This page has been updated to align with the new Grail security events table. For the complete list of updates and actions needed to accomplish the migration, follow the steps in the Grail security table migration guide.
Ingest Qualys vulnerability findings, scan events, and audit logs into Dynatrace as security events.
Dynatrace integration with Qualys allows users to unify and contextualize vulnerability findings across DevSecOps tools and products, enabling central prioritization, visualization, and automation of security findings.
Qualys Enterprise TruRisk platform offers a range of products, including Vulnerability Management, Detection, & Response (VMDR), which helps detect and prioritize vulnerabilities for remediation on hosts. The Dynatrace platform observes the corresponding applications and services associated with those hosts. Ingesting and enriching vulnerability findings with runtime context helps users to better focus on the top risks that affect their production applications.
With the ingested data, you can accomplish various use cases, such as
See below for the Qualys and Dynatrace requirements.
To authenticate with a username and password, the user account must have the following permissions:
ActiveGate version 1.310+ that needs to be able to
Permissions: For a list of permissions required, go to Hub, select
Extensions, and display Technical information.
Generate an access token with the openpipeline.events_security scope and save it for later. For details, see Dynatrace API - Tokens and authentication.
In Dynatrace, search for Qualys and select Install.
Follow the on-screen instructions to configure the extension.
Verify configuration by running the following queries in
Notebooks:
For audit logs:
fetch logs| filter log.source=="Qualys"
For finding events:
fetch security.events| filter dt.system.bucket == "default_securityevents"| filter event.provider=="Qualys"AND event.type=="VULNERABILITY_FINDING"
For scan events:
fetch security.events| filter dt.system.bucket == "default_securityevents"| filter event.provider=="Qualys"AND event.type=="VULNERABILITY_SCAN"
Once the extension is installed and working, you can access and manage it in Dynatrace via
Extensions. For details, see About Extensions.

Dynatrace integration with Qualys is an extension running on Dynatrace ActiveGate. Once you enable and configure the Dynatrace Qualys extension
It periodically collects security findings and audit logs using Qualys REST API.
The fetched data is ingested into Dynatrace and mapped to the Dynatrace Semantic Dictionary.
Data is stored in a bucket called default_securityevents (for details, see Built-in Grail buckets).
For billing information, see Events powered by Grail.
Vulnerability finding events store the individual vulnerability findings reported by Qualys per affected artifacts and component.
Vulnerability scan events indicate coverage of scans for individual artifacts.
Audit logs represent user activity logs in Qualys.
The Qualys VMDR findings are reported by default.
On the first ingest run, integration ingests all findings updated in the last m hours, where m is the first ingest interval configured in the monitoring configuration.
If the extension is configured to ingest data at an interval of n hours, then whenever the extension runs, all vulnerability findings updated in the last n hours will be ingested.
If no new or updated findings were detected, no findings will be ingested.
qualys namespace is added for extracting several Qualys-specific attributes for user convenience on top of the original issue JSON, which is stored in event.original_content field.Example fields:
qualys.host.asset_id: ID assigned to all assets in the subscription that is not exposed in VMDR.
qualys.host.tracking_method: How the host asset is tracked (for example, Cloud Agent, IP, DNS).
qualys.detection.first_found: When the detection was first found on the asset.
qualys.detection.last_found - When the detection was last found on the asset.
qualys.detection.times_found: How many times this detection has been found.
qualys.detection.qds_factors: A map with details on what has contributed to the Qualys Detection Score.
HOST: all the findings from Qualys VMDR generated from assessment of hosts are mapped set with HOST value in object.type field, and host namespaces are added with the corresponding fields:
host.name: Hostname of the host asset (if available).
host.ip: IP address of the host asset.
host.fqdn: Fully qualified domain name of the host asset (if available).
The Dynatrace risk levels and scores are mapped from the original Qualys severities.
dt.security.risk.score is mapped from the Qualys provided severity score to static scores.
dt.security.risk.level is mapped from the Qualys severity score and mapped from the original values in finding.score.
The Qualys Detection Score (QDS) has a range from 1 to 100. To map this to the 10 point Dynatrace security risk score we divide the QDS by 10.
dt.security.risk.score (mapped from finding.score) | dt.security.risk.level (mapped from dt.security.risk.score) |
|---|---|
| 9.0-10.0 | CRITICAL |
| 7.0-8.9 | HIGH |
| 4.0-6.9 | MEDIUM |
| 0.1-3.9 | LOW |