Your complimentary Threat & Vulnerability Service is on its way
Clear visibility of high‑priority vulnerabilities across your estate with T&V Base.
Thank you for activating your complimentary service!
Your dashboard is being set up and will be ready in about five days.
In the meantime, we’re preparing your vulnerability scanning agent. Once everything’s live, you’ll be able to:
- Identify and monitor high-priority vulnerabilities
- Detect risks before they can be exploited
- Take action with clear, actionable insights
The Vulnerability Scanning Process
- Identification & Inventory – Discover assets and potential risks
- Detection & Analysis – Assess vulnerabilities and prioritise threats
- Remediation & Continuous Monitoring – Apply fixes and keep your estate secure
Why regular scanning is essential
- Gain peace of mind
- Stay compliant
- Reduce costs
- Protect your reputation
Get a sneak peek at a T&V dashboard
Curious about what your vulnerability insights will look like? Take a look below for a preview of the dashboard you’ll soon have access to:

Secure by default
As part of our commitment to security, all Wanstor customers also receive our base T&V service that protects and aligns with our guiding principle of always-on security.
| Feature | T&V Base |
|---|---|
| Agent-based device scanning | |
| Internet-based vulnerability updates | |
| Power BI dashboard reporting | |
| Data retention (30 days) | |
| Visibility of vulnerabilities |
Our award-winning security team are at the ready to expand your security posture and protect against the ever-changing threat
landscape. Upgrade now.
| Feature | T&V Managed (Upgrade) |
|---|---|
| Everything in Base Tier, plus: | |
| Recurring network scans (min 24 hrs) | |
| Credentialed scanning for full details | |
| Coverage for non-agent devices (IP phones, NAS) | |
| Data retention (up to 2 years) | |
| Monthly review with Cyber Security consultant |
Ready for complete peace of mind?
Your complimentary T&V Base service gives you essential visibility and actionable insights. However, if you need advanced reporting, tailored remediation plans, and ongoing expert guidance, T&V Managed is the next step.
Frequently Asked Questions
1. What is Qualys Cloud Agent and why is it used?
In short, Qualys Cloud Agent is a lightweight, always-on agent installed on endpoints, servers, or VMs. It continuously collects asset data — hardware, software, and configuration — and sends it securely to the Qualys Cloud Platform for vulnerability management. Even when devices are offline, it works and updates automatically.
2. What data does the Cloud Agent collect?
- System metadata: OS details, installed applications, configuration settings.
- Network info: Open ports, services running.
- Security posture: Vulnerabilities, missing patches, compliance status.
- Important: The agent does not scan internal files or user data; it focuses on system configuration and software versions.
3. Does it impact performance?
Generally, the agent has a very low footprint — typically under 1% CPU usage, with peaks up to 5% during scans. Memory and disk usage are minimal.
4. How does the agent communicate with Qualys?
- Outbound HTTPS (port 443) only; no inbound firewall changes required.
- Uses TLS 1.2 or later for secure communication.
- Sends differential updates to minimize bandwidth.
5. What platforms are supported?
Currently, Qualys Cloud Agent can be installed on Windows, Mac, and Linux devices.
6. How is the agent installed and activated?
You can install the agent manually, through Endpoint Central, or via Microsoft Intune. The installation is silent and does not require a device restart. Users won’t see any icons or prompts, as everything happens in the background.
7. How does the agent update?
The agent self-updates automatically when contacting Qualys platform. No manual intervention.
8. Does it work offline?
Yes. The agent continues collecting data even when offline and syncs automatically once internet connectivity is restored.
9. Privacy concerns – does it access personal data?
No. The agent does not access user files or personal content. It only collects system-level data for security and compliance purposes.
10. How often the agent scans the device?
By default, the agent scans the device every 4 hours. This ensures you always have the latest vulnerability information.