Force refresh server assessment (meta)data

%3CLINGO-SUB%20id%3D%22lingo-sub-2086986%22%20slang%3D%22en-US%22%3EForce%20refresh%20server%20assessment%20(meta)data%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2086986%22%20slang%3D%22en-US%22%3E%3CP%3EHi%20Guys%2C%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3Egot%20a%20question%20related%20to%20the%20server%20assessment%20VA%20%2FAdvisor%20recommendation.%3C%2FP%3E%3CP%3EI%20just%20fixed%20a%20VA%20item%2C%20but%20the%20docs%20says%20it%20will%20take%20up%20to%2048%20hours%20before%20it%20will%20refresh%20the%20data%2F%20before%20i%20can%20see%20new%20VA%20results.%3C%2FP%3E%3CP%3E%22%3CSTRONG%3E%3CSPAN%3EHow%20quickly%20will%20the%20scanner%20identify%20newly%20disclosed%20critical%20vulnerabilities%3F%3C%2FSPAN%3E%3C%2FSTRONG%3E%3C%2FP%3E%3CDIV%3E%3CP%3EWithin%20%3CU%3E%3CSTRONG%3E48%20hrs%3C%2FSTRONG%3E%3C%2FU%3E%20of%20the%20disclosure%20of%20a%20critical%20vulnerability%2C%20Qualys%20incorporates%20the%20information%20into%20their%20processing%20and%20can%20identify%20affected%20machines.%22%3C%2FP%3E%3C%2FDIV%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EIs%20there%20another%20way%20to%20force%20this%20%3F%3C%2FP%3E%3CP%3Emy%20reference%20is%20this%20link%26nbsp%3B%3C%2FP%3E%3CDIV%3E%3CA%20title%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsecurity-center%2Fdeploy-vulnerability-assessment-vm%23overview-of-the-integrated-vulnerability-scanner%22%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsecurity-center%2Fdeploy-vulnerability-assessment-vm%23overview-of-the-integrated-vulnerability-scanner%22%20target%3D%22_blank%22%20rel%3D%22noreferrer%20noopener%22%3ESecurity%20Center's%20integrated%20vulnerability%20assessment%20solution%20for%20Azure%20and%20hybrid%20machines%20%7C%20Microsoft%20Docs%3C%2FA%3E%3C%2FDIV%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3Eregards%2C%3C%2FP%3E%3CP%3EJoe%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2091543%22%20slang%3D%22en-US%22%3ERe%3A%20Force%20refresh%20server%20assessment%20(meta)data%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2091543%22%20slang%3D%22en-US%22%3E%3CP%3EHi%26nbsp%3B%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F932356%22%20target%3D%22_blank%22%3E%40joetahsin%3C%2FA%3E%26nbsp%3B%2C%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EThe%20same%20article%20says%3A%20%22%3CSPAN%3EScanning%20begins%20automatically%20as%20soon%20as%20the%20extension%20is%20successfully%20deployed.%20Scans%20will%20then%20%3CSTRONG%3Erun%20at%20four-hour%20intervals%3C%2FSTRONG%3E.%20This%20interval%20isn't%20configurable.%22.%26nbsp%3B%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EAlso%2C%20you%20can%20trigger%20an%20on-demand%20scan%20to%20expedite%20the%20process%3A%20%3CA%20href%3D%22https%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsecurity-center%2Fdeploy-vulnerability-assessment-vm%23trigger-an-on-demand-scan%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noreferrer%22%3Ehttps%3A%2F%2Fdocs.microsoft.com%2Fen-us%2Fazure%2Fsecurity-center%2Fdeploy-vulnerability-assessment-vm%23trigger-an-on-demand-scan%3C%2FA%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-SUB%20id%3D%22lingo-sub-2093072%22%20slang%3D%22en-US%22%3ERe%3A%20Force%20refresh%20server%20assessment%20(meta)data%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-2093072%22%20slang%3D%22en-US%22%3E%3CP%3E%3CA%20href%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fuser%2Fviewprofilepage%2Fuser-id%2F117322%22%20target%3D%22_blank%22%3E%40Stanislav%20Belov%3C%2FA%3E%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3EHi%20Stanislav%2C%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3Ethanks%20for%20your%20reply%20and%20your%20info!%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E
New Contributor

Hi Guys, 

 

got a question related to the server assessment VA /Advisor recommendation.

I just fixed a VA item, but the docs says it will take up to 48 hours before it will refresh the data/ before i can see new VA results.

"How quickly will the scanner identify newly disclosed critical vulnerabilities?

Within 48 hrs of the disclosure of a critical vulnerability, Qualys incorporates the information into their processing and can identify affected machines."

 

Is there another way to force this ?

my reference is this link 

 

regards,

Joe

2 Replies

Hi @joetahsin ,

 

The same article says: "Scanning begins automatically as soon as the extension is successfully deployed. Scans will then run at four-hour intervals. This interval isn't configurable.". 

 

Also, you can trigger an on-demand scan to expedite the process: https://docs.microsoft.com/en-us/azure/security-center/deploy-vulnerability-assessment-vm#trigger-an...

 

@Stanislav Belov

 

Hi Stanislav, 

 

thanks for your reply and your info!