Updated on 2022-02-22 GMT+08:00

Marking Vulnerabilities as Ignored

This section shows how to mark vulnerabilities as Ignored. Before the marking, make sure that the vulnerabilities are free of security risks.

NOTE:

After you mark a vulnerability as Ignored, you cannot change its status again and the system will no longer consider this vulnerability risky. You can click Unignore to bring back the vulnerability.

Prerequisites

  • An account and its password have been obtained for logging in to the management console.
  • At least one vulnerability has been detected.

Procedure

  1. Log in to the management console.
  2. Choose Security > Vulnerability Scan Service > Dashboard.
  3. On the right of the Vulnerability List area, click View to go to the Vulnerability List page.
  4. Select the vulnerabilities to be ignored and click Mark as Ignored.

    Figure 1 Marking vulnerabilities as ignored
    NOTE:
    • Alternatively, in the row containing the desired vulnerability, click Ignore in the Operation column to mark a vulnerability separately.
    • You can also click Ignore on the page displaying the details of the vulnerability to mark a vulnerability.

  5. In the displayed Ignore Vulnerability dialog box, specify the mandatory fields, and then click OK.