Qualys : Vulnerability Signature Release 2.4.722-4 Oracle DB New Feature
October 12, 2019 at 12:16 am EDT
Share
The upcoming release of the Qualys Vulnerability Signature, version 2.4.722-4, includes changes for Oracle Database signatures. The 2.4.722-4 release is live as of October 11, 2019.
Feature Highlights
Oracle Database Signatures (2019)
With the 2.4.722-4 release, Qualys Vulnerability Management extends its support for Oracle DB authentication to include instance-based discovery support for quarterly released Oracle Database patches, which was earlier limited to port-based discovery. Each Oracle Database QID will now display port and instance information in the result section. This enables customers to see multiple instances running on same port. These changes will be in effect for all 2019 and later Oracle Database QIDs.
New Scan Report display for Oracle Database QIDs -
Old Scan Report display for Oracle Database QIDs -
For more information on Oracle Authentication scanning, search the help for 'Set Up Oracle Authentication.'
Related
Attachments
Original document
Permalink
Disclaimer
Qualys Inc. published this content on 11 October 2019 and is solely responsible for the information contained therein. Distributed by Public, unedited and unaltered, on 12 October 2019 04:15:06 UTC
Qualys, Inc. is a provider of a cloud-based platform delivering information technology (IT), security and compliance solutions. The Companyâs integrated suite of IT, security and compliance solutions delivered on Qualys' Enterprise TruRisk Platform enables its customers to identify and manage their IT and operational technology (OT) assets, collect, and analyze large amounts of IT security data, recommend, and implement remediation actions and verify the implementation of such actions. It provides its solutions through a software-as-a-service model, primarily with renewable annual subscriptions. Its cloud platform offers an integrated suite of solutions that automates the lifecycle of asset discovery and management, security and compliance assessments, and remediation for an organizationâs IT infrastructure and assets, whether such infrastructure and assets reside inside the organization, on their network perimeter, on endpoints or in the cloud.