Multimedia | ||||||
---|---|---|---|---|---|---|
|
Note |
---|
To fully use this feature, you must add the following permission to your account:
|
Note |
---|
Exclusions are not available on past scan reports and are only possible for future Vulnerability Scan reports. |
...
This can be a helpful tool in instances where:
Users are willing to accept the risk, such as machines that do not store critical data or when time and resources are a concern
Users cannot patch machines, such as when doing so might break an application or architecture
Users have specific Vendor needs that would require excluding assets from a Vulnerability Scan
Vulnerability Exclusions will also give users the ability to flag machines from the Vulnerability Report, allowing customers to build out an excluded assets workflow within their Vulnerability Management System.
...
Exclude a Vulnerability from a Report
...
In the Armor Management Portal (AMP), in the left-side navigation, click Security.
Click Vulnerability Scanning.
Click a Vulnerability Name in the left hand column.
Click the Exclude Assets button.
In the right-hand window, select your Exclusion parameters:
Reason
Expiration Date
turn off the Never Expires toggle to set a custom expiration date
Scope
Use the check-boxes to select the assets for the Exclusion.
Click the Exclude Assets button to save
To View/Cancel Exclusion Rules
...
In the Armor Management Portal (AMP), in the left-side navigation, click Security.
Click Vulnerability Scanning.
Click the Exclusions tab.
For a given Vulnerability, hover over the Menu icon on the far right column of the table. The pop up menu provides 2 options, View and Remove Exclusions
To view, click View.
Exclusion rule details are read-only and cannot be altered
You can click the Remove Exclusions button to cancel an exclusion from this view
To Cancel, click Remove Exclusions.
Click Remove Exclusions to confirm.
Related Documentation
Table of Contents | ||||
---|---|---|---|---|
|