New Relic Security RX can detect vulnerabilities across your infrastructure hosts. While most vulnerabilities need remediation, some might not be applicable to your environment. For example, your internal policies might categorize them as low risk or limited exposure due to how your infrastructure uses the potentially vulnerable component.
For vulnerabilities you're not interested in tracking, you can set the Status to Ignored so they no longer appear in the UI. Since each vulnerability is tied to one or more hosts, you can:
- Ignore individual vulnerabilities for a specific host
- Ignore a vulnerability that appears across multiple hosts
You can always change the status from Ignored back to Affected if you decide a vulnerability is worth tracking again.
Sugerencia
Before you ignore a vulnerability, keep in mind that this change prevents other users with account access from seeing that vulnerability.
Ignore a vulnerability
When you choose to ignore a vulnerability, you'll be prompted to explain the rationale behind the decision. For example, you might say that the vulnerable code is not used on the host. We recommend that when you give this context, you also provide supplemental documentation when possible.
You'll also be prompted to set a duration for the Ignored status. Security RX will automatically change it from Ignored to Affected when the time period expires. If a vulnerability is already No Longer Detected, the status will remain no longer detected.
Restore ignored vulnerabilities
It's good practice to review ignored vulnerabilities and validate whether they should stay ignored. We recommend reviewing your vulnerabilities every 90 days to ensure you aren't introducing risk into your system.
If you change the status from Ignored to Affected for a specific host, that reintroduces the vulnerability into default views and counts against this host. Instances of this vulnerability on other hosts remain ignored.
What's next?
Set up alerts
Get notified when infrastructure vulnerabilities are detected
Query security data
Track status changes and remediation metrics with NRQL
Manage infrastructure vulnerabilities
View infrastructure vulnerabilities across your entire organization
Manage infrastructure vulnerabilities from entities
Monitor vulnerabilities for specific hosts