Network Vulnerability Scanner

Tags qualys

What Is It?

Qualys is a cloud-based vulnerability scanner and threat detector which comes with the ability to run IP based targeted scans or install a lightweight agent on endpoints for continuous monitoring. Qualys not only discovers threats and vulnerabilities but offers known effective ways to solve these threats. On top of this, Qualys provides asset management and tagging to allow for a unit to sort through their assets based on any number of tags, such as OS, software, data classification, criticality of system, VIP status, location, or any other custom tag.

Other Service Names



On Demand or Scheduled IP based scanning

Chose a single IP or range of IPs to get in depth scans of a device’s vulnerabilities. Filter these with reports to get the data that matters most to you. Each Qualys report also contains recommendations for how to handle detected threats.

Expert articles on new and emerging threats

Qualys Threat Protect provides you with articles written by experts at Qualys describing new vulnerabilities as they appear. This module also displays how many of your assets are susceptible to this new threat. 

Always know what is happening with remote and VIP Devices with Cloud Agent

Qualys Cloud Agent is a lightweight background program that, once installed on an endpoint, send up to the moment data about what threats are found on the device, what software is installed, what ports are open, and the physical location of the endpoint.

Tag and manage your Assets

Qualys comes with a module to tag and organize assets as they are scanned. This allows you to quickly see what assets you have in your domain, as well as sort them based on tags like if they store Private Health Information, if the device is a workstation, or even what vulnerabilities have been detected. With this simple yet powerful tool, its easy to organize and manage even thousands of endpoints.


Qualys is available for IT Professionals at the university. Since Qualys is a cloud-based service, anyone can access and use Qualys no matter the operating system or browser they choose to use.   

Who Is Eligible To Use It?

  • Staff

Where Can I Get It?

Select the Request Network Vulnerability Scan button located on this page.

How Do I Use It?

Once you are signed up, simply visit to get started. 

How Much Does It Cost?

This service is funded by the University; there are no direct costs to clients.

How Can I Get Support?

If you are experiencing a problem with this service, please report it. If you just have a question, feel free to ask us.

Service Levels

Service Request Fulfillment Time 3 business days, unless in-person training/discussion is required
Incident Resolution Time 3 business days
Service Availability 24x7
Maintenance Window(s) Approved Technology Solutions maintenance window(s)
Service Notification Channel(s) IT Service Notices
Request Network Vulnerability Scan

Related Articles (6)

This is a list of free Qualys training sources and links.
How to create and run a vulnerability report in Qualys
UIC's Asset tagging naming convention for use in Qualys.
How to use Qualys Cloud Agent's features and a guide to what the Cloud Agent can do.
A summary of what is the UIC Qualys Threat Protection module how to use it.
An overview of Qualys a network vulnerability scanner


Service ID: 458
Mon 12/21/20 7:38 PM
Wed 8/2/23 11:38 AM
Service Owner
This person is accountable for the overall performance of this service. This is not a support contact.
Service Review Date
Date of the most recent review of this service.