risk criteria QVM ranks vulnerabilities in to 4 risk categories. High being the highest risk. It is of really useful for users to focus only on high risk vulnerabilities in their remediation processes None Risk Score Only returns vulnerabilities based on a their risk score value QVM and QRM jointly calculate a risk score. This score is based on the CVSS score of vulnerability, but it can be modified upwards or downwards based on QRM risk policies. For example if vulnerability is on an asset that has been communicating with malicious IPs then its risk score can be automatically increased. If no QRM policies are defined then the risk score is the same as the CVSS score QRadar Risk Manager policies defined that adjust vulnerability scores otherwise the risk score is the same the CVSS score Status Only includes vulnerabilities were the associated remediation ticket has a specific status. Status values are If vulnerabilities are assigned to users, QVM creates an internal remediation ticket, with a status that can be modified by the user, but is also modified by QVM automatically as it detects status changes in vulnerabilities on Vulnerability assignment is being used Open = Ticket is opened Closed = Ticket has been closed by a user Auto-Closed = Ticket has been auto-closed by QVM because the vulnerability has been rescanned and no longer present subsequent scans (e.g. it determines vulnerability is fixed, or one that is marked as closed, is still open) Re-opened = Ticket has been re-opened by QVM because a vulnerability that has a status of closed or auto-closed, was again detected in the last scan Fixed = ticket has been set to fixed by a user, pending further process to set to closed. Technical Owner Contact Only includes vulnerabilities on assets where the technical owner contact field meets the specified criteria Enables vulnerability reports to be produced for specific technical owners, who are responsible for remediating vulnerabilities on their assets. Technical owners defined in QRadar QVM can automatically generate vulnerability reports to 100’s of technical owners Unassigned Only returns vulnerabilities that are either assigned or unassigned Enables reports on unassigned vulnerability posture to be viewed. This is important as unassigned vulnerabilities are ones where there is effectively no plan to remediated Vulnerability assignment is configured and being used. Vulnerability Only returns specific vulnerabilities defined in the search criteria Enables reports to be built that only return specific vulnerabilities None Vulnerability has external reference Only returned vulnerabilities that have a specific external reference value Useful for creating reports such as ‘Vulnerabilities in MS14-009’ were the external reference is MSBulletin and the value is None ‘MS14-009’ Vulnerability has a virtual patch from vendor Only returns vulnerabilities that have, or have not, map to a detection signature from the selected vendor(s) threat detection platforms (IPS/IDS) Very useful for in understanding what vulnerabilities can be mitigated, and not mitigated by threat platforms deployed None Vulnerability on open port Only returns vulnerabilities on an specific open port(s) Such vulnerabilities are typically really easily discovered and exploitable and should be remediated ASAP None Vulnerability on open service Only returns vulnerabilities on an open service Similar to the ‘vulnerabilities on open port’ accept the service the port is being used for can be specified, thus removing the need to know the specific port number as this can vary wildly on a network from asset to asset. Typically used for services such as ssh, http, https, vnc, ftp, dns. None Vulnerability reference Only returns vulnerabilities where their associated external reference value is in a reference set Really nice way to build a view of ‘must watch for’ vulnerabilities, where the list of vulnerabilities to watch for is held in a reference set, and therefore easily updated externally from QVM (e.g. via a file, or the reference data API) Reference set must be populated with associated Vulnerability external reference value Vulnerability state Retuns vulnerabilities based on their state value, which can be either, new, fixed, existing, or preexisting. QVM automatically maintains the state of vulnerabilities it discovers in a scan None By default only Existing Fixed = Found by a previous scan, and not reported in a New = Just found in the last scan vulnerabilities are shown subsequent scan Pre-Exisiting = Existed prior to the last scan Existing = Reported in the last scan This is really useful for reporting on vulnerabilities that are fixed, or new since the last scan. Vulnerability with risk Returns vulnerabilities that have failed a QRadar risk manager risk policy QRadar Risk Manager enables vulnerabilities to be detected that are, for example, exploitable from the internet, or exploitable from untrusted networks due to firewall and IPS rules. Utilizing these policies and this search criteria QVM can easily product reports on such vulnerabilities QRadar Risk Manager