This page provides information on how to ignore assets and vulnerabilities, restore ignored assets and vulnerabilities, and why you may want to ignore them in the first place.
Risk Insights has been greatly improved in version 10.5.0.7. We recommend
updating your installation if you are running a lower Lansweeper version to ensure an optimized experience.
As your list of assets grows, the list of active vulnerabilities often increases in size as well. Not all of these vulnerabilities are always relevant to you and might not even apply to your situation.
Ignoring certain assets or vulnerabilities can remove irrelevant entries from the active list, allowing you to focus on more critical assets or vulnerabilities.
This feature is available in Pro and higher plans. It is available for a limited time for all users to try it out. For more information on plans, check out
the pricing page.
Ignore assets
By default, a filter is applied to all assets to only show those with a high confidence level. You can remove this filter to show entries with a low confidence level as well.
- Go to Risk Insights > Vulnerable assets.
- Use the checkboxes in front of the assets to select those you wish to exclude from the list.
- Select Ignore.
The pop-up informs you of the number of assets that will be ignored, and how many vulnerabilities are affected.
- Select the reason for excluding the selected assets and select Apply.
The selected assets have now been moved from the Vulnerable assets view to the Ignored assets view.
You may want to exclude specific assets because they are false positives, accepted risks, or irrelevant.
Restore assets
- Go to Risk Insights > Ignored assets.
- Use the checkboxes in front of the assets to select those you wish to exclude from the list.
- Select Restore.
The pop-up informs you of the number of assets that are affected.
- Select Apply to move the selected assets back to the Vulnerable assets menu.
The selected vulnerabilities have now been moved from the Ignored vulnerabilities menu back to the Active vulnerabilities menu.
Ignore vulnerabilities
By default, a filter is applied to all vulnerabilities to only show those with a high confidence level. You can remove this filter to show vulnerabilities with a low confidence level as well.
- Go to Risk Insights > Active vulnerabilities.
- Use the checkboxes in front of the vulnerabilities to select those you wish to exclude from the list.
- Select Ignore.
The pop-up informs you of the number of vulnerabilities that will be ignored, and how many assets are affected.
- Select the reason for excluding the selected vulnerabilities and select Apply.
Alternatively, stepping into any vulnerability will show you a detailed overview. In this summary, the Ignore action button can be selected as well.
The selected vulnerabilities have now been moved from the Active vulnerabilities view to the Ignored vulnerabilities view.
You may want to exclude specific vulnerabilities because they are false positives, accepted risks, or irrelevant.
Restore vulnerabilities
- Go to Risk Insights > Ignored vulnerabilities.
- Use the checkboxes in front of the vulnerabilities to select those you wish to exclude from the list.
- In the top bar, select Restore.
The pop-up informs you of the number of vulnerabilities that will be restored, and how many assets are affected.
- Select Apply to move the selected vulnerabilities back to the Active vulnerabilities menu.
Alternatively, stepping into any vulnerability will show you a detailed overview. In this summary, the Restore action button can be clicked as well.
The selected vulnerabilities have now been moved from the Ignored vulnerabilities view back to the Active vulnerabilities view.
Was this post helpful? Select Yes or No below!
Did you have a similar issue and a different solution? Or did you not find the information you needed? Create a post in our Community Forum for your fellow IT Heroes!
More questions? Browse our Quick Tech Solutions.