Improve company productivity with a Business Account.Sign Up

x
?
Solved

How can I integrate Qualys and SCC 2012 R2

Posted on 2014-12-17
2
Medium Priority
?
746 Views
Last Modified: 2014-12-21
I am using SCCM 2012 R2 for path management and Qualys for Vulnerability management.  Is there any simple way to integrate both?
0
Comment
Question by:asnagesh
2 Comments
 
LVL 10

Expert Comment

by:Schuyler Dorsey
ID: 40507206
I don't know what integration you are looking for but there are PS scripts which can pull the patchable findings from a Qualys report and automatically download/deploy those updates.
0
 
LVL 66

Accepted Solution

by:
btan earned 2000 total points
ID: 40507271
Some option:
a) It seems like a GRC (goverance, risk and compliance) tool calling here and one example is RSA Archer which has a vul mgmt module and inventory asset / compliance based module which may extract info from both this Qualys and probably Sccm source. But unlikely you are looking at another third product
@ https://community.emc.com/docs/DOC-15662,
@ https://community.qualys.com/blogs/qualys-tech/2011/02/14/integrating-qualysguard-data-with-rsa-archer


b) There are others sharing extracting SCCM data from its MSSQL and into MySQL, then combined it with Qualys data to build custom vulnerability dashboards and reporting. some stated the download map reports in a csv or XML format to closeness of QG_VM features (Mapping results, Remediation ticketing) with SCCM 2012 @ https://community.qualys.com/thread/10886

c) SCCM update Qualys etc based on your intermediate reporting and management system (sort of a middle-man between Qualys and ConfigMgr to house the data) @ https://community.qualys.com/thread/11816
0

Featured Post

NEW Internet Security Report Now Available!

WatchGuard’s Threat Lab is a group of dedicated threat researchers committed to helping you stay ahead of the bad guys by providing in-depth analysis of the top security threats to your network.  Check out this quarters report on the threats that shook the industry in Q4 2017.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Did you know that more than 4 billion data records have been recorded as lost or stolen since 2013? It was a staggering number brought to our attention during last week’s ManageEngine webinar, where attendees received a comprehensive look at the ma…
In computing, Vulnerability assessment and penetration testing are used to assess systems in light of the organization's security posture, but they have different purposes.
Windows 8 came with a dramatically different user interface known as Metro. Notably missing from that interface was a Start button and Start Menu. Microsoft responded to negative user feedback of the Metro interface, bringing back the Start button a…
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

606 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question