Ignore a vulnerability

Ignore a vulnerability from the page of an asset

  1. Click on Inventory
  2. Choose an asset
  3. From the page dedicated to the asset, check the vulnerabilities to be ignored
  4. Click on the “Ignore” button

Ignore a vulnerability from the page of a vulnerability

  1. Click on Vulnerabilities Encyclopedia
  2. Choose a vulnerability
  3. In the page dedicated to the vulnerability, check the assets on which you want to ignore the vulnerability
  4. Click on “Ignore”

 Advanced actions

From each of these pages, you can access advanced actions in the drop-down menu. These advanced actions allow you to:

  • comment on the checked vulnerabilities;
  • ignore the checked vulnerabilities;
  • if you ignore the checked vulnerabilities, choose an automatic reactivation policy.

Reactivation policies allow you to choose a date at which the selected vulnerabilities will no longer be marked as ignored.

Just as it is possible to ignore a vulnerability without commenting on it, it is also possible to comment on a vulnerability without ignoring it.

Unignore a vulnerability

Unignore a vulnerability from the page of an asset

  1. Click on Inventory
  2. Choose an asset
  3. From the dedicated page of the chosen asset, select the vulnerabilities to no longer ignore
  4. Click on the “Activate” button

Unignore a vulnerability from the page of a vulnerability

  1. Click on Vulnerabilities Encyclopedia
  2. Choose a vulnerability
  3. In the dedicated page of the chosen vulnerability, select the asset(s) on which you want to unignore the vulnerability
  4. Click on “Activate” button

Comment on an ignored vulnerability

As explained in the “Ignore a vulnerability” section, you can comment on a vulnerability via the advanced actions in the drop-down menu.

It is possible to comment on a vulnerability without reactivating it.


Back to top