It also provides a list of hosts that are no longer found to be part of an organization’s attack surface, which can be used to exclude IPs from the Qualys Vulnerability Management scanner. In this guide: Installation Considerations Set up the Censys Qualys Integration Create a settings file...