Updated on 2024-04-15 GMT+08:00

Managing the Vulnerability Whitelist

If you evaluate that some vulnerabilities do not affect your services and do not want to view the vulnerabilities in the vulnerability list, you can whitelist the vulnerabilities. After they are whitelisted, the vulnerabilities will be ignored in the vulnerability list and no alarms will be reported. The vulnerabilities will not be scanned and the vulnerability information will not be displayed when the next vulnerability scan task is executed.

This section describes how to whitelist a vulnerability, modify a vulnerability whitelist rule, and remove a vulnerability whitelist rule from the vulnerability whitelist.

Whitelisting Vulnerabilities

  1. Log in to the management console.
  2. In the upper left corner of the page, click , select a region, and choose Security > Host Security Service.
  3. In the navigation pane, choose Prediction > Vulnerabilities.

    • Whitelisting all servers that are affected by a vulnerability

      HSS will ignore the vulnerability when scanning for vulnerabilities on all servers.

      1. In the Operation column of the row containing the target vulnerability, click More and select Add to Whitelist.

        You can also select multiple vulnerabilities and click Add to Whitelist above the vulnerability list.

      2. In the dialog box displayed, click OK.
    • Whitelisting one or more servers that are affected by a vulnerability

      HSS will ignore the vulnerability when scanning for vulnerabilities on these servers.

      1. Click a target vulnerability name.
      2. On the slide-out panel displayed, click the Affected tab.
      3. In the Operation column of the row containing the target server, click More and select Add to Whitelist.

        You can also select multiple servers and click Add to Whitelist above the server list.

      4. In the dialog box displayed, click OK.
    • Whitelisting vulnerabilities using whitelist rules
      1. In the upper right corner of the Vulnerabilities page, click Configure Policy. The Configure Policy slide-out panel is displayed.
      2. In the Vulnerability Whitelist area, click Add Rule.
      3. Configure a whitelist rule according to Table 1.
        Table 1 Vulnerability whitelist rule parameters

        Parameter

        Description

        Type

        Select the type of vulnerabilities to be whitelisted. Possible values are as follows:

        • Linux Vulnerabilities
        • Windows Vulnerabilities
        • Web-CMS Vulnerabilities
        • Application Vulnerabilities

        Vulnerability

        Select one or more vulnerabilities to be whitelisted.

        Rule Scope

        Select the servers affected by the vulnerabilities. Possible values are as follows:

        • All servers

          HSS will ignore the vulnerability when scanning for vulnerabilities on all servers.

        • Selected servers

          Select one or more target servers. HSS will ignore the vulnerabilities when scanning for vulnerabilities on these servers.

          You can search for a target server by server name, ID, EIP, or private IP address.

        Remarks (Optional)

        Enter the remarks.

      4. Click OK.

Editing a Vulnerability Whitelist

  1. Log in to the management console.
  2. In the upper left corner of the page, click , select a region, and choose Security > Host Security Service.
  1. In the navigation pane, choose Prediction > Vulnerabilities.
  2. In the upper right corner of the Vulnerabilities page, click Configure Policy. The Configure Policy slide-out panel is displayed.
  3. In the row containing the desired vulnerability whitelist rule, click Edit in the Operation column.
  4. On the editing page, modify the information and click OK.

Removing a Vulnerability Whitelist Rule from the Vulnerability Whitelist

  1. Log in to the management console.
  2. In the upper left corner of the page, click , select a region, and choose Security > Host Security Service.
  3. In the navigation pane, choose Prediction > Vulnerabilities.
  4. In the upper right corner of the Vulnerabilities page, click Configure Policy. The Configure Policy slide-out panel is displayed.
  5. In the row containing the desired vulnerability whitelist rule, click Delete in the Operation column.
  6. In the dialog box displayed, confirm the information and click OK.