Use these filters to remove vulnerabilities from the report that aren’t the highest priority so you can focus on what’s most critical to your organization. For example, remove vulnerabilities that are not exploitable because they were found on a non-running kernel or service.
Running Kernel – It’s possible that multiple kernels may be detected on the same Linux host. Toggle this filter On to filter out kernel-related vulnerabilities that are not exploitable because they were found on a non-running kernel. |
Running Service – Toggle this filter On to filter out service-related vulnerabilities that are not exploitable because they were found on a non-running port/service. |
Not Mitigated by Configuration - We may detect software on a host that is considered vulnerable, however there’s a specific configuration present on the host that makes it not exploitable. Toggle this filter On to filter out config-related vulnerabilities that are not exploitable due to host configuration. |
Remotely Discoverable Only – Toggle this filter On to only include vulnerabilities that can be detected by a scanner using remote (unauthenticated) scanning. |