Ignore a vulnerability
Ignore a vulnerability from the page of an asset
- Click on Inventory
- Choose an asset
- From the page dedicated to the asset, check the vulnerabilities to be ignored
- Click on the “Ignore” button
Ignore a vulnerability from the page of a vulnerability
- Click on Vulnerabilities Encyclopedia
- Choose a vulnerability
- In the page dedicated to the vulnerability, check the assets on which you want to ignore the vulnerability
- Click on “Ignore”
Advanced actions
From each of these pages, you can access advanced actions in the drop-down menu. These advanced actions allow you to:
- comment on the checked vulnerabilities;
- ignore the checked vulnerabilities;
- if you ignore the checked vulnerabilities, choose an automatic reactivation policy.
Reactivation policies allow you to choose a date at which the selected vulnerabilities will no longer be marked as ignored.
Just as it is possible to ignore a vulnerability without commenting on it, it is also possible to comment on a vulnerability without ignoring it.
Unignore a vulnerability
Unignore a vulnerability from the page of an asset
- Click on Inventory
- Choose an asset
- From the dedicated page of the chosen asset, select the vulnerabilities to no longer ignore
- Click on the “Activate” button
Unignore a vulnerability from the page of a vulnerability
- Click on Vulnerabilities Encyclopedia
- Choose a vulnerability
- In the dedicated page of the chosen vulnerability, select the asset(s) on which you want to unignore the vulnerability
- Click on “Activate” button
Comment on an ignored vulnerability
As explained in the “Ignore a vulnerability” section, you can comment on a vulnerability via the advanced actions in the drop-down menu.
It is possible to comment on a vulnerability without reactivating it.