New Relic Security RX can detect vulnerabilities across your applications. While most vulnerabilities need remediation, some might not be applicable to your environment. For example, your internal policies might categorize them as low risk or limited exposure due to how your application uses the potentially vulnerable component.
For vulnerabilities you're not interested in tracking, you can set the Status to Ignored so they no longer appear in the UI. Since each vulnerability is tied to one or more applications, you can:
- Ignore individual vulnerabilities for a specific application
- Ignore a vulnerability that appears across multiple applications
You can always change the status from Ignored back to Affected if you decide a vulnerability is worth tracking again.
Tip
Before you ignore a vulnerability, keep in mind that this change prevents other users with account access from seeing that vulnerability.
Ignore a vulnerability
When you choose to ignore a vulnerability, you'll be prompted to explain the rationale behind the decision. For example, you might say that the vulnerable code is not used in the application. We recommend that when you give this context, you also provide supplemental documentation when possible.
You'll also be prompted to set a duration for the Ignored status. Security RX will automatically change it from Ignored to Affected when the time period expires. If a vulnerability is already No Longer Detected, the status will remain no longer detected.
Restore ignored vulnerabilities
It's good practice to review ignored vulnerabilities and validate whether they should stay ignored. We recommend reviewing your vulnerabilities every 90 days to ensure you aren't introducing risk into your system.
If you change the status from Ignored to Affected for a specific application, that reintroduces the vulnerability into default views and counts against this application. Instances of this vulnerability on other applications remain ignored.
What's next?
Set up alerts
Get notified when application vulnerabilities are detected
Query security data
Track status changes and remediation metrics with NRQL
Understand prioritization
Learn how application vulnerabilities are ranked by risk
Manage organization vulnerabilities
View application vulnerabilities across your entire organization