Contact Us

Error: Contact form not found.

Client Login

Select a platform below to log in

TraceCSO
TraceInsight

TraceInsight Vulnerability Management Platform

Introduction

New cybersecurity vulnerabilities are discovered almost daily. From software updates to emerging technologies to new hacking techniques, there are always new attack avenues to discover, patch, and mitigate.

Vulnerability management is an extremely important part of any organization’s information security program. Most compliance regulations require annual assessment and ongoing management, but how do you make that a reality?

This whitepaper will be an in-depth exploration of the TraceInsight Vulnerability Management platform and its capabilities.

Platform Overview

TraceSecurity’s Vulnerability Management Platform is our software tool for vulnerability scanning, results management, and remediation tracking. Our information security analysts use it to perform vulnerability assessment services, and our customers use it to perform scanning and management on their own.

The Vulnerability Management module lives within TraceSecurity’s proprietary software platform, TraceInsight. TraceInsight also houses the TracePhishing and TraceEducation modules for end-user security awareness testing and training.

Add those involved in your vulnerability management activities as Users within the platform. Users are managed at the TraceInsight level through individual creation or .csv upload. Each User must be assigned one of two roles: VulnManagerModuleAdmin or VulnManagerModuleAccess.

  • VulnManagerModuleAdmin grants full module access with the ability to setup and run scans, manage results, assign remediations, and generate reports.
  • VulnManagerModuleAccess allows users to view, manage, and export vulnerabilities that have been assigned to them for remediation activities.

TraceSecurity implemented multi-factor authentication for TraceInsight in August 2023. MFA works through any one-time passcode (OTP) application such as Google Authenticator, Microsoft Authenticator, Symantec VIP Access, and more. Email and SMS-based MFA are not currently supported.

Qualys Scanner

TraceSecurity’s vulnerability assessment and management is powered by the Qualys Scanner Appliance and the Qualys Vulnerability KnowledgeBase. The Qualys library includes over 25,000 vulnerability signatures with frequent updates as more are discovered.

Qualys classifies vulnerability in three types:

  • Confirmed Vulnerabilities – verified as existing on the target system(s).
  • Potential Vulnerabilities – flagged based on evidence of a vulnerability, but not fully verified.
  • Informational Vulnerabilities – not technically vulnerabilities, but could be potential attack surfaces without being an active exploit

Through Qualys, TraceSecurity offers both authenticated and unauthenticated scanning options. Unauthenticated scans are performed against the publicly available information and services of your company. Authenticated scanning, also called credentialed scanning, allows for more thorough scans. By taking credentials into consideration, scans can find vulnerabilities that could be compromised through more privileged access.

With our Vulnerability Management platform, you can enjoy all the benefits of Qualys with our simplified module and dedicated support team.

Platform Tour

The TraceInsight Vulnerability Management Platform includes 12 tabs for functionality: Scans, Scan Schedules, Scanner Status, Launch Scan, Create Scan Schedule, Hosts, Authentication, Remediate, View Scan Results, Export Scan Results, Generate Report, and Documentation.

Scans

The Scans tab is where you can see your launched scans and their current statuses. Scans are sortable by Title, Targets, Qualys Reference ID, Launch Date, Duration, and Status. You can manually pause, resume, and cancel scans from this tab.

Each scan will show one of the following statuses:

  • Queued – The scan is queued but has not yet started.
  • Running – The scan is currently in progress.
  • Paused – The scan is currently paused either because of restrictions in its Allowed Scan Time (only applicable to scheduled scans) or because it was manually paused.
  • Finished – The scan is complete, but its results are not yet fully imported.
  • Processed – The scan is complete, and its results are available for review.
  • Canceled – The scan was manually canceled.
  • Error – The scan failed either because the scanner was not online when it attempted to run, or because the scanner crashed or otherwise became unavailable during the scan.

Scan Schedules

The Scan Schedules tab is where you can see all of your scan schedules and their current status. Status, Title, Targets, Scanner Appliance, Option Profile, and Next Launch Date can sort scan schedules. You can modify or delete existing scan schedules from this tab.

Scan Schedules will either be Active or Inactive:

  • Active – indicates the scan is scheduled to run at least one more time
  • Inactive – indicates the scan has run as many times as configured, and will not run again unless edited and reconfigured.

Scanner Status

The Scanner Status tab is where you can confirm that your scanner is online and properly configured within your environment.

Launch Scan

The Launch Scan tab allows you to configure an on-demand scan to run immediately. Separate from your scheduled scans, you may want to run one-off scans when zero-day vulnerabilities are discovered or when you make significant changes to your environment.

To launch an on-demand scan, you’ll need to fill in the following fields:

  • Title – Give your on-demand scan a descriptive name in line with your organization’s best practices
  • Option Profile – The standard option profile is “Unauthenticated Scan”. If you are contracted for authenticated scanning, there will be an additional option profile called “Authenticated Scan.” Choose the appropriate option profile for the devices you are targeting in the scan.
  • Scanner Appliance – Choose between internal and external scanning options. The internal virtual scanner appliance should be used for vulnerability scans targeting your internal network devices. The external scanner appliance should be selected for vulnerability scans targeting your public IP addresses.
  • IPs/Ranges – Input the scope of the vulnerability scan. Scan targets can be input as individual IP addresses or IP address ranges separated by commas. CIDR notation may be used for IP ranges.
  • Exclude IPs/Ranges – If any IP addresses or ranges within the targets specified in the IPs/Ranges field should be excluded from the scan, input those here.
  • Notifications – This optional check box will configure an email notification when the scan is complete. The email notification can be sent to a specific email address or to the members of a particular TraceInsight user group.

Create Scan Schedule

The Create Scan Schedule tab follows the same setup as the Launch Scan tab with a few additional fields. Fill in the Title, Option Profile, Scanner Appliance, IPs/Ranges, and Exclude IPs/Ranges just like above. You’ll then need to configure the following additional fields:

  • Start Date – Select the desired start date for the scheduled scan
  • Start Time – Use the up and down arrow buttons to select your desired start time
  • Time Zone – Choose the appropriate time zone for the start time you specified
  • Daylight Savings Time – Toggle the “Observe DST” checkbox if applicable for your chosen time zone
  • Occurrence – Specify how often you want your scan to launch. Scheduled scans can be run once or set to recur at the interval of your choosing. Many TraceSecurity customers choose to configure scans to run quarterly, monthly, or even weekly.
  • Allowed Scan Time – Specify when the scan is allowed to run. You can always allow scanning to run them anytime, restrict them to nights and weekends, or impose any other restrictions you prefer. Once you create a custom allowed scan time, it can be applied to other scheduled scans.

Hosts

Once scans have been completed, you can use the Hosts tab to view and manage the hosts identified as active during scans. Hosts are categorized by IP address, hostname, internal or external classification, operating system, and criticality. Results will also include First Found and Last Found dates for when the host was first and most recently scanned.

Criticality in this context is determined based on the qualitative priority or importance in your network infrastructure. Vulnerabilities affecting higher criticality hosts are weighted more heavily in reporting than vulnerabilities affecting lower criticality hosts. The criticality levels can be manually changed based on the expertise of your organization’s environment.

Each host will have one of the following criticality levels:

  • Critical – Devices/hosts that are part of your core operations, or can be accessed externally, or both.
    • External firewalls, mail servers, web servers
  • Moderate – Devices/hosts that are part of your network functionality, but are only accessible internally and could be replaced or restored without a severe impact on operations.
    • Routers, internal switches, servers without sensitive data
  • Low – Devices/hosts that are part of your network, but are only accessible internally and could be replaced with minimal impact to operations.
    • PCs, laptops, printers
  • Minimal – Devices/hosts that are part of your network, but are only accessible internally and could be replaced with minimal to no impact on operations.
    • IP phones, network printer servers, thin clients.

Authentication

The Authentication tab is where you create and manage the Windows and/or Unix authentication record(s) that your Qualys scanner will use to log into each internal target system during scanning. Host authentication allows the scanner to perform in-depth security assessments and obtain better visibility into each system’s security posture, providing the most accurate results with fewer false positives.

NOTE: Authenticated scans are only intended for internal network devices.

Windows authentication records support local-level authentication or domain-level authentication with NetBIOS or Active Directory. Best practices indicate creating a temporary domain admin account to be used specifically for this purpose, then disabling that account once your service or required scanning is complete.

Unix authentication records support username and password authentication, but not private SSH keys.

You will likely configure both types of authentication records to scan the various parts of your IT infrastructure. Scans for each type can be configured and run at the same time with no issues.

The Authentication tab is only available to customers who have purchased the authenticated scanning license. If you ever want to upgrade to credentialed scanning, reach out to your account team for assistance.

Remediate

Once a scan is complete, the found vulnerabilities populate in the Remediate tab for assignment, tracking, and remediation. Vulnerabilities are sortable by internal or external hosts, IP address, DNS, vulnerability title, and severity level. Each vulnerability includes detailed information about the Threat posed, the Impact to your organization, and a Solution to resolve it.

All found vulnerabilities are automatically marked as “Unassigned” as they have not yet been addressed or remediated. From here, you can update the Status of vulnerabilities and/or assign remediation activities to yourself or other team members. Multiple vulnerabilities can be selected and assigned en masse to the appropriate team member.

Vulnerability Status for found vulnerabilities if Active. Status can be updated to one of the following based on your expertise and remediation activities:

  • Acceptable – the risk associated with this vulnerability has been deemed acceptable by your organization
  • False Positive – the vulnerability was incorrectly detected. Thanks to the robust Qualys scanner appliance and detection logic, False Positives have been greatly reduced across our customers.
  • Fixed – Pending Verification: When a user changes a vulnerability status to Fixed, it will automatically be labelled as Pending Verification until a new scan is run. After the new scan, the vulnerability will change to either:
    • Fixed – Verified: Confirmation that the remediation was effective in mitigating the vulnerability.
    • Active: The vulnerability was detected in subsequent scans, meaning the remediation was not completed.
  • Assign to User – assign the vulnerability to a user to address

It’s completely up to you who you include as Users within TraceInsight. We have many customers include their internal IT teams, managed services providers, and other vendors that they engage for their information security. Each member of your team likely has different areas of expertise, and can be assigned the vulnerabilities that make the most sense for them to manage and remediate.

Each user within the platform should use the “Vulnerabilities Assigned to Me” section for their assigned remediations. From here, they can review whether the vulnerability is legitimate, understand the threat and potential impact it poses, and use the Solution information for how to remediate the vulnerability.

View Scan Results

The View Scan Results tab displays the combined raw scan results for all scans completed within the last 3 years. IP, DNS, Vulnerability Title, and Severity Level can filter results.

For each vulnerability, you can click “Show Details” to display its applicable Threat, Impact, and/or Solution information, like the example below:

Export Scan Results

Use this tab to export a CSV of the raw scan results for any scans that have been completed within the last three years. Scans can be sorted by Title, Targets, Qualys Reference ID, Launch Date, or Duration. Multiple scans can be selected and exported together into a single CSV.

Generate Report

Use the Generate Report tab to download vulnerability scan results and findings into an executive-style PDF report. These formatted reports include up to 40 of your top priority vulnerabilities. Your top priority vulnerabilities will be the highest severity vulnerabilities affecting your most critical devices. Results are automatically separated between internal and external findings.

There is also an option to export full scan reports in CSV format. This will include comprehensive data on all vulnerabilities of every severity type.  

No matter which report type you choose to download, multiple scans can be selected and generated into one cohesive report.

Documentation

The TraceInsight Vulnerability Manager User Guide includes everything you need to know about setting up and running scans, managing remediations, exporting results, and more.

If you can’t find your answers in the User Guide, TraceSupport is available during normal business hours for any issues you may run into. They can be contacted by phone at 877-798-7223 or by email at support@tracesecurity.com.

Vulnerability Assessment Options

Looking for a fresh set of eyes on your vulnerability management program? Our information security analysts can provide expertise on a one-time assessment or run regular scans on your behalf. TraceSecurity offers 3 types of vulnerability assessment services:

Qualys Vulnerability Assessment

During our standard vulnerability assessment service, our analysts use the Qualys scanner appliance to perform scans against your environment. Using their expertise, they will review the scan results and make sure findings and priorities are in line with your company’s goals. Analysts will provide comprehensive reports and review findings with you to make sure you understand remediation recommendations and next steps.

Remote Threat & Vulnerability Assessment (RTVA)

A step above our standard service, the RTVA adds advanced manual testing and our proprietary network security profile questionnaire. Our analysts will manually validate found threats and determine your network security adherence to best practices.

Onsite Threat & Vulnerability Assessment (OTVA)

Our most robust vulnerability assessment service, the OTVA, adds onsite testing and review of physical vulnerabilities. While onsite, our analysts will perform a wireless access point configuration review, physical security review, and dumpster dive to determine the potential of onsite threats and adherence to proper policies and procedures.

Conclusion

Vulnerability management must be an integral part of any organization’s information security program. With new vulnerabilities being discovered almost daily, you need to have a solid system in place for discovery, remediation, and tracking.

Ready to improve your vulnerability management program? Get in touch today!

Feel free to share our content.