on 11-23-2022 08:56 AM - edited on 07-26-2023 07:27 PM by sophie
This page provides information on how to ignore vulnerabilities, reactivate ignored vulnerabilities, and why you may want to ignore them in the first place.
As your list of assets grows, the list of active vulnerabilities often increases in size as well. Not all of these vulnerabilities are always relevant to you and might not even apply to your situation.
The Ignore vulnerabilities feature removes irrelevant vulnerabilities from the active list, allowing you to focus on more critical vulnerabilities.
Alternatively, stepping into any vulnerability will show you a detailed overview. In this summary, the Ignore vulnerabilities action button can be selected as well.
The selected vulnerabilities have now been moved from the Active vulnerabilities menu to the Ignored vulnerabilities menu.
Alternatively, stepping into any vulnerability will show you a detailed overview. In this summary, the Reactivate action button can be clicked as well.
The selected vulnerabilities have now been moved from the Ignored vulnerabilities menu back to the Active vulnerabilities menu.
Was this post helpful? Select Yes or No below!
Did you have a similar issue and a different solution? Or did you not find the information you needed? Create a post in our Community Forum for your fellow IT Heroes!
More questions? Browse our Quick Tech Solutions.
Experience Lansweeper with your own data. Sign up now for a 14-day free trial.
Try NowExperience Lansweeper with your own data. Sign up now for a 14-day free trial.
Try Now