Build Your QQL Queries

Here are a few examples of QQL queries for your reference:

1)      Let’s create a query to find out, out of total vulnerability detections, how many vulnerabilities are of severity 5.

Search query example to find out the number of vulnerabilities of severity 5.

Run the query, and note the difference in the total detections in the result.

Change in count of detections after the search query is executed.

Let’s further narrow down our search and look for severity 5 vulnerabilities detected only on the Windows assets in our environment. Add another query for the Asset data source index, and run the combined query.

Combined search query example.

2) Let’s go for a little more complex query. Let’s find out vulnerabilities having the detection type as Confirmed, with ACTIVE status and those detected on Windows assets.

Complex query example.

Run the query and you will find that we have narrowed down our search considerably.

Narrowing down search results.

3) Here's an example of a nested query using parentheses. Run the query and note the results.

Nested query example.

4) Let's create even a more complex nested query. Let's search for all the active instances of QID 100350 for assets scanned within the last 24 hours having the tag Windows Desktop or Cloud Agent, but not tag SiteA and Lab1.

It's important to reason out what exactly we're looking for. It's then important to use each query as a building block, add operators correctly and enclose your values in parentheses accurately.

Let's build each individual query first and later join all to form a complex one.

What we are looking for


active instances of QID 100350


assets scanned within the last 24 hours


tag Windows Desktop or Cloud Agent

(tags:(name:`Windows Desktop` OR name:`cloud agent`))

not tag SiteA and Lab1

NOT (tags:(name:SiteA AND name:Lab1))


Now that we have all the building blocks ready, let's create the single complex query by adding all these individual queries:

In the search bar for the Asset data source, add:

(lastVmScanDate>=now-24h AND (tags:(name:`Windows Desktop` OR name:`Cloud Agent`)) AND NOT (tags:(name:SiteA AND name:Lab1)))

In the search bar for the Vulnerability data source, add:


See Data Sources

See Qualys Query Language Syntax