Use these filters to remove vulnerabilities from the report that aren’t the highest priority so you can focus on what’s most critical to your organization. For example, remove vulnerabilities that are not exploitable because they were found on a non-running kernel or service.
Running Kernel – It’s possible that multiple kernels may be detected on the same Linux host. Toggle this filter On to filter out kernel-related vulnerabilities that are not exploitable because they were found on a non-running kernel. |
Running Service – Toggle this filter On to filter out service-related vulnerabilities that are not exploitable because they were found on a non-running port/service. |
Not Mitigated by Configuration - We may detect software on a host that is considered vulnerable, however there’s a specific configuration present on the host that makes it not exploitable. Toggle this filter On to filter out config-related vulnerabilities that are not exploitable due to host configuration. |
Remotely Discoverable Only – Toggle this filter On to only include vulnerabilities that can be detected by a scanner using remote (unauthenticated) scanning. |
Internet Facing Only - Toggle this filter On to include assets with IP addresses that could be exploitable. Our system tag named Internet Facing Assets includes a range of pre-defined IP addresses. We automatically tag assets that matches this pre-defined IP address range in the tag. To view the complete range of IP addresses that are included in the Internet Facing Assets system tag, go to AssetView app, navigate to Assets > Tags and then select Internet Facing Assets tag. From the quick-action menu, select View and then click Tag Rule in the View mode to view the complete list of IP addresses defined in the tag. |