cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Nils
Lansweeper Tech Support
Lansweeper Tech Support

TL;DR-Sweepy-Icon (1).png
This page provides information on how to ignore vulnerabilities, reactivate ignored vulnerabilities, and why you may want to ignore them in the first place.


Risk Insights has been greatly improved in version 10.5.0.7. We recommend updating your installation if you are running a lower Lansweeper version to ensure an optimized experience.

As your list of assets grows, the list of active vulnerabilities often increases in size as well. Not all of these vulnerabilities are always relevant to you and might not even apply to your situation.

The Ignore vulnerabilities feature removes irrelevant vulnerabilities from the active list, allowing you to focus on more critical vulnerabilities.

This feature is available in Pro and higher plans. It is available for a limited time for all users to try it out. For more information on plans, check out the pricing page.

Ignore vulnerabilities

By default, a filter is applied to all vulnerabilities to only show those with a high confidence level. You can remove this filter to show vulnerabilities with a low confidence level as well. 
  1. Go to Risk Insights > Active vulnerabilities.
  2. Use the checkboxes in front of the vulnerabilities to select those you wish to exclude from the list.
  3. In the top bar, select Ignore vulnerabilities.
    The pop-up informs you of the number of vulnerabilities that will be ignored, and how many assets are affected.
    Ignore vulnerabilities 3.png
  4. Select the reason for excluding the selected vulnerabilities and select Confirm.

Alternatively, stepping into any vulnerability will show you a detailed overview. In this summary, the Ignore vulnerabilities action button can be selected as well.

The selected vulnerabilities have now been moved from the Active vulnerabilities menu to the Ignored vulnerabilities menu.

You may want to exclude specific vulnerabilities because they are false positives, accepted risks, or irrelevant.

Reactivate vulnerabilities

  1. In the Risk Insights module, go to the list of Ignored vulnerabilities.
  2. Use the checkboxes in front of the vulnerabilities to select those you wish to exclude from the list.
  3. In the top bar, select Reactivate.
    The pop-up informs you of the number of vulnerabilities that will be reactivated, and how many assets are affected.
    Ignore vulnerabilities 4.png
  4. Select Confirm to move the selected vulnerabilities back to the Active vulnerabilities menu.

Alternatively, stepping into any vulnerability will show you a detailed overview. In this summary, the Reactivate action button can be clicked as well.

The selected vulnerabilities have now been moved from the Ignored vulnerabilities menu back to the Active vulnerabilities menu.


Was this post helpful? Select Yes or No below!
Did you have a similar issue and a different solution? Or did you not find the information you needed? Create a post in our Community Forum for your fellow IT Heroes!
More questions? Browse our Quick Tech Solutions.


Was this article helpful? Yes No
0% helpful (0/1)

New to Lansweeper?

Try Lansweeper For Free

Experience Lansweeper with your own data.
Sign up now for a 14-day free trial.

Try Now

New to Lansweeper?

Try Lansweeper For Free

Experience Lansweeper with your own data.
Sign up now for a 14-day free trial.

Try Now
Version history
Last update:
‎07-26-2023 07:27 PM
Updated by: