As your list of assets grows, the list of detected vulnerabilities is likely to grow as well. However, not all vulnerabilities are relevant or applicable to your environment.
By ignoring specific assets or vulnerabilities, you can remove irrelevant entries from your active list, helping you focus on more critical assets or vulnerabilities.
Common reasons for excluding entries include false positives, accepted risks, or vulnerabilities that do not impact your organization.
Manage vulnerable assets
The Vulnerable assets page lets you view and manage all assets that have known vulnerabilities. You can ignore assets that are not relevant to your security posture, or restore previously ignored ones when they become relevant again.
Go to Risk insights > Vulnerable assets.
Use the checkboxes in front of the assets to select those you wish to exclude from the list.
Select Ignore.
The pop-up informs you of the number of assets that will be ignored, and how many vulnerabilities are affected.
Select the reason for excluding the selected assets
Select Ignore.
Go to Risk insights > Ignored assets.
Use the checkboxes in front of the assets to select those you wish to move back to the Vulnerable assets menu.
Select Restore.
The pop-up informs you of the number of assets that are affected.
Select Restore.
By default, a filter is applied to all assets to only show those with a high confidence level. You can remove this filter to show entries with a low confidence level as well.
Manage vulnerabilities
The Active vulnerabilities page lets you view and manage all detected vulnerabilities across your environment. You can ignore vulnerabilities that are not relevant to your security posture, or restore previously ignored ones when they become relevant again.
Go to Risk insights > Active vulnerabilities.
Use the checkboxes in front of the vulnerabilities to select those you wish to exclude from the list.
Select Ignore.
The pop-up informs you of the number of vulnerabilities that will be ignored, and how many assets are affected.
Select the reason for excluding the selected vulnerabilities.
Select Apply.
Alternatively, stepping into any vulnerability will show you a detailed overview. In this summary, the Ignore action can be selected as well.
Go to Risk insights > Ignored vulnerabilities.
Use the checkboxes in front of the vulnerabilities to select those you wish to move back to the Active vulnerabilities menu.
In the top bar, select Restore.
The pop-up informs you of the number of vulnerabilities that will be restored, and how many assets are affected.
Select Restore.
Alternatively, stepping into any vulnerability will show you a detailed overview. In this summary, the Restore action button can be clicked as well.
By default, a filter is applied to all vulnerabilities to only show those with a high confidence level. You can remove this filter to show vulnerabilities with a low confidence level as well.