Qualys Api Quick Reference
Qualys Api Quick Reference
Quick Reference
Verity Confidential
Copyright 2017-2023 by Qualys, Inc. All Rights Reserved.
Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
are the property of their respective owners.
Qualys, Inc.
919 E Hillsdale Blvd
4th Floor
Foster City, CA 94404
1 (650) 801 6100
Table of Contents
Vulnerability Management and Policy Compliance API .......................... 5
Scans ......................................................................................................................................... 5
Authentication ......................................................................................................................... 7
Authentication Vaults ........................................................................................................... 14
Scanner Appliances ............................................................................................................... 16
Option Profiles ....................................................................................................................... 17
KnowledgeBase ...................................................................................................................... 20
Reports .................................................................................................................................... 22
Report Templates .................................................................................................................. 24
Remediation ........................................................................................................................... 27
Compliance Info .................................................................................................................... 27
Users ....................................................................................................................................... 30
Activity Log v2 ........................................................................................................................ 31
Activity Log v1 ........................................................................................................................ 31
Verity Confidential
Web Application .................................................................................................................... 46
Authentication ....................................................................................................................... 47
Scan ......................................................................................................................................... 48
Schedule ................................................................................................................................. 49
Option Profile ......................................................................................................................... 52
Report ...................................................................................................................................... 52
Report Creation ...................................................................................................................... 53
Findings .................................................................................................................................. 55
Burp ......................................................................................................................................... 56
Good to Know.................................................................................................. 73
Notations ................................................................................................................................ 73
GET and POST ........................................................................................................................ 73
Date/Time ............................................................................................................................... 73
API Notes ................................................................................................................................ 73
Curl Client .............................................................................................................................. 73
Allowed Operators ................................................................................................................. 73
Looking for more? .................................................................................................................. 73
Qualys API Quick Reference Guide
Vulnerability Management and Policy Compliance API
5
Qualys API Quick Reference Guide
Vulnerability Management and Policy Compliance API
include_aborted={0|1}& option_title={value}&
option_id={value}&
priority={value}& (0-9) *default is 0
List Last ‘N’ Scan References for a Schedule: runtime_http_header={value}&
(GET)
connector_name={value}& *for EC2 scan
/api/2.0/fo/scan/scanner
ec2_endpoint={value}& *for EC2 scan
action={list}& ip_network_id={id}&
schedule_scan_ids={value1, value2,...}& fqdn={value}&
schedule_executions_count={value}& (1-10) client_id= {value}&
output_format={XML|JSON}& client_name={value}&
ec2_instance_ids={value}&
Scanner Details: (GET + POST)
/api/2.0/fo/scan/scanner
Scheduled Scans
action={list}&
scan_date_since={value}& VM Scans - /api/2.0/fo/schedule/scan/
scan_date_to={value}& List Scheduled Scans: (GET)
ips={value}&
action={list}&
output_format=XML&
echo_request={0|1}&
id={value}&
Launch Scan active={0|1}&
VM Scan - /api/2.0/fo/scan/ show_notifications={0|1}&
client_id= {value}&
Compliance Scan - /api/2.0/fo/scan/compliance/ client_name={value}&
Launch Scan: (POST)
Create Scheduled Scan: (POST)
action={launch}&
action={create}&
echo_request={0|1}&
echo_request={0|1}&
scan_ref={value}&
scan_title={value}&
scan_title={value}&
active={0|1}&
target_from={assets|tags}&
option_title={value}&
ip={value}&
option_id={value}&
asset_groups={value}&
iscanner_id={value1,value2…}&
asset_group_ids={value}&
iscanner_name={value1,value2…}&
exclude_ip_per_scan={value}&
ip={value}&
tag_include_selector={all|any}&
asset_groups={value}&
tag_exclude_selector={all|any}& asset_group_ids={value}&
tag_set_by={id|name}& default_scanner={0|1}&
tag_set_include={value}& scanners_in_ag={0|1}&
tag_set_exclude={value}& scanners_in_tagset={0|1}&
use_ip_nt_range_tags={0|1}& exclude_ip_per_scan={value}&
use_ip_nt_range_tags_include={0|1}& ip_network_id={id}&
use_ip_nt_range_tags_exclude={0|1}& runtime_http_header={value}&
iscanner_id={value1,value2…}& target_from={assets|tags}&
iscanner_name={value1,value2…}& tag_include_selector={all|any}&
default_scanner={0|1}& tag_exclude_selector={all|any}&
scanners_in_ag={0|1}& tag_set_by={id|name}&
scanners_in_tagset={0|1}& tag_set_include={value}&
scanners_in_network={value} tag_set_exclude={value}&
6
Qualys API Quick Reference Guide
Vulnerability Management and Policy Compliance API
7
Qualys API Quick Reference Guide
Vulnerability Management and Policy Compliance API
8
Qualys API Quick Reference Guide
Vulnerability Management and Policy Compliance API
file={value}& service_kdc={value}&
HashiCorp user_kdc={value}&
secret_kv_path={value}& krb5_password={value}&
secret_kv_name={value}& krb5_login_type={value}&
secret_kv_key={value}& krb5_<vaultparameters>={value}
Thycotic Secret Server
Scanning:
secret_name={value}&
port={value}& /PC scans only
Quest Vault
use_agentless_tracking={0|1}&
system_name={value}&
agentless_tracking_path={value}&
Lieberman ERPM
auto_discover_system_name={value}&
Notes: If use_agentless_tracking=1,
system_name_single_host={value}&
“agentless_tracking_path” is required.
system_type={auto|windows|unix|oracle|mssq
l|ldap|system|custom}& {Unix subtype record}:
*custom_system_type=&{value} sub_type={cisco|checkpoint_firewall}&
*valid when system_type=custom
Login credentials:
BeyondTrust PBPS
username={value}&
*system_type={value}&
password={value}&
*account_name={value}&
login_type={basic|vault}& (vault definition)
Wallix AdminBastion (WAB)
vault_type={CyberArk PIM Suite|CyberArk
authorization_name={value}
AIM}
target_name={value}
cleartext_password={0|1}&
{Unix record}: enable_password={value}& (Cisco only)
Login credentials: expert_password={value}& (Checkpoint only)
username={value}&
password={value}& Notes: Required for create request: “username”,
login_type={basic|vault}& (vault definition) “password” if cleartext_password=1.
vault_type={CA Access Control|CyberArk PIM Scanning:
Suite|CyberArk AIM|Hitachi ID port={value}& /PC scans only
PAM|Lieberman ERPM|Quest Vault|Thycotic
Secret Server|BeyondTrust PBPS|Wallix {Network SSH record}:
AdminBastion} Login credentials:
cleartext_password={0|1}&
username={value}&
skip_password={0|1}&
password={value}&
{XML File}&
login_type={basic|vault}& (vault definition)
target_type={auto|A10|HP_COMWARE|CISCO_
p2_login_type={basic|vault}& (vault definition)
ASA_WITH_FIREPOWE}
*p2_<vault parameters>
vault_type={CA Access Control|CyberArk PIM
Notes: Required for create request: “username”,
Suite|CyberArk AIM|Hitachi ID
“password” if cleartext_password=1. {XML File}
PAM|Lieberman ERPM|Quest Vault|Thycotic
defines private key certificates and root
Secret Server|BeyondTrust PBPS|Wallix
delegations.
AdminBastion}
**cleartext_password={0|1}&
Kerberos auth details, if it is enabled on the target
password2={value}&
host:
{XML File}&
use_kerberos={0|1}&
target_type={auto|A10|HP_COMWARE|CISCO_
realm_discovery={value}&
ASA_WITH_FIREPOWE}
service_realm={value}&
9
Qualys API Quick Reference Guide
Vulnerability Management and Policy Compliance API
Notes: win_sqlnet_ora_path={value}&
win_tnsnames_ora_path={value}&
* If p2_login_type is vault then all vault parameter
perform_unix_os_checks={0|1}&
fields must be added with prefix 'p2_'
perform_unix_opatch_checks={0|1}&
** Required for create request: “username”, unix_ora_home_path={value}&
“password” if cleartext_password=1. {XML File} unix_init_ora_path={value}&
defines private key certificates. unix_spfile_ora_path={value}&
unix_listener_ora_path={value}&
unix_sqlnet_ora_path={value}&
{Windows record}: unix_tnsnames_ora_path={value}&
Login credentials: unix_invptrloc={value}&
username={value}&
{Oracle Listener record}:
password={value}&
login_type={basic|vault}& (vault definition) password={value}&
windows_domain={value}& {IBM DB2 record}:
windows_ad_domain={value}&
ntlm={0|1}& Login credentials:
kerberos={0|1}& login_type={basic| vault}&
ntlmv2={0|1}& username={value}&
ntlm={0|1}& password={value}&
require_smb_signing={0|1}& database={value}&
minimum_smb_version={value}& port={value}&
Scanning: pc_only={0|1}& /PC scans only
use_agentless_tracking={0|1}&
OS-dependent compliance checks:
{Oracle record}: win_db2dir={value}
Login credentials: win_prilogfile={value}
win_seclogfile={value}
login_type={basic|vault}& (vault definition) win_terlogfile={value}
username={value}& win_mirlogfile={value}
password={value}& unix_db2dir={value}
vault_type={ARCON PAM | Azure Key | unix_prilogfile={value}
BeyondTrust PBPS | CA Access Control | unix_seclogfile={value}
CyberArk PIM Suite| CyberArk AIM | unix_terlogfile={value}
HashiCorp | Lieberman ERPM | Quest Vault | unix_mirlogfile={value}
Thycotic Secret Server}&
vault_id={value}& Notes: All check parameters are required if you
sid={value}& want OS-dependent compliance checks to be run.
servicename={value}&
port={num}& {MySQL record}:
is_cdb={0|1}& /PC scans only username={value}&
pc_only={0|1}& /PC scans only password={value}&
OS-dependent compliance checks: database={value}&
perform_windows_os_checks={0|1}& port={value}&
win_ora_home_name={value}& windows_config_file={value}&
win_ora_home_path={value}& unix_config_file={value}&
win_init_ora_path={value}& ssl_verify={value}&
win_spfile_ora_path={value}& hosts={value}&
win_listener_ora_path={value}& client_cert={value}&
client_key={value}&
10
Qualys API Quick Reference Guide
Vulnerability Management and Policy Compliance API
kerberos={0|1}&
ntlmv2={0|1}& Notes: “community_strings” is optional for create
ntlm={0|1}& and update requests.
member_domain={value}& or ips={value}&
SNMPv3:
Notes: All parameters are required for create
username={value}&
request, except client_cert and client_key (which
password={value}&
must be specified together).
auth_alg={MD5|SHA1}&
{Neo4j record}: encrypt_password={value}&
priv_alg={DES|AES}&
username={value}&
security_engine_id=(value}&
password={value}&
context_engine_id={value}&
login_type={basic|vault}&
context={value}&
database={value}&
port={value}&
ssl_verify={value}& Notes: All SNMPv3 parameters are optional.
hosts={value}& However, when one is specified, others are
neo4j_version={value}& required as follows. 1) It is required that
unix_base_path={value}& “username”, “password” and auth_alg” are all
unix_conf_path={value}& defined for record. 2) It is required that
neo4j_auto_path={0|1}& “encrypt_password” and “priv_alg” are all defined
for record. 3) For an update request “auth_alg”
and “priv_alg” may be set to empty, in which case
Nginx record}:
the data is not encrypted.
unix_bin_path={value}&
unix_conf_path={value}& {VMware record}:
unix_prefix_path={0|1}& username={value}&
password={value}&
{Infoblox record}: port={value}&
Login credentials: hosts={value}&
username={value}& ssl_verify={all|skip|none}&
password={value}& login_type=&
login_type={basic|vault}& (vault definition) is_disconnect={0|1}&
vault_type={CyberArk PIM Suite|Thycotic
Secret Server|BeyondTrust PBPS|Wallix Notes: “username” and “password” are required
AdminBastion|Hashicorp|Azure key}& for a create request, optional for an update
api_version={value}& request.
ssl_verify={0|1}&
{vCenter record}:
{InformixDB record}: username={value}&
Login credentials: password={value}&
username={value}& port={value}&
password={value}& hosts={value}&
login_type={basic}& ssl_verify={all|skip|none}&
login_type={basic|vault}&
11
Qualys API Quick Reference Guide
Vulnerability Management and Policy Compliance API
12
Qualys API Quick Reference Guide
Vulnerability Management and Policy Compliance API
13
Qualys API Quick Reference Guide
Vulnerability Management and Policy Compliance API
14
Qualys API Quick Reference Guide
Vulnerability Management and Policy Compliance API
15
Qualys API Quick Reference Guide
Vulnerability Management and Policy Compliance API
16
Qualys API Quick Reference Guide
Vulnerability Management and Policy Compliance API
17
Qualys API Quick Reference Guide
Vulnerability Management and Policy Compliance API
enable_windows_share_enumeration={0|1}& ignore_firewall_generated_tcp_rst_packets=
enable_lite_os_scan={0|1}& {0|1}&
enable_partial_ssl_tls_au ignore_all_tcp_rst_packets={0|1}&
diting = {0|1} ignore_firewall_generated_tcp_syn_ack_
custom_http_header={value}& packets={0|1}&
custom_http_definition_key={value}& not_send_tcp_ack_or_syn_ack_packets_
custom_http_definition_header={value}& during_host_discovery={0|1}&
host_alive_testing={0|1}&
not_overwrite_os={0|1}& Update VM Option Profile: (POST)
test_authentication={0|1}& action={update}&
System Authentication id={value}&
include_system_auth={0|1}& For other parameters see Create VM Option
use_system_auth_on_duplicate={0|1}& Profile
use_user_auth_on_duplicate={0|1}&
List VM Option Profile: (GET + POST)
Map
basic_information_gathering=[all|register|net action={list}&
blockonly|none]& Delete VM Option Profile: (GET + POST)
map_tcp_ports_standard_scan={0|1}&
action={delete}&
map_tcp_ports_additional={value1,value2}&
id={value}&
map_udp_ports_standard_scan={0|1}&
map_udp_ports_additional={value1,value2}&
perform_live_host_sweep={0|1}& PCI Option Profiles
disable_dns_traffic={0|1}& /api/2.0/fo/subscription/option_profile/pci/?
map_overall_performance={high|normal|low|
custom}& Create PCI Option Profile: (POST)
map_external_scanners={value}& action={create}&
map_scanner_appliances={value}& title={value}&
map_netblock_size={1024 IPs|4096 IPs| owner={value}&
8192 IPs|16384IPs|32768 IPs|65536 IPs}& global={0|1}&
map_packet_delay={minimum|short|medium| offline_scanner={0|1}&
long|maximum}& scan_parallel_scaling={0|1}&
map_authentication={VMware | vCenter}& Scan
Additional scan_overall_performance={high|normal|low|
additional_tcp_ports={0|1}& custom}&
additional_tcp_ports_standard_scan={0|1}& scan_external_scanners={value}&
additional_tcp_ports_additional={value1, scan_scanner_appliances={value}&
value2}& scan_total_process={value}&
additional_udp_ports={0|1}& scan_http_process={value}&
additional_udp_ports_type={standard| scan_packet_delay=
custom}& {minimum|short|medium|long|maximum}&
additional_udp_ports_custom={value1, scan_intensity={normal|medium|low|
value2}& minimum}&
icmp={0|1}& scan_dead_hosts={0|1}&
blocked_resources={0|1}& close_vuln_on_dead_hosts={0|1}&
protected_ports={default|custom}& not_found_alive_times={value}&
protected_ports_custom={value1,value2}& purge_host_data={0|1}&
protected_ips={all|custom}& Additional
protected_ips_custom={value1,value2}& additional_tcp_ports_additional={value1,
value2}&
18
Qualys API Quick Reference Guide
Vulnerability Management and Policy Compliance API
19
Qualys API Quick Reference Guide
Vulnerability Management and Policy Compliance API
20
Qualys API Quick Reference Guide
Vulnerability Management and Policy Compliance API
21
Qualys API Quick Reference Guide
Vulnerability Management and Policy Compliance API
vuln_provider={0|1}& echo_request={0|1}&
user_modified_date_between={value}& client_id= {value}&
user_modified_date_today={0|1}& client_name={value}&
user_modified_date_in_previous={value}& StatusChangedSince={YYYY-MM-DD}&
user_modified_date_within_last_days={value}
& Launch Report
not_user_modified={0|1}&
service_modified_date_between={value}& /api/2.0/fo/report/
service_modified_date_today={0|1}& Launch Report (all types): (POST)
service_modified_date_in_previous={value}&
action={launch}&
service_modified_date_within_last_days={valu
echo_request={0|1}&
e}&
template_id={value}&
not_service_modified={0|1}&
report_title={value}&
published_date_between={value}&
pdf_password={passwd}&
published_date_today={0|1}&
recipient_group={group,group… 50 max}&
published_date_in_previous={value}&
hide_header={0|1}&
published_date_within_last_days={value}&
use_tags={0|1}
not_published={0|1}&
tag_include_selector={all|any}&
supported_modules={value}&
tag_exclude_selector={all|any}&
tag_set_by={id|name}&
Delete Dynamic Search List: (POST) tag_set_include={value}&
action={delete} & tag_set_exclude={value}&
echo_request={0|1}& recipient_group_id={value}&
id={value}& Map Report:
report_type={Map}&
Reports echo_request={0|1}&
output_format={pdf|html|mht|xml|csv|docx}&
Manage Reports domain={value}&
ip_restriction={value}&
/api/2.0/fo/report/
report_refs={value}&
List Reports: (GET + POST)
Scan Report (Scan Based Findings):
action={list}&
report_type={Scan}&
echo_request={0|1}&
echo_request={0|1}&
id={value}&
output_format={pdf|html|mht|xml|csv}&
state={Running|Finished|Submitted|
report_refs={ref,ref…}&
Canceled|Errors}&
ip_restriction={value}&
user_login={login}&
expires_before_datetime={date/time}& Scan Report (Host Based Findings):
client_id= {value}& report_type={Scan}&
client_name={value}& echo_request={0|1}&
Manage Reports: (POST) output_format={pdf|html|mht|xml|csv}&
ips={value}&
action={cancel|delete}&
ips_network_id={id}&
echo_request={0|1}&
asset_group_ids={id,id…}&
id={value}&
Qualys Patch Report:
Download Report: (POST)
echo_request={0|1}&
action={fetch}&
22
Qualys API Quick Reference Guide
Vulnerability Management and Policy Compliance API
output_format={pdf|online|xml|csv}& asset_groups={value,value…}&
ips={value}& all_asset_groups={0|1}&
asset_group_ids={id,id…}& business_unit={value}&
division={value}&
Remediation Report: function={value}&
report_type={Remediation}& location={value}&
echo_request={0|1}& patch_quids={qid,qid…}& (10 max)
output_format={pdf|html|mht|csv}& missing_qids={qid,qid}& (2 max)
asset_group_ids={id,id…}&
assignee_type={User|All}& Scheduled Report
ips={value}&
/api/2.0/fo/schedule/report/
Compliance Report:
List Scheduled Reports: (GET)
report_type={Compliance}&
echo_request={0|1}& action={list}&
output_format={pdf|html|mht}& id={value}&
is_active={true|false}&
Notes: “mht” is not valid for PCI report.
Launch Scheduled Report: (POST)
ips={value}&
asset_group_ids={id,id…}& action={launch_now}&
report_refs={ref,ref…}& id={value}&
Notes: “report_refs” is required for a PCI report,
and not valid for other compliance reports. Asset Search Report
Compliance Policy Report: /api/2.0/fo/report/asset/
report_type={Policy}& Asset Search Report: (GET + POST)
echo_request={0|1}& action={search}&
output_format={pdf|html|mht|xml|csv}& output_format={csv|xml}&
policy_id={value}& tracking_method={IP|DNS|
asset_group_ids={value}& NETBIOS|EC2|AGENT}&
ips={value}& ips={value}&
instance_string={value} ips_network_id={value}&
host_id={value} asset_group_ids={value}&
instance_string={value} asset_groups={value}&
assets_in_my_network_only={0|1}&
Scorecard Report ec2_instance_status={RUNNING
/api/2.0/fo/report/scorecard/ |TERMINATED | PENDING | STOPPING |
SHUTTING_DOWN | STOPPED}&
Launch Scorecard: (POST) *ec2_instance_id={value}&
action={launch}& *ec2_instance_id_modifier={value}&
echo_request={0|1}& azure_vm_state={STARTING | RUNNING |
name={value}& STOPPING | STOPPED, DEALLOCATING,
report_title={value}& DEALLOCATED,
output_format={pdf|html|mht|xml|csv}& UNKNOWN.}&
hide_header={0|1}& (for CSV only) azure_vm_id={value}&
pdf_password={passwd)&
recipient_group={group,group… 50 max}& display_ag_titles={0|1}&
recipient_group_id={distgroup1,distgroup2}& ports={value}&
source={asset_groups|business_unit}& services={value}&
23
Qualys API Quick Reference Guide
Vulnerability Management and Policy Compliance API
qids={value}& asset_groups={value}&
qid_with_text={value}& asset_group_ids={value}&
qid_with_modifier={beginning with| network={value}&
containing|matching|ending with}& ips={value}xml}&
use_tags={0|1}& tag_set_by={name|id}&
tag_set_by={id|name}& tag_include_selector={ALL|ANY}&
tag_include_selector={any|all}& tag_set_include={value}&
tag_exclude selector={any|all}& tag_exclude_selector={ALL|ANY}&
tag_set_include={value}& tag_set_exclude={value}&
tag_set_exclude={value}& host_with_cloud_agents= {all|scan|agent}&
first_found_days={value}& display_text_summary={0|1}&
first_found_modifier={within|not within}& graph_business_risk={0|1}&
last_vm_scan_days={value}& graph_vuln_over_time={0|1}&
last_vm_scan_modifier={within|not within}& graph_status={0|1}&
last_pc_scan_days={value}& graph_potential_status={0|1}&
last_pc_scan_modifier={within|not within}& graph_severity={0|1}&
dns_name={value}& Display
dns_modifier={beginning with| graph_potential_severity={0|1}&
containing|matching|ending with|not empty}& graph_ig_severity={0|1}&
netbios_name={value}& graph_top_categories={0|1}&
netbios_modifier={beginning with| graph_top_vulns={0|1}&
containing|matching|ending with|not empty}& graph_os={0|1}&
os_cpe_name={value}& graph_services={0|1}&
os_cpe_modifier={beginning with| graph_top_ports={0|1}&
containing|matching|ending with|not empty}& display_custom_footer={0|1}&
os_name={value}& display_custom_footer_text={value}&
os_modifier={beginning with| sort_by={host|vuln|os|group|service|port}&
containing|matching|ending with}& cvss={all|cvssv2|cvssv3}&
Notes: *ec2_instance_id_modifier is valid only host_details={0|1}&
when metadata_ec2_instances={0|1}&
*ec2_instance_id is specified cloud_provider_metadata={0|1}&
qualys_system_ids={0|1}&
Report Templates include_text_summary={0|1}&
include_vuln_details={0|1}&
include_vuln_details_threat={0|1}&
Scan Template
include_vuln_details_impact={0|1}&
Create Scan Template (POST) include_vuln_details_solution={0|1}&
/api/2.0/fo/report/template/scan/ include_vuln_details_vpatch={0|1}&
include_vuln_details_compliance={0|1}&
action=create include_vuln_details_exploit={0|1}&
report_format=xml include_vuln_details_malware={0|1}&
title={value}& include_vuln_details_results={0|1}&
owner={value}& include_vuln_details_reopened={0|1}&
Target include_vuln_details_appendix={0|1}&
scan_selection={HostBased|ScanBased}& include_trurisk_details={0|1}
include_trending={0|1}& exclude_account_id={0|1}&
limit_timeframe={0|1}& Filters
selection_type={day|month|weeks|date|none|s selective_vulns={complete|custom}&
cans}& search_list_ids={value}&
selection_range={1|3|5|7|15|30|60|90}&
24
Qualys API Quick Reference Guide
Vulnerability Management and Policy Compliance API
25
Qualys API Quick Reference Guide
Vulnerability Management and Policy Compliance API
26
Qualys API Quick Reference Guide
Vulnerability Management and Policy Compliance API
map_idm_icmp={0|1}& overdue={0|1}&
map_idm_auth={0|1}& invalid={0|1}&
Included Status Levels states={OPEN|RESOLVED|CLOSED|
map_included_statuses_added={0|1}& IGNORED}&
map_included_statuses_removed={0|1}& modified_since_datetime={date/time}&
map_included_statuses_active={0|1}& ips={ip,range…}&
dns_exclusions={none|DNS|DNS-DNSZone}& asset_groups={value,value…}&
included_os={value}& dns_contains={string}&
netbios_contains={string}&
Update Map Template (PUT) vuln_severities={1,2,3,4,5}&
/api/2.0/fo/report/template/map/ potential_vuln_severities={1,2,3,4,5}&
action=update qids={value,value… 10 max}&
report_format=xml vuln_title_contains={string}&
template_id={value}& vuln_details_contains={string}&
vendor_ref_contains={string}&
Delete Map Template (POST) network_id={value}&
/api/2.0/fo/report/template/map/
ticket_list_deleted.php? (GET + POST)
action=delete ticket_numbers={num,range…}&
template_id={value}& since_ticket_number={num}&
Export Map Template (GET) until_ticket_number={num}&
deleted_since_datetime={date/time}&
/api/2.0/fo/report/template/map/
deleted_before_datetime={date/time}&
action=export
report_format=xml Ignore Vulnerability
template_id={value}&
/ignore_vuln/index.php (GET +POST)
action={ignore|restore}&
Remediation qids={value,value… 10 max}&
comments={value}&
ticket_list.php? (GET + POST) (*)asset_groups={value,value…}&
{ticket-selection} (*)ips={ip,range…}&
show_vuln_details={0|1}& (*)tag_set_include={value}&
(*)tag_set_exclude={value}&
ticket_edit.php? (GET + POST) (*)tag_set_by={id|name}&
{ticket-selection} (*)tag_include_selector={all|any}&
change_assignee={login}& (*)tag_exclude_selector={all|any}&
change_state={OPEN|RESOLVED|IGNORED} (*)use_ip_nt_range_tags_include={0|1}&
reopen_ignored_days={value}& (*)use_ip_nt_range_tags_exclude={0|1}&
add_comment={value}& (*)dns_contains={string}&
network_id={value}& (*)netbios_contains={string}&
reopen_ignored_days={1-730}&
ticket_delete.php? (GET + POST) reopen_ignored_date={date}&
{ticket-selection} network_id={value}&
Notes: One of these (*) is required
{ticket-selection}:
ticket_numbers={num,range…}&
since_ticket_number={num}&
until_ticket_number={num}&
ticket_assignee={login}&
27
Qualys API Quick Reference Guide
Vulnerability Management and Policy Compliance API
28
Qualys API Quick Reference Guide
Vulnerability Management and Policy Compliance API
filter_hosts={0|1}& status={value}&
control_id={value}&
Notes: Up to 10 policies for “policy_ids”. control_statement={value}&
policy_id={value}&
Get Policy List (GET) technology_name={value}&
/pcrs/1.0/posture/policy/list assignee_id={value}&
Note: This API requires Request header: created_by={value}&
Authorization <token>. modified_by={value}&
details={Basic|All|None}&
lastEvaluationDate={date}& is_active={0|1}&
Resolve Host IDs (GET) created_after_date={mm/dd/yyyy}&
updated_after_date={mm/dd/yyyy}&
/pcrs/1.0/posture/hostids
expired_before_date={mm/dd/yyyy}&
Note: This API requires Request header: expired_after_date={mm/dd/yyyy}&
Authorization <token>. exception_numbers={value}&
policyId={value}& exception_number_min={value}&
exception_number_max={value}&
Get Posture Info (POST) truncation_limit={value}&
/pcrs/1.0/posture/postureInfo
Request Exceptions: (POST)
Note: This API requires Request header: /api/2.0/fo/compliance/exception/
Authorization <token> and Request Body.
action={request}&
compressionRequired={0|1}& control_id={value}&
evidenceRequired=0|1}& host_id={value}&
lastEvaluationDate={date}& policy_id={value}&
lastScanDate={date}& technology_id={value}&
Policy Merge: (GET + POST) instance_string={value}&
assignee_id={value}&
/api/2.0/fo/compliance/policy/ comments={value}&
action={merge}& reopen_on_evidence_change={0|1}&
id={id}&
merge_policy_id={id} or {policy XML data}& Update Exceptions: (POST)
replace_cover_page={0|1}& /api/2.0/fo/compliance/exception/
replace_asset_groups={0|1}&
add_asset_groups={0|1}& action={update}&
add_new_technologies={0|1}& exception_numbers={value}&
add_new_controls={0|1}& comments={value}&
update_section_heading={0|1}& reassign_to={value}&
update_existing_controls={0|1}& reopen_on_evidence_change={0|1}&
preview_merge={0|1}& status={Pending|Approved|Rejected}&
end_date={mm/dd/yyyy}&
Exceptions Delete Exceptions: (POST)
List Exceptions: (GET + POST) /api/2.0/fo/compliance/exception/
/api/2.0/fo/compliance/exception/ action={delete}&
exception_numbers={value}&
action={list}&
exception_number={value}&
ip={value}&
network_name={value}&
29
Qualys API Quick Reference Guide
Vulnerability Management and Policy Compliance API
30
Qualys API Quick Reference Guide
Vulnerability Management and Policy Compliance API
Activity Log v2
(/api/2.0/fo/activity_log/)
Export user activity log (GET + POST)
action={list}&
user_action={value}&
action_details={user_logged in|user_logged
out}&
username={value}&
user_role={Manager|Unit
Manager|Auditor|Scanner|Reader|KnowledgeB
ase Only|Remediation User|Contact}&
since_datetime={YYYY-MM-DD HH:ii:ss}&
until_datetime={YYYY-MM-DD HH:ii:ss}&
output_format=CSV
truncation_limit={value}&
31
Qualys API Quick Reference Guide
Cloud Agent API
32
Qualys API Quick Reference Guide
Cloud Agent API
33
Qualys API Quick Reference Guide
Cloud Agent API
34
Qualys API Quick Reference Guide
Asset Management & Tagging API
35
Qualys API Quick Reference Guide
Asset Management & Tagging API
tag_set_by={id|name}& no_compliance_scan_since={date/time}&
tag_include_selector={all|any}& data_scope={vm|pc|vm,pc}&
tag_exclude_selector={all|any}& compliance_enabled={0|1}&
tag_set_include={value}& os_pattern={PCRE regex}&
tag_set_exclude={value}& network_ids={id1,id2…}&
show_tags={0|1}&
truncation_limit={value}& Notes: If compliance_enabled=1 is specified in the
network_ids={id1,id2…}& same request as data_scope, then vulnerability
host_metadata={all|ec2|google|azure}& and compliance data will both be purged
host_metadata_fields={value1,value2}& regardless of the data_scope value.
show_cloud_tags={0|1}&
cloud_tag_fields={value}& Patch List: (GET)
show_ars={0|1}& host_id={value}&
ars_min={value}& output_format={xml}&
ars_max={value}&
show_ars_factors={0|1}& Host Detection Assets
show_trurisk={0|1}&
/api/2.0/fo/asset/host/vm/detection/
trurisk_min={value}&
trurisk_max={value}& Host Detection List: (GET + POST)
show_trurisk_factors={0|1}& action={list}&
echo_request={0|1}&
Host Update: (POST) show_asset_id={0|1}&
ids={id,range…}&
action={update}&
id_min={id}&
echo_request={0|1}&
id_max={id}&
ips={ip,range…}&
ips={ip,range…}&
ids={value}&
ipv6={ip,range…}&
ag_ids={value,value…}&
include_vuln_type={confirmed|potential}&
ag_titles={value,value…}&
ag_ids={value,value…}&
network_id={value}&
ag_titles={value,value…}&
network_name={value}&
use_tags ={0|1}&
tracking_method={value}&
tag_set_by={id|name}&
host_dns={value}&
tag_include_selector={all|any}&
host_netbios={value}&
tag_exclude_selector={all|any}&
new_tracking_method={value}&
tag_set_include={value}&
new_owner={value}&
tag_set_exclude={value}&
new_ud1={value}&
show_tags={0|1}&
new_ud2={value}&
vm_scan_since={date/time}&
new_ud3={value}&
no_vm_scan_since={date/time}&
new_comment={value}&
max_days_since_last_vm_scan={date|time}&
compliance_enabled={0|1}&
Purge Hosts: (POST) os_pattern={PCRE regex}&
action={purge}& qids={value}&
echo_request={0|1}& severities={value}&
*ips={ip,range…}& show_igs={0|1}&
*ids={id,range…}& show_results={0|1}&
*ag_ids={value,value…}& show_reopened_info={0|1}&
*ag_titles={value,value…}& output_format={XML|CSV|
no_vm_scan_since={date/time}&
36
Qualys API Quick Reference Guide
Asset Management & Tagging API
CSV_NO_METADATA|CSV_NO_METADATA_ echo_request={0|1}&
MS_EXCEL|CSV_MS_EXCEL}& ips={ip,range…}&
suppress_duplicated_data_from_csv={0|1}& network_id={id}&
truncation_limit={value}&
status={New,Active,Re-Opened,Fixed}& Filter by asset groups:
*include_search_list_titles={value}& ag_ids={value}&
*exclude_search_list_titles={value}& ag_titles={value}&
*include_search_list_ids={value}&
*exclude_search_list_ids={value}& Notes: “ag_ids” and “ag_titles” are mutually
active_kernels_only={0|1|2|3}& exclusive and cannot be specified together.
network_ids={id1,id2…}&
Filter by asset tags:
dectection_processed_before={date}&
use_tags={0|1}&
dectection_processed_after={date}&
tag_include_selector={any|all} &
detection_updated_before={date}&
tag_exclude_selector={any|all}&
detection_updated_since={date}&
tag_set_by={id|name}&
max_days_since_detection_updated={value}&
tag_set_include={value}&
detection_last_tested_since={date}&
tag_set_exclude={value}&
detection_last_tested_since_days={value}&
detection_last_tested_before={date}&
Notes: “use_tags=1” must be specified with other
detection_last_tested_before_days={value}&
tag filter parameters.
host_metadata={all|ec2|google|azure}&
host_metadata_fields={value1,value2}& Excluded Hosts Change History: (GET +
show_cloud_tags={0|1}& POST)
cloud_tag_fields={value}& /api/2.0/fo/asset/excluded_ip/history/
filter_superseded_qids={0|1}&
action={list}&
show_qds={0|1}&
echo_request={0|1}&
qds_min={value}&
ips={ip,range…}&
qds_max={value}&
ids={id,range…}&
show_qds_factors={0|1}&
id_min={id}&
id_max={id}&
Notes: 1) *include/exclude cannot be specified
network_id={id}&
with “qids” or “severities” in same request. Search
list titles and IDs cannot be included/excluded in Manage Excluded Hosts: (POST)
the same request. “show_igs” is required if /api/2.0/fo/asset/excluded_ip/
included search lists contain only Information
Gathered. action={add|remove|remove_all}&
echo_request={0|1}&
2) A request with “max_days_since_vm_scan” ips={ip,range…}&
cannot also include “vm_scan_since” or comment={value}&
“no_vm_scan_since”. expiry_days={value}& (for action=add)
3) A request with dg_names={value}& (for action=add)
“max_days_since_detection_updated” cannot also network_id=(value)&
include “detected_updated_since”.
Notes: “ips” is invalid for “remove_all”.
Excluded Hosts
Virtual Host Assets
Excluded Hosts List: (GET + POST)
/api/2.0/fo/asset/excluded_ip/ /api/2.0/fo/asset/vhost/
action={list}&
37
Qualys API Quick Reference Guide
Asset Management & Tagging API
38
Qualys API Quick Reference Guide
Asset Management & Tagging API
truncation_limit={value}& add|remove|set_appliance_ids={value}&
network_ids={id,id,id…}& set_default_appliance_id={value}&
unit_id={value}& add|remove|set_domains={value}&
user_id={value}& add|remove|set_dns_names={value}&
show_attributes={None or All or a comma- add|remove|set_netbios_names={value}&
separated list of: TITLE, OWNER, set_cvss_enviro_cdp={high|medium-high|low-
OWNER_USER_NAME, NETWORK_IDS, medium|low|none}&
LAST_UPDATE, IP_SET, APPLIANCE_LIST, set_cvss_enviro_td={high|medium|low|none}
DOMAIN_LIST, DNS_LIST, NETBIOS_LIST, &
EC2_ID_LIST, HOST_IDS, USER_IDS, UNIT_IDS, set_cvss_enviro_cr={high|medium|low}&
BUSINESS_IMPACT, CVSS, COMMENTS} set_cvss_enviro_ir={high|medium|low}&
set_cvss_enviro_ar={high|medium|low}&
Add Asset Group: (POST)
action={add}&
echo_request={0|1}&
Tag
title={value}&
network_id={value}& Get details on a tag
comments={value}& /qps/rest/2.0/get/am/tag<id> (GET + POST)
division={value}&
Required:
location={value}&
id (long)
function={value}&
business_impact={critical|high|medium|low|
none}& Create a tag
ips={value}& /qps/rest/2.0/create/am/tag (POST)
appliance_ids={value}&
default_appliance_id={value}& Update a tag
domains={value}&
dns_names={value}& /qps/rest/2.0/update/am/tag/<id> (POST)
netbios_names={value}& /qps/rest/2.0/update/am/tag (POST)
cvss_enviro_cdp={high|medium-high|low-
medium|low|none}&
Search tags
cvss_enviro_td={high|medium|low|none}&
cvss_enviro_cr={high|medium|low}& /qps/rest/2.0/search/am/tag (POST)
cvss_enviro_ir={high|medium|low}&
Filters:
cvss_enviro_ar={high|medium|low}&
id (Long)
Edit/Delete Asset Group: (POST) name (string)
parent (long)
action={edit}&
ruleType (STATIC, GROOVY, OS_REGEX,
echo_request={0|1}&
NETWORK_RANGE, NAME_CONTAINS,
id={value}&
INSTALLED_SOFTWARE, OPEN_PORTS,
{Edit only parameters below}
VULN_EXIST, ASSET_SEARCH)
set_title={value}&
color (string formatted as #FFFFFF where F
set_comments={value}&
can be any value between color (0-9 and A-F)
set_division={value}&
set_location={value}&
set_function={value}& Count tags
set_business_impact={critical|high|medium|lo /qps/rest/2.0/count/am/tag (POST)
w
|none }&
add|remove|set_ips={value}&
39
Qualys API Quick Reference Guide
Asset Management & Tagging API
40
Qualys API Quick Reference Guide
Asset Management & Tagging API
41
Qualys API Quick Reference Guide
Asset Management & Tagging API
42
Qualys API Quick Reference Guide
Asset Management & Tagging API
43
Qualys API Quick Reference Guide
Continuous Monitoring API
44
Qualys API Quick Reference Guide
Continuous Monitoring API
Rules
Search rules
/qps/rest/1.0/search/cm/rule (POST)
Filters (optional):
id (Integer)
ruleType (HOST, VULN, PORT, SSL, SW)
45
Qualys API Quick Reference Guide
Web Application Scanning API
46
Qualys API Quick Reference Guide
Web Application Scanning API
47
Qualys API Quick Reference Guide
Web Application Scanning API
48
Qualys API Quick Reference Guide
Web Application Scanning API
49
Qualys API Quick Reference Guide
Web Application Scanning API
50
Qualys API Quick Reference Guide
Web Application Scanning API
51
Qualys API Quick Reference Guide
Web Application Scanning API
52
Qualys API Quick Reference Guide
Web Application Scanning API
53
Qualys API Quick Reference Guide
Web Application Scanning API
target.scans (WasScan)*
Report Template Count
filters.searchlists (SearchList)*
filters.url (Text) qps/rest/3.0/count/was/reporttemplate (POST)
filters.status (ScanFindingStatus)*
id (Integer)
filters.remediation (*)
name (Text)
showPatched (SHOW_ONLY, SHOW_NONE,
type (Text)
SHOW_BOTH - default)
display.contents (ScanAppReportContent)*
display.graphs (ScanAppReportGraph)*
Search Report Template
display.groups (ScanAppReportGroup)* qps/rest/3.0/search/was/reporttemplate (POST)
display.options (rawLevels)*
id (Integer)
name (Text)
Notes: (*) indicates data type.
type (Text)
Scorecard Report Get details of Report Template
target.tags (Tag)*
qps/rest/3.0/get/was/reporttemplate/<id> (GET)
target.tags.included.option (ALL or ANY)1
target.tags.included.tagList.Tag.id (Integer)1 Required:
filters.searchlists (SearchList)* id (Integer) /report template ID
filters.scanDate (DatetimeRange)*
filters.scanStatus
(WasScanConsolidatedStatus)*
filters.scanAuthStatus (WasScanAuthStatus)*
54
Qualys API Quick Reference Guide
Web Application Scanning API
55
Qualys API Quick Reference Guide
Web Application Scanning API
56
Qualys API Quick Reference Guide
Web Application Firewall API
57
Qualys API Quick Reference Guide
Web Application Firewall API
58
Qualys API Quick Reference Guide
Web Application Firewall API
59
Qualys API Quick Reference Guide
Web Application Firewall API
60
Qualys API Quick Reference Guide
Web Application Firewall API
/qps/rest/2.0/search/waf/custompage/ (POST)
61
Qualys API Quick Reference Guide
Web Application Firewall API
62
Qualys API Quick Reference Guide
Web Application Firewall API
63
Qualys API Quick Reference Guide
Web Application Firewall API
64
Qualys API Quick Reference Guide
Web Application Firewall API
65
Qualys API Quick Reference Guide
Web Application Firewall API
Search appliances
/qps/rest/2.0/search/waf/appliance (POST)
Optional:
id (Long)
uuid (UUID)
name (Text)
hostname (Text)
lastPollDate
applianceCreated
applianceVersion (Text)
status (Long)
pollStatus
heartbeatGenerated
heartbeatProcessed
systemOs (Text)
systemRam (Long)
systemType (Text)
systemEc2InstanceId (Text)
systemEc2InstanceType (Text)
systemEc2AmiId (Text)
systemCpusCount (Long)
systemCpusCores (Long)
systemCpusSpeed (Float)
systemCpusModel (Text)
configRulesVersion (Text)
configVersion (Text)
configGenerated
ip (Text)
cluster.id (Long)
cluster.uuid (UUID)
cluster.name (Text)
66
Qualys API Quick Reference Guide
Malware Detection API
Malware Detections
Current malware detections
/qps/rest/1.0/download/md/detection (POST)
Required:
format (csv|cef)
Filters (optional):
id (Integer)
qid (Integer)
url (Text)
type (Keyword ie BEHAVIORAL)
showDeactivatedSite (Boolean)
severity (Keyword i.e. HIGH)
67
Qualys API Quick Reference Guide
Security Assessment Questionnaire API
68
Qualys API Quick Reference Guide
Security Assessment Questionnaire API
69
Qualys API Quick Reference Guide
Security Assessment Questionnaire API
Update template
/qps/rest/1.0/update/saq/template/<id> (POST)
/qps/rest/1.0/update/saq/template/ (POST)
Required to update single template:
id (Integer) /library template ID
Publish template
/qps/rest/1.0/publish/saq/template/<id> (POST)
Required:
id (Long) /template ID
Delete template
/qps/rest/1.0/delete/saq/template/<id> (POST)
Required:
id (Long) /template ID
70
Qualys API Quick Reference Guide
Portal version API
Portal version
/qps/rest/portal/version (GET)
71
Qualys API Quick Reference Guide
API Server URL
72
Qualys API Quick Reference Guide
Good to Know
2) There are known limits for the amount of data Allowed Operators
that can be sent using the GET method. These Integer EQUALS, NOT EQUALS,
limits are dependent on the toolkit used. There is GREATER, LESSER, IN
no fundamental limit with sending data using the Text CONTAINS, EQUALS, NOT
POST method. EQUALS
Date EQUALS, NOT EQUALS,
3) Variables and values must be URL-encoded.
GREATER, LESSER
4) Returned XML responses usually include Keyword EQUALS, NOT EQUALS, IN
numeric error codes. Boolean (true/false) EQUALS, NOT
5) UTF-8 encoding is used internally and for the EQUALS
returned XML.
6) Role-based privileges (Manager, Scanner, and Looking for more?
Reader) apply to most API calls.
Click here for all our current API User Guides
7) Blanks in “string type values” can be encoded as
plus characters(+).
73